OGO Cyber 10 - Mock Test 2 2024
OGO Cyber 10 - Mock Test 2 2024
10
Mock Test 2 CYBER
Subject Code: 5 0 1
ØØ Read the instructions on the ANSWER SHEET and fill in your NAME, CLASS and
OTHER INFORMATION.
ØØ To mark your choice of answer, darken the circles in the ANSWER SHEET, use a
BLUE/BLACK BALL-POINT PEN only.
ØØ There are 50 MULTIPLE CHOICE QUESTIONS. Each question carries one mark.
Use the information provided to choose the BEST possible answer among the four
options. On your ANSWER SHEET darken the circle that matches your answer.
ØØ Return the ANSWER SHEET to the invigilator at the end of the examination.
ØØ You are NOT allowed to use a calculator. You may use a ruler and spare paper for
rough work.
1
Mock Test 2 CYBER
This question paper contains a total of 50 questions divided into three sections; A, B and C.
Read the instructions carefully before attempting these questions.
3. In a certain code, PAPER is written as SCTGW. How is MOTHER written in that code?
(A) ORVLGW (B) PQVJGT
(C) PQXJJT (D) PQXKJV
4. Six friends - Alice, Bob, Carol, David, Eve, and Frank - are sitting in a row. They have different occupations:
doctor, engineer, lawyer, nurse, teacher, and artist, not necessarily in that order. Based on the given clues,
determine the occupation of each friend:
(i) The engineer is sitting at one end of the row.
(ii) Carol is not an artist or a teacher.
(iii) Alice is sitting next to Frank and David.
(iv) The nurse is sitting between the lawyer and the doctor.
(v) Eve is a teacher.
What is David’s occupation?
(A) Engineer (B) Lawyer
(C) Doctor (D) Data not sufficient
5. Pointing to a photograph, a lady tells Pramod, “I am the only daughter of this lady and her son is your
maternal uncle.” How is the speaker related to Pramod’s father?
(A) Sister-in-law (B) Wife
(C) Either (A) or (B) (D) Neither (A) nor (B)
6. Teena brushes her teeth before he washes his face. She washes her face before she combs her hair. She
combs her hair before she brushes her teeth. If the first two statements are true, the third statement is:
(A) True (B) False
(C) Uncertain (D) None of these
7. One day, Ravi left home and cycled 10 km southwards, turned right and cycled 5 km, then turned right
and cycled 10 km, then turned right and cycled 10 km and then turned left and cycled 10 km. How many
kilometres will he have to cycle to reach his home from this point?
(A) 10 km (B) 15 km
(C) 20 km (D) 25 km
CYBER
OGO Cyber 10
8. If + means ÷, ÷ means x, x means −, and − means +, then 12 ÷ 4 + 2 − 1 equals:
(A) 26 (B) 23
(C) 24 (D) 25
9. Number of letters skipped in between adjacent letters in the series decreases by one. Which of the
following series is observing the rule?
(A) BGKNPR (B) CINRTU
(C) EJNQST (D) LQUXAP
10. If in a certain code language, ‘cat’ is called ‘dog’, ‘dog’ is called ‘elephant’, ‘elephant’ is called ‘lion’, ‘lion’
is called ‘tiger’, and ‘tiger’ is called ‘rabbit’, then what would be the code for ‘cat’?
(A) Lion (B) Rabbit
(C) Elephant (D) Dog
11. A/An ________ integrates the arithmetic-logic and control circuitry of a computer into one chip.
(A) Intel (B) Control Unit
(C) Arithmetic and Logic Unit (D) Microprocessor
12. Which institution is responsible for the development of the PARAM series of supercomputers in India?
(A) Indian Institute of Science (IISc), Bangalore
(B) Indian Institute of Technology (IIT) Bombay
(C) Indian Institute of Technology (IIT) Delhi
(D) Centre for Development of Advanced Computing (C-DAC)
13. The operating system that is self contained in a device and resident in the ROM is known as ________ .
(A) Multiprocessor OS (B) Embedded OS
(C) Real-time OS (D) Batch OS
14. Which of the following is the correct order of steps in the “decode, fetch, execute” cycle of a computer
processor?
(A) Execute → Fetch → Decode (B) Fetch → Decode → Execute
(C) Decode → Execute → Fetch (D) Execute → Decode → Fetch
15. T he space between the left and right margins of a paragraph is known as ________ .
(A) alignment (B) indentation
(C) spacing (D) None of these
16. What is the function of the Task Manager in Windows operating systems?
(A) To manage system settings. (B) To install new software.
(C) To monitor and manage running processes. (D) To create and edit documents.
17. ________ controls all the main side control tasks for the presentation in PowerPoint.
(A) Slides Pane (B) Task Pane
(C) Taskbar (D) Control Panel
3
Mock Test 2 CYBER
18. Which feature in Microsoft Word allows you to merge two or more adjacent cells in a table?
(A) Merge Cells (B) Combine Cells
(C) Concatenate Cells (D) Group Cells
19. Which of these is not a ‘What-if analysis’ tool?
(A) Scenario (B) Goal Seek
(C) Solver (D) Data Table
20. Which feature in Microsoft PowerPoint allows you to record and time narration for your presentation?
(A) Slide Sorter (B) Presenter View
(C) Slide Show (D) Record Slide Show
21. Which of the following commands can sort the results or a query in a specific order?
(A) Alter (B) Order by
(C) Update (D) Drop
22. Which Excel feature allows you to create a visual representation of data using elements such as bars,
columns, lines, or pies?
(A) Conditional Formatting (B) Data Tables
(C) Charts (D) PivotTables
26. What is the correct syntax for creating a new table in SQL?
(A) CREATE TABLE table_name (column1 datatype, column2 datatype, ...);
(B) ADD TABLE table_name (column1 datatype, column2 datatype, ...);
(C) MAKE TABLE table_name (column1 datatype, column2 datatype, ...);
(D) INSERT INTO table_name (column1, column2, ...) VALUES (value1, value2, ...);
CYBER
OGO Cyber 10
27. Which data type occupies one byte of memory for storage of character?
(A) integer (B) float
(C) double (D) character
28. What is the correct HTML syntax for creating a hyperlink that opens in a new tab or window when clicked?
(A) <a href=”https://example.com” target=”_blank”>Link</a>
(B) <a href=”https://example.com” target=”_new”>Link</a>
(C) <a href=”https://example.com” newtab>Link</a>
(D) <a href=”https://example.com” window>Link</a>
29. Read the following statements and select the correct option.
Statement 1: In 1956, John McCarthy first coined the term Artificial Intelligence and defined it as the
science and engineering of making intelligent machines.
Statement 2: Later he was known as the “Father of Artificial Intelligence”.
(A) Both Statement 1 and Statement 2 are correct.
(B) Both Statement 1 and Statement 2 are incorrect.
(C) Statement 1 is correct, and Statement 2 is incorrect.
(D) Statement 1 is incorrect, and Statement 2 is correct.
30. What internet service is used to transfer files between a client and a server on internet?
(A) File Transfer Protocol (FTP)
(B) Simple Mail Transfer Protocol (SMTP)
(C) Hypertext Transfer Protocol (HTTP)
(D) Secure Shell (SSH)
31. What will the following query will is repeated twice do?
UPDATE MARKS SET SCIENCE= SCIENCE+5;
(A) Will update the marks column by increasing 5 marks.
(B) Will create the new column set science.
(C) Will lose 5 marks from the science column.
(D) None of these
32. What is a common method cybercriminals use to deceive users into disclosing sensitive information or
installing malware?
(A) Phishing (B) Social engineering
(C) Denial-of-service attacks (D) SQL injection
33. All HTML tags are enclosed within _____________ brackets.
(A) <> (B) ‘ ‘
(C) () (D) [ ]
5
Mock Test 2 CYBER
35. VIRUS stands for __________.
(A) Vital Information Resources Under Seize (B) Virtual Information Resources Under Seize
(C) Virtual Immune Resources Under Seize (D) Vital Immune Resources Under Seize
Instruction: Q. 36 to 40 are two-key based questions having four options A, B, C and D out of which TWO
are correct.
36. Which of the following are said to be the control statements or loop control statements?
(A) switch (B) break
(C) continue (D) go to
37. Which of the following statements are true about cache memory?
(A) Data can be transferred to and from cache memory more quickly than RAM.
(B) Cache memory is less expensive to build than RAM.
(C) Cache memory is a type of high speed RAM which is built into the processor.
(D) Cache memory tends to be bigger in size.
38. What is true about an array?
(A) A data structure designed for increasing speed of calculations on similar data.
(B) A loop that repeats a block of code until a condition is met.
(C) A data structure that stores a collections of elements of the same data-type.
(D) A conditional statement that executes a block of code based on a condition.
39. After typing header text, how can you quickly enter footer text?
(A) Press Page Down key and type the text for Footer.
(B) Click on Close Header & Footer and then type the text.
(C) Click on Go to Footer.
(D) Click on Next.
40. Which of the following are commonly used security protocols for securing web communication? Select
all that apply.
(A) SSL/TLS (Secure Sockets Layer/Transport Layer Security)
(B) IMAP
(C) HTTPS (Hypertext Transfer Protocol Secure)
(D) FTPS (FTP Secure)
CYBER
OGO Cyber 10
43. Reema is working in the database of her organisation. She has applied a key to a column in a table. Now,
the column is not accepting any duplicate or null values. Which type of key has she applied?
(A) Foreign key (B) Primary key
(C) Candidate key (D) Alternate key
44. John, a seasoned project manager, is working on a document with his team members. Which feature
would John utilize to track changes, add comments, and manage revisions effectively during collaboration
in Microsoft Word?
(A) Track Changes (B) AutoCorrect
(C) Mail Merge (D) Page Layout
45. Parth used to work in a multinational company. He lost his job due to Covid Pandemic. He worked from
home for sometime but now he likes to search a permanent job. Which of the following social media
platform would serve his purpose?
(A) Dropbox (B) Linkedln
(C) Pinterest (D) Spotify
46. David, a financial analyst, needs to analyze data from multiple worksheets to create a comprehensive
report. Which feature would David utilize in Microsoft Excel to summarize data and perform calculations
across these worksheets?
(A) PivotTables (B) AutoFilter
(C) Conditional Formatting (D) Goal Seek
47. Cyber security protects our networks, computers, programs from attack, damage, or unauthorised access.
It involves many technologies, processes or practices, however which of the following creates false feeling
of security?
(A) VPN (B) Encryption
(C) Firewall (D) All of these
48. WECHAT Chat is a messaging app that allows users to send text messages, photos, and videos to their
contacts. Recently, users have reported encountering spam messages from unknown contacts, leading
to concerns about privacy and security. To address the issue of spam messages from unknown contacts,
what should WECHAT Chat prioritize?
(A) Implementing end-to-end encryption for all user communications.
(B) Adding new emojis and stickers to the messaging interface.
(C) Launching a feature for users to customize chat backgrounds.
(D) Implementing spam filters and blocking mechanisms for unknown contacts.
49. Tisha’s teacher has explained her the topic by giving examples for better understanding. Some of these
examples are
(i) to train bus drivers and pilots.
(ii) to treat autistic children and phobias.
Which topic has been discussed here with the help of above examples?
(A) Augmented Reality (AR) (B) Virtual Reality (VR)
(C) Internet of Things (IoT) (D) Artificial Intelligence (AI)
7
Mock Test 2 CYBER
50. Kunal wants to add some spacing around a paragraph on his website. Can you correct the following code
for him?
Html code
<p style=”margin: 10; padding: 5px;”>Happy Birthday Dear!!! </p>
Which of the following corrections should be made to the code?
(A) Change “margin” to “spacing” in the style attribute.
(B) Add “px” after “10” in the margin property.
(C) Remove “padding” from the style attribute.
(D) Change “5px” to “5” in the padding property.
CYBER
OGO Cyber 10