0% found this document useful (0 votes)
90 views37 pages

PART B UNIT 4 - Web Application and Security

This document contains a set of questions and answers about various topics related to web applications and security. These include questions about networking, instant messaging, blogging, online transactions, internet security best practices, and basic workplace safety rules. There are a total of 33 questions addressed in the document.

Uploaded by

dharmaleahilya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views37 pages

PART B UNIT 4 - Web Application and Security

This document contains a set of questions and answers about various topics related to web applications and security. These include questions about networking, instant messaging, blogging, online transactions, internet security best practices, and basic workplace safety rules. There are a total of 33 questions addressed in the document.

Uploaded by

dharmaleahilya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Unit 4: Web Applications and Security

Fill in the blanks

1. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive
strain is Sticky Keys.

2. Sound Sentry is designed to help users with auditory impairments.

3. The High Contrast option in Microsoft Windows XP is designed to assist people with Vision impairments.

4. Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.

5. The acronym for LAN is Local Area Network.

6. Three types of Wired Internet Connectivity are Dial up , DSL & Cable Internet Access.

7. Instant Messaging is a form of communication over the Internet that offers an instantaneous transmission
of text-based messages from sender to receiver.

8. Microphone , Headsets & Speakers & Web Camera are required for audio and video conferencing.

9. An organization can face some Health Hazards that could put the lives of the employees in danger.

10. Hazards can be of different types depending on the Industry and the Environment in which the employees
work.

11. Organization must have a designated assembly point for emergencies

Q1. Define networking?

Ans. A computer network is a collection of computers that allow sharing of resources and information.

Q2. Give any three advantages of networking.

Ans. Three advantages of networking are :

1. Data Sharing:

2. Files Transfer

3. Hardware Sharing

4. Internet Access Sharing

Q3. Explain the term packet with reference to data transfer.

Ans. Data transfer over the network is divided into small segments called packet. Each packet is sent from
one computer to another computer until it finds its destination.

Q4. Explain Wifi and its significance.


Ans. Wi-Fi stands for wireless fidelity. Wi-Fi is a popular technology that allows an electronic device such as
computers or mobile phones to exchange data wirelessly over a network.

Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide network and
Internet access

Q5. Compare LAN with WAN.

Ans.

LAN WAN

It Stands for Local Area Network It Stands for Wide Area Network

It covers a small geographical area. It spreads across countries.

Q6. Expand the Following terms :

a. DSL : Digital Subscriber Line

b. ISP : Internet Service Provider

c. Modem : Modulator and Demodulator

d. WWW : World Wide Web

e. LAN : Local Area Network

f. MAN : Metropolitan Area Network

g. WAN : Wide Area Network

h. P2P : Peer to Peer

Q7. Explain P2P Architecture and how it is different from Client Server Architecture?

Ans. Networks in which all computers have an equal status are called peer to peer networks. Generally in
such a network each terminal has an equally competent CPU. Networks in which certain computers have
special dedicated tasks, providing services to other computers (in the network) are called client server
networks. The computer(s) which provide services are called servers and the ones that use these services
are called clients.

Q8. List any five application based instant messaging software.

Ans. Five application based instant messaging software are :

 Google Talk

 Yahoo! Messenger

 Skype
 Windows Live Messenger

 Rediff Bol

Q9. What do you mean by instant messages?

Ans. Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.

Q10. Give any three key features of Instant Messaging.

Ans. Three key features of Instant Messaging are :

1. Text Messages can be sent to one or more person

2. Audio calling and conferencing.

3. Video calling and conferencing.

Q11. State any 03 rules and etiquettes to be followed while chatting on the Internet.

Ans. Three rules and etiquettes to be followed while chatting on the Internet are :

1. Messages should be short and to the point.

2. Always introduce yourself by name if your screen name doesn’t reflect it.

3. Always ask if the other person has time to chat first.

Q12. What are the basic needs to use instant messaging (chat) software.

Ans. The basic needs to use instant messaging (chat) software are :

1. A valid instant messaging account.

2. An active internet Connection.

3. A computer and a browser

Q13. What is a blog? Explain its use.

Ans. A blog is a discussion style site used by non-technical (or technical users) users for creating personal
web pages. Blogs are similar to an online personal diary and simple to use.

We can use a blog to convey messages about events, announcements, news, reviews, etc.

Q14. List any 5 websites that provide blog service.

Ans. Five websites that provide blog service are :

1. www.WordPress.com

2. www.blogger.com

3. www.blog.com

4. www.weebly.com
5. www.blogsome.com

Q15. Difference between web page and website.

Ans. A single HTML document is called a web page. A collection of web pages is called web site.

Q16. What do you mean by publishing a post?

Ans. Publishing a post means to make the post public. Once we finished typing the content, we need to
publish the post for others to see. To view the post, you can type the blog address in the address bar of the
web browser.

Q17. Explain the purpose of an offline blog editor.

Ans. When ever we do not have an active internet connection, we can create blogs using a blog application
and publish the blog whenever internet connectivity is available.

Q18. List any five offline blog editors.

Ans. Five Offline blog editors are :

1. Qumana

2. Windows Live Writer

3. Blogdesk

4. MarsEdit

5. BlogJet

Q19. Explain the purpose of Online transactions.

Ans. Online transactions have made transactions very convenient and simplified the workflow in many
forms in a business. Online transactions deals with transfer of money over the internet.

Q20. List any five websites that allow online transactions.

Ans. Five websites that allow online transactions are :

1. IRCTC

2. Flipkart

3. EBay

4. RedBus

5. Amazon

Q21. List any three payment tools to use online transactions.

Ans. Three payment tools to use online transactions are :

1. Credit card

2. Debit Card
3. UPI

4. Net Banking

5. Paytm

6. PhonePe

Q22. Give any two benefits of online transactions.

Ans. Two benefits of online transactions are :

1. Money can be transferred immediately.

2. It helps to reduce black marketing to some extent.

Q23. Explain the purpose of Internet Security.

Ans. Internet security is a branch of computer security specifically related to the Internet. Its objective is to
establish rules and measures to use against attacks over the Internet.

Q24. Explain different kinds of online threats.

Ans. Different online threats are :

1 Phishing

2. Email spoofing

3. Chat spoofing

Q25. Explain the need to clear data stored in browsers.

Ans. Browsers often prompt to save usernames and passwords when users attempt to logon to websites.
Browsers can also store data such as cookies, visited websites or webpages data, browsing history, etc.
However it is not advisable to leave the web browser store this data particularly on public or shared
computers. So it is advisable to clear data stored in browsers particularly on public or shared computers.

Q26. Explain any five tips to manage strong passwords.

Ans. Following are general guidelines for managing strong passwords :

1. Keep the length of the password at least 12-14 characters if permitted.

2. Avoid keeping passwords based on repetition, dictionary words, letter or number sequences,
usernames, relative or pet names, etc.

3. Including numbers, and symbols in passwords if allowed.

4. Use capital and lower-case letters.

5. Avoid using the same password for multiple sites or purposes.

Q27. Explain any four best practices to secure data.

Ans. Four best practices to secure data are :


1. Keeping your username and password private.

2. Use updated antivirus and antispyware software.

3. Clear browser cookies frequently.

4. Do not click on link shared by unknown users.

5. Never install software from unknown sources.

6. Install firewalls

Q28. Explain use of Antivirus and Anti Spyware.

Ans. Antivirus and Antispyware programs offer real-time protection monitoring your computer for any
changes by malware software. Keep your Antivirus and Antispyware software always up to date, this can
help in protecting your computer from any threats.

Q29. Enlist any three basic safety rules to follow at workplace.

Ans. Basic safety rules to follow at workplace –

1. Fire safety

2. Falls and slips

3. Electrical safety.

Q30. Give any two basic safety rules for ensuring Falls and Slips safety.

Ans. Two basic safety rules for ensuring Falls and Slips safety are as follows :

a. Keep the moving area clean and clutter free.

b. Workplace must be proper ventilated receive light.

c. Wear non slippery footwear.

d. Floors must be clean and dry.

Q31. Give any two electrical safety rules in any organization.

Ans. Two electrical safety rules in any organization are as follows :

1. Electrical equipment used should be approved by a recognized organization.

2. Workers should be trained to handle the electric equipment safely.

Q32. Explain any two first aid rules.

Ans. Two first aid rules are :

1. Assure the injured to remain calm and not to panic.

2. Keep them warm if they are under shock.

Q33. What do you mean by occupational hazards?


Ans. An occupational hazard is the illness one may acquire due to his occupation. for example people
working in a chemical factory may get affected due to presence of certain chemicals.

Q34. List any three types of occupational hazards.

Ans. Three types of occupational hazards are as follows :

1. Physical hazards

2. Chemical hazards

3. Biological hazards

Q35. Explain the terms accident and emergency.

Ans. Accident can be defined as an unfortunate incident that occurs unintentionally causing hazardous result
or injury or unwanted results.

Any unexpected situation that needs immediate attention and action is called emergency.

Q36. Enlist any four types of accidents.

Ans. Accidents may be of following types :

1. Accidents at workplace : Slips and fall accidents

2. Industrial disease/illness

3. Road traffic accidents

4. Clinical Accidents

5. Sports related accidents

Q37. Give any three situations of emergency that require evacuation.

Ans. Some of the types of emergencies that require evacuation are:

1. Fire

2. Explosion

3. Floods

4. Earthquake

5. Hurricane

6. Tornado

7. Toxic material release

8. Civil disturbance

9. Workplace violence

Q38. Give any two ways to handle accidents.


Ans. Accidents must be handled carefully. Two ways to handle accidents are : (Write any two)

1. Every organization must follow SOP for accident handling.

2. Safety measures must be placed to prevent workplace accidents.

3. Immediately call the medical team for any injury.

4. Stay Alert

Q39. List any three types of hazards.

Ans. Different types of hazards are as follows : (Write any three)

Physical

Chemical

Biological

Mechanical

Q40. Give a checklist for workstations to minimize the hazards.

Ans. Checklist for Workstations : The workstation should:

1. Provide sufficient space for the user to alter position comfortably.

2. Provide adequate lighting.

3. Have windows fitted with adjustable coverings to alter the sunlight level.

4. Be spacious enough when a workstation is shared by more than one person.

Q41. Explain the term ‘Evacuation Policy’.

Ans. Evacuation Policy means a plan to evacuate a place in case of any emergency or disaster. Evacuation is
the process of emptying a place in case of an emergency, disaster. Every organization must have an
evacuation policy.

Q42. Explain Buddy System to implement evacuation efficiently in case of emergency.

Ans. This system ensures that differently-abled are assisted and guided out of the premises or the impacted
area properly. If you are a buddy to someone, ensure that your buddy is safe at the assembly point with you
in case of any emergency.

Q43. Explain the terms Floor Plans and Assembly /areas.

Ans. Floor Plans means to show evacuation routes in work area. It is the responsibility of all employees or
workers to understand these plans so that they can use in case of any emergency.

Assembly areas : A space where all employees or workers are required to assemble after evacuation.

Q44. Describe the importance of periodic evacuation drills.

Ans. Evacuation drills are very important for all employees or workers so that they know which path they
have to follow to evacuate their floor/room/office in case of any emergency.
Q45. Explain importance of a healthy lifestyle.

Ans. Healthy Lifestyle leads to a healthy being. A healthy living has a lasting impact on an individual at home
as well as at work place. A happy and healthy worker will always perform best to his ability.

Q46. Give any four points of a healthy lifestyle.

Ans. Healthy lifestyle includes : (Write any four)

1 Healthy eating habits

2. Physical activities

3. Stress management

4. Healthy mind

5. Sound sleep

6. Goal setting

MCQ Questions

Q1. Computer Accessibility refers to the user friendliness of a computer system.(T/F)

a. True

b. False

Ans. a. True

Q2. A person with disability or impairment can not use computer. (T/F)

a. True

b. False

Ans. b. False

Q3. Computer Accessibility or friendliness of computer is known as _____________

a. Technology

b. Assistance Technology

c. Assistive Technology

d. None of the above

Ans. c. Assistive Technology

Q4. Identify the cognitive impairment from the following.

a. Dyslexia
b. ADHD

c. Autism

d. All of the above

Ans. d. All of the above

Q5. Keyboard Accessibility options are useful for those which have ______________

a. Physical Disabilities

b. Vision Impairment

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q6. In windows XP we can access accessibility options in __________

a. Control Panel

b. Windows

c. Network

d. MyComputer

Ans. a. Control Panel

Q7. Which of the following tab is not available in Accessibility options window (in Windows XP)

a. Keyboard

b. Display

c. General

d. Volume

Ans. d. Volume

Q8. __________ keys are used to reduce repetitive strain.

a. Filter

b. Toggle

c. Sticky

d. Mouse

Ans. c. Sticky

Q9. Which of the following is/are a modifier key?


a. Alt

b. Ctrl

c. Windows

d. All of the above

Ans. d. All of the above

Q10. Which of the following options allow us to press Ctrl key and ‘A’ key separately.

a. Filter Keys

b. Sticky Key

c. Toggle Keys

d. Mouse Keys

Ans. b. Sticky Key

Q11. Toggle key is a feature of __________

a. Microsoft Office

b. Microsoft Excel

c. Microsoft Word

d. Microsoft Windows

Ans. d. Microsoft Windows

Q12. Toggle Keys is designed for people who have _______

a. Vision Impairment

b. Cognitive Disabilities

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q13. Effect of toggle keys can be checked by pressing ________ key

a. Num lock

b. Caps lock

c. Scroll Lock

d. All of the above

Ans. d. All of the above


Q14. When toggle key is active, the locking keys when switched on produce __________ sound.

a. high

b. low

c. no

Ans. a. high

Q15. Sound Sentry is designed to help users with __________ impairments.

a. Visual

b. Auditory

c. both of the above

d. none of the above

Ans. b. Auditory

Q16. Sound sentry generates visual warnings.(T/F)

a. True

b. False

Ans. a. True

Q17. High Contrast and Cursor Options are available under ______ tab.

a. Keyboard

b. Mouse

c. Display

d. Sound

Ans. c. Display

Q18. Number keys can be used to operate mouse when ____________ is active.

a. KeyboardKeys

b. MouseKeys

c. NumKeys

d. None of the above.

Ans. b. MouseKeys

Q19. Serial keys are helpful for those people who have difficulty to use______

a. Keyboard
b. Mouse

c. All of the above

d. None of the above

Ans. c. All of the above

Q20. Which of the following is not accessibility option?

a. ToggleKeys

b. MouseKeys

c. Sound Sentry

d. Serial Port

Ans. d. Serial Port

Q21. A computer network allows sharing of resources and information.(T/F)

a. True

b. False

Ans. True

Q22. A computer network is a collection of 2 or ________ computers.

a. 2

b. 3

c. 4

d. more

Ans. d. more

Q23. P2P stands for ___________

a. Peer 2 Peer

b. Peer To Peer

c. Pipe To Pipe

d. Pipe 2 Pipe

Ans. b. Peer To Peer

Q24. A Network in which all computers have an equal status is called ___________

a. Peer To Peer

b. Peer 2 Peer
c. LAN

d. P to P

Ans. a. Peer To Peer

Q25. The computer(s) which provide services are called ________

a. Client

b. Main Computer

c. Server

d. None of the Above

Ans. c. Server

Web Application and Security class 10 MCQ Questions

Q26. Networks in which certain computers have special dedicated tasks, providing services to other computers
(in the network) are called

a. Client Network

b. Server Topology

c. Both of the above

d. Client Server Network

Ans. d. Client Server Network

Q27. A computer who make a request for services in Client Server Architecture is called ____________

a. Client

b. Server

c. Both of the above

d. None of the above

Ans. a. Client

Q28.A __________ network is one which connects computers and devices in a limited geographical area such
as home, school etc.

a. MAN

b. WAN

c. LAN

d. None of the above

Ans. c. LAN
Q29. Printer, Scanner can also be connected in Computer network.(T/F)

a. True

b. False

Ans. a. True

Q30. Internet is an example of _______________

a. LAN

b. MAN

c. WAN

d. None of the above

Ans. c. WAN

Q31. Internet is ________

a. network of networks

b. International Network

c. used by businesses, governments, non-profit organizations etc

d. All of the above

Ans. d. All of the above

Q32. WAN stands for _____________

a. Wide Area Network

b. Wide Arial Network

c. Wide Area Networking

d. None of the above

Ans. a. Wide Area Network

Q33. In which network data travel faster?

a. LAN

b. WAN

Ans. A. LAN

Q34. Internet is used by

a. Students

b. Scientist
c. Lecturer

d. All of the above

Ans. d. All of the above

Q35. The _________ is a global system of interconnected computer networks.

a. Intranet

b. Internet

c. ARPANET

d. None of the above

Ans. b. Internet

Web Application and Security class 10 MCQ Questions

Q36. WWW stands for __________

a. World Wide Web master

b. World Wider Web

c. World Wide Web

d. None of the above

Ans. c. World Wide Web

Q37. A web page may contain

a. Images

b. Videos

c. Text

d. All of the above

Ans. d. All of the above

Q38. A web page can be viewed with the help of _______________and _________

a. web browser, active internet

b. protocol, active internet

c. protocol, web browser

d. None of the above

Ans. a. web browser, active internet

Q39. Which of the following is not a web browser?


a. Internet Explorer

b. Mozilla Firefox

c. Safari

d. None of the above

Ans. d. None of the above

Q40. _________ is a computer that stores web sites and their related files for viewing on the Internet.

a. Web Client

b. Web

c. Web Server

d. WWW

Ans. c. Web Server

Q 41. Which of the following files can be shared over network?

a. Text File

b. Spreadsheet

c. Audio File

d. All of the above

Ans. d. All of the above

Q 42. Advantages of Networking are:

a. Data Sharing

b. File Transfer

c. Hardware Sharing

d. All of the above

Ans. d. All of the above

Q 43. Which of the following can be shared over network?

a. Printer

b. Internet

c. Both of the above

d. None of the above

Ans. c. Both of the above


Q 44. ISP stands for ________

a. Internet Service Provider

b. Internet Service Pack

c. Intranet Service Provider

d. Internet Service Packet

Ans. a. Internet Service Provider

Q 45. BSNL stands for _______

a. Bharat Sanchar Nigam Limited

b. Bharat Samachar Nigam Limited

c. Bihar Sanchar Nigam Limited

d. None of the above

Ans. a. Bharat Sanchar Nigam Limited

Web Application and Security class 10 MCQ Questions

Q 46. Common ISP are :

a. Amazon

b. Flipkart

c. Both of the above

d. None of the above

Ans. d. None of the above

Q 47. _____ convert the analog signal to digital and vice versa

a. Switch

b. Router

c. Hub

d. Modem

Ans. d. Modem

Q 48. MODEM stands for ____

a. Model Demodel

b. Modulator Demodulator

c. Modern Demodulate
d. None of the above

Ans. b. Modulator Demodulator

Q 49. Which of the following are the types of common internet connectivity.

a. Dial – up

b. DSL

c. WiMAX

d. All of the above

Ans. d. All of the above

Q 50. Which of the following is a wireless technology?

a. 3G

b. Dial-up

c. DSL

d. Cable Internet Access

Ans. a. 3G

Q 51. Dial up connection is the fastest internet connection.(T/F)

a. True

b. False

Ans. b. False

Q 52. _______ signals can travel over phone lines.

a. Analog

b. Digital

c. Both of the above

d. None of the above

Ans. a. Analog

Q 53. PSTN stands for ________

a. Public Switched Telecom Network

b. Private Switched Telephone Network

c. Public Switched Telephone Network

d. None of the above


Ans. c. Public Switched Telephone Network

Q 54. DSL stands for _____

a. Digital Subscriber LAN

b. Digital Subscriber Line

c. Digital Subscriber telephone Line

d. None of the above

Ans. b. Digital Subscriber Line

Q 55. WiMAX is a _____________ technology.

a. Wireless

b. Wired

Ans. a. Wireless

Q 56. Which of the following technology uses the cable TV infrastructure?

a. WiMAX

b. Dial up

c. Cable Internet Access

d. 3G

Ans. c. Cable Internet Access

Q 57. Which of the following technology is used for long distance?

a. Dial up

b. DSL

c. Cable Internet Access

d. WiMAX

Ans. d. WiMAX

Q 58. Which of the following technology is preferred in hilly terrain?

a. WiMAX

b. Cable Internet Access

c. Dial up

d. None of the Above

Ans. a. WiMAX
Q 59. WAP stands for ________________

a. Wireless Access Pointer

b. Wireless Across Point

c. Wireless Access Point

d. None of the above

Ans. c. Wireless Access Point

Q 60. Which of the following technology is used to provide free internet in hotels, malls etc. to their
customers.

a. WiFi

b. WiMAX

c. Dial up

d. Cable Internet Access

Ans. a. WiFi

Q 61. __ is a form of communication over internet.

a. Instant Messaging

b. Email

c. Video Call

d. All of the above

Ans. d. All of the above

Q 62. _______________ offers instantaneous transmission of text based messages from sender to receiver.

a. Instant Messaging

b. Email

c. Traditional Post

d. None of the above

Ans. a. Instant Messaging

Q 63. Most instant messaging software includes

a. File transfer

b. Video Calling

c. Audio Chat
d. All of the above

Ans. d. All of the above

Q 64. For audio and Video chat users should have ______________

a. Microphone

b. Speakers

c. Web Camera

d. All of the above

Ans. d. All of the above

Q 65. Some instant messaging software allows users to view messages received when they are not logged on.
These are called ___

a. Online Messages

b. Offline Messages

c. Real Time Messages

d. None of the above

Ans. b. Offline Messages

Web Application and Security class 10 MCQ Questions

Q 66. Key Features of an instant messaging are:

a. Text Messages can be sent to one or more person

b. Audio calling and conferencing.

c. Video calling and conferencing.

d. All of the above

Ans. d. All of the above

Q 67. To use instant messaging software, a user must have a valid instant messaging account.(T/F)

a. True

b. False

Ans. a. True

Q 68. __________instant messaging software uses email address for managing account.

a. Yahoo Messenger

b. Whats App
c. Skype

d. None of the above

Ans. a. Yahoo Messenger

Q 69. Which of the following is Application based Instant Messaging Software?

a. Google Talk

b. Skype

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q 70. Which of the following Instant Messaging software should be installed before using it?

a. IMO

b. Meebo

c. Google Talk

d. All of the above

Ans. c. Google Talk

Q 71. Google Talk is a ________ instant messaging service.

a. Free

b. Paid

c. None of the above

Ans. a. Free

Q 72. For using Google Talk, you should have ________ account.

a. Yahoo

b. Gmail

c. Skype

d. None of the above

Ans. b. Gmail

Q 73. Google Talk provides ______________ communication.

a. Text

b. Voice
c. Both Text and Voice

d. None of the above

Ans. c. Both Text and Voice

Q 74. Whenever anyone in the contact list of Google Talk is online, you can see the person along
with_________ dot

a. Red

b. Blue

c. Yellow

d. Green

Ans. d. Green

Q 75. Typing messages in Upper case is considered as rude behavior.(T/F)

a. True

b. False

Ans. a. True

Web Application and Security class 10 MCQ Questions

Q 76. Choose the general etiquette’s to be followed while chatting.

a. Messages should be short and to the point.

b. Give people time to respond.

c. It’s important to properly end an IM conversation

d. All of the above

Ans. d. All of the above

Q 77. Before you start using Yahoo! Messenger, a _______ account is required

a. Yahoo Mail

b. Gmail

c. Both of the above

d. Neither of the above

Ans. a. Yahoo Mail

Q 78. Which of the following provide chat services?

a. MSN
b. Rediff

c. Sify

d. All of the above

Ans. d. All of the above

Q 79. Some instant messaging software such as Yahoo! Messenger, Windows Live Messenger use _______ for
managing the account

a. Standard Names

b. Email addresses

c. Mobile Number

d. None of the above

Ans. b. Email addresses

Q 80. Blogs are similar to an online ____

a. Book

b. Notebook

c. Diary

d. None of the above

Ans. c. Diary

Q 81. We can use blogs to convey messages about ___________

a. events

b. news

c. reviews

d. All of the above

Ans. d. All of the above

Q 82. Websites that offer free blog services are

a. www.WordPress.com

b. www.blogger.com

c. www.blogsome.com

d. All of the above

Ans. d. All of the above


Q 83. In WordPress we can create ___

a. Website

b. Blog

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q 84. Blog address should be unique.(T/F)

a. True

b. False

Ans. a. True

Q 85. Title is coming at the _____ of the blog.

a. Top

b. Bottom

c. In between

d. None of the above

Ans. a. Top

Q 86. A blog is a chronological display of content(T/F)

a. True

b. False

Ans. a. True

Q 87. Themes in WordPress are ______

a. tools to change layout of blog

b. tools to change design of blog

c. both of the above

d. None of the above

Ans. c. both of the above

Q 88. Others can view the blog post only after _____

a. Publishing the post

b. Creating the post


c. Inserting pictures

d. Inserting videos

Ans. a. Publishing the post

Q 89. We can create blog offline using ____

a. any Offline Blog Editor

b. Qumana

c. Either of the above

d. None of the above

Ans. c. Either of the above

Q 90. Which of the following is an offline blog editor?

a. Qumana

b. Windows Live Writer

c. Blogdesk

d. All of the above

Ans. d. All of the above

Q 91. We need an active internet connection to publish the post.(T/F)

a. True

b. False

Ans. a. True

Q 92. Qumana is _________ blog editor.

a. free

b. paid

c. shareware

d. None of the above

Ans. a. free

Q 93. Qumana is _________________

a. free

b. easy to use

c. simple
d. All of the above

Ans. d. All of the above

Q 94. Transfer of money on internet is called ____________

a. Online transaction

b. Offline transaction

c. None of the above

d. Both of the above

Ans. a. Online transaction

Q 95. OLTP stands for ________

a. Offline Transaction Process

b. Online Transaction Process

c. Online Transaction Procedure

d. None of the above

Ans. b. Online Transaction Process

Web Application and Security class 10 MCQ Questions

Q 96. Examples of online funds transfer are _______________

a. NEFT

b. RTGS

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q 97. Benefits of online transaction is/are

a. Fast

b. Convenient

c. Low risk of theft

d. All of the above

Ans. d. All of the above

Q 98. Online shopping is an example of ______________________

a. E-commerce
b. E-Booking

c. E-reservation

d. None of the above

Ans. a. E-commerce

Q 99. Customers can pay online using

a. Credit Card

b. Debit Card

c. Internet Banking

d. All of the above

Ans. d. All of the above

Q 100. A customer is doing Online shopping when

a. A Customer has sufficient time to visit store

b. A product is available offline at lower rates

c. Visiting store is more expensive than purchasing product online

d. None of the above

Ans. c. Visiting store is more expensive than purchasing product online

Q 101. Which portal is used for booking train tickets?

a. Flipkart

b. EBay

c. IRCTC

d. Redbus

Ans. c. IRCTC

Q 102. COD (in reference to online shopping) stands for ____

a. Cash Over Delivery

b. Cash on Delivery

c. Catch on Delivery

d. None of the above

Ans. b. Cash on Delivery

Q 103. Which of the following payment method will allow customer to pay after receiving the product.
a. Debit Card

b. Credit Card

c. COD

d. None of the above

Ans. c. COD

Q 104. IRCTC stands for _________

a. Indian Railway Catering and Tourism Coordinator

b. Indian Railway Catering and Tourism Corporation

c. Indian Railway Catering and Tourist Corporation

d. None of the above

Ans. b. Indian Railway Catering and Tourism Corporation

Q 105. Which of the following are Online threats?

a. Phishing

b. Email spoofing

c. Chat spoofing

d. All of the above

Ans. d. All of the above

Web Application and Security class 10 MCQ Questions

Q 106. Online threats can be reduced by using ________________

a. Antivirus

b. Firewall

c. Strong Password

d. All of the above

Ans. d. All of the above

Q 107. Which of the following passwords is not easy to crack?

a. favorite color as password

b. friends name as password

c. mobile number as password

d. combination of alphanumeric and special characters as password


Ans. d. combination of alphanumeric and special characters

Q 108. Using __________ password can lower the risk of a security breach

a. Weak

b. Strong

c. Week

d. None of the above

Ans. b. Strong

Q 109. www.strongpasswordgenerator.com can generate random strong passwords.(T/F)

a. True

b. False

Ans. a. True

Q 110. ____________ could transmit every key pressed on a keyboard to unauthorized users.

a. Keylog

b. Keyloggers

c. Keypress

d. None of the above

Ans. b. Keyloggers

Q 111. General rule to follow for online secure transactions are

a. Do not share personal information

b. Use antivirus and antispyware software

c. Use only secure websites for such transactions

d. All of the above

Ans. d. All of the above

Q 112. Website uses secure transaction is indicated through a digital certificate represented as a
___________ symbol in the web browser’s address bar.

a. Lock

b. Key

c. Both of the above

d. None of the above


Ans. a. Lock

Q 113. Cookies are _______ that are created on your local computer when you visit websites.

a. small files

b. folder

c. virus

d. None of the above

Ans. a. small files

Q 114. Updated antivirus software helps in protecting your computer from recent threats.(T/F)

a. True

b. False

Ans. a. True

Q 115. Firewalls could be a _______________

a. Software

b. Hardware

c. Either of the above

d. None of the above

Ans. c. Either of the above

Web Application and Security class 10 MCQ Questions

Q 116. Best Practices of computer security are

a. Clear browser cookies frequently

b. Keep the operating system and software applications up to date

c. Install firewalls

d. All of the above

Ans. d. All of the above

Q 117. Examples of Web browsers are _____

a. Edge

b. Mozilla Firefox

c. Opera

d. All of the above


Ans. d. All of the above

Q 118. Basic safety rules to follow at workplace includes

a. Fire safety

b. Falls and slips

c. Electrical safety

d. All of the above

Ans. d. All of the above

Q 119. Basic Fire safety rules in an organization are:

a. Conduct regular drills

b. Smoke alarms must be placed at proper intervals

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q 120. Keep workplace a no-smoking zone is a basic rule of ____

a. Fire Safety

b. Falls and Slips

c. Electrical Safety

d. First Aid

Ans. a. Fire Safety

Q 121. Which of the following are some of the measures to keep ourselves safe from electricity hazards and
accidents?

a. Electrical equipment used should be approved by a recognized organization.

b. Workers should be trained to handle the electric equipment safely

c. Circuits should not be over loaded .

d. All of the above

Ans. d. All of the above

Q 122. Learning ______________ is the social and civic responsibility of every human being.

a. First Aid

b. Computer
c. Handling electrical equipment

d. None of the above

Ans. a. First Aid

Q 123. It is our responsibility to check for the __________ of medical related items in First Aid kit.

a. Cost

b. Expiry

c. Colour

d. None of the above

Ans. b. Expiry

Q 124. Rules of First Aid are :

a. Assure the injured to remain calm and not to panic

b. Do not move the victim in case of back/neck injury

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q 125. Hazard which occur due to occupation is called ____

a. Occupational hazard

b. Chemical Hazard

c. Electrical Hazard

d. All of the above

Ans. a. Occupational hazard

Web Application and Security class 10 MCQ Questions

Q 126. Types of Occupational Hazards are:

a. Physical hazards

b. Biological hazards

c. Ergonomic hazards

d. All of the above

Ans. d. All of the above


Q 127. Unfortunate incident that occurs unintentionally causing hazardous result or injury or unwanted results
is called _____

a. Emergency

b. Hazard

c. Accident

d. None of the above

Ans. c. Accident

Q 128. Examples of accidents at work place are :

a. Slips and fall accidents

b. Fire accidents

c. Both of the above

d. None of the above

Ans. c. Both of the above

Q 129. Any unexpected situation that needs immediate attention and action is called _________

a. Accident

b. Emergency

c. Occupational Hazard

d. None of the above

Ans. b. Emergency

Q 130. Source of any potential harm is called _________

a. Emergency

b. Accident

c. Hazard

d. All of the above

Ans. c. Hazard

Q 131. The process of emptying a place in case of an emergency is called _____________

a. Buddy System

b. Evacuation

c. Leaving the place


d. All of the above

Ans. b. Evacuation

Q 132. _______system ensures that differently-abled are assisted and guided out of the premises in case of
emergency.

a. Friend

b. Relative

c. Buddy

d. Colleague

Ans. c. Buddy

Q 133. Healthy life style includes :

a. Healthy eating habits

b. Sound sleep

c. Physical activities

d. All of the above

Ans. d. All of the above

You might also like