0% found this document useful (0 votes)
45 views

Class VIII - Computer

1) This document contains a practice test for Class 8 students on the subject of Computers. It includes multiple choice questions, fill in the blank questions, short answer questions and long answer questions testing students' knowledge of topics like computer networks, databases, queries, software breaches and computer ethics. 2) The test has one long question asking students to explain different network topologies and the types of each topology. It also has another long question asking students to explain software piracy and its various forms. 3) The document provides practice for students to demonstrate their understanding of key computer concepts tested in the test.

Uploaded by

Yash Saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Class VIII - Computer

1) This document contains a practice test for Class 8 students on the subject of Computers. It includes multiple choice questions, fill in the blank questions, short answer questions and long answer questions testing students' knowledge of topics like computer networks, databases, queries, software breaches and computer ethics. 2) The test has one long question asking students to explain different network topologies and the types of each topology. It also has another long question asking students to explain software piracy and its various forms. 3) The document provides practice for students to demonstrate their understanding of key computer concepts tested in the test.

Uploaded by

Yash Saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ADARSH JAIN DHARMIK SHIKSHA SADAN (2023-24)

TERM-I CLASS – VIII


TIME : 1½ HRS. SUBJECT : COMPUTERS M.M : 30
Q1.Multiple choice questions: (6x0.5=3)
a) LAN stands for:
i) Loose Area Network ii) Local Area Network iii) Light Area Network
b) Wires that connect computers are called are called :
i) string ii) strip iii) cables
c) ______________ includes computer viruses and cracking of passwords:
i) Hardware breaches ii) Software Breaches iii) Both (i) and (ii)
d) Which of the following is a database Management System:
i) MS-Word ii) MS-Excel iii) Oracle
e) Criteria row specifies __________________ on the basis of which the record will be
filtered:
i) Condition ii) format iii) weather
f) Property is protected by:
i) Police ii) law iii) Both (i) and (ii)
Q2.Fill in the blanks: (5x1=5)
a) A computer network is a system in which computers are_________________ .
b) Usually databases are _______________ by fields, records and files.
c) ____________ is a device that joins two computers.
d) Usually a query is always based on __________________.
e) _______________ are rules related to the use of computers.
Q3.Very short answer questions: ( Do any six). (6x1=6)
a) Name any three Database objects.
b) Akshay created a table named student in MS-ACCESS. He want to take the print out
of the table. Which object he should use to present the data in a printed format?
c) What is MS-ACCESS?
d) Who is the Hacker?
e) What is the name of © symbol?
f) What do you mean by a query?
g) What do you mean by term ‘Privacy’?
h) What is networking?
Q4.Short answer questions (Do Any Five): (5x2=10)
a) What are the various views? Name these views.
b) Define primary key.
c) Write different ways to create a Database.
d) How can you create query? Give steps.
e) What are computer ethics?
f) Reyaan of 8 class has been allotted a duty to create a webpage. Answer the
th

following based on above situation:


i. Name the software for writing the HTML code/program.
ii. Name the software for seeing the output/result of the HTML code.
Q5.Long answer type questions.( Do any two) : (3x2=6)
a) What do you mean by topology? Explain the types briefly?
b) Explain software piracy with various forms.

You might also like