0% found this document useful (0 votes)
183 views10 pages

Xii - Ca em One Mark 2024-2025

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views10 pages

Xii - Ca em One Mark 2024-2025

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

XII – COMPUTER APPLICATIONS


PRACTICE ONE MARK QUESTION
1. What is multimedia?
a) a type of computer hardware
b) a type of computer software
c) a type of computer network
d) the use of multiple forms of media to communicate information
2. ___________has five major components like text, images, sound, video and animation.
a) Multimedia b) Master page c) Master item d) Multi-word
3. What is a raster image?
a) a type of image made up of pixels
b) a type of image made up of geometric shapes
c) a type of image made up of text
d) a type of image made up of sound waves
4. What is vector image?
a) a type of image made of pixels
b) a type of image made up of geometric shapes
c) a type of image made up of text
d) a type of image made up of sound waves
5. Which of the following is raster image file format?
a) JPEG b) EPS c) CDR d) SVG
6. Which of the following is a vector image file format?
a) PSD b) JPEG c) EPS d) BMP
7. RTF(Rich Text Format) file format was introduced by___________
a) TCS b) Microsoft c) Apple Inc. d) IBM
8. The expansion of JPEG is___________
a) Joint Photographic Experts Group
b) Joint Photo Experts Group
c) Joint Photon Experts Group
d) Joint Photographic Express Group
9. AIFF file format was developed by___________
a) TCS b) Microsoft c) Apple Inc. d) IBM
10. Which of the following is an audio file format?
a) MP3 b) AVI c) MPEG d) PNG
11. DTP stands for ___________
(a) Desktop Publishing (b) Desktop Publication (c) Doctor To Patient (d) Desktop Printer
12. ___________is a DTP software.
(a) Lotus 1-2-3 (b) PageMaker (c) Maya (d) Flash
13. Which menu contains the New option?
(a) File menu (b) Edit menu (c) Layout menu (d) Type menu
14. In PageMaker Window, the area outside of the dark border is referred to as ___________
(a) page (b) pasteboard (c) blackboard (d) dashboard
15. Shortcut to close a document in PageMaker is___________
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + W
16. A___________tool is used for magnifying the particular portion of the area.
(a) Text tool (b) Line tool (c) Zoom tool (d) Hand tool
17. tool is used for drawing boxes.
(a) Line (b) Ellipse (c) Rectangle (d) Text

https://csknowledgeopener.com 1 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

18. Place option is present in___________menu.


(a) File (b) Edit (c) Layout (d) Window
19. To select an entire document using the keyboard, press ___________
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + D
20. Character formatting consists of which of the following text properties?
(a) Bold (b) Italic (c) Underline (d) All of these
21. Which tool lets you edit text?
(a) Text tool (b) Type tool (c) Crop tool (d) Hand tool
22. Shortcut to print a document in Pagemaker is ___________
(a) Ctrl + A (b) Ctrl + P (c) Ctrl + C (d) Ctrl + V
23. Which language is used to request information from a Database?
a) Relational b) Structural c) Query d) Compiler
24. The ___________diagram gives a logical structure of the database graphically?
a) Entity-Relationship b) Entity c) Architectural Representation d) Database
25. An entity set that does not have enough attributes to form primary key is known as
a) Strong entity set b) Weak entity set c) Identity set d) Owner set
26. ___________Command is used to delete a database.
a) Delete database database_name b) Delete database_name
c) drop database database_name d) drop database_name
27. MySQL belongs to which category of DBMS?
a) Object Oriented b) Hierarchical c) Relational d) Network
28. MySQL is freely available and is open source.
a) True b) False
29. ___________ represents a “tuple” in a relational database?
a) Table b) Row c) Column d) Object
30. Communication is established with MySQL using
a) SQL b) Network calls c) Java d) API’s
31. Which is the MySQL instance responsible for data processing?
a) MySQL Client b) MySQL Server c) SQL d)Server Daemon Program
32. The structure representing the organizational view of entire database is known as ___________ in MySQL
database.
a) Schema b) View c) Instance d) Table
33. What does PHP stand for?
a) Personal Home Page b) Hypertext Preprocessor
c) Pretext Hypertext Processor d) Pre-processor Home Page
34. What does PHP files have a default file extension?
a) .html b) .xml c) .php d) .ph
35. A PHP script should start with ___________
a) <?php b) <php c) <php? D) <:?
36. How many data types does PHP support?
a) 18 b) 28 c) 8 d) 38
37. Every variable name in PHP must begin with a ___________ symbol
a) # b) / c) $ d) <
38. ___________ in PHP are case – sensitive.
a) variable names b) keywords c) variable name and keywords d) None of the above
39. The assignment operator is ___________
a) = b) = = c) = = = d) ! =
40. ___________ operators perform an action to compare two values.
a) arithmetic b) comparison c) increment d) logical

https://csknowledgeopener.com 2 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

41. Which operator is called “identical”?


a) == b) = = c) = = = d) < >
42. ___________ is a data type which contains decimal numbers.
a) Integer b) Float c) Boolean d) NULL
43. A ___________ is a block of code that performs a specific task.
a) parameter b) function c) class d) label
44. Pre-defined function are also called___________
a) user-defined functions b) recursive functions
c) built-in functions d) lambda functions
45. Which one of the following is the right way of defining a functions in PHP
a) function functionname() { //code to be executed } b) functions (){}
c) def myFunction (): d) None of the above
46. A user – defined function in PHP starts with the keyword___________
a) function b) def c) defined d) funct
47. Which of the following is a correct way to call a function in PHP?
a) functionName(); b) call functionName;
c) execute functionName; d) run functionName();
48. What is an array in PHP?
a) An array is a special data type b) It can hold many values under a single variable name.
c) An array element can be any type of data. d) All of the above
49. How many types of arrays are there in PHP?
a) 2 b) 3 c) 4 d) 5
50. What is the index of the first element in an indexed array in PHP?
a) 0 b) 1 c) 2 d) 3
51. What is the index of the third element in an indexed array in PHP with 5 elements?
a) 2 b) 3 c) 4 d) 5
52. How do you create an indexed array in PHP?
a) By enclosing a comma-separated list of values in square brackets
b) By using the array () function
c) By enclosing a comma-separated list of values in curly braces
d) Both A and B
53. How do you access the elements of an indexed array in PHP?
a) By using the array index in square brackets
b) By using the array key in square brackets
c) By using the array index in curly braces
d) By using the array key in curly braces
54. Which of the following is NOT a type of conditional statement in PHP?
a) if b) if… else c) if… elseif … else d) while
55. What types of statements is the if…else statement?
a) Conditional statement b) Looping c) Input statement d) Output statement
56. What is the simplest conditional statement in PHP?
a) if-else statement b) if statement c) switch statement d) if-elseif-else statement
57. How does the if statement work in PHP?
a) A block of code is executed if a certain condition is true
b) A block of code is executed if a certain condition is false
c) A block of code is executed if multiple condition are true
d) A block of code is executed if multiple condition are false

https://csknowledgeopener.com 3 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

58. What happens if the condition in an “if” statement is false?


a) The code inside the curly braces is executed
b) The code inside the curly braces is skipped
c) The program terminates
d) None of the above
59. What is the syntax for an if-else statement in PHP?
a) if(condition) { // True-block; }
b) if(condition) { // True-block; } else { //False-block; }
c) if-else(condition) { // True-block; } else { // False-block;}
d) if-elseif(condition) { // True-block; } else { // False-block;}
60. Which of the following is used to specify multiple conditions in an if…elseif…else statement?
a) AND b) OR c) case d) elseif
61. Which of the following is used to specify multiple conditions in a switch statement?
a) AND b) OR c) case d) if
62. What happens if none of the case values match the expression in a switch statement?
a) The default case block is executed
b) The program terminates
c) The nearest case block is executed
d) The first case block is executed
63. Which of the following is used to terminate the switch statement?
a) return b) continue c) goto d) break
64. Which of the following is NOT a type of loop statement in PHP?
a) for b) if…else c) while d) do…while
65. What type of loop is “for loop” in PHP?
a) Entry-Check Loop b) Exit – Check Loop
c) Counter Loop d) Iteration Loop
66. What is the syntax for for loop in PHP?
a) for(initialization; condition ; increment) {// code}
b) foreach(initialization; condition ; decrement) {// code}
c) while( condition)
d) do{…}while(condition)
67. What are the three parts of the for loop syntax in PHP?
a) initialization, condition, increment
b) initialization, code block, increment
c) code block, condition, increment
d) condition, initialization, code block
68. When is the ‘initialization’ part of a for loop executed?
a) Before each iteration b) After each iteration
c) Only once at the beginning of the loop d) Only once at the end of the loop
69. What is the purpose of the ‘increment’ part of a for loop?
a) To initialize variables b) To update variables
c) To check the condition d) To execute the code block
70. What type of loop is “while loop” in PHP?
a) Entry-Check Loop b) Exit – Check Loop
c) Counter Loop d) Iteration Loop
71. What type of loop is “do…while loop” in PHP?
a) Entry-Check Loop b) Exit – Check Loop
c) Counter Loop d) Iteration Loop
72. Which looping structure should be used to iterate over elements of an array in PHP?
a) for loop b) while loop c) do… while loop d) foreach loop

https://csknowledgeopener.com 4 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

73. What is the output of the following code?


$array = array (1, 2, 3, 4, 5);
foreach ($array as $value)
{
echo $value;
}
a) 1 2 3 4 5 b) 5 4 3 2 1 c) 1 1 1 1 1 d) None of the above
74. What are HTML forms used for?
a) To collect input from users b) To create server-side programming language
c) To create a database d) To send emails
75. Which of the following is NOT a form control available in HTML forms?
a) Text inputs b) Buttons c) Checkboxes d) Cropping Tool
76. Which tag is used to create an HTML form?
a) form b) input c) text area d) select
77. What form control allows the user to select multiple values?
a) text inputs b) buttons c) checkboxes d) radio buttons
78. What form control allows the user to select only one value at a time?
a) text inputs b) buttons c) checkboxes d) radio buttons
79. What is the purpose of validation in PHP?
a) To check the input data submitted by the user from the client machine
b) To display data to users
c) To store data on the server
d) To send data to the client
80. How many types of validation are available in PHP?
a) One b) Two c) Three d) Four
81. Which PHP function can be used to open a file?
a) fopen() b) fread() c) fclose() d) fwrite()
82. What PHP function can be used to read a file?
a) fopen() b) fread() c) fclose() d) fwrite()
83. What PHP function can be used to close a file?
a) fopen() b) fread() c) fclose() d) fwrite() E
84. Which is the correct function to execute the SQL queries in PHP?
a) mysqli_query(“Connection Object”,”SQL Query”)
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
85. Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Connection Object”);
b) close(“Connection Object”);
c) mysql_close(“Connection Object”);
d) mysqli_close(“Database Object”);
86. Which is the correct function to establish Connection in PHP ?
a) mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
b) connect(“Server Name “,”User Name”,”Password”,”DB Name”);
c) mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
d) mysqli_connect (“Database Object”);

https://csknowledgeopener.com 5 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

87. Which is the not a correct MySQL Function in PHP ?


a) Mysqli_connect() Function b) Mysqli_close() Function
c) mysqli_select_data() Function d) mysqli_affected_rows() Function
88. How many parameter are required for MYSQLi connect function in PHP ?
a) 2 b) 3 c) 4 d) 5

89. How many parameter are required for MYSQLi query function in PHP ?
a) 2 b) 3 c) 4 d) 5
90. How many parameter are required for MYSQLi Close function in PHP ?
a) 1 b) 2 c) 3 d) 5
91. Which version of PHP supports MySQLi fuctions ?
a) Version 2.0 b) Version 3.0 c) Version 4.0 d) Version 5.0
92. A set of computers connecting together is called as ----------
a) Network b) Server c) Hub d) Node
93. Many discussions in an online forum leads to personal attacks and is called
a) Hackers b) Virus c) Online war d) Flame war
94. Wi-Fi is short name for
a) Wireless Fidelity b) Wired fidelity c) Wired fiber optic d) Wireless fiber optic
95. Which among them was challenging to the business people on computer networking?
a) Hacking b) Viruses c) Both a & b d) none of this above
96. Which one of the following is not the social media
a) Gmail b) Facebook c) twitter d) Linkedin
97. In mobile network, land areas for network coverage was distributed as
a) Firmware b) cells c) Range d) Service
98. Which one of the following are harmful to computer?
a) Bloggers b) Browser c) Hackers d) twitter
99. Which of the following system securely share business’s information with suppliers, vendors, partners
and customer.
a) Extranet b) Intranet c) arpanet d) arcnet
100. Match the following and choose the correct answer
i. HTTP -The core protocol of the World Wide Web.
ii. FTP - enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS - Refer to other host computers by using names rather than numbers.
a) i, ii, iii, iv b) ii, iii, iv, i c) iii, iv, i, ii d) iv, iii, ii, i
101. Communication over ------------------is be made up of voice, data, images and text messages.
a) Social media b) mobile network c) whatsapp d) software
102. Wi-Fi stands for---------------------
a) Wireless Fidelity b) wired fidelity c) wired optic fibre d) wireless optic fibre
103. A TCP/IP network with access restricted to members of an organization
a) LAN b) MAN c) WAN d) Intranet
104. RFID stands for --------------
a) Radio Free identification b) real Frequency identity
c) Radio Frequency indicators d) Radio Frequency Identification.
105. It guarantees the sending of data is successful and which checks error on operation at OSI layer is-------
a) Application layer b) Network layer c) Transport Layer d) Physical layer
106. Which one of the following will secure data on transmissions?
a) HTTPS b) HTTP c) FTP d) SMTP
107. ----------- provides e-mail service
a) DNS b) TCP c) FTP d) SMTP

https://csknowledgeopener.com 6 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

108. ------------- refer to other host computers by using names rather than numbers.
a) DNS b) TCP c) FTP d) SMTP
109. Which of the following is used to maintain all the directory of domain names?
a) Domain Name System b) Domain name space
c) Name space d) IP address
110. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Dotted-decimal c) Hexadecimal d) a and b
111. How many bits are used in the IPv6 addresses?
a) 32 b) 64 c) 128 d) 16
112. Expansion of URL is
a) Uniform Resource Location b) Universal Resource Location
c) Uniform Resource Locator d) Universal Resource Locator
113. How many types are available in Relative URL?
a) 2 b) 3 c) 4 d) 5
114. Maximum characters used in the label of a node?
a) 255 b) 128 c) 63 d) 32
115. In domain name, sequence of labels are separated by
a) ; b) .(dot) c) : d) NULL
116. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d)Name servers
117. Which is the contiguous area up to which the server has access?
a) Zone b) Domain c) Resolver d) Name servers
118. Root name servers are maintained by
a) IANA b) ICANN c) WHOIS d) DNS
119. ARPANET stands for
a) American Research Project Agency Network
b) Advanced Research Project AreaNetwork
c) Advanced Research ProjectAgency Network
d) American Research Programs And Network
120. WWW was invented by
a) Tim Berners Lee b) Charles Babbage c) Blaise Pascal d) John Napier
121. Which cable is used in cable TV?
a) UTP cable b) Fibre optics c) Coaxial cable d) USB cable
122. Expansion of UTP is
a) Uninterrupted Twisted Pair b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair d) Universal Twisted Protocol
123. Which medium is used in the optical fibre cables to transmit data?
a) Microwave b) infrared c) light d) sound
124. Which of the following is a small peripheral device with a sim slot to connect the computers to Internet?
a) USB b) Dongles c) Memory card d) Mobiles
125. Which connector is used in the Ethernet cables?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
126. Which of the following connector is called as champ connector?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
127. How many pins are used in RJ45 cables?
a) 8 b) 6 c) 50 d) 25
128. Which wiring standard is used for connecting two computers directly?
a) straight Through wiring b) Cross Over wiring
c) Rollover wiring d) None

https://csknowledgeopener.com 7 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

129. If the source code of a software is freely accessible by the public, then it is known as
a) Freeware b) Firmware c) Open source d) Public source
130. Which of the following is a software program that replicates the functioning of a computer network?
a) Network software b) Network simulation c) Network testing d) Network calculator
131. Which of the following can document every incident that happened in the simulation and are used for
examination?
a) Net Exam b) Network hardware c) Trace file d) Net document
132. Which is an example of network simulator?
a) simulator b) TCL c) Ns2 d) C++
133. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) UNIX & a. C++ c) C++ & OTcl d) C++ & NS2
134. Which of the following is not a network simulation software?
a) Ns2 b) OPNET c) SSFNet d) C++
135. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
136. Open NMS was released in…………………
a) 1999 b) 2000 c) 2003 d) 2004
137. A company can be called E-Business if
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.
d) it has many employees.
138. Which of the following is not a tangible goods?
a) Mobile b) Mobile Apps c) Medicine d) Flower bouquet
139. SME stands for
a) Small and medium sized enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Short messaging enterprises
140. The dotcom phenomenon deals with________
a) Textile industries b) Mobile phone companies
c) Internet based companies d) All the above
141. Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 – 2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
142. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false d) (A) is false and (R) is true
143. Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
144. G2G systems are classified into
a) Internal facing and external facing b) Internet facing and Extranet facing
c) Internal flag and external flag d) Internet flag and Extranet flag
145. ____ host the e-books on their websites.
a) Bulk-buying sites b) Community sites c) Digital publishing sites d) Licensing sites

https://csknowledgeopener.com 8 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

146. Which of the following is not a characteristics of E-Commerce


a) Products cannot be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.
147. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Micro and Nano
c) Maximum and Minimum d) Maximum and Macro
148.____refers to a payment made from one bank account to another bank account using electronic methods.
a) Electronic payment b) Direct payment
c) Indirect payment d) None of the above
149. Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
150. Which of the following is correctly matched
a) Credit Cards - pay before b) Debit Cards - pay now
c) Stored Value Card - pay later d) Smart card – pay anytime
151. ECS stands for
a) Electronic Clearing Services b) Electronic Cloning Services
c) Electronic Clearing Station d) Electronic Cloning Station
152. Which of the following is a online payment system for small payments?
a) Card based payment b) Micro electronic payment
c) Macro electronic payment d) Credit card payment
153. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA b) VPA does not includes numbers
c) VPA is a unique ID d) Multiple bank accounts cannot have single VPA
154. Pick the odd one in the credit card transaction
a) card holder b) merchant c) marketing manager d) acquirer
155. Which of the following is true about debit card
i. debit cards cannot be used in ATMs
ii. debit cards cannot be used in online transactions
iii. debit cards do not need bank accounts
iv. debit cards and credit cards are identical in physical properties
a) i, ii, iii b) ii, iii, iv c) iii alone d) iv alone
156. Match the following
List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) MII Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit
A1 A2 A3 A4
a) B4 B3 B2 B1 b) B2 B1 B3 B4 c) B2 B3 B4 B1 d) B2 B4 B3 B1
157. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Friendly fraud b) Clean fraud c) Triangulation fraud d) Cyber squatting
158. Which of the following is not a security element involved in E-Commerce?
a) Authenticity b) Confidentiality c) Fishing d) Privacy

https://csknowledgeopener.com 9 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.

158. Asymmetric encryption use_________keys for encryption and decryption


a) Same b) Different c) Positive d) Negative
159. The security authentication technology does not includes ______
i) Digital Signatures ii) Digital Currency
iii) Digital Image iv) Digital Certificates
a) i & iv b) ii & iii c) i, ii & iii d) all the above
160. PGP stands for
a) Pretty Good Privacy b) Pretty Good Person
c) Private Good Privacy d) Private Good Person
161. _____ protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET) b) Credit Card Verification
c) Symmetric Key Encryption d) Public Key Encryption
162. Secure Electronic Transaction (SET) was developed in
a) 1999 b) 1996 c) 1969 d) 1997
163. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) http:// c) htmls:// d) https://
164. ________ is the process of converting plain text into meaningless cipher text
a) Encryption b) Decryption c) Digital certificate d) Digital signature
165.Which of the following is true about Ransomware
a) Ransomware is not a subset of malware b) Ransomware deletes the file instantly
c) Typopiracy is a form of ransomware d) Hackers demand ransom from the victim
166. EDI stands for
a) Electronic Details Information b) Electronic Data Information
c) Electronic Data Interchange d) Electronic Details Interchange
167. Which of the following is an internationally recognized standard format for EDI?
a) TSLFACT b) SETFACT c) FTPFACT d) EDIFACT
168. Which is the first industry-specific EDI standard?
a) TDCC b) VISA c) Master d) ANSI
169. Which of the following is a type of EDI?
a) Direct EDI b) Indirect EDI c) Collective EDI d) Unique EDI
170. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert c) Pascal d) None of the above

PREPARED BY

J. ILAKKIA M.Sc., B.Ed., M.Phil.


Computer Instructor Grade-I
Govt. Hr. Sec. School
V.Pagandai, Villupuram 605 501.

https://csknowledgeopener.com 10 http://www.youtube.com/c/csknowledgeopener

You might also like