Page 175 - Code_GPT_Class_8
P. 175

13.  Which of the following statements hold(s) true about telnet?
                      Statement 1: It allows to connect to remote computers.
                      Statement 2: It allows to buy and sell online products.
                      (a)  Only statement 1                                 (b)  only statement 2
                      (c)  Both statement 1 and 2                           (d)  neither statement 1 nor statement 2
                  14.  Suppose that a student’s enrollment information is mistakenly kept twice in the database. What potential
                      issues might arise from this circumstance?
                      (a)  It can be difficult to keep accurate student records and data errors can occur.
                      (b)  Improved data reliability and redundancy.
                      (c)  Simplified processes for data access and retrieval.
                      (d)  Better system speed and storage optimisation.
                  15.  The software that helps to create, modify and optimise the digital images is:
                      (a)  MS Paint                 (b)  Scratch            (c)  Photoshop         (d)  Flash
                  16.  The border style of an HTML element is changed using ________ CSS property.
                      (a)  Border-width             (b)  Border-style       (c)  Border-color      (d)  None of these
                  17.  Which of the following is NOT a type of Page Margin in MS Word?
                      (a)  Left                     (b)  Bottom             (c)  Right             (d)  Center
                  18.  The pictorial representation that illustrates the steps of the solution to a problem is called ________.
                      (a)  Algorithm                (b)  Flowchart          (c)  Pseudo-code       (d)  Program
                  19.  In MS PowerPoint, Themes can be found under ________.
                      (a)  Animation Tab            (b)  Transition Tab     (c)  Design Tab        (d)  Insert Tab
                  20.  ________ is a cyber crime in which an e-mail that falsely claims to be from a trusted organisation is sent
                      to a user.
                      (a)  Phishing                 (b)  Beating            (c)  Bulling           (d)  Stalking
                  21.  What will be the value of the following MS Excel formula?
                      =Average (5, 4, 4, 3, 6)
                      (a)  5                        (b)  3.72               (c)  4.4               (d)  Error

                                                  Section-C (Competency-based)
                           [Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]

                  22.  Which of the following are the benefits of Cloud Computing?
                      (a)  Increased security at much less cost             (b)  Limited storage capacity
                      (c)  Easy to maintain                                 (d)  Payment processing
                  23.  Which of the following tags are used for specifying fonts?
                      (a)  <B>                      (b)  <H>                (c)  <P>               (d)  <U>
                  24.  Two types of addresses used in Networking are _________ and _________.
                      (a)  Residence Address        (b)  MAC Address        (c)  IP Address        (d)  Office Address
                  25.  The parallelogram symbol in a flowchart indicates:
                      (a)  Input                    (b)  Output             (c)  processing        (d)  Decision


                                                               Answers
                      1.       (d)        2.        (b)        3.        (a)        4.       (b)         5.       (d)
                      6.       (d)        7.        (b)        8.        (a)        9.        (c)       10.       (b)
                     11.       (b)       12.        (b)       13.        (a)       14.        (a)       15.       (c)
                     16.       (b)       17.        (d)       18.        (b)       19.        (c)       20.       (a)
                     21.       (c)       22.      (a), (c)    23.      (a), (d)    24.      (b), (c)    25.      (a), (b)



                                                                                    OGO Cyber Sample Questions     173
   170   171   172   173   174   175   176   177   178   179   180