We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
ST.
JOSEPH PUBLIC SCHOOL
ANNUAL EXAM 2023-24 Class: VII Subject: Computer Time: 3 HRS. MM: 40 Q1. Select the correct option. (1×8=8) i) _______ are the columns of a table containing one type of information. a) Table b) Fields c) Record ii) A computer’s efficiency is determined by the speed and performance of its _______. a) Modem b) Port c) CPU iii) _______ number system is used every day while dealing with money, weight, length, etc. a) Binary b) Decimal c) Octal iv) The intersection of a row and column is called a _______. a) Row b) Column c) Cell v) _______ shows the name of current workbook. a) Title bar b) Status bar c) Ribbon vi) The default data type for the primary key is _______. a) Auto number b) Text c) Number vii) _______ is tricking the online user into sharing his/her personal information. a) Hacking b) Spamming c) Phishing viii) _______ is a type of malware that self-replicates until all the disk space or memory of the computer is full. a) Trojan b) Worm c) Sweeper
Q2. Fill in the blanks. (1×6=6)
i) _______ is also called network of networks. ii) _______ is located in the jacket of the monitor. iii) The term computer virus was coined by _______. iv) A cell is formed by the intersection of _______ and _______ grids. v) To enter the field names, we open the file in _______. vi) _______ is the smallest unit of a worksheet.
Q3. State true or false. (1×5=5)
Page 1 of 3 i) Data can be viewed in numeric form as well as in the form of charts. ii) A primary key is a field that has unique values for each record. iii) People get addicted to the internet. iv) A computer can get infected by an infected email attachment. v) RAM is the internal hardware of a computer.
Q4. Match the following. (1×4=4)
i) Spyware a) HDMI and Display ports ii) Hard Disk b) Traces you leave while using internet iii) VGA c) Magnetic disk iv) Digital footprint d) Steals private information from computer
Q5. Answer in one word/sentence. (1×5=5)
i) Most common keyboard based on keys layout is _______ ii) Shortcut command to copy is _______ iii) Shortcut command to paste is _______ iv) VIRUS stands for _______ v) A formula is MS Excel starts with which sign? _______
Q.6 Short answer type. (Any four) (1.5×4=6)
i) Which is a small portable storage device? Which port does it attach to? ii) Where is binary number system used and why? iii) Give two examples of boot sector virus? iv) Mention any two ways to avoid phishing. v) What do you mean by a formula in Excel? vi) What are Queries?
Q6. Long answer type. (Any two) (2×2=4)
i) Mention any four advantages of internet. ii) Convert the following into binary number system and decimal number system respectively, along with solution: a)(33)10 = (_______)2 b) (1001)2 =(_______)10 Page 2 of 3 iii) Differentiate between: a) Undo and Redo b) Worksheet and Workbook iv) Mention the type of data used in a table in DBMS. a) Serial Number _______ b) Name of the student _______ c) D.O.B. (Date of birth) _______ d) Are you a transfer case _______
******* Note: 2 marks for neat and clean work. *******