Ev - SSC Ict CH 2
Ev - SSC Ict CH 2
Ev - SSC Ict CH 2
CHAPTER 2
18. What does delete mean? (knowledge)
b) deletion
19. Fred B. Cohen was a student at which university?
C) University of New Haven
20. In what year was the virus named? (knowledge)
b) In 1983
* What can be done to keep ICT equipment fully functional?
21. Which captures or damages important computer data?
– Maintenance
(knowledge)
* No need to specialize in any type of maintenance? –
A) Viruses
Software based maintenance
22. What is Computer Antivirus? (knowledge)
* Which operating system is used in most computers in the
c) Antiviral
world? – Windows
23. What is Trojan Horse? (knowledge)
* Which always needs to be updated or updated? -
b) Viruses
Operating system
24 Which of the following carries the virus? (knowledge)
* Do you need to update automatically? – Internet
D) RAM
connection
25. Which of the following is the medium of virus infection?
* What to use to keep the computer active or dynamic? –
(knowledge)
Registry Clipup Software
d) Internet
* Every time you use a computer, what type of file is
26. Which website to download Avast Antivirus?
created? – Temporary files
c) www.avast.com
* Which type of file occupies a lot of computer space? -
27. Which is the website to download Avira Antivirus?
Temporary files
c) www.avira.com
* What types of files can slow down a computer? -
28. Which is the AVG antivirus download website?
Temporary files
a) www.avg.com
1. Which can be downloaded from the Internet for free?
password
D) Antivirus
________________________________________
2. How to download free antivirus software? (knowledge)
29. What kind of password is abcdef? (knowledge)
c) Internet
c) Weak passwords
3. Using a computer without which is extremely dangerous?
30. 654321 What kind of password? (knowledge)
(knowledge)
b) Weak passwords
b) Updated Antivirus
31. Tumi_1988 What kind of password in YahooG?
4. What should antivirus do regularly? (knowledge)
(knowledge)
b) Updating
a) Basic password
5. What is antivirus? (knowledge)
32. Which passwords can easily be hacked by hackers?
a) Software
(knowledge)
6. Different types of anti-virus software are-
d) Weak passwords
i) Antivirus
33. Because of which password can create an opportunity to
ii) Antimalware
destroy the information stored on your computer?
iii) Antispyware
(knowledge)
Read the passage below and answer questions 7 and 8.
d) Simple password
Labani madam's computer reboots repeatedly because it is
34. What kind of passwords are numbers, symbols and
not maintained properly. His girlfriend Sumaiya advised him
words used? (knowledge)
to use anti-virus software.
a) Basic password
7. What is the reason for Labani madam's computer
35. What are the big passwords called? (knowledge)
problem?
b) Basic password
A) Viruses
36. Which of the following will protect the privacy of
8. Software recommended by Sumaiya is – (Higher)
information stored in a computer? (knowledge)
i) Antivirus
c) Changing passwords regularly
ii) Antimalware
37. Which of the following will destroy the privacy of
iii) Antispyware
information stored on a computer? (knowledge)
9. Cache memory of different browsers is stored in memory-
d) Use of short passwords
(Understanding)
38. Which of the following will destroy the privacy of
i) Cookies
information stored on a computer? (knowledge)
ii) Temporary file
d) Using own name in short password
Software installation and uninstallation
39. Which of the following will protect the privacy of
________________________________________
information stored in a computer? (knowledge)
10. How are ICT devices managed? (knowledge)
c) Unique password
b) Software
40. Why are passwords used? (knowledge)
11. Which software is quite complicated to install?
a) For security of personal information
(knowledge)
Staying safe on the web
a) System software
________________________________________
12. Which software requires special skills to install?
41. Which of the following is an e-mail service provider?
(knowledge)
(knowledge)
c) System software
b) hotmail
13. Which software requires special skills to install?
42. Which of the following is an e-mail service provider?
(knowledge)
(knowledge)
d) Operating system
c) gmail
14. What is required to install system software?
43. What is hotmail? (knowledge)
a) Special skills
c) Websites providing e-mail services
15. What aspects need to be noted before installing any
44. What is yahoo? (knowledge)
software?
b) Websites providing e-mail services
b) Whether the hardware supports the software
45. What are the special symbols used in passwords?
16. What aspects need to be noted before installing any
(knowledge)
software?
d) !, @, #
c) Whether antivirus software is turned off
46. Why should users change passwords regularly?
Computer virus and antivirus
(knowledge)
________________________________________
c) For account security
17. Software is available from which of the following?
(knowledge)
1
47. Why should users refrain from using simple passwords? b) The website is heavily used
(knowledge) 70 Which website is considered successful? (knowledge)
d) For account security c) Which website is used more
48. Why is 2-step verification used in any password? 71. Where do people awaken their latent desires?
(knowledge) (knowledge)
b) For password security c) On social networking sites
49. What should a user do to stay safe on social networking 72. Where do people compete to make themselves popular?
sites? (knowledge) (knowledge)
b) Not publishing personal photos a) On social networking sites
50 What a user can do to stay safe on social networking 73. What should students do with their social media
sites accounts during exams? (knowledge)
c) Logging out after using e-mail c) Deactivate
51. What should a user do to stay safe on social networking 74. Which one can be used to make a copy of something
sites? (knowledge) very easily? (knowledge)
d) Not browsing age appropriate sites b) computer
52. Security of personal account while using internet is 75. Because of which copy or creation does not have legal
required- (Understanding) basis?
i) Using strong passwords c) Copyright law
ii) Changing passwords regularly
53. Security of Personal Accounts on Social Networking Sites 76. What is the full name of BSA? (knowledge)
Needs- (Understanding) D) Business Software Alliance
i) Using strong passwords 77. According to BSA's report of how many years, 7 out of
iii) Not publishing personal photos 10 people are free from piracy? (knowledge)
54. Reasons for Insecurity of Personal Account on Social b) 2011
Networking Sites – (Understanding) 78. Which of the following is banned in Bangladesh?
(knowledge)
i) Using weak passwords b) Software piracy
ii) Make everyone a friend 79. Which of the following gives copyright over creation?
iii) Posting private photos (knowledge)
addiction c) Copyright law
________________________________________ 80. Which of the following prevents creative workers from
55. What do people call social networking sites to awaken being discouraged? (knowledge)
their own latent desires? (knowledge) c) Copyright law
b) Narcissism Information Rights and Security
56. What is it called to exceed the level of a person's work? ________________________________________
(knowledge) 81. People's thoughts, conscience, etc. What kind of rights?
C) Addiction (knowledge)
57. Which of the following websites can be addictive? a) Fundamental Rights
(knowledge) 82. What kind of right is the freedom of speech of the
c) www.facebook.com people? (knowledge)
Read the following passage and answer questions 58 and d) Fundamental Rights
59. 83. What is the function of Right to Information Act?
Salman uses most social media sites in office. The office (knowledge)
manager banned Salman Sahib from using social sites for b) Protect information rights
speed of work. 84. Which of the following ensures the public's right to
58. Reasons why Salman banned Uddhip from using the site information? (knowledge)
in question at office- (Insight) b) Reservation of information rights
i) Loss of working time 85. Which Act was introduced in 2009 for information to the
ii) Work environment deteriorates public? (knowledge)
iii) Work speed decreases c) Right to Information Act
59. What is the name of the website used by Salman? 86. How many sections of the Right to Information Act
b) www.facebook.com exempt 20 subjects?
Addiction to computer games and social networks c) Seventh clause
________________________________________ 87. What laws protect the right not to disclose personal
60. Which of the following can lead to user addiction? information? (knowledge)
d) Internet d) Right to Information Act
61. Everyone from children to adults can be addicted to 88. What laws protect technical or scientific research data?
which? (knowledge) (knowledge)
b) Computer games b) Right to Information Act
62. What appears in the brain of a person strongly addicted 89. In what year was the information security law
to computer games? (knowledge) introduced in Bangladesh?
c) Special chemicals c) 2010
63. What is the appearance of special chemicals in the 90. What is the name of the right to information law in
human brain? (knowledge) Bangladesh? (knowledge)
d) Computer games a) Right to Information Act 2009
64. What is a computer game? (knowledge) 91. In the seventh section of the Right to Information Act,
b) An entertainment how many subjects have been exempted from the scope of
65. Which of the following is a social networking site? the law? (knowledge)
(knowledge) c) 20 t
b) Google Plus 92. What laws protect information related to intellectual
66. Which of the following is a social networking site? property rights? (knowledge)
(knowledge) c) Right to Information Act 2009
A) Twitter 93. Which law stores information regarding interest rate
67. What is Instagram? (knowledge) changes? (knowledge)
c) Social networking sites d) Right to Information Act 2009
68. Why does a person or group use Internet to establish a 94. What laws protect confidential information received
doctrine? (knowledge) from foreign governments?
c) Social networking sites d) Right to Information Act 2009
69. What makes a website earn more money?
2
95. Which law preserves advance information regarding
exam papers? (knowledge)
c) Right to Information Act 2009
96. One of the fundamental rights of citizens in the
constitution is-
i) Freedom of speech
iii) Right to Information
97. If right to information is asserted- (Understanding)
ii) Transparency of private sector will increase
iii) Good governance of non-governmental organizations will
increase
98. The purpose of the Right to Information Act is to-
(Understand)
i) Free flow of information
ii) Ensuring public's right to information
99. What is the full form of RAM? (knowledge)
C) Random Access Memory
100 What is the full form of CPU? (knowledge)
D) Central Processing Unit
101. What is the full form of IC? (knowledge)
b) Integrated Circuit
102. What is the full form of CMOS? (knowledge)
b) Complementary Metal-Oxide Semiconductor