0% found this document useful (0 votes)
41 views2 pages

CS 7 Mid G81

The document appears to be a midterm exam for a 7th grade computer class, consisting of multiple choice and subjective questions testing students' knowledge of computer hardware, software, applications, algorithms, problem solving techniques, and ethical issues related to technology use. The multiple choice section covers topics like computer components, file types, software functions, and basic computer operations. The subjective questions require longer written responses about topics such as the differences between hardware, algorithms, and problem solving approaches.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views2 pages

CS 7 Mid G81

The document appears to be a midterm exam for a 7th grade computer class, consisting of multiple choice and subjective questions testing students' knowledge of computer hardware, software, applications, algorithms, problem solving techniques, and ethical issues related to technology use. The multiple choice section covers topics like computer components, file types, software functions, and basic computer operations. The subjective questions require longer written responses about topics such as the differences between hardware, algorithms, and problem solving approaches.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Name.____________________ Roll No. ____________ Class.

___________ Section ________


SHAMOWAIL SHAHEED MODEL SCHOOL FOR BOYS, G-8/1, ISLAMABAD
Paper: Computer MIDTERM EXAMINATION 2023 Class:7th
Marks: 20 (OBJECTIVE) Time: 20 Min
SECTION-A
Q.1 a. Encircle the correct answer of the following. 20
i. The first step of problem analysis is___________________.
a) Problem decomposition b) Problem identification
c) Problem solution d) Problem design
ii. Identify the correct order of memory units:
a) TB > MB > GB > KB b) MB > GB > TB > KB
c) TB > GB > MB > KB d) GB > MB > KB > TB
iii. Which of the following is permanent memory?
a) ROM b) Register c) RAM d) Cache memory
iv. An algorithm takes ______________ and returns ______________.
a) Input, Output b) Problem, Solution
c) Solution, Problem d) Parameters, Sequence of action #
v. A computer that accesses the shared resources of a server is called:
a) Personal Computer b) Server c) Client d) Remote Computer
vi. The device used to obtain text, images and Graphics on paper is:
a) Monitor b) Printer c) Scanner d) Keyboard
vii. Which device is used to input audio into the computer?
a) Mouse b) Webcam c) Microphone d) Scanner
viii. The Ribbon is the work bar located at _________________.
a) Right of the Document b) Left of the Document
c) Bottom of the Document d) Top of the Document
ix. The process of removing unwanted part of an image is called:
a) Hiding b) Bordering c) Cropping d) Cutting
x. During a slide show pressing the Esc key:
a) Display the last Slide b) Displays the first Slide
c) Ends the Slide Show d) Displays the previous Slide
xi. Microsoft PowerPoint is best described as:
a) Presentation software b) Database software
c) Drawing software d) Desktop publishing software
xii. On a single slide, you can have:
a) Single video file b) Two video files c) Three video files d) Many video files
xiii. The user name of electronic mail accounts are:
a) Not case sensitive b) Always unique for each user
c) Space is not allowed d) Numeric
xiv. What should be written in the problem definition?
a) Solution b) Situation c) Need d) Behavior
xv. The computer program interacts with user via:
a) Input b) Output c) Process d) Software
xvi. Program is written at:
a) Design Time b) Planning Time c) Implementation Time d) Analysis Time
xvii. If you regularly backup your data, this is a ___ against the threat of data loss:
a) Firewall b) Class c) Security d) Countermeasure
xviii. Which symbol is used for making decision?
a) Oval b) Parallelogram c) Rectangle d) Diamond
xix. The set of moral principles for responsible use of Internet, computer and ICT devices are:
a) Computer Education b) Computer Ethics c) Online safety d) Internet surfing
xx. Which of the following crime is related to stealing personal information?
a) Cyberbullying b) Digital Piracy c) Identity Theft d) Plagiarism
SHAMOWAIL SHAHEED MODEL SCHOOL FOR BOYS, G-8/1, ISLAMABAD
Paper: Computer MID TERM EXAMINATION 2023 Class:7th
Marks: 80 (SUBJECTIVE) Time: 2:40Hrs.

SECTION-B (40 Marks)


Q. 2 Attempt any (10) questions from Section B. 10 × 4 = 40

i. Differentiate between Server computer and Client computer.


ii. State the use of any two ports that are used to connect external devices.
iii. List any 04 task that can be performed by robots.
iv. Define the following options used in composing email.
a. CC b. BCC
v. Differentiate between the terms ‘Slide’ and ‘Slide Show’.
vi. Write down the purpose of multimedia presentation?
vii. Differentiate between flowchart and an algorithm?
viii. Why do we need to understand the problem area?
ix. Write down the six step involved for problem solving?
x. How is information stored on computer?
xi. What is the difference in visual outcome of Move and Glide command?
xii. Differentiate between repeat and forever control command?
xiii. What is intellectual property right?
xiv. Define cybercrime? Name two online cybercrime?

SECTION-C (40 Marks)


Note: Attempt any (04) questions from Section C 10 x 4 = 40

Q.3 (a) Differentiate between RAM and ROM. (05)


(b) Draw the block diagram of computer. (05)
Q.4 (a) List three ways to view screen in MS Word. (06)
(b) Write down the purpose of Inbox, Sent, Trash, and Spam? (04)
Q.5 (a) Write down the algorithm for adding two numbers? (05)
(b) Write down the flow chart for finding division of two numbers? (05)
Q.6 (a) Convert the following decimal numbers to binary numbers? (05)
(i) (59)10 (ii) (204)10
(b) Convert the following binary numbers to decimal numbers? (05)
(i) (10011)2 (ii) (1010)2
Q.7 (a) Write any two positive and two negative impact of social media? (04)
(b) What is privacy? How can you protect yourself from online theft of your personal
information? (06)
Q.8 (a) Write any five constitutes ethical issues in digital environment? (05)
(b) Write shortcut keys of following? (05)
(i) Cut (ii) Redo (iii) Print (iv) Paste (v) Save

You might also like