Вы находитесь на странице: 1из 17

ST.

CHARLES SCHOOL, YERCAUD


Class: II
Time: 2 hrs

COMPUTER SCIENCE

Date:
Marks: 30

I. Choose the correct answer:


3
1. A mouse is a ____________ device.
(a)Talking (b) Pointing
(c) Output

(d) Gaming

2. Which program allows us to write letters and stories on a


computer?
(a) MS-Paint
(b) WordPad (c) Calculator (d) Pad Word
3. Which tool is used to draw a box on the screen?
(a) Rectangle tool (b) Box tool
(c) Curve tool (d) Square
tool
4. Moving the mouse while keeping the left button pressed is
called:
(a) Push (b) Drag (c) Pull
(d) Hold
5. ________ tool is used to rub the part of the picture.
(a) Eraser tool (b) Delete tool (c) Brush tool (d) none of these
6. Which one is not an option of file menu?
(a) Open (b) New (c) Save (d) Copy
II. Fill in the blanks:
1. Mouse is used to move the _____________ on the screen.
2. _____________ mouse has no wires.
3. _____________ tool is used to type text in paint.
4. _____________ tool is used to spray colors.

5. We _____________ the mouse while drawing pictures.


III. Say true or false:
2
1. Word pad is a program used to draw pictures on a computer.
2. A saved file can be accessed again in Word pad.
3. In Word Pad, close button is placed at the top left corner.
4. The save option is used to save file in the Word Pad.
IV. Match the following:
2
1. Double click Selects an item.
2. Right click
Moving an item on the monitor.
3. Single click Shows a list of commands.
4. Dragging
Opens an icon or program.
V. Answer the following:
10
1. Name the three effects which are used to highlight the text
in the WordPad.
2. What is a mouse?
3. What is the curve tool?
4. Why do we scroll the wheel of the mouse?
5. Write the use of Fill with color tool.
VI. Name the following tool:

5
5.

1.

2.

3.

4.

VII. Write the missing letters:


3
1. M _ _ H _ N _ _A_ MOUSE

2. O _ T _ _ A L MOUSE

3. C _ _ D L _ S _ MOUSE

ST.CHARLES SCHOOL, YERCAUD


Class: IV
Time: 2 hrs

COMPUTER SCIENCE

Date:
Marks: 30

I. Choose the correct answer:


3
1. Image can be rotated by __________.
(a) Number
(b) Angle (c) Percentage (d) Pixel
2. Which option wipes out the image, leaving a blank file?
(a) Draw Opaque
(b) Attributes (c) Clear Image
(d) View
3. PowerPoint offers _________ ways of viewing a presentation.
(a) Two
(b) Three (c) Four (d) Five
4. A presentation consists of number of:
(a) Pages (b) Paragraphs (c) Pictures
(d) Slides
5. The first page of the website is known as:
(a) Home page (b) House page(c) New page
(d) Web
page
6. A network of computers is known as:
(a) Internet
(b) Presentation
(c) Website (d)
Search Engine
II. Fill in the blanks:

1. A ________ is an instrument attached between computer and


telephone.
2. Power point is a________ software.
3. The ________ option is used to view the picture on full
screen.
4. ________ option is used to rotate a picture.
5. To connect to the internet a ________ is required.
III. Say true or false:
2

1. MS Power point is a presentation software.


2. Scrollbar is located at the bottom of power point.
3. A presentation is a collection of slides.
4. Attributes option can be used to skew the picture.
5. A presentation cannot have more than 30 slides.
IV. Match the following:
2
1. Ctrl + X
To copy the selected text or image
2. Ctrl + V
To cut the selected text or image
3. Ctrl + C
To give mirror image
4. Flip Horizontally To paste the selected text or image
5. Attributes
To resize the image
V. Give one word for each of the following:
5
1. A screen in Power Point
______________
2. The shortcut key pressed to stop the slide show
______________
3. Series of slides displayed in a sequence
______________
4. To view all the slides of a presentation in small size
______________

5. A collective form of website


______________
VI. Answer the following:
1. Which option is used to enlarge the image?
2. How many views are available in Power Point?
3. What is webpage?
4. Write the name of any four work places where internet is
used

VII. Answer in detail:


1. How many options are available under Flip and Rotate
dialog box? Explain each.

Class: V
Time: 2 hrs
Date:
Marks: 60

ST.CHARLES SCHOOL, YERCAUD


COMPUTER SCIENCE

I. Choose the correct answer:


2
1. To open a website a ____________ is needed.
(Web Page, Web browser, Home page, none of these)
2. Which software can be used to view CDs on computer?

(Windows media player, sound recorder, tape recorder,


magnetic tape)
3. Which of the following symbol is used to start flowchart?

4. ______ virus waits for a specific event or date to get


started.
(Bomb, Worm, Trojan, none of these)
5. Which of the following is odd?
(Kaspersky, McAfee, Norton, Worm)
II. Fill in the blanks:
5
1. In Email, E stands for ___________.
2. The www was invented by ___________.
3. An example for multimedia CD is ___________.
4. In flowchart symbol for process box is ___________.
5. An example for Trojan virus is ___________.
III. Say true or false:
2
1. Yahoo is an example for search engine.
2. Multimedia technology cannot be used in education.
3. Search engines help you in sending e-mails.
4. The oval shape symbol is used to represent both start and
stop.
5. Computer viruses are harmful programs.
IV. Write about the following tools of Internet explorer:
5
1. Refresh 2. Back 3. Home
4. Address Bar 5. Print
V. Match the following:
2
1. Bomb
- A software that helps to scan viruses.

2. Virus
3. Antivirus

- Pictorial representation for a problem.


- Program designed to copy itself from one
to another.
4. Worm
- A program that infects the computer.
5. Flowchart
- A program that waits for a specific event.
VI. From the following identify the name of virus and
antivirus programs:
3
Quick heal, Nucker, Scalper, Happy birthday 30 th, Norton, PC
Cillin
VII. Draw the flowchart symbols and write the name and its
purpose:
4
VIII. Answer the following:
10
1. Define Internet
2. Name the components needed for a multimedia system
3. Write the importance of flow lines
4. What is virus?
5. What is an E- mail?
IX. Answer in detail:
12
1. Write a note about the history of the Internet
2. Write the rules to create a flow chart
3. How can we protect the system from virus attacks? Write
any 2 ways
X. Write the flowchart to add three numbers:
5
XI. Write any 5 educational CDs:
2
XII. Label the following:

Class: VI
Time: 2 hrs
Date:
Marks: 60

ST.CHARLES SCHOOL, YERCAUD


COMPUTER SCIENCE

I. Choose the correct answer:


2
1. The person who writes a program is known as:
(Student, programmer, teacher, writer)
2. QBASIC is a product of
(IBM, HCL, Infosys, Microsoft)
3. Built in functions are also known as:
(Library functions, String functions, Numeric functions, User
define)
4. Combinations of alphabet and numbers are known as:
(Number, string, alphabet, function)
5. Which function is to use for calculate Exponential values?
(ABS (), Expo (), Exp (), SGN ())
II. Fill in the blanks:
5
1. QBASIC stands for ____________.
2. _________ is the data types which do not tend to change during
run time.
3. REM is a __________ executable command.
4. There are 2 types of library functions
___________and___________.

III. Say true or false:


2
1. Built in functions in QBASIC are divided into three parts.
2. The function LCASE$() converts the given string into lower
case.
3. The space () function produce the specified number of spaces.
4. The MOD () function returns the absolute value of a number.
5. The SGN () function returns the numeric value of the string
constant.
IV. Give appropriate words for each of the following:
5
1. A QBASIC command which clears the screen
2. An example of assignment statement
3. These are used to compare two or more conditions in QBASIC.
4. These are used to check a condition in QBASIC
5. A window which displays result of the QBASIC programs.
V. Match the following:
3
1. LEN ()
- It is used to search for a string in another string.
2. MID $ ()
- It is used to calculate the square root of a
number.
3. INSTR ()
- It is used to returns the sign of the input number.
4. SQR ()
- It is used to find the absolute value of a number.
5. ABS ()
- It extracts specified number of characters from
the middle.
6. SGN ()
- It display total number of characters present in
the string.
VI. Write the shortcut keys for the following:
5
1. To paste the text from clipboard to the position of a cursor
___________.
2. To remove the selected text and keep it on the clipboard
___________.

3. To close the QBASIC screen ___________.


4. To copy the selected text to the clipboard ___________.
5. To save the opened program with different name ___________.
VII. Write the program to add 2 numbers in QBASIC using
INPUT command:
5
VIII. Answer the following:
10
1. Who designed QBASIC and when?
2. State the different versions of QBASIC.
3. Define function
4. Explain the need of Built in functions.
5. Name any two string functions.
IX. Answer in detail:
12
1. State the different types of operators present in QBASIC and
explain each.
2. Differentiate between STR$ () and VAL () function
3. Explain the MOD () function with example.
X. Categories the following string and numeric functions:
4
Exp (), Case$ (), SQR (), LEFT$ (), VAL (), LEN (), MOD (), MID$ ()

XI. Label the following components of QBASIC screen:


6

Class: VII
Time: 2 hrs
Date:
Marks: 60

ST.CHARLES SCHOOL, YERCAUD


COMPUTER SCIENCE

I. Choose the correct answer:


2
1. The first E- mail was sent by:
(Ray Tomlinson, Ada Lovelace, Ken Thompson, Konrad Zuse)
2. The full form of BCC is:
(Black Carbon Copy, Blue Carbon Copy, Blind Carbon Copy,
None of these)
3. It is used to display message and enter text.
(Text Box, Combo Box, List Box, Check Box)
4. It does not visible during runtime
(Timer control, Image control, Label control, Both A & B)
5. In Visual Basic an event refers to:
(Action, Function, Component, Rule)
II. Fill in the blanks:
5
1. ________ means sending your message to other person
through post card via post office.
2. ________ option lets you send to other people an exact copy of
a message that was sent to you.
3. ________ contains any type of information in a softcopy.
4. ________ is a set of rules or guidelines that people use to
communicate with each other.
5. The Email usually has ________ parts.
III. Say true or false:
2
1. Virus is a software designed to protect the computer against
Antivirus.
2. Project explorer displays and sets layout of the form on the
screen.
3. CC means Carbon Copy whereas BCC means Blind Carbon
Copy.
4. Image control is visible during run time.
5. Toolbox displays all the tools and components.

IV. Write the syntax for each of the following:


3
1. Print
2. MsgBox
3. Input Box
V. Match the following:
3
1. Forward
- Executes the timer events at specified intervals
of time.
2. Reply
- It sends an exact copy of your message to other
people.
3. Subject
- Displays a text that a user cannot modify or
interact with.
4. Label
- It describes your message.
5. Timer
- It displays the entire menu item required by you
for working.
6. Menu bar
- It opens a new message that is addressed to the
person who
sent you the message.
VI. Describe the Emotions or Smilies:
5

VII. Give appropriate words for each of the following:


5
1. A key to run an application ________
2. An extension to save a project ________
3. An extension to save a form ________

4. Number of tools present in the toolbox ________


5. A container too design an application ________
VIII. Answer the following:
18
1. What is an email? Write the main advantages of an email.
2. What are emotions?
3. Define method with an example.
4. What is properties window?
5. Which function is used to display data on the form?
6. Define the different parts in the following email:
Sachpooja289@gmail.com
IX. Answer in detail:
12
1. What is the difference between CC and BCC?
2. Explain the difference between MsgBox() and Input Box().
X. Write the advantages and disadvantages of visual basic:
8

Class: VIII
Time: 2 hrs
Date:
Marks: 60

ST.CHARLES SCHOOL, YERCAUD


COMPUTER SCIENCE

I. Choose the correct answer:


2
1. Which of the following is not an example of a search engine?
(Google, Bing, Yahoo, Google Chrome)
2. In which topology all computers are connected to a central
device?
(Ring Topology, Mesh Topology, Tree Topology, Star Topology)
3. Which of the following connects larger geographic areas such as
countries?
(LAN, WAN, PAN, WLAN)
4. In java, the built in data types are also known as:
(Primitive data type, Derived data type, both a & b, none of
these)
5. Java is developed by:

(James Gosling, John Gosling, Braine Stroustroup, Charles


Babbage)
II. Fill in the blanks:
5
1. A program gets converted into ______ language after
compilation.
2. Java is a _______ language.
3. Java has _______ primitive data types.
4. A _______ enables us to search the information on www.
5. In _______ topology data travels in a circular fashion.
III. Say true or false:
2
1. Java is not a platform independent.
2. Java is the object oriented language.
3. A server is a powerful computer that provides services to
workstation.
4. A search engine searches for keywords.
5. Java is a high level language.
IV. Give appropriate words for each of the following:
5
1. It provides an alternative path for travelling data.
2. Bluetooth is a popular example of this network.
3. Data travels in a circular form.
4. It can be extended over entire city.
5. All computers are connected with a single cable.
V. Write the sizes(in bits)and the description for the given
data type:
5
Float, short, double, Boolean, byte.
VI. Answer the following:
14
1. Write the components of LAN.
2. What do you require to start BlueJ?

3. Why do we need to write the public static void main (string


args[]) method?
4. Which version of JDK is supported by BlueJ?
5. What is wide area network?
6. Write about PAN?
7. Name any four examples of Search engines.
VIII. Answer in detail:
15
1. What is networking? State the advantages of networking.
2. Explain the features of BlueJ.
3. What do you understand by the term Platform Independent?
4. Write the disadvantages of networking.
IX. Write about the following terms:
Public, static, void, main ()
X. Write the full form of the following:
6
LAN, MAN, WPAN, VPN, WAN, WWW

Вам также может понравиться