Page 169 - iPrime_V2.2_class7
P. 169

18.   _________ is a collective term for malicious spying programs used for secretly monitoring someone’s
                     activity and actions over a digital medium.
                      (a)  Malware                                         (b)  Remote Access Trojans

                      (c)  Keyloggers                                      (d)  Spyware
                  19.  In programming languages, which symbol is frequently used to indicate exponentiation?

                      (a)  *                     (b)  **                   (c)  //                (d)  None of these

                  20.   Which category of AI machine would be smarter than an average human being and would also understand
                     human emotions?

                      (a)  Weak AI               (b)  Strong AI            (c)  Super AI          (d)  None of these

                                                    Section-C (Competency-based)
                             [Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]
                  21.  Identify the 2 software used to create, edit, print, and save text documents.

                      (a)  Wordpad               (b)  Word                 (c)  PowerPoint        (d)  Excel
                  22.  Storage capacity of magnetic disk depends on _________.

                      (a)  tracks per inch of surface.                     (b)  kilobytes per inch of memory.
                      (c)  disk pack in the disk surface.                  (d)  megabytes per inch of sectors.

                  23.  What can be done in Excel using formula?
                      (a)  Addition of cells     (b)  Average of cells     (c)  Image processing   (d)  Animation

                  24.  Which of the following statements are valid?
                      (a)  Lady Augusta is the first programmer.

                      (b)  Ada was a famous English poet.
                      (c)  ADA is a programming language developed by US Defense.

                      (d)  Ada was a famous writer.
                  25.  A computer virus/malware can:

                      (a)  Repair Software.                                (b)  Delete/Infect the data.
                      (c)  Save and secure data.                           (d)  Make the system slow.










                                                              Answers
                     1.        (c)       2.        (c)        3.       (b)        4.       (b)        5.       (b)
                     6.       (d)        7.        (c)        8.       (d)        9.       (d)       10.       (c)
                    11.        (c)      12.        (c)       13.       (a)       14.       (b)       15.       (b)

                    16.       (b)       17.        (a)       18.       (d)       19.       (b)       20.       (c)
                    21.      (a, b)     22.      (a), (c)    23.     (a), (b)    24.     (a), (c)    25.     (b), (d)


                                                                                 OGO Cyber Sample Questions        167
   164   165   166   167   168   169   170