NCO- Cyber Olympiad (SOF) Class 12: Questions 22 - 26 of 520

Access detailed explanations (illustrated with images and videos) to 520 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 22

» Computer » Boolean Algebra

Edit
MCQ▾

Question

Find the CORRECT Boolean Expression for the given logic circuit diagram.

Diagram shows Boolean Expression for the Logical Circuit

Diagram Shows Boolean Expression for the Logical Circuit

This diagram shows Boolean Expression for the Logical Circuit

Choices

Choice (4) Response

a.

FP, Q, R, S = P+QR + S-

b.

FP, Q, R, S = P+Q + RS

c.

FP, Q, R, S = P-+QR + S

d.

FP, Q, R, S = P+Q + R+S

Question number: 23

» Non Verbal Reasoning » Cubes and Dices

Edit
MCQ▾

Question

Four usual dice are thrown on the ground. The total of numbers on the top faces of these four dice is 13 as the top faces showed 4,3, 1 and 5 respectively. What is the total of the faces touching the ground?

Choices

Choice (4) Response

a.

15

b.

13

c.

14

d.

Question does not provide sufficient data or is vague

Question number: 24

» Verbal Reasoning » Alphabet Test

Edit
MCQ▾

Question

How many such pairs of letters are there in the word “COMPUTERS” each of which has as many letters between them in the word (in only forward directions) as in the English alphabets?

Choices

Choice (4) Response

a.

5

b.

3

c.

4

d.

1

Question number: 25

» Computer » MS-Word

Edit
MCQ▾

Question

Which of the following statement is INCORRECT with respect to JPEG graphic format?

Choices

Choice (4) Response

a.

It uses lossy compression.

b.

It stands for Joint Photographic Experts Group.

c.

It uses upto 24-bit color.

d.

It takes so much storage space.

Question number: 26

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ________.

Choices

Choice (4) Response

a.

Phishing

b.

Exploits

c.

Scams

d.

Eavesdropping