[go: up one dir, main page]

0% found this document useful (0 votes)
42 views4 pages

Class 7 Computer-AI Practics Set

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views4 pages

Class 7 Computer-AI Practics Set

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

PM SHRI KENDRIYA VIDYALAYA No-3 GANDHINAGAR CANTT

PERIODIC TEST 1 (2025-26)


Subject- Computer / AI
Most important revision questions
Class- VII
Q-1: Tick the correct answer.

(1) Computer is an ………………………………………… machine.


(a) Water b) Electronic c) Battery d) None of these

(2) The physical components of the computer are known as


(a) Software b) Program c) Hardware d) Both A and C

(3) What is the primary goal of cyber security?


(a) To prevent all cyber-attacks b) To minimize risk and protect against potential threats
c) All computer systems are always online d) To create new types of cyber threats

(4) What is the term for malicious software that can harm your computer?
(a) Firewall b) Antivirus c) Malware d) Password

(5) Which of the following is NOT a type of malware?


(a) Virus b) Worm c) Trojan Horse d) Firewall

(6) It is an input device, that looks like a type writer


(a) Scanner b) Mouse c) Keyboard d) Joystick

(7) Which of the following is NOT a type of cyber security threat?


(a) Phishing b) Malware c) Strong password d) Denial of service attack

(8) What is a firewall's function in computer security?


A) It encrypts data B) It protects against viruses
C) It monitors network traffic and blocks unauthorized access D) It creates strong passwords

(9) What is the main purpose of an antivirus program?


(a) To protect against viruses b) To speed up the computer
c) To make the computer look nicer d) To store extra files

(10) This input device is also known as Digicam


(a) Camcorder b) Mouse c) Digital camera d) None of these

(11) Which of the following is a way to protect your computer from malware?
A) Download files from untrusted websites B) Open emails from unknown senders
C) Install and regularly update antivirus software D) Share your passwords with others

(12) When someone tries to trick you into giving them your personal information is known as?
(a) Hacking b) Phishing c) Malware d) Firewall

(13) It is the computer’s main permanent storage area


(a) Compact Disc b) Hard disc c) RAM d) All of the above

(14) CPU is known as the ……………………………. of the computer.


(a) Heart b) Kidney c) Brain d) Lungs

(15) What does cyber security protect?


(a) Cyber security protects criminals b) Cyber security protects internet-connected systems
c) Cyber security protects hackers d) None of the mentioned
(16) Which of the following is a storage device?
A) Keyboard B) Modem C) CD D) Motherboard

(17) ____ are often delivered to PC through an E-mail attachment and are often designed to do harm?
(a) Viruses b) Spam c) Portals d) Email messages

(18) Which of the following is an example of software?


(a) Keyboard (b) Mouse (c) Operating System (d) Monitor

(19) Which of the following is a type of computer memory?


(a) Printer (b) Keyboard (c) RAM (d) Mouse

(20) Which of the following is a communication device?


A) Mouse B) Modem C) Monitor D) Microphone

(21) Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks,
or their associated information?
(a) Cyber-attack (b) Computer security (c) Cryptography (d) Digital hacking

(22) Which of the following is a type of cyber security?


(a) Cloud Security (b) Network Security (c) Application Security (d) All of the above

(23) What are the features of cyber security?


A) Compliance B) Defence against internal threats
C) Threat Prevention D) All of the above

(24) What do hardware components of a computer refer to?


a) software programs b) physical parts C) operating system d) applications

(25) Which of the following is an example of software?


a) Microsoft Word b) Keyboard C) Monitor d) Printer

(26) Which of the following is an objective of network security?


A) Confidentiality B) Integrity C) Availability D) All of the above

(27) What is the term for someone who illegally accesses computer systems?
a) Programmer b) Hacker C) User d) Administrator

(28) Which of the following is not a cybercrime?


A) Denial of Service B) Man in the Middle C) Malware D) AES

(29) Which of the following is a component of cyber security?


a) Internet of Things b) AI c) Database d) Attacks

(30) Which of the following is a type of cyber-attack?


a) Phishing b) SQL Injections c) Password Attack d) All of the above

(31) What is phishing?


A) A type of virus B) An attempt to steal sensitive information entity
C) A type of firewall D) A way to speed up internet connection

(32) Which of the following is not an advantage of cyber security?


a) Makes the system slower b) Minimizes computer freezing and crashes
c) Gives privacy to users d) Protects system against viruses

(33) “Cyberspace” was coined by _________


a) Richard Stallman b) William Gibson c) Andrew Tannenbaum d) Scott Fahlman

(34) In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
a) 1991 b) 1983 c) 1970 d) 1964
(35) Which of the following act violates cyber security?
a) Exploit b) Attack c) Threat d) Vulnerability

(36) Which of the following actions compromise cyber security?


a) Vulnerability b) Attack c) Threat d) Exploit

(37) Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
a) Digital crime b) Threats c) System hijacking d) Cyber Attack

(38) IT security in any firm or organization is maintained and handled by ____________________


a) Software Security Specialist b) CEO of the organization
c) Security Auditor d) IT Security Engineer

(39) Which of the following term refers to a group of hackers who are both white and black hat?
a) Yellow Hat hackers b) Grey Hat hackers c) Red Hat Hackers d) White-Black Hat Hackers

(40) Which of the following is an antivirus?


a) Windows b) OS c) Nortan d) All of the above

(41) Which tag represents the root of an HTML document.


A) http B) ftp C) URL D) HTML

(42) What is the name of the language you use to write a web page?
A) <head> B) <body> C) <html> D) </html>

(43) What is the full form of HTML?


A) Hyper Text Markup Language B) Hyper Text Machine Language
C) Hyper Text Marking Language D) High Text Marking Language

(44) In HTML language, the tag <U> displays text as:


A) Bold face B) Italics C) Underline D) Coloured

(45) What is the best way to protect your computer from malware?
A) Use a strong password B) Download software only from trusted sources
C) Keep your software updated D) All of the above

(46) In HTML, we use the <h1> to <h6> tag for ___________.


A) Head B) Title C) Font size D) Line

Q-2: Fill in the blanks


(1) Ctrl + A shortcut key is used for _______select all______.
(2) ____Virus____ has the potential to cause serious harm to a computer system.
(3) Google is a popular ________search_______ engine.
(4) A threat can lead to attacks on ______computer________ system.
(5) _____Mouse____ is a pointing device.
(6) Computer Virus is a computer ____program____ that do unwanted things with your computer.
(7) ______ Trojan horses ______program can erase your hard disk.
(8) ____Arrow___ keys are used to move cursor in all directions.
(9) ___Web Camera___ is used to click photos on the computer.
(10) Facebook is a ____social____ site.
(11) Crime conducted with internet called ____cyber-crime______.
(12) _____Joy Stick_______ is used to control video games
(13) ___Antivirus___ software helps protect your computer from harmful programs
(14) Printer is used for _____print______ data from the computer to the paper.
(15) Computer software also called _______program_______.
(16) The keyboard shortcut key ___ctrl + c__ copies the currently selected text or object to the clipboard
(17) which is the longest key on the keyboard ____spacebar___.
(18) there are ____26___ alphabets key on the keyboard.
(19) ___Monitor____ displays the result on the screen.
(20) Computer Memory is used for store ____data_____ in to the computer.
(21) The keyboard shortcut key Ctrl + V is used for ___past____
(22) I am the brain of the computer. ____CPU______.
(23) The purpose of storage in a computer is to hold ____information___ or data.
(24) ____Windows_____ is the most common operating system for PCs.
(25) The term pc stands for ____personal computer___.
(26) ___viruses___ is a small piece of software that piggybacks on real programs.
(27) ___Backspace___ which key is used to delete the letters.
(28) ___Shift___ key is used to type special character.
(29) ____Ctrl + Z___ shortcut key is use for undo.
(30) ____Ctrl + C___ shortcut key is use for copy.

Q-3: Find true or false.

(1) Computer viruses are nothing but computer program that do unwanted things.
(2) A computer virus can only spread through the internet.
(3) Antivirus software is essential for protecting your computer from all types of malware.
(4) A hacker is hacking software which access in sensitive information from your computer.
(5) A Trojan horse is a type of self-replicating malware like a computer virus.
(6) Cyberbullying is a form of online harassment that can have serious consequences.
(7) A computer virus can only harm software, not hardware.
(8) Cyber means the use of internet technologies and computers.
(9) It's okay to share your passwords with your friends if you trust them.
(10) Spyware is a type of malware that steals your personal information without your knowledge.
(11) You should always keep your software up to date to protect against vulnerabilities.
(12) A firewall protects a computer from unauthorized access.
(13) Strong passwords should include a combination of uppercase and lowercase letters, numbers, and symbols.
(14) Computer ethics refers to the moral principles that govern the use of computers and the internet.
(15) Strong passwords are an important part of computer security.
(16) Downloading files from untrusted websites is generally safe.
(17) It's important to update your computer's operating system regularly.
(18) Downloading files from untrusted websites is generally safe if you have antivirus software.
(19) An e-mail virus travels as an attachment to e-mail messages.
(20) HTML (Hyper Text Markup Language) is used for creating webpage.

Q-4: Answer the following questions.

(1) What is the full form of RAM?


(2) What is threat in computer?
(3) What is the full form of ROM?
(4) Give one difference between Trojan Horse and worms?
(5) Give one difference between Virus and Antivirus?
(6) List two ethics of computer?
(7) Name five input devices.
(8) What is worms in computer security and what can they do in computer?
(9) What is Firewall in windows, and name two antivirus?
(10) Give one difference between Hackers and Crackers?

You might also like