Page 186 - TP_Plus_v2.2_Class_8
P. 186

13.  Which of the following statements hold(s) true about telnet?
                       Statement 1: It allows to connect to remote computers.
                       Statement 2: It allows to buy and sell online products.
                        (a)  Only statement 1                                (b)  only statement 2
                        (c)  Both statement 1 and 2                          (d)  neither statement 1 nor statement 2
                    14.  Suppose  that  a  student’s  enrolment  information  is  mistakenly  kept  twice  in  the  database.  What  potential
                       issues might arise from this circumstance?
                        (a)  It can be difficult to keep accurate student records and data errors can occur.
                        (b)  Improved data reliability and redundancy.
                        (c)  Simplified processes for data access and retrieval.
                        (d)  Better system speed and storage optimisation.
                   15.  The software that helps to create, modify and optimise the digital images is:
                        (a)  MS Paint                (b)  Scratch            (c)  Photoshop         (d)  Flash
                   16.  The border style of an HTML element is changed using ________ CSS property.
                        (a)  Border-width            (b)  Border-style       (c)  Border-colour     (d)  None of these
                    17.  Which of the following is NOT a type of Page Margin in MS Word?
                        (a)  Left                    (b)  Bottom             (c)  Right             (d)  Center
                    18.  The pictorial representation that illustrates the steps of the solution to a problem is called ________.
                        (a)  Algorithm               (b)  Flowchart          (c)  Pseudo-code       (d)  Program
                   19.  In MS PowerPoint, Themes can be found under ________.
                        (a)  Animation Tab           (b)  Transition Tab     (c)  Design Tab        (d)  Insert Tab
                   20.  ________ is a cyber crime in which an e-mail that falsely claims to be from a trusted organisation is sent
                       to a user.
                        (a)  Phishing                (b)  Beating            (c)  Bulling           (d)  Stalking
                    21.  What will be the value of the following MS Excel formula?
                       =Average (5, 4, 4, 3, 6)
                        (a)  5                       (b)  3.72               (c)  4.4               (d)  Error
                                                   Section-C (Competency-based)
                            [Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]

                   22.  Which of the following are the benefits of Cloud Computing?
                        (a)  Increased security at much less cost            (b)  Limited storage capacity
                        (c)  Easy to maintain                                (d)  Payment processing
                   23.  Which of the following tags are used for specifying fonts?
                        (a)  <B>                     (b)  <H>                (c)  <P>               (d)  <U>
                   24.  Two types of addresses used in Networking are ________ and ________.
                        (a)  Residence Address       (b)  MAC Address        (c)  IP Address        (d)  Office Address
                   25.  The parallelogram symbol in a flowchart indicates:
                        (a)  Input                   (b)  Output             (c)  processing        (d)  Decision



                                                               Answers
                       1.       (d)        2.       (b)        3.       (a)        4.       (b)        5.       (d)
                       6.       (d)        7.       (b)        8.       (a)        9.       (c)       10.       (b)
                      11.       (b)       12.       (b)       13.       (a)        14.      (a)        15.      (c)
                      16.       (b)       17.       (d)       18.       (b)       19.       (c)       20.       (a)
                      21.       (c)       22.     (a), (c)    23.     (a), (d)    24.     (b), (c)    25.     (a), (b)




                  184   Plus (Ver. 2.2)-VIII
   181   182   183   184   185   186