Class 9 Cyber Olympiad - Sample question paper 08

Posted by Olympiad Tester on


Q) In Networking, the default port number for SMTP is ____.

A.

B.

C.

D.

Answer: B. 25

Explanation: The default port number for SMTP (Simple Mail Transfer Protocol) is 25.

Q) RepRap and MakerBot are ________ companies.

A.

B.

C.

D.

Answer: A. 3D printing

Explanation: RepRap and MakerBot are well-known companies in the field of 3D printing.

Q) Which attribute of the Anchor tag is used to specify the location of an internal reference in a document in HTML?

A.

B.

C.

D.

Answer: B. NAME

Explanation: The NAME attribute of the Anchor tag is used to specify the location of an internal reference in a document in HTML.

Q) Which of the following steps is CORRECT to turn ON Aero Peek feature in Windows 7?

A. Right click on an empty area on the taskbar → click on Properties → 'Taskbar and Start Menu Properties' window appears, click on the Taskbar tab → click on 'use Aero Peek to preview the desktop' checkbox.

B. Right click on the Show Desktop button at the far right corner of the taskbar → click on 'Peek at desktop' option.

C. Double click on the Show Desktop button at the far right corner of the taskbar → click 'Peek at desktop' option.

D. Both A and B

Answer: D. Both A and B

Explanation: Both the described steps in option A and option B lead to enabling the Aero Peek feature in Windows 7. Therefore, option D is the correct answer.

Q) Which of the following statements is incorrect regarding the Show Markup option in MS-Word 2010?

A. It is found under the Review tab in the Tracking group.

B. It is used to show or hide comments.

C. It is used to show or hide formatting notes when you are reviewing a document with tracked changes.

D. It is used to compare.

Answer: D. It is used to compare.

Explanation: The Show Markup option in MS-Word 2010 is not used for comparing documents. It is primarily used to show or hide comments and formatting notes when reviewing a document with tracked changes.

Q) What is the correct HTML code to create an ordered list with three list items, each containing a hyperlink?

A.

<ol>
  <li><a href="#link1">Item 1</a></li>
  <li><a href="#link2">Item 2</a></li>
  <li><a href="#link3">Item 3</a></li>
</ol>

B.

<ul>
  <li><a href="#link1">Item 1</a></li>
  <li><a href="#link2">Item 2</a></li>
  <li><a href="#link3">Item 3</a></li>
</ul>

C.

<ol>
  <li>Item 1</li>
  <li>Item 2</li>
  <li>Item 3</li>
</ol>

D.

<ul>
  <li>Item 1</li>
  <li>Item 2</li>
  <li>Item 3</li>
</ul>

Answer: A. Option A

Explanation: Option A correctly uses the `

    ` (ordered list) tag and `
  1. ` (list item) tags to create a numbered list with hyperlinks.

Q) Consider the following Python code:


def calculate_sum(a, b):
    return a + b

result = calculate_sum(10, 20)
print(result)
    

What will be the output of the above code?

A. 30

B. 20

C. 10

D. 1020

Answer: A. 30

Explanation: The function calculates the sum of two numbers (10 and 20) and prints the result, which is 30.

Q) Which of the following is the HTML code to obtain the following output on the webpage?

Exam name : Cyber Olympiad

Subject: Computers

A.

<html>
<body>
  <table border="1">
    <tr>
      <th>Exam name:</th>
      <td>Cyber Olympiad</td>
    </tr>
    <tr>
      <th>Subject:</th>
      <td>Computers</td>
    </tr>
  </table>
</body>
</html>

Answer: A. Option A

Explanation: The provided HTML code creates a table with borders and two rows, displaying "Exam name: Cyber Olympiad" and "Subject: Computers" respectively.

Q) NFC enabled devices help you to _____________.

A.

B.

C.

D.

Answer: A. Transfer the files from one device to another just by bringing or touching the devices together

Explanation: NFC (Near Field Communication) enables devices to transfer files by bringing or touching the devices together.

Q) A ____ is a chain e-mail that is usually circulated to the people showing the message warning of a nonexistent computer virus threat, that encourages readers to forward the message to other people as soon as possible.

A. Spyware

B. Spam

C. Adware

D. Hoax

Answer: D. Hoax

Explanation: A hoax is a chain e-mail warning of a nonexistent computer virus threat, encouraging readers to forward the message to others.

Q) Which of the following codes displays the current date and time in Visual Basic?

A. Private Sub Command1_Click( ) Print "Today is:" & Date Print "Time is:" & Time( ) End Sub

B. Private Sub Command_Click( ) Print "Today is:" + Date + Time End Sub

C. Private Sub Command_Click( ) Print "Today is:" Date@Time End Sub

D. All of these

Answer: A. Private Sub Command1_Click( ) Print "Today is:" & Date Print "Time is:" & Time( ) End Sub

Explanation: This Visual Basic code prints the current date and time when the specified command is clicked.

Q) An extranet is _________.

A.

B.

C.

D.

Answer: B. The intranets of two co-operating organizations interconnected via a secure leased line

Explanation: An extranet is a private network that uses internet technology and public telecommunication system to securely share part of an organization's information or operations with suppliers, vendors, partners, customers, or other businesses.

Q) If cell A1 contains a date: 03-10-2013, and cell B1 contains a date: 05-10-2013, then what would be the output if the user enters a formula, = A1 – B1 in MS-Excel 2010? (Assume that your system default date format is: dd-mm-yyyy)

A.

B.

C.

D.

Answer: B. -2

Explanation: The formula = A1 – B1 in MS-Excel 2010 subtracts the date in cell B1 from the date in cell A1, resulting in the difference of 2 days (03-10-2013 to 05-10-2013).

Q) Which of the following type of viruses infects the MS-Word application and spread through e-mail attachments, discs, network and internet and is quite difficult to detect?

A. Macro virus

B. Memory-resident virus

C. Boot Sector virus

D. All of these

Answer: A. Macro virus

Explanation: Macro viruses infect MS-Word applications and spread through various means, making them challenging to detect.

Q) To allow operations to be repeated a fixed number of times or until some condition is met, use the ________ structure.

A. Selection

B. Loop

C. Sequential

D. Simple

Answer: B. Loop

Explanation: The structure used to repeat operations a fixed number of times or until a certain condition is met is known as a loop.

Q) Which of the following statements is CORRECT regarding the given formula in MS-Excel 2010? = DATEDIF (A1, TODAY (), "y"), assume that cell A1 contains the birth date of the person 'X'.

A. It calculates the age of the person 'X'.

B. This function does not appear in the drop-down function list for the Date & Time category.

C. You have to enter this function manually when you want to use this function.

D. All of these

Answer: D. All of these

Explanation: The formula calculates the age of the person 'X', and it may not appear in the drop-down list, so you may need to enter it manually.

Q) Which of the following features will save information every few minutes so that you do not lose data in MS-Word 2010?

A. AutoPreserve

B. AutoPrevent Save

C. Save AutoRecover

D. AutoSave

Answer: C. Save AutoRecover

Explanation: The Save AutoRecover feature in MS-Word 2010 saves information every few minutes to prevent data loss in case of unexpected events.

Q) Which of the following operations are NOT performed by System Software?

A. To operate and control hardware.

B. Convert data and instructions into binary form - making it easily understandable by the computer.

C. Create a logo for the system software that is being used on the computer.

D. Check the working of all peripheral devices.

Answer: C. Create a logo for the system software that is being used on the computer.

Explanation: System Software is primarily responsible for operating and controlling hardware, converting data into binary form, and checking the working of peripheral devices. Creating a logo is not a typical function of system software.

Q) _____ is a technology which protects information by converting it into unreadable code that cannot be deciphered by unauthorized people.

A. Password

B. Firewall

C. Disk Encryption

D. Data Masking

Answer: C. Disk Encryption

Explanation: Disk Encryption is a technology that protects information by converting it into unreadable code, making it secure and inaccessible to unauthorized individuals.


← Older Post Newer Post →

POST YOUR COMMENT

    1 out of ...
    Sale

    Unavailable

    Sold Out