Page 89 - Viva ICSE Computer Studies 2 : E-book
P. 89

Answer the following questions. Stars are given at the end of the exercise. For a

                    correct answer, colour the star blue and for an incorrect answer, colour the star red.
                    Count the number of blue stars to calculate your score.


                      1.  Which of the following combination of keys capitalise the letters?

                         (a)  Ctrl + Alphabet key                          (b)  Caps Lock + Alphabet key

                         (c)  Shift + Alphabet key                         (d)  Alt + Alphabet key

                      2.  Which of the following combination of keys will reduce the letters to lower case
                         when Caps Lock is ON?

                         (a)  Shift + Alphabet keys                        (b)  Caps Lock + Alphabet keys

                         (c)  Shift + Caps lock                            (d)  Shift + Alt

                      3.  CPU stands for __________________________________.

                         (a)  Control Processing Unit                      (b)  Central Processing Unit

                         (c)  Computer Processing Unit                     (d)  Complex Processing Unit

                      4.  There are _________ diff erent types of mouse.

                         (a)  8                                            (b) 5
                         (c)  6                                            (d) 7


                      5.  We press ______ + _____ to move cursor at the bottom of the document.
                         (a)  Ctrl + End                                   (b)  Ctrl + Up Arrow Key

                         (c)  Ctrl + Left Arrow Key                        (d)  Page Down + Down Arrow Key


                      6.  Two people can use _________ to listen to audio output in the from of music or
                         sound.

                         (a)  speakers                                     (b) headphones
                         (c)  microphones                                  (d) telephone


                      7.  Acts of stealing data of users is called _________.
                         (a)  cyber crime                                  (b)  hacking

                         (c)  robbery                                      (d) stealing




                                                                                                                    77
   84   85   86   87   88   89   90   91   92