CLass VIII MCQs Answer Key
CLass VIII MCQs Answer Key
4. Which protocol can be applied when you want to transfer files between different computers?
i. TCP/IP
ii. HTTP
iii. SLIP
iv. FTP
Answer: (iv)
© Orange - Touchpad 1
5. Which of the following is used to identify the ground positioning of an object?
i. GSP
ii. GPS
iii. None of these
iv. PSG
Answer: (ii)
6. Which networking device can convert the digital data into analog signal and vice versa?
i. Hub
ii. Modem
iii. Router
iv. LAN Card
Answer: (ii)
8. Which of these is the Internet standard protocol that allows clients to retrieve e-mail messages from an e-mail
server?
i. HTTP
ii. FTP
iii. POP3
iv. None of these
Answer: (iv)
10. Which of the following languages is used to make dynamic web pages?
i. HTML
ii. CSS
© Orange - Touchpad 2
iii. JavaScript
iv. None of these
Answer: (iii)
12. Which of the following tags is used to add JavaScript in web page?
i. <JavaScript>
ii. <head>
iii. <script>
iv. Al of these
Answer: (iii)
13. Which of the following is used to add single line comments in JavaScript?
i. :
ii. //
iii. ;
iv. “”
Answer: (ii)
14. Which feature of Photoshop lets us enlarge or reduce an image as per our requirement?
i. Layering
ii. Cropping
iii. Size Alteration
iv. None of these
Answer: (iii)
15. Which is the default format that Photoshop uses for saving data?
i. PSD
ii. PSB
iii. JPEG
iv. None of these
Answer: (i)
© Orange - Touchpad 3
16. Where do you place an image to edit?
i. Panel
ii. Canvas
iii. Toolbox
iv. None of these
Answer: (ii)
17. Which tool selects area of similar color pixels around it with just one click?
i. Quick selection tool
ii. Magic Wand tool
iii. Marquee tool
iv. None of these
Answer: (i)
19. In which mode of e-commerce does a company buy or sell products to other companies within their business
groups?
i. Business to Consumer
ii. Business to Business
iii. Consumer to Consumer
iv. None of these
Answer: (ii)
20. Which of the following makes the online transfer of funds from the bank account of one organisation to
another possible?
i. Electronic Funds Transfer
ii. Electronic Data Interchange
iii. Card Verification Number
iv. None of these
Answer: (i)
© Orange - Touchpad 4
iii. 3D Printing
iv. Robotics
Answer: (iii)
22. The app uses the GPS location of the smartphone and the camera to collect information about the
user’s surroundings.
i. Star Walk
ii. Layar
iii. Mimo
iv. Compass
Answer: (i)
23. The camera in the device recognizes and tracks the users hand gestures with the help of computer-
vision techniques.
i. SixthSense
ii. Google Glass
iii. Oculus Rift
iv. Mimo
Answer: (i)
24. …………….….……… refers to the online buying and selling of products using the Internet.
i. E-commerce
ii. Surfing
iii. Electronic Fund Transfer
iv. None of these
Answer: (i)
© Orange - Touchpad 5
Answer: (iv)
28. Once e-tickets are booked and confirmed, they are sent to us via …………….….………. .
i. e-mail and SMS
ii. URL
iii. Phone call
iv. Broadcast
Answer: (i)
29. Which tool can we use to make a blend of two or more colours in our image?
i. Paint Bucket Tool
ii. Brush Tool
iii. Gradient Tool
iv. None
Answer: (iii)
30. Which of the following tools repairs larger areas of an image by getting rid of any distraction or blemishes?
i. Patch Tool
ii. Healing Brush Tool
iii. Content Aware Move Tool
iv. Eraser Tool
Answer: (i)
31. Which tool is used to remove or repair the spots or scratches from an image?
i. Spot Healing Brush Tool
ii. Dodge Tool
iii. Blur Tool
iv. Paint Bucket Tool
Answer: (i)
32. Which tool darkens the pixels without affecting the colours?
i. Dodge tool
© Orange - Touchpad 6
ii. Sharpen tool
iii. Burn tool
iv. Blur tool
Answer: (iii)
33. Which tool is used to apply colors with strokes on the image?
i. Paint Bucket tool
ii. Brush tool
iii. Both (i) & (ii)
iv. Gradient tool
Answer: (ii)
© Orange - Touchpad 7
i. GIMP
ii. CorelDRAW
iii. Affinity Photo
iv. Paint.NET
Answer: i. GIMP
40. What does the "Dodge" tool in GIMP do?
i. Darkens selected areas
ii. Lightens selected areas
iii. Blurs the image
iv. Adds noise to the image
Answer: ii. Lightens selected areas
41. In GIMP, what is the purpose of the "Healing Tool"?
i. To clone parts of an image
ii. To remove imperfections in an image
iii. To add text to an image
iv. To adjust brightness and contrast
Answer: ii. To remove imperfections in an image
42. Which menu in GIMP is used for adjusting the size and canvas of an image?
i. Edit
ii. Image
iii. Layer
iv. View
Answer: ii. Image
43. What is the GIMP extension for saving a project file?
i. .jpg
ii. .xcf
iii. .png
iv. .gif
Answer: ii. .xcf
44. What is the primary focus of Edge Computing in IT?
i. Centralizing data storage
ii. Distributing computing closer to data sources
iii. Enhancing network security
iv. Optimizing cloud infrastructure
Answer: ii. Distributing computing closer to data sources
45. What technology is commonly associated with the term "Blockchain"?
i. Artificial Intelligence
ii. Cryptocurrency
iii. Virtual Reality
iv. Quantum Computing
Answer: ii. Cryptocurrency
46. Which programming language has gained popularity for building Machine Learning models in recent IT trends?
i. Java
ii. Python
iii. C++
© Orange - Touchpad 8
iv. Ruby
Answer: ii. Python
47. What does the term "DevOps" refer to in the IT industry?
i. Development and Operations collaboration
ii. Device Optimization
iii. Development of Organic Software
iv. Device Options
Answer: i. Development and Operations collaboration
48. What is the purpose of a containerization platform like Docker in IT infrastructure?
i. Virtualizing hardware resources
ii. Managing network security
iii. Packaging and deploying applications
iv. Optimizing database performance
Answer: iii. Packaging and deploying applications
49. Which technology is commonly associated with the term "5G" in the context of mobile communication?
i. Artificial Intelligence
ii. Quantum Computing
iii. Internet of Things (IoT)
iv. High-Speed Mobile Networks
Answer: iv. High-Speed Mobile Networks
50. What is the significance of the term "Zero Trust" in IT security?
i. Trusting all network devices equally
ii. Verifying every user and device, regardless of location
iii. Relying solely on traditional firewalls
iv. Ignoring security protocols for internal networks
Answer: ii. Verifying every user and device, regardless of location
© Orange - Touchpad 9