You are on page 1of 6

Cyber Mock Test

This question paper contains a total of 50 questions divided into three sections; A, B and C.
Read the instructions carefully before attempting these questions.

Section A (Logical Reasoning)

1. Choose the correct alternative.

Planet : Orbit : : Projectile : ?


(A) Trajectory (B) Track
(C) Milky way (D) Path

2. CIRCLE is related to RICELC in the same way as SQUARE is related to ________.


(A) QSUERA (B) QUSERA
(C) UQSAER (D) UQSERA

3. Choose the correct alternative.

121, 225, 361, ?


(A) 441 (B) 484
(C) 529 (D) 729

4. In a certain code, SIKKIM is written as THLJJL. How is TRAINING written in that code?
(A) SQBHOHOH (B) UQBHOHOF
(C) UQBJOHHO (D) UQBJOHOH

5. If train is called bus, bus is called tractor, tractor is called car, car is called scooter, scooter is called bicycle,
bicycle is called moped, which is used to plough a field?
(A) Train (B) Bus
(C) Tractor (D) Car

6. Arun said, “This girl is the wife of the grandson of my mother.” Who is Arun to the girl?
(A) Father (B) Grandfather
(C) Husband (D) Father-in-law

7. A man is facing west. He turns 45° in the clockwise direction and then another 180° in the same direction
and then 270° in the anticlockwise direction. Which direction is he facing now?
(A) South (B) North-West
(C) West (D) South-West

1 1
Mock Test
8. Which one of the following four logical diagrams represents correctly the relationship between Musicians,
Instrumentalists, Violinists?

(A) (B)

(C) (D)

9. How many pairs of letters in the word ‘CHAIRS’ have as many letters between them in the word as in
the alphabet?
(A) None (B) One
(C) Two (D) Three
10. If + means ÷, − means ×, ÷ means −, × means +, then what will be the value of x, if x ÷ 8 + 6 = 4 − 7 × 3?
97 23
(A) (B) −
3
(C) 12 (D) 14 2

Section B (Subject Specific)

11. Which one of the following is a protocol that is generally used in URL addresses?
(A) HTTP (B) WWW
(C) FTP (D) .com
12. __________ is a program that hijacks your computer and makes it hostage untill you pay a fee.
(A) Ransomware (B) Spyware
(C) Blockware (D) Hostageware
13. Which of these is an advantage of E-mails?
(A) In order to check the E-mail, the recipient of the E-mail needs access to the Internet.
(B) Viruses are easily spread through the E-mail attachments.
(C) There is no guarantee that the E-mail sent by you will be read until the user logs in and checks their
E-mail account.
(D) E-mails can be sent 24 hours a day, 365 days a year.
14. In a binary number system, right most digit before the fractional point is called __________.
(A) MSD (B) HCF
(C) LSD (D) LCM
15. What does “L” in URL stand for?
(A) Location (B) Length
(C) List (D) Locator
16. A relational database developer refers to a record as a/an __________.
(A) Criteria (B) Relation
(C) Tuple (D) Attribute

2 2 OGO English Workbook 2


OGO Cyber Workbook 10
3
17. Which of these CANNOT be included in the message body of an E-mail on Gmail?
(A) Formatted text (B) Hyperlinks
(C) Animated GIFs (D) Graphics Images
18. The __________ query displays the selected records and saves the records in a new table.
(A) Cross Table (B) Show Table
(C) Make Table (D) Insert Results
19. To insert a field in the Datasheet, you follow the given steps. Identify the correct sequence of steps.
(i) The field is inserted to the right of the selected field with the specified data type.
(ii) Click the Table Tools group.
(iii) In the Add & Delete group, click the button for the desired data type of the new field.
(iv) Click Fields tab.
(A) (iv) → (ii) → (i) → (iii) (B) (ii) → (iv) → (iii) → (i)
(C) (iv) → (ii) → (iii) → (i) (D) (ii) → (iii) → (iv) → (i)
20. You can import different types of databases from different softwares from the ________ tab in MS Access.
(A) External Data (B) Create
(C) Database Tools (D) Home
21. Strong Passwords should have __________.
(A) Number (B) Alphabet
(C) Symbols (D) All of these
22. What is a sub folder?
(A) A sub folder is a folder inside the Root folder (B) A sub folder is a folder before the Root folder
(C) A sub folder cannot be located in your documents (D) All of these
23. A virus can be defined as __________.
(A) Any kind of program that can spread to other computers and benefit them in multiple ways.
(B) Any kind of program that can spread to other computers. Have the potential to cause great harm to
files and programs on the same computer.
(C) Any kind of program that can be duplicated and transferred only manually to cause great harm to other devices.
(D) A program that harms other computers and devices at the programmer’s will.
24. Which of these is NOT a limitation of E-banking?
(A) Security of your bank account is one of the major issues.
(B) Password security is a must. After receiving your password, you have to constantly change it and keep
memorising the new ones.
(C) You cannot use it, in case, the bank’s server is down.
(D) It acts as a medium for the banks to endorse their products and services.
25. Which of these is NOT an advantage of E-mails in business communication?
(A) Speed - Communicating by E-mail is almost instantaneous, therefore it enhances communications by
allowing for quick dissemination of information and fast response to customer inquiries.
(B) Geographic Barrier Reduction - E-mail reduces geographic and time zone barriers for businesses.
Employees or contractors from around the world can communicate, regardless of their location.
(C) Efficiency - E-mail can help increase productivity. Most E-mail software provides customization features you
can tailor to the type of work performed, volume of daily E-mail messages and the needs of the worker.
(D) Higher Costs - Moving communications from physical mail to E-mail can result in significantly increased
costs, computers internet and employee resources. Businesses can also increase customer service
support costs by focusing on E-mail customer support options rather than phone-based services.

3 3
Mock Test
26. __________ allows each individual to tackle the subject at their own pace.
(A) E-banking (B) E-reservation
(C) E-governance (D) E-learning
27. A __________ is a software program that protects your computer by acting like a security guard and
monitoring and controlling the Internet traffic coming in and out of your computer. Install one and make
sure it is always turned on.
(A) Modem (B) Router
(C) Anti-virus (D) Firewall
28. Using a head-mounted display, can project 3D objects related to the topic the student is studying which
can better help the student learn.
This is an example of __________.
(A) Virtual reality (B) Simulation
(C) Augmented reality (D) Video games
29. What do we call a network whose elements may be separated by alarge distance? It usually involves
multiple networks and dedicated high-speed telephone lines.
(A) URL (B) LAN
(C) WAN (D) WWW
30. A compiler is a __________.
(A) Person who compiles the program
(B) Memory in which programs are stored
(C) Programmer who develops the programs
(D) A software that converts the source code into machine code

Instruction: Q. 31 to 40 are two-key based questions having four options A, B, C and D out of which TWO are correct.
31. A software program that secretly tracks what you do on the Internet and sometimes gets information
about you from your computer is called __________ and a virus that shows you unwanted advertisements
and pop us it called __________.
(A) Spyware (B) Trojan
(C) Adware (D) Ransomware

32. Choose the INCORRECT statement.


(A) The CSS colour property defines the text colour to be used.
(B) The CSS font-family property defines the font colour to be used.
(C) The CSS font-size property defines the text size to be used.
(D) The CSS border property defines a border around an text element.
33. The advantages of E-commerce are listed below. Choose the INCORRECT advantage.
(A) The initial investment to setup a business is very low.
(B) The availability is only available on limited days.
(C) The procedure to buy and sell is fast.
(D) Customers can give only bad reviews about your business.

4 4 OGO English Workbook 2


OGO Cyber Workbook 10
3
34. Identify the INCORRECT statement.
(A) Using an online booking system your business is open 24 hours a day, seven days a week so that
customers do not have to wait.
(B) Customers who book their own reservations are more likely to show up. If a customer cancels, the
spot automatically opens online, giving another customer the chance to book it.
(C) With an online booking system, you cannot ask customers to prepay for activities and rentals. This
puts immense pressure on you on the day of the event as you have to worry about payment.
(D) If you choose a provider for a service you want you are stuck with them as you cannot changes a to
subscription you make online.
35. ________ is the latest major version of HTML. It was published by _________ to improve the language
with latest multimedia support.
(A) HTML (B) HTML5
(C) W3C (D) WWW
36. The ________ tag is used to display information like address, signature, etc. and ________ tag is used to
break line the in an HTML document.
(A) <heading> (B) <address>
(C) <b> (D) <br>
37. ________ is the raw material used as input and ________ is the processed data obtained as output of
data processing.
(A) Data (B) Information
(C) Program (D) Code
38. A __________ is a computer enthusiast who enjoys learning about computer systems and overcoming
problems. People like this with malicious intent are called __________.
(A) Hacker (B) Cracker
(C) Gray Hat Hacker (D) Black hat hacker
39. Identify the INCORRECT statement about CSS in HTML elements.
(A) An inline CSS is used to apply a unique style to a single HTML element.
(B) An internal CSS is used to define a style for a number of HTML pages.
(C) With an external style sheet, you can change the look of an entire web site, by changing one file.
(D) To use an external style sheet, add a link to it in the <footer> section of the HTML page.
40. The hexadecimal number system consists of ________ and ________.
(A) 0 to 9 (B) A to F
(C) A to E (D) 0 to 7

Section C (Competency Based)

41. You have to save name, address, age and chest number is for 2,350 people entered into a half-marathon.
Which application would you use?
(A) Database (B) E-mail
(C) Graphic (D) Multimedia
42. The activities committed using the Internet that violate state, federal, or international laws are termed
as __________.
(A) Hacker (B) Cybercrime
(C) Digital crime (D) Computer crime

5 5
Mock Test
43. What will be the hexadecimal equivalent of the binary number 111111110010?
(A) FF2 (B) 4082
(C) F2F (D) FFF
44. Which is NOT an acceptable method of distributing small power outlets throughout an open plan office area?
(A) Fake ceilings (B) Power skirting
(C) Flush floors (D) Extension cords
45. The collection of information stored in a database at a particular moment is called as a/an __________.
(A) Instance of the database (B) Schema
(C) Data domain (D) Independence
46. Which of the following are the utility software? [OGO SLE, 2022]
(A) Disk Defragmenter (B) PowerPoint
(C) Microsoft Word (D) Notepad
47. __________ is the raw material used as input and information is the processed data obtained as output of
data processing.
(A) Data (B) Output
(C) Program (D) Code
48. Which is NOT a correct tag in HTML?
(A) <HTML/> (B) <IMG>
(C) <BR> (D) </Body>
49. Frederick Cohen gave viruses their definition. He wrote a virus called __________ which as, positive virus.
(A) John Von Neumann (B) EIK Virus
(C) Mac Virus (D) Compression Virus
50. __________ first published an article in 1949 which was based on modern day viruses. It was called ‘Theory
of self-reproducing Automata’.
(A) John Von Neumann (B) Richard Adleman
(C) Adware Jones (D) Theory of Destructive Automata

Answer
1. A 2. D 3. C 4. B 5. D 6. D 7. D 8. A 9. C 10. A
11. A 12. A 13. D 14. C 15. D 16. C 17. C 18. C 19. B 20. A
21. D 22. A 23. B 24. D 25. D 26. D 27. D 28. C 29. C 30. D
31. A,C 32. B,D 33. B,D 34. C,D 35. B,C 36. B,D 37. A,B 38. B,C 39. A,C 40. A,D
41. A 42. B 43. A 44. D 45. A 46. A 47. A 48. A 48. D 50. A

6 6 OGO English Workbook 2


OGO Cyber Workbook 10
3

You might also like