0% found this document useful (0 votes)
101 views6 pages

IT Book Chapter Wise

Information technology book pdf Calcutta University sem 3

Uploaded by

sumitgolu991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views6 pages

IT Book Chapter Wise

Information technology book pdf Calcutta University sem 3

Uploaded by

sumitgolu991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Information r.

chnology end ns Applications In Business

Website A collection of web pages on


~b pap A document on the World Wide Web that Wide Web having to do with a particular
can contain text, pictures, movies, sounds, or links lo organization
other pages
World Wide Web An interconnected set of
documcnr s located throughout the Internet

Multiple-choice Questions
(d) Social networking sites
I. .. ts a global 11clwork rhnl conn ects
9. The firsl ever network of comp uters w
hill ions of cnmputcrs nil over rhe world .
(c) JIAN created for _ _ __
(n) LAN
(b) ~IAN \.(..v{lnlern el (a) mililary purposes
(b) business purposes
2. _ _ _ _ is n network ofnelworks.
~ research organizations and universi
~llL 'rnc l (c) Exlranet
(d) A ll of these (d) all of these
(b) lntmnet
10. The first network of computers was knol
J. Fm:h compuler on lhe lnternel is called a

(;)1A RPA NET (c) PICONET


(n) server (c) device
(b) APA RNE T (d) Internet
(b) web pnge \(pY110s1
t 1. _ _ _ _ mean s transmission of mes~
4. _ _ _ provides inrerncl service.
(c) .ISP electronic ally over communication netwc
(a) ASP
(d) JPS (a) Courier services c...ef Emai l
l{J>Y1SP
(b) RTGS (d) SMS
5. ISP slands for - - - - -
12. The address of the email recipient is writ
(n) inlernel service provider
the _ __ _ field.
\9Yfnlernct service program (c) Subject
(a) From
(c) inlrnncl service provider (d) Body
(d) inlranet service program \CbJ To
13. Content of the message is written in the
6. You can share _ _ _ _ _ using the
__ __ field of email.
Interncr.
(a) From (c) Subject
{a) voice messages
(b) To ()aJ Bod y
~ex r messages
(c) video messages 14. The two optional fields of a message are
(d) mult imedia messages
(a) To and From
7. Mozilla Firefox and Opera arc examples of
u!:Y JCC andB CC
(a) ISPs (c) Subject and Body
\(_b.}1veb browsers (d) None of these
(c) email applications 15. When you have to send the same message~
(d) social networking sites multi_ple recipients, then you should ideall_}I
8. _ _ __ _ allow users to browse the ment10n al I the email addresses ( except on
Internet. the _ _ field.
(a) ISPs (a) To ~ef BCC
\JhJWeb browsers (b) CC (d) From
(c) !-:mail applications
tntemet snd n, Appl/cst/OnS

Tho ___ option ollow11 U!lcrK to mukc u (c) link text


16, I (a) high text
COPY of n ntC!Hmgc rccc vcd from u pcrHnn and ( d) anchor text
'9(hypertext
then cmnil it to ,mmconc clHc.
26. WWW was created by _ __
(n) Send ~•or wurd
(b) Rctlly (d) Po11t
(aJ Larry Page
(bJ Bill Oates
17, The • upplicntion ullow<, u<,erHto
~ m Berners-Lec
exchange hies.
(d) Steve Jobs
<n) sM rr (c) UDP
(d) IP
27. Which of the following is not correct about
\jlY(FTI'
onlinc shopping?
18, _ 1s the application using which two
(a) You can make the payment through debit/
users can talk mstanlly.
credit card.
(a) Emai l (c) Hrowsing
(b) Jt can be done 24/7,
UJ,{Chatting (d) Transferring
\iPY'You can touch and feel the products sold
l9. Which of' the following is not a reason for online.
businesses to use instant chatting? (d) There is always a chance of your confiden-
(a) Answer user queries tial information being compromised.
(b) Provide onlinc support
28. IP address is allotted to _ _ _ __
(c)5onduct business meetings
(a) computers (c) printers
~ None of these
(b) smartphones Wfa)I of these
20. During Internet conferencing users cannot 29. _ _ _ _ facilitates unique identification of
share _ __
devices for communication over the Internet.
(a) information (c) video
~ P address (c) MAC address
(b) files W,1onc or these (b) Sequence number (d) Port number
21. _ _ _ is not required for Internet 30. The IP address has _ _ _ parts.
confcrcnci ng. ( a) I ( c) 3
(a) Webcam (bJ 2 \.ld)4
(b) Microphone
31. Each part of the IP address has a number
(c) Chatting software ranging from _ __
~None of these (a) 0- 999 c.cro=:-2ss
22. Newspaper on the Internet is also known as (b) 0- 128 (d) 0-256
32. _ _ _ _ address is issued using a leasing
(a) online newspaper system.
(b) electronic newspaper (a) Static IP (c) Fixed IP
(c) web newspaper (byDynamic IP (d) Permanent IP
W,11 of these 33. _ _ _ address reveals technical information
23. HTML is a _ _ __ about the continent. country, and city in\\ hicb
i{M1anguage (c) application the computer is located.
(b) protocol (d) website Vt7Static IP (c) Temporary IP
24. _ _ _ _ allows users to add links lo other (b) Dynamic IP (d) Momentary IP
documents, graphics, audio, and/or video files. 34. There are limited - - - IP addresses.
(a) FTP ~TML '(M'static (c) temporary
(b) Telnet (d) HTTP (b) dynamic (d) momentary
25. The text on which the mouse pointer changes 35. Web servers are allotted _ _ _ _ IP
to hand-shaped is known as _ _ . address.
lnfonnation Technology and its Applications in Business

\J,a("static ( c) temporary 44. Relative URL contains only the


_ _ _ _ _ _ field.
(b) dynamic ( d) momentary
36. _____ service translates domain names (a) protocol ~domain
into IP addresses. (b) p~th _ (d) ~one of::
(a) TCP \WfDNS 45. Anything following the question martc <?
(b) IP (d) UDP URL is a _ _ _ _ -._
(a) domain-name
37. DNS stands for - - - -
\J«( domain name system (b) protocol
(b) data name server \j.e1", ariable-value pair
(c) data number system (d) path

(d) domain number system 46. In a URL. two variable-\ alue pairs are
38. TCP stands for - - - - - - separated,, ith a1an _ _ symbol.
(a) transmission carrier protocol (a) ! (c) @,
\.kl,1' transmission control protocol ~& (d) -
(c) transmission control program 47. The current vers ion of IP is _.
(d) transmission carrier program (a) 4 U46
39. Which of the following statements is not true (b) 5 (d ) 7
about DNS? 48. IP, 6 has a _ _ _ _ bit address.
(a) IP addresses should be assigned statically. (a) 32 ~ 28
(b) Name and address pai r can be cached. (b) 64 ( d ) 256
(c) ISPs haYe the ir own DNS server. 49. _ _ _ _ protocol establishes a connecti
~None of these between the sender and the recei,·er so that
reliable and error-free data transmission c
40. The domain .in belongs to which country? · take place.
·WTCP (C) C DP
(a) Indonesia (c) lceland
(b) fP (d) S~tTP
\Cl,')India (d) fran
50. Segmentation and reassembl~ is done by
41. Which of the fo llowing is true about domain
which protocol?
names?
W-TCP (C) CDP
(a ) org is used for non-profit organizations.
(b) IP (d) S \ ITP
(b) Domain names are also organized from
rig ht to left. 51 _ _ _ _ _ is an altemati,·e protocol to T
(c) mobl is a va lid domain name for mobile. ( a ) FTP ~DP
commun ication network (b) IP (d) S\ITP
\..(<f)A II of these 52. \\"hich transmission protocol is best-smted
42. _ __ _ _ specifies the unique address for for on line computer games. watching\ 1deos
a file tha t is accessi ble on the Internet. onlinc. and listening to audio onlmc?
~ URL (c) UD P/ IP {a) FTP ~CDP
(b) TCP/ IP (d) DNS (b) IP (d) S \ 1TP
43. The syntax for specifying a URL is 53. Iden ti I) the incorrect statement about UDP.
(a) It is preferable for small data exchange:-
~ protocol:/idomain-namc/path ( b) It does 110th ing to correct error~ and sur-
(b) path://dom ain-na me protocol __))Orts unreliable data transfer.
(c) domain-name://protocol/path ~ It is a connection-oriented protocol.
(d) protocol/domain-name, path (d) lt does not break the message 1010 sma •
segments.
Internet and Its Appl/cations

S4, FTP is not _ _ __


(a) fast (c) efficient (b) Hypertext (d) Image
(b) reliable (a{' connection-less 63. - - - ~ interprets the meaning of
55. FTP allows users to files. markups.
(a) rename (c) delete (a) HTML (c) Web se~ver
(h) copy ~ all of these ~Web browser (d) Web client
S6. In which mode does the client initiate the 64. Which of the following cannot be embed<led
connection? in an IITML page?
~Active connection mode (a) JavaScript ~Visual Basic
(b) PassiYe connection mode (b) VBScript (d) Form
(c) Block mode 65. Which of the foll owing is best-suited for
(d) Stream mode creating an interactive game?
S7. In which mode is the server always waiting for (a) HTM L (c) CSS
any request from the client? (b) JavaScript ~DHTML
(a) Active connection mode 66. Using which language can you create your
~Passive connection mode own tags?
(c) Block mode (a) HTML ~ML
(d) StTeam mode (b) DHTM (d) All of these
58. In which mode are files h·ansferred as a 67. Using which language can arbitrary data
continuous stream with no intervention? structures be easily represented?
(a) Active connection mode (a) HTML w'XML
(b) Passive connection mode (b) DHTM (d) All of these
(c) y 1ock mode 68. Nested tags are used in which language to
~ Stream mode represent hierarchical data?
59. _____ is a text-based protocol that is (a) HTML ~XML
used for accessing a remote computer's (cal led (b) DHTM (d) All of these
host) data and application programs. 69. In which language are tags not pre-defined?
(a) FTP (c) UDP (a) HTML ~ML
X,l.)r'ielnet (d) SMTP (b) DHTM (d) All of these
60. _ _ _ _ enables research scholars and 70. - ---~means finding possible entry
professors to log in to the university's points in a computer system or a computer
computer from any terminal. network to break into it.
(a) FTP (c) UDP \..k<r) Hacking (c) Cracking
\(WTelnet (d) SMTP (b) Ethical hacking (d) Ethical cracking

61. Which of the following is incorrect about 71. _ __ _ is done to steal sensitive
Telnet? information available on the computer.
(a) It is a text-based computer protocol. ~Hacking (c) Cracking
(b) Ethical hacking (d) Ethical Cracking
(b) It is insecure because it transfers all data
in clear text. 72. Hacking does not involve _ _ _ __

(c) Users cannot transfer files using Telnet. (a) breaking passwords
\Di(None of these \(p( recovering passwords
(c) illegal use of someone else's email
62. - - - - is a code embedded in a fi le that
account
instructs the web browser how to display th e
(d) harming a computer system
page.
(a) Hyperl ink
,S. ___ _ means finding weaknesses in 80.ThernaincomponentsoflllCllblllM
are __ __ __
a computer or network system for testing
(a) mobile hardware
purpose.
(b) mobile softwa re
(a) Hacking (c) Crack ing
( c) mobile comm unicat ion
~thi cal hacking (d) Ethical cracki ng
\.£a1" all of these
74. _ _ _ _ _ arc known as black hat hackers.
81. Which of the foUowing is not an amrant11..i1
(a) Ethical hackers (c) Cracke rs
(d) Ethical crackers mobile compu ting?
terHa ckers
~Hig hly secure
75. Ethical hackers are also known as _ _ _ __ (b) Enhan ces produc tivity
hackers. (c) Location flexibility
~wh ite hat (c) black hat
(d) Entert ainme nt
(b) red hat (d) grey hat
82. loT connec ts differe nt _ _ _ __
76. Vulnerabilities are presen t in a compu ter due (c) anima ls
(a) object s
to _ _ _ __
(b) machi nes ~ all of these
(a) improp er system configuration
83. _ _ _ is the conce pt of conne cting any
(b) hardware or software flaws
(c2,,.operational weaknesses in a proces s device over the Inrerner.
~) all of these (a) Mobil e compu ting
~loT
77. When an organization does not even reveal to
(c) Intern et
their information securi ty team that they have
(d) Social netwo rking sires
hired ethical hackers to test the effectiveness
of the measu res taken by them , then this is 84. The techno logy used in self-dr i,·ing car. s
called _ _ _ _ _ environment. watch, smart football, and srnan refrige rat
(a) blind \Cwr double blind
(d) All of these (a) mobile compu ting (c) Intern et
(b) single blind
~ l oT (d) Andro id
78. Which of the following statem ents is true
85. Googl e,. Foursq uare. Pimer set. and T,,iner
about ethica l hacker s?
are all examp les of _ _ _ _ __
(a) Ethical hacker s must be provided com-
plete details of the assets. (a) search engine s
(b) Hiring an ethical hacker and trusting him \(!,)' social netwo rking sites
may lead to a massive securi ty breach. (c) video confer encing sites
(c) The ethica l hacke r may place malici ous (d) instan t messa ging sites
code, viruses, rnalware, and other destru c- 86. ___ _ sites are used to share ne,,·s.
tive and bannf ul softwa re on a compu ter interes t, opinio ns. insigh ts. and experienCeS.
system . (a) Search engine s
~A1 1 of these \.,(P-) Social ner\\"orking sires
79. Mobil e comm unicat ion uses _ _ _ __ (c) Video confer encing sites
signal s that are carrie d over the air to intend ed (d) Instan t messa ging sires
device s. 87. Challe nge(s) in SNS includ e _ _ _ __
(a) ultraviolet wave (a) free speech (c) code of condu,~
(b) infrare d wave (b) data leakag e ~ l ofrhes e
~rad io wave 88. Which SNS is used to build social relations
(d) micro wave organ ized aroun d profes sional liYes?
~Lin kedi n (c) Facebook
lntemilt

( d) 1\vitter
\{tr(' unreported endorsements
I, . . is used for c~ating lines of (b) compromising privacy
commurucatton between ordinary individuals (c) effecting company's brand value
and figures of public interest.
(d) violating code of conduct
(a) Linkedln (c) Facebook
93. The term UGC refers to _ __
(b) MySpace (Prl\vitter
(a) user generated content
90• If anyone misbehaves on SNS, then it means (b) getting creative ideas
(c) holding online contests allowing its cus-
(a) misuse of free speech
tomers to submit designs
(b) data leakage
\{µY'all of these
~-violation of code of conduct
94. Giving anonymous and fake feedback just to
(d) fighting on the Internet
cause damage to a company's reputation is
91. Not providing the sources of their infonnation known as - - - - -
when posting on SNS results in
(a) misuse of free speech --- (a) improper anonymity
\Cb(distorted endorsements
(b) data leakage
(c) cybercrime
(c) violation of copyrights
(d) identity theft
W' violating code of conduct
92. Giving any form of compensation to a blogger
or tweeter is considered as
---

Answers to Multiple-choice Questions


G1
(c)
11.
2. (a) 3. (d) 4. (b) 5. (a) 6. (d) 7. (b) 8. (b) 9. (c) 10. (a)
12. (b) 13. (d) 14. (b) 15. (c) 16. (c) 17. (b) 18. (b) 19. (d) 20. (d)
21 . (d) 22 . (d) 23. (a) 24. (c) 25. (b) 26. (c) 27. (c) 28. {d) 29. (a) 30. (d)
31 . (c) 32. (b) 33. (a) 34. (a) 35. (a) 36. (c) 37. (a) 38. (b) 39. (d) 40. (b)
41. (d) 42 . (a) 43. (a) 44. (c) 45. (c) 46. (b) 47. (c) 48. (c) 49. (a) 50. (a)
51 . (c) 52. (c) 53. (c) 54. (d) 55. (d) 56. (a) 57. (b) 58. (d) 59. (b) 60. (b)
61 . (d) 62 . (c) 63. (b) 64. (c) 65. (d) 66. (c) 67. (c) 68. (c) 69 . (c) 70. (a)
71. (a) 72. (b) 73. (b) 74. (b) 75. (a) 76. (d) 77. (c) 78. (d) 79. (c) 80. (d)
81 . (a) 82. (d) 83. (b.), 84. (b) 85. (b) 86. (b) 87. (d) 88. (a) 89. (d) 90. (c)
91 . {d) 92. ( (a) 93. (~)' 94. (b)

You might also like