Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
COMPUTER
CLASS- VII
TIME: 1.5 Hrs Full Marks: 50
Name................................................................... Roll No. ...........................
I. Multiple choice question: (5 MARKS)
1. B represent........................... Number in Hexadecimal a) 10 b) 14 c) 11 2. It is a platform to store your document/files on the internet a) Cloud Computing b) File sharing c) E-Chat 3. .............................. is a virus that changes its form when attacking on afile or program a) Multi partite Virus b) Polymorphic Virus c) Macro Virus 4. ................... is used to summarise & analyze the data in a spreadsheet a) Data Validation b) Form c) Pivot Table 5. ............... Tag is used to move the text to the next line a) <h1> b) <hr> c) <br> 6. (x,y) coordinates in draw ellipse specifies the point of the ellipse a) Starting b) Middle c) Ending 7. In which topology all the computers are connected to a device called HUB a) Bus b) Ring c) Star 8. ........................type of chart is also called XY chart a) Scatter Chart b) Bubble chart c) Doughnut Chart 9. In.......................... style sheet you can define the style sheet rules with the HTML tags using STYLE attributes a) External b) Internal c) Inline 10. Which of the following is the function of operating system a) File Management b) Security c) Device management
II. Fill in the blanks: (5 MARKS)
1. .........................types of interface allows user to interact with computer images 2. The................................... is the central node & all other nodes are connected to the central node 3. The encrypted text is called as........................... 4. The default colour of the border is........................ 5. At the top left corner, the X & Y coordinates are......................... 6. C represents ............................ number in Hexadecimal 7. The Binary Subtraction of 1-0 is........................... 8. ............................. is the crime of creating false documents of an individual 9. ......................... option is used to retrieve only those records which satisfy the given criteria 10. To open a goal seek option, go to ............................ > what if analysis > goal seek III. True and False (5 MARKS) 1. Bar chart is displayed in the form of vertical charts 2. 20 is equal to 0 3. The base value of octal number system is 9 4. The loop counter variable controls how many times the loop runs 5. The text property is used to format the text of the web document 6. Do not share the password of the document with anyone 7. Real time operating system is a single tasking OS 8. DOS is an example of the single OS 9. Defamation is an act to get more appreciation in the society 10. Declaration part is enclosed in curly brackets {}
IV. Short answer question: (10 MARKS)
1. Write syntax of DRAW ELLIPSE( ): 2. What do you mean by Iteration Statements? 3. Mention the names of different browsers that help to access the internet 4. Define Protocol? 5. Name Various types of Number System
V. Let’s Test your Skills: (10 MARKS)
1. Match the following
a. Copy the data Ctrl+ P
b. Business All Purpose Symbolic Programming Instruction c. Paste the data Ctrl + X d. Integrated Development Environment BASIC e. Cut the data Ctrl+ C f. Sub Routine is a set of Looping Statement g. Print the data Ctrl + V h. Iteration statement Programming Instruction
3. Write the category (PEOPLE, PROPERTY, SOCIETY) against which these crimes are done
1. Write a program to create a circle in ellipse 2. What do you mean by sub routine? Give Syntax & Example? 3. What is the purpose of Social Networking sites? Explain any one social networking site? 4. What are the basic functions of an Antivirus Program? 5. Enlist the various types of Operating System?
(Ebook) Quantum Software Engineering by Manuel A. Serrano, Ricardo Pérez-Castillo, Mario Piattini ISBN 9783031053238, 3031053230 - Discover the ebook with all chapters in just a few seconds