0% found this document useful (0 votes)
25 views6 pages

Grade 7 Ict

The document is a 1st Summative Assessment for Grade ICT at Belvedere Spring School, consisting of multiple sections including fill-in-the-blanks, matching, true/false statements, and open-ended questions. It covers topics related to malware, computer security, and Microsoft Excel functionalities. The assessment is designed to evaluate students' understanding of ICT concepts and practical skills.

Uploaded by

inshah876
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views6 pages

Grade 7 Ict

The document is a 1st Summative Assessment for Grade ICT at Belvedere Spring School, consisting of multiple sections including fill-in-the-blanks, matching, true/false statements, and open-ended questions. It covers topics related to malware, computer security, and Microsoft Excel functionalities. The assessment is designed to evaluate students' understanding of ICT concepts and practical skills.

Uploaded by

inshah876
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

BELVEDERE SPRING SCHOOL

A Cambridge International School


1STSummative Assessment 2024-25
Grade: Sub: ICT
Name:- ___________________________________
MARKS:-80
SECTION A
A) Fill in the blanks :-
1)__________________ virus attaches itself to the source code of the software
2)Random pop-ups are caused by __________________malware
3)bit defender is a type of __________________
4)A __________________looks like a legit software but it is used to trick users by
opening a backdoor
5) __________________is hybrid of the boot sector and the Macro viruses

B) match the following :-


1)avast Trojan
2)bots Antivirus
3)malware Virus
4)stealth virus Internet robots
5)locky Ransomware

C)state whether the following statements are true or false :-


1)ransomware demands money to decrypt the target file __________________
2)Trojans are self replicating ___________________
3)worms can automatically send messages to all contacts __________________
4)bots pop-ups in a lot of advertisements __________________
5)spyware silently spies your computer __________________

D)Answer the following question :-


1)define terms ransomware ?
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
______________________________
2)how does a malware enter into the computer ?
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
______________________________-_______________________________________
___________________________________________________________________________
___________________________________________________________________________
_____________________________________________________________________
3)distinguish between a boot sector virus and a macro virus?
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
________________________

SECTION B
A)tick the correct answer :-
1)Which of the following is the process of gaining unauthorized acxess to a computer
system or a account ?
 scamming
 bullying
 hacking
 phising

2)which of the following refers to the information left on the internet with awareness of
the user?
 Active footprint
 Passive footprint
 Login
 Logout
3)The “s” in the https stands for”?
 Safety
 Security
 Speed
 Secure
4)A strong password contains
 Numbers
 Letters
 Symbols
 All of the above
5) which of the following is software that protects computers from virus attacks ?
 Antivirus
 Malware
 Anti theft
 Safety wall

B)fill in the blanks :-


1)A citizen of the internet is called a _________________
2) _________________replicates itself in the computer and creates unwanted code
3)A _________________ attack is where user data is stolen
4)A url with _________________is more secure than a url with http
5)A_________________is traceable trail of information left behind by the user

C)match the following :-


1)weak password 7+ninety !!
2)strong password example abc
3)scam Click here to go to hawai for free
4)firewall Location data
5)digital footprint Prevents unauthorized access

D)answer the following question :-


1)Explain ethics in computing in your own words .?
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
________________________
2)mention three reason why being alert and smart while using the internet is important ?
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
________________________

SECTION C
A)fill in the blanks :-
1)To select non-adjacent ranges of cells ,select the first ranges and the select the other
ranges while pressing____________ key
2)spreadsheet is a grid of ____________and columns
3)21-03-2022 data format can be added by selecting ____________from the number
groups
4)to select an entire row ,click on the selected ____________heading
5)the ____________ of a workbook in ms excel is .xlsx by default .
B)state whether true or false ?
1)merge text allows us to fit the content within the same cell by displaying it in multiple
lines ______________
2)shortcut to close an application is alt+f4
3)formatting options are available in the home tab
4)background colour of one cell can be changed
5)autofill feature automatically fills the adjacent cells
C)what does the each of the keyboard shortcuts do?
a.Ctrl+A _________ b.Ctrl+v _________
c.Shift+spacebar _________ d.Shift+Tab _________
e.Ctrl+Z _________ f.Ctrl+s _________

d)Give the steps for the following activities in MS Excel.


A)Opening and closing an existing worksheet
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
________________________
B)fill a row with dates of next month using autofill
Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
________________________
c)what is formula bar?

Answer:-
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
________________________

You might also like