Section 1: Fundamentals of Computer, Evolution of Computers, Memory & Storage Devices, Using Windows, MS-Word (Links, Mail Merge, Macros, Exploring Styles Group), MS-PowerPoint (Working with Slides Master and Themes, Advancing Slides using Hyperlink and Actions, Customizing and Broadcasting Slide Shows), MS-Excel (Components of MS-Excel Window, Editing and Formatting Cells in a Worksheet, Introduction to Formulas, Sorting and Filtering Data, Macros, Features of Insert and Page Layout Tabs), Internet & Viruses, Networking, Latest Developments in the Field of IT.
Achievers Section: Higher Order Thinking Questions - Syllabus as per Section 1.
Questions are based on Windows 7 and MS-Office 2010.
Q.1 | Q.2 | Q.3 | Q.4 | Q.5 | Q.6 | Q.7 | Q.8 | Q.9 | Q.10 |
Q.1 |
Fill in the blank: Special effects used to introduce slides in a presentation are called ________. |
|||
Q.2 |
Touch screen Input devices such as the ones by android phones convert touch gestures into commands. Match the following gestures with the actions executed:
|
|||||||||||
Q.3 |
Which area in an Excel window displays data or formulas of an active cell? |
|||
Q.4 |
Match the following QBASIC programming elements:
|
|||||||||||
Q.5 |
Which of the following file format(s) is/are supported in Windows 7? |
|||
Q.6 |
You use a shortcut key to complete the work quickly with the help of a keyboard. CTRL+F4 key is used for which of the following purpose? |
|||
Q.7 |
Which of the following statement(s) is/are true concerning memory: Statement 1: Virtual memory is the space on the hard drive where the operating system begins to store data when it becomes memory-bound |
|||
Q.8 |
Identify the system unit based on the description given below: A complete electronic circuit with transistors and other electronic components on a small silicon chip. |
|||
Q.9 |
Fill in the blank: A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is referred to as a ________. |
|||
Q.10 |
Identify the term based on the description given below: i. It is a prepared application that takes advantages of a known weakness. |
|||
Your Score: 0/10
Sample PDF of CREST Cyber Olympiad for Class 7:
If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF
Answers to Sample Questions from CREST Olympiads:
Q.1 : c | Q.2 : d | Q.3 : c | Q.4 : b | Q.5 : a | Q.6 : c | Q.7 : b | Q.8 : d | Q.9 : b | Q.10 : a