Page 162 - 2622_Delhi Police Public School_C-8
P. 162

12.  How can you make the selected character superscripted?
                   (A)  Ctrl + =                                         (B)  Ctrl + Shift + +
                   (C)  Alt + Ctrl + Shift + =                           (D)  None of these

               13.  What is the default data type for a Primary Key?
                   (A)  Text                   (B)  Number               (C)  AutoNumber        (D)  OLE
               14.  Match the following image formats to their suitable applications:
                     (i) JPG    (a) Used for web pages but are not suitable for print
                    (ii) GIF    (b) Used for web & print photos and quick previews
                    (iii) PNG   (c) Photoshop Document
                    (iv) PSD    (d) Animated

                   (A)  (i)    (b), (ii)    (d), (iii)    (a), (iv)    (c)   (B)  (i)    (d), (ii)    (b), (iii)    (c), (iv)    (a)
                   (C)  (i)    (a), (ii)    (c), (iii)    (b), (iv)    (d)   (D)  (i)    (b), (ii)    (a), (iii)    (c), (iv)    (d)
               15.  Which of the following statement is true?
                   Statement 1: Entrance adds effect to an object while it appears on the screen.
                   Statement 2: Exit causes an object to appear on the screen.
                   (A)  Only Statement 1                                 (B)  Only Statement 2
                   (C)  Both Statements 1 and 2                          (D)  Neither Statement 1 nor Statement 2
               16.  What type of language is JavaScript?
                   (A)  Compiled               (B)  Interpreted          (C)  Scripting         (D)  Free
               17.  What does malware stand for?
                   (A)  Multipurpose software                            (B)  Malfunctioned security

                   (C)  Malfunctioned software                           (D)  Malicious software
               18.  Match the following:
                     (i) Machine Learning (a)  A set of rules or instructions given to an AI machine.
                     (ii) Deep Learning  (b)   It allows a machine to predict more accurate results without being explicitly
                                           programmed to do so.
                    (iii) Algorithm     (c)  A collection of labelled information that is used to build a machine learning model.
                    (iv) Training Data  (d)  It allows a machine to independently mimic human thought patterns.

                   (A)  (i)    (d), (ii)    (c), (iii)    (b), (iv)    (a)   (B)  (i)    (b), (ii)    (d), (iii)    (a), (iv)    (c)
                   (C)  (i)    (c), (ii)    (a), (iii)    (d), (iv)    (b)   (D)  (i)    (d), (ii)    (a), (iii)    (b), (iv)    (c)

               19.  What does Two-Factor Authentication (2FA) add to digital security?
                   (A)  A second layer of security by requiring a code along with a password
                   (B)  Automatically changing passwords every day
                   (C)  Allowing access to all users without verification
                   (D)  Disabling passwords for easier login
               20.  What is the function of the Track Changes feature in MS Word?
                   (A)  To count words in a document                     (B)  To highlight all spelling mistakes
                   (C)  To review and edit changes made by different users  (D)  To delete unnecessary text automatically

                                                            Answers

                  1. b      2. c       3. d      4. a      5. d       6. a      7. a       8. b      9. c      10. b
                 11. d      12. b     13. c      14. a     15. a      16. c     17. d     18. b      19. a     20. c




                        Premium Edition-VIII
                160
   157   158   159   160   161   162