Page 89 - Touchpad_Plus_V3.2_Class2
P. 89

11.  Which of these  options means a  person  is continually chased/followed  by  another  person  or  a  group  of
                     various people?
                      (a)  Identity theft           (b)  Stalking           (c)  Bullying          (d)  Phishing

                  12.  A school teacher had to type the marks of 50 students for 5 different subjects. While typing the marks of the
                      students, she forgot to enter the marks of one student in the middle. So, which option should she choose?
                      (a)  Insert Sheet Columns                             (b)  Insert Sheet Rows

                      (c)  Insert Cells                                     (d)  Insert Sheet
                  13.  Which of the following statements hold(s) true about telnet?
                      Statement 1: It allows to connect to remote computers.
                      Statement 2: It allows to buy and sell online products.
                      (a)  Only statement 1                                 (b)  Only statement 2
                      (c)  Both statement 1 and 2                           (d)  Neither statement 1 nor statement 2
                  14.  Suppose that a student’s enrolment information is mistakenly kept twice in the database. What potential
                      issues might arise from this circumstance?
                      (a)  It can be difficult to keep accurate student records and data errors can occur.
                      (b)  Improved data reliability and redundancy.
                      (c)  Simplified processes for data access and retrieval.

                      (d)  Better system speed and storage optimisation.
                  15.  The software that helps to create, modify and optimise the digital images is:
                      (a)  MS Paint                 (b)  Scratch            (c)  Photoshop         (d)  Flash
                  16.  The border style of an HTML element is changed using ________ CSS property.
                      (a)  Border-width                                     (b)  Border-style
                      (c)  Border-colour                                    (d)  None of these
                  17.  Which of the following is NOT a type of Page Margin in MS Word?

                      (a)  Left                     (b)  Bottom             (c)  Right             (d)  Center
                  18.  The pictorial representation that illustrates the steps of the solution to a problem is called ________.
                      (a)  Algorithm                                        (b)  Flowchart
                      (c)  Pseudo-code                                      (d)  Program
                  19.  In MS PowerPoint, Themes can be found under ________.
                      (a)  Animation Tab                                    (b)  Transition Tab
                      (c)  Design Tab                                       (d)  Insert Tab
                  20.  ________ is a  cyber  crime in which  an  e-mail that  falsely claims to  be  from a  trusted  organisation  is sent
                      to a user.
                      (a)  Phishing                                         (b)  Beating
                      (c)  Bulling                                          (d)  Stalking

                                                              Answers

                     1.       (d)         2.       (b)        3.       (a)        4.       (b)        5.       (d)
                     6.       (d)         7.       (b)        8.       (a)        9.       (c)       10.       (b)
                    11.       (b)        12.       (b)       13.       (a)       14.       (a)       15.       (c)
                    16.       (b)        17.       (d)       18.       (b)       19.       (c)       20.       (a)



                                                                                 OGO Cyber Sample Questions          87
   84   85   86   87   88   89   90