Class 7Computer Chapter 2 Questions and Answers. We provided the Class 7Computer Chapter 2 Question and Answers pdf in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android App from the Google Play Store and prepare for any competitive government exams for free.
Explanation: A DVD-ROM reads data using a highly focused laser beam that detects microscopic patterns on the disc surface. These patterns represent digital information stored as pits and lands. The laser’s wavelength is crucial because it determines how small these pits can be and how much data can be packed into the disc. Optical systems convert reflected Light variations into binary data for Computer processing.
DVD Technology uses a shorter wavelength laser than earlier optical formats, which allows for greater precision and higher storage density. The disc has a tightly packed spiral track, and the laser must accurately follow it to read data correctly. This improved optical resolution enables DVDs to store significantly more information compared to older storage media, while maintaining reliability and data accuracy during reading operations.
Explanation: CD-ROM and DVD-ROM are optical storage media designed to store large amounts of digital information in a structured and durable format. They are commonly used for distributing multimedia content that includes a combination of text, images, audio, and video. Since they are read-only or write-once in nature, they are stable for long-term storage and sharing of data.
These discs store information in a spiral track, and a laser reads the encoded patterns to interpret digital data. Their ability to manage multiple forms of media makes them suitable for multimedia applications such as educational resources, movies, software installations, and digital archives. The integration of different data types in a single medium makes them efficient and widely used in both academic and entertainment fields.
Option 3 – Multimedia data
CD-ROM and DVD-ROM are very suitable for storing multimedia data such as …….
Explanation: CD-ROM and DVD-ROM are optical storage media designed to hold large digital files that combine different types of content. Multimedia data refers to information that includes a mix of visual and audio elements, often used together to create rich digital experiences. These discs store data in the form of microscopic patterns arranged in a spiral track, which are read by a laser system.
Because they can handle multiple formats in a single medium, they are widely used for educational materials, entertainment content, and software distribution. The stored information is read-only or permanently written, making it stable and reliable for long-term use. Their structure allows efficient storage and retrieval of combined digital content, making them ideal for rich media applications involving different types of files together.
Explanation: Magnetic tape is a storage device where data is recorded in a continuous sequence along a long strip of magnetic material. Unlike modern storage systems that allow direct access, tape requires data to be read in a specific order from start to finish.
This sequential structure means that to reach a particular piece of information, the system must pass through earlier stored data step by step. It is commonly used for backup and archival purposes where large amounts of data are stored and accessed in a linear fashion. Although slower in retrieval compared to random access storage, it remains useful for long-term storage due to its cost efficiency and high capacity.
Option 3 – Sequential
The storage capacity of a hard disk is.
1. That of a floppy disk of More than
2. Less than
3. Equal to
4. Less than or equal to
Explanation: A hard disk is a permanent storage device used in computers to store large amounts of digital information. Its storage capacity refers to how much data it can hold, including operating systems, applications, documents, images, videos, and other files. This capacity is one of its most important features.
Hard disks store data magnetically on rotating platters, and information is accessed using read/write heads. The capacity depends on factors like the number of platters, data density, and modern manufacturing Technology. Compared to older storage devices like floppy disks, hard disks provide extremely high storage space, making them essential for modern computing systems that handle large and complex data sets.
Option 1 – That of a floppy disk of More than
A special type of faster memory is called as ……. that of a floppy disk.
1. Speed
2. Cache
3. Cash
4. Fast
Explanation: Computer systems use different types of memory based on speed and purpose. Some memory types are designed to work much faster than traditional external storage devices like floppy disks. These faster memory systems help improve overall system performance by reducing data access time.
Such memory is usually closer to the processor or used temporarily to store frequently accessed data. This reduces the need to repeatedly read from slower storage devices. As a result, the system operates more efficiently and responds faster during processing tasks. Faster memory plays a key role in bridging the speed gap between the processor and long-term storage devices.
Explanation: Dynamic RAM is a type of volatile memory used in computers for temporarily storing data and instructions while a system is running. It is called “dynamic” because it needs constant refreshing to retain stored information.
This memory is widely used as the main system memory because it provides a good balance between cost and storage capacity. It allows the processor to quickly access active programs and data during operation. Although it is slower than some advanced memory types, it is essential for everyday computing tasks and forms a fundamental part of Computer architecture.
Option 1 – Dynamic RAM
Laser in CD ROM is
1. 0.8 microns
2. 0.74 microns
3. 0. 78 microns
4. None of these
Explanation: A CD-ROM uses a laser beam to read digital data stored on its surface in the form of pits and lands. These patterns represent binary information that the computer interprets as digital data.
The laser detects changes in reflected Light to distinguish between pits and flat areas. The wavelength used in CD Technology is relatively larger compared to newer optical formats, which limits data density. Data is arranged in a spiral track, and the laser follows this track while the disc rotates. This system enables reliable storage of audio, software, and basic multimedia content.
Explanation: Optical storage devices like DVDs store information using microscopic pits on the disc surface. These pits represent binary data, and their size plays a major role in determining storage capacity.
In DVDs, the pit size is smaller compared to earlier optical technologies, allowing more data to be packed into the same space. A laser reads these pits by detecting differences in Light reflection. The smaller pit structure requires more precise laser Technology, which enables DVDs to store significantly more data than CDS while maintaining accurate data reading.
Option 2 – 0.4 microns
Spiral in CD-ROM is
1. 2.6 microns
2. 1.6 microns
3. 0.74 microns
4. None of these above
Explanation: A CD-ROM stores data in a single continuous spiral track that begins at the center of the disc and moves outward. This spiral arrangement allows data to be read sequentially as the disc spins.
The laser follows this spiral path to access information in order. Since the data is stored in a continuous line, it is not accessed randomly but in a structured sequence. This design is efficient for playing audio and reading stored digital content but limits storage capacity compared to more advanced optical formats that use denser track structures.
Explanation: DVD-ROM also stores data in a spiral track similar to CDS, but the spiral is much more tightly packed. This allows significantly more data to be stored on the same disc surface.
The tighter spacing between tracks increases storage density, and combined with smaller pit size and shorter laser wavelength, it greatly enhances capacity. The laser reads the spiral continuously as the disc rotates. This improved structure is one of the main reasons DVDs can store much larger multimedia files compared to CDS.
Option 3 – 0.74 microns
The pit size in CD ROM is
1. 0.8 microns
2. 0.4 microns
3. 0.78 microns
4. None of these
Explanation: CD-ROM stores data using pits and lands on its surface, where each pit represents encoded binary information. These pits are relatively larger compared to newer optical storage technologies.
A laser reads these surface variations to interpret data. Because the pit size is larger, fewer data points can fit on the disc, resulting in lower storage capacity. This is one of the key limitations of CDS compared to DVDs, which use smaller pits to increase data density and storage efficiency.
Explanation: EDO RAM is an improved version of dynamic memory designed to enhance data transfer efficiency between memory and processor. It allows new data to be accessed while previous data is still being output, reducing delays.
This overlapping process improves system performance compared to older memory types. It was widely used in earlier computer systems to increase speed and responsiveness. Although replaced by modern memory technologies, it played an important role in improving memory efficiency during its time.
Explanation: PBS RAM refers to a type of memory concept associated with improving data handling speed through advanced buffering techniques. It is designed to enhance performance by managing data flow more efficiently between memory and processing units.
Such memory systems aim to reduce delays by allowing faster data transfer and improved synchronization. While not commonly used in modern systems, the concept reflects efforts in computer architecture to increase memory speed and efficiency. These improvements help bridge the gap between processor speed and memory access time in computing systems.
Option 1 – Pipe fact line burst RAM
ECC DRAM ……..
1. Expected correcting circuit dynamic RAM
2. Error-correcting circuit dynamic RAM
3. Earning computer DRAM
4. None of these
Explanation: ECC DRAM is a type of dynamic memory that includes an additional mechanism for detecting and correcting errors during data storage and retrieval. In normal memory systems, small data errors can occur due to electrical interference or hardware faults, which may lead to incorrect results.
This memory improves reliability by automatically identifying single-bit errors and correcting them without user intervention. It is commonly used in systems where data accuracy is very important, such as servers and scientific computers. By reducing the risk of corrupted data, ECC DRAM enhances system stability and ensures more dependable processing during long-running operations.
Option 2 – Error-correcting circuit dynamic RAM
V RAM
1. Video random access memory
2. Visual random access memory
3. Volatile random access memory
4. None of these
Explanation: VRAM is a specialized type of memory used primarily for storing image and video data that is being displayed on the screen. It helps the graphics system access visual information quickly, ensuring smooth rendering of images and animations.
This memory is typically used in graphics cards and display systems where high-speed access to visual data is required. It allows the processor to handle other tasks while the graphics system independently manages screen updates. By improving data transfer speed for visuals, it enhances overall display performance and reduces lag in graphic-intensive applications such as games and video processing.
Option 1 – Video random access memory
EE PROM
1. Error expecting PROM
2. Electrically erasable PROM
3. Error erasable PROM
4. None of these
Explanation: EEPROM is a type of non-volatile memory that can be electrically erased and rewritten multiple times. Unlike temporary memory, it retains stored information even when the power is turned off, making it useful for storing important system data.
It is commonly used in devices where small amounts of data need to be updated occasionally without replacing the hardware. The ability to rewrite data electronically provides flexibility and durability. This makes EEPROM valuable in applications such as firmware storage, configuration settings, and embedded systems that require persistent memory.
Option 2 – Electrically erasable PROM
BIOS ………
1. Button instruction operating system
2. Basic input-output system
3. Business information organization system
4. None of these
Explanation: BIOS is a fundamental system software stored on a computer’s motherboard that helps initialize hardware when the system is powered on. It performs essential checks and prepares the system for loading the operating system.
It manages Communication between the processor and basic hardware components like keyboard, storage devices, and memory during startup. This low-level software ensures that all essential hardware is functioning correctly before handing control to the operating system. Without it, a computer cannot properly boot or begin its normal operations.
Option 2 – Basic input-output system
SRAM stands for …….
1. Static RAM
2. Super RAM
3. Supreme RAM
4. None of these
Explanation: SRAM is a type of fast memory used in computers to store data that needs quick access by the processor. Unlike dynamic memory, it does not require constant refreshing, which makes it faster and more stable.
It is commonly used in cache memory to improve system performance by reducing data access time. Although it is faster than other memory types, it is also more expensive and consumes more space. Because of these factors, it is used in limited but performance-critical areas of computer systems.
Option 1 – Static RAM
SDRAM
1. Synchronous dynamic RAM
2. Super develop RAM
3. Supreme develop RAM
4. None of these
Explanation: SDRAM is a type of dynamic memory that operates in synchronization with the system clock, allowing faster and more efficient data processing. This synchronization helps improve the coordination between memory operations and the processor.
Because it works in sync with the CPU clock cycles, data transfer becomes more organized and faster compared to older asynchronous memory types. It is widely used in computer systems for main memory due to its improved speed and efficiency. SDRAM played a major role in enhancing overall system performance in modern computing architectures.
Option 1 – Synchronous dynamic RAM
The sequence of events that occurs in the computer when it is interpreting & executing an instruction is known as a (n)
A) execution cycle
B) working cycle
C) None of these
D) machine cycle
Explanation: When a computer processes an instruction, it follows a structured internal cycle that ensures proper execution of tasks. This cycle includes fetching the instruction from memory, decoding it to understand the operation, and then executing it using the processor. This organized sequence ensures that every instruction is handled systematically.
During this process, the control unit coordinates all operations while the arithmetic logic unit performs required calculations. Memory temporarily stores data being processed. This continuous cycle repeats millions of times per second in modern processors, allowing computers to perform complex operations efficiently and accurately. The entire mechanism is fundamental to how CPUs function.
Option a – execution cycle
Codes consisting of bars or lines of varying widths or lengths that are computer-readable are known as
A) an ASCII code
B) None of these
C) a barcode
D) an OCR scanner
Explanation: These codes represent data in a visual pattern made up of parallel lines with different thicknesses and spacing. Each pattern encodes specific information that can be scanned and interpreted by a computer using optical scanners.
When a scanner reads the pattern, it converts the Light reflections into digital data that identifies products or items. This system is widely used in retail, logistics, and inventory management to quickly track and process information. It improves accuracy and reduces manual entry errors in data handling systems.
Option c – a barcode
The ……… of a system includes the programs or instructions.
A) hardware
B) Icon
C) peripheral
D) Software
Explanation: A computer system consists of both physical components and logical instructions that control its functioning. The SET of programs and instructions that direct the hardware operations is a crucial part of the system.
These instructions tell the computer how to perform tasks such as processing data, managing files, and running applications. Without these instructions, hardware alone cannot perform useful work. This logical component is essential for making the computer functional and useful for users in different applications.
Option d – Software
Which of the following computer languages is a mathematically oriented language used for scientific problems?
A) PROLOG
B) APPLE
C) FORTRAN
D) FORTRAN
Explanation: Some programming languages are specifically designed to handle mathematical calculations and scientific computing. These languages are widely used in engineering, Physics, and numerical analysis due to their ability to process complex formulas efficiently.
They support structured mathematical operations, arrays, and numerical functions that simplify scientific problem-solving. Such languages have played an important role in research, simulations, and computational modeling, making them a standard choice in technical and scientific fields.
Option d – FORTRAN
The user generally applies ……… to access the mainframe or supercomputer.
A) Handheld
B) Node
C) Desktop
D) None of these
Explanation: Large computing systems like mainframes and supercomputers are accessed remotely by users through connected systems. These systems act as intermediaries that allow users to interact with powerful centralized computers.
Users typically connect through smaller computing units that serve as entry points to the larger system. This setup enables multiple users to share high-performance computing resources efficiently. It is commonly used in organizations where large-scale data processing and complex computations are required.
Option d – None of these
………. is the process of finding errors in software code.
A) None of these
B) Testing
C) Compiling
D) Debugging
Explanation: During software development, programs may contain mistakes that prevent them from working correctly. Identifying and fixing these mistakes is an important part of the programming process.
This involves carefully analyzing the code to locate logical or syntax errors and correcting them to ensure proper execution. It improves program reliability and performance. This process is essential in software development to ensure that applications function as intended without unexpected behavior.
Option d – Debugging
After a user has saved and deleted many files, many scattered areas of stored data remain that are too small to be used efficiently, causing
A) Turmoil
B) Disarray
C) None of these
D) Disorder
Explanation: When files are frequently created, deleted, and modified, storage space becomes unevenly distributed across the disk. Small unused spaces are left between data blocks, making it difficult to store new large files efficiently.
This condition reduces system performance because the storage device must work harder to manage fragmented data. It can slow down file access and overall system speed. Disk management tools are often used to reorganize data and improve storage efficiency by reducing these scattered empty spaces.
Option d – Disorder
What do we call the arrangement when two or more computers are physically connected by cables to share information or hardware?
Explanation: When multiple computers are connected together using cables or Communication links, they form a system that allows sharing of data and resources. This setup enables devices to communicate and work together efficiently.
Such a configuration is used in homes, offices, and organizations to share files, printers, and internet connections. It improves collaboration and resource utilization among connected systems. The structure can vary in size from small local setups to large-scale Communication systems.
Explanation: A modem is a device that enables digital Communication over telephone lines by converting digital signals into analog signals and vice versa. It acts as an interface between a computer and a Communication medium.
It is typically connected between a Communication line and a computing device to facilitate internet or data transmission. This allows computers to send and receive information over long distances using existing telephone infrastructure. It plays a key role in enabling Network connectivity.
Option a – Serial Port
What is the full form of ROM?
A) Random Opaque Modulator
B) Red Orange Magenta
C) Relative Overlay Module
D) Read Only Memory
Explanation: ROM is a type of computer memory that permanently stores data and instructions required for basic system operations. It is non-volatile, meaning the stored information remains intact even when the power is turned off. This memory is mainly used to store firmware and essential startup instructions.
During computer booting, ROM helps initialize hardware components and loads basic system routines. Since its contents are not easily modified during normal operations, it provides stability and security for critical system functions. This makes it an essential part of computer architecture for reliable startup and hardware control.
Explanation: VoIP is a CommunicationTechnology that allows voice calls to be made over the internet instead of traditional telephone networks. It converts voice signals into digital data packets, which are transmitted over IP networks and then reassembled at the receiving end.
This Technology reduces Communication costs and enables additional features such as video calling and conferencing. It is widely used in modern Communication systems, especially in internet-based calling applications. VoIP plays an important role in digital communication by integrating voice services with internet Technology.
Option c – Voice Over Internet Protocol
What is the primary input device used to enter information & instructions into the computer?
A) Keyboard
B) Printer
C) Scanner
D) Disk drive
Explanation: Input devices are hardware components used to send data and instructions to a computer system. The primary input device allows users to type text, enter commands, and interact with software applications efficiently.
It plays a key role in communication between the user and the computer system by converting human-readable input into machine-readable form. This device is essential for tasks such as document creation, programming, and data entry. Without it, users would not be able to directly control or provide information to the computer.
Explanation: Computer networks require proper security mechanisms to protect data from unauthorized access and cyber threats. Certain weak security practices can make a Network vulnerable to attacks and data breaches.
Insecure configurations allow unauthorized users to access sensitive information or disrupt communication between connected systems. Strong security practices like encryption and authentication are used to protect Network integrity. Maintaining proper security settings is essential to ensure safe and reliable communication across networked devices.
Option c – Static keys
Most World Wide Web pages contain commands in the language:
A) IRC
B) NIH
C) FTP
D) HTML
Explanation: Web pages are created using a markup language that defines the structure and content displayed in web browsers. This language uses tags to format text, images, links, and multimedia elements on a webpage.
It helps browsers interpret and display content in a structured and readable format for users. This language is the foundation of web development and is widely used to create websites across the internet. It allows developers to design interactive and visually organized web pages.
Option d – HTML
The operation of combining two cells into a single cell in Excel is known as:
A) Merge
B) Sum
C) Concatenate
D) Average
Explanation: Spreadsheet software allows users to organize data in rows and columns. Sometimes, multiple adjacent cells are combined to form a single larger cell for better formatting or presentation.
This operation is commonly used to create headings or organize data visually in tables. It improves readability and helps in structuring information more clearly. Once merged, the combined cell behaves as a single unit within the spreadsheet layout.
Option a – Merge
You can keep your personal files/folders in:
A) None of these
B) My Files
C) My Text
D) My Documents
Explanation: Operating systems provide designated locations for users to store and organize personal data such as documents, images, and other files. These folders help maintain a structured file system for easy access and management.
They act as a centralized storage area where users can save and retrieve their personal information. This helps in organizing data efficiently and keeping it separate from system files. It improves file management and ensures better accessibility for users.
Option d – My Documents
The brain of any computer system is:
A) ALU
B) Control unit
C) CPU
D) RAM
Explanation: The central processing unit is responsible for controlling and executing all instructions in a computer system. It performs arithmetic and logical operations and manages data flow between different components.
It acts as the main control center of the computer, coordinating all tasks and ensuring smooth operation. Every instruction processed by the computer passes through this unit. Its performance directly affects the overall speed and efficiency of the system.
Option c – CPU
A program written in machine language is called:
A) Object
B) Machine
C) Assembler
D) Computer
Explanation: Machine language is the lowest level of programming language that uses binary code consisting of 0s and 1s. Programs written in this language can be directly understood and executed by the computer’s processor.
Such programs are hardware-dependent and run very efficiently since no translation is required. However, they are difficult for humans to read and write. This makes them suitable for direct hardware-level instructions but less practical for general programming tasks.
Option c – Assembler
A website is:
A) The source of a Web page.
B) Collection of related Web pages.
C) A collection of contributors.
D) The location from which a Web page originates.
Explanation: A website is a collection of related web pages that are linked together and accessible through the internet. These pages contain information such as text, images, videos, and interactive content.
Websites are hosted on servers and accessed using web browsers through a unique address. They are used for communication, information sharing, education, and business purposes. A website may consist of a single page or multiple interconnected pages depending on its structure and purpose.
Option b – Collection of related Web pages
Tape drive gives ……. access to data:
A) Disastrous
B) Sporadic
C) Random
D) Sequential
Explanation: A tape drive stores data on a long magnetic strip where information is written in a continuous sequence. To access any specific data, the system must move through the tape step by step until it reaches the required location. This makes the retrieval process sequential rather than direct.
Because of this structure, tape drives are not suitable for quick access tasks but are very efficient for large-scale backup and archival storage. They are commonly used where data is stored once and retrieved occasionally. The sequential nature helps in storing huge volumes of information in a cost-effective way, even though access speed is slower compared to modern storage devices.
Option d – Sequential
Which of the following statements is not correct with respect to RAM?
A) It can be accessed randomly
B) It is referred to as primary memory
C) It is volatile in nature
D) It stores data even when the computer is switched off
Explanation: RAM is a primary memory used in computers to temporarily store data and instructions during processing. It allows quick access to active programs and supports smooth system performance. However, it is volatile in nature, meaning data is lost when power is turned off.
Because RAM is designed for temporary storage, it does not retain information permanently. Any statement suggesting permanent storage or retention after shutdown contradicts its actual behavior. RAM plays a crucial role in system speed, but it is not meant for long-term data storage.
Option d – It stores data even when the computer is switched off
……… is the procedure of feeding data in a computer.
A) Process
B) Execution
C) Input
D) Output
Explanation: Computers require data and instructions to perform any task. The process of entering this data into a computer system is an essential part of computer operations. It involves sending information from the user to the system for processing.
This process is carried out using input devices such as keyboards, mice, or scanners. Once entered, the data is processed by the CPU to produce meaningful results. It forms the first stage of the data processing cycle and is fundamental to all computer operations.
Option c – Input
URL stands for:
A) Universal Resource List
B) Uniform Research Locator
C) Universal Research List
D) Uniform Resource Locator
Explanation: A URL is a standardized address used to locate resources on the internet. It provides the exact path to web pages, files, or other online resources, allowing users to access them through a browser.
It consists of different parts such as protocol, domain name, and resource location. This structured format helps browsers identify and retrieve the correct information from servers. URLs are essential for navigating the World Wide Web and accessing online content efficiently.
Option d – Uniform Resource Locator
To perform a computing task, the software uses hardware for four basic functions:
A) Input, processing, storage & output
B) Input, storage, retrieval & display
C) Input, processing, storage & analysis
D) Input, storage, alteration & output
Explanation: A computer system operates through coordination between software and hardware components. Software provides instructions, while hardware executes them to perform tasks efficiently.
The basic functions involved in computing include receiving data, processing it, storing it temporarily or permanently, and producing output. These functions work together in a cycle to complete any computing task. This interaction between hardware and software forms the foundation of all computer operations.
Option a – Input, processing, storage & output
Any data or instructions entered into the memory of a computer are considered
A) Output
B) None of these
C) Storage
D) Input
Explanation: Computers operate by receiving data and instructions from users or external devices. When this information is entered into memory for processing, it becomes the starting point of computer operations.
This data is then processed by the CPU to generate meaningful results. Input is essential because without it, the computer cannot perform any task. It forms the first stage in the data processing cycle, leading to computation and output generation.
Option c – Storage
A __ is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.
A) File
B) Database
C) Data
D) ROM
Explanation: Computers store and manage large amounts of structured information for use by applications. This stored information is organized in a way that allows easy access, retrieval, and management.
Such storage systems are designed to hold data persistently using reliable storage media. They support efficient handling of records and enable applications to perform operations like searching, updating, and organizing information. This makes them essential for managing large-scale structured data in computing systems.
Option a – File
In binary language, each letter of the alphabet and each special character are made up of a unique combination of
A) Eight Kilobytes
B) Eight bytes
C) Eight characters
D) Eight bits
Explanation: Computers use binary language to represent all forms of data, including letters, numbers, and special characters. This system is based on two symbols that form the foundation of digital communication.
Each character is encoded using a specific pattern of binary digits, allowing the computer to store and process text information. These patterns ensure that every character has a unique representation, enabling accurate data processing and communication within computer systems.
Option d – Eight bits
The quickest and easiest way in Word to locate a particular word or phrase in a document is to use the __ command.
A) Search
B) Replace
C) Lookup
D) Find
Explanation: Word processing software includes tools that help users quickly navigate and manage text within documents. One such feature allows users to search for specific words or phrases instantly.
This function scans the entire document and highlights matching text, making it easy to locate information without manually reading through all content. It improves efficiency, especially in large documents, and is widely used for editing and reviewing text.
Option d – Find
The term __ designates equipment that might be added to a computer to enhance its functionality.
A) Disk pack
B) Operating device
C) Peripheral device
D) System device
Explanation: Computers can be expanded with additional devices that improve their capabilities and performance. These external or internal components are used to increase functionality and support different tasks.
Such devices include input, output, and storage components that extend the system’s usefulness. They are not essential for basic operation but enhance performance and usability. These additions allow computers to interact with users and other systems more effectively.
Option c – Peripheral device
__ is the maximum amount of data that can be stored on a storage medium.
Explanation: Storage devices in a computer system are designed to hold digital information such as files, programs, and multimedia content. Each storage medium has a fixed limit on how much data it can contain, which depends on its design and Technology. This limit defines how much information can be saved before the device becomes full.
Different storage devices like hard disks, DVDs, and memory cards have varying capacities based on their structure and data density. Higher capacity means more data can be stored efficiently. This concept is important in computing because it helps users understand how much information a device can handle before requiring additional storage solutions.
Option b – Storage capacity
Which of the following is not a property of fiber optic cabling?
Explanation: Fiber optic cables are used for high-speed data transmission by sending information as Light signals through thin glass or plastic fibers. They are known for high speed, low signal loss, and strong resistance to electromagnetic interference.
Because they use Light instead of electrical signals, they are highly efficient for long-distance communication. However, any characteristic that contradicts these advantages does not belong to fiber optic Technology. These cables are widely used in modern communication systems, including internet and telecommunication networks, due to their reliability and performance.
Option b – Very resistant to interference
Which of the following is not a binary number?
A) 3110
B) 1111
C) 0000
D) 110110
Explanation: Binary numbers are a numerical system used by computers that consists only of two digits: 0 and 1. All digital data inside a computer is ultimately represented using this system.
Any number containing digits other than 0 and 1 does not follow binary rules and therefore cannot be considered a valid binary number. Binary representation is essential for computer processing because it directly matches the on-off states of electronic circuits used in digital systems.
Option a – 3110
The verification process of confirming identity for allowing access to a computer system is called
A) Authorization
B) Login
C) Signup
D) Authentication
Explanation: Computer systems use security mechanisms to ensure that only authorized users can access data and resources. This process involves checking and confirming the identity of a user before granting access.
It typically requires credentials such as passwords, fingerprints, or security tokens. This step is important for protecting sensitive information and preventing unauthorized access. It is widely used in operating systems, online services, and secure applications to maintain data security and system integrity.
Option d – Authentication
Computers manipulate data in many ways and this manipulation is called
A) Utilizing
B) Batching
C) Processing
D) Upgrading
Explanation: Computers are designed to take raw data and perform operations on it to produce meaningful results. This involves performing calculations, comparisons, and logical operations based on instructions given by programs.
The transformation of input data into useful output is a fundamental function of computing systems. It is carried out by the processor using software instructions. This process is essential for all computer tasks, from simple calculations to complex problem-solving in various applications.
Option c – Processing
A __ is a collection of data that is stored electronically as a series of records in a table.
A) Spreadsheet
B) Webpage
C) Presentation
D) Database
Explanation: Modern computing systems store large amounts of structured information in organized formats. One common structure involves storing data in rows and columns, where each entry represents a specific record.
This organized collection allows easy access, modification, and management of data. It is widely used in applications such as banking, education, and business systems. Structured storage helps maintain consistency and enables efficient searching and processing of information.
Option d – Database
Input, output, and processing devices grouped together represent a(n)
A) Information processing cycle
B) Mobile device
C) None of these
D) Computer system
Explanation: A computer system is made up of different components that work together to perform tasks. Input devices send data to the system, processing devices handle calculations and logic, and output devices display results.
When these components are combined, they form a complete system capable of performing all computing functions. This integration allows seamless flow of data from input to processing to output, making the computer fully functional and efficient in handling tasks.
Option d – Computer system
Which of the following is an example of a storage device?
A) None of these
B) Tapes
C) DVDs
D) All of the above
Explanation: Storage devices are used in computers to save data permanently or temporarily for later use. They hold files, programs, and system information that can be accessed when needed.
These devices vary in type and capacity, including magnetic, optical, and Solid-state technologies. Their main function is to preserve data even when the computer is turned off, making them essential for data retention and system operations.
Explanation: Operating systems are software platforms that manage computer hardware and software resources. They provide an interface between the user and the computer system.
Different versions of operating systems are often released with version names or numbers to indicate updates and improvements. These versions include enhancements in performance, security, and user features. They represent successive developments in system software used to operate computers efficiently.
Option b – Mac OS
The terms “push and pull services” in context with the banking are used in which among the following generally?
Explanation: Modern banking systems use digital platforms to provide services to customers remotely. These services allow users to perform transactions and access banking facilities without visiting a branch.
Push and pull services refer to different types of digital transactions involving fund transfers and account operations. They are commonly associated with mobile-based banking systems that enable quick and convenient financial activities. This improves accessibility and efficiency in banking services.
Option d – Mobile Banking
Consider the following in context with the CVV or Card security code of an ATM or Credit Card : 1. Magnetic Stripe 2. Front of the card in embossed or printed digits 3. The back of the card is a separate group of 3 digits to the right of the signature strip At which among the above locations is the CVV or Card Security Code of an ATM found?
A) 1 & 2
B) 2 & 3
C) 1 & 3
D) 1, 2 & 3
Explanation: A card security code is an additional safety feature used in debit and credit cards to verify transactions, especially in online or card-not-present payments. It is designed to reduce fraud by ensuring that the person making the transaction physically possesses the card. This code is not stored in the magnetic stripe or embossed on the front in the same way as card numbers.
Instead, it is printed separately on the card in a specific location for security purposes. This separation ensures that even if someone knows the card number, they still need the additional code to complete certain transactions. It acts as an extra layer of verification in payment systems to improve security and prevent unauthorized use.
Option c – 1 & 3
Alerts mostly appear in?
A) Check Box
B) Combo Box
C) Dialog Box
D) None of these
Explanation: Computer systems and applications often display alert messages to inform users about important events, warnings, or required actions. These alerts are designed to grab user attention immediately and are shown in a specific type of interface window.
Such messages usually appear in small pop-up windows that interrupt the current task and require user acknowledgment before continuing. They are used for notifications like errors, confirmations, or warnings. This helps ensure that users respond to critical system messages in real time and avoid mistakes during computer operations.
Option c – Dialog Box
Which of the following was used in first-generation computers?
A) Machine Language
B) High Language
C) Assembly Language
D) None of these
Explanation: Early computers were built using very basic programming methods and hardware technologies compared to modern systems. These machines operated using direct instructions that were closely tied to hardware design.
The earliest generation of computers relied on low-level instructions that the machine could directly understand without translation. These instructions were written in a form that is extremely close to machine operations, making programming difficult but essential for controlling early computing systems. This marked the beginning of computer programming Evolution.
Option a – Machine Language
A unit of data storage that equals 2 to the 70th power is called?
A) Zebibyte
B) Yottabyte
C) Yobibyte
D) None of these
Explanation: Digital storage units are measured in increasing powers of two to represent very large quantities of data. As data storage Technology evolved, new units were created to describe extremely large storage capacities used in modern computing systems.
These large units are part of binary-based measurement systems used in computers. They help define massive data storage in areas such as cloud computing, big data, and advanced scientific systems. Such units represent extremely high-capacity storage levels beyond common everyday usage.
Option a – Zebibyte
What is used in most programs that is a part of a program & guides the user through certain steps?
A) Software
B) Wizard
C) Wiki
D) None of these
Explanation: Modern software applications often include guided features that help users complete tasks step by step. These built-in assistants simplify complex processes by providing instructions and options in sequence.
Such tools are commonly used during installation or configuration processes. They help users by breaking tasks into simple steps, reducing confusion and errors. This improves usability and ensures that even non-technical users can complete operations efficiently within software applications.
Option b – Wizard
A generic name for Intel processors released after the original 8086 processor is?
A) Pentium
B) x86
C) Pentium 286
D) None of these
Explanation: Microprocessors have evolved over time with improvements in speed, architecture, and performance. Early Intel processors like the 8086 laid the foundation for modern computing systems.
Later processors built on this architecture belong to a family that shares compatibility and design principles. This group represents a standard naming convention used for a series of processors developed after the original model. These processors are widely used in personal computers due to their compatibility and performance enhancements.
Option b – x86
A Network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called?
Explanation: Secure communication over the internet is essential for protecting data from unauthorized access. To achieve this, encrypted connections are used to ensure that transmitted information remains private and secure.
Such networks create a protected communication channel over public internet infrastructure. They encrypt data so that only authorized users can access it. This is commonly used in organizations to safely connect remote users to private networks while maintaining confidentiality and security.
Option b – Virtual Private Network
V-RAM is used for access to the following? ( class 7 computer chapter 2 Questions and answers )
A) Video & Graphics
B) Text & Images
C) Programs
D) None of these
Explanation: Specialized memory in computers is used to handle graphical data efficiently. This type of memory is designed to support high-speed access to visual information required for display processing.
It helps store image data, textures, and screen-related information so that graphics can be rendered smoothly. This improves performance in applications that involve visuals such as games, videos, and graphic design software. By separating visual processing from main memory, it enhances overall system efficiency.
Option a – Video & Graphics
The result after applying an encryption key & algorithm to a message is
A) Ciphertext
B) Cybertext
C) None of these
D) Plain text
Explanation: Encryption is a security process used to protect data by converting readable information into an unreadable format. This transformation is done using a specific algorithm and a secret key.
The transformed output cannot be understood without the correct decryption key. This ensures that sensitive information remains secure during transmission or storage. Encryption is widely used in secure communication systems, online transactions, and data protection technologies to maintain confidentiality and integrity.
Option a – Ciphertext
Which among the following is an important circuitry in a computer system that directs the operation of the processor?
A) Control Unit
B) ALU
C) Address Bus
D) Memory
Explanation: Inside a computer processor, different internal components work together to execute instructions. One of these components is responsible for controlling and coordinating all operations within the CPU.
It ensures that instructions are properly fetched, decoded, and executed in the correct sequence. It also manages data flow between memory and other parts of the system. This coordination is essential for the smooth functioning of the computer’s processing activities.
Option a – Control Unit
Which of the following has been created by the research facility of Digital Equipment Corporation of USA?
A) Alta Vista
B) Web Crawler
C) Yahoo
D) None of these
Explanation: Search engines and web tools were developed in early internet research laboratories to help users find information across large networks. These systems were created to organize and retrieve web-based resources efficiently from distributed servers.
Such tools scan indexed data and provide relevant results based on user queries. They played a major role in the development of modern internet navigation systems. Their purpose is to simplify access to vast amounts of online information by quickly locating matching web resources.
Option a – Alta Vista
What is a person who uses a computer to cause harm to people or destroy critical systems?
A) None of these
B) Hacktivist
C) Cyberterrorist
D) Black-hat hacker
Explanation: In cybersecurity, individuals who misuse computer systems to damage data, disrupt services, or harm others are classified based on their intent and methods. Such users often exploit vulnerabilities in networks or software systems.
They may engage in illegal activities such as data theft, system attacks, or service disruption. These actions are considered serious cyber offenses. The term is used to describe malicious computer users who intentionally cause harm using technical skills.
Option c – Cyberterrorist
The ALU performs __ operations.
A) Algorithm-based
B) Logarithm-based
C) None of these
D) ASCII
Explanation: The Arithmetic Logic Unit is a core component of the CPU responsible for performing mathematical and logical operations. It handles calculations such as addition, subtraction, and comparison of data.
It processes binary data and supports decision-making operations like greater than, less than, and equal checks. This unit works closely with the control unit to execute instructions efficiently. It is essential for all computational tasks performed by a computer system.
Option c – None of these
A compiler translates a program written in a high-level language into
A) A debugged program
B) Java
C) None of these
D) Machine language
Explanation: Programming languages written by humans must be converted into a form that computers can understand. This conversion is done by system software designed to translate entire programs at once.
The output of this translation process is a low-level form of instructions that the computer’s processor can execute directly. This allows high-level code to run efficiently on hardware by converting it into machine-understandable instructions.
Option d – Machine language
Which of the following is an input device?
A) Monitor
B) Plotter
C) Printer
D) Speaker
Explanation: Input devices are hardware components used to send data and instructions into a computer system. They allow users to interact with the computer by providing information for processing.
These devices convert human actions or physical data into digital signals that the computer can understand. They are essential for tasks like typing, scanning, or controlling on-screen actions. Without them, a computer cannot receive user commands.
Option a – Monitor
Saving is the process of ( class 7 computer chapter 2 Questions and answers )
A) None of these
B) Developing a document by entering text using a keyboard
C) Copying a document from memory to a storage medium
D) Changing the appearance, or overall look, of a document
Explanation: In computing, saving refers to storing digital information permanently on a storage device so that it can be used later. This process ensures that work is not lost when the system is turned off.
It involves transferring data from temporary memory to permanent storage like a hard disk or other media. This allows users to retrieve and continue their work in future sessions. Saving is an essential part of document creation and data management.
Option c – Copying a document from memory to a storage medium
Descending order of data hierarchy in data management in computing is
A) Database-record-fields-file-bytes-bit
B) Database-file-record-fields-bit-bytes
C) Database-records-files-bytes-fields-bit
D) Database-file-record-fields-byte-bit
Explanation: Data in computer systems is organized in a structured hierarchy from the largest storage unit to the smallest. This structure helps in efficient storage, retrieval, and management of information.
Higher-level structures contain collections of lower-level data units, forming a layered system. This organization ensures that data is systematically stored and easily accessible. It is widely used in databases and file management systems to maintain order and efficiency.
Option d – Database-file-record-fields-byte-bit
The benefit of using computers is that
A) Computers are very fast & can store huge amounts of data
B) All of these
C) Computers are designed to be inflexible
D) None of these
Explanation: Computers are designed to perform tasks quickly, accurately, and efficiently. They can process large amounts of data in a short time and store vast quantities of information.
Their ability to automate tasks reduces human effort and increases productivity. Computers are used in various fields such as education, business, science, and communication. Their speed and reliability make them essential tools in modern life.
Option a – Computers are very fast & can store huge amounts of data
When you install a new program on your computer, it is typically added to the __ menu?
A) None of these
B) Desktop Programs
C) All Programs
D) Start Programs
Explanation: Operating systems organize installed applications in a structured menu system for easy access. When new software is installed, it is placed in a specific section where all programs are listed.
This helps users quickly locate and launch applications from a centralized location. It improves usability and keeps installed software organized within the system interface. This menu acts as a directory for all available programs on the computer.
Explanation: DVD is an optical storage medium used to store large amounts of digital data such as videos, software, and multimedia files. It uses laser technology to read and write information on its surface.
Data is stored in the form of microscopic pits arranged in a spiral track. The laser reads these patterns to interpret binary information. This storage medium provides higher capacity compared to older formats and is widely used for entertainment and data distribution purposes.
We also covered NCERT solutions for class 7 computer chapter 1 & chapter 2 Questions and answers pdf on our website for free so that you can practice well for the exam.
Click on the download button provided above to download class 7 computer Questions with answers chapter 1 and chapter 2 PDF term 2 files for free.
My name is Vamshi Krishna and I am from Kamareddy, a district in Telangana. I am a graduate and by profession, I am an android app developer and also interested in blogging.