KVS - Regional Office, JAIPUR - Session 2021-22
KVS - Regional Office, JAIPUR - Session 2021-22
CHIEF PATRON
Sh. B L Morodia
Deputy Commissioner
KVS (RO), Jaipur
PATRON
Shri D R Meena
Assistant Commissioner
KVS(RO), Jaipur
CONTENT COORDINATOR/COURSE DIRECTOR
12 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Dataframe display & Iteration 1 102 91
Q.11 Write correct Python statement to 2 103 92
display 2nd,3rd,4th rows and 6th,7th c)
columns from a DataFrame Sales. Rollno Name Marks
a) Sales.loc[2:4,6:7] 2 103 Divya 92
b) Sales.loc[6:7,2:4] d)
c) Sales.iloc[2:4,6:7] Rollno Marks
d)Sales.iloc[6:7,2:4] e) 2 103 92
Q.12 Write correct Python statement to display 2nd
column of DataFrame DF. Q.18 Write output of the following Python code:
a) DF[2] b) DF[[2]] Import pandas as pd
c) DF.loc[:,2] d)All of the above df=pd.DataFrame([10,20,30])
Q.13 Explain the meaning of print(df.iloc[:4]) print(df)
where df is a dataframe. a)
a) It will display first 4 rows of 0 1 2
DataFrame df. 0 10 20 30
b) It will display 4th row of DataFrame b)
df. 0
c) It will display last 4 rows of
0 10
DataFarme df
d) None of these
1 20
Q.14 Which is the correct Python statement to 2 30
display last 6 rows of DataFrame Item of 10 c)
rows with some columns? 0
a) Item.loc[4:9] 1 10
b) Item.loc[9:4] 2 20
c) Item.loc[:10] 3 30
d) Item.loc[:11]
d)
Q.15 Given a DataFrame DF:
Rollno Name Marks 1 2 3
0 101 Mayank 89 0 10 20 30
1 102 Harish 91 Q.19 Given a DataFrame Products which shows
2 103 Divya 92 year wise of Products :
Write a Python statement to display only 2018 2019 2020
name of student of first and second rows. TV 101 105 108
a) DF.loc[0:2,‘Name’) AC 56 59 62
b) DF.loc[0:1,0:1]) Computer 69 58 74
c) DF.loc[0:2,1] Laptop 120 125 135
d) DF.loc[1:2,’Name’] Write Python statement to display first two
Q.16 Write Python statement to display Rollno and columns of the above DataFrame.
Marks column of above DataFrame DF. a) Products[[2018,2019]]
a) DF.loc[:] b) Products.loc[:,2018:2019]
b) DF.loc[1:2,’Rollno’:Marks’] c) Only a
c) DF.loc[:,[‘Rollno’,’Marks’]] d) Both a and b
d) DF.loc[[‘Rollno’,’Marks’,:] Q.20 Write Python statement to display last two
Q.17 Write output of the following Python . rows of the above DataFrame Products.
statement for the DataFrame DF given in a) Products.loc[2:]
Q.15. b) Products.loc[‘Computer’:’Laptop’]
print(DF.loc[:1,’Rollno’:’Marks’]) c) Products.loc[2:3]
a) d) Products.loc[:’Laptop’]
Rollno Name Marks Answer Key:-
0 101 Mayank 89 11 a 12 d 13 a 14 a 15 d
1 102 Harish 91
16 c 17 a 18 b 19 a 20 b
b)
Rollno Marks
0 101 89
13 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Operation on rows and columns Answer Key:-
Q21 Inplace=True means:- 21 22 23 24 25 26 27 28 29 30
(a) Changes will be permanent a a d c a a c d a b
(b) Changes are temporary
(c) Changes are partial and temporary Head and Tail and Rename
(d) None of all Q.31 Choose the correct function to rename city
Q22. Df1.sum() will find columns to location using rename() function:
(a) total of all values of each column a. df.rename(columns={‘City’:’Location’})
(b) total of all values of each rows b. df.rename(columns={‘City’=’Location’})
(c) count total rows c. df.rename(‘City’=’Location’)
(d) count total columns d. df.rename(df.columns(‘City’,’Location’))
Q23.To change the 5th column's value at 3rd row
as 35 in dataframe DF, you can write _____. Q.32 Which of the following statement(s) is/are
(a) DF[4, 6] = 35 (b) DF[3, 5] = 35 correct with respect to df.columns properties to
(c) DF.at[4, 6] = 35 (d) DF.at[3, 5] = 35 rename columns
Q24. To delete a column from a DataFrame, you 1. All columns must be specified
may use _____ statement. 2. Columns must be in the form of a list
(a) drop (b) del 3. Old column names not required
(c) both a and b (d) None of all 4. Columns can be specified with columns number
a. Only 1 is correct
Q25. To delete a row from a DataFrame, you may b. 1, 2 and 3 are correct
use _____ statement. c .1 and 3 are correct
(a) drop (b) del d. All of them are correct
(c) both a and b (d) None of all
Q.33 df.index property can be used to
Q26. Which command will be used to delete 3rd and a rename rows
5th rows of the data frame. Assuming the data b rename columns
frame name as DF. c rename rows and columns both
(a) DF.drop([2,4],axis=0) d None of all
(b)DF.drop([2,4],axis=1) Q.34 To display 2 rows from the top in the
(c) DF.drop([3,5],axis=1) dataframe, which of the following statement is
(d)DF.drop([3,5]) correct:
a df.head()=2 b. df.head(2)
Q27. To display 3rd ,4th and 5th column from the 6th
c. df.head(range(2)) d. All of the above
to 9th rows of a dataframe DF , you can write--------
Q.35 Which of the following function display the
--------. ?
last 5 rows from the DataFrame?
(a) DF.loc[6:9,3:5] (b) DF.loc[6:10,3:6]
a. head( ) b. tail( )
(c)DF.iloc[5:9,2:5] (d)DF.iloc[6:9,3:5]
c. Tail( ) d. None of the above
Q28. To change the 3rd column's value at 4th row Q. 36. Replace the row label ‘Ankit’ with ‘Ankita’ in
as 10 in dataframe DF, you can write _____. dataframe ‘DF’
(a) DF[3, 4] = 10 (b) DF[3, 5] = 10 a. DF.Rename({‘Ankit’ : ‘Ankita’})
(c) DF.at[3, 5] = 10 (d) DF.at[3, 4] = 10 b. DF.rename({‘Ankit’ : ‘Ankita’})
Q29. Method or function to add a new row in a data c. DF.repalce({‘Ankit’:’Ankita’})
frame is: d. None of the above
(a) .loc() (b).iloc() (c). join (d). add() Q.37 Replace the column label from 2016 to 2020.
Q30. Which command will be used to delete 3rd a. DF.rename({2016 : 2020}, axis = ‘columns’)
and 5th columnof the data frame. Assuming the b. DF.rename({2016 : 2020}, axis = ‘index’)
data frame name as DF. c. DF.rename({2016 : 2020}, axis = ‘column’)
(a) DF.drop([2,4],axis=0) d. DF.rename({2016 : 2020}, axis = columns)
(b) (b)DF.drop([2,4],axis=1)
Q.38 DF1.head() statement will display _____
(c)DF.drop([3,5],axis=1)
______ rows from DataFrame ‘DF1’.
(d)DF.drop([3,5])
a. All b. 2 c. 3 d. 5
14 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Q.39 Display first row of dataframe ‘DF’ Statement 1 :-Labeled indexing uses rows and
a. print(DF.head(1)) columns title to select data in the DataFrame
b. print(DF[0 : 1]) Statement 2 :- In boolean indexing, we will select
c. print(DF.iloc[0 : 1]) rows or columns based on the actual values of the
d. All of the above data in the DataFrame
Q.40 To print first two columns of the data frame a. Statement 1 is valid but statement 2 is
df we shall use:- invalid
a. df.head(2) b. df.tail(2) b. Statement 1 is invalid but statement 2 is
c. df.iloc[0:,0:2] d. df.head() valid
c. Both statement are valid
Answer Key:- d. Both statements are invalid
31 32 33 34 35 36 37 38 39 40
Q.47 Consider the dataframe df1 given below and
a b a B b b a d d c
answer the following questions
Hindi English IP
TOPIC :- INDEXING AND BOOLEAN INDEXING
Aditya 34 23 67
Q41. Choose the correct answer if the command
Aman 34 85 56
df.loc[‘xyz’:’pqr’] command is executed in given
Rajesh 60 80 91
dataframe df.
Mohit 45 21 32
aaa bbb ccc
Choose correct output for the command
xyz 1 2 3
df1[[True,False,False,True]]
mno 4 5 6
a.
pqr 7 8 9
Hindi English IP
a. All three rows will be selected and printed
Aditya 34 23 67
b. Only first and last rows will be selected and
Aman 34 85 56
printed
c. First two rows will be selected and printed
b.
d. None of all
Hindi English IP
Q.42 To make the column ‘aaa’ as new index of
Aditya 34 23 67
dataframe df, Correct command is
Rajesh 60 80 91
a. df.new_index('aaa', inplace=True)
b. df.setIndex(‘aaa’, inplace=True)
c.
c. df.set_index(‘aaa’, inplace=True)
Hindi English IP
d. df.reset_index(‘aaa’, inplace=True)
Aditya 34 23 67
Q.43 Identify incorrect command to print column Mohit 45 21 32
‘aaa’ of above given df
a. print(df.aaa) d.
b. print(df.’aaa’) Hindi English IP
c. print(df[‘aaa’]) Aman 34 85 56
d. print(df.loc[‘xyz’: ,’aaa’]) Rajesh 60 80 91
Q.48 Output of the command print(df1[‘IP’]==91)
Q.44 Choose correct option to print column ‘aaa’ a.
a. print(df[‘aaa’]) Aditya False
b. print(df.loc[ ‘xyz’: , ’aaa’ ]) Aman False
c. print(df.aaa) Rajesh True
d. All are correct Mohit False
Q.45 To print first two columns of dataframe df is
a. df.head(2) b. Aditya False
b. df.tail(2) Aman False
c. df.head() Rajesh True
d. None of all Mohit False
Q 46. Choose the correct option bases on the two Name : IP, dtype: int64
statements c.
15 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Aditya False d. none of the above
Aman False
Rajesh True 3. The command to install the matplotlib is:
Mohit False a. install pip matplotlib
Name : IP, dtype: bool b. install matplotlib
d. c. pip matplotlib
Rajesh True d. pip install matplotlib
Name : IP, dtype: bool
Q.49 To select rows where 50 and above marks are 4. Which graph should be used where each
stored in English subject is column represents a range of values, and
Hindi English IP the height of a column corresponds to how
Aman 34 85 56 many values are in that range?
Rajesh 60 80 91 a. plot
b. line
a. df[df[‘English’]>50] c. bar
b. df[df[‘English’]>=50] d. histogram
c. df[df[‘English’]=>50]
d. df[df[‘English’]==50] 5. Data visualisation means
a. Analysis of data
Q.50 To print marks of English which is 50 and b. Recovery of data
above, the correct command is c. Graphical representation of data
Aman 85
d. None of the above
Rajesh 80
Name : English, dtype: int64
6. Module used for plotting using matplotlib is:
a. df[df[‘English’]>=50][‘English’] a. plot
b. df[‘English’][df[‘English’]>=50] b. pyplot
c. Both a and b are correct c. draw
d. None of all d. all the above
Answer Key:-
41 42 43 44 45 46 47 48 49 50 7. Which of the following is not a component
a c b d d c c c b c of plot?
a. legend
Data Visualization: - b. x axis
1. The command used to give a heading to a c. title
graph is ___________________ . d. index
a. plt.show() 8. Function of pyplot module used to create
b. plt.plot() figure is:
c. plt.xlabel() a. draw()
d. plt.title() b. plot()
c. show()
2. Using Python Matplotlib ___________ can be d. All the above
used to count how many values fall into each 9. Function of pyplot module used to display
interval. the figure created using plot() function is/
are:
a. line plot
a. draw()
b. bar graph b. plot()
c. show()
c. histogram
d. All the above
16 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
10. Function of pyplot module used to save the 17. Which of the following is valid code for
figure is: adding title to plot?
a. save() a. plt.Title(‘kvsrojaipur’)
b. savefigure() b. plt.head(‘kvsrojaipur’)
c. savefig() c. plt.title(‘kvsrojaipur’)
d. all the above d. all the above
11. Which of the following is a valid kind 18. Valid code to import pyplot module of
argument of plot() function matplotlib is
a. line a. import matplotlib as plt
b. hist b. import pyplot as plt
c. bar c. import matplotlib.pyplot as plt
d. none of the above
d. color
19. Argument used to set the line style of line
chart is:
12. Function used to set x label of the plot
a. linetype
a. label()
b. linestyle
b. xticks()
c. line
c. xlabel() d. all the above
d. none of the above
20. Which of the following is not a valid chart
13. Which argument is used to change the type in Python?
colour of plotted data? a. lineplot
a. datacolor b. bargraph
b. color c. histogram
c. plotcolour d. statistical
d. none of the above
21. Which Python package is used for 2D
14. Which argument is used to change the graphics?
width of line in line graph? (a) matplotlib.pyplot
a. markersize (b) matplotlib.pip
b. linestyle (c) matplotlib.numpy
c. linewidth (d) matplotlib.plt
22. The most popular data visualization library in
d. width
Python is:
(a) pip
15. Which of the following is valid code for
(b) matinfolib
adding title to plot?
(c) matplotlib
a. plt.Title(‘ip cs by yogendra sir’)
(d) matpiplib
b. plt.head(‘ip cs by yogendra sir’)
23. Matplotlib allows you to create:
c. plt.title(‘ip cs by yogendra sir’)
(a) table
d. all the above
(b) charts
(c) maps
16. Starting from which version ,Pandas
(d) infographics
objects Series and DataFrame come
24. Which of the following is not a visualization
equipped with their own .plot()
under matplotlib?
methods.
(a) Scatter plot
a. version 0.17.1 (b) Histogram
b. version 0.17.0 (c) Box plot
c. version 0.17.2 (d) Table plot
d. none of the above
17 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
25. Which plot displays the distribution of data
based on the five-number summary?
(a) Scatter plot
(b) Line plot
(c) Box plot
(d) Chart plot
31 For 2D plotting using a Python library, which
26. Which of the following commands is used to library interface is often used ,
install matplotlib for coding?
(a) import plt.matplotlib as plot a) Seaborn
(b) import plot.matplotlib as pt b) plotly
(c) import matplotlib.plt as plot c) matplotlib
(d) import matplotlib.pyplot as plt d) matplotlib.pyplot
32. Which of the followings are not a valid chart
27. Which of the following methods should be type ?
employed in the code to display a plot()?
(a) show() a) Statistical
(b) display() b) Boxe
(c) execute() c) Pie
(d) plot() d) plot( )
33. Which of the following is not a valid plotting
28. Which of the following statements is used to function of pyplot ?
create a histogram of 'step' type with 20 bins? a) pie( )
(a) plt.hist(x, bins = 20, histype = "barstacked") b) plot( )
(b) plt.hist(x, bins = 20) c) bar( )
(c) plt.hist(x, bins = 20, histype = "step") d) line( )
(d) plt.hist(x, bins = 20, histype = hist())
34. Point out the correct combination with
29. which one of these is not a valid line style in
regards to kind keyword for graph plotting.
matplotlib
(a) ‘-’ (a) ‘hist’ for histogram
(b) ‘--’ (b) ‘box’ for boxplot
(c) ‘-.’ (c) ‘area’ for area plots
(d) ‘<’ (d) all of the above
30. The part of chart which identifies different
sets of data plotted on plot by using different 35. The plot which tells the trend between two
colours is called: graphed variables is the
(a) legends
(b) title (a) scatter graph/chart.
(c) axes (b) pie
(d) figure (c) bar
(d) line
Answers Key: 36. Which of the following functions is used to
create a line chart ?
1 2 3 4 5 6 7 8 9 10
d c d d c b d b c c (a) line( )
11 12 13 14 15 16 17 18 19 20 (b) plot( )
(c) chart()
d c b c c b c c b d
(d) plotline( )
21 22 23 24 25 26 27 28 29 30 37. Which of the following function will produce a
vertical bar chart ?
(a) plotbar( )
18 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
(b) plot( ) 45. Which function would you use to set the limits
(c) bar( ) for x-axis of the plot?
(d) barh( )
38. Which of the following function will create a (a) limits( )
vertical bar chart ? (b) xlimits( )
(c) xlim()
(a) plot( ) (d) lim( )
(b) bar( )
(c) plotbar() 46. Which function is used to show legends?
(d) barh( ) (a) display( )
39. Which of the following function will create a (b) show( )
(c) legend( )
horizontal bar chart ?
(d) legends( )
(a) plot( )
(b) bar( ) 47. Which argument must be set with plotting
(c) plotbar( ) functions for legend( ) to display the legends ?
(d) barh( )
(a) data
40. The data points plotted on a graph are called (b) label
(a) points (c) name
(b) pointers (d) sequence
(c) marks graph is a type of chart which
displays information as a series of data 48. Which function is used to create a histogram ?
points (a) histogram( )
(d) markers (b) histo( )
41. A graph connected by straight line segments. (c) hist()
(a) line (d) histtype
(b) bar
(c) pie 49. Which of the following is not a valid plotting
(d) boxplot function of pyplot ?
42. Which argument of bar() lets you set the
thickness of bar ? (a) plot( )
(b) bar( )
(a) thick (c) line()
(b) thickness (d) pie( )
(c) width
(d) barwidth 50. In which of the installation matplotlib is
43. Which function lets you set the title of the already present?
plot? (a) Standard official Distribution
(a) title( ) (b) Installed python using Anaconda
(b) graphtitle(). (c) Installed Python using King Cobra
(c) plottitle( ) (d) Installed python using C++
(d) All of these
44. The command used to give a heading to a Answers Key:
graph is 31 32 33 34 35 36 37 38 39 40
d a d d d b c b d d
(a) plt.show() 41 42 43 44 45 46 47 48 49 50
(b) plt.plot() a c a d c c b c c b
(c) plt.xlabel( )
(d) plt.title( )
19 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Digital Footprint, Net etiquette, Data the order of a sentence and changing some
Protection, IPR, FOSS, Plagiarism, license, of the work.
copyrights d) All the above
Q1. A ______________ is a body of data that you Q9. It is a form of protection given to the
create while using the Internet: authors of “original works of authorship”.
a) Digital Sign print a) License
b) Digital hand print b) Copyright
c) Digital footprint c) Non-License
d) Digital head print d) User rights
Q2. FOSS stands for: Q10. Permissive licenses provide a royalty-free
a) Free opening System software license to do virtually anything with the
b) Free opened Source Software source code. Do you….?
c) Free opens System Software a) Agree
d) Free and Open Source Software b) Disagree
Q3. What is the Full form of IPR: c) Can’t say
a) Intelligent Product Rights d) None of above
b) Intellectual Property Reserves Q11. Exclusive rights in the software are
c) Intellectual Property Rights retained with the owner /developer
d) Intelligent Property Rights / publisher are known as……………:
a) Open Source Software
Q4. A……. digital footprint is created when data
b) Proprietary Software
is collected without the owner knowing.
c) Free Software
a) Passive
d) Freeware
b) Active
c) Objective Q12. Intellectual property always refers to
d) Subjective intangible property that has been created
Q5. A code of good behavior on the Internet, is by individuals and corporations for their
Known as: benefit or usage such as copyright,
a) Etiquette trademark, patent and digital data……:
b) Native a) True
c) Netiquette b) False
d) Protocol c) Sometimes
d) Never
Q6. ………. refers to the practices, safeguards,
and binding rules put in place to protect Q13. A copyright is automatically granted to
your personal information and ensure authors or creators of content:
that you remain in control of it.: a) True
a) Data Security b) False
b) Data Protection c) Never
c) Data Stealing d) Can’t say
d) Unknown Data
Q14. In FOSS source code is usually hidden from
Q7. Presenting an entire text by someone else the users.
as your own work is known as ….: a) True
a) Plain Plagiarism b) False
b) Global Plagiarism c) Never
c) Local Plagiarism d) Sometimes
d) Unknown Plagiarism Q15. Anushka is using her internet connection
Q8. Plagiarism should be avoided by the to book a train ticket. This is a classic
following simple measures:: example of leaving a trail of web activities
a) Use your own ideas and words. carried by her. What do we call this type of
b) Always provide a reference or give credit to activity?
the source from where you have received a) Digital login
information. b) Digital Footprint
c) Cite the name of the website, a URL or the c) Digital Log off
name of authors, and acknowledge them if d) Digital Error
you have used their work after rearranging
20 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Q16. Anil likes to do his homework late at night. Q 23. Which of the following is not a violation of
He uses the Internet a lot and also sends useful data IPR?
through email to many of his friends. One Day he forgot a) Copyright Infringement
to sign out from his email account. In the morning, his b) Trademark Infringement
twin brother, Sunil started using the computer. He used c) Patent
Anil’s email account to send inappropriate messages to d) Plagiarism
his contacts. What do we call this type of activity? Q 24. Which of the following is not an OSS?
a) Stealing of Data a) LibreOffice
b) Identity Theft b) MYSQL
c) Digital Theft c) MSOffice
d) Misuse of Email d) Linux
Q17. Linux, Apache, MySQL and PHP software Q 25. The user must agree to the ……terms and
come under_______ category. agreements when they use an OSS.
a) Proprietary Software a) System
b) FLOSS b) License
c) Freeware c) Community
d) Shareware d) Program
Q18. We should follow the rules for good Q 26. Intellectual Property Rights (IPR) protect
Etiquettes while being online. Choose the the use of information and ideas that are
right net etiquette (s) from the following: of….
a) Avoid posting offensive comments a) Social value
b) Respect others' privacy b) Moral Value
c) Don't troll people in web forums c) Commercial Value
d) All the above d) Ethical value
Q19. Ravi is a student of class -10 and he is a Q 27. Intellectual Property Rights (IPR) in India
very frequent user of internet applications Covers ……….
One day he got an unpleasant message on a) Patents
his WhatsApp. What do you think he b) Copyrights
should do? c) Trademarks
a) Forward it to others d) All the above
b) Reply back to the sender Q 28. When was Copyright Act enacted in India?
c) Switch off the device a) 1955
d) Tell to his parents about the incident b) 1957
Q20. Sunita is confused about the free operating c) 1959
system available in the market. Few of her d) 1960
friends suggested a few operating systems. Q 29. Copyright is a……………?
Help her in choosing free operating system a) Negative Right
for her device:
b) Positive Right
a) Apache
b) Windows
c) Exclusive Right
c) Mozilla d) Both B and C
d) Ubuntu Q 30. Which of the following is not a fair use of a
copyrighted work?
Q 21. Aman deleted all his chats from all his
a) Use for research
social media accounts, and he thinks that
b) Use for criticism
all his traces are deleted completely. Is he
right in thinking so? c) Use for review
a) No d) Use for commercial purpose
b) Yes Answers:
c) May be 1 2 3 4 5 6 7 8 9 10
d) Not Sure c d c a c b b d b a
Q 22. ____________is the practice of taking 11 12 13 14 15 16 17 18 19 20
someone else's work or ideas and passing b a a b b b b d d d
them off as one's own: 21 22 23 24 25 26 27 28 29 30
a) Plagiarism
b) Copyright
a a c c b c d b d d
c) Patent
d) All of the above
21 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Cybercrime and cyber laws, Q9. Hackers try to break security system ________
hacking, phishing, cyber bullying, a) for Identity theft
b) for monetary gain
overview of Indian IT Act.
c) to leak sensitive information
Q1. _______ is defined as a crime in which the
d) All of the above
computer is the medium of crime.
Q10. ______________ is an activity where fake
a) Computer crime
websites or emails that look original or authentic
b) Cyber crime
are presented to the user.
c) Internet crime
a) Phishing
d) Digital crime
b) Hacking
Q2. Which of the following is cybercrime?
c) Spamming
a) Hacking
d) Identity theft
b) Phishing
Q11. What is the most important activity in system
c) Spamming
hacking?
d) All of the above
a) Information gathering
Q3. A ___________ is some lines of malicious code that
b) Cracking passwords
can copy itself and can have detrimental effect on
c) Escalating privileges
the computers, by destroying data or corrupting
d) Covering tracks
the system.
Q12. Online posting of rumours, giving threats
a) Cyber crime
online, posting the victim’s personal information,
b) Computer virus
comments aimed to publicly ridicule a victim is
c) Program
termed as __________
d) Software
a) Cyber bullying
Q4. ____________ is the act of unauthorized access to
b) Cyber crime
a computer, computer network or any digital
c) Cyber insult
system.
d) All of the above
a) Sign in
Q13. In India _______ law provides guidelines to the
b) Hacking
user on the processing, storage and transmission
c) Tracking
of sensitive information.
d) None of the above
a) Information Technology Act, 2000
Q5. Hacking, when done with a positive intent, is b) Indian Technology Act, 2000
called ______ c) Inform Technology Act, 2000
a) Ethical hacking d) Information Techware Act, 2000
b) Active hacking Q14. Which of the following are feasible methods
c) Passive hacking of e-waste management?
d) Ethics a) Reduce
Q6. Which of the following is called black hat b) Reuse
hacker? c) Recycle
a) Ethical hacker d) All of the above
b) Non-Ethical hacker Q15. The process of re-selling old electronic goods
c) Both of the above at lower prices is called ____
d) None of the above a) refurbishing
Q7. Primary focus of ________ is on security cracking b) recycle
and data stealing. c) reuse
a) ethical hacker d) Reduce
b) non ethical hacker Q16. e-waste is responsible for air, water and land
c) white hat hacker pollution. (T/F)
d) None of the above a) True
Q8. Which of the following is not a cyber-crime? b) False
a) Phishing Q17 e-waste is responsible for the degradation of
b) Ransomware our environment. (T/F)
c) Hacking a) True
d) Tracking b) False
22 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
Q18. Bad posture of using computer may cause c) Cyber stalking
_____ d) Phishing
a) Backache Q26 What is the full form of ITA-2000?
b) Neck Pain a) Information Tech Act -2000
c) Shoulder pain b) Indian Technology Act -2000
d) All of the above c) International Technology Act -2000
Q19. What we have to ensures to maintain good d) Information Technology Act -2000
health of a computer system? Q27 In which year the IT Act, 2000 updated?
a) Wipe monitor’s screen often using the regular a) IT Act, 2007
microfiber soft cloth. b) Advanced IT Act, 2000
b) Keep it away from direct heat, sunlight and put c) IT Act, 2008
it in a room with enough ventilation for air d) None of the Above
circulation. Q28. Which of the following is not a cyber-crime?
c) Do not eat food or drink over the keyboard a. Phishing
d) All of the above b. Ransomware
Q20. _______ is a person who deliberately sows c. Hacking
discord on the Internet by starting quarrels or d. Tracking
upsetting people, by posting inflammatory or off Q29. After practical, Rani left the computer
topic messages in an online community. laboratory but forgot to sign off from her email
a) Netizen account. Later, her classmate Ravina started using
b) Digital Citizen the same computer. She is now logged in as Rani.
c) Internet troll She sends inflammatory email messages to few of
d) None of the above his classmates using Rani’s email account. Ravina’s
Q21.Which is bout internet effects on eye activity is an example of which of the following
a) Blurred vision cyber-crime?
b) Dry Eyes a) Plagiarism
c) Tears b) Hacking
d) All of the above c) Identity theft
Q22 Which of the following is not a type of cyber- d) Cyber bullying
crime? Q30. Kamal found a crumpled paper under her
a) Data theft desk. She picked it up and opened it. It contained
b) Forgery some text which was struck off thrice. But she
c) Damage to data and systems could still figure out easily that the struck off text
d) Installing antivirus for protection was the email ID and password of Ronak, her
Q23. In which of the following, a person is classmate. What is ethically correct for Kamal to
constantly followed/chased by another person or do?
group of several peoples? a) Inform Ronak so that he may change his
a) Phishing password
b) Bulling b) Give the password of Ronak’s email ID to all
c) Stalking other classmates
d) Identity theft c) Use Ronak’s password to access his account
Q24. _______ is an application of information and d) None of the above
communication technology (ICT) for delivering Answer Key: -
Government Service.
a) Governance 1 2 3 4 5 6 7 8 9 10
b) Electronic Governance b d b b a b b d d a
c) Governance and Ethics 11 12 13 14 15 16 17 18 19 20
d) Risk and Governance. b a a d a a a d d c
Q25. Use of electronic messaging systems to send 21 22 23 24 25 26 27 28 29 30
unsolicited bulk messages are called d d c b b d c d c a
a) email bombing
b) Spamming
23 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2
©KENDRIYA VIDYALAY SANGATHAN, JAIPUR REGION
24 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 1 - 2 2