0% found this document useful (0 votes)
23 views3 pages

Computer Questions

computer questions

Uploaded by

Rakesh pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Computer Questions

computer questions

Uploaded by

Rakesh pal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1. Read the question paper carefully and attempt all the questions.

2.Each question is compulsory.

3. Mark allotted are given along with every section.

4. Write neat , clean and precise answers.

(i) Cyber crime can be defined as ?

a. Cyber attack b. Cyber Terrorism c. Cyber Espionage d. All of the above

(ii). Who are the prime targets of cyberbullying ?

a. Women b. Teenagers c. old mend. Hackers

(iii). Ravi unknowingly entered password in a fake banking site. He is the victim of _____

a. Cyberbullying b. Phishing c. Email fraud d. Worm

(iv). Ankit saw #### in a cell in his worksheet . What should he do correct this ?

a. Adjust column width b. Correct the formula c. Adjust row height d. set a smaller font

(v). Renu has fixed the the column of a cell reference in a formula . What type of cell
referencing has she applied ?

a. Absolute b. Mixed c. Relative d. Default

(vi). Which of the following are created on the basis of user’s requirements ?

a. Formulas b. Functions c. Cell references d. All of these

(vii). Which of the following is another name for a record in database table ?

a. Row b. Tuple c. both a) and b) d. Cell

(viii). Primary key and foreign key are the concept related to which of the following ?

a. Attributes b. Tuples c. Relations d. Database

(ix). Which of the following is an organized collection of data ?

a. DBMS b. information c. Table d. Database

(x). Which of the following types of viruses seems like a useful program ?
a. Firewall b. Spyware c. Trojan d. Worm

Q2. Fill in the blanks

( Phreakers, Pegasus software,aggregate,database,edit, formula,SSL, )

(i) ________discovered a technique to make long distance calls using a series of code by
changing software and hardware .

(ii) Data is securely encrypted using _______.

(iii) The _______ is a software that taps the phones.

(iv) The formula stored in a cell is visible in ______mode.

(v) _________functions process multiple values at a time .

(vi) (5×3)/15 is an example of _____.

(vii) Field property _______________prevents a field to store null value .

(viii) A___________ is collection of related data/tables

Q3. Answer the following questions :-

(i) What is a function ? How it is different from a formula ?

(ii) How is data different from information ? Explain with a small example.

(iii) How are Trojans , worms and spyware different in their function ?

(iv) Why should not we ever indulge ourselves in cyberbullying anyone ?

(v) Spot the errors in the usage of the following functions and rewrite their correct form :-

a. = COUNTIF(“<=100”,A1:A20)

b. =IF(“TRUE”, “ FALSE”,100<80)

a. Q6. Write the work of these given functions


b. COUNT
c. COUNTIF
d. AVERAGE
e. SUMIF

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy