IT Book Chapter Wise
IT Book Chapter Wise
Multiple-choice Questions
(d) Social networking sites
I. .. ts a global 11clwork rhnl conn ects
9. The firsl ever network of comp uters w
hill ions of cnmputcrs nil over rhe world .
(c) JIAN created for _ _ __
(n) LAN
(b) ~IAN \.(..v{lnlern el (a) mililary purposes
(b) business purposes
2. _ _ _ _ is n network ofnelworks.
~ research organizations and universi
~llL 'rnc l (c) Exlranet
(d) A ll of these (d) all of these
(b) lntmnet
10. The first network of computers was knol
J. Fm:h compuler on lhe lnternel is called a
(d) domain number system 46. In a URL. two variable-\ alue pairs are
38. TCP stands for - - - - - - separated,, ith a1an _ _ symbol.
(a) transmission carrier protocol (a) ! (c) @,
\.kl,1' transmission control protocol ~& (d) -
(c) transmission control program 47. The current vers ion of IP is _.
(d) transmission carrier program (a) 4 U46
39. Which of the following statements is not true (b) 5 (d ) 7
about DNS? 48. IP, 6 has a _ _ _ _ bit address.
(a) IP addresses should be assigned statically. (a) 32 ~ 28
(b) Name and address pai r can be cached. (b) 64 ( d ) 256
(c) ISPs haYe the ir own DNS server. 49. _ _ _ _ protocol establishes a connecti
~None of these between the sender and the recei,·er so that
reliable and error-free data transmission c
40. The domain .in belongs to which country? · take place.
·WTCP (C) C DP
(a) Indonesia (c) lceland
(b) fP (d) S~tTP
\Cl,')India (d) fran
50. Segmentation and reassembl~ is done by
41. Which of the fo llowing is true about domain
which protocol?
names?
W-TCP (C) CDP
(a ) org is used for non-profit organizations.
(b) IP (d) S \ ITP
(b) Domain names are also organized from
rig ht to left. 51 _ _ _ _ _ is an altemati,·e protocol to T
(c) mobl is a va lid domain name for mobile. ( a ) FTP ~DP
commun ication network (b) IP (d) S\ITP
\..(<f)A II of these 52. \\"hich transmission protocol is best-smted
42. _ __ _ _ specifies the unique address for for on line computer games. watching\ 1deos
a file tha t is accessi ble on the Internet. onlinc. and listening to audio onlmc?
~ URL (c) UD P/ IP {a) FTP ~CDP
(b) TCP/ IP (d) DNS (b) IP (d) S \ 1TP
43. The syntax for specifying a URL is 53. Iden ti I) the incorrect statement about UDP.
(a) It is preferable for small data exchange:-
~ protocol:/idomain-namc/path ( b) It does 110th ing to correct error~ and sur-
(b) path://dom ain-na me protocol __))Orts unreliable data transfer.
(c) domain-name://protocol/path ~ It is a connection-oriented protocol.
(d) protocol/domain-name, path (d) lt does not break the message 1010 sma •
segments.
Internet and Its Appl/cations
61. Which of the following is incorrect about 71. _ __ _ is done to steal sensitive
Telnet? information available on the computer.
(a) It is a text-based computer protocol. ~Hacking (c) Cracking
(b) Ethical hacking (d) Ethical Cracking
(b) It is insecure because it transfers all data
in clear text. 72. Hacking does not involve _ _ _ __
(c) Users cannot transfer files using Telnet. (a) breaking passwords
\Di(None of these \(p( recovering passwords
(c) illegal use of someone else's email
62. - - - - is a code embedded in a fi le that
account
instructs the web browser how to display th e
(d) harming a computer system
page.
(a) Hyperl ink
,S. ___ _ means finding weaknesses in 80.ThernaincomponentsoflllCllblllM
are __ __ __
a computer or network system for testing
(a) mobile hardware
purpose.
(b) mobile softwa re
(a) Hacking (c) Crack ing
( c) mobile comm unicat ion
~thi cal hacking (d) Ethical cracki ng
\.£a1" all of these
74. _ _ _ _ _ arc known as black hat hackers.
81. Which of the foUowing is not an amrant11..i1
(a) Ethical hackers (c) Cracke rs
(d) Ethical crackers mobile compu ting?
terHa ckers
~Hig hly secure
75. Ethical hackers are also known as _ _ _ __ (b) Enhan ces produc tivity
hackers. (c) Location flexibility
~wh ite hat (c) black hat
(d) Entert ainme nt
(b) red hat (d) grey hat
82. loT connec ts differe nt _ _ _ __
76. Vulnerabilities are presen t in a compu ter due (c) anima ls
(a) object s
to _ _ _ __
(b) machi nes ~ all of these
(a) improp er system configuration
83. _ _ _ is the conce pt of conne cting any
(b) hardware or software flaws
(c2,,.operational weaknesses in a proces s device over the Inrerner.
~) all of these (a) Mobil e compu ting
~loT
77. When an organization does not even reveal to
(c) Intern et
their information securi ty team that they have
(d) Social netwo rking sires
hired ethical hackers to test the effectiveness
of the measu res taken by them , then this is 84. The techno logy used in self-dr i,·ing car. s
called _ _ _ _ _ environment. watch, smart football, and srnan refrige rat
(a) blind \Cwr double blind
(d) All of these (a) mobile compu ting (c) Intern et
(b) single blind
~ l oT (d) Andro id
78. Which of the following statem ents is true
85. Googl e,. Foursq uare. Pimer set. and T,,iner
about ethica l hacker s?
are all examp les of _ _ _ _ __
(a) Ethical hacker s must be provided com-
plete details of the assets. (a) search engine s
(b) Hiring an ethical hacker and trusting him \(!,)' social netwo rking sites
may lead to a massive securi ty breach. (c) video confer encing sites
(c) The ethica l hacke r may place malici ous (d) instan t messa ging sites
code, viruses, rnalware, and other destru c- 86. ___ _ sites are used to share ne,,·s.
tive and bannf ul softwa re on a compu ter interes t, opinio ns. insigh ts. and experienCeS.
system . (a) Search engine s
~A1 1 of these \.,(P-) Social ner\\"orking sires
79. Mobil e comm unicat ion uses _ _ _ __ (c) Video confer encing sites
signal s that are carrie d over the air to intend ed (d) Instan t messa ging sires
device s. 87. Challe nge(s) in SNS includ e _ _ _ __
(a) ultraviolet wave (a) free speech (c) code of condu,~
(b) infrare d wave (b) data leakag e ~ l ofrhes e
~rad io wave 88. Which SNS is used to build social relations
(d) micro wave organ ized aroun d profes sional liYes?
~Lin kedi n (c) Facebook
lntemilt
( d) 1\vitter
\{tr(' unreported endorsements
I, . . is used for c~ating lines of (b) compromising privacy
commurucatton between ordinary individuals (c) effecting company's brand value
and figures of public interest.
(d) violating code of conduct
(a) Linkedln (c) Facebook
93. The term UGC refers to _ __
(b) MySpace (Prl\vitter
(a) user generated content
90• If anyone misbehaves on SNS, then it means (b) getting creative ideas
(c) holding online contests allowing its cus-
(a) misuse of free speech
tomers to submit designs
(b) data leakage
\{µY'all of these
~-violation of code of conduct
94. Giving anonymous and fake feedback just to
(d) fighting on the Internet
cause damage to a company's reputation is
91. Not providing the sources of their infonnation known as - - - - -
when posting on SNS results in
(a) misuse of free speech --- (a) improper anonymity
\Cb(distorted endorsements
(b) data leakage
(c) cybercrime
(c) violation of copyrights
(d) identity theft
W' violating code of conduct
92. Giving any form of compensation to a blogger
or tweeter is considered as
---