0% found this document useful (0 votes)
114 views17 pages

Class 7 Chapter 2,3,4 Computer Mcqs

Uploaded by

malikathia0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views17 pages

Class 7 Chapter 2,3,4 Computer Mcqs

Uploaded by

malikathia0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Class 7 Computer Mcqs

Chapter: 02

1. What are cookies in the context of the internet?


- A) Snacks
- B) Small data files
- C) Computer games
Answer: B) Small data files

2. What do cookies store?


- A) Your name
- B) Browsing information
- C) Your phone number
Answer: B) Browsing information

3. Why do websites use cookies?


- A) To slow down your internet
- B) To remember your preferences
- C) To play music
Answer: B) To remember your preferences

4. What can you do if you don’t want a website to store cookies?


- A) Clear your cookies
- B) Turn off your computer
- C) Change your wallpaper
Answer: A) Clear your cookies

5. What happens if you block cookies in your browser?


- A) Websites may not work properly
- B) Your internet speed increases
- C) Your computer shuts down
Answer: A) Websites may not work properly

6. Are cookies always harmful?


- A) Yes
- B) No
- C) Only on weekends
Answer: B) No

7. What is a common use of cookies?


- A) Tracking website visits
- B) Sending emails
- C) Making phone calls
Answer: A) Tracking website visits

8. How can you manage cookies in your browser?


- A) Through browser settings
- B) By turning off Wi-Fi
- C) By changing your password
Answer: A) Through browser settings

9. What type of cookies remembers your login details?


- A) Session cookies
- B) Persistent cookies
- C) Chocolate cookies
Answer: B) Persistent cookies

10. Which cookies are deleted when you close your browser?
- A) Session cookies
- B) Persistent cookies
- C) Expensive cookies
Answer: A) Session cookies

MCQs on Cybercrime and Its Methods:


1. What is cybercrime?
o A) Crime using computers or the internet
o B) Watching movies online
o C) Playing video games
o Answer: A) Crime using computers or the internet
2. Which cybercrime involves stealing personal information?
o A) Phishing
o B) Blogging
o C) Browsing
o Answer: A) Phishing
3. What is hacking?
o A) Writing code
o B) Unauthorized access to computer systems
o C) Creating websites
o Answer: B) Unauthorized access to computer systems
4. What does a DDoS attack do?
o A) Boosts your Wi-Fi signal
o B) Overloads a website with traffic to make it unavailable
o C) Sends emails
o Answer: B) Overloads a website with traffic to make it unavailable
5. Which of these is an example of identity theft?
o A) Playing online games
o B) Using someone else's personal information without permission
o C) Sending birthday cards
o Answer: B) Using someone else's personal information without
permission
6. What is the purpose of ransomware in cybercrime?
o A) To encrypt files and demand payment
o B) To increase computer speed
o C) To make backups of files
o Answer: A) To encrypt files and demand payment
7. What is social engineering in the context of cybercrime?
o A) Building social networks
o B) Tricking people into giving up confidential information
o C) Writing software
o Answer: B) Tricking people into giving up confidential information
8. Which type of cybercrime involves altering digital information?
o A) Phishing
o B) Data tampering
o C) Streaming
o Answer: B) Data tampering
9. What does the term "cyberstalking" refer to?
o A) Following someone on social media
o B) Repeatedly harassing someone online
o C) Reading news online
o Answer: B) Repeatedly harassing someone online
10.What is the goal of a phishing attack?
o A) To steal sensitive information
o B) To teach coding
o C) To improve search engine results
o Answer: A) To steal sensitive information
MCQs on Cybercrime and Its Methods and Ransomware
1. What is cybercrime?
o A) Crime using computers or the internet
o B) Watching movies online
o C) Playing video games
o Answer: A) Crime using computers or the internet
2. Which cybercrime involves stealing personal information?
o A) Phishing
o B) Blogging
o C) Browsing
o Answer: A) Phishing
3. What is hacking?
o A) Writing code
o B) Unauthorized access to computer systems
o C) Creating websites
o Answer: B) Unauthorized access to computer systems
4. What does a DDoS attack do?
o A) Boosts your Wi-Fi signal
o B) Overloads a website with traffic to make it unavailable
o C) Sends emails
o Answer: B) Overloads a website with traffic to make it unavailable
5. Which of these is an example of identity theft?
o A) Playing online games
o B) Using someone else's personal information without permission
o C) Sending birthday cards
o Answer: B) Using someone else's personal information without
permission
6. What is the purpose of ransomware in cybercrime?
o A) To encrypt files and demand payment
o B) To increase computer speed
o C) To make backups of files
o Answer: A) To encrypt files and demand payment
7. What is social engineering in the context of cybercrime?
o A) Building social networks
o B) Tricking people into giving up confidential information
o C) Writing software
o Answer: B) Tricking people into giving up confidential information
8. Which type of cybercrime involves altering digital information?
o A) Phishing
o B) Data tampering
o C) Streaming
o Answer: B) Data tampering
9. What does the term "cyberstalking" refer to?
o A) Following someone on social media
o B) Repeatedly harassing someone online
o C) Reading news online
o Answer: B) Repeatedly harassing someone online
10.What is the goal of a phishing attack?
o A) To steal sensitive information
o B) To teach coding
o C) To improve search engine results
o Answer: A) To steal sensitive information

Here are simplified and short multiple-choice questions (MCQs) on the topic of
antivirus and antivirus software:
1. What is the main purpose of antivirus software?
- A) To play music
- B) To protect your computer from malware
- C) To speed up your internet
Answer: B) To protect your computer from malware

2. How does antivirus software detect threats?


- A) By scanning files and programs
- B) By reading emails
- C) By playing videos
Answer: A) By scanning files and programs

3. What should you do if your antivirus software detects a virus?


- A) Ignore it
- B) Quarantine or remove the virus
- C) Restart your computer
Answer: B) Quarantine or remove the virus

4. What does it mean to update your antivirus software?


- A) Changing the color of the software
- B) Getting the latest virus definitions
- C) Uninstalling the software
Answer: B) Getting the latest virus definitions
5. Which of these is a common feature of antivirus software?
- A) Email monitoring
- B) Real-time protection
- C) Video editing
Answer: B) Real-time protection

6. Why is it important to keep your antivirus software updated?


- A) To improve your computer's speed
- B) To protect against new threats
- C) To save space
Answer: B) To protect against new threats

7. What happens if antivirus software finds a suspicious file?


- A) The file is ignored
- B) The file is quarantined or deleted
- C) The file is shared on social media
Answer: B) The file is quarantined or deleted

8. Can antivirus software protect against all types of threats?


- A) Yes, 100%
- B) No, but it protects against most common threats
- C) Only on weekends
Answer: B) No, but it protects against most common threats
9. What is a virus definition in antivirus software?
- A) A list of known viruses
- B) A type of email
- C) A video tutorial
Answer: A) A list of known viruses

10. What does "real-time protection" mean in antivirus software?


- A) Watching videos live
- B) Scanning files as they are accessed
- C) Playing games in real-time
Answer: B) Scanning files as they are accessed

MCQs on Cybercrime and Its Methods:

1). What is cyberbullying?


 A) Playing online games
 B) Harassing someone online
 C) Sending emails to friends
 Answer: B) Harassing someone online
2). Where can cyberbullying happen?
 A) On social media
 B) Only in person
 C) At the park
 Answer: A) On social media
3). What is a common form of cyberbullying?
 A) Posting hurtful comments
 B) Sending birthday wishes
 C) Sharing funny videos
 Answer: A) Posting hurtful comments
4). How can you respond to cyberbullying?
 A) Ignore it and keep quiet
 B) Block the person and report the behavior
 C) Join in the bullying
 Answer: B) Block the person and report the behavior

5). Who can be a victim of cyberbullying?


 A) Only adults
 B) Anyone, including kids and teens
 C) Only celebrities
 Answer: B) Anyone, including kids and teens

6). What should you do if you see someone being cyberbullied?


 A) Stay silent
 B) Report it to a trusted adult or authority
 C) Encourage the bully
 Answer: B) Report it to a trusted adult or authority
7). Can cyberbullying have serious effects?
 A) No, it's just a joke
 B) Yes, it can harm someone's mental health
 C) Only if it's on TV
 Answer: B) Yes, it can harm someone's mental health
8). Is it okay to share embarrassing pictures of someone online without their
permission?
 A) Yes, if it's funny
 B) No, that's a form of cyberbullying
 C) Only if they're a friend
 Answer: B) No, that's a form of cyberbullying
9). What is the best way to prevent cyberbullying?
 A) Avoid using the internet
 B) Be kind and respectful online
 C) Ignore all messages
 Answer: B) Be kind and respectful online
10). What should you do if you are being cyberbullied?
 A) Keep it a secret
 B) Tell a trusted adult and save the evidence
 C) Bully them back
 Answer: B) Tell a trusted adult and save the evidence
Chapter: 03

1. Which of the following is an arithmetic operator in most programming


languages?
a) &&
b) ==
c) +
d) !=
2. What is the result of the expression `7 % 3`?
a) 1
b) 2
c) 3
d) 4
3. An algorithm is best described as a:
a) Data type
b) Step-by-step procedure
c) Programming language
d) Software tool
4. Which of the following is NOT a basic arithmetic operation?
a) Addition
b) Subtraction
c) Concatenation
d) Division
5. In an algorithm, what does the division operator `/` typically do?
a) Adds two numbers
b) Multiplies two numbers
c) Divides one number by another
d) Compares two numbers
6). In Scratch, which block is used to start running a script?
a) Repeat block
b) Green flag block
c) Broadcast block
d) Wait block
7). Which type of block in Scratch is used to make decisions within a program?
a) Motion block
b) Control block
c) Sensing block
d) Operators block
8). Which symbol is used to start a comment in Python?
a) @
b) #
c) $
d) &
9). Which function is used to display text or output in Python?
a) input()
b) print()
c) display()
d) show()
10). What is the correct file extension for Python files?
a) .txt
b) .py
c) .html
d) .java
11). What does IDE stand for in programming?
a) Integrated Design Environment
b) Internet Development Engine
c) Integrated Development Environment
d) Interactive Debugging Editor
12). Which of the following is a common data type used to represent whole
numbers in Python?
a) float
b) string
c) int
d) list
13). What data type is used to represent text in Python?
a) int
b) bool
c) string
d) float
14). Which of the following data types would be used to store a value that can
be either ‘True’ or ‘False’?
a) string
b) list
c) bool
d) float
15). A set of commands that a programmer writes in a programming language is
called ___________.
a). Machine code
b). Source code
c). binary code
d). none of these
16). What is machine code?
a) A high-level programming language
b) A set of instructions directly understood by the computer's CPU
c) A type of software used for debugging
d) A code used for encrypting data
Chapter: 04
MCQS
1. The conditional structure is also known as?
a. if structure b. loop structure c. else structure d. none of these
2. The result of logical test can be ________________?
a. True or False B. only true c. only false d. none
3. ___________ are used to built program structures in python.
a. variables b. key word c. integers d. none of these

4. In python IDE, key words are displayed in ________ font.


a. green b. black c. white d. gold
5. In python a counter loop is called a ________ loop.
a. fixed loop b. for loop c. nested loop d. conditional loop
6. Which loop in Python will execute a block of code as long as a condition is
‘True’?
a) ‘for’ loop
b) ‘while’ loop
c) ‘do-while’ loop
d) ‘foreach’ loop
7. What is the purpose of the break statement in a loop?
a) To skip the current iteration of the loop
b) To exit the loop immediately
c) To continue to the next loop
d) To restart the loop from the beginning
8. Which relational operator is used to check if two values are equal in Python?
a) =
b) ==
c)! =
d) >
9. What is a loop in programming?
a) A block of code that executes only once
b) A sequence of statements that repeats until a condition is met
c) A type of data structure
d) A tool for compiling code
10. The process of turning a program into an executable file is
called___________.
a). compiling
b). interpreting
c). sourcing
d). conversion

You might also like