Page 60 - PYTHON-11
P. 60
8. Which of the following is an example of Free and Open-Source Software (FOSS)? (1)
(a) macOS (b) Linux
(c) Adobe Photoshop (d) Microsoft Office
Ans. (b) Linux
9. Which statement is true about compilers and interpreters? (1)
(a) A compiler translates the entire program before execution while an interpreter translates line by line.
(b) A compiler executes the code faster than an interpreter.
(c) A compiler produces an independent and executable file whereas an interpreter does not.
(d) All of these
Ans. (d) All of these
10. What will be the output of the following expression? (1)
>>16 - 3 * 4 + 9 -2
(a) 59 (b) –25
(c) 11 (d) 143
Ans. (c) 11
11. Which of the following is an example of passive digital footprint? (1)
(a) Sending email to a friend
(b) Subscribing to a YouTube channel
(c) Websites tracking your browsing history without your knowledge
(d) Liking a post on Instagram
Ans. (c) Websites tracking your browsing history without your knowledge
12. What will be the output of the following code? (1)
from math import ceil
print(ceil(4.2))
(a) 4 (b) 4.2
(c) Error (d) 5
Ans. (d) 5
13. Which of the following correctly defines a tuple in Python? (1)
(a) tup = [11, 42, 73] (b) tup = (11, 42, 73)
(c) tup = {11, 42, 73} (d) tup = "11, 42, 73"
Ans. (b) tup = (11, 42, 73)
14. Which Python data type is immutable? (1)
(a) List (b) Dictionary
(c) Tuple (d) All of these
Ans. (c) Tuple
15. Select the correct output of the following code. (1)
text = "LearningScience"
print(text[::-1])
(a) eniSnnaL (b) ecneicSgninraeL
(c) LearningScience (d) LannSine
Ans. (b) ecneicSgninraeL
16. Which of the following is a key feature of IT Act 2000? (1)
(a) It regulates e-commerce transaction and digital signature.
(b) It deals exclusively with online privacy protection.
(c) It provides for the regulation of telecom services.
(d) It mandates mandatory cybersecurity audits for all firms.
Ans. (a) It regulates e-commerce transactions and digital signature.
17. .......................... is a type of cyberattack in which a hacker attempts to redirect a website’s traffic to
another fake website. (1)
Ans. Pharming
M.9