0% found this document useful (0 votes)
60 views6 pages

Computer Application Evaluation I QP Class 5,6,7

The document is an evaluation paper for Computer Applications for grades VII A and VI A at St. John's High School, consisting of multiple sections including multiple choice questions, fill in the blanks, true/false statements, and application-based questions. It covers various topics related to computer hardware, software, and viruses, as well as programming languages and file management. The evaluation aims to assess students' understanding of computer concepts and their practical applications.

Uploaded by

Bk Siri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views6 pages

Computer Application Evaluation I QP Class 5,6,7

The document is an evaluation paper for Computer Applications for grades VII A and VI A at St. John's High School, consisting of multiple sections including multiple choice questions, fill in the blanks, true/false statements, and application-based questions. It covers various topics related to computer hardware, software, and viruses, as well as programming languages and file management. The evaluation aims to assess students' understanding of computer concepts and their practical applications.

Uploaded by

Bk Siri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

St.

John’s High School


[A Unit of East West Group of Institutions]
(Affiliated to CISCE KA405 New Delhi)
EVALUATION – 1: 2025
SUBJECT: Computer Applications
Name: __________________________________ Time : 40 mins
Grade: VII A Max Marks: 50

I Choose the correct options: [5]


1. The component one which is not an hardware device.
a) Mouse b) RAM c) Keyboard d) Operating System
2. It stops unwanted traffic on internet.
a) Reinforce b) Firewall c) Phishing d) Protector
3. The devices are used to transfer data from source to destination over internet.
a) Thumb drive b) RAM c) ROM d) MODEM
4. Choose one which is not an Operating System.
a) MAC b) UNIX c) LINUX d) MICROSOFT OFFICE
5. It is a collection of raw facts and figures fed into a computer System.
a) Mouse b) Data c) Keyboard d) Operating System
6. It is not an Antivirus.
a)Norton b) AVG c) McAfee d) Trojan Horse
7. Through which of the following a computer can be infected with viruses.
a)Pen drive b) E-mail c) Accessing internet d) All of these
8. It provides space for storing data, instructions and intermediate results.
a)Control Unit b) Input c) SMPS d) Memory Unit
9. It is a safeguard against Intellectual Property Rights.
a) Hacking b) Malicious code c)Spamming d) Copyright
10. It is not concerned with Digital Footprint.
a) Information related to visited websites.
b) Information related to watching videos on the internet.
c) Listening to songs in your computer system.
d) Any information submitted online.

II Fill in the blanks [5]


1. A computer system coordinates between hardware and ____________________.
2. The full form of LCD is ________________________
3. A computer is an _____________________ data processing machine.
4. The pointing device of a computer is _________________.
5. The CPU is considered to be the _________________of a computer system.
6. The other name given to pen drive is ________________.
7. A ______________ is the smallest unit of memory which represents a character in a computer.
8. The word ________________ is composed of two words Malicious and software.
9. ______________________ is a set of computer programs with the help of which the system works.
10. ________________ is also called as ‘Electronic Terrorist’.
III Write the full forms of the following: [6]
1. ALU 2. ROM 3. BIOS 4. DVD 5.USB 6. SMPS

IV Name the following: [4]


1. Two Application Software 2. Two components of CPU
3. Two examples for Bomb virus 4. Two examples for Worm

V Draw a neat diagram of flow of data and instructions which occur during process
in computer system [6]

VI Identify the following components [4]

1. 2. 3. 4.

5. 6. 7. 8.

VII Application based question [7]


1.Varsha’s computer has got infected with a virus which lead to the frequent hanging of the
system. Which software will you suggest her to install in order to solve this problem?
2.Sumit’s computer is not working properly. The executable files and programs with
extensions, like .com, .exe, .sys on his PC have got infected. What type of virus has entered
into his computer?
3. Your friend has purchased a new computer but he don’t want to install any antivirus in
his computer. Tell him why it is important to install an antivirus in an computer system.
4.Ravi has brought a pen drive from his friend to share documents. What should he do before
sharing to protect his computer ?
5. Your friend has been constantly getting offer e- mails on his account for some time.What will
you suggest him ?
6. You save a document on your computer. Where is it stored initially, and where does it
reside after you close the application?
7. You are listening to music on your computer. Which components are responsible for
playing the sound?

VIII Read the paragraph given below and answer the following questions [3]
Viruses in People
In people, a virus is a tiny molecule that attacks, multiplies, or copies itself once it is inside
the body. When your immune system attacks these invaders, you feel sick. Usually, your immune
system can destroy the virus and eventually you feel better. People can take certain medicines to
help themselves feel better when they have a virus. Viruses can easily be spread from person to
person.
Viruses in Computers
In a computer, a virus is made up of lines of code that cause a computer or computers
to function in ways that are harmful. Just like in people, computers sometimes show signs of
having a virus. Sometimes they work very slowly or sometimes screens and pictures pop up that
aren’t supposed to. Other times, however, people don’t know their computers have viruses and
these viruses can steal passwords and other important information. Certain viruses can spread
from computer to computer. When a computer has a virus, programs can be used to find and
destroy the virus. These programs, however, don’t always work.
Questions:.
1. Why do people begin to feel sick when they have viruses?
i. The virus has multiplied
ii. The immune system has failed
iii. The immune system has begun attacking the virus
iv. They have begun to take medicine to feel better
2. What happens when a computer has a virus?
i. Sometimes it works slowly
ii. Sometimes strange screens and pictures appear
iii. Sometimes nothing happens and the person doesn’t know about the virus
iv. All of the above
3. Programs used to destroy computer viruses…
i. always work. ii. never work. iii. sometimes work. iv. are not real.
4. What is NOT true about viruses?
i. Sometimes people don’t know their computers have viruses.
ii. A person’s immune system can usually destroy a virus
iii. They can be spread from computer to computer
iv. They cannot be spread from person to person
IX Answer the following questions:[any 4] [4]
1. What is a computer virus? 1
2. What is a printer? What are its types? 2
3. What are the three main functions of scanner? 2
4. What is a memory? What are its types? 2
5. Mention the type of modem. 1
X Crossword: [6]
1. It is a fake antivirus program.
2. They don’t replicate themselves and can spread only through user interaction.
3. Steals sensitive information and other internet activities of a person and transmits to another
person.
4. A computer program that copies and multiplies itself by using computer networks and
security flaws.
5. This virus remains inactive for a long time and wait for a specific data / a event for the
disaster.
6. It is a human made program or malicious program which has ability to execute and replicate
itself.
St. John’s High School
[A Unit of East West Group of Institutions]
(Affiliated to CISCE KA405 New Delhi)
EVALUATION – 1: 2025
SUBJECT: Computer Applications
Name: __________________________________ Time : 40 mins
Grade: VI A Max Marks: 50

I Match the following : [4]


1. Machine Language Translator
2. Mnemonics High Level Language
3. Interpreter Binary digits
4. BASIC Assembly Language
5. File keeping the application running but not visible
6. * sets of files
7. Folder collections of information
8. Minimize Wildcard characters

II Name the high level languages for the given areas of applications: [2]
1. A language translator - __________________________.
2. A high level language used for web designing- _____________________________.
3. A high level language is used for engineering and scientific applications_____________.
4. A game console- __________________________________.

III Say True or False [4]


1. Copy and Paste can also be referred to as moving a file.
2. Machine language is the only language that a computer understands.
3. Windows Media Player allows us to play an audio CD as well as a DVD.
4. Assembly language is regarded as the first generation language.
5. By default, the deleted files are stored in the Recycle Bin.
6. Each programming language has its own specific rules.
7. Windows does not allow handling multiple files.
8. A compiler converts a high level language program into machine language line by line.

IV Fill in the blanks: [5]


1. Machine language is used to give instructions in terms of __________ and ___________.
2. Fifth generation computer languages developed the concept of _____________Intelligence.
3. _______________________ replaced vacuum tubes in second generation computer.
4. A file extension is also referred as file ______________.
5. Duplication of files from one drive to other drive is called______________.
6. The information stored in a storage device with a specific name called ___________.
7. An assembler is a software which is also known as ____________.
8. ______________ is known as first computer language.
9.______________ means locating a file among a set of files.
V Classify the following into Analog, Digital and Hybrid computers with each two
examples [3]
Slno. Analog computer Digital Computer Hybrid Computer
1
2.
VI Choose the correct answer: [5]
1. It is known as the first generation programming language.
a) High level language b) Assembly level language c) Machine level language
2. BASIC programming language was developed by
a) John G Kemeny and Thomas E kurtz b) Dennis Ritchie
c) Bjarne Stroustrup d) James A Gosling
3. It is not a programming language.
a) C++ b) COBOL c)FORTRAN d) English
4. When a file is copied from a pen drive to hard disk, a pen drive is known
a) destination b) source c)basic d) home
5. You can use ________ characters to locate the file, if you know only a part of the file name.
a)Numeric b) Wildcard c)Trumpcard d) Passcard
6. The application that displays the hard disk drives, CD/DVD drives, removable devices and
network locations that are connected to your computer.
a) Windows Media Player b) Windows Explorer c)Recycle Bin d)Folder
7. An _________ converts a high level language program into machine language, line by line.
a) Assembler b) Compiler c) Interpreter d)convertor
8. A program written in high level language is called_________
a) object code b) Code c)source code d)binary code
9. It is the India’s first supercomputer
a) SUPREME b)SIERRA c) FUGAKU d)PARAM
10.It is a shortcut key to paste the content.
a) Ctrl+P b) Ctrl+V c)Ctrl+X d)Ctrl+N

VII Write the components and Languages used the given generations [5]
Slno. Generations Components Languages
1. First
2. Second
3. Third
4. Fourth
5. Fifth

VIII Identify the following based on the size and purpose of the computer [3]

1. 2. 3.

4. 5. 6.
IX Name the following [4]
1. The extension of two audio files
2. Two files using Arm?.doc
3. Two types of files
4. Two fundamental operations performed on a file

X Write full forms for the following [5]


1. ENIAC 2. IBM 3. COBOL 4. SQL 5. PROLOG

IX Write the extension file for the following [3]


1. Adobe Photoshop 2. Graphic file 3. MS Word document file
4.Acrobat portable document format 5. MS Excel spreadsheet file 6. Video files

X Answer in one word [3]


1. A device that contains a file.
2. A portable storage device.
3. The term given for duplicating a file.
4. The character used for specific searching
5. The term used for removing a file.
6. The button used to enlarge the active window.

XI Application based question [4]


1. Which type of computer do Indian Railways use to interact with the customers for the
booking and cancellation of tickets?
2. Sumit is trying his hand at Java programming, but he does not know which type of language
it is. Help him to solve his query.
3.Neeta wants to locate a file that she had saved in her computer a few days back. She doesn’t
remember the exact name but can recall the first alphabet of the file name. Suggest her an
appropriate method to find the file.
4. Riya wants to listen to music while searching some information over internet. Which option
should she choose to work with both applications simultaneously?

You might also like