Unit 5 .BO
Unit 5 .BO
Answer: c) 1957
Answer: b) Abacus
4. Which characteris c of computers refers to their ability to perform tasks without human
interven on?
a) Automa on
b) Accuracy
c) Reliability
d) Speed
Answer: a) Automa on
7. Computers can process mul ple instruc ons simultaneously. What is this feature called?
a) Mul tasking
b) Automa on
c) Reliability
d) Scalability
8.In which year was the concept of the computer block diagram first introduced?
a) 1946
b) 1945
c) 1951
d) 1965
Answer: b) 1945
(John von Neumann introduced it in 1945.)
9.Which component of the block diagram was crucial for first-genera on computers (1940-1956)?
a) Vacuum Tubes
b) Transistors
c) Integrated Circuits
d) Microprocessors
10.What technology forms the basis of the control unit in modern block diagrams (post-1970s)?
a) Transistors
b) Microprocessors
c) Integrated Circuits
d) Ar ficial Intelligence
Answer: b) Microprocessors
Answer: a) 1940-1956
Answer: a) Transistors
Answer: c) Microprocessors
Answer: c) Fi h Genera on
Answer: b) 1946
Answer: c) Facebook
Answer: c) HTTP
Answer: d) BIOS
Answer: a) ARPANET
Answer: b) Airtel
Answer: a) LAN
Answer: b) DNS
Answer: c) MAN
Answer: a) Skype
Answer: c) DHCP
38.Which term describes the responsible use of technology and informa on?
a) Cybersecurity
b) Digital Ethics
c) Cyber Forensics
d) Hacking
Answer: b) HTTPS
Answer: d) Piracy
Answer: c) Integrity
Answer: b) Worm
52.Which term describes a fake website created to steal personal informa on?
a) Ransomware
b) Spoofing
c) Pharming
d) Keylogging
Answer: c) Pharming
53.What is the purpose of the GDPR (General Data Protec on Regula on)?
a) Monitor Internet usage
b) Protect user data and privacy
c) Restrict online shopping
d) Manage global cybersecurity
54.Which principle ensures that personal data is only accessible to authorized individuals?
a) Availability
b) Confiden ality
c) Integrity
d) Authen ca on
Answer: a) VPN
2. The primary memory (RAM) became widely used in computers a er the year ______.
Answer: 1970
3. The first electronic computer that implemented the basic block diagram was built in the year
______.
Answer: 1945
4. The concept of a control unit was first formalized in the year ______ by John von Neumann.
Answer: 1945
5.The first genera on of computers (_______ to ______) used vacuum tubes for circuitry.
Answer: 1940, 1956
6.The second genera on of computers (_______ to ______) replaced vacuum tubes with
transistors.
Answer: 1956, 1963
7.Integrated Circuits (ICs) were introduced in the third genera on (_______ to ______).
Answer: 1964, 1971
9.The fi h genera on of computers started in the year ______ and focuses on Ar ficial
Intelligence.
Answer: 1980
10.The internet was first developed in the year ______ as a project by the U.S. Department of
Defense.
Answer: 1969
11.The internet was originally called ______ before it became widely known as the internet.
Answer: ARPANET
12.The World Wide Web (WWW) was invented by ______ in the year 1989.
Answer: Tim Berners-Lee
13.The term "internet" is derived from the combina on of the words "inter" and "network," which
refers to a ______ of networks.
Answer: collec on
14.An Internet Service Provider (ISP) is a company that provides ______ access to the internet.
Answer: broadband
15.Some examples of ISPs include ______, ______, and ______. (Fill in the names of popular ISPs).
Answer: AT&T, Comcast, Verizon
16.A ______ network is a type of network that covers a large geographical area, such as a city,
country, or con nent.
Answer: WAN (Wide Area Network)
17.A ______ network is used to connect computers within a small area, like a single building or
campus.
Answer: LAN (Local Area Network)
18.A ______ network connects devices within a single home or small office, typically using wireless
technology.
Answer: WLAN (Wireless Local Area Network)
19.An IP address is a unique iden fier assigned to each device connected to the internet and is in the
format ______.
Answer: xxx.xxx.xxx.xxx (where "xxx" is a number between 0 and 255)
20. ______ is the prac ce of respec ng and protec ng individual rights, especially in the context of
technology and data.
Answer: Privacy
21.______ is a breach of privacy where personal informa on is misused or exposed without consent.
Answer: Iden ty the
22. Ethical issues in compu ng include concerns about ______, intellectual property rights, and
misuse of technology.
Answer: plagiarism
23. A ______ is a person who exposes unethical or illegal ac vi es within an organiza on, especially
in the context of data misuse.
Answer: whistleblower
24. A ______ is a system designed to prevent unauthorized access to or from a private network.
Answer: firewall
25.______ is the process of securing a network by controlling the flow of data based on
predetermined security rules.
Answer: Network security
26. A ______ a ack involves an unauthorized person a emp ng to access and compromise a
network or system.
Answer: cybera ack
27. The term ______ refers to any so ware that is inten onally designed to cause damage or
disrup on to systems and data.
Answer: malware
28.______ is the prac ce of ensuring the accuracy and reliability of informa on, both in storage and
transmission.
Answer: Data integrity
29.______ involves maintaining the confiden ality of informa on, making sure it is not accessed or
disclosed without authoriza on.
Answer: Privacy
30. The principle of ______ ensures that informa on is accessible when required by authorized
individuals.
Answer: Availability
31.______ refers to verifying the iden ty of a user, device, or system to ensure security.
Answer: Authen ca on
33. ______ encryp on, the same key is used for both encryp on and decryp on.
Answer: Symmetric
34.______ encryp on, a pair of keys is used—one for encryp on and the other for decryp on.
Answer: Asymmetric
35.______ is a cryptographic technique used to verify the integrity and authen city of a message or
document.
Answer: Digital signature
36.A major advantage of ______ encryp on is that it is generally faster than asymmetric encryp on.
Answer: Symmetric
37.The most common symmetric encryp on algorithm is ______.
Answer: AES (Advanced Encryp on Standard)
38.An example of asymmetric encryp on is ______, which is widely used for secure online
communica on.
Answer: RSA
39.______ is a type of malicious so ware that replicates itself and spreads to other systems without
the user’s consent.
Answer: Virus
40.______ is a type of malware that locks a user's data and demands payment for its release.
Answer: Ransomware
41.______ malware is designed to disrupt or damage the normal func oning of a system, o en by
dele ng files or corrup ng data.
Answer: Trojan
42.A ______ firewall is so ware-based and protects individual devices or networks from
unauthorized access.
Answer: host-based
43.A ______ firewall filters traffic between networks at the packet level and is commonly used in
large organiza ons.
Answer: network-based
45.______ is a form of fraud where a ackers use fake caller IDs to impersonate trusted en es and
gain sensi ve informa on.
Answer: Vishing (Voice Phishing)
46.The ______ Act (2018) is a data protec on law in the European Union that regulates how personal
data is collected and processed.
Answer: GDPR (General Data Protec on Regula on)
47._____ is the process of protec ng sensi ve data from unauthorized access, both in transit and at
rest.
Answer: Data encryp on
48. The concept of ______ refers to the ethical and legal responsibility of organiza ons to protect the
privacy of personal data.
Answer: Data protec on
49.______ is a type of protec on that restricts access to sensi ve data by ensuring only authorized
users can view or modify it.
Answer: Access control
50.A ______ firewall monitors and filters incoming and outgoing traffic based on predetermined
security rules to protect a network from unauthorized access.
Answer: firewall
One mark ques os
1. Which unit is responsible for performing arithme c opera ons in a computer?
Answer: Arithme c Logic Unit (ALU)
2. Which unit controls the execu on of instruc ons in a computer?
Answer: Control Unit
3. What is the primary func on of the input unit in a computer?
Answer: To take input from the user.
4. Which component of the computer is responsible for temporarily storing data?
Answer: Memory Unit
10. The first computer network, ARPANET, was developed in which year?
Answer: 1969
11. Which protocol is commonly used for transferring web pages on the internet?
Answer: HTTP (HyperText Transfer Protocol)
16.Which type of network spans a large geographical area, like a city or country?
Answer: WAN (Wide Area Network)
17. What does WLAN stand for?
Answer: Wireless Local Area Network
18. Which network connects computers within a small area, like a home or small
office?
Answer: PAN (Personal area Network)
19. An IP address is a unique identifier assigned to each device connected to the internet.
What is the format of an IPv4 address?
Answer: xxx.xxx.xxx.xxx
20. What is the purpose of an IP address?
Answer: To identify a device on the network
21. What is the role of DNS in internet communication?
Answer: It translates domain names to IP addresses.
22. Which part of a domain name represents the organization’s name?
Answer: Second-level domain
23. What is the unethical practice of using someone else's work without permission or
credit?
Answer: Plagiarism
24. Which ethical issue concerns the protection of personal information in digital forms?
Answer: Privacy
27. What principle of information assurance ensures that data is accessible when needed?
Answer: Availability
28. Which term refers to verifying the identity of users or devices?
Answer: Authentication
29. Which algorithm uses the same key for both encryption and decryption?
Answer: Symmetric encryption
30. Which encryption method uses two different keys, one for encryption and another for
decryption?
Answer: Asymmetric encryption
Set 1: Matching
Column A Column B Answer
C. Arithme c Logic Unit (ALU) 3. Decodes and executes instruc ons C→2
Set 2: Matching
A. Symmetric
1. The use of two different keys for encryp on and decryp on A → 1
Encryp on
TRUE or FLASE
1. The second genera on of computers used transistors instead of vacuum tubes. (True
/ False)
Answer: True
2. ADSL is a type of broadband service provided by ISPs. (True / False)
Answer: True
3. Firewalls are used to protect a network from unauthorized access. (True / False)
Answer: True
4. The first genera on of computers used transistors. (True / False)
Answer: False (They used vacuum tubes)
5. The World Wide Web was invented by Tim Berners-Lee in 1989. (True / False)
Answer: True
6. Google is an Internet Service Provider (ISP). (True / False)
Answer: False (Google is a search engine, not an ISP)
7. A MAN (Metropolitan Area Network) connects devices across a city or a large
campus. (True / False)
Answer: True
8. The internet was first developed in the 1990s. (True / False)
Answer: False (It was developed in the late 1960s)
9. Ethical hacking is performed with the permission of the system owner to find
vulnerabili es. (True / False)
Answer: True
10. IPv6 is the most widely used IP version today. (True / False)
Answer: False (IPv4 is more widely used)
11. ARPANET was the first form of the internet. (True / False)
Answer: True
12. Symmetric encryp on uses a pair of keys: one for encryp on and another for
decryp on. (True / False)
Answer: False (That’s asymmetric encryp on)
13. The first domain name was registered in 1990. (True / False)
Answer: False (It was registered in 1985)
14. The control unit is responsible for execu ng arithme c opera ons in a computer.
(True / False)
Answer: False (That’s the job of the ALU)
15. The CPU is responsible for processing data in a computer. (True / False)
Answer: True
16. A WAN (Wide Area Network) covers a small geographical area, such as a single
building. (True / False)
Answer: False (That’s a LAN)
17. The third genera on of computers used microprocessors. (True / False)
Answer: False (They used integrated circuits)
18. The output unit is responsible for taking data from the user. (True / False)
Answer: False (That’s the input unit)
19. Symmetric encryp on is faster than asymmetric encryp on. (True / False)
Answer: True
20. Iden ty the is a breach of privacy where personal informa on is misused or
exposed without consent. (True / False)
Answer: True
21. The memory unit stores data temporarily and permanently. (True / False)
Answer: False (It stores data temporarily)
22. A firewall is used to control the flow of data between networks based on security
rules. (True / False)
Answer: True
23. The fi h genera on of computers focuses on ar ficial intelligence. (True / False)
Answer: True
24. Malware refers to any so ware that is inten onally designed to cause damage or
disrup on to systems and data. (True / False)
Answer: True
25. Privacy is a major ethical concern in the digital world. (True / False)
Answer: True