Page 162 - TP_Pluse_V2.2_Class_7
P. 162
14. Which of the following describes the main aim of the chart?
(a) Title bar (b) Chart title (c) Chart description (d) X-axis
15. What is the function of the ‘Find and Replace’ feature in MS Word?
(a) To insert images into a document.
(b) To search for a specific text and replace it with another text.
(c) To format text.
(d) To create hyperlinks.
16. Which of the following is the correct method for using the HTML tag?
(a) <tagname value=attribute> (b) <tagname attribute=value>
(c) <tagname value> (d) <tagname attribute:value>
17. What is the correct syntax to add a comment to an HTML file?
(a) <!-- Comment --> (b) // Comment (c) # Comment (d) /* Comment */
18. ________ is a collective term for malicious spying programs used for secretly monitoring someone’s activity
and actions over a digital medium.
(a) Malware (b) Remote Access Trojans
(c) Keyloggers (d) Spyware
19. In programming languages, which symbol is frequently used to indicate exponentiation?
(a) * (b) ** (c) // (d) None of these
20. Which category of AI machine would be smarter than an average human being and would also understand
human emotions?
(a) Weak AI (b) Strong AI (c) Super AI (d) None of these
Section-C (Competency-based)
[Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]
21. Identify the 2 software used to create, edit, print, and save text documents.
(a) Wordpad (b) Word (c) PowerPoint (d) Excel
22. Storage capacity of magnetic disk depends on _________.
(a) tracks per inch of surface. (b) kilobytes per inch of memory.
(c) disk pack in the disk surface. (d) megabytes per inch of sectors.
23. What can be done in Excel using formula?
(a) Addition of cells (b) Average of cells (c) Image processing (d) Animation
24. Which of the following statements are valid?
(a) Lady Augusta is the first programmer.
(b) Ada was a famous English poet.
(c) ADA is a programming language developed by US Defense.
(d) Ada was a famous writer.
25. A computer virus/malware can:
(a) Repair Software. (b) Delete/Infect the data.
(c) Save and secure data. (d) Make the system slow.
Answers
1. c 2. c 3. b 4. b 5. b
6. d 7. c 8. d 9. d 10. c
11. c 12. c 13. a 14. b 15. b
16. b 17. a 18. d 19. b 20. c
21. a, b 22. a, c 23. a, b 24. a, c 25. b, d
160 Plus (Ver. 2.2)-VII

