More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
8th Computer Science Chapter 8 Test MCQs With Answers
Question # 1
It refers to the spooling of bulk mail by an unidentified source.
Choose an answer
Spamming
Phishing
Cyber Troll
Hacking
Previous
Skip
Next
Question # 2
Email marketing is a direct marketing scheme that involvs sending promotional to customers.
Choose an answer
Calls
Orders
Messages
Magazines
Previous
Skip
Next
Question # 3
-------- is a technique used by cyber criminals to geain the information from the dividuals
Choose an answer
Social Engineering
Bullying
Cracking
Spamming
Previous
Skip
Next
Question # 4
----------- IS AN IMPORTNAT STRATEGY FOR ATTRACTING POTENTIAL CONSTOMERS.
Choose an answer
SEO
Cookies
Content Marketing
None
Previous
Skip
Next
Question # 5
A---------- can also be iproved using the digital marketing plan.
Choose an answer
Business plan
Technology
Face book
All of these
Previous
Skip
Next
Question # 6
------ are small piece of code that are downloaded on your compute rand keep track of your action done on the browsers.
Choose an answer
Virus
Spam
Cookies
Malware
Previous
Skip
Next
Question # 7
The best defence against..................... assauts is human intellect and comprehension.
Choose an answer
Phishing
Spamming
Hacking
Social Engineering
Previous
Skip
Next
Question # 8
With...... you pay based on the number of impressions.
Choose an answer
PPC
CPM
SEO
All of these
Previous
Skip
Next
Question # 9
Most widely used social medial platforms for SEO.
Choose an answer
Blogs
Instagram
Twitter
All of these
Previous
Skip
Next
Question # 10
Video marketing enables companies to connect with customers in a more.... engaging and cooperating way.
Choose an answer
Tastefully
Audible
Visually
None of these
Previous
Skip
Next
Question # 11
-------refers to the act of breaking into systems to steal or distroy data.
Choose an answer
Cyber Troll
Hacking
Spamming
Cracking
Previous
Skip
Next
Back