0% found this document useful (0 votes)
134 views3 pages

8th Term1 Worksheet

This document contains a term examination worksheet for Class 8 on computers. It includes questions to define common computer terms and their full forms. It also asks students to differentiate between viruses and worms, describe how to keep a computer physically fit, and define tools in Photoshop like the blur tool, rasterize, stamp tool, and paint bucket tool.

Uploaded by

anuj32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views3 pages

8th Term1 Worksheet

This document contains a term examination worksheet for Class 8 on computers. It includes questions to define common computer terms and their full forms. It also asks students to differentiate between viruses and worms, describe how to keep a computer physically fit, and define tools in Photoshop like the blur tool, rasterize, stamp tool, and paint bucket tool.

Uploaded by

anuj32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Term I Examination (2022-23) Class –8th COMPUTERS

Worksheet

A. Write the full forms:


1. ISP:- Internet Service Provider
2. NIC:- Network Interface Card

3. IVR:- Interactive Voice Response

4. URL:- Uniform Resource Locator

5. IP:- Internet Protocol

6. GPS:- Global Positioning System

7. SMTP:- Simple Mail Transfer Protocol

8. CC:- Creative Cloud

9. IMAP:- Internet Messaging Access Protocol


10. POP3:- Post Office Protocol

B. Answer the following questions:-


1. What is Pixel?
Ans:- Pixels are the short for Picture Element. The computer screen comprises of
tiny little dots.These tiny dots are known as pixels.

2. Differentiate between Virus and worm?


Ans:- Virus:- A computer virus is a ‘piece of code’ or program developed to corrupt
the data or program files stored on the computer system.
Worm:- A computer worm is a type of malware that has the capability to replicate
itself without any human interaction.

3. How will you keep your computer physically fit?


Ans:-
1. cleaning the keyboard
2. cleaning the mouse
3. cleaning the monitor
4. What do you mean by Google slides?
Ans:- Google Slides is an online version of Microsoft PowerPoint developed by
Google in 2006.

5. Define term
1. Blur tool:- Blur Tool makes the image hazy or softens the pixels of an image. It
helps to highlight the main object in the image.
2. Rasterize:- Rasterizing means the text will be converted into pixels, allowing
you to make image adjustments that normally do not work with text layer.
Rasterize is the process of converting a vector image to a raster image.
3. Stamp tool:- The Photoshop Clone Stamp tool copies one area of an image
onto another area of an image.
4. Protocol:- A protocol is a set of standard rules used for communication.

6. Define Paint Bucket tool.


Ans:- The Paint Bucket Tool in Photoshop fills adjacent pixels that are similar in
color in the image. It fills with either the selected foreground color or with a pattern.

7. Define Client and server.


Ans:- Client:- A client is a computer which depends on the server for all the
resources.
Server:- A server is also called as the host computer. A server controls the access to
the hardware and software on the network.

8. What is the use of ruler tool in Photoshop?


Ans:- A Ruler Tool is a handy tool that you can use to measure and draw outlines in
any direction.

9. What is the use of Antivirus program?


Ans:- An antivirus program is used to detect the presence of a virus on a computer
and remove the virus.

10. What is Gateway?


Ans:- A gateway is a network device that allows data to flow between two different
networks which may use different protocols.
C. Read and answer the following in one word.

1. In mesh topology every node is connected to each other node.


2. Malicious program, that does not collect information from the computer, waits for
the hacker command is Zombie
3. RedEye is a condition created by the flashlight from camera.
4. The image captured by biometric machine is transformed into a unique face print
using a technique is called elastic graph matching
5. To complete the selection , return to the spot where you began and release the
mouse button.
6. To switch from polygon lasso to free hand selection, the short cut key is Alt
7. Topology refers to the geometric arrangement of computers or nodes in a
network.
8. It’s a free online word processing program similar to MS Word Google docs.
9. In December 2019, Sundar Pichai became the CEO of Alphabet incorporation.
10. Changes made to the Google docs are Savedautomatically when working online.
11. Google Maps is a digital navigation program that provides detailed information
about the geographical regions of any particular area.
12. Option bar is available below the Application bar.
13. Rootkit is a malware that gains administrator access to the host system.
14. The Info panel shows the numeric value of the color.
15. Worms is a type of malware that has the capability ot replicate itself without any
human interaction.
16. Decryption is the process of converting data back into its original form.
17. Trap allows you to add few cushion pixels at the border of objects in your
photos.
18. Reveal all expands the canvas as large as necessary to reveal full image when an
image was moved beyond the canvas boundary.
19. Crop tool is used to trim an image and removed unwanted areas from the image.
20. Bluetooth is a technology that enables wireless communication between a low-
power consumption devices within a short range(1 meter, 10 meters, 100 meters).

You might also like