0% found this document useful (0 votes)
103 views15 pages

Unit 4 (B) MCQ

IT402

Uploaded by

kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views15 pages

Unit 4 (B) MCQ

IT402

Uploaded by

kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

UNIT-4

Web Application and Security Class 10 MCQ

Session 1: Working with accessibility options

1. Computer ___________ refers to the user friendliness of a computer system


for all, regardless of their disability.
a. Shortcut Keys b. Accessibility c. Ctrl & Alt Key d. None of the
above

2. What are the different type of impairments that impact computer usage?
a. Dyslexia b. Visual Impairment c. Hearing Impairment d. All of the
above

3. Accessibility options are available in __________.


a. Setting b. Control Panel c. Desktop d. None of the above

4. ___________ is an accessibility feature to help computer users with physical


disabilities, but it is also used by others as a means to reduce repetitive
strain.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above

5. _________ enables the user to hold and release a modifier key, like as Shift,
Ctrl, Alt, or the Windows key, and have it remain active until another key is
pressed.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the
above

6. The __________accessibility function instructs the keyboard to ignore short


or repeated inputs, making typing simpler for those people who have hand
tremors.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above

7. __________ is an accessibility feature for persons with vision impairment or


cognitive problems.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above

8. _________ is turned on, the computer emits sound cues when the locking
keys such as Caps lock, Num lock and Scroll lock are pressed.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above

9. ___________ is designed to help users with auditory impairments.


a. Filter keys b. Toggle Keys c. Sound Sentryd. None of the above

10. When the computer makes a sound, ________ produces visual effects such
as a blinking title bar or a flashing border.
a. Filter keys b. Toggle Keys c. Sound Sentryd. None of the above
11. ___________ directs applications that provide information through sound to
also give information visually, through written captions or informative icons.
a. Filter keys b. Show Sound c. Sound Sentry d. None of the above

12. ___________ is an accessibility feature to assist people with vision


impairment. You can change the text size and color, as well as the
background color, to make it easier to read.
a. High Contrast b. Show Sound c. Sound Sentry d. None of the
above

13. _____________ is also an accessibility feature that assists people with


vision impairment by changing the blink rate and width of the cursor.
a. High Contrast b. Cursor Options c. Sound Sentry d. None of the
above

14. The ____________option uses the keyboard (especially numeric keypad) as


a pointing device instead of a mouse.
a. High Contrast b. Mouse key c. Sound Sentry d. None of the above

15. ____________ is an accessibility feature that assists people that have


difficulty using a keyboard or a mouse (or both). They can use special
devices such as Sip, Puff and Breath Switches to provide input to the
computer through Serial Ports.
a. High Contrast b. Mouse key c. Serial Keys d. None of the above

16. The option in Microsoft Windows XP used for helping users with physical
disabilities and to reduce repetitive strain is ____________________.
a. Toggle Key b. Sticky Key c. Tab Key d. None of the above

17. Sound Sentry is intended to assist users who have ____________


disabilities.
a. Auditory Impairments b. Cognitive Impairments c. Visual
Impairments
d. Dexterity Impairments

18. The High Contrast feature in Microsoft Windows XP is designed to help


persons who have _______________ impairments.
a. Auditory Impairments b. Cognitive Impairments c. Visual
Impairments
d. Dexterity Impairments

19. ___________________ is designed to assist people that have difficulty using a


keyboard or a mouse.
a. KeyboardKeys b. MouseKeys c. TabKeys d. GeneralKeys

Session 2: Networking Fundamentals

20. A ______________ is a collection of computers and other hardware


components interconnected by communication channels that allow sharing
of resources and information.
a. Computer Network b. Computer Sharing c. Computer Receiving d.
None of the above
21. What are the examples of communication channels _________.
a. Cable Wire b. Satellites c. Both a) and b) d. None of the
above

22. Example of computer networks architecture __________.


a. Peer – to – Peer architecture b. Client – Server architecture
c. Both a) and b) d. None of the above

23. Networks in which all computers have an equal status are called
__________.
a. Peer – to – Peer Network b. Client – Server Network
c. Both a) and b) d. None of the above

24. Networks in which certain computers have special dedicated tasks,


providing services to other computers are called__________.
a. Peer – to – Peer Network b. Client – Server Network
c. Both a) and b) d. None of the above

25. The computer provides services called ___________.


a. Client b. Server c. Node d. None of the above

26. The computer uses the services which are provided from the server is
called __________.
a. Client b. Server c. Node d. None of the above

27. What are the major different types of network?


a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above

28. A ____________ is a network that connects computers and gadgets in a


specific geographic area, such as a house, school, computer laboratory,
office building, or group of buildings.
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above

29. A ______________ network is one which covers a broad area across


metropolitan city, regional, or national boundaries.
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above

30. The ___________ is a global network of interconnected computer networks


that serve billions of people worldwide by utilizing the standard Internet
protocol suite.
a. Internet b. Network c. Arpanet d. None of the above

31. WWW stands for ___________.


a. Web World Wide b. World Wide Web c. World Web Wide d. None of
the above

32. WWW is also known as __________.


a. W2 b. W4 c. W3 d. W1
33. __________ is a network of interconnected hypertext documents that may
be accessed via the Internet.
a. World Wide Web b. W3 c. Both a) and b) d. None of the above

34. A ________ is a software program that is used to browse Web sites and
serves as a bridge between the user and the World Wide Web.
a. World Wide Web b. Web Server c. Web Browser d. None of the above

35. What are the advantages associated with networking?


a. Data & File Sharing b. Hardware Sharing c. Internet Sharing d. All of
the above

36. _________ helps to share hardware components such as printers, scanners


etc.
a. Computer Network b. Hardware Network c. Information Network d.None
of the above

37. ISP stands for ___________.


a. Internet Sharing Provider b. Internet Services Provider c. Internet Social
Provider
d. All of the above

38. Example of Internet Service Provider in India ___________.


a. Bharat Sanchar Nigam Limited b. Airtel c. MTS d. All of the
above

39. WiMAX stands for ____________.


a. WorldWide Interoperability for Microwave Access
b. WorldWide Interoperability for Micro Access
c. WorldWide Internet for Microwave Access
d. None of the above

40. DSL stands for ____________.


a. Dynamic Subscriber Line b. Digital Subscriber Line c. Digital Sub Line
d. None of the above

41. ISDN stands for ___________.


a. Integrated Services Digital Network b. Internet Services Dynamic
Network
c. Integrated Sub Digital Network d. Internet Sub Dynamic Network

42. Á __________ is a device that converts digital computer signals into analog
signals that can travel over phone lines.
a. Router b. Modem c. Bridge d. None of the above

43. Modem is also known as ___________.


a. MOdulator/ DEModulator b. Modular/DeModular c. Modulate/DeModulate
d. None of the above

44. Give the example of a Wired internet connectivity channel?


a. DSL b. WiMax c. Wi-Fi d. All of the above
45. Give the example of a Wireless internet connectivity channel?
a. DSL b. Dial – Up c. WiMax d. None of the above

46. __________ Internet access is a form of Internet access that uses the
facilities of the public switched telephone network (PSTN) to establish a
connection to an Internet service provider
a. Dial – up b. 3G c. WiMax d. Wi-Fi

47. __________provide Internet access by transmitting digital data over wires


of a local telephone network.
a. Dial – Up b. Digital Subscriber Link (DSL) c. 3G d. WiMax

48. _________provides wireless communication and mobile broadband


connection across cities and countries.
a. WiMax b. Wi-Fi c. DSL d. None of the above

49. ___________ is a widely used technology that allows electronic devices as


as computers or mobile phones to transmit data wirelessly over a network,
including high-speed Internet connections.
a. WiMax b. Wi-Fi c. DSL d. None of the above

50. How can we transfer data on the internet?


a. Using Box Switching b. Using Packet Switching
c. Using Public Switching d. Using Web Switching

51. The acronym for LAN is _________________.


a. Large Area Network b. Last Area Network c. Local Area Network
d. None of the above

52. Three types of Wired Internet Connectivity are ___________ , _________ &
___________.
a. 3G, DSL, Dial-Up b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi d. WiMax, DSL, Dial-up

53. Three types of Wireless Internet Connectivity are _________ , ___________ &
_________.
a. 3G, DSL, Dial-Up b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi d. WiMax, DSL, Dial-up

Session 3: Introduction to Instant Messaging

54. __________is a form of communication over the Internet that offers an


instantaneous transmission of text-based messages from sender to receiver.
a. Instant Messaging b. Computer Software c. Hardware d. None of the
above

55. Most instant messaging software include the option for


performing________.
a. File transfer b. Audio chat c. Video calling d. All of the above
56. What are the key features of instant messaging ___________.
a. Text Message can be sent to one or more person b. Audio calling and
conferencing
c. Video calling and conferencing d. All of the above

57. Give some examples of application based instant messaging software?


a. Skype b. Yahoo! Messenger c. Rediff Bol d. All of the above

58. Give some examples of web based instant messaging software?


a. Meebo b. Yahoo! Messenger c. IMO d. All of the
above

59. ______________ is a type of Internet communication software that allows


the user for instant transfer of text-based communications from sender to
receiver.
a. Instant Messaging (IM) b. Service Messaging (SM)
c. Fast Messaging (FM) d. None of the above

60. ___________ , ____________ & _______________& Web Camera are required for
audio and video conferencing.
a. Joystick, Computer, Video b. Text, Audio, Video
c. Microphone, Headphone, Speaker d. Touch Screen, Speaker, Microphone

Session 4: Chatting with a contact – Google Talk

61. What are the general rules and etiquettes for chatting?
a. Messages should be short and to the point
b. Always ask first if the other person has time to converse.
c. Typing your message in uppercase is extremely rude
d. All of the above

Session 5: Creating and publishing web pages – Blog

62. A _________ is a discussion-style website that non-technical (or technical)


people use to create personal web sites.
a. Blog b. Website c. Social Media Site d. None of the above

63. ___________ are similar to an online personal diary and simple to use.
a. Blog b. Website c. Social Media Site d. None of the above

64. What are the popular blogs websites on the internet _________.
a. WordPress b. Blogger c. Blog d. All of the above

Session 6: Using Offline blog editors

65. Give an example of offline blog editors _____________.


a. Qumana b. Windows Live Writer c. Blogdesk d. All of the above

Session 7: Online Transactions


66. ___________ deals with transfer of money over the internet.
a. Online transactions b. Offline transactions c. Both a) and b)
d. None of the above

67. Which protocols are used to do the translation process securely?


a. Online Transfer process b. Online Transaction Process c. Both
a) and b)
d. None of the above

68. In what situation online shopping is useful.


a. A customer does not have enough time to go shopping.
b. Visiting a store expenses more than purchasing a product online.
c. A product or service that is not available in the local market only available online
d. All of the above

69. Give some of the popular online transaction websites.


a. IRCTC b. Flipkart c. EBay d. All of the above

Session 8: Internet Security

70. What are the different online threats _________.


a. Phishing b. Email Spoofing c. Chat Spoofing d. All of the above

71. How can you reduce the risks over the internet?
a. Using Antivirus Software b. Fire walls c. Strong Password d. All of
the above

72. Which combination is required to create a strong password.


a. Combination of Alphanumeric b. Combination of Numbers
c. Combination of special characters d. All of the above

73. Do not keep password names such as _______.


a. Favorite color b. Name of your friends & Relatives
c. Don’t use mobile number as password d. All of the above

74. Give the name of the website which can generate strong passwords
automatically?
a. www.strongpasswordgenerator.com b. www.wikipedia.com
c. www.cbseacademic.nic.in d. None of the above

75. __________ software helps to protect your data from unauthorized users.
a. W33 Software b. Encryption Software c. Unlock password
Software
d. None of the above

76. How we can keep our username and password private.


a. Don’t tell username & password to others
b. Don’t share username & password in internet café
c. Always clear browser history & cookies after using
d. All of the above
77. How can I make secure transactions on the internet?
a. Use Antivirus and Antispyware programs b. Your Firewall should be
always ON
c. Open only that website which have a https:// d. All of the above

78. _________ are programs that are created on your local computer when you
visit websites.
a. Firewall b. Cookies c. History d. All of the above

79. __________ can be software or hardware that helps in the security of a


computer and a network.
a. Firewall b. Cookies c. History d. All of the above

80. Web browsers have ___________ designed to store passwords used in


forms on websites.
a. Cookies b. Built – in password management c. History d. None of
the above

Session 9: Maintain workplace safety

81. What basic safety rules to follow at the workplace.


a. Fire Safety & Use of First aid b. Falls and slips c. Electrical Safety
d. All of the above

82. Basic fire safety rules in an organization are __________.


a. Fire escape plans must be installed at proper levels
b. Conduct regular drills & Smoke alarms must be placed
c. Maintenance of safety equipment and No – smoking zone
d. All of the above

83. Basic falls and slips safety rules in an organization are ___________.
a. Maintain a clean and clutter-free working area.
b. Workplace should be ventilated and receive light c. Floors must
be clean and dry
d. All of the above

84. What are the different electrical safety rules?


a. Electrical equipment should be approved by a recognized organization
b. Worker should be trained to handle the electric equipment safely
c. Damaged and hazardous electrical equipment should be immediately replaced
d. All of the above

85. Basic rules of using first aid are ___________.


a. Injured person should calm not to panic
b. Keep them warm if they are under shock
c. In the case of a back/neck injury, do not move the victim.
d. All of the above

Session 10: Prevent accidents and emergencies


86. What are the different types of accidents?
a. Accidents at workplace b. Industrial disease/illness
c. Clinical Accident d. All of the above

87. What protection should organizations take to handle accidents in the


workplace?
a. Safety measures must be placed to prevent workplace accidents
b. Immediately call the medical team for any injury
c. Pay attention to and follow emergency drills
d. All of the above

Session 11: Protect Health and Safety at work

88. What are the different types of hazards include _________.


a. Physical b. Chemical c. Biological d. All of the above

89. __________ is the process of emptying a place in case of an emergency,


disaster.
a. Attention b. Evacuation c. Taking care d. None of the above

90. What evacuation emergency should be followed by every company.


a. Company should have a evacuation policy
b. Organization must have a designated assembly point for emergencies
c. Floor plans with evacuation routes should be pasted in every floor
d. All of the above

91. Give some examples of a healthy lifestyle.


a. Healthy eating habits b. Physical activities c. Stress Management
d. All of the above

92. An organization can face some __________ that could put the lives of the
employees in danger.
a. Issue b. Health Hazards c. Shortage d. None of the above

93. Hazards can be of different types depending on the ________ and the
______________ in which the employees work.
a. Industry, Environment b. Occupation, problem c. Both a) and b) d.
None of the above

94. Organizations must have a designated ______________ for emergencies.


a. Evacuation policy b. Assembly point for emergencies
c. Buddy system for special needs people d. All of the above

95. What does PSTN stand for?


a. Public Switched Telephone Network b. Private Switched Telephone
Network
c. Public Switched Telecom Network d. None of the above

96. What does DSL stand for?


a. Digital Subscriber LAN b. Digital Subscriber telephone Line
c. None of the above d. Digital Subscriber Line
97. What type of information is used for managing accounts in some instant
messaging software, such as Yahoo! Messenger and Windows Live
Messenger?
a. Email addresses b. None of the above c. Mobile Numbers d.
Standard Names

98. Blog is similar to _____________?


a. A book b. A diary c. A notebook d. None of the above

99. What equipment do users need to have for audio and video chat?
a. Speakers b. Web Camera c. Microphone d. All of the above

100. What is the term for messages received in instant messaging software
when the recipient is not logged in?
a. Online Messages b. Real Time Messages c. Offline Messages d. None
of the above

101. Which technology is commonly used for long-distance communication?


a. WiMAX b. DSL c. Dial-up d. Cable Internet Access

102. Which technology is typically preferred in hilly terrain?


a. Dial-up b. Cable Internet Access c. None of the Above d.
WiMAX

103. What does WAP stand for?


a. Wireless Access Pointer b. Wireless Access Point c. None of the
above
d. Wireless Across Point

104. Which technology is commonly used to provide free internet access to


customers in places like hotels and malls?
a. Cable Internet Access
b. WiMAX
c. WiFi
d. Dial-up

105. Which of the following is a form of communication over the internet?


a. Email b. Video Call c. Instant Messaging d. All of the
above

106. Which type of communication offers instantaneous transmission of


text-based messages from sender to receiver?
a. Email b. Traditional Post c. Instant Messaging d. None of
the above

107. Which technology among the options listed is considered a wireless


technology?
a. 3G b. DSL c. Cable Internet Access d. Dial-up
108. Is dial-up connection the fastest type of internet connection?
a. True b. False

109. What can we use blogs to convey messages about?


a. Events b. News c. Reviews d. All of the above

110. Which websites offer free blog services?


a. www.blogger.com b. www.blogsome.com c. www.WordPress.com d. All
of the above

111. Which technology uses the cable TV infrastructure?


a. Dial-up b. Cable Internet Access c. WiMAX d. 3G

112. Which of the following features are commonly found in most instant
messaging software?

a. Video Calling b. File transfer c. Audio Chat d. All of the above

113. Which type of signal is able to travel over phone lines?


a. Analog b. None of the above c. Digital d. Both analog and digital

114. What type of communication does Google Talk provide?


a. Text b. Both a) and b) c. Voice d. None of the above

115. When someone in your Google Talk contact list is online, what color dot
appears next to their name?
a. Red b. Yellow c. Green d. Blue

116. What are some general etiquette guidelines to follow when chatting
online?
a. Give people time to respond. b. Messages should be short and to the
point.
c. Both a) and b) d. None of the above

117. What can we create in WordPress?


a. A website b. A blog c. Both a) and b) d. None of the
above

118. Where does the title come in a blog?


a. At the top b. In between c. At the bottom d. None of the above

120. When can others view a blog post?


a. After creating the post b. After inserting pictures
c. After publishing the post d. After inserting videos

121. Which of the following features are typically found in instant


messaging software?
a. Sending text messages to one or more people b. Audio calling and
conferencing
c. Video calling and conferencing d. All of the above
122. OLTP stands for_____________.
a. Offline Transaction Process b. Online Transaction Procedure
c. Online Transaction Process d. None of the above

123. Customers can pay for online purchases using:


a. Debit Card b. Credit Card c. Internet Banking d. All of the
above

124. Which of the following is an example of application-based instant


messaging software?
a. Google Talk b. Skype c. Both a and b d. None of the above

125. Which of the following are considered online threats?


a. Chat spoofing b. Email spoofing c. Phishing d. All of the above

126. What can be done to reduce the risk of online threats?


a. Install Antivirus software b. Use a strong password
c. Use a Firewall d. All of the above

127. Which of the following password formats is considered to be difficult to


crack?
a. Using a friend’s name as a password b. Using a favorite color as a
password
c. Using a mobile number as a password
d. Using a combination of alphanumeric and special characters as a
password

128. What type of password can help reduce the risk of a security breach?
a. Weak b. Week c. Strong d. None of the above

129. What is the term used to describe software that can transmit every key
pressed on a keyboard to unauthorized users?
a. Keyloggers b. Keylog c. Keypress d. None of the above

130. Which instant messaging software needs to be installed before it can


be used?
a. IMO b. Google Talk c. Meebo d. All of the
above

131. What type of account do you need to use Google Talk?


a. Yahoo b. Skype c. None of the above d. Gmail

132. How can we create a blog offline?


a. By using Qumana b. Either by using any Offline Blog Editor or
Qumana
c. By using any Offline Blog Editor d. None of the above

133. Which of the following is an example of an offline blog editor?


a. Windows Live Writer b. Blogdesk c. Qumana d. All of the above
134. Qumana is a blog editor that is___________.
a. a paid service b. available for free c. shareware d. None
of the above

135. Qumana is known for being:


a. easy to use b. free c. simple d. All of the above

136. To use Yahoo! Messenger, what type of account do you need to have?
a. A Gmail account b. Neither a Yahoo Mail nor Gmail account

c. Both a Yahoo Mail and Gmail account d. A Yahoo Mail account

137. Which of the following instant messaging services provide chat


services?
a. MSN b. Sify c. Rediff d. All of the above

138. Examples of online funds transfer.


a. RTGS b. NEFT c. Both a) and b) d. None of the above

139. The benefits of online transactions.


a. convenience b. speed c. low risk of theft d. All of the above

140. Online shopping is a type of___________.


a. E-Booking b. E-commerce c. E-reservation d. None of the
above

141. The process of transferring money over the internet is referred to


as______________.
a. Online transaction b. Offline transaction c. Both a) and b) d. None of the above

142. What we will do for protection for hackers?


a. Keep the operating system and software applications up to date
b. Clear browser cookies frequently c. Install firewalls d.
All of the above

143. What are cookies?


a. Folders that store website data b. Large files that store website data
c. Small files that store website data d. None of the above

144. What could a firewall be?


a. Hardware b. Software c. Both a) and b) d. None of the
above

145. What are some examples of web browsers?


a. Edge b. Opera c. Mozilla Firefox d. All of the above

146. What are some basic safety rules to follow at the workplace?
a. Fire safety b. Electrical safety c. Falls and slips d. All of the
above
147. What are the basic fire safety rules in an organization?
a. Conduct regular drills b. Smoke alarms must be placed at proper
intervals
c. Both a) and b) d. None of the above

148. What is the general rule to follow for secure online transactions?
a. Use any antivirus and antispyware software b. Share personal information with
the website
c. Use any website for such transactions d. All of the above

149. Which symbol represents a digital certificate indicating a secure


transaction in the web browser’s address bar?
a. Lock b. Key c. Both of the above d. None of the
above

150. Which of the following can help reduce the risk of online threats?
a. Antivirus software b. Strong passwords c. Firewall protection d. All of the
above

151. What is the name of the portal that is commonly used for booking train
tickets?
a. Flipkart b. Redbus c. IRCTC d. EBay

152. What are examples of accidents that can occur in the workplace?
a. Slips and fall accidents. b. Fire accidents. c. Both a) and b) d.
None of the above.

153. Which payment method allows customers to pay for their purchase
after they have received the product?
a. COD b. Credit Card c. Debit Card d. None of the above

154. What does the acronym IRCTC stand for?


a. Indian Railway Catering and Tourist Corporation
b. Indian Railway Catering and Tourism Corporation
c. Indian Railway Catering and Tourism Coordinator
d. None of the above

155. What is the basic rule for keeping the workplace safe from fire?
a. Keep the workplace a no-smoking zone b. Use proper footwear to avoid
falls and slips
c. Ensure proper lighting and visibility d. None of the above

156. A customer is considered to be doing online shopping when___________.


a. a product is available offline at lower rates b. they have sufficient time
to visit a store
c. It costs more to visit a store than to buy anything online. d. None
of the above

157. What is the term for any unexpected situation that needs immediate
attention and action?
a. Emergency. b. Accident. c. Occupational hazard. d. None of the
above.
158. What is the term for a source of any potential harm?
a. Accident. b. Emergency. c. Hazard. d. All of the above.

159. In the context of online shopping, what does the abbreviation COD
stand for?
a. Catch on Delivery b. Cash on Delivery c. Cash Over Delivery d.
None of the above

160. Which of the following is the social and civic responsibility of every
human being?
a. Computer skills. b. First Aid. c. Handling electrical equipment. d. None
of the above.

161. What is our responsibility when checking medical-related items in a


first aid kit?
a. Cost. b. Color. c. Expiry. d. None of the above.

162. What are some of the measures to prevent electrical hazards and
accidents?
a. Use only electrical equipment approved by a recognized organization.
b. Avoid overloading circuits. c. Train workers to handle electric equipment
safely.
d. All of the above.

163. What are the rules of First Aid?


a. Do not move the victim in case of back/neck injury.
b. Assure the injured to remain calm and not to panic.
c. Both a) and b) d. None of the above.

164. What is the term for hazards that occur due to occupation?
a. Chemical hazards. b. Occupational hazards. c. Electrical hazards. d. All of
the above.

165. What are the types of occupational hazards?


a. Biological hazards. b. Physical hazards. c. Ergonomic hazards. d. All
of the above.

166. What is the term for an unfortunate incident that occurs


unintentionally causing hazardous results, injury, or unwanted results?
a. Emergency. b. Accident. c. Hazard. d. None of the above.

You might also like