8th Computer Sat - A

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

TERM-1 Exam (2022-2023)

Class - 8th
Subject - COMPUTER
Maximum Marks: 40

Note: General Instructions:


i. All questions are compulsory.
ii. Please read the question paper carefully.

A. Mark the statement true or false: (1 x 4 =4)

1. A server is also called host computer.


2. Transform tool can be found in the Edit menu on the Application Bar.
3. We can create custom shape design with the help of Ellipse tool.
4. Computer safety refers to the protection of computer-based resources against
unauthorized use.

B. Mark the correct option: (1 x 5 =5)

1. Which of the following is an antivirus?

a. Worm b. Norton c. Trojan d. Virus ( )

2. Which tool helps in putting textures as the background on canvas?

a. Pattern Stamp Tool b. Stamp Tool c. Sponge Tool d. Blur Tool ( )

3. A computer network that can be used only within an organization is called .

a. Internet b. Intranet c. Both a & b d. None of these ( )

4. Which command lets you add few cushion pixels at the border of objects in your photos?

a. Calculation b. Apply Images c. Trap d. Flow ( )

5. What is the use of Set Permission option in the Google sheet?

a. Protect Sheets b. Delete Sheets c. Withdraw d. all of these ( )


C. Fill in the blanks: (1 x 5 =5)

Hand tool, info, Application bar, Malware, saved

1. Changes made to the Google docs are automatically when working online.
2. Option bar is available below the .
3. The panel shows the numeric value of the color.
4. Malicious software is known as .
5. With the help of , we can even rotate the canvas.

D. Write the full forms: (1 x 4 =4)


1. NIC: ___________________________ 2. IVR:- ________________________________

3. GPS:- __________________________ 4. POP3:- _______________________________


E. Match the following: (1 x 4 =4)
Column A Column B
1. Malware that gains the administrator access to the a. IMAP
host system
2. Tool which selects area of similar color pixels around b. Rootkit
it with just one click
3. It is an e-mail protocol that stores the email c. Satellite
messages.
4. It’s a type of a Google Map. d. Magic Wand
1.( ) 2.( ) 3. ( ) 4.( ) 5.( )

F. Read and answer the following in one word. (1 x 4 =4)


1. Malicious program, that does not collect information from the computer,
waits for the hacker command is _____________
2. The image captured by biometric machine is transformed into a unique
face print using a technique is called __________________
3. To switch from polygon lasso to free hand selection, the short cut key is
4. It’s a free online word processing program similar to MS Word.

G. Explain any four terms: (1 x 4 =4)


1. Protocol _______________________________________________________________________
_______________________________________________________________________________
2. Pixel___________________________________________________________________________
________________________________________________________________________________
3. Password________________________________________________________________________
________________________________________________________________________________
4. Google Drive_____________________________________________________________________
________________________________________________________________________________
5. Rasterize________________________________________________________________________
________________________________________________________________________________

H. Answer any five questions. (2 x 5 =10)


1. What is Trojan?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. What is the use of blur tool?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3. Define Paint Bucket Tool.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4. What is topology ?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
5. What do you mean by Gmail ?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6. Define client and server.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

You might also like