You are on page 1of 8

Class-6 Annual Term (Session-2020-21)

Subject: Computer Science

Holiday Homework

Name: Sarah Eve Haque Roll: 1 Section: Jupiter ID: 1002180011 Date: 27/4/21

Tick the correct answer.

1. Malware stands for_____.

a. Malicious software
b. Malfunction Software
c. Both
d. None

2. Malware is any kind of _______ software.

a. Dangerous
b. Unwanted
c. Useful
d. Computer

3. Malware intends to _______.

a. Take control
b. Permanent damage
c. Corrupt
d. All

4. VIRUS stands for _____ Information Resources Under Seize?

a. Visual
b. Virtual
c. Vital
d. None

5. _______ means to find answer to the problem?

a. Flowchart
b. Algorithm
c. Problem Solving
d. All of the above

6. Database is a collection of_____.

a. Unknown data
b. Data or Information
c. Basic data
d. None
7. In database data is kept in an organized way so that we can easily__________.

a. Share
b. Manage
c. Update
d. All

8. To organize data in database we use _______.

a. Row
b. Table
c. Column
d. All

9. Which one is not database software?

a. MS Access
b. MS Excel
c. MS SQL
d. C++

10. We use database software to______?

a. Damage data
b. Steal data
c. Corrupt data
d. None of the above

11. How many types of viruses are there?

a. 3
b. 4
c. 5
d. 6

12. Virus can be spread through________.

a. Hard Drive
b. Pen drive
c. SD Cards
d. All
13. Which one is a symptom of virus attack?

a. Program takes long time to load


b. Show other language
c. Notification message
d. All

14. Which one is needed to prevent virus infection?

a. Updated antivirus
b. Don’t open unknown email
c. Updated OS
d. All of the above

15. Which one is not a type of malware?

a. Virus
b. Worm
c. Red Horse
d. All of the above

16. Sometimes ______ attempt to disable firewalls, antivirus software or other security elements?

a. Virus
b. Worms
c. Trojan Horse
d. None

17. _______ is a program or file that a user unknowingly allows into the system.

a. Worms
b. Trojan horse
c. Virus
d. Boot-Sector Virus

18. ________ is a program that is put into someone’s computer, to secretly gather information
about the user and spread it to others.

a. Virus
b. Spyware
c. Worms
d. Trojan Horse

19. Hacker breaks into the computer system to _________.

a. Get information
b. Destroy
c. None
d. Both
20. The action which virus performs on the computer is called ________.

a. Virus infection
b. Malware
c. Virus Detection
d. Payload

21. A record contains data about _______ person/entity?

a. Different
b. Same
c. Known
d. Unknown

1. A field can contain ______ piece of data.

a. Single
b. Double
c. Multiple
d. None

2. Which one is an example of field data?

a. Sohel
b. Sohel Rana
c. Both
d. None

3. Which one is the first criteria of being a primary key?

a. Number
b. Unique
c. Symbol
d. Double

4. ________ key is used to create link with other tables.

a. Primary
b. Foreign
c. ID
d. None

5. A table is used to store________.


a. Information
b. Data
c. None
d. Both

22. The most common way to get into a computer is through_______.

a. Internet
b. Pen drive
c. Email
d. CD

23. Computer viruses are ______ software programs

a. Huge
b. Fast
c. Small
d. Dangerous

24. ________ is a program that is put into someone’s computer, to secretly gather information about
the user and spread it to others.
a. Virus
b. Spyware
c. Worms
d. Trojan Horse
1. In database data is kept in an organized way so that we can easily__________.
a. Control
b. Manage
c. Update
d. All
2. To organize data in database we use _______.
a. Row
b. Table
c. Column
d. All
3. We use database software to______?
a. Damage data
b. Steal data
c. Corrupt data
d. None
4. Collection of one or more worksheet is called__________.
a. Data Sheet
b. WorkBook
c. Spreadsheet
d. Book Sheet
5. Columns are labelled as______.
a. 1,2,3-----
b. A,B,C----
c. None
d. Both
6. We can align text in________.
a. Left
b. Right
c. Middle
d. All
7. ________ is used to keep text fit inside a cell.
a. Orientation
b. Wrap text
c. Indent
d. Border
8. How many types of alignments are there?
a. 5
b. 6
c. 7
d. 8
9. Multi-part and Hybrid virus are NOT same.
a. True
b. False
10. The second virus name was Creeper.
a. True
b. False

25. Sometimes Trojan horse installs a software called _______.

a. Keystroke Logger.
b. Key Logger.
c. Keystroke Log
d. None of the above

26. Common method for a worm to enter the computer is through _________.

a. Internet
b. Email
c. Software
d. None

27. When browsing the web, keep ______ on?

a. Internet
b. Scanner
c. Backup
d. None

Short answer questions:


11. What is primary key? Give an example.
Answer: The primary key is a column or group of columns that contain values that uniquely
identify each row in the table. For example, If a database contains definitions of computer
terms, it would make sense that each is only listed once in the database. By defining the
''Term'' field as the primary key, it would ensure that no term is listed more than once in the
database.

12. What is foreign key? Why do we need foreign key?


Answer: A foreign key is a column (or group of columns) used in a relational database to link
data between tables. A foreign key server references the primary key of another existing
table. We need the foreign key to link two tables together. We need the foreign key
constraint in order to identify the relationships between the database tables.

13. What is a database? Write 2 database software names.


Answer: A database is an organized collection of structured information, or data, typically
stored electronically in a computer system. Two database names are Microsoft Access and
Microsoft Excel.

.
14. What is Trojan horse?
Answer: A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate to the user but can take control of the user's computer. A Trojan is designed to damage,
disrupt, steal, or in general inflict some other harmful action on the user’s data or network.

15. What is data recovery?


Answer: Data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or
formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed
in a usual way. It is an activity of copying files or databases so that the data will be preserved in case of any
accidental or intentional deletion of the data.

16. What is a loop? Write 2 components of looping.


Answer: A loop or iteration is process of repetition which repeatedly executes a statement more than once
based on a certain condition.
1. Initialization: The values from where the loop starts.
2. Termination: The value at which the loop ends.

State the following statements are true or false:

13. Formatting is a process of changing text style, color and size. True
14. A column may contain 32767 characters. True
15. The most common way to get into a computer is through CD. False
16. Row is vertically arranged. False
17. Spreadsheet is used to keep records of score. True
18. There are 6 types of alignment. True
19. Malware is a type of virus. True

You might also like