04 Web Applications and Security
04 Web Applications and Security
REVISION NOTES
Computer Accessibility refers to the user friendliness of a computer system for all, regardless of
their disability. it enables a person with a disability or impairment to use a computer. It is known as
Assistive Technology. There are numerous types of impairment that impact computer usage. These
include:
Cognitive impairments and learning disabilities
Attention Deficit Hyperactivity Disorder (ADHD) or autism.
Visual impairment.
Hearing impairment
Motor impairment
2) Filter Keys: Filter Keys is a feature of Microsoft Windows. It is an accessibility function that tells
the keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand
tremors.
• To enable Filter Keys, check Use Filter Keys.
• Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.
• Click Apply.
• Click OK.
The FilterKeys icon appears in the system tray
3) ToggleKeys: ToggleKeys is an accessibility function which is designed for people who have
vision impairment or cognitive disabilities. When ToggleKeys is turned on, computer emits sound
cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed.
A high sound is emitted when the keys are switched on and a low sound is emitted when they are
switched off.
• To enable ToggleKeys, Check Use ToggleKeys.
• Click Settings under ToggleKeys. • Click Apply
• Click OK.
Having enabled ToggleKeys, you can see its effect by any one of the following keys NUM LOCK,
CAPS LOCK or SCROLL LOCK. Notice that on doing so, you hear a beep.
Page - 1 -
• To enable SoundSentry, Check Use SoundSentry under Sound Tab. Doing so activates a drop down
list wherefrom you can choose the type of visual warning desired.
• Click Apply.
• Click OK.
2) Cursor Options: Cursor Options is also an accessibility feature that assists people with vision
impairment by changing the blink rate and width of the cursor.
• To change the speed of the cursor blink, move the Blink Rate slider back and forth. Notice the
cursor blinking at various speeds.
• To change the width of the cursor, move the Width slider back and forth. Notice the with of the
cursor changing.
General Tab enables you to configure accessibility options for all users.
1) Serial Keys: Serial Keys is an accessibility feature that assists people that have difficulty using a
keyboard or a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to
provide input to the computer through Serial Ports.
NETWORKING FUNDAMENTALS
A network can be defined as an interconnected collection of autonomous computers. A ‘computer
network’ or simply a ‘network’ is a collection of computers and other hardware devices,
interconnected by communication channels (satellites or cables) that allow sharing of resources and
information. A computer networking is the practice for exchanging informations/services between
two or more computer devices together for the purpose of sharing data. The speed of a network is
measured in Mbps (Megabits per second).
BENEFITS OF NETWORKING
Computer network is very useful in modern environment, so some of the benefits of networking are
discussed here:
Data Sharing: One of the most important uses of networking is to allow the sharing of data.
File Sharing: Networking of computers helps the users to share data files.
Hardware Sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard
drives, etc.
Application Sharing: Applications can be shared over the network and this allows to implement
client/server applications.
User Communication: This allows users to communicate using E-mail, newsgroups, video
conferencing within the network.
Access to Remote Database: By networking, we are able to access to the remote database. It is
easy for any person using his PC to make reservations for aeroplanes, trains, hotels, etc.,
anywhere in the world with instant confirmation within the network.
TYPES OF NETWORK
A network refers to a group of interconnected computers which are capable of sharing information
and communication devices.
On the basis of coverage or geographical spread, a network can be divided into following types:
INTERNET:
The Internet is a global system of interconnected computer networks that use the standard Internet
protocol suite to serve billions of users worldwide. It is a network of networks.
Uses of Internet: There are various uses of Internet. Some of them are listed below
Internet is used by students, educational institutes to gather information for research.
It is used for online shopping.
It is used for sending and receiving mail.
It is used for playing games.
It is used for Online Transaction.
World Wide Web: World Wide Web (abbreviated as WWW or W3, commonly known as the Web),
is a system of interlinked hypertext documents accessed via the Internet.
Page - 3 -
Web Browser: A Web Browser is a software used to view Web sites and acts as an interface between
the user and the World Wide Web.
Web Server: Web server is a computer that stores web sites and their related files for viewing on the
Internet.
Internet Service Provider: An Internet service provider (ISP) is an organization which provides you
with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.
for example Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.
Modem: It stands for MOdulator/DEModulator. It is a device that converts digital computer signals
into a form analog signals and vice versa.
Types of Common Internet Connectivity: There are different types of Internet Connectivity
available today; it can be widely categorized into wired and wireless access.
Dial-up Wired
DSL Wired
3G Wireless
WiMAX Wireless
Wi-Fi Wireless
2) DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires
of a local telephone network. DSL service is delivered along with wired telephone service on the
same telephone line. On the customer premises, a DSL filter removes the high frequency interference,
enabling simultaneous use of the telephone and data transmission. For using a DSL connection, you
need a DSL modem and a subscription.
3) Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the
cable television infrastructure. Cable Internet Access is provided through existing cable TV networks;
this is similar to DSL that is provided over existing telephone lines
4) 3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher data transfer speeds and capacity.
Page - 4 -
and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in
laying out cables for home or offices located in remote locations but need access to the Internet.
6) WI-Fi : Wi-Fi (Wireless Fidelity) is a popular technology that allows an electronic device such as
computers or mobile phones to exchange data wirelessly over a network, including high-speed
Internet connections. WiFi devices such as personal computer, smartphones, video game console, etc.
can connect to a network resource such as Internet through a device called the Wireless Access Point
(WAP).
Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network
and Internet access. Wi-Fi can also be used where users require mobile connectivity.
Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet
Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet
for their customers.
INSTANT MESSAGING
Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.
Types of Instant Messaging Software: There are two kinds of instant messaging software –
application based and Web based.
A) Application based: Application based instant messaging software is downloaded and installed on
user’s computer. Some of the popular instant messaging software are:
Google Talk
Yahoo! Messenger
Skype
Windows Live Messenger
Rediff Bol, etc.
B) Web based: Web based instant messaging software is accessed using browsers such as Internet
Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging
software are:
Meebo
Yahoo! Messenger for the Web
MSN Web Messenger
IMO, etc.
NOTE: To use instant messaging software, a user must have a valid instant messaging account.
GOOGLE TALK
Google Talk : Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc. Google Talk can also be used for making video calls.
Google Talk is free and is available as application based as well as web based. A Gmail account is
required to use Google Talk.
Steps to Chat with a contact that is already added to your contact list.
Page - 5 -
a) Whenever your friend in the contact list is online you can see the person along with a green dot.
b) You can start sending text chat message instantly by double-clicking on a contact the other person
will see the text message and respond to your message.
Some of the popular websites that offer blog service for free are:
www.wordpress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
WordPress: WordPress is free web service that you can use to create a beautiful website or blog.
WordPress has support for “themes” which can make the blog or the webpage look attractive.
Online transactions: Online transactions deals with transfer of money over the internet. There are
many benefits of online transactions like, fast transaction speed, convenience, low risk of theft etc.
Online shopping: Online shopping is a form of electronic commerce where customers can buy or sell
goods over the Internet.
Internet security: Internet security is a branch of computer security specifically related to the
Internet. Its objective is to establish rules and measures to use against attacks over the Internet.
NOTE :
www.strongpasswordgenerator.com help to generate strong password.
Example of Online threats are Phishing, email spoofing, chat spoofing, etc.
Page - 7 -
Combination of alphanumeric and special characters could be used for creating a password that is
not so easy to crack.
Programs such as keyloggers track and transmit every key that is pressed on a keyboard
(keystrokes) to unauthorized users
Occupational hazard: An occupational hazard is the illness one may acquire due to his occupation.
Some types of occupational hazards are : Physical hazards, chemical hazards, biological hazards, ,
behavioural hazards, radiological hazards, ergonomic hazards etc.
Page - 8 -
Accident: an accident is an unplanned event that may happen all of a sudden and may lead to
unwanted or unprecedented results/outcomes.
Handling Accidents:
Accidents must be handled carefully. The accident should be handled compassionately without
assigning blame on others.
Every organization must follow SOP for accident handling
Safety measures must be placed to prevent workplace accidents
Immediately call the medical team for any injury
Stay alert
Pay attention to and follow emergency drills
EMERGENCY: Any unexpected situation that needs immediate attention and action is called
emergency.
TYPES OF EMERGENCY:
Various types of emergencies are there and there should be an emergency management plan to handle
the situation of emergency. Some of the types of emergencies are as follows :
Chemical spills
Extreme heat waves
Droughts
Pandemics
Terrorist attack
Fire
Floods
Thunderstorms
Leakage of some hazardous gas/ chemical
Page - 9 -
HAZARDS AND SOURCES OF HAZARDS:
A hazard is anything that is the source of any potential harm, damage or any kind of potential loss of
health or life.
Evacuation: Evacuation is the process of emptying a place in case of an emergency, disaster. Every
company must ensure following points for evacuation in case of any emergency:
An evacuation policy.
Organization must have a designated assembly point for emergencies.
Floor plans with evacuation routes pasted in work areas
Periodic evacuation drills should be conducted
Healthy Living:
A healthy living has a lasting impact on an individual which ultimately yields a healthy environment
at home as well as at work place.
A healthy lifestyle helps to keep and improve people’s health and well being.
Page - 10 -
WEB APPLICATIONS AND SECURITY
OBJECTIVE QUESTIONS (SET 01)
1. Computer ___________ refers to the user friendliness of a computer system for all, regardless of
their disability.
a. Shortcut Keys
b. Accessibility
c. Ctrl & Alt Key
d. None of the above
Ans: b. Accessibility
2. What are the different type of impairments that impact computer usage?
a. Dyslexia
b. Visual Impairment
c. Hearing Impairment
d. All of the above
Ans: d. All of the above
4. ___________ is an accessibility feature to help computer users with physical disabilities, but it is
also used by others as a means to reduce repetitive strain.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
Ans: c. Sticky Keys
5. _________ enables the user to hold and release a modifier key, like as Shift, Ctrl, Alt, or the
Windows key, and have it remain active until another key is pressed.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
Ans: c. Sticky Keys
6. The __________accessibility function instructs the keyboard to ignore short or repeated inputs,
making typing simpler for those people who have hand tremors.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
Ans: a. Filter keys
7. __________ is an accessibility feature for persons with vision impairment or cognitive problems.
a. Filter keys
Page - 1 -
b. Toggle Keys
c. Sticky Keys
d. None of the above
Ans: b. Toggle Keys
8. _________ is turned on, the computer emits sound cues when the locking keys such as Caps lock,
Num lock and Scroll lock are pressed.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
Ans: b. Toggle Keys
10. When the computer makes a sound, ________ produces visual effects such as a blinking title bar
or a flashing border.
a. Filter keys
b. Toggle Keys
c. Sound Sentry
d. None of the above
Ans: c. Sound Sentry
11. ___________ directs applications that provide information through sound to also give information
visually, through written captions or informative icons.
a. Filter keys
b. Show Sound
c. Sound Sentry
d. None of the above
Ans: b. Show Sound
12. ___________ is an accessibility feature to assist people with vision impairment. You can change
the text size and color, as well as the background color, to make it easier to read.
a. High Contrast
b. Show Sound
c. Sound Sentry
d. None of the above
Ans: a. High Contrast
13. _____________ is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
a. High Contrast
b. Cursor Options
c. Sound Sentry
d. None of the above
Ans: b. Cursor Options
Page - 2 -
14. The ____________option uses the keyboard (especially numeric keypad) as a pointing device
instead of a mouse.
a. High Contrast
b. Mouse key
c. Sound Sentry
d. None of the above
Ans: b. Mouse key
15. ____________ is an accessibility feature that assists people that have difficulty using a keyboard
or a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide
input to the computer through Serial Ports.
a. High Contrast
b. Mouse key
c. Serial Keys
d. None of the above
Ans: c. Serial Keys
16. The option in Microsoft Windows XP used for helping users with physical disabilities and to
reduce repetitive strain is ____________________.
a. Toggle Key
b. Sticky Key
c. Tab Key
d. None of the above
Ans: b. Sticky Key
17. Sound Sentry is intended to assist users who have ____________ disabilities.
a. Auditory Impairments
b. Cognitive Impairments
c. Visual Impairments
d. Dexterity Impairments
Ans: a. Auditory Impairments
18. The High Contrast feature in Microsoft Windows XP is designed to help persons who have
_______________ impairments.
a. Auditory Impairments
b. Cognitive Impairments
c. Visual Impairments
d. Dexterity Impairments
Ans: c. Visual Impairments
19. ___________________ is designed to assist people that have difficulty using a keyboard or a
mouse.
a. KeyboardKeys
b. MouseKeys
c. TabKeys
d. GeneralKeys
Ans: b. MouseKeys
23. Networks in which all computers have an equal status are called __________.
a. Peer – to – Peer Network
b. Client – Server Network
c. Both a) and b)
d. None of the above
Ans: a. Peer – to – Peer Network
24. Networks in which certain computers have special dedicated tasks, providing services to other
computers are called__________.
a. Peer – to – Peer Network
b. Client – Server Network
c. Both a) and b)
d. None of the above
Ans: b. Client – Server Network
26. The computer uses the services which are provided from the server is called __________.
a. Client
b. Server
c. Node
d. None of the above
Ans: . Client
Page - 4 -
28. A ____________ is a network that connects computers and gadgets in a specific geographic area,
such as a house, school, computer laboratory, office building, or group of buildings.
a. Local Area Network
b. Wide Area Network
c. Both a) and b)
d. None of the above
Ans: a. Local Area Network
29. A ______________ network is one which covers a broad area across metropolitan city, regional,
or national boundaries.
a. Local Area Network
b. Wide Area Network
c. Both a) and b)
d. None of the above
Ans: b. Wide Area Network
30. The ___________ is a global network of interconnected computer networks that serve billions of
people worldwide by utilizing the standard Internet protocol suite.
a. Internet
b. Network
c. Arpanet
d. None of the above
Ans: a. Internet
33. __________ is a network of interconnected hypertext documents that may be accessed via the
Internet.
a. World Wide Web
b. W3
c. Both a) and b)
d. None of the above
Ans: c. Both a) and b)
34. A ________ is a software program that is used to browse Web sites and serves as a bridge
between the user and the World Wide Web.
a. World Wide Web
b. Web Server
c. Web Browser
d. None of the above
Ans: c. Web Browser
Page - 5 -
35. What are the advantages associated with networking?
a. Data & File Sharing
b. Hardware Sharing
c. Internet Sharing
d. All of the above
Ans: d. All of the above
36. _________ helps to share hardware components such as printers, scanners etc.
a. Computer Network
b. Hardware Network
c. Information Network
d. None of the above
Ans: a. Computer Network
42. Á __________ is a device that converts digital computer signals into analog signals that can travel
over phone lines.
a. Router
Page - 6 -
b. Modem
c. Bridge
d. None of the above
Ans: b. Modem
46. __________ Internet access is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a connection to an Internet service provider
a. Dial – up
b. 3G
c. WiMax
d. Wi-Fi
Ans: a. Dial – up
47. __________provide Internet access by transmitting digital data over wires of a local telephone
network.
a. Dial – Up
b. Digital Subscriber Link (DSL)
c. 3G
d. WiMax
Ans: b. Digital Subscriber Link (DSL)
48. _________provides wireless communication and mobile broadband connection across cities and
countries.
a. WiMax
b. Wi-Fi
c. DSL
d. None of the above
Ans: a. WiMax
49. ___________ is a widely used technology that allows electronic devices as as computers or
mobile phones to transmit data wirelessly over a network, including high-speed Internet connections.
a. WiMax
Page - 7 -
b. Wi-Fi
c. DSL
d. None of the above
Ans: b. Wi-Fi
52. Three types of Wired Internet Connectivity are ___________ , _________ & ___________.
a. 3G, DSL, Dial-Up
b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi
d. WiMax, DSL, Dial-up
Ans: b. Cable Internet Access, DSL, Dial-Up
53. Three types of Wireless Internet Connectivity are _________ , ___________ & _________.
a. 3G, DSL, Dial-Up
b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi
d. WiMax, DSL, Dial-up
Ans: c. WiMax, 3G, Wi-Fi
54. __________is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.
a. Instant Messaging
b. Computer Software
c. Hardware
d. None of the above
Ans: a. Instant Messaging
55. Most instant messaging software include the option for performing________.
a. File transfer
b. Audio chat
c. Video calling
d. All of the above
Ans: d. All of the above
59. ______________ is a type of Internet communication software that allows the user for instant
transfer of text-based communications from sender to receiver.
a. Instant Messaging (IM)
b. Service Messaging (SM)
c. Fast Messaging (FM)
d. None of the above
Ans: a. Instant Messaging (IM)
60. ___________ , ____________ & _______________& Web Camera are required for audio and
video conferencing.
a. Joystick, Computer, Video
b. Text, Audio, Video
c. Microphone, Headphone, Speaker
d. Touch Screen, Speaker, Microphone
Ans: c. Microphone, Headphone, Speaker
61. What are the general rules and etiquettes for chatting?
a. Messages should be short and to the point
b. Always ask first if the other person has time to converse.
c. Typing your message in uppercase is extremely rude
d. All of the above
Ans: d. All of the above
62. A _________ is a discussion-style website that non-technical (or technical) people use to create
personal web sites.
a. Blog
b. Website
c. Social Media Site
d. None of the above
Ans: a. Blog
63. ___________ are similar to an online personal diary and simple to use.
a. Blog
b. Website
c. Social Media Site
d. None of the above
Ans: a. Blog
Page - 9 -
64. What are the popular blogs websites on the internet _________.
a. WordPress
b. Blogger
c. Blog
d. All of the above
Ans: d. All of the above
71. How can you reduce the risks over the internet?
a. Using Antivirus Software
b. Fire walls
Page - 10 -
c. Strong Password
d. All of the above
Ans: d. All of the above
74. Give the name of the website which can generate strong passwords automatically?
a. www.strongpasswordgenerator.com
b. www.wikipedia.com
c. www.cbseacademic.nic.in
d. None of the above
Ans: a. www.strongpasswordgenerator.com
75. __________ software helps to protect your data from unauthorized users.
a. W33 Software
b. Encryption Software
c. Unlock password Software
d. None of the above
Ans: b. Encryption Software
78. _________ are programs that are created on your local computer when you visit websites.
a. Firewall
b. Cookies
c. History
d. All of the above
Ans: b. Cookies
Page - 11 -
79. __________ can be software or hardware that helps in the security of a computer and a network.
a. Firewall
b. Cookies
c. History
d. All of the above
Ans: a. Firewall
80. Web browsers have ___________ designed to store passwords used in forms on websites.
a. Cookies
b. Built – in password management
c. History
d. None of the above
Ans: b. Built – in password management
83. Basic falls and slips safety rules in an organization are ___________.
a. Maintain a clean and clutter-free working area.
b. Workplace should be ventilated and receive light
c. Floors must be clean and dry
d. All of the above
Ans: d. All of the above
87. What protection should organizations take to handle accidents in the workplace?
a. Safety measures must be placed to prevent workplace accidents
b. Immediately call the medical team for any injury
c. Pay attention to and follow emergency drills
d. All of the above
Ans: d. All of the above
92. An organization can face some __________ that could put the lives of the employees in danger.
a. Issue
b. Health Hazards
c. Shortage
d. None of the above
Ans: b. Health Hazards
93. Hazards can be of different types depending on the ________ and the ______________ in which
the employees work.
a. Industry, Environment
b. Occupation, problem
c. Both a) and b)
d. None of the above
Ans: a. Industry, Environment
Page - 13 -
94. Organizations must have a designated ______________ for emergencies.
a. Evacuation policy
b. Assembly point for emergencies
c. Buddy system for special needs people
d. All of the above
Ans: d. All of the above
Q3. Which of the following payment method will allow customer to pay after receiving the product.
a. Debit Card
b. Credit Card
c. COD
d. None of the above
Ans: c. COD
Q8. Using __________ password can lower the risk of a security breach
a. Weak
b. Strong
c. Week
d. None of the above
Ans: b. Strong
Q10. ____________ could transmit every key pressed on a keyboard to unauthorized users.
a. Keylog
b. Keyloggers
c. Keypress
d. None of the above
Ans: b. Keyloggers
Q12. Website uses secure transaction is indicated through a digital certificate represented as a
___________ symbol in the web browser’s address bar.
a. Lock
b. Key
c. Both of the above
d. None of the above
Ans: a. Lock
Q13. Cookies are _______ that are created on your local computer when you visit websites.
a. small files
b. folder
c. virus
d. None of the above
Ans: a. small files
Q14. Updated antivirus software helps in protecting your computer from recent threats.(T/F)
a. True
b. False
Ans: a. True
Q21. Which of the following are some of the measures to keep ourselves safe from electricity hazards
and accidents?
a. Electrical equipment used should be approved by a recognized organization.
b. Workers should be trained to handle the electric equipment safely
c. Circuits should not be overloaded .
d. All of the above
Ans: d. All of the above
Q22. Learning ______________ is the social and civic responsibility of every human being.
a. First Aid
b. Computer
c. Handling electrical equipment
d. None of the above
Page - 16 -
Ans: a. First Aid
Q23. It is our responsibility to check for the __________ of medical related items in First Aid kit.
a. Cost
b. Expiry
c. Colour
d. None of the above
Ans: b. Expiry
Q27. Unfortunate incident that occurs unintentionally causing hazardous result or injury or unwanted
results is called _____
a. Emergency
b. Hazard
c. Accident
d. None of the above
Ans: c. Accident
Q29. Any unexpected situation that needs immediate attention and action is called _________
a. Accident
b. Emergency
c. Occupational Hazard
d. None of the above
Ans: b. Emergency
Q31. Which of the following are impairment that impact computer usage?
a. Cognitive impairments and learning disabilities
b. Visual impairment
c. Motor or dexterity impairment
d. All of the above
Ans: d. All of the above
Q34. Which of the following key help to ignore brief or repeated keystrokes, making typing easier for
people with hand tremors.?
a. Toggle Key
b. Sticky Key
c. Filter Key
d. All of the above
Ans: c. Filter Key
Q35. When ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps Lock,
Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys are switched
__________ and a low sound is emitted when they are switched ______________
a. Off, On
b. On, Off
c. Off, Off
d. On, On
Ans: b. On, Off
Q36. Use Soundsentry and use showsounds are options available in _____________ tab of
Accessibility Options window.
a. Keyboard
b. Display
c. Sound
d. General
Ans: c. Sound
Page - 18 -
Q37. Which of the following option is not available on Keyboard tab of Accessibility Options
Window?
a. Toggle keys
b. Filter keys
c. Sticky Keys
d. Hand Keys
Ans: d. Hand Keys
Q38. Once the Filter key is active, it’s icon appears in the ________
a. System tray
b. Status bar
c. Title bar
d. Menu bar
Ans: a. System tray
Q39. Cursor Options is an accessibility feature that assists people with _________ impairment
a. Vision impairment
b. Hearing impairment
c. Cognitive impairments
d. None of the above
Ans: a. Vision impairment
Q40. In Cursor option, we can change the __________ and ___________ of the cursor.
a. size and width
b. blink rate, width
c. height and width
d. length and breadth
Ans: b. blink rate, width
Q42. In a skit based on “Computer Network”, Amit is playing a role of a component who is providing
services to other components or computers. Identify the role of Amit.
a. Client
b. Server
c. Peer
d. None of the above
Ans: b. Server
Q47. I am a software who acts as an interface between the user and the World Wide Web. Who am I?
a. Protocol
b. Web Server
c. Web Browser
d. Telnet
Ans: c. Web Browser
Q48. I am a document who may contain text, images, videos, other multimedia, and hyperlink. Who
am I?
a. Browser
b. Web Page
c. HTML
d. WWW
Ans: b. Web Page
Q49. Web Pages stored on web servers are retrieved by using a _____
a. Web browser
b. Web Site
c. WWW
d. Database
Ans: a. Web browser
Q51. I am a device which convert analog signal to digital signal and vice-versa. Who am I?
a. Router
b. Modem
c. ISP
Page - 20 -
d. Firewall
Ans: b. Modem
Q53. Which of the following signal can travel over phone lines?
a. Digital Signal
b. Analog Signal
c. Both of the above
d. None of the above
Ans: b. Analog Signal
Q55. ____________ is a form of Internet access that uses the facilities of the PSTN.
a. DSL
b. WiMax
c. Dial-up
d. 3G
Ans: c. Dial-up
Q56. For using a DSL connection, you need a __________ and a ____________________.
a. DSL modem, subscription
b. Router, subscription
c. DSL modem, service
d. DSL modem, router
Ans: a. DSL modem, subscription
Page - 21 -
Q59. Which technology allows an electronic device such as computers or mobile phones to exchange
data wirelessly over a network?
a. WiMax
b. DSL
c. Wi-Fi
d. ISP
Ans: c. Wi-Fi
Q60. __________ is used where cables cannot be run (such as old buildings, outdoor areas) to
provide network and Internet access.
a. Cable Internet Access
b. DSL
c. Wi-Fi
d. ISP
Ans: c. Wi-Fi
Q61. What type of network is formed by interconnected computer spread in different rooms of a
building?
a. MAN
b. WAN
c. PAN
d. LAN
Ans: d. LAN
Q62. What type of network is formed by interconnected computer spread in across countries?
a. MAN
b. WAN
c. PAN
d. LAN
Ans: b. WAN
Q64. WiFi devices such as personal computer, smartphones etc. can connect to a network resource
such as Internet through a device called the ___________
a. Web Server
b. Wireless Access Point
c. Web Page
d. Web Site
Ans: b. Wireless Access Point
Page - 22 -
Q66. Instant messaging (IM) is a form of ______
a. communication
b. calculation
c. internet
d. none of the above
Ans: a. communication
Q69. Which of the following instant messaging software is not using email address for managing
account?
a. Yahoo! Messenger
b. Windows Live Messenger
c. Skype
d. All of the above
Ans: c. Skype
Q70. ______ instant messaging software is downloaded and installed on user’s computer.
a. Application based
b. Web based
c. Both of the above
d. None of the above
Ans: a. Application based
Q71. Which of the following happens in real-time and the response from participants can be
spontaneous?
a. Email
b. Instant messaging
c. Offline Messages
d. None of the above
Ans: b. Instant messaging
Q73. Which of the following file types can be transferred through Instant messaging?
a. Spread sheets
Page - 23 -
b. Audio files
c. Video files
d. All of the above
Ans: d. All of the above
Q74. Aman and Suman has to do project together. Both wants to share their ideas with each other.
Aman’s mom suggested _______________ for real time interaction.
a. Yahoo Messenger
b. Facebook Messenger
c. Windows Live Messenger
d. All of the above
Ans: d. All of the above
Q76. Whenever your friend in the contact list of Google Talk is online you can see the person along
with a ___ dot
a. Red
b. Yellow
c. Green
d. Blue
Ans: c. Green
Q80. To import your contacts in Yahoo Messenger from other sources such as Microsoft Outlook,
Gmail, Hotmail, etc., you can use the __________ option.
a. Export
Page - 24 -
b. Import
c. Insert
d. Update
Ans: b. Import
Q2. A person with disability or impairment can not use computer. (T/F)
a. True
b. False
Ans: b. False
Q5. Keyboard Accessibility options are useful for those which have ______________
a. Physical Disabilities
b. Vision Impairment
c. Both of the above
d. None of the above
Ans: c. Both of the above
Q7. Which of the following tab is not available in Accessibility options window (in Windows XP)
a. Keyboard
b. Display
c. General
d. Volume
Ans: d. Volume
Q10. Which of the following options allow us to press Ctrl key and ‘A’ key separately.
a. Filter Keys
b. Sticky Key
c. Toggle Keys
d. Mouse Keys
Ans: b. Sticky Key
Q14. When toggle key is active, the locking keys when switched on produce __________ sound.
a. high
b. low
c. no
d. none of these
Ans: a. high
Q17. High Contrast and Cursor Options are available under ______ tab.
a. Keyboard
b. Mouse
c. Display
d. Sound
Ans: c. Display
Q18. Number keys can be used to operate mouse when ____________ is active.
a. KeyboardKeys
b. MouseKeys
c. NumKeys
d. None of the above.
Ans: b. MouseKeys
Q19. Serial keys are helpful for those people who have difficulty to use______
a. Keyboard
b. Mouse
c. All of the above
d. None of the above
Ans: c. All of the above
Q26. Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called
a. Client Network
b. Server Topology
c. Both of the above
d. Client Server Network
Ans: d. Client Server Network
Q27. A computer who make a request for services in Client Server Architecture is called
____________
a. Client
b. Server
c. Both of the above
d. None of the above
Ans: a. Client
Q28.A __________ network is one which connects computers and devices in a limited geographical
area such as home, school etc.
a. MAN
b. WAN
c. LAN
d. None of the above
Ans: c. LAN
Q38. A web page can be viewed with the help of _______________and _________
a. web browser, active internet
b. protocol, active internet
c. protocol, web browser
d. None of the above
Ans: a. web browser, active internet
Q40. _________ is a computer that stores web sites and their related files for viewing on the Internet.
a. Web Client
b. Web
c. Web Server
d. WWW
Ans: c. Web Server
Q 47. _____ convert the analog signal to digital and vice versa
a. Switch
b. Router
c. Hub
d. Modem
Ans: d. Modem
Q 49. Which of the following are the types of common internet connectivity.
a. Dial – up
b. DSL
c. WiMAX
d. All of the above
Ans: d. All of the above
Q 60. Which of the following technology is used to provide free internet in hotels, malls etc. to their
customers.
a. WiFi
b. WiMAX
c. Dial up
d. Cable Internet Access
Ans: a. WiFi
Q 62. _______________ offers instantaneous transmission of text based messages from sender to
receiver.
Page - 32 -
a. Instant Messaging
b. Email
c. Traditional Post
d. None of the above
Ans: a. Instant Messaging
Q 64. For audio and Video chat users should have ______________
a. Microphone
b. Speakers
c. Web Camera
d. All of the above
Ans: d. All of the above
Q 65. Some instant messaging software allows users to view messages received when they are not
logged on. These are called ___
a. Online Messages
b. Offline Messages
c. Real Time Messages
d. None of the above
Ans: b. Offline Messages
Q 67. To use instant messaging software, a user must have a valid instant messaging account.(T/F)
a. True
b. False
Ans: a. True
Q 68. __________instant messaging software uses email address for managing account.
a. Yahoo Messenger
b. Whats App
c. Skype
d. None of the above
Ans: a. Yahoo Messenger
Q 72. For using Google Talk, you should have ________ account.
a. Yahoo
b. Gmail
c. Skype
d. None of the above
Ans: b. Gmail
Q 74. When ever any one in the contact list of Google Talk is online, you can see the person along
with_________ dot
a. Red
b. Blue
c. Yellow
d. Green
Ans: d. Green
Q 77. Before you start using Yahoo! Messenger, a _______ account is required
a. Yahoo Mail
b. Gmail
c. Both of the above
d. Neither of the above
Page - 34 -
Ans: a. Yahoo Mail
Q 79. Some instant messaging software such as Yahoo! Messenger, Windows Live Messenger use
_______ for managing the account
a. Standard Names
b. Email addresses
c. Mobile Number
d. None of the above
Ans: b. Email addresses
Q 88. Others can view the blog post only after _____
a. Publishing the post
b. Creating the post
c. Inserting pictures
d. Inserting videos
Ans: a. Publishing the post
B. Subjective Questions:
1. Define networking?
Ans. A computer network is a collection of computers that allow sharing of resources and
information.
It Stands for Local Area Network It Stands for Wide Area Network
Page - 38 -
c. Modem : Modulator and Demodulator
d. WWW : World Wide Web
e. LAN : Local Area Network
f. MAN : Metropolitan Area Network
g. WAN : Wide Area Network
h. P2P : Peer to Peer
7. Explain P2P Architecture and how it is different from Client Server Architecture?
Ans. Networks in which all computers have an equal status are called peer to peer networks.
Generally in such a network each terminal has an equally competent CPU.
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide
services are called servers and the ones that use these services are called clients.
11. State any 03 rules and etiquettes to be followed while chatting on the Internet.
Ans. Three rules and etiquettes to be followed while chatting on the Internet are :
Messages should be short and to the point.
Always introduce yourself by name if your screen name doesn’t reflect it.
Always ask if the other person has time to chat first.
12. What are the basic needs to use instant messaging (chat) software.
Ans. The basic needs to use instant messaging (chat) software are :
A valid instant messaging account.
An active internet Connection.
A computer and a browser
Page - 40 -
Ans. Internet security is a branch of computer security specifically related to the Internet. Its
objective is to establish rules and measures to use against attacks over the Internet.
30. Give any two basic safety rules for ensuring Falls and Slips safety.
Ans. Two basic safety rules for ensuring Falls and Slips safety are as follows :
a. Keep the moving area clean and clutter free.
b. Workplace must be proper ventilated receive light.
c. Wear non slippery footwear.
d. Floors must be clean and dry.
1. Name the term defined by given below statement: ‘‘A group of computers connected to each
other by a link.’’
Ans. Computer network is defined as a group of computers connected to each other by a link that
allows sharing of resources and information.
Page - 43 -
Ans. Following are the three main types of computer networks, based upon the geographical area
as follows:
(i) Local Area Network (LAN)
(ii) Metropolitan Area Network (MAN)
(iii) Wide Area Network (WAN)
7. How many techniques are used for transmitting data across network?
Ans. There are three techniques used for transmitting data across network : circuit switching,
packet switching and message switching.
10. Write the name of any two Internet Service Provider (ISP) in India.
Ans. MTNL and Airtel are the two Internet Service Provider (ISP) in India.
11. Name any two ways of wireless connections of Internet. Ramya wants to connect all the
computers of her office wirelessly in order to avoid uncoordinated cables. Which wireless
technology would be best suitable for her office?
Ans. Wi-Fi and WiMax are the two ways of wireless connections of Internet. Wi-Fi technology
would be best suitable for her office to avoid cabling. Because, it allows high speed Internet
connections without the use of cables or wires.
14. Mr. Lal owns a factory which manufactures automobile spare parts. Suggest him the advantages
of having a web page for his factory.
Ans. The web page provides the information to the clients about his factory of spare parts.
Moreover, he can receive the order on the Internet from the clients using the web page.
16. What is URL? Can we use URL to access a web page? How?
Ans. URL means Uniform Resource Locator. It is a unique address of a web page on the Internet.
It specifies the Internet address of a file stored on a host computer connected to the Internet. Yes,
as a location on a web server, which is called a website and each website has a unique address
known as URL. So, an URL can be used to access a web page.
17. Identify web addresses and E-mail addresses from the following.
(i) www.scrapbook.com
(ii) [email protected]
(iii) www.countrywide.co.in
(iv) [email protected]
Ans. Key features of an Instant Messaging are:
(i) and (iii) are web addresses.
(ii) and (iv) are E-mail addresses.
19. Who is blogger? List any five websites that provide blog service.
Ans. A person who writes a blog or a weblog is known as blogger. Blogging is the act of posting
content on a blog. Any five websites that provide blog service listed below
(i) Joomla (ii) Blogger (iii) Word Press.com (iv) Tumblr (v) Drupal
21. Laluma Chakradhar wants a broadband connection to access her mails and stay informed about
the latest happening in the field of Biotechnology. Can you suggest two Internet Service Providers
(ISPs) of India to be approached for the same?
Ans. BSNL and Airtel
22. Explain the concept ‘Watch Your waist and weight; to maintain a healthy body at workplace’.
Ans. The explanation of the concept ‘Watch Your waist and weight; to maintain a healthy body at
workplace’ is
Page - 45 -
(i) Encourage the use of weighing scales, measuring tapes and devices to monitor individual
physical fitness.
(ii) Place weighing scales, measurement tapes and body mass index charts in strategic locations.
23. What are the advantages of having safer and healthy workplace?
Ans. The advantages of having safer and healthy workplaces are as follows:
(i) They have fewer days lost, therefore they have higher productivity.
(ii) They can increase efficiency and quality, because they have healthier workplace.
29. Write down any three points of differences between LAN, MAN and WAN.
Ans. Three major points of differences among LAN, MAN and WAN are as follows
(i) In terms of geographical area WAN covers the area across the continents, MAN covers area
within a city while LAN covers area within a building.
(ii) In terms of distance The approximate distance covered by WAN is unlimited, of MAN is upto
160 km while that of LAN is upto 5 km.
(iii)In terms of speed The speed with which the data travels in case of WAN is 10 to 38.4 Kbps,
183 to 7.2 Mbps, while that of MAN is 11 to 100 Mbps and of LAN is 11 to 54 Mbps.
32. When the computer network uses telephone lines as communication channel, then MODEM is
used as a data communication device. Now, explain the working of MODEM.
Ans. MODEM performs the task of modulation at sender's site and demodulation at the receiver’s
site. Basically, our computer generates data in the form of digital signals which need to be
forwarded to the receiver through telephone lines. Since, telephone lines can carry only analog
signals. So, digital signals need to be converted to analog signals at sender’s site this is called
modulation. At receiver’s site, again analog signals should be converted back to the original
digital signals, then this is called demodulation.
36. Explain any three rules that companies follows in terms of fire safety.
Ans. Any four rules that companies follows in terms of fire safety are as follows
(i) All fire alarms systems are working.
(ii) All fire escapes can be opened easily.
(iii) Automatic fire doors close correctly.
40. Give an example of E-mail address and explain each part of it.
Ans. The example of an E-mail address is [email protected]. The format of E-mail address is
username@hostname or domain name. So, as per the above example of E-mail address. abc is the
username and gmail.com is the name of hosting server or host (domain) name. Thus, we can say
that, E-mail address has two parts separated by ‘@’ symbol.
(i) Username On the left side of separator @ is the user name. A user name cannot have blanks.
(ii) Domain Name for the Host Server The portion to the right of @ identifies the server or host
network that services your E-mail. It is also known as E-mail server.
45. Write any five precautions that are to be taken at the workplace.
Ans. Any five precautions that are to be taken of at the workplace are as follows:
(i) Take responsibility and clean up, if you made a mess.
(ii) Clean and organise your workspace.
(iii) Ensure a clear and easy route to emergency exits and equipment.
(iv) Be alert and awake on the job.
(v) Be attentive at all times to your work surroundings.
47. Explain some of the actions that are used in the event of fire.
Ans. Some actions that should be used in the event of a fire are as follows:
Page - 49 -
(i) Close all the windows, doors and switch of non-essential services.
(ii) Walk to the nearest assembly point.
(iii) Follow the emergency signs.
(iv) Escape routes should be lit by emergency lighting so that people can use them safely if
an emergency occurs.
(v) Don’t re-enter the building until permission is given by the person in charge of the
evacuation.
(vi) If the fire is small, but only if you are trained to do so use fire extinguishers to attempt
to put the fire out.
Page - 50 -