COMP6
COMP6
COMP6
Class: VIII
Section – I [Marks:12]
Q-1: Choose the best answer. [ /3]
i. There is no end to this loop.
a. repeat b. forever c. repeat until
ii. Which crime is demanding money to prevent a threatened attack?
a. fraud b. cyber extortion c. cyber espionage
iii. Which of the following malware displays pop-ups to users?
a. Adware
b. Worm
c. Trojan
iv. Which part of the function prompts the user to make an input?
a. parameter
b. outcome
c. body
v. What is scratch?
a. Algorithmic language
b. Textual-programming language
c. Visual programming language
vi. If ________________ feature is enabled, an infected drive inserted into the computer
will automatically open.
a. auto-open b. auto-run c. auto-start
Q-2: Fill in the blanks. [ /3]
i. _________________ software is software that has unauthorizedly used software.
ii. ___________________ are small pieces of code.
iii. A ______________________ function is already specified in the programming
environment.
iv. _____________________ is the structure of a programming language’s statements.
v. _______________________________ are designed to prevent, detect, scan and
remove malware from computers.
vi. ________________ is a programming concept that allows you to replicate a sprite.
Q-4: Fill the table with the kinds of loop suitable for each state. [ /3]
State Loop
Section – II [Marks:18]