REVISION WORKSHEET CLASS VIII

 

1.      A computer virus mainly spreads through ________.
a) Infected files ✅
b) Keyboard
c) Monitor

2.      Which HTML tag is used to create a table?
a) <table>
b) <tab>
c) <tr>

3.      Which device is used to enter data into a computer?
a) Printer
b) Keyboard ✅
c) Speaker

4.      The tag that stores data in a cell.
a) <td>....</td>
b) <tr>......</tr>
c) <th>.......</th>

5.      Which of the following is an example of hardware?
a) Monitor ✅
b) Windows
c) MS Word

6.      Online shopping is an example of ________.
a) E-learning
b) E-commerce ✅
c) Networking

7.      When a piece of machinery stops functioning.
a) Malfunction
b) Hacking
c) Defragment

8.      Protecting personal information online is called ________.
a) Cyber safety ✅
b) Formatting
c) Editing

9.      Which of the following is not an e-commerce website?
a) LinkedIn
b) Pinterest
c) Amazon

d) pexel

    10. A malicious software or a program that is developed for the purpose of harming the computer system.
            a) Virus
            b) Worm
            c) Both a and b ✅

 

 

 

 

2. Define the terms-

a) Twitter:
Twitter is a social media platform where users post and share short messages, images, and videos called tweets.

b) Cellspacing:
Cellspacing is the space between the cells of a table in HTML.

c) Cellpadding:
Cellpadding is the space between the content inside a table cell and the cell’s border in an HTML table.

Re-write the false statements to its correct form:-

·  HTML is a programming language.
→ HTML is a markup language.

·  A virus helps to speed up a computer.
→ A virus harms a computer and slows it down.

·  The <tr> tag is used to create a table.
→ The <table> tag is used to create a table.

·  Cybercrime is always safe and legal.
→ Cybercrime is illegal and unsafe.

·  Cellpadding is the space between table cells.
→ Cellspacing is the space between table cells.

·  Twitter is an e-commerce website.
→ Twitter is a social networking website.

·  Hardware means computer programs.
→ Hardware refers to the physical parts of a computer.

·  Phishing protects your personal information.
→ Phishing is an attempt to steal personal information.

·         Worm don’t infect files with .exe,.com and .sys file extensions.

→Worms infect files with .exe, .com and .sys file extensions.


 1. Write HTML code to create the following table:           

                                                             

| City    | State     | Country                               

| Delhi   | Delhi     | India                                 

| Mumbai  | Maharashtra| India                                

| Jaipur  | Rajasthan | India                                 


2. Write HTML code to display the following table:                                                                       

| Fruit   | Color  | Price                                   

| Apple   | Red    | 120                                     

| Banana  | Yellow | 40                                      

| Grapes  | Green  | 80                                      


 

Comments

Popular posts from this blog

CHAPTER 4 RAISING QUERIES CLASS 8 COMPUTER

Social networking and Being cyber smart CLASS 8