This part consists of 10 questions carrying a WElGHT OF 2 marks for each. Answer the questions by choosing the most correct choice. You should dedicate approximately 15 minutes for this part. 1- What is the output of the following Python statement? print (6+15/5%3) a. 13.5 c. 6 . b. 7 d. 21.0. 2. To open and read text file that is named StudentRec.txt that exists in folder D:ipython.Which of the following statements is the easiest way to read this file. given that the Python program is located under the same folder: a. file = open('StudentRec.txt', 'r') b. file = c. file = open('Studentinfo.txt') open('D:llpythonllStudentRec.txt', ' r ') d. file = open('D:lpythonlStudentRec.txt', 'r') 3. The term CIA from the course context stands for: a. Central Intelligence Agency. c. Confidentiality, Integration, Availability. b. Certified internal Availability. 4- The best definition of Geocoding is : a. The ways in which location can be determined b. The encoding of location information, such as an address, into a geolocation. c. The process of identifying a location in human terms from a geolocation d. Identifying a location as geographically based according to a known coordinate system 5- Which of the following statements is correct? a. It is not possible for someone to alter the timestamp of a file. b. Gyroscopes are used to measure how quickly an object rotates. c. NFC offers protection against eavesdropping. d. Authorization is the process of proving your identification. 6. Which of the following is not a Cloud computing characteristic? a. Scalability c. Broad network access b. On-demand self-service d. Vulnerability 7. Which of the below statements is a feature of the Random-Access Memory? a. It is volatile c. Accessing any location in RAM takes the b. It is non-volatile same amount of time. d. Both a and c. 8- Hashing cannot: a. confirm that data has never been c. authenticate the creator or sender of data. changed. d. all the given. b. guarantee the confidentiality of data. 9. Which of the following statements is incorrect? a. In Python, Lists are written as comma-separated items within squared brackets. b. Compilers translate all the source code in one go. c. The operating system is not responsible for the management of memory. d. Key stretching increases the required time amount for even the fastest CPUs to create a hash. 10-Which of the following is an example of Infrastructure as a Service, laaS? a. Providing customers with a web-based e-mail service b. Providing an environment in which the customers' applications can be run c. Providing customers with access to virtual machines. d. None of the given choices