Q. Tick the correct Answer:- (MCQ)
1. In HTTPS, S means
i. Secure ii.
Socket
iii. Service iv. Software
2. The World
Wide Web was invented in the year________
i. 1990 ii. 1991
iii. 1989 iv. 1992
3. ______ are
stored on servers on Internet.
i. Hyperlink iii. Multimedia
iii. Language iv. Websites
4. Protocols are
set of rules to govern _______.
i. Communication ii. Bandwidth
iii. Governor iv. Standard
5. The full form
of POP in e-mail is ________.
i. Print Output Process ii.
Print Output Protocol
iii. Post Order Protocol iv. Post Office
Protocol
6. Chrome is a
browser by which company?
i. Microsoft ii. Apple
iii. Google iv. IBM
7. Internet
address is a
i. 8bit number ii. 16 bit number
iii. 32 bit number iv. None of these
8.Which of the
following is not an ISP in Indian?
i. Vodafone ii. Jio
iii. TCP iv. Airtel
9. Web address
of national portal of India is :-
a) India.gov.in b)
cbsecomputereducation.com
c) cbseacademic.nic.in d)
None of these
10. E-mail are stored in this folder before they are sent :-
a )
Inbox b)
Sent
c) Outbox d) Message
11. This types of network is used in School, Collage, and
Hospital etc.
a) PAN b) LAN
c) MAN d) WAN
12. ________________is known as
predecessor to the internet.
a) INDNET b ) Telnet
c ) USENET d ) ARPANET
13. Which of the following are
the advantages of computer network ?
a ) Communication b ) Data Sharing
c) Hardware resources sharing d) All of these
14. Which of the following
networks is used to connect city?
a ) LAN b ) MAN
c ) WAN d)
PAN
15. is used to convert analog signals to digital signals and
vice - versa .
a
) Router b) Modem
c
) Hub d
) Bridge
16. SkyDrive is an example of :-
a)
Network b)
Hardware
c) Cloud d)
Input device
17. The business of
buying and selling things over the Internet is called:-
a) Business b) Sell
c) E-commerce d) Buy
18. A web site is a collection of-
a)
Graphics File b)
Audio Video File
c)
HTML Pages d) All of these
19. Which of the following is not a web browser:-
a)
Mozilla Firefox b)
Internet Explore
c)
Google Chrome d) None of these
20. Which of the following
techniques can be used for security of data?
a) Authentication b) Authorisation
c) Encryption d) All of the Above
21. WWW stands for-
a)
World Wide Web b) Word Wide Web
c) World Web Wide d) Wide World
Web
22. The World Wide Web is a
Virtual network of web sites connected by _________.
a) Internet b)
Web Site
c)
hyperlinks d)
Web Browser
23. Which protocol is commonly
used to retrieve email from a mail server?
a) FTP b) IMAP
c) SMTP d)
IP
24. Which of the following is an
Internet Protocol?
a) HTTP b)
FTP
c)
Both a and b d) None of these
25. The Full of SMTP is-
a)
Secure Mail Transfer Protocol
b)
Simple Message Transfer Protocol
c)
Secure Message Transfer Protocol
d) Simple Mail Transfer
Protocol
26. The maximum size for any single email message including
attachments is-
a)
5 MB b)
15 MB
c) 25 MB d)
30 MB
27. A website used to provide online information and services to
the citizens is an example of :-
a)
E-Business b)
E-mail
c) E-Governance
d)
E-Learning
28. The website of a school which allows the students to go
through various lessons in their subjects is an example of :-
a)
E-Business b)
E-mail
c)
E-Governance d) E-Learning
29. The website of a Book supply
company allows its customer to pay online and purchase book is an example of :-
a)
E-Business b) E-mail
c) E-Governance d) E-Learning
30. What is the full form of BCC:-
a) Best Carbon Copy b) Broad Carbon Copy
c) Blink Carbon Copy d) Blind Carbon Copy
31. Which one of the following
software comes under Open-Source Software -
a. Photoshop b.
MS-Paint
c.
Linux d. Windows
32. Secure data transmission
means
a) Data is accessible by any unauthorized
person during transmission.
b)
Data cannot be accessed by any unauthorized person during transmission.
c) Transmission of data happens
d) None can access it
33. Preeti needs to send a very confidential message to her
colleague in office over a secure channel. She uses a technique wherein an
actual message (which is in readable form) can be converted into an unreadable
message. This concept is known as________________
a.
Encryption b.
Decryption
c.
Plagiarism d. Data Security.
34. Which of the following
techniques can be used for security of data?
a. Authentication b. Authorisation
c. Encryption d. All of the Above
35. _________ is a software for
which exclusive rights of modification in the source code remain with the
owner.
a. Free Open-Source Software
b. Freeware
c.
Open-Source Software
d. Proprietary Software
36. Which protocol is used to
download a file-
a) TCP b) FTP
c) HTML d)
IP
37.
Which one is search engine:-
a) Google b) Yahoo
c) Bing d) All of these
38.
The address of location of the document on the world wide web is called is
a) Web Site b) Web Client
c) Web Address d) None of
these
39.
Software that is used to open a web page.
a) Google b) Operating
System
c) ISP d) Web Browser
40. What is the meaning of web surfing?
a) Sending of
E-mail b) Exploring the web
c) Video
Conferencing d) None of these
41.
Identify e-mail address from following:-
a)
www.gmail.com
b)
www.google.com
c) cbsecomputereducation@gmail.com
d) None of
these
42.
Which provide the high speed internet:-
a) 2G b) 3G
c) Broadband d) All of these
43. SMS is used for sending
small message upto ___ characters.
a) 100 b)
150
c)
160 d)
75
44. Which one is online platform
where celebrities, politicians and famous personality send the short message
with images and videos?
a) YouTube b)
Facebook
c)
Twitter d)
Web site
45. Which service of internet
where untrained person can make own web site?
a) YouTube b)
Facebook
c) Twitter d) Blog
46. Facebook is an example of :-
a) Blog b) Social Networking
c) SMS d)
None of these
47. Which networking device
regenerate the signal?
a
) Router b) Repeater
c ) Hub d ) Bridge
48. Smallest storage unit :-
a) Bit
b) Byte
c)
MB d)
GB
49. Windows inbuilt web browser:-
a)
Mozilla Firefox b) Internet Explore
c)
Google Chrome d) None of these
50. Which one is mobile technology:-
a)
SMS b)
3G
c) 4G d) All of these
THANK
YOU
0 Comments
Post a Comment