0% found this document useful (0 votes)
8 views

It Module(150)

Uploaded by

Kavi Sirola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

It Module(150)

Uploaded by

Kavi Sirola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

IT QUESTIONS

1 In communication WWW means……………..


A) Wonder wide B) With wide web C) World wide web D) World with
walls web
2 A device used to communicate with computers using telephone lines is a………..
A) Disk B) CPU C) Modem D) VDU
3 A package which can be downloaded via internet for testing purposes before buying is
called……..
A) Beta software B) Shareware C) Pirated software D) Backup copy
4 An e-meeting is known as……
A) Tele banking B) Tele offering C) Tele shopping D) Tele
conferencing
5 Which one of the following is used to browse and search for information on the internet?
A) Eudora B) Netscape C) FTP D) Telnet
6 A popular service for sending or receiving mail on the internet is the …………
A) E-mail B) Gopher C) FTP D) All
7 FTP stands for ……..
A) File transfer B) Fast text C) File transmission D)Fast
protocol processing program transmission
processor
8 In computer networks IP address means ……….
A) International pin B) Internet C) Invalid pin D) Internet
protocol provider
9 In computer hardware Wi-Fi means ……..
A) Wireless- fidelity B) Wire-fire C) With fire network D) With fiction
10 G-mail is sole service of ………
A) Great mail B) Gopher mail C) Google mail D) None
11 ….is the encompassing term that involves the use of electronic platforms-intranets,
extranets and the internet to conduct a company's business.
A) E-commerce B) E-marketing C) E-procurement D) E-business
12 If you receive an e-mail from unknown recipient, what sought of action you’ll take?
A) Forward it to B) Delete it C) Open and respond D) Reply and ask
police immediately without opening it to them saying you them for their
don't know them personal
information
13 Which of the following must be contained in a URL?
A) A protocol B) The letter www C) The unique D) Www and the
identifier registered domain unique registered
name domain name
14 A program for viewing web pages is called ……….
A) Word processor B) Spreadsheet C) Protocol D) Browser
15 Which of these is not a means of personal communications on the internet?
A) Chatting B) Instant C) Instanoles D) E-mail
messaging
16 ……… is process of transferring document from another computer to your computer.
A) Uploading B) Really simple C) Accessing D) Downloading
syndication
17 What is URL?
A) A computer B) A type of C) The address of a D) A piece of
software program programming document on the hardware
object www
18 ………… is computer program which is used to search the websites?
A) Mozilla B) MS-word C) FoxPro D) Unix
19 Among the options given below, which of the following is not a web browser?
A) IE B) Mozilla C) Netscape navigator D) FoxPro
20 Video conferencing is used for………………..
A) Talking to each B) Video player C) Live conversation D) None
other
21 Talking on net with the help of typed text?
A) Chatting B) E-mail C) New group D) None
22 URI stands for …………..
A) Uniform read B) Uniform C) Universal read D) Universal
Identifier resource Identifier resource Identifier
Identifier
23 Which among of them is a search engine?
A) IE B) Flash C) Google D) Firefox
24 The Internet was launched in 1969 and was originally called ……..
A) AARPNET B) CERNET C) CERN D) ARPANET
25 The actual physical network made up of wires cables and satellites that connects
computers and resources throughout the world is the ……
A) Web B) Internet C) e-commerce D) spiders
26 The most popular Internet activity is ……..
A) Going shopping B) Conducting C) Playing games D) Communicatin
research reading listening to g with others
music
27 The fastest-growing application for the Internet is …….
A) Going shopping B) Conducting C) Playing games, D) Using E-Mail
research reading and listening
to music
28 Most common uses of the Internet and the Web include communicating shopping is
………..
A) searching B) e-commerce e- C) e-mail D) e-commerce e-
entertainment and mail and searching entertainment and mail and
education education education
29 The ………. is the multimedia interface to resources available on the Internet.
A) Web B) ISP C) browser D) URL
30 The multimedia interface to the resources available on the Net is called the ……..
A) World Wide B) Internet C) GUI interface D) server
Web
31 The most common method for gaining access to the Internet is through a ………
A) Dumb terminal B) Virtual C) Point-to-point D) Provider or
provider or computer host computer
computer
32 The term ISP refers to …….
A) internal software B) international C) Internet service D) interface
protocol shareware pool provider standard protocol
33 A …………… program provides access to Web resources.
A) Web B) ISP C) browser D) URL
34 These types of commercial Internet service providers are the most widely used ……….
A) national service B) regional C) centralized service D) decentralized
providers service providers providers service providers
35 In a client/server network the user’s computer is considered the …………
A) server B) client C) Web site D) library
36 For a browser to connect to other resources the location or address of the resources must
be specified.These addresses are called ………….
A) URLs B) Packets C) E-Mail Forms D) MSN
37 The two basic parts of URLs are …………….
A) TCP/IP and ISP B) Destination and C) The protocol and D) TCP and IP
device the domain name
38 Rules for exchanging data between computers are called ……….
A) Programs B) Procedures C) Protocols D) Hyperlinks
39 The most widely used Web protocol is ………..
A) http:// B) URL C) HTML D) ISP
40 Moving from one Web site to another is called ………
A) Jumping B) Moving C) Surfing D) Applying
41 The extensions .Gov, .edu, .mil and .net are called …….
A) DNSs B) E-Mail C) Domain Codes D) Mail to
Targets addresses
42 In the e-mail address "[email protected]" what is the domain name?
A) The whole B) .Org C) Usource.Org D) Justin Case
address is called the
domain name.
43 URL is an acronym for ………….
A) Uniform B) Uniform C) Universal D) Unlimited
Resource Locator Resource Link Reference Locator Real-time
Language
44 When surfing the Web the browser interprets the HTML command found in a document
file and displays it as ………..
A) Applet page B) Java page C) Web page D) Domain page
45 HTML is an acronym for ……………..
A) Hyperlink B) Hypertext C) Hypertext Markup D) Hypertext
Markup Language Markup Link Modern Language
Language
46 Connections to other documents or to other locations within a Web site are …….
A) Filters B) Hyperlinks C) Plug-ins D) Bots
47 Hyperlinks in a Web document typically appear as ………
A) Bolded and B) Italicized and C) Underlined and D) Bolded and
underlined underlined colored italicized
48 ……….. are widely used to add interest and activity to a Web site by presenting
animation displaying graphics providing interactive games and more.
A) Applets B) Bots C) Plug-ins D) Spiders
49 Applets are typically written in a programming language called ……..
A) XML B) Basic C) Pascal D) Java
50 Which of the following are not required in order to send and receive e-mail?
A) E-Mail Account B) Web Page C) Access To The D) E-Mail
Internet Program
51 Which of the following is not one of the basic elements of an e-mail message?
A) Header B) Footer C) Message D) Signature
52 A one-line description used to present the topic of an e-mail message is referred to as the
…..
A) Header B) Address C) Subject D) Signature
53 Unwanted and unsolicited e-mails are called ………..
A) Spam B) Junk C) Flame D) Lurk
54 Newsgroups use a special network of computers called the …….
A) UseNet B) Mail Net C) Address Net D) Channel Net
55 A popular chat service is called …….
A) IM-Chat B) UseNet Chat C) Internet Protocol D) Internet
Chat Relay Chat
56 Before you submit a contribution to a discussion group you should first ….
A) Lurk B) Signal C) Queue C) Ping
57 Specialized programs that assist you in locating information on the Web and the Internet
are called ……..
A) Browsers B) Gophers C) Search Engines C) Applets
58 These search engines receive the results, eliminate/duplicates, order the hits and then
provide the edited list to you ………
A) Mega search B) Meta search C) Keyword Search D) Directory
Engines Engines Engines Search Engines
59 Buying and selling goods over the Internet is called ……………
A) Hyper- B) Cyber-Selling C) E-Commerce D) Euro-
Marketing Conversion
60 This type of electronic commerce involves the sale of a product or service to the general
public.
A) B2C B) B2P C) C2C D) B2B
61 This type of e-commerce often takes the form of an electronic version of the classified
ads or an auction.
A) B2C B) C2C C) G2C D) B2B
62 Virtual stores for B2C electronic commerce are also known as ………
A) Auctions B) Houses C) Web Storefronts D) Internet
Buyers
63 Another name for electronic cash or e-cash. Internet equivalent to traditional cash is
……
A) Cyber cash and B) Digital cash C) Carders and cyber D) Cyber cash
analog cash and cyber com com and digital cash
64 …. are specialized utility programs that makes the Internet and the Web easier and safer.
A) Telecom B) Web utilities C) Norton Utilities D) Web
firewalls
65 An Internet standard that allows you to connect to another computer (host) on the
Internet and to log on to that computer as if you were on a terminal in the next room
is ……..
A) FTP B) AOL C) Luster D) Telnet
66 Programs that are automatically loaded and operate as a part of your browser are referred
to as ……………
A) FTP B) plug-ins C) add-ons D) Telnet
67 An Internet standard for transferring files is known as ……..
A) IRC B) Telnet C) FTP D) WAIS
68 A) ……….. can be used to block access to specific sites.
A) Filter B) Hardware C) Censor D) Rubicon
Block
69 What are some of benefits of using a firewall for your LAN?
A) Increased access B) Stricter access C) Greater security to D) Both B & C
to instant messaging control to critical your LAN
resources
70 Which of the following is true statement about firewall?
A) Filters network B) Can be either a C) Follows a set of D) All
traffic hardware or rules
software device
71 Which of the following are true about firewall protection when using static packet
filtering on the router?
A) Static packet B) Static packet C) Static packet D) All
filtering is less filtering is less filtering is more secure
secure than full secure than proxy than dynamic packet
filtering filtering filtering

72 A packet filtering firewall operates at which of the following OSI layers?


A) At the application B) At the C) At the network D) Both A & B
layer transport layer
73 Firewalls are designed to perform all the following except……….
A) Limiting security B) Logging C) Enforcing the D) Protecting
exposures internet activity organization's security against viruses
policy
74 Which of the following terms defines RAS?
A) Random access B) Remote access C) Random access D) Remote access
security security service service
75 Usually a RAS connection is a dial-up connecting. What network connections also apply
to RAS?
A) DSL B) ISDN C) VPN D) All
76 Which is not the feature of internet?
A) E-mail B) News group C) Chat D) Designing
77 ……….. Is set of rules and regulation while working on internet.
A) Protocol B) Internet C) Intranet D) Www
78 Most websites have a main page which acts as doorway to the rest of the website pages
is ………...
A) Search engine B) Homepage C) Browser D) URL
79 An e-mail account includes a storage area often called a/an……………
A) Attachment B) Hyperlink C) Mailbox D) IP address
80 Symbol used in E-mail addresses that separates user name from the ISP……….…
A) & B) @ C) % D) :
81 A …..allow you to access your e-mail from anywhere.
A) Forum B) Webmail C) Message board D) Weblog
interface
82 A chat is…………..
A) An internet B) A type of C) An online area in D) The
standard allows us to conversation that which users conduct transmission of
download and takes place on a written discussions messages and files
upload files computer about a particular via a computer
subject network
83 Sending an e-mail is similar to…………..
A) Picturing an event B) Narrating a C) Writing a letter D) Creating a
story drawing
84 Software used to establish webmail in CRPF is ………………………
A)Lotus Notes B) Lotus iNotes C)Outlook D) Gmail
85 Protocol used in CRPF VPN is …………………..
A)PPTP B)L2TP C)IP SEC D) ALL
86 Authentication method used in CRPF VPN
A)RSA B)AD C)BOTH D)NONE OF
THESE
87 How many modes are available in webmail?
A)3 B)2 C)1 D)4
88 Maximum size of attachment used in webmail
A)254 kb B) 25 MB c)1024 kb D) 512 KB
89 Which mode is used to sending /receiving attachment in CRPF VPN
A)Ultra light B)User Mode C)Lite Mode D)Full mode
mode
90 DMS means -----------------
A)Document B) Dak Management C)Digital mail System D)None of
management System these
system
91 Time interval required to change RSA token authentication password is…………
A)30 s B) 1 minute C) 20 s D) 3 minute
92 In Webmail Rule option will be available ------------ menu
A)Mail B)Tools C)Folder D)Achieve
93 If there is sufficient space in your mail box then mail status bar color will be…………
A)Green B)Red C)Blue D)Yellow
94 The colour of mail status bar while crossing the threshold quota limit is……………………
A)Green B)Red C)Blue D)Yellow
95 In webmail unread messages should be shown in……………..color
A)Red B)Red or Black C)Black D) Bolded
black or Red
96 In CRPF Webmail blocked mail should be available in ………………..folder
A)Blocked B)Draft C)Junk D)Sent
97 ________________is used to direct mails in a particular folder
A)Forward B)Send C) Rules D) Direct mail
98 Which one of the following is not a VPN protocol
A)L2TP B) IP sec C) PPTP D) FTP
99 Recommended browser for web mail is __________________
A) Internet B) Google Chrome C) Safari D) Opera
Explorer
100 Backbone of VPN is__________________`
A) SELO B) Intranet C)Internet D) Extranet

1 Computer virus is ……
A) A hardware B) Windows tool C) A Computer D) A system
program software
2 The first computer virus is ……………..
A) Creeper B) Param C) The Famous D) Harle
3 A time bomb occurs during a particular ……..
A) Date or time B) Logic and data C) Only Time D) All
4 First boot sector virus is …………….
A) Computed B) Mind C) Brain D) Elk Cloner
5 …………… spreads in application software.
A) Macro Virus B) Boot Virus C) File Virus D) Antivirus
6 Some viruses have a delayed payload which is sometimes called a …………….
A) Time B) Antivirus C) Bomb D) All
7 An antivirus is a ……………….
A) Program Code B) Computer C) Company Name D) Application
8 Trend micro is a ……………..
A) Virus Program B) Antivirus Software C) Just A Program D) All
9 LE-Hard virus is effect of …………..
A) Command.com B) Friday 13 C) Hardware D) Software
10 It is a self-replicating program that infects computer and spreads by inserting copies of
itself into other executable code or documents.
A) Key Logger B) Virus C) Worm D) Cracker
11 Like a virus it is also self-replicating program. The difference between a virus and it is that
it propagates through computer network.
A) Cracker B) Worm C) Key Logger D) All
12 …………………are viruses that fool a user in downloading and executing them by
pretending to be useful applications.
A)Trojan Horses B) Key Logger C) Worm D) Cracker
13 Quick Heal is an example of ……..software.
A) OS B) Hardware C) Utility D) Virus
14 How many bits are there in ASCII code.
A) 18 B) 8 C) 10 D)16
15 DDE stands for …………………….
A) Dynamic Data B) Dynamic Data C) Dynamic Data D) None Of Above
Exchange Export Extension
16 In computer security, ………. means that computer system assets can be modified only by
authorized parities.
A) Confidentiality B) Integrity C) Availability D) Authenticity
17 Which of the following is independent malicious program that need no host program?
A) Trap doors B) Trojan horse C) Virus D) Worm
18 The …………….. is code embedded in some legitimate program that is set to “explode”
when certain conditions are met.
A) Trap doors B) Trojan horse C) Logic Bomb D) Virus
19 Which of the following malicious program do not replicate automatically?
A) Trojan Horse B) Virus C) Worm D) Zombie
20 A ………….. is a program that can infect other programs by modifying them. The
modification includes a copy of the virus program, which can infect other programs.
A) Worm B) Virus C) Zombie D) Trap doors

21 …………… programs can be used to accomplish functions indirectly that an unauthorized


user could not accomplish directly.
A) Zombie B) Worm C) Trojan Horses D) Logic Bomb
22 Which of the following are forms of malicious attack?
A) Theft of B) Modification of data C) Wiping of D) All of these
information information

23 From the following, which is not common file permission?


A) Write b) Execute c) Stop d) Read
24 Which of the following is least secure method of authentication?
A) Key card b) fingerprint c) retina pattern d) Password
25 Which of the following is a strong password?
A) 19thAugust88 b) Delhi88 c) P@assw0rd d) !augustdelhi
26 File virus attaches itself to the………..
A) source file b) object file c) executable file d) All of these
27 Multipartite viruses attack on ……………..
A) files B) boot sector C) memory D) all of these
28 When an attempt is to make a machine or network resource unavailable to its intended
users, the attack is called…………..
A) denial-of- B) slow read attack C) spoofed attack D) starvation attack
service attack
29 What is not an important part of security protection?
A) Large amount B) Strong passwords C) Audit log D) Scan for
of RAM to periodically unauthorized
support antivirus programs in system
directories
30 What is trap door?
A) IT is trap door in B) It is a hole in C) It is a Trojan D) It is a virus
War Games software left by horse which traps and
designer. locks user terminal

31 Software used to establish Webmail in CRPF is ………………………


A) Lotus Notes B) Lotus i-Notes C) Outlook D) Gmail
32 Protocol used in CRPF VPN is …………………..
A) PPTP B) L2TP C) PPP D) RSA
33 Authentication method used in CRPF VPN is …………..
A) RSA B) AD C) Both D) None
34 How many modes are available in Webmail?
A) 3 B) 2 C) 1 D) 4
35 Maximum size of attachment used in Webmail is………..
A) 254 Kb B) 25 MB C) 1024 kb D) 512 KB
36 Which mode is used for sending /receiving attachment in CRPF VPN?
A) Ultra-light mode B) User Mode C) Light Mode D) Full mode
37 DMS means …………..
A)Document B) Dak Management C) Digital mail System D) None of these
management system System
38 Web address used to connect Webmail in CRPF from a SELO location is ………
A)WEB-CGO- B)WEB-MAIL- C) MSG-CGO- D)MSG-CGO-
DEL.SELO DEL.SELO.LOCAL DEL.SELO.LOCAL DEL.SELO
39 In RSA token, the passcode changes after every ………
A) 30 Second B) 1 Minute C) 20 Second D) 3 Minute
40 In Webmail Rule option will be available ……… menu
A) Mail B) Tools C) Folder D) Achieve
41 If there is sufficient space in your mail box then mail status bar color will be…………
A) Green B) Red C) Blue D) Yellow
42 The color of mail status bar while crossing the threshold quota limit is……………………
A) Green B) Red C) Blue D) Yellow
43 In Webmail unread messages should be shown in……………..color.
A) Red B) Red or Black C) Black D) Bold black
/Red
44 In CRPF Webmail, blocked mail should be available in ………………..folder.
A) Blocked B) Draft C) Junk D) Sent
45 ………..is used to direct mails in a particular folder.
A) Forward B) Send C) Rules D) Direct mail
46 Which one of the following is not a VPN protocol?
A) L2TP B) IP sec C) PPTP D) FTP
47 To prevent copy, which option is used in web mail?
A) Keep private B) Prevent Copy C) Block mails D) Read only
48 Recommended browser for web mail is …………..
A) Internet Explorer B) Google Chrome C) Safari D) Opera
49 Backbone of VPN is………………
A) SELO B) Intranet C) Internet D) Extranet
50 IN web mail deleted Mail resides in ……………..
A) Recycle bin B) Junk folder C) Trash D) Created folder

103 WHICH OF THE FOLLOWING IS NOT A TYPE OF MOTHERBOARD


EXPANSION SLOT?
A) ISA B) PCI C) AGP D) ATX

104 WHICH PROVIDES THE FASTEST DATA ACCESS TIME?

A.RAM B.ROM C.CD-ROM D.HARD


DISK
105 THE SLOWEST TRANSMISSION SPEEDS ARE THOSE OF

A.TWISTED-PAIR WIRE B.COAXIAL CABLE C.FIBER-OPTIC CABLE D.MICROWAVES

106 SENDING A FILE FROM YOUR PERSONAL COMPUTER'S PRIMARY MEMORY OR DISK TO
ANOTHER COMPUTER IS CALLED

A.UPLOADING B.DOWNLOADING C.LOGGING ON D.HANG ON

107 WHICH COMMAND USED FOR TESTING CONNECTIVITY BETWEEN COMMUTERS

A) IPCONFIG B) PING C) TRACERT D) GETROURE

108 WHAT TYPE OF CONNECTOR IS USED TO PLUG A TELEPHONE LINE INTO A MODEM?

A) COM1 B) RJ-45 C) RJ-11 D) RJ-10

101 IN wen mail delete Mail resides in


A) Recycle bin B) Junk folder C) Trash D) Created
folder

You might also like