0% found this document useful (0 votes)
32 views17 pages

Unit 5 .BO

Uploaded by

rocky194715
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views17 pages

Unit 5 .BO

Uploaded by

rocky194715
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Business organiza on

Unit-5 – computer essen als

Choose the correct answers


1. What was the main func on of the Analy cal Engine designed by Charles Babbage?
a) Data storage
b) Mechanical calcula on
c) Programming
d) All of the above

Answer: d) All of the above

2. In which year was the first computer programming language developed?


a) 1945
b) 1950
c) 1957
d) 1965

Answer: c) 1957

3. Which device is considered the first mechanical computer?


a) Pascaline
b) Abacus
c) Analy cal Engine
d) ENIAC

Answer: b) Abacus

4. Which characteris c of computers refers to their ability to perform tasks without human
interven on?
a) Automa on
b) Accuracy
c) Reliability
d) Speed

Answer: a) Automa on

5. What limits the intelligence of a computer?


a) Hardware
b) So ware
c) Its programming
d) Memory size

Answer: c) Its programming

6. What is the primary advantage of computer memory over human memory?


a) Speed of access
b) Unlimited storage
c) Accuracy in recall
d) Decision-making
Answer: c) Accuracy in recall

7. Computers can process mul ple instruc ons simultaneously. What is this feature called?
a) Mul tasking
b) Automa on
c) Reliability
d) Scalability

Answer: a) Mul tasking

8.In which year was the concept of the computer block diagram first introduced?
a) 1946
b) 1945
c) 1951
d) 1965

Answer: b) 1945
(John von Neumann introduced it in 1945.)

9.Which component of the block diagram was crucial for first-genera on computers (1940-1956)?
a) Vacuum Tubes
b) Transistors
c) Integrated Circuits
d) Microprocessors

Answer: a) Vacuum Tubes

10.What technology forms the basis of the control unit in modern block diagrams (post-1970s)?
a) Transistors
b) Microprocessors
c) Integrated Circuits
d) Ar ficial Intelligence

Answer: b) Microprocessors

11.Which years correspond to the first genera on of computers?


a) 1940-1956
b) 1956-1963
c) 1964-1971
d) 1971-Present

Answer: a) 1940-1956

12.The second genera on of computers (1956-1963) replaced vacuum tubes with:


a) Transistors
b) Microchips
c) Integrated Circuits
d) Ar ficial Intelligence

Answer: a) Transistors

13.The third genera on of computers (1964-1971) introduced:


a) Integrated Circuits
b) Transistors
c) Vacuum Tubes
d) Microprocessors

Answer: a) Integrated Circuits

14.The fourth genera on (1971-Present) is based on:


a) Vacuum Tubes
b) Ar ficial Intelligence
c) Microprocessors
d) Quantum Compu ng

Answer: c) Microprocessors

15.Which genera on (1980-Present) focuses on Ar ficial Intelligence and robo cs?


a) First Genera on
b) Second Genera on
c) Fi h Genera on
d) Fourth Genera on

Answer: c) Fi h Genera on

16.ENIAC, the first electronic general-purpose computer, was developed in:


a) 1943
b) 1946
c) 1951
d) 1964

Answer: b) 1946

17.What does URL stand for?


a) Uniform Resource Locator
b) Universal Resource Locator
c) Unique Resource Locator
d) Unified Resource Locator

Answer: a) Uniform Resource Locator

18.Which of the following is NOT a search engine?


a) Bing
b) Yahoo
c) Facebook
d) Google

Answer: c) Facebook

19.What is the main func on of a web browser?


a) Store data
b) Display web pages
c) Send emails
d) Run programs

Answer: b) Display web pages


20.What is the primary protocol used to transfer web pages?
a) FTP
b) SMTP
c) HTTP
d) IP

Answer: c) HTTP

21.Which of these is NOT an Internet protocol?


a) TCP/IP
b) HTTP
c) SMTP
d) BIOS

Answer: d) BIOS

22.What does ISP stand for?


a) Internet Speed Provider
b) Interna onal Service Provider
c) Internet Service Provider
d) Internal Security Protocol

Answer: c) Internet Service Provider

23.What is the primary purpose of DNS (Domain Name System)?


a) To secure websites
b) To translate domain names into IP addresses
c) To store emails
d) To host web servers

Answer: b) To translate domain names into IP addresses

24.Which one of these is NOT an example of an Internet service?


a) Email
b) Browsing
c) File Management
d) Online Streaming

Answer: c) File Management

25.The Internet originated from which project?


a) ARPANET
b) Google
c) NASA
d) WWW

Answer: a) ARPANET

26.Which type of connec on uses phone lines to access the Internet?


a) Fiber Op c
b) DSL
c) Satellite
d) Wi-Fi
Answer: b) DSL

27.Which of the following is an example of an Internet Service Provider (ISP)?


a) Google Docs
b) Airtel
c) Microso Office
d) Dropbox

Answer: b) Airtel

28.Which type of network is typically limited to a single building or campus?


a) LAN
b) WAN
c) MAN
d) PAN

Answer: a) LAN

29.What does IP stand for in computer networks?


a) Internet Protocol
b) Internal Process
c) Integrated Program
d) Intelligent Packet

Answer: a) Internet Protocol

30.Which of the following is a type of IP address?


a) IPv4 and IPv6
b) HTTP and HTTPS
c) DNS and DHCP
d) ISP and MAC

Answer: a) IPv4 and IPv6

31.What does DNS stand for?


a) Domain Name Service
b) Digital Name System
c) Domain Naming Server
d) Distributed Name System

Answer: a) Domain Name Service

32.Which of the following converts domain names into IP addresses?


a) DHCP
b) DNS
c) ISP
d) URL

Answer: b) DNS

33.Which type of network connects devices within a city?


a) LAN
b) WAN
c) MAN
d) PAN

Answer: c) MAN

34.Which applica on is used for real- me communica on over the Internet?


a) Skype
b) YouTube
c) Dropbox
d) Microso Excel

Answer: a) Skype

35.What is the main purpose of a WAN (Wide Area Network)?


a) Connect devices in a local area
b) Connect mul ple networks over large geographical areas
c) Secure private data
d) Manage personal devices

Answer: b) Connect mul ple networks over large geographical areas

36.Which protocol is used to assign IP addresses dynamically to devices on a network?


a) DNS
b) HTTP
c) DHCP
d) FTP

Answer: c) DHCP

37.What does "digital divide" refer to?


a) Differences in device preferences
b) Gap between those with and without access to technology
c) Internet speed varia ons
d) Ethical hacking prac ces

Answer: b) Gap between those with and without access to technology

38.Which term describes the responsible use of technology and informa on?
a) Cybersecurity
b) Digital Ethics
c) Cyber Forensics
d) Hacking

Answer: b) Digital Ethics

39.Plagiarism is considered unethical because:


a) It involves copying text directly
b) It steals someone’s intellectual property
c) It is not technically advanced
d) It is me-consuming

Answer: b) It steals someone’s intellectual property


40.Which of the following is a type of network security?
a) An virus so ware
b) Firewall
c) Encryp on
d) All of the above

Answer: d) All of the above

41.What does VPN stand for?


a) Virtual Private Network
b) Virtual Public Network
c) Verified Protected Network
d) Virtual Protected Node

Answer: a) Virtual Private Network

42.Which protocol is used to secure data transfer on websites?


a) HTTP
b) HTTPS
c) FTP
d) DHCP

Answer: b) HTTPS

43.Which of the following is NOT a principle of informa on assurance?


a) Confiden ality
b) Integrity
c) Availability
d) Piracy

Answer: d) Piracy

44.Ensuring that data remains unchanged during transmission refers to:


a) Availability
b) Confiden ality
c) Integrity
d) Authen ca on

Answer: c) Integrity

45.What is the key difference between symmetric and asymmetric cryptography?


a) Symmetric uses one key; asymmetric uses two keys
b) Symmetric uses two keys; asymmetric uses one key
c) Symmetric is slower than asymmetric
d) Asymmetric cannot encrypt data

Answer: a) Symmetric uses one key; asymmetric uses two keys

46.Which cryptographic method uses public and private keys?


a) Symmetric encryp on
b) Asymmetric encryp on
c) Block cipher
d) Stream cipher
Answer: b) Asymmetric encryp on

47.Which malware is designed to replicate itself and spread to other computers?


a) Virus
b) Worm
c) Trojan Horse
d) Spyware

Answer: b) Worm

48.Which type of malware disguises itself as legi mate so ware?


a) Virus
b) Trojan Horse
c) Worm
d) Ransomware

Answer: b) Trojan Horse

49.What is the primary func on of a firewall?


a) Protect data from unauthorized access
b) Encrypt network traffic
c) Speed up network performance
d) Monitor user ac vity

Answer: a) Protect data from unauthorized access

50.Firewalls operate at which layers of the OSI model?


a) Applica on and Transport
b) Network and Transport
c) Physical and Data Link
d) Session and Presenta on

Answer: b) Network and Transport

51.Phishing a acks typically target users through:


a) Email or messages
b) Phone calls
c) Social media
d) All of the above

Answer: d) All of the above

52.Which term describes a fake website created to steal personal informa on?
a) Ransomware
b) Spoofing
c) Pharming
d) Keylogging

Answer: c) Pharming

53.What is the purpose of the GDPR (General Data Protec on Regula on)?
a) Monitor Internet usage
b) Protect user data and privacy
c) Restrict online shopping
d) Manage global cybersecurity

Answer: b) Protect user data and privacy

54.Which principle ensures that personal data is only accessible to authorized individuals?
a) Availability
b) Confiden ality
c) Integrity
d) Authen ca on

Answer: b) Confiden ality

55.What does PII stand for in data protec on?


a) Personal Iden fiable Informa on
b) Public Informa on Index
c) Protected Internet Iden ty
d) Private Informa on Integrity

Answer: a) Personal Iden fiable Informa on

56.Which tool is commonly used to anonymize Internet ac vity?


a) VPN
b) Firewall
c) An virus
d) IDS (Intrusion Detec on System)

Answer: a) VPN

Fill in the blanks


1. The CPU, which is also known as the "brain" of the computer, was introduced in the year
______.
Answer: 1971

2. The primary memory (RAM) became widely used in computers a er the year ______.
Answer: 1970

3. The first electronic computer that implemented the basic block diagram was built in the year
______.
Answer: 1945

4. The concept of a control unit was first formalized in the year ______ by John von Neumann.
Answer: 1945

5.The first genera on of computers (_______ to ______) used vacuum tubes for circuitry.
Answer: 1940, 1956

6.The second genera on of computers (_______ to ______) replaced vacuum tubes with
transistors.
Answer: 1956, 1963
7.Integrated Circuits (ICs) were introduced in the third genera on (_______ to ______).
Answer: 1964, 1971

8.The fourth genera on (_______ to ______) is characterized by the use of microprocessors.


Answer: 1971, Present

9.The fi h genera on of computers started in the year ______ and focuses on Ar ficial
Intelligence.
Answer: 1980

10.The internet was first developed in the year ______ as a project by the U.S. Department of
Defense.
Answer: 1969

11.The internet was originally called ______ before it became widely known as the internet.
Answer: ARPANET

12.The World Wide Web (WWW) was invented by ______ in the year 1989.
Answer: Tim Berners-Lee

13.The term "internet" is derived from the combina on of the words "inter" and "network," which
refers to a ______ of networks.
Answer: collec on

14.An Internet Service Provider (ISP) is a company that provides ______ access to the internet.
Answer: broadband

15.Some examples of ISPs include ______, ______, and ______. (Fill in the names of popular ISPs).
Answer: AT&T, Comcast, Verizon

16.A ______ network is a type of network that covers a large geographical area, such as a city,
country, or con nent.
Answer: WAN (Wide Area Network)

17.A ______ network is used to connect computers within a small area, like a single building or
campus.
Answer: LAN (Local Area Network)

18.A ______ network connects devices within a single home or small office, typically using wireless
technology.
Answer: WLAN (Wireless Local Area Network)

19.An IP address is a unique iden fier assigned to each device connected to the internet and is in the
format ______.
Answer: xxx.xxx.xxx.xxx (where "xxx" is a number between 0 and 255)

20. ______ is the prac ce of respec ng and protec ng individual rights, especially in the context of
technology and data.
Answer: Privacy

21.______ is a breach of privacy where personal informa on is misused or exposed without consent.
Answer: Iden ty the
22. Ethical issues in compu ng include concerns about ______, intellectual property rights, and
misuse of technology.
Answer: plagiarism

23. A ______ is a person who exposes unethical or illegal ac vi es within an organiza on, especially
in the context of data misuse.
Answer: whistleblower

24. A ______ is a system designed to prevent unauthorized access to or from a private network.
Answer: firewall

25.______ is the process of securing a network by controlling the flow of data based on
predetermined security rules.
Answer: Network security

26. A ______ a ack involves an unauthorized person a emp ng to access and compromise a
network or system.
Answer: cybera ack

27. The term ______ refers to any so ware that is inten onally designed to cause damage or
disrup on to systems and data.
Answer: malware

28.______ is the prac ce of ensuring the accuracy and reliability of informa on, both in storage and
transmission.
Answer: Data integrity

29.______ involves maintaining the confiden ality of informa on, making sure it is not accessed or
disclosed without authoriza on.
Answer: Privacy

30. The principle of ______ ensures that informa on is accessible when required by authorized
individuals.
Answer: Availability

31.______ refers to verifying the iden ty of a user, device, or system to ensure security.
Answer: Authen ca on

32._____ is a method of protec ng informa on by transforming it into an unreadable format, which


can only be deciphered by authorized par es.
Answer: Cryptography

33. ______ encryp on, the same key is used for both encryp on and decryp on.
Answer: Symmetric

34.______ encryp on, a pair of keys is used—one for encryp on and the other for decryp on.
Answer: Asymmetric

35.______ is a cryptographic technique used to verify the integrity and authen city of a message or
document.
Answer: Digital signature

36.A major advantage of ______ encryp on is that it is generally faster than asymmetric encryp on.
Answer: Symmetric
37.The most common symmetric encryp on algorithm is ______.
Answer: AES (Advanced Encryp on Standard)

38.An example of asymmetric encryp on is ______, which is widely used for secure online
communica on.
Answer: RSA

39.______ is a type of malicious so ware that replicates itself and spreads to other systems without
the user’s consent.
Answer: Virus

40.______ is a type of malware that locks a user's data and demands payment for its release.
Answer: Ransomware

41.______ malware is designed to disrupt or damage the normal func oning of a system, o en by
dele ng files or corrup ng data.
Answer: Trojan

42.A ______ firewall is so ware-based and protects individual devices or networks from
unauthorized access.
Answer: host-based

43.A ______ firewall filters traffic between networks at the packet level and is commonly used in
large organiza ons.
Answer: network-based

44.______ is a technique where cybercriminals deceive individuals into disclosing personal


informa on or login creden als through fake websites or emails.
Answer: Phishing

45.______ is a form of fraud where a ackers use fake caller IDs to impersonate trusted en es and
gain sensi ve informa on.
Answer: Vishing (Voice Phishing)

46.The ______ Act (2018) is a data protec on law in the European Union that regulates how personal
data is collected and processed.
Answer: GDPR (General Data Protec on Regula on)

47._____ is the process of protec ng sensi ve data from unauthorized access, both in transit and at
rest.
Answer: Data encryp on

48. The concept of ______ refers to the ethical and legal responsibility of organiza ons to protect the
privacy of personal data.
Answer: Data protec on

49.______ is a type of protec on that restricts access to sensi ve data by ensuring only authorized
users can view or modify it.
Answer: Access control

50.A ______ firewall monitors and filters incoming and outgoing traffic based on predetermined
security rules to protect a network from unauthorized access.
Answer: firewall
One mark ques os
1. Which unit is responsible for performing arithme c opera ons in a computer?
Answer: Arithme c Logic Unit (ALU)
2. Which unit controls the execu on of instruc ons in a computer?
Answer: Control Unit
3. What is the primary func on of the input unit in a computer?
Answer: To take input from the user.
4. Which component of the computer is responsible for temporarily storing data?
Answer: Memory Unit

5.Which generation of computers used vacuum tubes for processing?


Answer: First Generation

6.Which technology replaced vacuum tubes in the second generation of computers?


Answer: Transistors

7. In which generation of computers were microprocessors introduced?


Answer: Fourth Generation

8.Which generation of computers is based on Artificial Intelligence (AI)?


Answer: Fifth Generation

9.Who is credited with inventing the World Wide Web (WWW)?


Answer: Tim Berners-Lee

10. The first computer network, ARPANET, was developed in which year?
Answer: 1969

11. Which protocol is commonly used for transferring web pages on the internet?
Answer: HTTP (HyperText Transfer Protocol)

12. What does DNS stand for in internet technology?


Answer: Domain Name System

13. Which of the following is an example of an Internet Service Provider (ISP)?


Answer: AT&T
14. ISPs typically provide ________ access to users.
Answer: Internet

15. Type of network connects computers within a single building?


Answer: LAN (Local Area Network)

16.Which type of network spans a large geographical area, like a city or country?
Answer: WAN (Wide Area Network)
17. What does WLAN stand for?
Answer: Wireless Local Area Network

18. Which network connects computers within a small area, like a home or small
office?
Answer: PAN (Personal area Network)

19. An IP address is a unique identifier assigned to each device connected to the internet.
What is the format of an IPv4 address?
Answer: xxx.xxx.xxx.xxx
20. What is the purpose of an IP address?
Answer: To identify a device on the network
21. What is the role of DNS in internet communication?
Answer: It translates domain names to IP addresses.
22. Which part of a domain name represents the organization’s name?
Answer: Second-level domain

23. What is the unethical practice of using someone else's work without permission or
credit?
Answer: Plagiarism
24. Which ethical issue concerns the protection of personal information in digital forms?
Answer: Privacy

25. Which device is used to prevent unauthorized access to a network?


Answer: Firewall
26. What does the term "network security" refer to?
Answer: Protecting networks from unauthorized access and attacks.

27. What principle of information assurance ensures that data is accessible when needed?
Answer: Availability
28. Which term refers to verifying the identity of users or devices?
Answer: Authentication

29. Which algorithm uses the same key for both encryption and decryption?
Answer: Symmetric encryption
30. Which encryption method uses two different keys, one for encryption and another for
decryption?
Answer: Asymmetric encryption

Match the following

Set 1: Matching
Column A Column B Answer

A. Control Unit 1. Stores temporary data for quick access A→3

B. Memory Unit 2. Performs arithme c and logical opera ons B → 1

C. Arithme c Logic Unit (ALU) 3. Decodes and executes instruc ons C→2

D. Input Unit 4. Provides user interac on and data entry D→4

E. Output Unit 5. Displays processed data E→5

Set 2: Matching

Column A Column B Answer

A. Symmetric
1. The use of two different keys for encryp on and decryp on A → 1
Encryp on

2. A type of cyber a ack aimed at tricking users into giving up


B. Phishing B→2
personal informa on

3. So ware or hardware designed to protect networks from


C. Firewall C→3
unauthorized access

4. Malicious so ware that locks a system's files and demands


D. Ransomware D→4
payment for access

5. A unique numerical iden fier assigned to each device


E. IP Address E→5
connected to a network

TRUE or FLASE
1. The second genera on of computers used transistors instead of vacuum tubes. (True
/ False)
Answer: True
2. ADSL is a type of broadband service provided by ISPs. (True / False)
Answer: True
3. Firewalls are used to protect a network from unauthorized access. (True / False)
Answer: True
4. The first genera on of computers used transistors. (True / False)
Answer: False (They used vacuum tubes)
5. The World Wide Web was invented by Tim Berners-Lee in 1989. (True / False)
Answer: True
6. Google is an Internet Service Provider (ISP). (True / False)
Answer: False (Google is a search engine, not an ISP)
7. A MAN (Metropolitan Area Network) connects devices across a city or a large
campus. (True / False)
Answer: True
8. The internet was first developed in the 1990s. (True / False)
Answer: False (It was developed in the late 1960s)
9. Ethical hacking is performed with the permission of the system owner to find
vulnerabili es. (True / False)
Answer: True
10. IPv6 is the most widely used IP version today. (True / False)
Answer: False (IPv4 is more widely used)
11. ARPANET was the first form of the internet. (True / False)
Answer: True
12. Symmetric encryp on uses a pair of keys: one for encryp on and another for
decryp on. (True / False)
Answer: False (That’s asymmetric encryp on)
13. The first domain name was registered in 1990. (True / False)
Answer: False (It was registered in 1985)
14. The control unit is responsible for execu ng arithme c opera ons in a computer.
(True / False)
Answer: False (That’s the job of the ALU)
15. The CPU is responsible for processing data in a computer. (True / False)
Answer: True
16. A WAN (Wide Area Network) covers a small geographical area, such as a single
building. (True / False)
Answer: False (That’s a LAN)
17. The third genera on of computers used microprocessors. (True / False)
Answer: False (They used integrated circuits)
18. The output unit is responsible for taking data from the user. (True / False)
Answer: False (That’s the input unit)
19. Symmetric encryp on is faster than asymmetric encryp on. (True / False)
Answer: True
20. Iden ty the is a breach of privacy where personal informa on is misused or
exposed without consent. (True / False)
Answer: True
21. The memory unit stores data temporarily and permanently. (True / False)
Answer: False (It stores data temporarily)
22. A firewall is used to control the flow of data between networks based on security
rules. (True / False)
Answer: True
23. The fi h genera on of computers focuses on ar ficial intelligence. (True / False)
Answer: True
24. Malware refers to any so ware that is inten onally designed to cause damage or
disrup on to systems and data. (True / False)
Answer: True
25. Privacy is a major ethical concern in the digital world. (True / False)
Answer: True

You might also like