Xii - Ca em One Mark 2024-2025
Xii - Ca em One Mark 2024-2025
https://csknowledgeopener.com 1 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
https://csknowledgeopener.com 2 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
https://csknowledgeopener.com 3 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
https://csknowledgeopener.com 4 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
https://csknowledgeopener.com 5 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
89. How many parameter are required for MYSQLi query function in PHP ?
a) 2 b) 3 c) 4 d) 5
90. How many parameter are required for MYSQLi Close function in PHP ?
a) 1 b) 2 c) 3 d) 5
91. Which version of PHP supports MySQLi fuctions ?
a) Version 2.0 b) Version 3.0 c) Version 4.0 d) Version 5.0
92. A set of computers connecting together is called as ----------
a) Network b) Server c) Hub d) Node
93. Many discussions in an online forum leads to personal attacks and is called
a) Hackers b) Virus c) Online war d) Flame war
94. Wi-Fi is short name for
a) Wireless Fidelity b) Wired fidelity c) Wired fiber optic d) Wireless fiber optic
95. Which among them was challenging to the business people on computer networking?
a) Hacking b) Viruses c) Both a & b d) none of this above
96. Which one of the following is not the social media
a) Gmail b) Facebook c) twitter d) Linkedin
97. In mobile network, land areas for network coverage was distributed as
a) Firmware b) cells c) Range d) Service
98. Which one of the following are harmful to computer?
a) Bloggers b) Browser c) Hackers d) twitter
99. Which of the following system securely share business’s information with suppliers, vendors, partners
and customer.
a) Extranet b) Intranet c) arpanet d) arcnet
100. Match the following and choose the correct answer
i. HTTP -The core protocol of the World Wide Web.
ii. FTP - enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS - Refer to other host computers by using names rather than numbers.
a) i, ii, iii, iv b) ii, iii, iv, i c) iii, iv, i, ii d) iv, iii, ii, i
101. Communication over ------------------is be made up of voice, data, images and text messages.
a) Social media b) mobile network c) whatsapp d) software
102. Wi-Fi stands for---------------------
a) Wireless Fidelity b) wired fidelity c) wired optic fibre d) wireless optic fibre
103. A TCP/IP network with access restricted to members of an organization
a) LAN b) MAN c) WAN d) Intranet
104. RFID stands for --------------
a) Radio Free identification b) real Frequency identity
c) Radio Frequency indicators d) Radio Frequency Identification.
105. It guarantees the sending of data is successful and which checks error on operation at OSI layer is-------
a) Application layer b) Network layer c) Transport Layer d) Physical layer
106. Which one of the following will secure data on transmissions?
a) HTTPS b) HTTP c) FTP d) SMTP
107. ----------- provides e-mail service
a) DNS b) TCP c) FTP d) SMTP
https://csknowledgeopener.com 6 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
108. ------------- refer to other host computers by using names rather than numbers.
a) DNS b) TCP c) FTP d) SMTP
109. Which of the following is used to maintain all the directory of domain names?
a) Domain Name System b) Domain name space
c) Name space d) IP address
110. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Dotted-decimal c) Hexadecimal d) a and b
111. How many bits are used in the IPv6 addresses?
a) 32 b) 64 c) 128 d) 16
112. Expansion of URL is
a) Uniform Resource Location b) Universal Resource Location
c) Uniform Resource Locator d) Universal Resource Locator
113. How many types are available in Relative URL?
a) 2 b) 3 c) 4 d) 5
114. Maximum characters used in the label of a node?
a) 255 b) 128 c) 63 d) 32
115. In domain name, sequence of labels are separated by
a) ; b) .(dot) c) : d) NULL
116. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d)Name servers
117. Which is the contiguous area up to which the server has access?
a) Zone b) Domain c) Resolver d) Name servers
118. Root name servers are maintained by
a) IANA b) ICANN c) WHOIS d) DNS
119. ARPANET stands for
a) American Research Project Agency Network
b) Advanced Research Project AreaNetwork
c) Advanced Research ProjectAgency Network
d) American Research Programs And Network
120. WWW was invented by
a) Tim Berners Lee b) Charles Babbage c) Blaise Pascal d) John Napier
121. Which cable is used in cable TV?
a) UTP cable b) Fibre optics c) Coaxial cable d) USB cable
122. Expansion of UTP is
a) Uninterrupted Twisted Pair b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair d) Universal Twisted Protocol
123. Which medium is used in the optical fibre cables to transmit data?
a) Microwave b) infrared c) light d) sound
124. Which of the following is a small peripheral device with a sim slot to connect the computers to Internet?
a) USB b) Dongles c) Memory card d) Mobiles
125. Which connector is used in the Ethernet cables?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
126. Which of the following connector is called as champ connector?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
127. How many pins are used in RJ45 cables?
a) 8 b) 6 c) 50 d) 25
128. Which wiring standard is used for connecting two computers directly?
a) straight Through wiring b) Cross Over wiring
c) Rollover wiring d) None
https://csknowledgeopener.com 7 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
129. If the source code of a software is freely accessible by the public, then it is known as
a) Freeware b) Firmware c) Open source d) Public source
130. Which of the following is a software program that replicates the functioning of a computer network?
a) Network software b) Network simulation c) Network testing d) Network calculator
131. Which of the following can document every incident that happened in the simulation and are used for
examination?
a) Net Exam b) Network hardware c) Trace file d) Net document
132. Which is an example of network simulator?
a) simulator b) TCL c) Ns2 d) C++
133. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) UNIX & a. C++ c) C++ & OTcl d) C++ & NS2
134. Which of the following is not a network simulation software?
a) Ns2 b) OPNET c) SSFNet d) C++
135. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
136. Open NMS was released in…………………
a) 1999 b) 2000 c) 2003 d) 2004
137. A company can be called E-Business if
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.
d) it has many employees.
138. Which of the following is not a tangible goods?
a) Mobile b) Mobile Apps c) Medicine d) Flower bouquet
139. SME stands for
a) Small and medium sized enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Short messaging enterprises
140. The dotcom phenomenon deals with________
a) Textile industries b) Mobile phone companies
c) Internet based companies d) All the above
141. Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 – 2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
142. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false d) (A) is false and (R) is true
143. Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
144. G2G systems are classified into
a) Internal facing and external facing b) Internet facing and Extranet facing
c) Internal flag and external flag d) Internet flag and Extranet flag
145. ____ host the e-books on their websites.
a) Bulk-buying sites b) Community sites c) Digital publishing sites d) Licensing sites
https://csknowledgeopener.com 8 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
https://csknowledgeopener.com 9 http://www.youtube.com/c/csknowledgeopener
J. ILAKKIA M.Sc., B.Ed., M.Phil. Computer Instructor Grade-I, GHSS – V.Pagandai, Villupuram.
PREPARED BY
https://csknowledgeopener.com 10 http://www.youtube.com/c/csknowledgeopener