0% found this document useful (0 votes)
89 views21 pages

12 Csapp

The document provides sample questions from chapters 1-4 of a textbook on computer applications for class 12. It includes one mark multiple choice questions related to topics like multimedia, desktop publishing, databases, and PHP. The questions are intended to help students prepare for their exams by starting their preparation now.

Uploaded by

sdnsdf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views21 pages

12 Csapp

The document provides sample questions from chapters 1-4 of a textbook on computer applications for class 12. It includes one mark multiple choice questions related to topics like multimedia, desktop publishing, databases, and PHP. The questions are intended to help students prepare for their exams by starting their preparation now.

Uploaded by

sdnsdf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Namma Kalvi www.nammakalvi.

in

DO IT NOW!!! SOMETIMES LATER BECOMES NEVER!!!

START YOUR PREPARATION NOW AND SUCCEED IN YOUR EXAMS!

Textual one mark


MATERIALS
FOR
XII- COMPUTER APPLICATION

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.

COMPUTER APPLICATION
CHAPTER : 1
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. ________ refers to any type of application that involves more than one type of media such as text,
graphics video animation and sound
a) an executable file b) desktop publishing c) multimedia d) hypertext
2. one of the disadvantages of the multimedia is its __
a) cost b) adaptability c) usability d) relativity
3. expand JPEG
a) joint photo experts gross b) joint photographic experts group
c) joint processor experts group d) joint photographic expression group
4. you need hardware, software and __ to make multimedia
a) network b) compact disk drive c) good idea d) programming knowledge
5. match the following by choosing the right one
1. Text – TGA
2. Image – MIDI
3. Sound – MPEG
4. Video – RTF
a. 1, 2, 3, 4 b. 2, 3, 4, 1 c. 4, 1, 2, 3 d. 3, 4, 1, 2
6. Find the odd one on the following which is not an image format
a) TIFF b) BMP c) RTF d) JPEG
7. ___ is the process displaying still images they give continuous movement
a) Text formats b) Sound c) MP3 d) Animation
8. The live telecasting of real time program through Internet is known as ____
a) web casting b) web hosting c) data manipulation d) none of the above
9. GIF use _______ color look up table
a) 8 bit b) 8 KB c) 8 MB d) 8 GB
10. RTF file format was introduced by ______
a) TCS b) Microsoft c) Apple d) IBM
CHAPTER : 2
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. DTP stands for ______________
(a) Desktop Publishing (b) Desktop Publication
(c) Doctor To Patient (d) Desktop Printer
2. ____________ is a DTP software.
(a) Lotus 1-2-3 (b) PageMaker (c) Maya (d) Flash
3. Which menu contains the New option?
(a) File menu (b) Edit menu (c) Layout menu (d) Type menu
4. In PageMaker Window, the area outside of the dark border is referred to as _________.
(a) page (b) pasteboard (c) blackboard (d) dashboard
Namma Kalvi www.nammakalvi.in

5. Shortcut to close a document in PageMaker is ______________


(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + W

6. A __________ tool is used for magnifying the particular portion of the area.
(a) Text tool (b) Line tool (c) Zoom tool (d) Hand tool
7. _________ tool is used for drawing boxes.
(a) Line (b) Ellipse (c) Rectangle (d) Text
8. Place option is present in _____________ menu.
(a) File (b) Edit (c) Layout (d) Window
9. To select an entire document using the keyboard, press ___________
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + D
10. Character formatting consists of which of the following text properties?
(a) Bold (b) Italic (c) Underline (d) All of these
11. Which tool lets you edit text?
(a) Text tool (b) Type tool (c) Crop tool (d) Hand tool
12. Shortcut to print a document in Pagemaker is ___________
(a) Ctrl + A (b) Ctrl + P (c) Ctrl + C (d) Ctrl + V
13. Adobe PageMaker is a Pagelayout software.
14. Title Bar is the topmost part of the PageMaker window.
15. Scrolling is the process of moving up and down or left and right through the document window.
16. Ellipse tool is used to draw a circle.
17. The Insert pages option is available on clicking the Layout menu.
18. Match the following.
Cut - (i) Ctrl + Z iii  Ctrl+X
Copy - (ii) Ctrl + V v  Ctrl+C
Paste - (iii) Ctrl + X ii  Ctrl+V
Undo - (v) Ctrl + C i  Ctrl+Z
19 Choose the odd man out.
i. Adobe PageMaker, QuarkXPress, Adobe InDesign, Audacity
ii. File, Edit, Layout, Type, Zip
iii. Pointer Tool, Line tool, Hide Tool, Hand Tool
iv. Bold, Italic, Portrait, Underline
20. Choose the correct statement.
i. (a) Text can be selected using mouse only.
(b) Text can be selected using mouse or the keyboard.
ii. (a) DTP is an abbreviation for Desktop publishing.
(b) DTP is an abbreviation for Desktop publication.
21 Choose the correct pair
(a) Edit and Cut (b) Edit and New (c) Undo and Copy (d) Undo and Redo
Namma Kalvi www.nammakalvi.in

CHAPTER : 3
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. Which language is used to request information from a Database?


a) Relational b) Structural c) Query d) Compiler

2. The ---------- diagram gives a logical structure of the database graphically?


a) Entity-Relationship b) Entity c) Architectural Representation d) Database
3. An entity set that does not have enough attributes to form primary key is known as
a) Strong entity set b) Weak entity set c) Identity set d) Owner set
4. ---------- Command is used to delete a database.
a) Delete database database_name b) Delete database_name
c) drop database database_name d) drop database_name
5. Which type of below DBMS is MySQL?
a) Object Oriented b) Hierarchical c) Relational d) Network
6. MySQL is freely available and is open source.
a) True b) False
7. ---------- represents a “tuple” in a relational database?
a) Table b) Row c) Column d) Object
8. Communication is established with MySQL using
a) SQL b) Network calls c) Java d) API’s
9. Which is the MySQL instance responsible for data processing?
a) MySQL Client b) MySQL Server c) SQL d) Server Daemon Program
10. The structure representing the organizational view of entire database is known as -------- in
MySQL database.
a) Schema b) View c) Instance d) Table
CHAPTER : 4
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. What does PHP stand for?
a) Personal Home Page b) Hypertext Preprocessor
c) Pretext Hypertext Processor d) Pre-processor Home Page
2. What does PHP files have a default file extension?
a) .html b) .xml c) .php d) .ph
3. A PHP script should start with ___ and end with ___:
a) <php> b) < ? php ?> c) < ? ?> d) <?php ?>
4. Which of the following must be installed on your computer so as to run PHP script?
a) Adobe b) windows c) Apache d) IIS
Namma Kalvi www.nammakalvi.in

5. We can use ___ to comment a single line?


i) /? ii) // iii) # iv) /* */
a) Only (ii) b) (i), (iii) and (iv) c) (ii), (iii) and (iv) d) Both (ii) and (iv)

6. Which of the following PHP statement/statements will store 41 in variable num?


(i) int $num = 41 (ii) int num = 41; (iii) $num = 41; (iv) 111 = $num;
a) Both (i) and (ii) b) All of the mentioned. c) Only (iii) d) Only (i)
7. What will be the output of the following PHP code?
<?php
$num = 1;
$num1 = 2;
print $num."+".$num1;
?>
a) 3 b) 1+2 c) 1.+.2 d) Error
8. Which of the following PHP statements will output Hello World on the screen?
<?php <?php <?php
printf("Hello World"); printf("Hello World"); printf("Hello World");
?> ?> ?>
a) echo (“Hello World”); b) print (“Hello World”);
c) printf (“Hello World”); d) sprintf (“Hello World”);
9. Which statement will output $x on the screen?
<?php
echo "\$x";
?>
a) echo “\$x”; b) echo “$$x”; c) echo “/$x”; d) echo “$x;
10. Which of the below symbols is a newline character?
a) \r b) \n c)/n d)/r

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

CHAPTER : 5
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. Which one of the following is the right way of defining a function in PHP?
a) function { function body }
b) data type functionName(parameters) { function body }
c)functionName(parameters) { function body }
d) function fumctionName(parameters) { function body }
2. A function in PHP which starts with __ (double underscore) is know as..
a) Magic Function b) Inbuilt Function
c) Default Function d) User Defined Function
3. PHP’s numerically indexed array begin with position ___________
a) 1 b) 2 c) 0 d) -1
4. Which of the following are correct ways of creating an array?
i) state[0] = “Tamilnadu”;
ii) $state[] = array(“Tamilnadu”);
iii) $state[0] = “Tamilnadu”;
iv) $state = array(“Tamilnadu”);

<?php
$state = array("Tamilnadu","Delhi","Kerala");
echo(array_search("Kerala", $state));
?>
a) iii) and iv) b) ii) and iii) c) Only iv) d) ii), iii) and iv)
5. What will be the output of the following PHP code?
<?php
$a=array(“A”,”Cat”,”Dog”,”A”,”Dog”);
$b=array(“A”,”A”,”Cat”,”A”,”Tiger”);
$c=array_combine($a,$b);
print_r(array_count_values($c));
?>
a) Array ( [A] => 5 [Cat] => 2 [Dog] => 2 [Tiger] => 1 )
b) Array ( [A] => 2 [Cat] => 2 [Dog] => 1 [Tiger] => 1 )
c) Array ( [A] => 6 [Cat] => 1 [Dog] => 2 [Tiger] => 1 )
d) Array ( [A] => 2 [Cat] => 1 [Dog] => 4 [Tiger] => 1 )
Namma Kalvi www.nammakalvi.in

6. For finding nonempty elements in array we use

a) is_array ( ) function b) sizeof ( ) function


c) array_count ( ) function d) count ( ) function
7. Indices of arrays can be either strings or numbers and they are denoted as
a) $my_array {4} b) $my_array [4] c) $my_array| 4 | d) None of them
8. PHP arrays are also called as
a) Vector arrays b) Perl arrays c) Hashes d) All of them
9. As compared to associative arrays vector arrays are much
a) Faster b) Slower c) Stable d) None of them
10. What functions count elements in
an array?
a) count b) Sizeof c) Array_Count d) Count_array

CHAPTER : 6
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. What will be the output of the
following PHP code?
<?php
$x;
if ($x)
print “hi” ;
else
print “how are u”;
?>
a) how are u b) hi c) error d) no output
2. What will be the output of the
following PHP code ?
<?php
$x = 0;
if ($x++)
print “hi”;
else
print “how are u”;
?>
a) hi b) no output c) error d) how are u
3. What will be the output of the
following PHP code ?
<?php
$x;
if ($x == 0)
print “hi” ;
Namma Kalvi www.nammakalvi.in

else
print “how are u”;
print “hello”
?>
a) how are uhello b) hihello c) hi d) no output
4. Statement which is used to make choice between two options and only option is to be performed is
written as
a. if statement b. if else statement c. then else statement d. else one statement
5. What will be the output of the following PHP code ?
<?php
$a = “”;
if ($a)
print “all”;
if
else
print “some”;
?>

Parse error: syntax error, unexpected 'else' (T_ELSE), expecting '(' in C:\xampp\htdocs\php\sixfive.php on line 6

a) all b) some c) error d) no output


6. What will be the output of the following PHP code ?
<?php
$a = “”;
if ($a)
print “all”;
if
else
print “some”;
?>
Parse error: syntax error, unexpected 'else' (T_ELSE), expecting '(' in C:\xampp\htdocs\php\sixfive.php on line 6

a) all b) some c) error d) no output


7. What will be the output of the following PHP code ?
<?php
$x = 10;
$y = 20;
if ($x > $y + $y != 3)
print “hi” ;
else
print “how are u”;
?>
a) how are u b) hi c) error d) no output

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

8. What will be the output of the following PHP code ?


<?php
$x = 10;
$y = 20;
if ($x > $y && 1||1)
print “hi” ;
else
print “how are u”;
?>
a) how are u b) hi c) error d) no output
9. What will be the output of the following PHP code ?
<?php
if (-100)
print “hi” ;
else
print “how are u”;
?>
a) how are u b) hi c) error d) no output

CHAPTER : 7
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. Most complicated looping structure is
a) While b) Do While c) For d) None of them
2. Loops that iterate for fixed number of times is called
a) Unbounded loops b) Bounded loops c) While loops d) For loops
3. Which loop evaluates condition expression as Boolean, if it is true, it executes statements and when
it is false it will terminate?
a) For loop b) For each loop c) While loop d) All of them
4. Which loop evaluates condition expression as Boolean, if it is true, it executes statements and when
it is false it will terminate?
a) For loop b) For each loop c) While loop d) All of them
5. What will be displayed in a browser when the following PHP code is executed:
<?php
for ($counter = 20; $counter < 10;
$counter++){
echo “Welcome to Tamilnadu “;
}
echo “Counter is: $counter”;
?>
a) Welcome to Tamilnadu
b) Counter is: 20
c) Welcome to Tamilnadu Counteris: 22
d) Welcome to Tamilnadu Welcometo Tamilnadu Counter is: 22
Namma Kalvi www.nammakalvi.in

6. What will be displayed in a browser when the following PHP code is executed:
<?php
for ($counter = 10; $counter < 10;
$counter = $counter + 5){
echo “Hello”;
}
?>
a) Hello Hello Hello Hello Hello b) Hello Hello Hello c) Hello d) None of the above
7. PHP supports four types of looping techniques;
a) for loop b) while loop c) foreach loop d) all the above
8. Consider the following code
<? php
$count=12;
do{
printf(“%d squared=%d<br/>”,
$count, pow($count,2));
} while($count<4);
?>
What will be the output of the code.
a) 12 squared 141 b) 12 squared=141 c) “12 squared=141” d) Execution error

9. What will be the output of the


following PHP code ?
<?php
for ($x = 1; $x < 10;++$x)
{
print “*\t”;
}
?>
a) ********** b) ********* c) *********** d) Infinite loop

10. What will be the output of the


following PHP code ?
<?php
for ($x = -1; $x < 10;--$x)
{
print $x;
}
?>
a) 123456713910412 b) 123456713910 c) 1234567139104 d) Infinite loop

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

CHAPTER : 8
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. When you use the $_GET variable to collect data, the data is visible to..
a) none b) only you c) everyone d) selected few
2. Which one of the following should not be used while sending passwords or other sensitive
information?
a) GET b) POST c) REQUEST d) NEXT
3. Which directive determines whether PHP scripts on the server can accept file uploads?
a) file_uploads b) file_upload c) file_input d) file_intake
4. In HTML form <input type=”text”> is used for
a) One line text b) Block of text c) One paragraph d) None
5. HTML classes that is already defined and allow us to apply styles on it are called as
a) Pseudo classes b) Css classes c) Javascript classes d) None
6. If you would like to read a file character by character which function do you use?
a) fopen ( ) b) fread ( ) c) fgetc ( ) d) file ( )
7. PHP is a ______ typed language.
a) User b) Loosely c) Server d) System
8. What does fopen() function do in PHP?
a) It used to open files in PHP b) It used to open Remote Server
c) It used to open folders in PHP d) It used to open Remote Computer
9. How PHP files can be accessed?
a) Through Web Browser b) Through HTML files
c) Through Web Server d) All of Above

10. Which of the following functions reads the entire contents of a file?
a) fgets() b) file_get_contents() c) fread() d) readfile()

CHAPTER : 9
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. Which one of the following statements instantiates the mysqli class?


a) mysqli = new mysqli() b) $mysqli = new mysqli()
c) $mysqli->new.mysqli() d) mysqli->new.mysqli()
2. which one is correct way, we can retrieve the data in the result set of MySQL using PHP?
a) mysql_fetch_row. b) mysql_fetch_array
c) mysql_fetch_object d) All the above
Namma Kalvi www.nammakalvi.in

3. How Can we Create a Database Using PHP and MySQL?


a) mysqli_create_db(“Database Name”) b) mysqli_create_db(“Data”)
c) create_db(“Database Name”) d) create_db(“Data”)
4. Which is the correct function to execute the SQL queries in PHP ?
a) mysqli_query(“Connection Object”,”SQL Query”)
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
5. Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Connection Object”); b) close(“Connection Object”);
c) mysql_close(“Connection Object”); d) mysqli_close(“Database Object”);
6. Which is the correct function to establish Connection in PHP ?
a) mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
b) connect(“Server Name “,”User Name”,”Password”,”DB Name”);
c) mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
d) mysqli_connect (“Database Object”);

7. Which is the not a correct MySQL Function in PHP ?


a) Mysqli_connect() Function b) Mysqli_close() Function
c) mysqli_select_data() Function d) mysqli_affected_rows() Function
8. How many parameter are required for MYSQLi connect function in PHP ?
a) 2 b) 3 c) 4 d) 5
9. How many parameter are required for MYSQLi query function in PHP ?
a) 2 b) 3 c) 4 d) 5
10. How many parameter are required for MYSQLi Close function in PHP ?
a) 1 b) 2 c) 3 d) 5
11. Which version of PHP supports MySQLi fuctions ?
a) Version 2.0 b) Version 3.0 c) Version 4.0 d) Version 5.0
CHAPTER : 10
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. A set of computers connecting together is called as ----------
a) Network b) Server c) Hub d) Node
2. Computer network devices that originates route and terminate the data were called as
a) Hub b) Resource c) Node d) Cable
3. Match the period and methods available on history of computer networking in the Internet
a) 1950 - X.25 TCP/IP
b) 1966 - SAGE
c) 1976 - WAN
d) 1972 - ARCNET
a) 4321 b) 3421 c) 1234 d) 2341
Namma Kalvi www.nammakalvi.in

4. Western Electric introduced the first widely used ----------------- that implemented true computer
control.
a) Packet switch b) Arpanet c) Host d) Telephone switch
5. Wi-Fi is short name for
a) Wireless Fidelity b) Wired fidelity c) Wired fiber optic d) Wireless fiber optic
6. People everywhere can express and publish their ideas and opinions via
a) Tele-medicine b) blogging c) Server d) Node
7. Which one of the following periods, the speed capacity supported towards gigabit on computer
network?
a) SABRE b) SAGE c) NEW FIBRE OPTICS d) ARCNET
8 One among them was challenging to the business people on computer networking
a) Hacking b) Viruses c) Both a & b d) none of this above
9. ---------- able to predict, manage, and protect the computer network at Internet
a) Artificial intelligence b) Broadband provider c) Cloud computing d) Transceivers
10. -------------use less power comparing with single transmitter or satellite often cell towers nearer
a) Mobile devices b) Transistors c) WIFI d) Communication
11. People now a days getting relaxed via
a) Business b) Corporate company c) News papers d) Social media
12. Which one of the following is not the social media
a) Gmail b) Facebook c) twitter d) Linkedin
13. Facebook was created at ------------year
a) 2002 b) 2004 c) 2013 d) 2010
14. In mobile network, land areas for network coverage was distributed as
a) Firmware b) cells c) Range d) Service
15. Which one were harmful to computer
a) Bloggers b) Browser c) Hackers d) twitter
16. Which innovation made the people to use Internet?
a) Social web b) Mobile technology c) Mobile App d) Both a & b.

CHAPTER : 11
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. The-----------, “the Net,” is a worldwide system of computer networks


a) Internet b) mobile c) communication d) protocol
2. Which one of the following will be easy the way to uses Internet technology and the public
telecommunication system to securely share business’s information with suppliers, vendors, partners
and customers.
a) Extranet b) Intranet c) arpanet d) arcnet
Namma Kalvi www.nammakalvi.in

3. Match the following and choose the correct answer


i. HTTP - The core protocol of the World Wide Web.
ii. FTP - enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS - Refer to other host computers by using names rather than numbers.
a) i, ii, iii, iv b) ii, iii, iv, I c) iii, iv, i, ii d) iv, iii, ii, i
4. Communication over ------------ ------is be made up of voice, data, images and text messages.
a) Social media b) mobile network c) whatsapp d) software
5. Wi-Fi stands for---------------------
a) Wireless Fidelity b) wired fidelity c) wired optic fibre d) wireless optic fibre
6. A TCP/IP network with access restricted to members of an organization
a) LAN b) MAN c) WAN d) Intranet
7. RFID stands for --------------
a) Radio Free identification b) real Frequency identity
c) Radio Frequency indicators d) Radio Frequency Identification.
8. It guarantees the sending of data is successful and which checks error on operation at OSI layer is---
a) Application layer b) Network layer c) Transport Layer d) Physical layer
9. Which one of the following will secure data on transmissions
a) HTTPS b) HTTP c) FTP d) SMTP
10. ----------- provides e-mail service
a) DNS b) TCP c) FTP d) SMTP
11. ------------- refer to other host computers by using names rather than numbers.
a) DNS b) TCP c) FTP d) SMTP
12. TCP/IP is a combination of two protocols:
i. Transmission Control Protocol (TCP) ii. Internet Protocol (IP)
iii. Selection Protocol (SP) iv. Captial Protocol (CP)
a) i, ii b) i, iii c) iii, iv d) ii, iii

CHAPTER : 12
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. Which of the following is used to maintain all the directory of domain names?
a) Domain name system b) Domain name space
c) Name space d) IP address
2. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Dotted-decimal c) Hexadecimal d) a and b
3. How many bits are used in the IPv6 addresses?
a) 32 b) 64 c) 128 d) 16
Namma Kalvi www.nammakalvi.in

4. Expansion of URL is
a) Uniform Resource Location b) Universal Resource Location
c) Uniform Resource Locator d) Universal Resource Locator
5. How many types are available in Relative URL?
a) 2 b) 3 c) 4 d) 5
6. Maximum characters used in the label of a node?
a) 255 b) 128 c) 63 d) 32
7. In domain name, sequence of labels are separated by
a) ; b) .(dot) c) : d) NULL
8. Pick the odd one out from the following.
a) node b) label c) domain d) server
9. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d) Name servers
10. Which is the contiguous area up to which the server has access?
a) Zone b) Domain c)Resolver d) Name servers
11. ISP stands for
a) International Service provider b) Internet Service Provider
c) Internet service Protocol d) Index service provider
12. TLD stands for
a) Top Level Data b) Top Logical Domain
c) Term Level Data d) Top Level Domain
13. Which of the following statements are true?
i) Domains name is a part of URL.
ii) URL made up of four parts
iii) The relative URL is a part of Absolute URL
iv) URL doesn’t contain any protocol
a) i & ii b) ii c) i, ii & iii d) i, ii & iv
14.
Assertion (A) : The number of addresses used in IPv6 addressing method is 128 .
Reason (R) : IPv6 address is a 128 bit unique address.
a) A is true and R is false.
b) A is false and R is true.
c) Both A and R are correct and R is the correct explanation of A.
d) Both A and R are correct and R is not the correct explanation of A.
15. Match the following
a. domain - 1. Progress that initiates translation
b. zone - 2. contains database of domain names
c. name server - 3. single node
d. resolver - 4. contiguous nodes
a. 1432 b.3421 c. 3214 d. 3412

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

CHAPTER : 13
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. ARPANET stands for
a) American Research Project Agency Network b) Advanced Research Project AreaNetwork
c) Advanced Research Project Agency Network d) American Research Programs And Network
2. WWW was invented by
a) Tim Berners Lee b) Charles Babbage c) Blaise Pascal d) John Napier
3. Which cable is used in cable TV to connect with setup box?
a) UTP cable b) Fibre optics c) Coaxial cable d)USB cable
4. Expansion of UTP is
a) Uninterrupted Twisted Pair b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair d) Universal Twisted Protocol
5. Which medium is used in the optical fibre cables to transmit data?
a) Microwave b)infra red c)light d)sound
6. Which of the following is a small peripheral device with a sim slot to connect the computers to
Internet?
a) USB b) Dongles c) Memory card d) Mobiles
7. Which connector is used in the Ethernet cables?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
8. Which of the following connector is called as champ connector?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
9. How many pins are used in RJ45 cables?
a) 8 b) 6 c) 50 d) 25
10. Which wiring standard is used for connecting two computers directly?
a) straight Through wiring b) Cross Over wiring
c) Rollover wiring d) None
11. pick the odd one out from the following cables
a) roll over b) cross over c) null modem d) straight through
12. Match the following
1. Ethernet - Port
2. RJ45 connector - Ethernet
3. RJ45 jack - Plug
4. RJ45 cable - 802.3
a.1, 2, 4, 3 b. 4, 1, 3, 2 c. 4, 3, 1, 2 d. 4, 2, 1, 3

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

CHAPTER : 14
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. If the source code of a software is freely accessible by the public, then it is known as
a) freeware b) Firmware c) Open source d) Public source
2. Which of the following is a software program that replicates the functioning of a computer
network?
a) Network software b) Network simulation c) Network testing d ) Network calculator
3. Which of the following can document every incident that happened in the simulation and are
used for examination?
a) Net Exam b) Network hardware c) Trace file d) Net document
4. Which is an example of network simulator?
a) simulator b) TCL c) Ns2 d) C++
5. Fill in the blanks : NS2 comprises of ______key languages?
a) 13 b) 3 c) 2 d) 4
6. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) UNIX & a. C++ c) C++ & OTcl d) C++ & NS2
7. Which of the following is not a network simulation software?
a) Ns2 b) OPNET c) SSFNet d) C++
8. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
9. Open NMS was released in …………………
a) 1999 b) 2000 c) 2003 d) 2004
10. OpenNMS Group was created by……………….
a) Balog b) Matt Brozowski c) David Hustace d) All of them.
CHAPTER : 15
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. A company can be called E-Business if


a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country. d) it has many employees.
2. Which of the following is not a tangible good?
a) Mobile b) Mobile Apps c) Medicine d) Flower bouquet
3. SME stands for
a) Small and medium sized enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Short messaging enterprises
Namma Kalvi www.nammakalvi.in

4. The dotcom phenomenon deals with________


a) Textile industries b) Mobile phone companies
c) Internet based companies d) All the above
5. Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of ElectronicCommerce: 2004 – 2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
6. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
7. Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
8. G2G systems are classified into
a) Internal facing and external facing
b) Internet facing and Extranet facing
c) Internal flag and external flag
d) Internet flag and Extranet flag
9. ____ host the e-books on their websites.
a) Bulk-buying sites
b) Community sites
c) Digital publishing sites
d) Licensing sites
10. Which of the following is not a characteristics of E-Commerce
a) Products cannot be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

CHAPTER : 16
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks
1. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Micro and Nano
c) Maximum and Minimum d) Maximum and Macro
2. Which of the following is not a category of micropayment?
a) Buying a movie ticket b) Subscription to e journals
c) Buying a laptop d) Paying for smartphone app
3. Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
4. Which of the following is correctly matched
a) Credit Cards - pay before
b) Debit Cards - pay now
c) Stored Value Card - pay later
d) Smart card - pay anytime
5. ECS stands for
a) Electronic Clearing Services b) Electronic Cloning Services
c) Electronic Clearing Station d) Electronic Cloning Station
6. Which of the following is not a Altcoin
a) Litecoin b) Namecoin c) Ethereum d) Bitcoin
7. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA b) VPA does not includes numbers
c) VPA is a unique ID d) Multiple bank accounts cannot have single VPA
8. Pick the odd one in the credit card transaction
a) card holder b) merchant c) marketing manager d) acquirer
9. Which of the following is true about debit card
i. debit cards cannot be used in ATMs
ii. debit cards cannot be used in online transactions
iii. debit cards do not need bank accounts
iv. debit cards and credit cards are identical in physical properties
a) i, ii, iii b) ii, iii, iv c) iii alone d) iv alone
10. Match the following
List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) MII Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit
A1 A2 A3 A4
a) B4 B3 B2 B1 b) B2 B1 B3 B4 c) B2 B3 B4 B1 d) B2 B4 B3 B1
Namma Kalvi www.nammakalvi.in

CHAPTER : 17
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as


a) Friendly fraud b) Clean fraud c) Triangulation fraud d) Cyber squatting
2. Which of the following is not a security element involved in E-Commerce?
a) Authenticity b) Confidentiality c) Fishing d) Privacy
3. Asymmetric encryption is also called as
a) Secure Electronic Transaction b) Certification Authority
c) RSA algorithm d) Payment Information
4. The security authentication technology does not include
i) Digital Signatures
ii) Digital Time Stamps
iii) Digital Technology
iv) Digital Certificates
a) i, ii & iv b) ii & iii c) i, ii & iii d) all the above
5. PGP stands for
a) Pretty Good Privacy b) Pretty Good Person
c) Private Good Privacy d) Private Good Person
6. _____ protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET) b) Credit Card Verification
c) Symmetric Key Encryption d) Public Key Encryption
7. Secure Electronic Transaction (SET) was developed in
a) 1999 b) 1996 c) 1969 d) 1997
8. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) http:// c) htmls:// d) https://
9. 3-D Secure, a protocol was developed by
a) Visa b) Master c) Rupay d) PayTM
10. Which of the following is true about Ransomware
a) Ransomware is not a subset of malware b) Ransomware deletes the file instantly
c) Typopiracy is a form of ransomware d) Hackers demand ransom from the victim

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

CHAPTER : 18
TEXTUAL ONE MARK QUESTION
I. Choose the correct answer 1 Marks

1. EDI stands for


a) Electronic Details Information b) Electronic Data Information
c) Electronic Data Interchange d) Electronic Details Interchange
2. Which of the following is an internationally recognized standard format for trade, transportation,
insurance, banking and customs?
a) TSLFACT b) SETFACT c) FTPFACT d) EDIFACT
3. Which is the first industry-specific EDI standard?
a) TDCC b) VISA c) Master d) ANSI
4. UNSM stands for?
a) Universal Natural Standard message b) Universal Notations for Simple message
c) United Nations Standard message d) United Nations Service message
5. Which of the following is a type of EDI?
a) Direct EDI b) Indirect EDI c) Collective EDI d) Unique EDI
6. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert c) Pascal d) None of the above
7. EDI interchanges starts with ____ and ends with ____
a) UNA, UNZ b) UNB, UNZ c) UNA, UNT d) UNB, UNT
8. EDIFACT stands for
a) EDI for Admissible Commercial Transport
b) EDI for Advisory Committee and Transport
c) EDI for Administration, Commerce and Transport
d) EDI for Admissible Commerceand Trade
9. The versions of EDIFACT are also called as
a) Message types b) Subsets c) Directories d) Folders
10. Number of characters in an single EDIFACT messages
a) 5 b) 6 c) 4 d) 3
PREPARED BY

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]

****ALL THE BEST ****

You might also like