Page 132 - TP_Play_V2.1_class7
P. 132

18.  ________ is a collective term for malicious spying programs used for secretly monitoring someone’s activity
                      and actions over a digital medium.
                      (a)  Malware                                      (b)  Remote Access Trojans

                      (c)  Keyloggers                                   (d)  Spyware
                   19.  In programming languages, which symbol is frequently used to indicate exponentiation?

                      (a)  *                                            (b)  **
                      (c)  //                                           (d)  None of these

                   20.   Which category of AI machine would be smarter than an average human being and would also understand
                      human emotions?
                      (a)  Weak AI                                      (b)  Strong AI

                      (c)  Super AI                                     (d)  None of these

                                                   Section-C (Competency-based)
                                [Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]
                   21.  Identify the 2 software used to create, edit, print, and save text documents.

                      (a)  Wordpad                                      (b)  Word
                      (c)  PowerPoint                                   (d)  Excel

                   22.  Storage capacity of magnetic disk depends on _________.

                      (a)  tracks per inch of surface.                  (b)  kilobytes per inch of memory.
                      (c)  disk pack in the disk surface.               (d)  megabytes per inch of sectors.

                   23.  What can be done in Excel using formula?
                      (a)  Addition of cells                            (b)  Average of cells
                      (c)  Image processing                             (d)  Animation

                   24.  Which of the following statements are valid?

                      (a)  Lady Augusta is the first programmer.
                      (b)  Ada was a famous English poet.
                      (c)  ADA is a programming language developed by US Defense.

                      (d)  Ada was a famous writer.
                   25.  A computer virus/malware can:

                      (a)  Repair Software.                             (b)  Delete/Infect the data.
                      (c)  Save and secure data.                        (d)  Make the system slow.



                                                                Answers
                          1.     c            2.     c            3.     b            4.     b             5.    b
                          6.    d             7.     c            8.     d            9.     d            10.    c
                         11.     c           12.     c           13.     a           14.     b            15.    b
                         16.    b            17.     a           18.     d           19.     b            20.    c
                         21.   a, b          22.    a, c         23.    a, b         24.    a, c          25.   b, d


                  130       Play (Ver. 2.1)-VII
   127   128   129   130   131   132   133   134