You are on page 1of 2

CARMEL SCHOOL, GORAKHPUR

Half Yearly Examination


CLASS – VII COMPUTER M.M-80

A. Fill in the blanks: - 10


1 A table is created by the intersection of ---------- and ----------.
2. The table heading is defined with --------- tag in an HTML.
3. You can add a visual appeal by inserting ------- in an HTML document.
4. The binary system consists of two digits……....and………
5. The decimal number system uses the digits from……...to……..
6. The binary number system is written with ………....as the base.
7. Virus is a program, which is ……………in nature.
8. A computer virus can be removed from the system through------------.
9. A computer ________ is intentionally made to disturb the proper functioning of the computer.
10. ________software is specially designed to protect the entry of viruses into the system

B. State true or false: - 10


1. A computer virus is intentionally made to disturb the proper functioning of the computer system.
2. A browser interprets the HTML codes on web page.
3. By default, border is added to a picture in an HTML document.
4. A computer virus is destructive in nature.
5. In an ordered list, the contents are displayed in bulleted form.
6. Antivirus software is specially designed to protect the entry of viruses into the system.
7. There is no difference between a computer virus and a biological virus.
8. A computer virus can be removed from the system through vaccination.
9. A system gets affected by the virus automatically.
10 You can also insert pictures in HTML documents from an external source.

C. Choose the correct option: - 10


1- In a decimal number system, the base of a number is represented by:
(a)- 2 (b)-10 (c)-8 (d)-16
2- The base of an octal number is represented by:
(a)- 0 (b)-8 (c)-2 (d)-1
3- An octal number system uses the digits from:
(a)- 0-8 (b)- 0-10 (c)- 1-8 (d)- 10-16
4- Base of binary number system:
(a)- 1 (b)- 2 (c)- 10 (d)- 8
0
5- 2 is equivalent to-
(a)- 0 (b)- 1 (c)- 10 (d)- 4
6- Binary number system uses the digits from:
(a)- 10 (b)- 1,2 (c)- 0 and 1 (d)- 1
7- Shortcut keys for Undo button:
(a)- Ctrl +U (b)- Ctrl+O (c)- Ctrl+Z (d)- Ctrl+Y
8-Virus is a:
(a)- Operator (b)- Operating System (c)- Application Software (d)- Program
9-Binary value of 8 is:
(a)- 100 (b)-10 (c)- 1000 (d)- 1
10- Decimal number system uses the digits from:
(a)- 0 to 2 (b)- 1 to 10 (c)- 0 to 8 (d)- none
D. Convert the following : - 08
1- (111)2  ( )10 2- (100)2  ( )10
3- (12)10  ( )2 4- (8)10  ( )2

E. Differentiate between: - 08
1- Virus and Antivirus 2- Computer virus and Biological virus
3- Binary and Decimal number 4- ol tag and ul tag

F. Define the terms: - (any five) 10


1- form 2- Antivirus 3- Worm 4- Binary Number 5. Virus

G. Answer the following(Any Five) :- 24

1- Distinguish between Unordered list and Ordered list.


2- What are the different type of number system that a computer deals with?
3- What are the various way to get virus attack to a computer system?
4- State the various way to protect your system from viruses.
5-What is meant by an antivirus?
6- Draw any two Antivirus logo.
7-Write down the syntax of Ordered List and Unordered Listwith reference to HTML

*****

You might also like