0% found this document useful (0 votes)
83 views3 pages

8th Computer Sat - A

This document contains a term-1 exam for class 8th on the subject of computer. The exam contains multiple choice questions, fill in the blanks, matching questions and short answer questions to test students' knowledge of key computer concepts. Some of the topics covered include computer networks, security, Google apps, imaging tools and more. Students are asked to define terms like protocol, pixel, password and Google Drive. They also must explain concepts like Trojans, the blur tool, the paint bucket tool and topology. The exam aims to evaluate students' understanding of fundamental computer science topics.

Uploaded by

anuj32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views3 pages

8th Computer Sat - A

This document contains a term-1 exam for class 8th on the subject of computer. The exam contains multiple choice questions, fill in the blanks, matching questions and short answer questions to test students' knowledge of key computer concepts. Some of the topics covered include computer networks, security, Google apps, imaging tools and more. Students are asked to define terms like protocol, pixel, password and Google Drive. They also must explain concepts like Trojans, the blur tool, the paint bucket tool and topology. The exam aims to evaluate students' understanding of fundamental computer science topics.

Uploaded by

anuj32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

TERM-1 Exam (2022-2023)

Class - 8th
Subject - COMPUTER
Maximum Marks: 40

Note: General Instructions:


i. All questions are compulsory.
ii. Please read the question paper carefully.

A. Mark the statement true or false: (1 x 4 =4)

1. A server is also called host computer.


2. Transform tool can be found in the Edit menu on the Application Bar.
3. We can create custom shape design with the help of Ellipse tool.
4. Computer safety refers to the protection of computer-based resources against
unauthorized use.

B. Mark the correct option: (1 x 5 =5)

1. Which of the following is an antivirus?

a. Worm b. Norton c. Trojan d. Virus ( )

2. Which tool helps in putting textures as the background on canvas?

a. Pattern Stamp Tool b. Stamp Tool c. Sponge Tool d. Blur Tool ( )

3. A computer network that can be used only within an organization is called .

a. Internet b. Intranet c. Both a & b d. None of these ( )

4. Which command lets you add few cushion pixels at the border of objects in your photos?

a. Calculation b. Apply Images c. Trap d. Flow ( )

5. What is the use of Set Permission option in the Google sheet?

a. Protect Sheets b. Delete Sheets c. Withdraw d. all of these ( )


C. Fill in the blanks: (1 x 5 =5)

Hand tool, info, Application bar, Malware, saved

1. Changes made to the Google docs are automatically when working online.
2. Option bar is available below the .
3. The panel shows the numeric value of the color.
4. Malicious software is known as .
5. With the help of , we can even rotate the canvas.

D. Write the full forms: (1 x 4 =4)


1. NIC: ___________________________ 2. IVR:- ________________________________

3. GPS:- __________________________ 4. POP3:- _______________________________


E. Match the following: (1 x 4 =4)
Column A Column B
1. Malware that gains the administrator access to the a. IMAP
host system
2. Tool which selects area of similar color pixels around b. Rootkit
it with just one click
3. It is an e-mail protocol that stores the email c. Satellite
messages.
4. It’s a type of a Google Map. d. Magic Wand
1.( ) 2.( ) 3. ( ) 4.( ) 5.( )

F. Read and answer the following in one word. (1 x 4 =4)


1. Malicious program, that does not collect information from the computer,
waits for the hacker command is _____________
2. The image captured by biometric machine is transformed into a unique
face print using a technique is called __________________
3. To switch from polygon lasso to free hand selection, the short cut key is
4. It’s a free online word processing program similar to MS Word.

G. Explain any four terms: (1 x 4 =4)


1. Protocol _______________________________________________________________________
_______________________________________________________________________________
2. Pixel___________________________________________________________________________
________________________________________________________________________________
3. Password________________________________________________________________________
________________________________________________________________________________
4. Google Drive_____________________________________________________________________
________________________________________________________________________________
5. Rasterize________________________________________________________________________
________________________________________________________________________________

H. Answer any five questions. (2 x 5 =10)


1. What is Trojan?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. What is the use of blur tool?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3. Define Paint Bucket Tool.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4. What is topology ?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
5. What do you mean by Gmail ?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6. Define client and server.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

You might also like