You are on page 1of 2

Experts Education System Chitter Pari Mirpur A.

K
Class: 8th (Final Term) Paper: Computer
Marks: 15 Time: 15 min

Name : Roll no:


Q No.1 Circle the correct answer. (05)
1. Which device enables a computer to connect to a network?
a. Sender b. cellphone c. network interface d. printer
2. What is protecting data and information on a computer called?
a. Virus b. Worm c. Anti-virus d. computer
security
3. What will be the output of Excel function=POWER (3, 3)?
a. 9 b. 27 c. 6 d. 33
4. What is the procedure to design a flowchart called?
a. Program b. flowcharting c. sketch d. data
5. Which shortcut key is used for RUN command?
a. F1 b. F2 c. F3 d. F4
Q No.2 Match the Columns. (05)
Column A Columns B
Worm Unauthorized copying of a licensed
Virus definitions software
Pirated software Without license
AVG Ad ware
Piracy Threat
Latest virus data
Licensed
Q No.3 Fill in the blanks. (05)
1. A is a marked boundary around a cell or range of cells.
2. Numeric variables store values only.
3. Unlike a virus, a does not attach itself to another program.
4. . covers less area than WAN but more area than LAN.
5. . are symbols that indicate some operation on the data in an
expression.
Experts Education System Chitter Pari Mirpur A.K
Class: 8th (Final Term) Paper: Computer
Marks: 50 Time: 1hours

Q No.4 Write short answer. (10)


1. Name different types of network?
2. Define security threats to the computer?
3. How is data arranged in a spread sheet?
4. Define a Flowchart?
5. What is an operator? Write the names of three operators?
Q No.5 Write detailed answer. (40)
1. What is an error? Explain logic and syntax errors with
examples.
2. Define Flowchart. Explain all the symbols used in
Flowcharting.
3. What is virus definitions file? Explain.
4. Explain the components of a network.

You might also like