Professional Documents
Culture Documents
Holiday Homework
Name: Sarah Eve Haque Roll: 1 Section: Jupiter ID: 1002180011 Date: 27/4/21
a. Malicious software
b. Malfunction Software
c. Both
d. None
a. Dangerous
b. Unwanted
c. Useful
d. Computer
a. Take control
b. Permanent damage
c. Corrupt
d. All
a. Visual
b. Virtual
c. Vital
d. None
a. Flowchart
b. Algorithm
c. Problem Solving
d. All of the above
a. Unknown data
b. Data or Information
c. Basic data
d. None
7. In database data is kept in an organized way so that we can easily__________.
a. Share
b. Manage
c. Update
d. All
a. Row
b. Table
c. Column
d. All
a. MS Access
b. MS Excel
c. MS SQL
d. C++
a. Damage data
b. Steal data
c. Corrupt data
d. None of the above
a. 3
b. 4
c. 5
d. 6
a. Hard Drive
b. Pen drive
c. SD Cards
d. All
13. Which one is a symptom of virus attack?
a. Updated antivirus
b. Don’t open unknown email
c. Updated OS
d. All of the above
a. Virus
b. Worm
c. Red Horse
d. All of the above
16. Sometimes ______ attempt to disable firewalls, antivirus software or other security elements?
a. Virus
b. Worms
c. Trojan Horse
d. None
17. _______ is a program or file that a user unknowingly allows into the system.
a. Worms
b. Trojan horse
c. Virus
d. Boot-Sector Virus
18. ________ is a program that is put into someone’s computer, to secretly gather information
about the user and spread it to others.
a. Virus
b. Spyware
c. Worms
d. Trojan Horse
a. Get information
b. Destroy
c. None
d. Both
20. The action which virus performs on the computer is called ________.
a. Virus infection
b. Malware
c. Virus Detection
d. Payload
a. Different
b. Same
c. Known
d. Unknown
a. Single
b. Double
c. Multiple
d. None
a. Sohel
b. Sohel Rana
c. Both
d. None
a. Number
b. Unique
c. Symbol
d. Double
a. Primary
b. Foreign
c. ID
d. None
a. Internet
b. Pen drive
c. Email
d. CD
a. Huge
b. Fast
c. Small
d. Dangerous
24. ________ is a program that is put into someone’s computer, to secretly gather information about
the user and spread it to others.
a. Virus
b. Spyware
c. Worms
d. Trojan Horse
1. In database data is kept in an organized way so that we can easily__________.
a. Control
b. Manage
c. Update
d. All
2. To organize data in database we use _______.
a. Row
b. Table
c. Column
d. All
3. We use database software to______?
a. Damage data
b. Steal data
c. Corrupt data
d. None
4. Collection of one or more worksheet is called__________.
a. Data Sheet
b. WorkBook
c. Spreadsheet
d. Book Sheet
5. Columns are labelled as______.
a. 1,2,3-----
b. A,B,C----
c. None
d. Both
6. We can align text in________.
a. Left
b. Right
c. Middle
d. All
7. ________ is used to keep text fit inside a cell.
a. Orientation
b. Wrap text
c. Indent
d. Border
8. How many types of alignments are there?
a. 5
b. 6
c. 7
d. 8
9. Multi-part and Hybrid virus are NOT same.
a. True
b. False
10. The second virus name was Creeper.
a. True
b. False
a. Keystroke Logger.
b. Key Logger.
c. Keystroke Log
d. None of the above
26. Common method for a worm to enter the computer is through _________.
a. Internet
b. Email
c. Software
d. None
a. Internet
b. Scanner
c. Backup
d. None
.
14. What is Trojan horse?
Answer: A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate to the user but can take control of the user's computer. A Trojan is designed to damage,
disrupt, steal, or in general inflict some other harmful action on the user’s data or network.
13. Formatting is a process of changing text style, color and size. True
14. A column may contain 32767 characters. True
15. The most common way to get into a computer is through CD. False
16. Row is vertically arranged. False
17. Spreadsheet is used to keep records of score. True
18. There are 6 types of alignment. True
19. Malware is a type of virus. True