REVISION WORKSHEET CLASS VIII
1.
A computer virus mainly spreads through ________.
a) Infected files ✅
b) Keyboard
c) Monitor
2.
Which HTML tag is used to create a table?
a) <table>
✅
b) <tab>
c) <tr>
3.
Which device is used to enter data into a computer?
a) Printer
b) Keyboard ✅
c) Speaker
4.
The tag that stores data in a cell.
a) <td>....</td>
✅
b) <tr>......</tr>
c) <th>.......</th>
5.
Which of the following is an example of hardware?
a) Monitor ✅
b) Windows
c) MS Word
6.
Online shopping is an example of ________.
a) E-learning
b) E-commerce ✅
c) Networking
7.
When a piece of machinery stops functioning.
a) Malfunction ✅
b) Hacking
c) Defragment
8.
Protecting personal information online is called
________.
a) Cyber safety ✅
b) Formatting
c) Editing
9.
Which of the following is not an e-commerce website?
a) LinkedIn
b) Pinterest
c) Amazon
d) pexel
10. A malicious software or a
program that is developed for the purpose of harming the computer system.
a) Virus
b) Worm
c) Both a and b ✅
2. Define the terms-
a) Twitter:
Twitter is a social media platform where users post and share short messages,
images, and videos called tweets.
b)
Cellspacing:
Cellspacing is the space between the cells of a table in HTML.
c) Cellpadding:
Cellpadding is the space between the content inside a table cell and the cell’s
border in an HTML table.
Re-write the false statements to its correct form:-
·
HTML
is a programming language.
→ HTML is a markup language.
·
A
virus helps to speed up a computer.
→ A virus harms a computer and slows it down.
·
The <tr>
tag is used to create a table.
→ The <table> tag is used to create a
table.
·
Cybercrime
is always safe and legal.
→ Cybercrime is illegal and unsafe.
·
Cellpadding
is the space between table cells.
→ Cellspacing is the space between table cells.
·
Twitter
is an e-commerce website.
→ Twitter is a social networking website.
·
Hardware
means computer programs.
→ Hardware refers to the physical parts of a computer.
·
Phishing
protects your personal information.
→ Phishing is an attempt to steal personal information.
·
Worm
don’t infect files with .exe,.com and .sys file extensions.
→Worms infect files with .exe, .com and .sys file
extensions.
1. Write HTML code to create the following table:
| City | State | Country
| Delhi | Delhi | India
| Mumbai | Maharashtra| India
| Jaipur | Rajasthan | India
2. Write HTML code to display the following table:
| Fruit | Color | Price
| Apple | Red | 120
| Banana | Yellow | 40
| Grapes | Green | 80
Comments
Post a Comment