Page 169 - iPrime_V2.2_class7
P. 169
18. _________ is a collective term for malicious spying programs used for secretly monitoring someone’s
activity and actions over a digital medium.
(a) Malware (b) Remote Access Trojans
(c) Keyloggers (d) Spyware
19. In programming languages, which symbol is frequently used to indicate exponentiation?
(a) * (b) ** (c) // (d) None of these
20. Which category of AI machine would be smarter than an average human being and would also understand
human emotions?
(a) Weak AI (b) Strong AI (c) Super AI (d) None of these
Section-C (Competency-based)
[Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]
21. Identify the 2 software used to create, edit, print, and save text documents.
(a) Wordpad (b) Word (c) PowerPoint (d) Excel
22. Storage capacity of magnetic disk depends on _________.
(a) tracks per inch of surface. (b) kilobytes per inch of memory.
(c) disk pack in the disk surface. (d) megabytes per inch of sectors.
23. What can be done in Excel using formula?
(a) Addition of cells (b) Average of cells (c) Image processing (d) Animation
24. Which of the following statements are valid?
(a) Lady Augusta is the first programmer.
(b) Ada was a famous English poet.
(c) ADA is a programming language developed by US Defense.
(d) Ada was a famous writer.
25. A computer virus/malware can:
(a) Repair Software. (b) Delete/Infect the data.
(c) Save and secure data. (d) Make the system slow.
Answers
1. (c) 2. (c) 3. (b) 4. (b) 5. (b)
6. (d) 7. (c) 8. (d) 9. (d) 10. (c)
11. (c) 12. (c) 13. (a) 14. (b) 15. (b)
16. (b) 17. (a) 18. (d) 19. (b) 20. (c)
21. (a, b) 22. (a), (c) 23. (a), (b) 24. (a), (c) 25. (b), (d)
OGO Cyber Sample Questions 167

