0% found this document useful (0 votes)
8 views8 pages

CCO-previous-year-for-Class-7

The CREST Cyber Olympiad (CCO) for Class 7 consists of a 1-hour exam with 50 questions divided into two sections: Computer & IT and Achievers' Section, totaling 60 marks. Candidates must fill out an OMR sheet and adhere to strict examination rules, including no negative marking and the prohibition of electronic devices. The exam tests knowledge on various computer-related topics, including software applications and cybersecurity measures.

Uploaded by

thddfvfrdfdedf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

CCO-previous-year-for-Class-7

The CREST Cyber Olympiad (CCO) for Class 7 consists of a 1-hour exam with 50 questions divided into two sections: Computer & IT and Achievers' Section, totaling 60 marks. Candidates must fill out an OMR sheet and adhere to strict examination rules, including no negative marking and the prohibition of electronic devices. The exam tests knowledge on various computer-related topics, including software applications and cybersecurity measures.

Uploaded by

thddfvfrdfdedf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

CREST Cyber Olympiad (CCO)

Previous Year Paper (2022-23)

Class 7 (Set - A)
Time Allowed: 1 hour Maximum Marks: 60

• Additional 10 minutes will be allotted to fill up information on the OMR Sheet, before the
start of the exam.
• Fill in all the mandatory fields clearly on the OMR Sheet.
• There are a total of 50 questions in this booklet comprising 2 sections namely
the Computer & IT and Achievers' Section consisting of 40 questions (1 mark each)
& 10 questions (2 marks each) respectively.
• There is no negative marking. The use of a calculator is not permitted.
• There is only ONE correct option to a given question.
• Use HB Pencil / Ball point pen (Blue / Black) only for marking the correct choice of
answers on the OMR Sheet.
• Rough work is to be done in the space provided in the test booklet. Extra plain sheet may
be provided by the school for the rough work.
• The OMR Sheet is to be handed over to the invigilator at the end of the exam.
• No candidate is allowed to carry any textual material, printed or written, bits of paper, any
electronic device, digital watches, etc. inside the examination hall.
• The use of unfair means may result in the cancellation of the exam. Any such instances
must be reported at +91-98182-94134 or [email protected]

DO NOT OPEN THIS BOOKLET UNTIL ASKED TO DO SO


FILL IN THE DETAILS

Candidate Name: _______________________________________________


Class: _________ Section: ____________________________________
CREST ID: _____________________________________________________
Computer & IT (Each Question is 1 Mark)
1. In MS PowerPoint, which of the following b. Do not share your passwords with
is frequently used with text to enhance anyone. Keep changing the
the clarity and readability of the text? passwords regularly.
c. Use personal information or common
a. Tables b. Spellings words in your passwords.
c. Graphics d. Functions d. Download only trusted applications
from reputed sources.
2. Fill in the blank:
In MS Excel, the cell with the bold 6. What is the technical term for trying to
boundary is called _________. gain confidential information and data
from you by making your false identity?

a. Phishing b. Malware
c. Spyware d. Virus

a. Passive Cell b. Display cell 7. Identify the logo of the operating system
c. Sleeping cell d. Active cell presented below:

3. How many worksheets does a MS Excel


workbook contain by default?

a. 3 b. 16
c. 256 d. 15
a. Android b. Ubuntu
4. Which of the following MS PowerPoint c. Linux d. iOS
feature allows the user to create a simple
presentation without having to spend too 8. An excel user has currently selected a
much time on it? certain cell and wants to move to another
cell using the keyboard. He can do this
a. Animation using which of the following options?
b. Chart wizard
c. Color schemes a. The mouse
d. AutoContent wizard b. The arrow keys
c. The arrow keys along with the ‘Ctrl’
5. Which of the following is not a cyber key
safety measure that helps to promote d. The arrow keys along with the 'Shift'
positive and safe online behaviour key
among users?
9. Fill in the blank:
a. Do not click on unknown links or The image shown below is the most
ambiguous URLs. popular port in computer and laptops
available to connect external devices. It
is called _____________.

Copyright © CREST Olympiads 1 www.crestolympiads.com


group of Insert Tab, you can find the
option Pictures?

a. Illustrations b. Tables
c. Links d. Text
a. HDMI b. VGA
c. USB d. Ethernet 14. MS Word lets you display the same text
on top of each page. Which of the
10. Fill in the blank: following option will you use to do so?
The image below is the logo of the
world's most popular mobile operating a. Footer
system, known as ____________. b. Header
c. Page Number
d. Date and Time

15. The bookmark option in MS Word lets


you jump to a specific location in your
document. Which shortcut key is used to
a. Symbian b. Ubuntu open the Bookmark dialog box?
c. Android d. iOS
a. Ctrl + K
11. In Windows 10, the user profiles allow b. Ctrl + Shift + F5
more than one person to use the same c. Ctrl + H
computer. Which of the following d. Alt + F4
safeguards are provided in such a
situation? 16. Which formula lets you enter both Date
and Time on a worksheet in MS Excel?
a. Each user’s information is stored
separately a. = Sum () b. = Now ()
b. Each user’s working environment is c. = Today () d. None of these
protected
c. Each user’s app usage is unique 17. Bruno wants to add sound to be played
d. All of the above across all the slides of his MS
PowerPoint presentation. Which option
12. Computer network consists of two or under Playback Tab he should check so
more computers connected together. that sound is played across all the
What is/are the benefit(s) of networking? slides?

a. File Sharing a. Volume


b. Easier access to Resources b. Play across slide
c. Easier Backups c. Loop until stopped
d. All of these d. Hide during Show

13. MS Word lets you insert pictures from 18. Which of the following two kinds of sound
your computer into your document to effects files can be added to a MS
make it look attractive. Under which PowerPoint presentation?

Copyright © CREST Olympiads 2 www.crestolympiads.com


a. .wav and .mid files 24. Which of the following is the computer
b. .wav and .aac files code for the interchange of information
c. .wav and .mp3 files between terminals?
d. .jpg and .gif files
a. Unicode b. BCD
19. Fill in the blank: c. ASCII d. EBCDIC
Computer instructions written with the
use of English words instead of binary 25. Which of these is the first web-based e-
machine code is called ________. mail service?

a. gray code a. Gmail b. Yahoo Mail


b. symbolic code c. Hotmail d. Rediff Mail
c. operational code
d. opcode 26. Fill in the blank:
The _________ cells involve creating a
20. All the computers on a computer network single cell by combining two or more
are connected with a cable line. Network selected cells in the MS Excel
cable lines are on which of the following worksheet.
layers?
a. formatting b. merging
a. Application b. Physical c. embedding d. splitting
c. Network d. Transport
27. Which of the following term is used for
21. In MS Word, what is the maximum the time during which a job is processed
number of lines you can set for a drop by the computer?
cap?
a. Delay time
a. 3 b. 10 b. Memory mapping time
c. 15 d. 20 c. Fetch time
d. Execution time
22. In order to tell Excel that we are entering
a formula in a cell, we must begin with an 28. Fill in the blank:
operator. Which of the following is that _________ is a simulation of movement
operator? created by displaying a series of picture.

a. $ b. @ a. Graphics b. Picture
c. + d. = c. Animation d. Sound

23. Fill in the blank: 29. Which among the following is not an
The shortcut bination used to increase advantage of Cache Memory?
the font size in MS Word is ________.
a. It is faster than the main memory.
a. Ctrl + Shift + G b. It has limited capacity.
b. Ctrl + Shift + > c. It consumes less access time as
c. Ctrl + Shift + < compared to main memory.
d. Ctrl + Shift + X d. It stores data for temporary use.

Copyright © CREST Olympiads 3 www.crestolympiads.com


30. Fill in the blank: b. Social engineering
The computer shown in the given image c. Spoofing
is found in _______ generation. d. Spamming

35. Complete the following sentence:


In a MS Word document, if you press Ctrl
+ O, ____________.

a. the last activity will be undone


a. second b. third b. the group ‘Clipboard’ of Home Tab
c. fourth d. fifth will be opened
c. the group ‘Paragraph’ of Layout Tab
31. Fill in the blanks: will be opened
The difference between memory and d. the open dialog box to open the
storage is that the memory is _________ existing file will be opened
and storage is _________.
36. Which of the following is not a core layer
a. temporary, permanent in Web Service Protocol Stack?
b. permanent, temporary
c. slow, fast a. Service Transport
d. large, small b. XML Messaging
c. Service Description
32. What is the shortcut key to repeat the d. Service Locator
recent find in MS PowerPoint
presentation? 37. A computer virus generally contains 3
parts. Which among the following is not a
a. CTRL + F4 b. SHIFT + F4 part of the computer virus?
c. CTRL + F5 d. SHIFT + F5
a. Infection mechanism
33. Fill in the blank: b. Damage
In computer security, ______ means that c. Trigger
the information in a computer system is d. Payload
accessible only to authorized parties for
reading. 38. In Windows 10, there is a virtual desktop
feature. What is this feature called?
a. confidentiality b. integrity
c. availability d. authenticity a. Status View
b. Task View
34. Identify the term with the help of the c. Windows View
description given below: d. Desktop View
Tricking people into revealing their
password by pretending to be legitimate 39. Fill in the blanks:
users or members of a company in order With _____ only one process can
to get information. execute at a time; meanwhile all other
processes are waiting for the processor.
a. Snooping With ______ more than one process can

Copyright © CREST Olympiads 4 www.crestolympiads.com


run simultaneously each on a different 40. ISP exchanges internet traffic between
processor. their networks by using which of the
following?
a. multiprocessing, multiprogramming
b. multiprogramming, single tasking a. Internet exchange point
c. multiprogramming, multiprocessing b. Subscriber end point
d. single tasking, multiprocessing c. Internet end point
d. ISP end point

Achievers’ Section (Each Question is 2 Marks)


41. In context to MS Excel, what do we call a. Word Art b. Mail Merge
the process in which data is taken from a c. Cover Page d. Page Layout
specific cell that is available in different
sheet? 44. Identify the term with the help of the
description given below:
a. Accessing b. Updating
c. Functioning d. Referencing i. It is a fraudulent attempt to obtain
sensitive information such as
42. Which one of these is a protocol that usernames, passwords and credit
helps in providing e-mail facility within a card details by disguising oneself as
range and in different hosts? a trustworthy entity in an electronic
communication.
a. SMTP b. FTP ii. It occurs when an attacker,
c. TELNET d. SNMP masquerading as a trusted entity,
dupes a victim into opening an
43. Identify the tool with the help of the email, instant message, or text
description given below: message.
iii. It is a cyber-attack that uses
i. It is a useful tool that will let you disguised email as a weapon.
easily produce multiple letters, iv. The term is said to have been coined
labels, name tags, and more using by the well-known spammer and
information stored in a list, database hacker in the mid-90s, Khan C
or spreadsheet. Smith.
ii. It is the process of combining a list of
data with a template. a. Spoofing b. Hacker
iii. It is used to create multiple c. Phishing d. Cracker
documents at once. These
documents have identical layouts, 45. Match the following:
formatting, text, and graphics.
iv. Only specific sections of each Column A Column B
document vary and are a. Antivirus i. It is a computer
personalised. maintenance
v. The documents Word can create utility included in
with this tool include bulk labels, Microsoft
letters, envelopes and emails. Windows

Copyright © CREST Olympiads 5 www.crestolympiads.com


designed to free menu followed by Paste Special.
up disk space on Select New Auto Correct Entry and
a computer's then click OK.
hard drive.
b. Disk ii. It is the process 47. MS PowerPoint can insert objects from
cleanup of preparing a which of the following add-ins?
data storage
device such as a a. Equation Editor
hard disk drive, b. Organization Chart
solid-state drive, c. Photo Album
memory card or d. All of these
USB flash drive
for initial use. 48. In Windows 7, Snipping Tool is used to
c. Disk iii. It is a computer capture screenshots or snips of any
Formatting program used to object on your screen. Which of the
prevent, detect, following snips is not supported by the
and remove Snipping Tool when you navigate to Start
malware. > All Programs > Accessories > Snipping
Tool?
a. (a) - (ii), (b) - (iii), (c) - (i)
b. (a) - (iii), (b) - (i), (c) - (ii) a. Window Snip
c. (a) - (ii), (b) - (i), (c) - (iii) b. Full-Screen Snip
d. (a) - (iii), (b) - (ii), (c) - (i) c. Rectangular Snip
d. All of the above snips are supported
46. Complete the following sentence: by the Snipping Tool
If you want to convert a symbol or
several lines of text into an AutoCorrect 49. Which of the following statements about
entry, you should __________. Sticky Notes in Windows 7 is/are
correct?
a. insert the symbol or type the text in a
Word document first. Then, select the a. You can format text, add bullets to
text or symbol and go to the make a list, or change the text size
AutoCorrect dialog box. by using keyboard shortcuts.
b. click the Tools menu and choose b. You can resize a note by dragging an
AutoCorrect Options. Then, click the edge or corner of the note to make it
Insert menu and choose Symbol (or larger or smaller.
click the Format menu and choose c. You can change the color of the
Paragraph) to add the symbol or sticky note.
paragraph to Auto Correct. d. All of the above
c. AutoCorrect can only accommodate
one line of text. It is not possible to 50. Match the following:
convert a symbol or multiple lines of
text into an Auto Correct entry. Column I Column II
d. insert the symbol or type the text in a i. Rotation a. The time taken for a
Word document first. Then, select the Delay hard disk controller to
text or symbol and click the Edit

Copyright © CREST Olympiads 6 www.crestolympiads.com


locate a specific piece a. (i) - (b), (ii) - (c), (iii) - (a)
of stored data. b. (i) - (c), (ii) - (a), (iii) - (b)
ii. Access b. A condition in which c. (i) - (b), (ii) - (a), (iii) - (c)
Delay each packet sent d. (i) - (c), (ii) - (b), (iii) - (a)
through network
experience excessive
delay because the
network is overrun
with packets.
iii. Seek c. The time between
Time information requests
Delay and how long it takes
the hard drive to
move to the correct
sector.

Answer Key
1. c 2. d 3. a 4. d 5. c 6. a 7. c 8. b 9. c 10. c
11. d 12. d 13. a 14. b 15. b 16. b 17. b 18. a 19. b 20. b
21. b 22. d 23. b 24. c 25. c 26. b 27. d 28. c 29. b 30. d
31. a 32. b 33. a 34. a 35. d 36. d 37. b 38. b 39. d 40. a
41. d 42. a 43. b 44. c 45. b 46. a 47. d 48. d 49. d 50. d

Copyright © CREST Olympiads 7 www.crestolympiads.com

You might also like