Вы находитесь на странице: 1из 3

FREEDOM INTERNATIONAL SCHOOL

I TERM ASSESSMENT – OCTOBER 2020


COMPUTER SCIENCE-THEORY

CLASS VII MAX MARKS: 25


TIME: 45 Mins.
____________________________________________________

I. Fill in the blanks :- (½ X 8)=4

1. The ___________ depicts the colours, patterns and symbols


assigned to the data series.
2. The __________ makes it easier to draw a comparison,
analyze growth and relationship among values.
3. The short cut key to create a chart in a new tab is
____________.
4. An MS Excel file is saved with an extension ___________.
5. ___________ is a security system that protects your
computer by preventing unauthorized users from gaining
access to it through network or internet.
6. ____________ programs are used to check the user’s
keystrokes and get important information.
7. A ___________ is a program that disrupts the normal
functioning of a Computer.
8. Retinal scan, fingerprints, voice recognition, etc. identify a
______________ of a person.

Page 1 of 3
II. State whether True or False. Re-write the False statements
correctly. (½ X 6)= 3

1. In Excel, it is possible to create a chart which is a


combination of two or more chart types. [ ]
2. The chart area contains the actual chart itself. [ ]
3. Horizontal axis is the value axis. [ ]
4. Disk killer is an example of Boot sector virus. [ ]
5. A cookie is a text message given to a web server by a web
browser. [ ]
6. MyDoom is the most expensive virus in the world.

III. Answer in a sentence:- (1 X 6)=6

1. What is a chart?
2. Define a Pie chart.
3. What is the use of the Goal Seek feature in MS Excel?
4. What is the full form of VIRUS?
5. What is cyber vandalism?
6. What are Bots?

IV. Choose the correct answers:- (½X 8)=4

1. The __________ chart shows the relationship of parts to a


whole.
a. Pie b. Doughnut c. Line
2. _____________ are mini charts that fit into a single cell to
provide visual representation of data.
a. Data points b. Data series c. Spark lines
Page 2 of 3
3. In a chart, _____________ make it easier to read and
understand the values.
a. Axes b. Plot area c. Gridlines
4. Which key is used to group multiple worksheets?
a. Ctrl b. Alt c. Tab
5. _________ is an act of harassing someone through
technology.
a. Cyber Bullying b. Identity theft c. Phishing
6. An example for the most dangerous network virus is ______.
a. Sunday b. Nimda c. Melissa
7. ___________ is a sequence of characters, numbers and
letters.
a. Password b. Cookies c. Backups
8. What do we call a process which converts the electronic data
into a form that cannot be easily understood by anyone?
a. Decryption b. Translation c. Encryption

V. Answer the following:- (2 X 4)=8


1. Define the following chart components:
a. Data series b. Plot area
2. How is a column chart different from a bar chart?
3. Differentiate Boot Sector and Macro Virus.
4. Explain the three actions taken by Antivirus software.

Page 3 of 3

Вам также может понравиться