Page 146 - Viva ICSE Computer Studies 7 : E-book
P. 146
B Name the following.
1. Number of keys on a keyboard _______________
2. Keys used to perform a specifi c task _______________
3. Base of octal number system _______________
4. Letters and digits of hexadecimal number system _______________ _______________
5. Two polymorphic viruses _______________ _______________
6. Viruses designed to perform targeted activities _______________
7. Year in which Indian Copyright Act was passed _______________
8. Examples of cyberbullying _______________ _______________
9. Shortcut key combinations to switch between worksheets _______________
10. Location of Close button in Excel 2016 _______________
11. Any three attributes used in HTML
_______________ _______________ _______________
12. Allows you to link diff erent sections of the same web page _______________
13. Attribute to draw border around the cells of the table _______________
14. Syntax for cell spacing _______________
15. Tab to select date and time in Excel 2016 _______________
16. Command used to cancel the last action performed in Excel 2016 _______________
17. Database objects _______________
18. Full form of RDBMS _______________
19. Two sorting options in Access 2016 _______________ _______________
20. Pane that displays the tables selected for the query in Access 2016 _______________
C State whether the following statements are true or false.
1. All the activities related to the connected devices start and end up
in the motherboard. ___________
2. The information stored in SRAM has to be refreshed after every
few milliseconds. ___________
3. A borrow is taken from next higher bit in order to subtract a higher
bit from a lower bit. ___________
4. Two binary digits cannot be multiplied. ___________
5. Spyware can also change the computer’s settings resulting in slow speed. ___________
134