0% found this document useful (0 votes)
31 views8 pages

8th Grade Computer Notes Objectives

This document provides multiple choice questions (MCQs) for 8th class computer science objectives. It contains questions about computer networks, operating systems, hardware, software, programming concepts, and more. The questions cover topics like what a network is, devices used for data transmission, wireless communication technologies, computer security threats, data storage methods, spreadsheet functions, flowchart symbols, programming logic, and operators. The document is from www.easymcqs.com and provides practice questions to help students prepare for their exams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views8 pages

8th Grade Computer Notes Objectives

This document provides multiple choice questions (MCQs) for 8th class computer science objectives. It contains questions about computer networks, operating systems, hardware, software, programming concepts, and more. The questions cover topics like what a network is, devices used for data transmission, wireless communication technologies, computer security threats, data storage methods, spreadsheet functions, flowchart symbols, programming logic, and operators. The document is from www.easymcqs.com and provides practice questions to help students prepare for their exams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

All Federal Board Punjab Board Chapter Wise PDF Notes Free Download

Website: www.easymcqs.com , E-mail: [email protected]


TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================

MULTIPLE CHOICE QUESTIONS (MCQs)

1 What does two or more computers connected together is called?


a) GPS b) Model
c) Network (√) d) LAN
2 Which device is used to initiate the transmission of data?
a) Receiving Device b) Transmission Device
c) Sending Device (√) d) Communication Devi e
3 Which is the device used to send and receive information over
telephone lines.
a) WAN b) Modem (√)
c) Client d) Computer
4 The computer that uses the resources of server is called a
a) Switch b) WAN
c) Server d) Clie t (√)
5 How much areas does a WAN cover?
a) A City b) An organization
c) A Continent (√) d) A Room
6 Which is the cable that has an insu ated copper cable to carry high
frequency data signals?
a) STP b) Coaxial Cable (√)
c) UTP ) Fiber Optics
7 What material is fiber ptics c ble made of?
a) Glass Fibers b) Insulator
c) Copper Wires d) Glass Fibers (√)
8 Which technology is used for weather forecasting?
a) GPS b) Twisted Pair
c) Satellite Communication (√) d) Coaxial Cables
9 How many times in a day a GPS satellite moves around the earth?
a) Twice (√) b) Four times
c) Thrice d) Five times
10 Cellular communication is based on
a) Cables b) Cells (√)
c) Insulator d) Satellite
11 Which is the field of information technology which deals with data
protection?
a) Hacker b) Computer security (√)
c) Threats d) Virus
12 Which is a malicious program that infects computer program and make
changes to the computer program?
a) Virus (√) b) Worm
c) Hacker d) Adware
============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 1 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
13 Which type of threat may change the boot sector of the hard disk?
a) Worm b) Virus (√)
c) Adware d) Hacker
14 Which type of program is a pop-up add?
a) Virus b) Adware (√)
c) Worm d) Hacker
15 What is widely used for storing and transmitting information and data?
a) Flash drives (√) b) Email
c) Software d) Websites
16 Which type of threat copy itself many number of times to redu e the
disk space?
a) Virus b) Hacker
c) Worm (√) d) Adware
17 What is the place from where infected programs are downloaded?
a) Insecure websites (√) b) Secure websites
c) Email attachments d) All of them
18 By whom virus definition database is mai tai ed?
a) Virus definition dictionary b) Web ites
c) Antivirus companies (√) d) Em il attachments
19 Which anti-virus was developed in 1991 for protecting people from
viruses?
a) AVG (√) b) Norton
c) Symantec ) Mcafee
20 What must be installed on computer to scan for viruses?
a) Cookies b) Antivirus (√)
c) Flash drive d) Adware
21 What is the intersecti n f a row and column called?
a) Row b) Cell (√)
c) Address Bar d) Column
22 What is a file called which contain one or more worksheet?
a) Workb k (√) b) Program
c) Pages d) Software
23 What is the h rizontal space in Ms Excel called?
a) Cell b) Column
c) Row (√) d) File
24 Which function is used to multiply number or series of numbers?
a) SUM b) AVERAGE
c) PRODUCT (√) d) MIN
25 What is the result of =SQRT(169)?
a) 15 b) 13 (√)
c) 12 d) 9
26 What is the result of =POWER(2, 1)?
a) 256 b) 128 (√)
c) 126 d) 254

============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 2 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
27 What is the result of =MIN(1,0,2,3,5,9)?
a) 1 b) 2
c) 3 d) 0 (√)
28 What is the complete set of characters called?
a) Font (√) b) Font style
c) Shading d) Font size
29 What is the way to convert data into meaningful form using f r ulas?
a) Formatting Text b) Formula Insertion
c) Data manipulation (√) d) Formatting Text
30 Which is the chart that represents data in the form of olumns and bars?

a) Line Chart b) Pie Chart


c) Bar Chart d) Column Chart (√)
31 To solve a problem on computer the first step is he problem.
a) Define (√) b) Analyze
c) Process d) Flow Charti g
32 Which of the following is an input output ymbol
a) b)

c) d)
(√)
33 Which of the following is used as e ision symbol?
a) b)

c) d) (√)

34 A step by step logical diagram of a program is called ________.


a) Flowchart (√) b) Assignment
c) Algorithm d) Analyzing
35 is a informal step by step procedure to solve a problem
a) Flowchart b) Assignment
c) Algorithm (√) d) Analyzing
36 A process of making a flow chart is called .
a) Flo charting (√) b) Assignment
c) Algorithm d) Analyzing
37 ________ symbol is also called a Terminal Symbol.
a) b) (√)

c) d)

============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 3 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
38 ____________ symbol is used to show some working by a computer.
a) b)

(√)
c) d)

39 _____________ is a symbol used to show a connection point between


the two parts of a flow chart diagram.
a) b)

c) d) (√)

40 ________ shows flow of information form o e step to another in a flow


chart.
a) Terminal Symbol b) Deci ion Symbol
c) Flow lines (√) d) Proce sing Symbol
41 MOD operator gives in a calculation.
a) Remainder (√) b) Numerator
c) Quotient d) Denominator
42 Which of the following statement can be used for implementing
decisions?
a) IF-THEN-ELSE (√) b) FOR... NEXT
c) INPUT d) Assignment
43 Name the error that exists in C = 5 * + 6
a) Logical b) Execution
c) Syntax (√) d) Built in Error
44 How many programmi g languages are there?
a) Just one b) 500
c) 100 d) More then 1500 (√)
45 +,-, *, / are operators
a) Arithmetic (√) b) Assignment
c) Relational d) Logical
46 How many modes of operations there in BASICS?
a) Just one b) Three
c) T o (√) d) More than
47 New Command is used to clear the GWBASIC program from ____.
a) Screen b) Hard Disk
c) RAM (√) d) Floppy
48 CLS command is used to clear the GWBASIC program from _______.
a) Monitor (√) b) Hard Disk
c) RAM d) Floppy

============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 4 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
49 KILL command is used to delete
a) Statements b) Variables
c) Words d) Program Files (√)
50 DELETE command is used to delete __________
a) Statements (√) b) Variables
c) Words d) Program Files

FILL IN THE BLANKS

1 A _________ is a device which accepts data or information Re eiver


transmitted to the sender.
2 The _________ holds all the resources required by a S rv r
network
3 If _________ is down all clients are affected. Server
4 The network of computers confines in a buildi g is called LAN
_________.
5 _________ is a satellite based-navigation y tem. GPS
6 A _________ is a network that covers a city. MAN
7 NIC is a computer hardware used to connect computer to Network
a _________.
8 Twisted Pair Cables are Transmitted data
9 A Coaxial Cable is made of a wire. Conducting
10 _________ is a standard for short range wireless Bluetooth
interconnection of electronic devices.
11 Security means to prevent ccess to information and Unauthorized
valuable data by . access
12 Threats are possib e dangers that may exploit the Security
__________ of the system.
13 __________ refers to viruses, worms, or adware software. Threats
14 __________ is a malicious program that infects other Virus
programs.
15 __________ c llects information about a particular user or Hacker
organization with ut their knowledge.
16 Adware by itself is . Harmless
17 USB flash drives are widely used for and Storing,
________ information. Transmitting
18 An antivirus is software used to prevent, detect and Remove
___________ various threats
19 Norton is the brand of _____________. Symantec
20 Virus definitions typically refer to the database of all current Virus detection
virus signature files used by particular antivirus software for
___________.
21 A _________ is defined as a large sheet containing any Spreadsheet
information arranged in a matrix of rows and columns.

============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 5 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
22 A _________ represent data in the form of connected lines. MS Excel
23 An Excel file is termed as a _________. Workbook
24 The top most bar of MS Excel window is called the Title Bar
_________.
25 For calculations you will enter formula in the _________. Formula Bar
26 The _________ is defined as the horizontal space that is Row
going across the window.
27 The space where a specified row and column intersect is Cell
called _________.
28 The _________ function takes all of the values in each of SUM
the specified cells and totals their values.
29 The power function finds the of the giv n Exp riment
number.
30 _________ are pictorial representation of data. Charts
31 Any task that is given to be the computer for its s luti is Problem
called .
32 Problem solving on is no different than everyday Computer
problem solving.
33 A step by step procedure developed to olve a problem Algorithm
before the actual program, is called a .
34 Once the problem is defined and the st tement is made, Analyze
then you need to the problem.
35 The output is the result of Work done by the
computer
36 A _______ is a type f di gr m that represents an Flowchart
algorithm or process.
37 The _______ of an a g rithm or a process is called a Diagram
flowchart.
38 To begin a flowchart an oval shaped symbol is used with Start/stop
words of in it.
39 To represent the processing a is used in flowchart. Rectangle symbol
40 A ________ is used as connector to connect two parts of a Circle
flowchart to sh w the continuity.
41 A computer program is a sequence of written to Instructions
perform a specified task with a computer.
42 To rite a program a language is required, this particular Computer
language is called a ________ language
43 ________ is the language which computer can understand Machine language
but human cannot.
44 A ________ is a number or word that does not change its Constant
value.
45 If the grammar rules of the programming language are Syntax
violated then ________ error occurs.
46 An arithmetic expression is the combination of ________ Operands,
and ________ operators
============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 6 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
47 The equal sign "=" is called the ________ operator. Assignment
48 RUN command ________ the program. Runs or executes
49 ________ command in BASIC is used to display text on the Print
screen.
50 ________ implements decisions on the basis of a condition. IF THEN ELSE
statement

COLUMN MATCHING

UNIT # 1
LAN Computers Connect d in a building
GPS Aviation
Server Shares its res urc s
Fiber Optic Glass Fibers
Dial up Modem Analog & Digital Signals

UNIT # 2
AVG Gri oft
Virus De troy database on hard disk
Host Provide service to smaller program
Email Fi es tt ched
Virus Scan Compares with database

UNIT # 3
A2 Cell Address
Fill Handle Auto Filling Data
Function Average
Copy Cells Ctrl + C
Font Style Bold
Pie Chart Sectors

UNIT # 4
Flow Chart A logical diagram made using standard
symbols and shapes
Problem Statement Short and Clear description of problem
Analysis Detailed brain-storming in order to
understand the problem its requirements
Decision Symbol

Flow lines

Connector Symbol

============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 7 of 8)
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download
Website: www.easymcqs.com , E-mail: [email protected]
TH
COMPUTER SCIENCE FOR 8 CLASS (OBJECTIVES)
============================================================
Algorithm Informal step by step procedure to solve a
problem written in simple English
Input / output Symbol

Processing Symbol

Terminal Symbol

UNIT # 5
Command Direct Mode
EDIT To modify pr gram s a ements
Statement Indirect mode
Program written in user understandable Source Code
language
Program translated in machine Object Code
understanding language
Rules for naming variables N ming Conventions
Logical Error C used if problem is not understood
properly
Syntax Error Caused if language rules are violated
MOD Arithmetic Operator
<> Relational Operator

============================================================
Visit www.easymcqs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 8 of 8)

You might also like