Page 161 - Trackpad_V4.0_C8_Flipbook
P. 161
10. Priya has made a presentation in English but she wants to translate it to Hindi language. Which option
should she use?
(a) Review → Thesaurus (b) Review → Translate
(c) Review → Spelling (d) Review → Compare
11. Which of these options means a person is continually chased/followed by another person or a group of
various people?
(a) Identity theft (b) Stalking
(c) Bullying (d) Phishing
12. A school teacher had to type the marks of 50 students for 5 different subjects. While typing the marks
of the students, she forgot to enter the marks of one student in the middle. So, which option should
she choose?
(a) Insert Sheet Columns (b) Insert Sheet Rows
(c) Insert Cells (d) Insert Sheet
13. Which of the following statements hold(s) true about telnet?
Statement 1: It allows to connect to remote computers.
Statement 2: It allows to buy and sell online products.
(a) Only statement 1 (b) only statement 2
(c) Both statement 1 and 2 (d) neither statement 1 nor statement 2
14. Suppose that a student’s enrollment information is mistakenly kept twice in the database. What potential
issues might arise from this circumstance?
(a) It can be difficult to keep accurate student records and data errors can occur.
(b) Improved data reliability and redundancy.
(c) Simplified processes for data access and retrieval.
(d) Better system speed and storage optimisation.
15. The software that helps to create, modify and optimise the digital images is:
(a) MS Paint (b) Scratch
(c) Photoshop (d) Flash
16. The border style of an HTML element is changed using ________ CSS property.
(a) Border-width (b) Border-style
(c) Border-color (d) None of these
17. Which of the following is NOT a type of Page Margin in MS Word?
(a) Left (b) Bottom
(c) Right (d) Center
18. The pictorial representation that illustrates the steps of the solution to a problem is called ________.
(a) Algorithm (b) Flowchart
(c) Pseudo-code (d) Program
19. In MS PowerPoint, Themes can be found under ________.
(a) Animation Tab (b) Transition Tab
(c) Design Tab (d) Insert Tab
20. ________ is a cyber crime in which an e-mail that falsely claims to be from a trusted organisation is sent
to a user.
(a) Phishing (b) Beating
(c) Bulling (d) Stalking
21. What will be the value of the following MS Excel formula?
=Average (5, 4, 4, 3, 6)
(a) 5 (b) 3.72
(c) 4.4 (d) Error
OGO Cyber Sample Questions 159

