More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
8th Computer Science Chapter 7 Test MCQs With Answers
Question # 1
The----- provides you the sebrvices of online shopping, education and etc.
Choose an answer
Network
Internet
Both a and b
None of these
Previous
Skip
Next
Question # 2
The best defence against............ assaults is human intellect and comprehension.
Choose an answer
Phishing
Spamming
Hacking
Social engineering
Previous
Skip
Next
Question # 3
The internet is also called the network of
Choose an answer
Computers
Network
Mobiles
Tablets
Previous
Skip
Next
Question # 4
------- is a technique used by cyber criminals to gain the information from the dividuals.
Choose an answer
Cracking
Bullying
Social Engineering
Spamming
Previous
Skip
Next
Question # 5
------------- are virtual diaries created by people for share their hobbies, thoughts with like minded people.
Choose an answer
Internet
Meta
Spam
Blogs
Previous
Skip
Next
Question # 6
Why do hackers break into the other's comptuer system.
Choose an answer
To steal importnat data
To destroy the system
Both a and b
None of these
Previous
Skip
Next
Question # 7
The Website or programs known as..... is where users can share their content.
Choose an answer
Internet
Social Media
Meta
e- learning
Previous
Skip
Next
Question # 8
It refers to the spoolingof bulk mail by an unidentified source.
Choose an answer
Spamming
Phishing
Hacking
Cyber Troll
Previous
Skip
Next
Question # 9
The technique used by cybercriminals to attain information from individuals is called.
Choose an answer
Cyber bullying
Cyber troll
Social Engineering
All of these
Previous
Skip
Next
Question # 10
Styding from home through the internet is called.
Choose an answer
I- Learning
e- learning
c- learning
All of these
Previous
Skip
Next
Question # 11
At its ismplest, ......... is a sysgtem of moral principles.
Choose an answer
Ethics
Digital Environment
E-mail spoofing
None of these
Previous
Skip
Next
Back