0% found this document useful (0 votes)
466 views35 pages

Question Bank Class XII IP 065 MCQ With Answer

MCQs

Uploaded by

Monika Vashisht
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
466 views35 pages

Question Bank Class XII IP 065 MCQ With Answer

MCQs

Uploaded by

Monika Vashisht
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Worksheet MCQ With Answer

Session : 2023-24
Class –XII
Subject- Informatics Practices (065)

Data Handling using Pandas and Data Visualization

Q1. Which of the following is/ are libraries in Python?


a. NumPy
b. Pandas
c. Matplotlib
d. All of the above

Ans. d. All of the above

Q2. Minimum number of arguments, we require to pass in pandas series?


a. 0
b. 1
c. 2
d. 3

Ans. b. 1

Q3. PANDAS stands for _____________


a. Panel Data Analysis
b. Panel Data analyst
c. Panel Data
d. Panel Dashboard

Ans. c. Panel Data

Q4. __________ is an important library used for analysing data.


a. Math
b. Random
c. Pandas
d. None of the above

Ans. c. Pandas

Q5. We can analyze the data in pandas with:


a. Series
b. DataFrame
c. Both of the above
d. None of the above

Ans. c. Both of the above

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 1


Q6. Which of the following command is used to install pandas?
a. pip install pandas
b. install pandas
c. pip pandas
d. None of the above

Ans. a. pip install pandas

Q7. Python pandas was developed by?


a. Guido van Rossum
b. Travis Oliphant
c. Wes McKinney
d. Brendan Eich

Ans. c. Wes McKinney

Q8. A _______________ is a one-dimensional array.


a. Data Frame
b. Series
c. Both of the above
d. None of the above

Ans. b. Series

Q9. Which of the following statement is wrong?


a. We can create Series from Dictionary in Python.
b. Keys of dictionary become index of the series.
c. Order of indexes created from Keys may not be in the same order as typed in
dictionary.
d. All are correct

Ans. d. All are correct

Q10. A Series by default have numeric data labels starting from ______________.
a. 3
b. 2
c. 1
d. 0

Ans. d. 0

Q11. The data label associated with a particular value of Series is called its ______________
a. Data value
b. Index
c. Value
d. None of the above

Ans. b. Index

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 2


Q12. Which of the following module is to be imported to create Series?
a. NumPy
b. Pandas
c. Matplotlib
d. None of the above

Ans. b. Pandas

Q13. Which of the following function help to create Series?


a. series( )
b. Series( )
c. createSeries( )
d. None of the above

Ans. b. Series( )

Q14. Write the output of the following :


import pandas as pd
series1 = pd.Series([40,50,60])
print(series1)
a.
0 40
1 50
2 60
dtype: int64
b.
40
50
60
dtype: int64
c.
0
1
2
dtype: int64
d. None of the above

Ans. a.
0 40
1 50
2 60
dtype: int64
Q15. How many values will be there in array1, if given code is not returning any error?
series4 = pd.Series(array1, index = [“Jan”, “Feb”, “Mar”, “Apr”])
a. 1
b. 2
c. 3
d. 4

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 3


Ans. d. 4

Q16. How many elements will be there in the series named “S1”?
>>> S1 = pd.Series(range(5))
>>> print(S1)
a. 5
b. 4
c. 6
d. None of the above

Ans. a. 5

Q17. When we create a series from dictionary then the keys of dictionary become _______
a. Index of the series
b. Value of the series
c. Caption of the series
d. None of the series

Ans. a. Index of the series

Q18. Write the output of the following :


S1=pd.Series(14, index = ['a', 'b', 'c'])
print(S1)
a.
a 14
b 14
c 14
dtype: int64
b.
a 14
dtype: int64
c. Error
d. None of the above

Ans. a.
a 14
b 14
c 14
dtype: int64

Q19. What type of error is returned by following code?


import pandas as pd
S1 = pd.Series(data = (31, 2, -6),
index = [7, 9, 3, 2])
print(S1)
a. SyntaxError
b. IndexError
c. ValueError

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 4


d. None of the above

Ans. c. ValueError

Q20. We can imagine a Pandas Series as a ______________ in a spread sheet


a. Column
b. Cell
c. Table
d. None of the above

Ans. a. Column

Q21. In Python Pandas, which function is used to create a dataframe ?


a) createDF() b) dataframe()
c) DataFrame() d) Dataframe()

Ans. c) DataFrame()

Q22. Complete the following code –


_____________________ #missing statement
D = {'code' : [102 , 104, 105 ], 'ename' : ['Arun', 'Geet', 'Amy'] }
df1 = pp.DataFrame(D)
print(df1)
a) import pandas
b) import pandas as pp
c) import Pandas as pp
d) import pandas as pd

Ans. b) import pandas as pp

Q23. A dataframe in Python Pandas can be created using –


a) A Python dictionary
b) A scalar value
c) A List
d) All of these

Ans. d) All of these

Q24. The axis = 0 is used to identify a dataframe’s _____________


a) rows b) columns
c) datatype d) values
Ans. a) rows

Q25. Missing data in a Dataframe object is represented through –


a) NULL b) None
c) NaN d) <empty>

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 5


Ans. c) NaN

Q26. The function to create a dataframe from a CSV file is –


a) to_csv() b)load_csv()
c) fetch_csv d) read_csv()

Ans. d) read_csv()

Q27. From a 4(rows) x 3(columns) size dataframe, we can extract total different series
based on index and columns will be
a) 4 b) 3
c) 7 d) 12

Ans. c) 7

Q28. Assertion – DataFrame is a two-dimensional Pandas structure, with ordered


collections of columns that can store data of different types.
Reason - Dataframe is an array-like structure with two indices or axes – row index (
axis = 0) and column index (axis=1). Dataframe is value-mutable as well as size-
mutable with heterogeneous data.

a) Assertion is True & Reason is correct explanation of Assertion


b) Assertion is True, but Reason is partially True
c) Assertion is True but Reason is False
d) Both Assertion and Reason are False

Ans. a) Assertion is True & Reason is correct explanation of Assertion

Q29. Assertion – Two basic data structure in Python are: Series and Dataframe. But
both are different from each other.
Reason - Series stores heterogenous data while Dataframe stores homogenous data.

a) Assertion is True & Reason is correct explanation of Assertion


b) Assertion is True, but Reason is partially True
c) Assertion is True but Reason is False
d) Both Assertion and Reason are False

Ans. c) Assertion is True but Reason is False

Q.30. Write correct Python statement to display 2nd,3rd,4th rows and 6th,7th
columns from a DataFrame Sales.
a) Sales.loc[2:4,6:7]
b) Sales.loc[6:7,2:4]
c) Sales.iloc[2:4,6:7]
d)Sales.iloc[6:7,2:4]

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 6


Ans. a) Sales.loc[2:4,6:7]

Q.31.Write correct Python statement to display 2nd column of DataFrame DF.


a) DF[2] b) DF[[2]]
c) DF.loc[:,2] d)All of the above

Ans. d)All of the above

Q.32. Explain the meaning of print(df.iloc[:4]) where df is a dataframe.


a) It will display first 4 rows of DataFrame df.
b) It will display 4th row of DataFrame df.
c) It will display last 4 rows of DataFarme df
d) None of these

Ans. a) It will display first 4 rows of DataFrame df.

Q.33. Which is the correct Python statement to display last 6 rows of DataFrame Item of 10
rows with some columns?
a) Item.loc[4:9]
b) Item.loc[9:4]
c) Item.loc[:10]
d) Item.loc[:11]

Ans. a) Item.loc[4:9]

Q.34. Write Python statement to display last two rows of the above DataFrame Products.
a) Products.loc[2:]
b) Products.loc[‘Computer’:’Laptop’]
c) Products.loc[2:3]
d) Products.loc[:’Laptop’]

Ans. b) Products.loc[‘Computer’:’Laptop’]

Q35. To change the 5th column's value at 3rd row as 35 in dataframe DF, you can write
_____.
(a) DF[4, 6] = 35 (b) DF[3, 5] = 35
(c) DF.at[4, 6] = 35 (d) DF.at[3, 5] = 35

Ans. (d) DF.at[3, 5] = 35

Q.36. Choose the correct function to rename city columns to location using rename()
function:
a. df.rename(columns={‘City’:’Location’})
b. df.rename(columns={‘City’=’Location’})
c. df.rename(‘City’=’Location’)
d. df.rename(df.columns(‘City’,’Location’))

Ans. a. df.rename(columns={‘City’:’Location’})

Q.37. df.index property can be used to

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 7


a rename rows
b rename columns
c rename rows and columns both
d None of all

Ans. a rename rows

Q. 38. Replace the row label ‘Ankit’ with ‘Ankita’ in dataframe ‘DF’
a. DF.Rename({‘Ankit’ : ‘Ankita’})
b. DF.rename({‘Ankit’ : ‘Ankita’})
c. DF.repalce({‘Ankit’:’Ankita’})
d. None of the above

Ans. b. DF.rename({‘Ankit’ : ‘Ankita’})

Q.39 Display first row of dataframe ‘DF’


a. print(DF.head(1))
b. print(DF[0 : 1])
c. print(DF.iloc[0 : 1])
d. All of the above

Ans. d. All of the above

Q 40. Choose the correct option bases on the two statements


Statement 1 :-Labeled indexing uses rows and columns title to select data in the
DataFrame
Statement 2 :- In boolean indexing, we will select rows or columns based on the actual
values of the data in the DataFrame
a. Statement 1 is valid but statement 2 is invalid
b. Statement 1 is invalid but statement 2 is valid
c. Both statement are valid
d. Both statements are invalid

Ans. b. Statement 1 is invalid but statement 2 is valid

Q41. The command used to give a heading to a graph is ___________________ .


a. plt.show()
b. plt.plot()
c. plt.xlabel()
d. plt.title()

Ans. d. plt.title()

Q.42. Using Python Matplotlib ___________ can be used to count how many values fall into
each interval.

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 8


a. line plot
b. bar graph
c. histogram
d. none of the above

Ans. c. histogram

Q.43. The command to install the matplotlib is:


a. install pip matplotlib
b. install matplotlib
c. pip matplotlib
d. pip install matplotlib

Ans. d. pip install matplotlib

Q44. Which graph should be used where each column represents a range of values, and
the height of a column corresponds to how many values are in that range?
a. plot
b. line
c. bar
d. histogram

Ans. d. histogram

Q45. Module used for plotting using matplotlib is:


a. plot
b. pyplot
c. draw
d. all the above

Ans. b. pyplot

Q46. Function of pyplot module used to save the figure is:


a. save()
b. savefigure()
c. savefig()
d. all the above

Ans. c. savefig()

Q47. Which of the following is not a valid plotting function of pyplot ?

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 9


a) pie( )
b) plot( )
c) bar( )
d) line( )

Ans. d) line( )

Q48. Which of the following function will create a horizontal bar chart ?
(a) plot( )
(b) bar( )
(c) plotbar( )
(d) barh( )

Ans. (d) barh( )

Q49. The data points plotted on a graph are called


(a) points
(b) pointers
(c) marks graph is a type of chart which displays information as a series of data points
(d) markers

Ans. (d) markers

Q50. Which argument of bar() lets you set the thickness of bar ?
(a) thick
(b) thickness
(c) width
(d) barwidth

Ans. (c) width

Database Query using SQL


Q.1. A ____ is a property of the entire relation, which ensures through its value that each
tuple is unique in a relation.
(a) Rows (b) Key (c) Attributes (d) Fields

Ans. (b) Key

Q.2. A relational database can have how many type of keys in a table ?
(a) Candidate Key (b) Primary Key (c) Foreign Key (d) All of these

Ans. (d) All of these

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 10


Q.3. Which one of the following uniquely identifies the tuples / rows in a relation.
(a) Secondary Key (b) Primary Key (c) Composite Key (d) Foreign Key

Ans. (b) Primary Key

Q.4. The Primary key is selected from the set of __________.


(a) Composite Key (b) Determinants (c) Candidates Key (d) Foreign Key

Ans. (c) Candidate Key

Q.5. Which of the following is a group of one or more attributes that uniquely identifies a
row?
(a) Key (b) Determinant (c) Tuple (d) Relation

Ans. (a) Key

Q.6. Which of the following attributes cannot be considered as a choice for Primary Key ?
(a) Id (b) License number (c) Dept_Id (d) Street

Ans. (d) Street

Q.7. An attribute in a relation is a foreign key if it is the ______ key in any other relation.
(a) Candidate (b) Primary (c) Super (d) Sub

Ans. (b) Primary

Q.8. Consider the table with structure as :


Student(ID, name, dept_name, tot_cred)
In the above table, which attribute will form the primary key?
(a) name (b) dept_name (c) Total_credits (d) ID

Ans. (d) ID

Q.9. Which of the following is not a legal sub-language of SQL ?


(a) DDL (b) QAL (c) DML (d) TCL

Ans. (b) QAL

Q.10. Which of the following is a DDL command?


(a) SELECT (b) ALTER (c) INSERT (d) UPDATE

Ans. (b) ALTER

Q.11. In SQL, which of the following will select only one copy of each set of duplicate rows
from a table.
(a) SELECT UNIQUE
(b) SELECT DISTINCT
(c) SELECT DIFFERENT
(d) All of these.

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 11


Ans. (b) SELECT DISTINCT

Q.12. Which of the following keywords will you use in the following query to display the
unique values of the column dept_name?
SELECT________ dept_name FROM COMPANY;
(a) All (b) From (c) Distinct (d) Name

Ans. (c) Distinct

Q.13. The___ clause of SELECT query allows us to select only those rows in the result that
satisfy a specified condition.
(a) where (b) from (c) having (d) like

Ans. (a) where

Q.14. Which operator can take wild card characters for query condition?
(a) BETWEN (b) LIKE (c) IN (d) NOT

Ans. (b) LIKE

Q.15. Which operator checks a value against a range of values?


(a) BETWEEN (b) LIKE (c) IN (d) NOT

Ans. (a) BETWEEN

Q.16. Which of the following SQL commands retrives data from table(s) ?
(a) UPDATE (b) SELECT (c) Union (d) All of these

Ans. (b) SELECT

Q.17. Which of the following queries contains an error ?


(a) Select * from emp where empid=10003;
(b) Select empid from emp where empid=10006;
(c) Select empid from emp;
(d) Select empid where empid=10009 and lastname= „GUPTA‟;

Ans. (d)

Q.18. Consider the following table namely Employee :

Employee_id Name Salary


1001 Misha 6000
1009 Khushi 4500
1018 Japneet 7000

Which of the names will not be displayed by the below given query ?
SELECT name from Employee WHERE employee_id>1009;
(a) Misha, Khushi (b) Khushi, Japneet (c) Japneet (d)Misha, Japneet

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 12


Ans. (a) Misha, Khushi

Q.19. Which operator perform pattern matching ?


(a) BETWEN (b) LIKE (c) IN (d) NOT

Ans. (b) LIKE

Q.20. Consider the following query


SELECT name FROM class WHERE Subject LIKE „___ Informatics Practices‟;
Which one of the following has to be added into the blank space to select the subject
which has informatics practices as its ending string?
(a) $ (b) _ (c) || (d) %

Ans. (d) %

Q.21. Which operator tests a column for the absence of data(i.e. NULL value) ?
(a) Exist Operator (b) NOT Operator (c) IS Operator (d) None of these

Ans. (c) IS Operator

Q.22. Which clause is used to sort the query result ?


(a) Order By (b) Sort By (c) Group By (d) Arrange By

Ans. (a) Order By

Q.23. By default ORDER BY clause list the result in ________ order.


(a) Descending (b) Any (c) Same (d) Ascending

Ans. (d) Ascending

Q.24. Consider the following query


SELECT * FROM employee ORDER BY salary ________, name ______;
To display the salary from greater to smaller and name in alphabetical order which of the
following options should be used ?
(a) Ascending, Descending
(b) Asc, Desc
(c) Desc, Asc
(d) Descending, Ascending

Ans. (c) Desc, Asc

Q.25. What is the meaning of Remark LIKE “%5%5%”;


(a) Column Remark begin with two 5s
(b) Column Remark ends with two 5s
(c) Column Remark has more than two 5s
(d) Column Remark has two 5s in it, at any position

Ans. (d)

Q.26. In SQL, which command(s) is/are used to change a table‟s structure/characteristics?

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 13


(a) ALTER TABLE (b) MODIFY TABLE (c) CHANGE TABLE (d) All of these

Ans. (a) ALTER TABLE

Q.27. Which of the following is/are the DDL Statement ?


(a) Create (b) Drop (c) Alter (d) All of these

Ans. (d) All of these

Q.28. A Table can have __________


(a) Many primary keys and many unique keys.
(b) One primary key and one unique key
(c) One primary key and many unique keys.
(d) Many primary keys and one unique key.

Ans. (c)

Q.29. Which of the following types of table constraints will prevent the entry of duplicate
rows?
(a) Unique (b) Distinct (c) Primary Key (d) Null

Ans. (a) Unique

Q.30. Consider the following SQL Statement. What type of statement is this ?
INSERT INTO instructor VALUES (10211, „SHREYA‟ , „BIOLOGY‟, 69000);
(a) Procedure (b) DML (c) DCL (d) DDL

Ans. (b) DML

Q.31. Which of the following statements will delete all rows in a table namely
mytablewithout deleting the table‟s structure.
(a) DELETE FROM mytable;‟
(b) DELETE TABLE mytable;
(c) DROP TABLE mytable;
(d) None of these.

Ans. (a)

Q.32. Which of the following query will drop a column from a table ?
(a) DELETE COLUMN column_name;
(b) DROP COLUMN column_name;
(c) ALTER TABLE table_name DROP COLUMN column_name;
(d) None of these

Ans. (c)

Q.33. Logical operator used in SQL are:


(a) AND, OR, NOT (b) &&, ||, ! (c) $,|,! (d) None of these

Ans. (a)

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 14


Q.34. Which of the following requirement can be implemented using a CHECK constraint?
(a) Student must be greater than 18 years old.
(b) Student must be form a BRICS Country (Brazil, Russia, India, China, South Africa)
(c) Student‟s roll number must exist in another table(say, namely Eligible)
(d) None of these

Ans. (a) and (c)

Q.35. An attribute in a relation is termed as a foreign key when it reference the _____ of
another relation.
(a) Foreign Key (b) Primary Key (c) Unique Key (d) Check Constraint

Ans. (b) Primary Key

Q.36. Data integrity constraints are used to :


(a) Control the access and rights for the table data.
(b) Ensure the entry of unique records in a table.
(c) Ensure the correctness of the data entered in the table as per some rule or condition etc.
(d) Make data safe from accidental changes

Ans. (c)

Q.37. A relationship is formed via _______ that relates two tables where one table references
other table‟s key.
(a) Candidate Key (b) Primary Key (c) Foreign Key (d) Check Constraint

Ans. (b)Foreign Key

Q.38. What is the maximum value that can be stored in NUMBERIC(4,2)?


(a) 9999.99 (b) 99.9999 (c) 99.99 (d) 9.99

Ans. (c)99.99

Q.39. What should be the data type for the column Pricestoring values less than Rs.1000 e.g.
200.21
(a) VARCHAR(50) (b) NUMBER (c) NUMBER(5,2) (d) NUMBER(6)

Ans. (c) NUMBER(5,2)

Q.40. What is anamein the following SQL Statement ?


SELECT aname FROM table1 UNION SELECT aname FROM table2;
(a) row name (b) column Name (c) table name (d) database name

Ans. (b) column Name

Q.41. Data manipulation language (DML) includes statements that modify the_____ of the
tables of database.
(a) Structure (b) Data (c) User (d) Size

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 15


Ans. (b) Data

Q.42. All aggregate functions ignore NULLs except for the __________ function.
(a) Distinct (b) Count(*) (c) Average() (d) None of these

Ans. (b)Count(*)

Q.43. Which of the following are correct aggregate functions in SQL


(a) AVERAGE() (b) MAX() (c) COUNT() (d) TOTAL()

Ans. (b)And (c)

Q.44. Identify the correct INSERT queries from the following :


(a) INSERT INTO Persons(„xxx1‟, „yyy1‟);
(b) INSERT INTO Persons(LastName, FirstName) Values („xxx‟, „yyy‟);
(c) INSERT INTO Persons Values(„xxx1‟ , „yyy1‟);
(d) INSERT INTO Persons Value(„xxx1‟ , „yyy1‟);

Ans. (b)And (c)

Q.45. Aggregate functions can be used in the select list or the ____ clause of the select
statement.
They cannot be used in a _______ clause.
(a) Where, having (b) Having, where (c) Group by, having (d) Group by where

Ans. (c) Group by, having

Q.46. What is the meaning of “HAVING” clause in SELECT query.


(a) To filter out the summary groups.
(b) To filter out the column groups.
(c) To filter out the row and column values.
(d) None of the mentioned.

Ans. (a)

Q.47. Which of the following is not a text function?


(a) TRIM () (b) TRUNCATE() (c) LEFT() (d) MID ()

Ans. (b) TRUNCATE()

Q.48. What will be returned by the given query ?


SELECT INSTR(„INDIA‟, „DI‟);
(a) 2 (b) 3 (c) -2 (d) -3

Ans. (b) 3

Q.49. What will be returned by the given query ?


SELECT ROUND(153.669,2);
(a) 153.6 (b) 153.66 (c) 153.67 (d) 153.7

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 16


Ans. (c) 153.67

Q.50. What will be returned by the given query?


SELECT month(„2020-05-11‟);
(a) 5 (b) 11 (c) May (d) November

Ans. (a) 5

Introduction to Computer Networks

Q.1. What is an standalone computer system


a. It is a computer system with internet connectivity
b. It is a server
c. It is a computer without any networking
d. None is correct

Ans. C

Q.2. The main computer in any network is called as


a. Client
b. Server
c. Hub
d. Switch

Ans. B

Q.3. What is the full form of NIC


a. Network Interchange Card
b. Net Interconnect Card
c. Network Interface Card
d. Network Interconnection Card

Ans. C

Q.4. Which is called a smart HUB


a. HUB with high speed ports
b. Switch
c. Router
d. All of the Above

Ans. B

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 17


Q.5. A network with all client computer and no server is called
a. Networking
b. Peer to Peer Computing
c. Client Server Computing
d. Any of them

Ans. B

Q.6. The wireless access point in the networking is also


a. An wireless switch
b. An Wireless Security Point
c. An Address where all the wifi devices connect
d. All of the above

Ans. D

Q.7. Generally which topology is used in the backbone of Internet


a. BUS
b. STAR
c. RING
d. Any of them

Ans. A

Q.8. IP Stands for


a. Internet Protocol
b. Intranet Protocol
c. Internet Practice
d. Intranet Practice

Ans. A

Q.9. Which of this is not a part of URL


a. IP Address
b. Port Number
c. Domain Name
d. None of these
Ans. A

Q.10. What is the example of Instant Messenger


a. Yahoo messenger
b. WhatApp messenger
c. iMessenger
d. All of them

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 18


Ans. A

Q.11. Which of the following is an browser


a. Chrome
b. Whatsapp
c. Twitter
d. All of them

Ans. A

Q.12. Repeaters work on the __________ layer


a. Network Layer
b. Physical Layer
c. Application Layer
d. All of the Above

Ans. B

Q.13. Which device is used to transfer Communication Signal to Long Directions


a. Amplifier
b. Repeater
c. Router
d. All of the Above

Ans. B

Q.14. Which topology in general uses less wire length compare to other
a. Star Topology
b. Ring Topology
c. Bus Topology
d. All use same Length of Wire

Ans. C

Q.15. The device with smartly controls the flow of data over the network by hoping is
a. Router
b. Gateway
c. Switch
d. None of them

Ans. A

Q.16. javascript is a ___________ based language


a. interpretor

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 19


b. compiler
c. None

Ans. A

Q.17. Which one in a micro blogging software


a. Twitter
b. Facebook
c. Whatsapp
d. All of them

Ans. A

Q.18. Sending the email to any cc means


a. Sending the mail with a carbon copy
b. Sending the mail without a carbon copy
c. Sending the email to all and hiding the address
d. All of the above

Ans. A

Q.19. The backbone of internet is


a. WAN Network
b. Fibre optical networks across long distances like intercontinental or intra continental
c. Wireless networks
d. All of them

Ans. B

Q.20. Which is the physical address to identify the Machine uniquely in network
a. IP Address
b. MAC Address
c. Computer Name
d. Your Used ID

Ans. B

Q.21. Online textual talk is called


a. Video Conference
b. Text Chat
c. Video Call
d. Audio Call

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 20


Ans. B

Q.22. The First Page we generally view when we open the browser is called.
a. Default page
b. First page
c. Home page
d. Landing Page

Ans. C

Q.23. URL stands for


a. Uniform Run Line
b. Uniform Resource Line
c. Uniform Resource Location
d. Uniform Resource Locator

Ans. D

Q.24. Digital foot print is of ___ types


a. 1
b. 2
c. 3
d. 4

Ans. B

Q.25. What is noise in the voice channel


a. Cable disturbance
b. Cable sort length
c. Loss of Signal Strength
d. Unwanted disturbance with the genuine signal

Ans. D

Q.26. php language is used to create


a. Dynamic Website
b. Static Website
c. Both the types of website
d. It is not a programming language

Ans. C

Q.27. HTML language is used to create


a. Accounting Program

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 21


b. Static Website
c. Both website and accounting program
d. It is not a programming language

Ans. B

Q.28. Google is a
a. Web service
b. Website
c. Program
d. All of it

Ans. A

Q.29. When the signal from one wire bleeds into another wire , it is called as
a. Radio waves
b. Infrared
c. Laser
d. None of them

Ans. C

Q.30. Communication Media can be of ___________ and _____________ type


a. Twisted pair , Shielded Twisted pair
b. Fiber optics , coaxial
c. Guided , Unguided
d. Wire , Laser

Ans. C

Q.31. To prevent unauthorized access to and / or from the network, a system known as
____________, can be implemented by hardware and / or software
a. Antivirus
b. Firewall
c. Software
d. Hardware

Ans. B

Q.32. Why we should express greeting on telephone:


A. It express your happiness
B. It shows that you are polite
C. It is the first impression
D. It is the culture.

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 22


Ans B

Q.33.
Statement A : Social media are websites or applications that enable their users to participate
in social networking but they cannot create and share content with others in the community.
Statement B : We should not waste precious time in responding to unnecessary emails or
comments unless they have some relevance for us.
a. Both statements are correct.
b. Both statements are incorrect
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct

Ans D

Q.34. To maintain Internet etiquette choose from the following options:


Statement I: Use respectful language over chatting etc.,
Statement II: Share others personal information and photos
Statement III: Fact check before reposting anything
Statement IV: Never spam (Don’t post something repeatedly)
a) Statements I and II only True
b) Statement III only True
c) Statements I, III and IV are True
d) Statements I, II are False

Ans. c)

Q.35. Mr. Vasu has designed a Open source software which must comply with some criteria.
Choose right statement in respect of above.
Statement I: No restriction on re-distribution of the software as a part or whole
Statement II: The integrity of the Author’s source code must be maintained
Statement III: The software can be sold after distribution
a) Statement I is False
b) Statements I and II are True
c) Statements II and III are True
d) Statements I, II and III are True

Ans. b)

Q.36. FSF Stands for__________


a) Free Software Foundation
b) Free System Formation
c) Final Software Freeware
d) Final System Formation

Ans. a)

Q.37. Assertion(A): FSF is Non-Profit organisation to support free software development


Reason(R) : FSF supports open software development also

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 23


a. Both A and R are true and R is the correct explanation of A.
b. Both A and R are true but R is not the correct explanation of A.
c. A is true but R is false.
d. A is false but R is true.

Answer: c

Q.38. In India, E-Waste management assumes greater significance because


(a) generation of own e-waste
(b)dumping of e-waste from developed countries
(c)lack of awareness
(d)All of these

Ans. (d)All of these

Q.39. WEEE stands for ________________.


(a)Waste electrical and electronic equipment
(b) warehouse equipment of electrical and electronics.
(c)world explosion of electrical and electronics.
(d)none of the above

Ans. (a)Waste electrical and electronic equipment

Q.40. Polluters pay Principle means


(a) anyone causing the pollution will pay for the damage caused
(b) polluters paid well by NGOs
(c) polluters may get a bonus
(d) polluters are not the cause of pollution

Ans. (a) anyone causing the pollution will pay for the damage caused

Q.41. When circuits are burnt for disposals, it creates which of the following harmful
chemicals?
(a) beryllium
(b) lead
(c)copper
(d) mercury

Ans. (a) beryllium

Q.42. The insulated wire has copper which causes ____________


(a) skin disease or allergies or increase the risk of lung cancer
(b) can damage human‟s kidney, brain and human nervous system
(c)neurological disorders
(d) damage liver and bones

Ans. (c)neurological disorders

Q.43. While sitting in front of a computer always keep in mind

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 24


(a) Always take care of viewing distance and viewing angle
(b) Knee Angle and Seat Back angle should be a 90-degree angle
(c) The right position should be straight and with a 90 degree
(d) ALL OF THE ABOVE

Ans. (d) ALL OF THE ABOVE

Q.44. Which department has issued a comprehensive technical guide on


“Environmental Management for Information Technology Industry in India.
a) Department of Information Technology (DIT)
b) Department of Education
c) Department of Telecommunications
d) Department of Science & Technology

Ans. a) Department of Information Technology (DIT)

Q.45. Given below are two statements- one is labelled as Assertion (A) and another are
labelled as Reason(R):
Assertion (A): Users or companies who distribute GPL license works may charge a fee for
copies or give them free of charge.
Reason(R): The GNU General public license (GPL) is a popular category of public licenses.
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True

Answer is: (1)

Q.46. Which of the following practices ensure confidentiality of information?


Statement 1: Use of firewall where ever possible
Statement 2: Browse privately where ever possible
A) Both Statements 1 and 2
B) Statement 1 but not Statement 2
C) Neither Statement 1 nor 2
D) Statement 2 but not Statement 1

Ans) A

Q.47. What is correct about Incognito browsing?


Statement 1: It opens up a version of the browser that will track your activity
Statement 2: It is useful when entering sensitive data
A) Both Statements 1 and 2 are correct
B) Statement 1 is correct but not Statement 2
C) Both Statements 1 and 2 are not correct
D) Statement 2 is correct but not Statement 1

Ans) D

Q.48. What is true about India‟s IT Act and IT (Amendment) Act?

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 25


Statement 1: IT Act 2000 provided legal recognition to electronic commerce
Statement 2: IT (Amendment) Act 2008 provided additional focus on information security
A) Both Statements 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statements 1 and 2 are False
D) Statement 1 is False but Statement 2 is True

Ans) A

Q.49. Read Statements 1 and 2 and select correct option:


Statement 1: Cyberlaw is a generic term which refers to all the legal and regulatory aspects of
Internet and the world wide web.
Statement 2: Cyberlaw covers all aspects of transactions and activities on and concerning the
Internet, the World Wide Web and Cyberspace.
A) Statement 1 is False but Statement 2 is True
B) Both Statements 1 and 2 are False
C) Both Statements 1 and 2 are True
D) Statement 1 is True but Statement 2 is False

Ans) C

Q.50. Read Statements 1 and 2 and select correct option:


Statement 1: Hacking is an attempt to exploit a computer system or a private network inside
a computer
Statement 2: Hacking is the authorised access to or control over computer network security
systems for some illicit purpose.
A) Both Statements 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statements 1 and 2 are False
D) Statement 1 is False but Statement 2 is True

Ans) B

Societal Impacts
Q1. A ______________ is a body of data that you create while using the Internet:
a) Digital Sign print
b) Digital hand print
c) Digital footprint
d) Digital head print

Ans. c

Q2. FOSS stands for:

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 26


a) Free opening System software
b) Free opened Source Software
c) Free opens System Software
d) Free and Open Source Software

Ans. d

Q3. What is the Full form of IPR:


a) Intelligent Product Rights
b) Intellectual Property Reserves
c) Intellectual Property Rights
d) Intelligent Property Rights

Ans. c

Q4. A……. digital footprint is created when data is collected without the owner knowing.
a) Passive
b) Active
c) Objective
d) Subjective

Ans. a

Q5. A code of good behavior on the Internet, is


Known as:
a) Etiquette
b) Native
c) Netiquette
d) Protocol

Ans. c

Q6. ………. refers to the practices, safeguards, and binding rules put in place to protect your
personal information and ensure that you remain in control of it.:
a) Data Security
b) Data Protection
c) Data Stealing
d) Unknown Data

Ans. b

Q7. Presenting an entire text by someone else as your own work is known as ….:
a) Plain Plagiarism
b) Global Plagiarism
c) Local Plagiarism
d) Unknown Plagiarism

Ans. b

Q8. Plagiarism should be avoided by the following simple measures::

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 27


a) Use your own ideas and words.
b) Always provide a reference or give credit to the source from where you have
received information.
c) Cite the name of the website, a URL or the name of authors, and acknowledge
them if you have used their work after rearranging the order of a sentence and
changing some of the work.
d) All the above

Ans. d

Q9. It is a form of protection given to the authors of “original works of authorship”.


a) License
b) Copyright
c) Non-License
d) User rights

Ans. b

Q10. Permissive licenses provide a royalty-free license to do virtually anything with the
source code. Do you….?
a) Agree
b) Disagree
c) Can’t say
d) None of above

Ans. a

Q11. Exclusive rights in the software are retained with the owner /developer / publisher
are known as……………:
a) Open Source Software
b) Proprietary Software
c) Free Software
d) Freeware

Ans. b

Q12. Intellectual property always refers to intangible property that has been created by
individuals and corporations for their benefit or usage such as copyright, trademark,
patent and digital data……:
a) True
b) False
c) Sometimes
d) Never

Ans. a

Q13. A copyright is automatically granted to authors or creators of content:


a) True
b) False
c) Never

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 28


d) Can’t say

Ans. a

Q14. In FOSS source code is usually hidden from the users.


a) True
b) False
c) Never
d) Sometimes

Ans. b

Q15. Anushka is using her internet connection to book a train ticket. This is a classic
example of leaving a trail of web activities carried by her. What do we call this type of
activity?
a) Digital login
b) Digital Footprint
c) Digital Log off
d) Digital Error

Ans. b

Q16. Anil likes to do his homework late at night. He uses the Internet a lot and also sends
useful data through email to many of his friends. One Day he forgot to sign out from his
email account. In the morning, his twin brother, Sunil started using the computer. He
used Anil’s email account to send inappropriate messages to his contacts. What do we
call this type of activity?
a) Stealing of Data
b) Identity Theft
c) Digital Theft
d) Misuse of Email

Ans. b

Q17. Linux, Apache, MySQL and PHP software come under_______ category.
a) Proprietary Software
b) FLOSS
c) Freeware
d) Shareware

Ans. b

Q18. We should follow the rules for good Etiquettes while being online. Choose the right net
etiquette (s) from the following:
a) Avoid posting offensive comments
b) Respect others' privacy
c) Don't troll people in web forums
d) All the above

Ans. d

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 29


Q19. Ravi is a student of class -10 and he is a very frequent user of internet applications One
day he got an unpleasant message on his WhatsApp. What do you think he should do?
a) Forward it to others
b) Reply back to the sender
c) Switch off the device
d) Tell to his parents about the incident

Ans. d

Q20. Sunita is confused about the free operating system available in the market. Few of her
friends suggested a few operating systems. Help her in choosing free operating system
for her device:
a) Apache
b) Windows
c) Mozilla
d) Ubuntu

Ans. d

Q 21. Aman deleted all his chats from all his social media accounts, and he thinks that all his
traces are deleted completely. Is he right in thinking so?
a) No
b) Yes
c) May be
d) Not Sure

Ans. a

Q 22. ____________is the practice of taking someone else's work or ideas and passing them off
as one's own:
a) Plagiarism
b) Copyright
c) Patent
d) All of the above

Ans. a

Q 23. Which of the following is not a violation of IPR?


a) Copyright Infringement
b) Trademark Infringement
c) Patent
d) Plagiarism

Ans. c

Q 24. Which of the following is not an OSS?


a) LibreOffice
b) MYSQL
c) MSOffice

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 30


d) Linux

Ans. c

Q 25. The user must agree to the ……terms and agreements when they use an OSS.
a) System
b) License
c) Community
d) Program

Ans. b

Q 26. Intellectual Property Rights (IPR) protect the use of information and ideas that are
of….
a) Social value
b) Moral Value
c) Commercial Value
d) Ethical value

Ans. c

Q 27. Intellectual Property Rights (IPR) in India Covers ……….


a) Patents
b) Copyrights
c) Trademarks
d) All the above

Ans. d

Q 28. When was Copyright Act enacted in India?


a) 1955
b) 1957
c) 1959
d) 1960

Ans. b

Q 29. Copyright is a……………?


a) Negative Right
b) Positive Right
c) Exclusive Right
d) Both B and C

Ans. d

Q 30. Which of the following is not a fair use of a copyrighted work?


a) Use for research
b) Use for criticism

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 31


c) Use for review
d) Use for commercial purpose

Ans. d

Q31. _______ is defined as a crime in which the computer is the medium of crime.
a) Computer crime
b) Cyber crime
c) Internet crime
d) Digital crime

Ans. b

Q32. A ___________ is some lines of malicious code that can copy itself and can have
detrimental effect on the computers, by destroying data or corrupting the system.
a) Cyber crime
b) Computer virus
c) Program
d) Software

Ans. b

Q33. ____________ is the act of unauthorized access to a computer, computer network or


any digital system.
a) Sign in
b) Hacking
c) Tracking
d) None of the above

Ans. b

Q34. Hacking, when done with a positive intent, is called ______


a) Ethical hacking
b) Active hacking
c) Passive hacking
d) Ethics

Ans. a

Q35. Primary focus of ________ is on security cracking and data stealing.


a) ethical hacker
b) non ethical hacker
c) white hat hacker
d) None of the above
Ans. b

Q36. Which of the following is not a cyber-crime?


a) Phishing
b) Ransomware

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 32


c) Hacking
d) Tracking

Ans. d

Q37. ______________ is an activity where fake websites or emails that look original or
authentic are presented to the user.
a) Phishing
b) Hacking
c) Spamming
d) Identity theft

Ans. a

Q38. Online posting of rumours, giving threats online, posting the victim’s personal
information, comments aimed to publicly ridicule a victim is termed as __________
a) Cyber bullying
b) Cyber crime
c) Cyber insult
d) All of the above

Ans. a

Q39. Which of the following are feasible methods of e-waste management?


a) Reduce
b) Reuse
c) Recycle
d) All of the above

Ans. d

Q40. The process of re-selling old electronic goods at lower prices is called ____
a) refurbishing
b) recycle
c) reuse
d) Reduce

Ans. a

Q41. _______ is a person who deliberately sows discord on the Internet by starting
quarrels or upsetting people, by posting inflammatory or off topic messages in an online
community.
a) Netizen
b) Digital Citizen
c) Internet troll
d) None of the above

Ans. c

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 33


Q42 Which of the following is not a type of cyber-crime?
a) Data theft
b) Forgery
c) Damage to data and systems
d) Installing antivirus for protection

Ans. d

Q43. In which of the following, a person is constantly followed/chased by another


person or group of several peoples?
a) Phishing
b) Bulling
c) Stalking
d) Identity theft

Ans. c

Q44. _______ is an application of information and communication technology (ICT)


for delivering Government Service.
a) Governance
b) Electronic Governance
c) Governance and Ethics
d) Risk and Governance.

Ans. b

Q45. Use of electronic messaging systems to send unsolicited bulk messages are
called
a) email bombing
b) Spamming
c) Cyber stalking
d) Phishing

Ans. b

Q46 What is the full form of ITA-2000?


a) Information Tech Act -2000
b) Indian Technology Act -2000
c) International Technology Act -2000
d) Information Technology Act -2000

Ans. d

Q47 In which year the IT Act, 2000 updated?


a) IT Act, 2007
b) Advanced IT Act, 2000
c) IT Act, 2008
d) None of the Above

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 34


Ans. c

Q48.Which is bout internet effects on eye


a) Blurred vision
b) Dry Eyes
c) Tears
d) All of the above

Ans. d

Q49. After practical, Rani left the computer laboratory but forgot to sign off from her
email account. Later, her classmate Ravina started using the same computer. She is now
logged in as Rani. She sends inflammatory email messages to few of his classmates using
Rani’s email account. Ravina’s activity is an example of which of the following cyber-
crime?
a) Plagiarism
b) Hacking
c) Identity theft
d) Cyber bullying

Ans. c

Q50. Kamal found a crumpled paper under her desk. She picked it up and opened it. It
contained some text which was struck off thrice. But she could still figure out easily that
the struck off text was the email ID and password of Ronak, her classmate. What is
ethically correct for Kamal to do?
a) Inform Ronak so that he may change his password
b) Give the password of Ronak’s email ID to all other classmates
c) Use Ronak’s password to access his account
d) None of the above

Ans. A

Prepared By Mr. Gautam Somani PGT(CS/IP) Alok School Sector-11,Udaipur Page 35

You might also like