You are on page 1of 8
All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafigi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES: MULTIPLE CHOICE QUESTIONS (MCQs) 1__ [What does two or more computers connected together is called? a) _|GPS b)_[Model ¢)__| Network (V7) d)_[TAN 2___|Which device is used to initiate the transmission of data? a) [Receiving Device b) [Transmission Device ¢) __|Sending Device (V) d)_ [Communication Devi e 3 |Which is the device used to send and receive information over telephone lines. a) _|WAN b)_[Modem (VJ ¢)__| Client d)_ [Computer 4 |The computer that uses the resources of server is called a a)_| Switch b)_[WAN c) _|Server d) [Clie t WV) 5 |How much areas does a WAN cover? a)_|A Cit b)_[An organization ¢) [A Continent (V) d) [A Room 6 | Which is the cable that has an insu ated copper cable to carry high frequency data signals? a) [STP b)_ [Coaxial Cable (V) )__|UTP. )_ [Fiber Optics 7___|What material is fiber ptics c ble made of? a) _|Glass Fibers b) [Insulator ¢) _| Copper Wires d) [Glass Fibers (V) 8 __|Which technology is used for weather forecasting? a) [GPS b)_| Twisted Pair ¢)__ | Satellite Communication (Vv) d)_ [Coaxial Cables 9 _|How many times in a day a GPS satellite moves around the earth? a) _| Twice (v) b) [Four times ©)_| Thrice d) [Five times 10_| Cellular communication is based on a) _|Cables b) [Cells (V) ¢)__ [Insulator d)_ [Satellite 11 [Which is the field of information technology which deals with data protection? a) _|Hacker b)_ [Computer security (Vv) c) _| Threats d)_|Virus 12 [Which is a malicious program that infects computer program and make changes to the computer program? a) | Virus (Vv) b) [Worm )__[Hacker d) [Adware Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 1 of 8: WWW.EASYMCQS.COM All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafigi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES: 13 [Which type of threat may change the boot sector of the hard disk? a)__|Worm b) [Virus (Vv) c) [Adware d)_[Hacker 14__|Which type of program is a pop-up add? a) [Virus b)_[Adware (V7) c) _|Worm d)_[Hacker 15 _|What is widely used for storing and transmitting information and data? a) __|Flash drives (Vv) b)_[Email c) __|Software d) [Websites 16 | Which type of threat copy itself many number of times to redu e the disk space? a)_|Virus b)_[Hacker ¢)__|Worm (v) d)_ [Adware 17_|What is the place from where infected programs are downloaded? a) [Insecure websites (Vv) b) [Secure websites c) [Email attachments d)_[All of them 18_|By whom virus definition database is mai_tai ed? a) | Virus definition dictionary b)_|Web ites ¢) _ [Antivirus companies (Vv) d)_[Em il attachments 19” | Which anti-virus was developed in 1991 for protecting people from viruses? a) _|AVG (Vv) b)_[Norton ¢) | Symantec ) [Mcafee 20 {What must be installed on computer to scan for viruses? a) | Cookies b) [Antivirus (Vv) ¢) _|Flash drive d)_[Adware 21 __|What is the intersectin fa row and column called? a) [Row b)_[cell (v) )__|Address Bar d)_ [Column 22 [What is a file called which contain one or more worksheet? a) _|Workb _k (v) b) [Program c) | Pages d)_ [Software 23 _|What is the h rizontal space in Ms Excel called? a) _|Cell b)_ [Column )__|Row (v) d) [File 24 |Which function is used to multiply number or series of numbers? a) _|SUM b)_[AVERAGE )__ | PRODUCT (Vv) d)_[MIN 25 _|What is the result of =SQRT(169)? a) [15 b) [13 W) )__[12 d) [9 26 _|What is the result of =POWER(2, 1)? a) | 256 b) [128 WW) cc) __|126 d) [254 Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 2 of 8) WWW.EASYMCQS.COM All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafigi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES: 27__| What is the result of =MIN(4,0,2,3,5,9)? b) [2 a) |i c) 13 d)_[0W) 28 | What Is the complete set of characters called? a) Font (Vv) b)__|Font style ¢) | Shading d) [Font size 29 | What is the way to convert data into meaningful form using fr_ulas? a) | Formatting Text b)_ [Formula Insertion ¢)__| Data manipulation (Vv) d)_|Formatting Text 30 Which is the chart that represents data in the form of olumns and bars? a) Line Chart b)_[Pie Chart ¢)__| Bar Chart d) [Column Chart (V) 31 To solve a problem on computer the first step is _he problem. a) Define (VY) b)_ [Analyze c)__| Process d) [Flow Charti_g 32 Which of the following is an input output _ymbol a) b) ——— 7 | Aa 7 33 __| Which of the following is used as_e ision symbol? a) ) ——. Ce 3 a @ 34 __ A step by step logical diagram of a program is called : a) _| Flowchart (V) b) _ [Assignment | c) | Algorithm d)__[Analyzing | 35 is a informal step by step procedure to solve a problem | a) __| Flowchart b) [Assignment | c)__| Algorithm (Vv) d)_[Analyzing | 36_|A process of making a flow chart is called a) _|Flo charting (Vv) b) [Assignment cc) | Algorithm d)__[Analyzing 37 symbol is also called a Terminal Symbol. a) b) (v) a) P= * | Se Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 3 of 8) WWW.EASYMCQS.COM All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafiqi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES: 38 symbol is used to show some working by a computer. a) ae (v) o> a Dee x # pe 39 is a symbol used to show a connection point between [the two parts of a flow chart diagram. 7 | a> c) d) (vy) LF 40 shows flow of information form o e step to another in a flow chart. a) Terminal Symbol b) Deci ion Symbol c)__| Flow lines (V) d) [Proce sing Symbol 41 __| MOD operator gives in a calculation. a) __| Remainder (Vv) b) [Numerator ¢) | Quotient d) [Denominator 42 | Which of the following statement can be used for implementing decisions? a) IF-THEN-ELSE (Vv) b) FOR... NEXT c)__ INPUT d)__ [Assignment 43 Name the error that exists inC = 5 * +6 a) | Logical b) Execution ¢) _| Syntax (Vv) d) [Built in Error 44_| How many programmi g languages are there? a) Just one b) [500 ©) 100 d) |More then 1500 (Vv) 45 _1/+,-,*,/ are operators a) Arithmetic (v) b) Assignment. ¢c)__| Relational d) [Logical 46 | How many modes of operations there in BASICS? a) Just one Db) | Three c)1T ov) d) |More than 47 New Command is used to clear the GWBASIC program from a) Screen b) Hard Disk c)__| RAM (Vv) d) [Floppy 48 | CLS command is used to clear the GWBASIC program from a) | Monitor (V) b)__ [Hard Disk c) | RAM d) | Floppy All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafigi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES) 49 [KILL command is used to delete a) __| Statements b)_| Variables cc) _|Words d) [Program Files (V) 50 | DELETE command Is used to delete a) [Statements (v) b)_ [Variables c) [Words d) [Program Files FILL IN THE BLANKS 1 ___ is a device which accepts data or information ] Re eiver transmitted to the sender. 2 |The ____ holds all the resources required by a |Srvr network 3_ [if is down all clients are affected. Server 4 |The network of computers confines in a buildi gis called [LAN 5 is a satellite based-navigation_y tem. GPS 6 |A_ is a network that covers a city. MAN 7 NICis a computer hardware used to connect computer to| Network a | Twisted Pair Cables are Transmitted data 9 [A Coaxial Cable is made of wire, Conducting io |___ is a standard for short range wireless | Bluetooth interconnection of electronic devices. Ti [Security means to prevent cess to information and] Unauthorized valuable data by access Tz} Threats are possib € dangers that may explow the) Security of the system. 13 [_ refers to viruses, worms, or adware software. | Threats 14|__ is a malicious program that infects other | Virus programs. 5 C llects information about a particular user or | Hacker organization with ut their knowledge. 16 | Adware by itself is : Harmless 17 |USB flash drives are widely used for andj Storina, information. Transmitting T8|An antivirus is software used to prevent, detect and | Remove various threats 19 [Norton is the brand of ‘Symantec 20 | Virus definitions typically refer to the database of all current | Virus detection virus signature files used by particular antivirus software for 21 {A ___ is defined as @ large sheet containing any | Spreadsheet information arranged in a matrix of rows and columns. Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 5 of 8) WWW.EASYMCQS.COM All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafigi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES) 22|A represent data in the form of connected lines. | MS Excel 23] An Excel file is termed as a Workbook 24|The top most bar of MS Excel window is called the Title Bar 25] For calculations you will enter formula in the Formula Bar 26| The is defined as the horizontal space that is | Row going across the window. 27| The space where a specified row and column intersect is Cell called 5 28] The _ function takes all of the values in each of _ | SUM the specified cells and totals their values. 29) The power function finds the of the giv n} Exp riment number. 30 are pictorial representation of data. Charts 31] Any task that is given to be the computer for its s luti is| Problem called 32] Problem solving on is no different than everyday| Computer problem solving 33]A step by step procedure developed to olve a problem] Algorithm before the actual program, is called a 34] Once the problem is defined and the st tement is made, ‘Analyze then you need to the problem. 35] The output is the result of Work done by the computer 36/A is a type f digrm that represents an| Flowchart algorithm or process. 37] The __ of an agrithm or a process is called a | Diagram flowchart. 38] To begin a flowchart an oval shaped symbol is used with Start/stop words of in it. 39| To represent the processing a is used in flowchart. | Rectangle symbol 40] a is used as connector to connect two parts of a_| Circle flowchart to sh_w the continuity. 41/ A computer program is a sequence of written to| Instructions perform a specified task with a computer. 42/To rite a program a language is required, this particular | Computer language is called a language 43 is the language which computer can understand __| Machine language but human cannot. 44, A __ is a number or word that does not change its _ | Constant value. 45/If the grammar rules of the programming language are | Syntax violated then _ __ error occurs. 46] An arithmetic expression is the combination of Operands, and _ operators Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 6 of 8) WWW.EASYMCQS.COM Al Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafig111@qm: COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES) 47 |The equal sign is called the operator. Assignment 48 | RUN command the program. Runs or executes 49 command in BASIC is used to display text on the | Print screen. 50 implements decisions on the basis of a condition. [IF THEN ELSE statement. COLUMN MATCHING UNIT # 1 TAN (Computers Connect dina building GPS Aviation Server Shares its res ure 5 Fiber Optic Glass Fibers Dial up Modem Analog & Digital Signals UNIT # 2 AVG Gri oft Virus De troy database on hard disk Host Provide service to smaller program Email Fies tt ched Virus Scan Compares with database UNIT # 3 AZ Cell Address Fill Handle ‘Auto Filling Data Function Average Copy Cells Ctrl + C Font Style Bold Pie Chart Sectors UNIT # 4 Flow Chart A logical diagram made using standard symbols and shapes. Problem Statement. Short and Clear description of problem Analysis Detailed brain-storming in order to understand the problem its requirements Decision Symbol Flow lines Connector Symbol Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 7 of 8) WWW.EASYMCQS.COM All Federal Board Punjab Board Chapter Wise PDF Notes Free Download Website: www.easymegs.com , E-mail: usmanrafiqi11@qmail.com COMPUTER SCIENCE FOR 8™ CLASS (OBJECTIVES: [Algorithm Informal step by step procedure to solve a problem written in simple English pr ing. bol UNIT # 5 Command Direct Mode EDIT ‘To modify pr gram s a ements Statement Indirect mode Program written in user understandable [ Source Code language Program translated in machine Object Code understanding language Rules for naming variables N ming Conventions Logical Error C used if problem is not understood properly syntax Error Caused if language rules are violated MOD Arithmetic Operator <> Relational Operator Visit www.easymcgs.com for Notes, Old Papers, Home Tutors, Jobs, IT Courses & more. (Page 8 of 8) WWW.EASYMCQS.COM

You might also like