Page 153 - iprime_V2.2_class8
P. 153

13.  Which of the following statements hold(s) true about telnet?
                      Statement 1: It allows to connect to remote computers.
                      Statement 2: It allows to buy and sell online products.

                      (a)  Only statement 1                                 (b)  only statement 2
                      (c)  Both statement 1 and 2                           (d)  neither statement 1 nor statement 2
                  14.  Suppose  that  a  student’s  enrollment  information  is  mistakenly  kept  twice  in  the  database.  What
                      potential issues might arise from this circumstance?

                      (a)  It can be difficult to keep accurate student records and data errors can occur.
                      (b)  Improved data reliability and redundancy.
                      (c)  Simplified processes for data access and retrieval.
                      (d)  Better system speed and storage optimisation.
                  15.  The software that helps to create, modify and optimise the digital images is:
                      (a)  MS Paint              (b)  Scratch               (c)  Photoshop        (d)  Flash
                  16.  The border style of an HTML element is changed using ________ CSS property.
                      (a)  Border-width          (b)  Border-style          (c)  Border-colour    (d)  None of these
                  17.  Which of the following is NOT a type of Page Margin in MS Word?

                      (a)  Left                  (b)  Bottom                (c)  Right            (d)  Center
                  18.  The pictorial representation that illustrates the steps of the solution to a problem is called ________.
                      (a)  Algorithm             (b)  Flowchart             (c)  Pseudo-code      (d)  Program
                  19.  In MS PowerPoint, Themes can be found under ________.

                      (a)  Animation Tab         (b)  Transition Tab        (c)  Design Tab       (d)  Insert Tab
                  20.  ________ is a cybercrime  in which an e-mail that falsely claims to be from a trusted organisation is
                      sent to a user.
                      (a)  Phishing              (b)  Beating               (c)  Bulling          (d)  Stalking
                  21.  What will be the value of the following MS Excel formula?
                      =Average (5, 4, 4, 3, 6)
                      (a)  5                     (b)  3.72                  (c)  4.4              (d)  Error

                                                Section-C (Competency-based)
                            [Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.]
                  22.  Which of the following are the benefits of cloud computing?
                      (a)  Increased security at much less cost             (b)  Limited storage capacity
                      (c)  Easy to maintain                                 (d)  Payment processing
                  23.  Which of the following tags are used for specifying fonts?
                      (a)  <B>                   (b)  <H>                   (c)  <P>              (d)  <U>
                  24.  Two types of addresses used in Networking are _________ and _________.

                      (a)  Residence Address     (b)  MAC Address           (c)  IP Address       (d)  Office Address
                  25.  The parallelogram symbol in a flowchart indicates:

                      (a)  Input                 (b)  Output                (c)  processing       (d)  Decision



                                                              Answers
                     1.        (d)       2.        (b)        3.       (a)        4.       (b)        5.       (d)
                     6.        (d)       7.        (b)        8.       (a)        9.       (c)       10.       (b)
                    11.        (b)      12.        (b)       13.       (a)       14.       (a)       15.       (c)
                    16.        (b)      17.        (d)       18.       (b)       19.       (c)       20.       (a)
                    21.        (c)      22.      (a), (c)    23.     (a), (d)    24.     (b), (c)    25.     (a), (b)


                                                                                 OGO Cyber Sample Questions        151
   148   149   150   151   152   153   154