09-12-2018, 07:55 AM
Download previous year question paper NCO- National Cyber Olympiad of Class 12. The examination is conducted to identify and nurture future computer scientists
This will be the best model papers for all the candidates preparing for upcoming cyber olympiads
Some sample questions from the paper
1. ‘Stoned’ is the name of a___________.
(A)   Boot sector virus   (®)   Trojan
©Â   Worm   (D)   Multipartite virus
2. In C++, which of the following will the compiler NOT use to distinguish functions by their signatures?
(A)   The const-ness of   function   arguments
(B)   The order of the   argument number
©Â   The order of the argument   types  Â
(D)Â Â Â Function return type
3.   In a relational database, the rows are referred to as______________and columns are referred to as____________.
(A)   Tuple, Degree  Â
(B)Â Â Â Degree, Attribute
©Â   Domain, Degree  Â
(D)Â Â Â Tuples, Attributes
4.   Which of the following activity is an unethical activity as per RFC 1087?
(A)Â Â Â Any activity which seeks to gain unauthorized access to the resources of the Internet or disrupts the intended use of the Internet.
(B)Â Â Â Any activity which waste resources (people, capacity, computer) through unauthorized access of resources.
©Â Â Â Any activity which destroys the integrity of computer-based information, and/or compromises the privacy of users
(D)Â Â Â All of these
5.   What does XSL stand for ?
(A)   eXtensible Style Listing  Â
(B)Â Â Â eXtensible Stylesheet Language
©Â   eXpandable Style   Language  Â
(D)Â Â Â eXtra Style Language
For complete question paper and answer key download the pdf files given below.
This will be the best model papers for all the candidates preparing for upcoming cyber olympiads
Some sample questions from the paper
1. ‘Stoned’ is the name of a___________.
(A)   Boot sector virus   (®)   Trojan
©Â   Worm   (D)   Multipartite virus
2. In C++, which of the following will the compiler NOT use to distinguish functions by their signatures?
(A)   The const-ness of   function   arguments
(B)   The order of the   argument number
©Â   The order of the argument   types  Â
(D)Â Â Â Function return type
3.   In a relational database, the rows are referred to as______________and columns are referred to as____________.
(A)   Tuple, Degree  Â
(B)Â Â Â Degree, Attribute
©Â   Domain, Degree  Â
(D)Â Â Â Tuples, Attributes
4.   Which of the following activity is an unethical activity as per RFC 1087?
(A)Â Â Â Any activity which seeks to gain unauthorized access to the resources of the Internet or disrupts the intended use of the Internet.
(B)Â Â Â Any activity which waste resources (people, capacity, computer) through unauthorized access of resources.
©Â Â Â Any activity which destroys the integrity of computer-based information, and/or compromises the privacy of users
(D)Â Â Â All of these
5.   What does XSL stand for ?
(A)   eXtensible Style Listing  Â
(B)Â Â Â eXtensible Stylesheet Language
©Â   eXpandable Style   Language  Â
(D)Â Â Â eXtra Style Language
For complete question paper and answer key download the pdf files given below.