1. Read the question paper carefully and attempt all the questions.
2.Each question is compulsory.
3. Mark allotted are given along with every section.
4. Write neat , clean and precise answers.
(i) Cyber crime can be defined as ?
a. Cyber attack b. Cyber Terrorism c. Cyber Espionage d. All of the above
(ii). Who are the prime targets of cyberbullying ?
a. Women b. Teenagers c. old mend. Hackers
(iii). Ravi unknowingly entered password in a fake banking site. He is the victim of _____
a. Cyberbullying b. Phishing c. Email fraud d. Worm
(iv). Ankit saw #### in a cell in his worksheet . What should he do correct this ?
a. Adjust column width b. Correct the formula c. Adjust row height d. set a smaller font
(v). Renu has fixed the the column of a cell reference in a formula . What type of cell
referencing has she applied ?
a. Absolute b. Mixed c. Relative d. Default
(vi). Which of the following are created on the basis of user’s requirements ?
a. Formulas b. Functions c. Cell references d. All of these
(vii). Which of the following is another name for a record in database table ?
a. Row b. Tuple c. both a) and b) d. Cell
(viii). Primary key and foreign key are the concept related to which of the following ?
a. Attributes b. Tuples c. Relations d. Database
(ix). Which of the following is an organized collection of data ?
a. DBMS b. information c. Table d. Database
(x). Which of the following types of viruses seems like a useful program ?
a. Firewall b. Spyware c. Trojan d. Worm
Q2. Fill in the blanks
( Phreakers, Pegasus software,aggregate,database,edit, formula,SSL, )
(i) ________discovered a technique to make long distance calls using a series of code by
changing software and hardware .
(ii) Data is securely encrypted using _______.
(iii) The _______ is a software that taps the phones.
(iv) The formula stored in a cell is visible in ______mode.
(v) _________functions process multiple values at a time .
(vi) (5×3)/15 is an example of _____.
(vii) Field property _______________prevents a field to store null value .
(viii) A___________ is collection of related data/tables
Q3. Answer the following questions :-
(i) What is a function ? How it is different from a formula ?
(ii) How is data different from information ? Explain with a small example.
(iii) How are Trojans , worms and spyware different in their function ?
(iv) Why should not we ever indulge ourselves in cyberbullying anyone ?
(v) Spot the errors in the usage of the following functions and rewrite their correct form :-
a. = COUNTIF(“<=100”,A1:A20)
b. =IF(“TRUE”, “ FALSE”,100<80)
a. Q6. Write the work of these given functions
b. COUNT
c. COUNTIF
d. AVERAGE
e. SUMIF