Professional Documents
Culture Documents
Class 10
(A) 2
(B) 3
(C) 4
(D) 6
Ans (A)
Explanation: Sum of all numbers =19
2+3+6+8=19
4+4+2+9=19
12+2+3+2=19
(A)
(B)
1
(C)
(D)
Ans D)
4. How is L related to N?
(A) Sister (A) Nephew (C) Niece (D) Cannot be
determined
Ans (D)
2
5. Which of the following is not true?
(A) Q is mother-in-law of B (B) T is brother of N (C) F is
grand-mother of P (D) E is brother of F
Ans (D)
Solutions For (3-5)
K
Daughter
Sister
E F (-)
Daughter
(-)
O Z (+)
Son
(-) Sister (+)
(+) (-)
L N P T B
Brother
Ans (A)
Explanation:
Bad> haven < duck = top
Conclusion:
I. top > heaven (True)
II. Bad< duck (False)
4
9. Statements: Teak % Far, Far $ macabre, ugly $
macabre
Conclusions: I. Far # macabre II. Far $ macabre
(A) If only conclusion I is true
(B) If only conclusion II is true.
(C) If either conclusion I or II is true.
(D) If neither conclusion I nor II is true.
Ans (B)
Explanation:
Teak < Far > macabre < ugly
Conclusion:
I. Far < macabre (False)
II. Far > macabre (True)
5
Section 02 Computers and IT
Ans: (C).
Explanation: System software is a type of computer program
that is designed to run a computer's hardware and application
programs. If we think of the computer system as a layered
model, the system software is the interface between the
hardware and user applications.
6
13. Advantages of high level programming over low - level
programming are___________?
(A) They are machine independent
(B) They do not require programmer to know anything about
the internal structure of the computer.
(C) They enable the programmers to write instruction using
English words and Family with mathematical symbols
and expressions.
(D) All of these.
Ans: (D)
Explanation: Advantages of High level language They are easy
to write, debug and maintain. It provide higher level of
abstraction from machine languages. Less error prone, easy to
find and debug errors. High level programming results in better
programming productivity
7
Ans: (D)
Explanation: Direct memory access (DMA) is a feature of
computer systems that allows certain hardware subsystems to
access main system memory (random-access memory),
independent of the central processing unit (CPU)
8
17.Guess the software based on the description given below.
It is a free software that contain advertisement, in order
togenerate revenue for its author. It includes games, toolbars
and some utilities.
i. Computer worm (B) Adware
(C) Shareware (D) Open Source
Ans. (B)
Explanation: Adware is software that contains embedded
advertisements. It is usually a legitimate ad-supported
program, but may be used as a form of spyware.
11
23.Given below are Fields identify the field which is NOT
suitable for a primary key?
(A) An auto number field
(B) A student’s registration number
(C) Bank account number
(D) Date of Birth
Ans: (D)
Explanation: Because it is easily known to everyone by
Facebook account or other social media account.
12
26._____ is a piece of code or a statement that gives you
filtered data according to some conditions and
specifications.
(A) Table (B) Form
(C) Query (D) Report
Ans: (C)
Explanation: A query is a request for data or information
from a database table or combination of tables. This data may
be generated as results returned by Structured Query
Language (SQL) or as pictorials, graphs or complex results,
e.g., trend analyses from data-mining tools.
13
File – 2
S_Id Name Room No. Contact No.
FlR-001 Arpita 301 9812121212
FLR-002 Shivam 302 9200080004
FLR-003 Samiksha 201 9624103041
FLR-004 Amit 401 9420104552
Ans: (B)
Explanation: Data inconsistency is a situation that occurs
between files when the same data is placed in different
formats in two different files, or when the data must be
matched between files. As a result of data inconsistencies,
these files mimic some data such as addresses and names,
compromising data integrity.
29.Given below are tags identify which tag is used to define the
title of a work for a book, a painting, etc. in italics?
(A) <cite>....</cite>
(B) <strong> ...</strong>
(C) <ins>...</ins>
(D) <sub>...</sub>
Ans: (A)
15
32.Physical tag is______?
(A) <u>....</u> (B) <sub> ...</sub>
(C) <sup>...</sup> (D) All of these
Ans: (D)
Ans: (C)
Explanation: Ctrl - Shift - left mouse button drag: Draw a box
for measuring size or cropping. Press and hold the shift and Ctrl
keys, then press the left mouse button at one corner of the box.
Hold the button down and move the mouse to the desired
position of the other corner.
16
35.While saving a document, you can directly “ save to Web”
To save a document to the Web you should
have___________
(A) Window live ID
(B) Licensed version of multimedia plug -in
(C) A Share Point connection
(D) An E-mail silent configured on your machine
Ans: (D)
Explanation: An E-mail silent configured on your machine.
(A)
(A) It becomes accessible when multiple windows of word is
opened.
(B) It is available for only those files which are encrypted with
passwords.
(C) It opens a duplicate copy of a current document.
(D) Both (A) and (B)
Ans: (C)
Explanation: It opens a duplicate copy of a current document.
17
Ans: (D)
18
41.Identify the given icon
20
47.Identify the computer viruses that infect files by over-writing
unused areas of executable files without increasing their size
or damaging the files.
(A) Appending Viruses (B) Cavity Viruses
(C) Macro Viruses (D) PingPing Viruses
Ans: (B)
Explanation: A computer virus is a type of computer program
that, when executed, replicates itself by modifying other
computer programs and inserting its own code. When this
replication succeeds, the affected areas are then said to be
"infected" with a computer virus.
21
50.From the following statements choose which statement
hold(s) true about WiMAX?
Statement 1: It can provide at-home or mobile internet access
across whole cities or countries.
Statement 2: It stands for Worldwide Internet for Multiple
Applications.
(A) Only Statement 1
(B) Only Statement 2
(C) Both Statement 2 and Statement 2
(D) Neither Statement 1 nor Statement 2
Ans: (A)
22