0% found this document useful (0 votes)
19 views5 pages

Grade8 No1

The document is a revision worksheet for an 8th-grade Computer Science final examination, covering topics such as password security, encryption, and cyber threats. It includes multiple-choice questions, true/false statements, short answer questions, and fill-in-the-blank exercises. An answer key is provided for each section to facilitate self-assessment.

Uploaded by

eyadsat2012
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views5 pages

Grade8 No1

The document is a revision worksheet for an 8th-grade Computer Science final examination, covering topics such as password security, encryption, and cyber threats. It includes multiple-choice questions, true/false statements, short answer questions, and fill-in-the-blank exercises. An answer key is provided for each section to facilitate self-assessment.

Uploaded by

eyadsat2012
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Final Examination – Term 2 (2024-25)

Subject: Computer Science (Revision Worksheet1) grade:8


Section A: Multiple Choice Questions

1. Which of the following is NOT an example of good password security?


a) Using a password with a mix of letters, numbers, and symbols
b) Reusing the same password across multiple accounts
c) Changing passwords regularly
d) Using a password that is at least 8 characters long

2. What is the purpose of encryption?


a) To make a message or data readable by anyone
b) To protect data by converting it into a code
c) To send data faster
d) To destroy unwanted files

3. Which of the following is a common example of a security threat?


a) Firewall
b) Phishing
c) Backup
d) Password Manager

4. What does a firewall do?


a) Encrypts data before transmission
b) Monitors and controls incoming and outgoing network traffic
c) Detects and removes viruses
d) Blocks all external devices from connecting to a network

5. Which of these is a physical security measure for protecting a computer?


a) Installing antivirus software
b) Using a password manager
c) Locking the computer in a secure area
d) Using encryption on all files

Section B: True or False

Write True or False next to each statement:

1. Antivirus software can prevent all types of malware from infecting your computer.
2. Regular software updates help protect against security vulnerabilities.

3. Backing up your data is unnecessary if you have good antivirus protection.

4. Social engineering involves manipulating people into giving away sensitive


information.

5. A VPN (Virtual Private Network) is used to secure internet connections and protect
privacy.

Section C: Short Answer Questions

1. Explain the difference between a virus and a worm in terms of computer security.

2. What are two possible consequences of a data breach for a company?

3. Describe three common ways to protect your computer from cyber threats.
a) ___________________________________________________________
b) ___________________________________________________________
c) ___________________________________________________________

4. What is phishing, and how can you protect yourself from it?

Section D: Fill in the Blanks

1. __________ is the act of preventing unauthorized access to computer systems, networks,


and data.
2. A __________ is a type of malicious software designed to gain unauthorized access to or
cause damage to a computer system.

3. To protect against cyber attacks, it is important to use __________ such as passwords, PINs,
or biometric data to verify users' identities.

4. __________ attacks involve flooding a network with excessive traffic to overload the system
and make it unavailable to users.

5. A __________ is a software program designed to detect and remove viruses, malware, and
other security threats.

6. A __________ is a secure connection between a client and a server over the internet, often
indicated by "https://" in the web address.

7. __________ is the process of converting data into a format that cannot be easily understood
by unauthorized users.

8. __________ is a security measure where data is stored in such a way that it can be recovered
if lost, damaged, or stolen.

9. __________ is the practice of keeping software up to date with the latest patches and
updates to fix security vulnerabilities.

10. A __________ is a legal agreement that restricts how software can be used, distributed, or
copied.

11. A __________ is a malicious program that spreads itself by attaching to files or programs,
often causing harm to the system or stealing information.

12. __________ refers to unauthorized access to a network, typically by bypassing security


measures to exploit weaknesses in the system.

13. A __________ is a common type of cyber attack in which attackers use deceptive emails to
trick individuals into revealing sensitive information.

14. __________ is a process of verifying the identity of a user or device, often using usernames,
passwords, or security questions.

15. A __________ is a system used to monitor and control access to computer networks and
prevent unauthorized access.

Answer Key

Section A:

1. b) Reusing the same password across multiple accounts

2. b) To protect data by converting it into a code

3. b) Phishing
4. b) Monitors and controls incoming and outgoing network traffic

5. c) Locking the computer in a secure area

Section B:

1. False

2. True

3. False

4. True

5. True

Section C:

1. A virus needs a host program to spread, while a worm is a standalone program that can
spread by itself.

2. Reputation damage, loss of customer trust.

3. Install antivirus software, use strong passwords, enable firewalls.

4. Phishing is a method of tricking people into revealing sensitive information. To protect


yourself, avoid clicking on suspicious links and verify the sender's email address.

Section D:

1. Security

2. Virus

3. Authentication

4. Denial-of-Service (DoS)

5. Antivirus

6. SSL/TLS

7. Encryption

8. Backup

9. Patching

10. License

11. Worm

12. Hacking

13. Phishing
14. Authentication

15. Firewall

You might also like