0% found this document useful (0 votes)
17 views2 pages

Computer Practice Revision Worksheet CHP 2 and 3

Computer

Uploaded by

k7435528
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

Computer Practice Revision Worksheet CHP 2 and 3

Computer

Uploaded by

k7435528
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Crescent Model Higher Secondary School

Practice Revision worksheet Chapter 2 and 3


Term-1 Grade VII (2024-25)

Name: ____________________ Section: __________________

Q: 1 Fill in the blanks:


1. A software that is installed on a computer to damage files or to steal personal information is
known as ________________.
2. Websites use _______________ to improve the customers’ experience of using the website and
webpages.
3. Posting embarrassing or hurtful photos of someone online is an example of cyberbullying
through ___________.
4. The ______________ is a piece of programming code that is unique to the malware.
5. Criminals and hackers use _________ errors to access computers.
6. When software is illegally copied or sold it is called ___________________.
7. ______________ let’s you use images without having to ask the owner for permission.
8. A credit includes _________________________________ and _______________________________.
9. The text that you use to give credit is called ______________________.
10. The first internet shop was called_____________.
11. Scratch was developed in_________.
12. An algorithm is a _____________ to solve a problem.
13. Programmers used programming language to write______________.
14. It is easy to make a working program by fitting _________ together.
15. In scratch, there is no need to convert between ______________.
16. Every program has a/an ________________.
17. Your program will start when the user clicks on the ___________.
18. The computer can only understand _______________.
19. The interpreter understands a language called________________.
20. Execute means carry out a_________________.

Q:2 Choose the correct option.


i) Sending messages that publicly exclude the target from social groups and events is the form
of _________.
a) Dissing b) Impersonation c) Harassment d) Exclusion
ii) Circulating untrue stories and opinions about a target is the form of ___________.
a) Dissing b) Impersonation c) Harassment d) Exclusion
iii) Companies use _______________ to protect logos, symbols, slogans and product names.
a) Copyright b) trademark c) patents d) registered designs.
iv) Inventors use _________________ to protect their new inventions.
a) Trademarks b) patents c) registered designs d) copyright.
v) Many content owners make their images available free of charge on the internet by using a
special license called ______________________.

Page | 1
a) Wikimedia commons. b) google c) creative commons d) Pinterest
vi) Operators are used to change __________________.
a) blocks b) direction c) command d) values
vii) Scratch provides ____________ ready made variables.
a) Three b) two c) four d) five
viii) Python is a _______________ based programming language.
a) Number b) text c) block d) code
ix) The interpreter understands a language called______________________.
a) Coding b) JavaScript c) machine code d) source code
x) The process of turning program into an executable file is called_______________________.
a) Machine code b) programming c) Interpreting d) compiling

Q:3 Match the Column.


Column A Column B Column C
a) Firewall 1) A piece of programming
code unique to malware
b) Signature 2) It is easy to make a working
program by fitting blocks
together.
c) Harassment 3) A set of commands that a
programmer writes in a
programming language.
d) Scratch 4) Acts like castle walls to stop
malware from entering
inside.
e) Source code 5) A bully sends threatening
message by text message or
instant messaging.

Q:4 TRUE/FALSE
1) Variable can store any value. _________
2) Java is one of the top five programming languages used in the world today. _________
3) Cookies are used to personalize the website. _________
4) Spyware encrypts all the data on a computer. _________
5) Copyright theft is a type of Malware. _________
6) A weak password that is 12 characters long can be cracked in less than 1 second. _______
7) Adware places unwanted adverts on a computer. _________
8) Python program take up a lot of space on screen. _________

Page | 2

You might also like