STD-12 - CH-1to6 - Computer Studies
STD-12 - CH-1to6 - Computer Studies
STD: 12
Subject: Computer Studies
-----------------------------------------------------------------------------------------------
Ch-1 Creating HTML forms Using KompoZer
Choose the most appropriate option from those given below:
(1) Which of the following is a container used to collect different kinds of inputs from the user ?
(A) Form (B) Webpage (C) Text (D) Input
(2) Which of the following element is used to create an HTML form ?
(A) Textarea (B) Form (C) Select and Option (D) Input
(3) Which of the following is the tag used to implement form element ?
(A) <form>...</form> (B) <form>... <form> (C) </form>...</form> (D)<frm>... </frm>
(4) Which of the following attribute of form is used to specify where to send the form data when the form is
submitted ?
(A) method (B) action (C) submit (D) input
(5) Which of the following attribute of form specifies the HTTP method to be used when sending the data ?
(A) submit (B) action (C) method (D) input
(6) Which of the following values are used b)| method attribute ?
(A) GET and POST (B) GET and SET (C) GET and PUT (D) SET and POST
(7) Which of the following method allows onrjl a limited amount of information to be seni at a time ?
(A) GET (B) POST (C) SET (D)PUT
(8) Which of the following method sends thd data as a block through the HTTP transaction ?
(A) GET (B) SET (C) PUT (D)POST
(9) Which of the following attribute of thd input element specifies the field that is to be created in the form ?
(A) Input (B) Type (C) Name (D)Value
(1O) Which of the following element allow^ multi-line text input ?
(A) Textarea (B) Input (C) Select and Option (D) Form
(11) Which of the following element is used to create a drop down list or menu in a form \
(A) Input (B) Textarea (C) Select (D)Form
(12) Which of the following is a free open source web development IDE ?
(A) HTML (B) KompoZer (C)SciTE (D)Base
(13) Which of the following stands for "WYSIWYG" ?
(A) When You See Is When You Get (B) What You See Is When You Get
(C) What You See Is What You Get (D) When You See Is What You Get
(1) Whose increase in the use has resulted in many activities becoming online ?
(A) Internet (B) Mobile (C) GPS (D) Social Networking
(2) What is used to fill information about various product ?
(A) Server Page (B) Home Page (C) Web Page (D) Master Page
(3) What is used to help the visitors of the website to input data ?
(A) Table (B) Form (C) Database (D) File
(4) What is well organized structure designed to input the required data and information of website is called ?
(A) Database (B) Table (C) Form (D) Report
(5) Which of the following option is true with respect to form ?
(A) Required information are filled in the form.
(B) Well organized input of information is done using form.
(C) Form contains well organized structure. D) NONE OF THESE
(6) The method of adding information in the form of the webpage is similar to which type of form?
(A) Printed form (B) Hand written form (C) Online form (D) Offline form
(7) What does the form allow ?
(A) Interactivity (B) Control in data entry (C) Both (A) and (B) (D) None of these
(8) What is form ? (A)Source Code (B) Object (C) Container (D) Edit
(9) From the list given below, what is used to collect different kinds of inputs from the user ?
(A) Table (B) Report (C) Form (D) Query
(10) Which of the following element does the form contain ?
(A) Label, Check box (B) Text input field, Radio button
(C) Submit button, Reset button (D) All of these
(11) What is the use of various element of form ?
(A) Enter the data (B) Validate the data (C) Both (A) and (B) (D) None of these
(12) Using which of the following a form can be designed easily ?
(A) HTML (B) WordPad (C) XML (D) Form Liner
(13) What is the full form of HTML
(A) Hyper Text Manage Language (B) Hyper Text Markup Language
(C) Hyper Text Marker Language (D) Hyper Text Marking Language
14) how many parts are elements of form divided into?
(A) Two (B) Three (C) Four (D) Five
15) Which from the given below are the elements of form ?
(A) Form, Input (B) Text area (C) Select and Option (D) All of these
16) Which container is used to collect different kinds of inputs from the user ?
(A) Table (B) Form (C) Report (D) Query
17) Which element is used to create an HTML form ?
SHARDAYATAN[E.M.] STD-XII[COMPUTER STUDIES]
(A) form (B) frm (C) frmsrc (D) formset
18) What acts as a container for all the elements used in the form ?
(A) Table (B) Report (C) Form (D) Frame
19) Which tag is used to implement various elements of form ?
(A) <form>...<\form> (B) <form>...</form> (C) <\form>...<\form> (D) </form>...</form>
20) Which from the given below shows the example of use of the form element ?
(A) <form action="anusha.html" </form>
method="post"> (C) <form link= "anusha.html" methods"post">
Input elements Input elements
</form> </form>
(B) <form method="anusha.html" (D) <form web="anusha.html" method="post">
methods"post"> Input elements
Input-elements </form>
21) How many attributes does form tag have ?
(A) Two (B) Three (C) Four (D) Five
22) Which of the given below are the attributes of the form tag ?
(A) action (B) method (C) Both (A) and (B) (D) None of these
23) Which attribute of form element is used to specify where to send the form data when the form is submitted ?
(A) method (B) action (C) (A) or (B) (D) None of these
24) Which attribute of <Form> tag is used to control the processes executing after the form is submitted ?
(A) action (B) method (C) (A) or (B) (D) None of these
25) What does action attribute take as value ?
(A) Website name (B) Name of webserver (C) File name (D) Name of folder
26) After filling the data in the form, the file specified in action attribute is opened when the user clicks on which
button ?
(A) Finish button (B) OK button (C) Reset button (D) Submit button
27) Which attribute of form element specifies the HTTP method to be used when sending the data?
(A) action (B) method (C) (A) or (B) (D) None of these
28) What is the full form of HTTP ?
(A) Hyper Text Taged Protocol (B) Hyper Text Timeline Protocol
(C) Hyper Text Transfer Protocol (D) Hyper Text Terminal Protocol
29) Which attribute decides how to submit the information of form on specified address ?
(A) method (B) action (C) (A) or (B) (D) None of these
30) How many values can method attribute of form element take ?
(A) Two (B) Three (C) Four (D) Five
31) Which values can method attribute of form element take ?
(A) html, http (B) get, post (C) action, method (D) Any of these
32) Which is the default value of method attribute of form element ?
(A) get (B) post (C) action (D) (A) or (B)
33) Which value of method attribute adds the retrieved data from the form to the end of URL and sends to the server ?
(A) post (B) get (C) action (D) All of these
34) What is the full form of URL ?
(A) Uniform Redefine Locator (B) Uniform Rearrange Locator
(C) Uniform Reform Locator (D) Uniform Resource Locator
35) Which of the following shows the use of action attribute ?
(A) To specify the address where the information has to be sent when form is submitted.
(B) To specify the specifications of HTTP
(C) Both (A) and (B) (D) None of these
36) Which value of method attribute provides facility of sending limited information at one time ?
(A) get (B) post (C) action (D) (A) or (B)
37) Which value of method attribute sends information in form of blocks using HTTP transaction ?
(A) post (B)get (C) action (D) All of these
38) Which of the following term provides facility of sending information in form of blocks using HTTP transaction ?
(A) get (B) action (C) post (D) Any of these
39) Which of the following specifies the use of method attribute ?
(A) Specifies the address where the information has to be sent after submitting the form.
B) Specifies the HTTP method. (C) Both (A) and (B) (D) None of these
40) Which value of method attribute sends information in the form of request ?
(A) get (B) post (C) action (D) (A) or (B)
41) Which value of method attribute does not have any restriction of length of information ?
(A) post (B) get (C) action (D) All of these
42) Which elements are used in form ?
(A) Input objects (B) Output objects (C) Process objects (D) All of these
43) Which of the given below is an example of Input element ?
(A) Text box, Password (B) Radio button, Check box
(C) Submit button, Reset button (D) All of these
44) Which tag is used to implement input element in the form ?
(A) <input> (B) <input>….</input> (C) (A) or (B) (D) none of these
45) Which attribute is used along with <input> tag ?
(A) type (B) name (C)value (D) All of these
46) Which attribute of the input element specifies the Held that is to be created in the form ?
(A) type (B) name (C) value (D) All of these
222) What is displayed when OK button of Pagi Title dialog box of File —> Save option clicked ?
(A) Dialog box of Save (B) Dialog box of Save As
(C) Dialog box of Save Page As (D) Dialog box of Page As
223) With which extension a file in KompoZer b saved ?
(A) .htm, .html (B) .hmt, .hmtl (C) .cp, .cmp (D) .pub, .pab
224) With which name shall the page be saved when that page is the home page that will open when you type the
website's URL ?
(A) master.html (B) home.html (C) main.html (D) indexhtml
225) From which toolbar is Heading selected to give title to the form ?
(A) Format Toolbar 1 (B) Format Toolbar 2
(C) Composition Toolbar (D) Edit Mode Toolbar
226) How many types of headings are available in paragraph format of Format Toolbar 1 ?
(A) Four (B) Five (C) Six (D) Seven
227) On which toolbar is Align Center icon which is used to align Form heading in center located ?
(A) Format Toolbar 1 (B) Format Toolbar 2
(C) Composition Toolba (D) Edit Mode Toolbar
228) How many types of alignment for text are available on Format Toolbar 2 ?
(A) Two (B) Three (C) Four (D) Five
229) Which alignment is available for text alignment in KompoZer ?
(A) Align Left, Align Right (B) Align Center
(C) Align Justified (D)A11 of these
230) Which menu-option is used to create label in form ?
(A) Form -> Insert —> Define Label (B) Insert -> Form —> Define Label
(C) Form -> Insert -> Add Label (D) Insert —> Form —> Add Label
231) Which menu-option is used to create label for input field in form ?
(A) Insert -> Form —> Form Field (B) Form —> Insert —> Form Field
(C) Insert -> Form —> Form Input (D) Form —> Insert -> Form Input
232) Which type of field is useful when only one option from the given options is to be selected ?
(A) Radio Button (B) Check Box(C) Text Area (D) (A) or (B)
233) Which menu-option is used to create radio button in form ?
(A) Insert —> Form —> Form Input (B) Form —> Insert —> Form Field
(C) Insert —> Form —> Form Field (D) Form —> Insert —> Form Input
234) When radio button option is selected in Field Type then which option is seen in Field Setting ?
(A) Group Name (B) Field Value (C) Initially Selected (D) All of these
235) Which option should be selected when a radio button should appear selected by default?
(A) Group Name (B) Field Value
(C) Initially Selected (D) Initially Checked
236) How should the name of radio buttons in same group be ?
(A) Same (B) Different (C) Various forms (D) Any of these
237) Which type of field is useful when one or more than one options from the given options are to be selected ?
(A) Radio Button (B) Check Box(C) Text Area (D) (A) or (B)
238) Which menu-option is used to create check box in form ?
(A) Insert -» Form -> Form Input (B) Form —»Insert —> Form Field
(C) Insert —> Form —» Form Field (D) Form —> Insert —» Form Input
239) When check box option is selected in Field Type then which option is seen in Field Setting ?
(A) Field Name (B) Field Value (C) Initially Checked (D) All of these
240) Which option should be selected when a check box should appear selected by default ?
(A) Field Name (B) Field Value (C) Initially Checked (D) Initially Checked
241) Which type of field is used to insert multiline textbox ?
(A) Radio Button (B) Check Box (C) Text Area (D) (A) or (B)
242) Which menu-option is used to create text area field in form ?
(A) Insert —> Form —> Text Area (B) Form —> Insert —> Text Area
(C) Insert -» Field -> Text Area (D) Field -> Insert -> Text Area
243) Which options are displayed in Setting options of text area Properties dialog box when text area field is created in
form ?
(A) Field Name (B) Rows (C) Columns (D) All of these
244) Where is the text written which should be displayed by default in text area field ?
(A) Field Name (B) Initial Text (C) Rows (D) Columns
245) Whose values should be given to create text area field?
(A) Rows, columns (B) Height, Width (C) Top, Bottom (D) Up, Down
246) What should be used when it is not necessary to display all options at a time on the screen ?
(A) Radio Button (B) Check box (C) Drop Down Menu (D) Text area
247) Which menu-option is used to create dropdown menu in form ?
(A) Insert —> Form —> Dropdown List (B) Insert —> Form —> Selection List
(C) Form -> Insert -> Dropdown List (D) Form -> Insert -» Selection List
248) Which options are displayed in Setting List Properties dialog box beneath option drop down menu ?
(A) Text (B) Value (C) Initially Selected (D) All of these
46) Students can view their ........ using the website from anywhere.
(A) results (B) enrolment forms (C) exam schedule (D) all of these
47) Many organizations provide various ........... to be downloaded to use them.
(A) forms (B) information (C) database (D) none of these
48) Companies can also get the information or details about the customers by filling the. ........ online.
(A) forms (B) information (C) database (D) none of these
49) After selling the products, companies provide .......... support to the customer.
(A) physical (B) medical (C) online (D) all of these
50) An online complaint about any sold electronic product is forwarded to the support.
(A) Doctor (B) Member (C) Engineer (D) Teacher
51) The online complaint .......... can be tracked online.
(A) status (B) support (C) maintenance (D) question
52) Software vendors allow their ......... customers to download the recent updates of the software.
(A) legal (B) licensed (C) permitted (D) special
53) Hardware vendors allow their customers to download the device ......... from their website.
(A) model (B) type (C) name (D) driver
54) Another name for Electronic Banking is..........
(A) E-Banking (B) Internet-Banking (C) Net-Banking (D) None of these
55) banking is the process of conducting the banking transactions over the Internet.
(A) Online (B) Offline (C) Click (D) Password
56) With the help of online banking customers can avail the. ......... service.
(A) check account balance at any time. (B) transfer the money from one account to other.
(C) obtain statements for any credit or debit. (D) all of these.
57) In online banking customers cannot...........
(A) physically deposit a cheque (B) find transaction status
(C) pay various bills like telephone, electricity (D) request for a cheque book.
58) For online banking the customer is provided with a. ........ to logon to the bank site.
(A) PAN (B) TIN (C) Password (D) Cheque number
59) The URL of State Bank of India is ...........
(A) www.sbi.com (B) www.sbionline.com(C) www.statebankofindia.com(D) www.onlinesbi.com.
60) With online banking, money can be transferred from one. ........ to another.
(A) website (B) account (C) page (D) file
61) The URL of Central Bank of India is ...........
(A) www.centralbankofindia.com (B) www.centralbankofindia.co.in
(C) www.cbofindia.com (D) www.onlinecbi.com
62) The URL of Bank of Baroda is ...........
(A) www.bankofbaroda.co.in (B) www.bob.com (C) www.bobaroda.com (D) www.onlinebob.com
63) The URL of Indian Overseas Bank is ...........
(A) www.iob.in (B) www.iob.com (C) www.iob.co.in (D) www.onlineiob.com
64) The URL of Dena Bank is ...........
(A) www.denabank.in (B) www.denabank.com(C) www.denabank.co.in(D) www.onlinedenabank.com
65) In ........... commerce, the businesses have to compete within a single industry and limited geographical area.
(A) conventional (B) established (C) physical (D) traditional
66) The products that customers prefer to touch, smell or examine precisely are difficult to sell using ...........
(A) M-commerce (B) Net-Banking (C) E-commerce (D) None of these
67) Buyers are hesitant in buying ........... items using the Internet.
(A) perishable food items (B) expensive jewellery (C) high fashion clothes (D) all of these
68) The arrangement of products, store design and layout is called...........
(A) decoration (B) merchandizing (C) mercantile (D) business
69) A traditional commerce feature is ...........
(A) operates within a certain period of time. (B) hiring of sales persons, sales manager and many more
(C) location renting, advertising, inventory (D) all of these
70) An E-commerce feature is ...........
(A) electronic advertising (B) E-payment system is followed (C) reduces the per transaction cost(D) all of these
71) E-commerce ......... the time taken to perform an overall transaction.
(A) increases (B) reduces (C) browses (D) none of these
72) in India is experiencing a remarkable growth and successfully changing the way people transact.
(A) M-commerce (B) Net-Banking (C) E-commerce (D) None of these
SHARDAYATAN[E.M.] STD-XII[COMPUTER STUDIES]
73) has opened up new horizons and opportunities for millions of people.
(A) M-commerce (B) Net-Banking (C) E-commerce (D) None of these
74) Because of Internet, a drastic change is observed in the lifestyles of ....... parts of India.
(A) urban (B) rural (C) society (D) modern
134) refers to the services and information provided by the government to the business organizations.
(A) G2B (B) G2C (C) G2G (D) G2E
135) A business organization can get all information to business policies from.......... websites.
(A) G2C (B) G2B (C) G2G (D) G2E
136) Various forms can be filled on. ........ website and submitted to the related government office.
(A) G2G (B) G2C (C) G2B (D) G2E
137) .......... is the website of the income tax department of Government of India.
(A) www.incometax.gov.in (B) www.incometaxindia.gov.in
(C) www.incometaxofindia.gov.in (D) All of these
138) The income tax of government of India is an example of ......... website.
(A) G2E (B) G2C (C) G2G (D) G2B
139) ......and....... websites are part of E-governance.
(A) G2B (B) G2C (C) G2E (D) Both (A) and (B)
140) The ......... business model provides good and effective services to the individual citizen.
(A) G2B (B) G2C (C) G2G (D) G2E
141) The ........... website provides information regarding government departments, welfare schemes, application forms
for the citizens.
(A) G2B (B) G2G (C) G2C (D) G2E
142) The Gujarat government has developed its ow network called the...........
(A) Gujarat State Wide Area Network (B) Government State Wide Area Network
(C) Gujarat Service Wide Area Network (D) Government Schemes Wide Area Network
143) The GSWAN website is ...........
(A) www.gswan.gov.in (B) www.gswan.co.in (C) www.gswan.com (D) www.gswan.in
144) ……..refers to online non-commercial communication between the Government agencies and Government
departments.
(A) G2B (B) G2G (C) G2C (D) G2E
145) The sharing of information on........... website helps in reducing IT costs.
(A) G2C (B) G2B (C) G2G (D) G2E
146) .......... and. ........ E-commerce models are the most widely used models.
(A) B2C and B2B (B) G2G and C2C (C) B2B and G2B (D) C2C and B2C
147) In ........... E-commerce model, the consumers are the companies.
(A) B2C (B) B2B (C) C2B (D) C2C
148) In ........... E-commerce model, the consumers are individuals.
(A) B2C (B) B2B (C) C2B (D) C2C
149) Which of the following is a disadvantage of E-commerce ?
(A) Speed (B) Privacy (C) Improved customer service (D) Conduct business 24 x 7
150) Which of the following is not an advantage of E-commerce ?
(A) Lower cost (B) No geographical limitations (C) Conduct business 24 x 7 (D) Lack of trust
Ch-5 Introduction to M-Commerce
1) Which of the following refers to buying and selling of goods or service through the use of Internet enabled
wireless devices ?
(A) Internet (B) M-Commerce (C) M-banking (D) WWW
2) Which of the following is the use of technologies which provide the location information for business purpose?
(A) E-Commerce (B) M-Commerce (C) L-Commerce (D) Traditional Commerce
3) Which of the following stands for GPS ?
(A) Global Positioning System (B) Global Postal System
(C) Grand Positioning System (D) Google Positioning System
4) Which of the following security aspect refers to the secrecy of the information so that unauthorized user cannot
read it ?
(A) Confidentiality (B) Integrity (C) Non-repudiation (D) Authorization
5) Which of the following security aspect ensures that the information must not be accidentally or maliciously
altered or tampered in transit ?
(A) Confidentiality (B) Integrity (C) Non-repudiation (D)Authorization
6) Which of the following security aspect ensures that only authentic users are allowed to use the system ?
(A) Authorization (B) Confidentiality (C) Non-repudiation (D) Integrity
7) Which of the following security aspect ensures that the sender of the message cannot deny that he/she has sent the
message ?
96) The transmissions in the process of online purchase occur on the public network, called the ...........
(A) server (B) internet (C) website (D) desktop PC
97) A........... can steal or tamper information anywhere in the world via his computer.
(A) friend (B) acquaintance (C) server (D) intruder
98) Anybody can create new programs and run them on remote computers causing it to..........
(A) improve (B) malfunction (C) break down (D) recover
99) All the E-commerce / M-commerce websites have to keep their customer's personal data very...........
(A) safe (B) unsafe (C) insecurely (D) risky
100) All the E-commerce / M-commerce websites have a lot of ......... issues.
(A) defense (B) safety (C) security (D) attack
101) Which of the following does E-commerce deals with ?
(A) Online Banking (B) Electronic transactions (C) Using debit / credit cards (D) All of these
102) The E-commerce / M-commerce websites have more risk of being targeted by ......... than the normal websites.
(A) friends (B) acquaintances (C) servers (D) intruders
103) The E-commerce / M-commerce security must meet ......... important aspects.
(A) two (B) four (C) six (D) eight
104)refers to the secrecy of the information so that unauthorized user cannot read the personal information.
(A) Confidentiality (B) Secrecy (C) Unauthorized user (D) Intruders
105)protects the data from private attacks and ensures that the message is not revealed or leaked.
(A) Decrypting (B) Cryptography (C) Encryption (D) All of these
106)helps in protecting the confidential data like credit card number.
(A) Decrypting (B) Cryptography (C) Encryption (D) All of these
107) Confidentiality is achieved by using .......... in which all messages transmitted are encrypted.
(A) Decrypting (B) Coding (C) Cryptography (D) Encryption
108)ensures that the information must not accidentally or maliciously altered or tampered in transit.
(A) Confidentiality (B) Authorization (C) Non-repudiation (D) Integrity
109)ensures that only authentic users are allowed to use the system.
(A) Confidentiality (B) Authorization (C) Non-repudiation (D) Integrity
110)ensures that the sender of the message cannot deny that he/she has sent the message.
(A) Confidentiality (B) Authorization (C) Non-repudiation (D) Integrity
111) Non-repudiation is usually accomplished via digital...........
(A) signatures (B) partners (C) messages (D) security
112) Full form of TTP is ..........
(A) Trusted Third Party (B) Trustworthy Third Person
(C) Trustfull Third Party (D) Trustees Third Party
113)code is one that causes damage to a computer or system.
(A) Programming (B) Unwanted (C) Malicious (D) Cruel
114) A........... is a program that uses Internet to record information that passes through a computer or router in transit
from sender to receiver.
(A) Tapper (B) Sniffer (C) Recorder (D) Router
115)programs can read e-mail messages, user login, password and credit card numbers.
(A) Tapper (B) Sniffer (C) Recorder (D) Router
116) A......... attack is an attack used to shut down a machine or network, making it inaccessible to its intended users.
(A) Denial-of-Service (B) Targeting (C) Connection (D) Vandalism
117)is the electronic defacing of an existing website page.
(A) Denial-of-Service (B) Sniffing (C) Cyber Vandalism (D) Spoofing
118)is pretending to be someone you are not, or representing a website as authentic when it is actually a fake.
(A) Denial-of-Service (B) Sniffing (C) Cyber Vandalism (D) Spoofing
119) A website attacker can create a fake website and substitute his............ address for the real website address.
(A) IP (B) DOS (C) TCP (D) TTP
120)software is a computer program that detects, prevents and takes action to remove the malicious codes from
the infected system.
(A) Trojan (B) Worms (C) Antivirus (D) Virus
121)is a type of virus.
(A) Trojan (B) Trojan horses (C) Virus (D) Cyber crime
122) A......... can delete the files and slow down the computer system.
(A) Software (B) Code (C) Antivirus (D) Virus
123) Once a system is infected by .......... , it can spread by attaching to other programs and files within the system.
(A) Software (B) Code (C) Antivirus (D) Virus
SHARDAYATAN[E.M.] STD-XII[COMPUTER STUDIES]
124) Infections on a computer system can easily spread through Internet...........
(A) downloads (B) code (C) programs (D) attachment
125) The ......... software scans the downloaded files and the entire computer system in order to detect the presence of an
infection. (A) Software (B) Code (C) Antivirus (D) Virus
126 ..................software is critical to be installed and kept updated regularly on the computer.
(A) Software (B) Code (C) Antivirus (D) Virus
127) The most commonly used network protection barrier between company's network and the outside world is a.........
(A) Wall (B) Firewall (C) Antivirus (D) Soft wall
128)is a device placed between the network and the Internet to monitor and control the website traffic.
(A) Firewall (B) Router (C) BusBar (D) Computer
129) The primary goal of a........is to keep intruders away from the company's E-commerce infrastructure.
(A) Firewall (B) Router (C) BusBar (D) Computer
130) A......... ensures that the company's crucial data is kept safe and not accessed by the intruders.
(A) Firewall (B) Router (C) BusBar (D) Computer
131) Infected. ........ to the emails can be in the form of pictures, videos, sound clips or any other type of file.
(A) downloads (B) attachments (C) programs (D) websites
132) Which of the following is protected by a firewall ?
(A) Email services (B) Undesirable material (C) Unauthorized persons (D) All of these
133) A firewall ........... from any type of network attack.
(A) blocks (B) unprotect (C) protects (D) saves
134) Digital ......... are used for proving our identity in electronic transactions.
(A) Certificates (B) ID (C) Both (A) and (B) (D) Authority
135) A.......... is issued by a trusted third party to establish the identity of the holder.
(A) Digital Certificate (B) Digital Data (C) Digital Signature (D) Digital Service
136)is the third party who issues the Digital Certificates.
(A) Certification Authority (B) Certification Owner (C) Certification holder (D) Certification key
137) Which of the following is contained in the Digital Certificate ?
(A) Holder's name (B) Serial number (C) Expiration date (D) All of these
138) A .......... also holds a copy of the certificate holder's public key.
(A) Digital Certificate (B) Digital answer (C) Digital Sign (D) All of these
139) The holder's public key is used for...........messages and digital signatures.
(A) decrypting (B) encrypting (C) crypted (D) none of these
140)is an art of protecting the information by transforming it into an unreadable form.
(A) Decryption (B) Encryption (C) Cryptography (D) All of these
141)is the transformation of normal text known as "plain text" into unreadable or secret text.
(A) Decryption (B) Encryption (C) Cryptography (D) All of these
142) The secret text is called the. ........ text.
(A) Hidden (B) Plain (C) Cipher (D) Coded
143) The secret text is converted into............text using encryption algorithm.
(A) hidden (B) plain (C) cipher (D) coded
144) A......... key is used to encrypt and decrypt a message.
(A) secret (B) plain (C) cipher (D) coded
145) Messages are. ........ just before they are sent on the internet or network.
(A) coded (B) encrypted (C) ciphered (D) none of these
146)is the reverse of encryption.
(A) Decryption (B) Encryption (C) Cryption (D) All of these
147)is the transformation of encrypted text back into normal text.
(A) Decryption (B) Encryption (C) Cryption (D) All of these
148) The key answer to the following encryption is : SCIENCE = TDJFODF
(A) Shift by 4 (B) Shift by 3 (C) Shift by 2 (D) Shift by 1
149)protocol is used for securing web transactions on the Internet.
(A) SSI (B) SSL (C) SST (D) SSR
150) Full form of SSL is ...........
(A) Security Safe Layer (B) Safe Secure Layer(C) Secure Socket Layer(D) Socket Safe Layer
151) Protocol SSL was developed by...........
(A) Netscape (B) Microsoft (C) Oracle (D) Google
152) If a website is secured, then the security logo of............ is displayed on the login screen of the secured site.
(A) Sign (B) VSign (C) VerySign (D) VeriSign
153) An indication of a secure website is that its site address starts from...........
(A) Tcpip:// (B) http:// (C) https:// (D) All of these
154) E-commerce and M-commerce provide opportunities to improve the..........processes.
(A) business (B) wor (C) employment (D) vocation
155) Many countries have established ............. framework for the electronic commerce.
SHARDAYATAN[E.M.] STD-XII[COMPUTER STUDIES]
(A) Official (B) Legal (C) Certified (D) Verified
156) Indian government has also established the ........... laws under the IT act.
(A) income tax (B) information tax (C) information technology (D) all of these
157) Enforcement of........... rules and regulations provides confidence to the customers that their personal information
remains secret and will not be misused.
(A) official (B) business (C) companies (D) legal
158) Companies making online business are getting legal support in case of misuse of their logos or any ........ materials.
(A) copyright (B) printed (C) fixed (D) secret
159) The ......... property includes books, software's, music, video, copyrights, trademarks and web pages.
(A) scholar (B) intellectual (C) thinker (D) intelligent
160)provides the author with a tool to protect his/her original work from being used or taken by others without
permission.
(A) Patent (B) Rights (C) Copyright (D) The law
161)is applicable to books, software programs and articles.
(A) Patent (B) Rights (C) Copyright (D) The law
162) Copyright law protects intellectual ......... in its various forms and cannot be used freely.
(A) information (B) data (C) assets (D) property
163) It is very difficult to protect ......... property in E-commerce or M-commerce.
(A) scholarly (B) intellectual (C) thinker (D) intelligent
164) Almost all web pages are protected by...........
(A) patent (B) rights (C) copyright (D) the law
165) Copying contents from the website also violets copyright ...........
(A) patent (B) rights (C) copyright (D) the law
166) A......... may be designated by the symbols TM or SM.
(A) trademark (B) copyright (C) symbol (D) image
167) A specific logo, word, symbol, design, phrase or image can be used as a...........
(A) trademark (B) copyright (C) symbol (D) image
168) The competition over domain names is a.......... issue.
(A) illegal (B) legal (C) authorized (D) unauthorized
169) When, the Registered Domain names which are not in use are sold, it is known as ..........squatting.
(A) cyber (B) online (C) virtual (D) domain
170)is the process of hiding information within other information.
(A) Concealing (B) Hiding (C) Stegangraphy (D) Masking
171)works by replacing unused data in computer files such as images, sound or text with invisible information.
(A) Concealing (B) Hiding (C) Stegangraphy (D) Masking
172) There are ........... versions of Stegangraphy, available on Internet, which can be easily downloaded.
(A) hidden (B) invisible (C) shareware (D) freeware
173) The ........... is a digital code inserted into a digital image, audio or video file which can identify the file's copyright
information.
(A) transparent mark (B) invisible mark (C) translucent mark (D) watermark
174) The ........... allows hiding information in a totally invisible manner.
(A) transparent mark (B) invisible mark (C) translucent mark (D) water mark
175) Currently, the ........... distribution of digital audio over the Internet in the MP3 format is a big problem.
(A) unauthorized (B) authorized (C) legal (D) illegal
176)watermarking can link information on the documents.
(A) Hybrid (B) Digital (C) Analog (D) Internet
177) A visible digital watermark can be added to any image using photo editor tools like...........
(A) GMIP (B) GPIM (C) GIMP (D) GMIP
178)is one of the most important aspects of E-commerce and M-commerce.
(A) Payment (B) Disbursement (C) Compensation (D) Expense
179)payments involve cash, cheque or credit card.
(A) Usual (B) Traditional (C) Customary (D) Established
180) Electronic payment systems have become more important to the. ........ business processes.
(A) traditional (B) shopping (C) cards (D) online
181) The different types of payment systems used are ...........
(A) Smart cards (B) Credit cards (C) Debit cards (D) All of these
182) The payment cards can be classified into. ......... types of cards.
(A) one (B) two (C) three (D) four
183)card payment method is one of the most popular and widely accepted methods of payment on Internet.
(A) Credit (B) Debit (C) Smart (D) Payment
184) A credit card is issued to the customers by the banks known as ......... banks.
(A) issuing (B) online (C) card (D) smart
185)card or Visa are established and reputed financial institutions in the services of credit card business.
SHARDAYATAN[E.M.] STD-XII[COMPUTER STUDIES]
(A) Head (B) Principal (C) Smart (D) Master
186) In Credit Card transactions ..........parties are involved.
(A) one (B) two (C) three (D) four
187) The ........... bank issues the credit card and guarantees the payment to the merchant.
(A) issuing (B) online (C) card (D) smart
188) The ........... bank establishes the account with the merchant and validates the credit card.
(A) issuing (B) acquiring (C) merchant's (D) customer's
189) The .......... bank authorizes sale based on the customer's credit card limit.
(A) issuing (B) acquiring (C) merchant's (D) customer's
190) Payment ..........and processors are two more entities which play a role in online payment.
(A) doorways (B) openings (C) gateways (D) windows
191) Payment gateway services provided by the third party like ........... which connects networks of all parties involved.
(A) HDFC (B) SBI (C) AXIS (D) PayPal
192)are data centers which perform the credit card transactions and settle funds to the merchant.
(A) Doorways (B) Openings (C) Processors (D) Windows
193) Processors are connected to the E-commerce website of the merchant through the payment
(A) doorways (B) openings (C) gateways (D) windows
194) The online payment through credit card on Internet is divided into ......... parts.
(A) one (B) two (C) three (D) four
195) Major credit card companies use the ........... security system to make online transactions secure.
(A) SIGN (B) VERISIGN (C) SET (D) SECURE
196) Full form of SET is...........
(A) Secure Electronic Transfer (B) Safe Electronic Transit
(C) Safe Electric Transfer (D) Secure Electric Transit
197) The advantage of using Credit card is...........
(A) gives flexibility to the customer. (B) keeps record of the customer's purchase.
(C) allows customers to purchase goods even when they do not have cash in bank. (D) all of these
198) The limitation of using credit card is...........
(A) they are unsuitable for very small or very large payments.
(B) customers tend to overspend using credit cards.
(C) problems arise in case lost or stolen credit cards. (D) all of these
199) A........... looks like credit card but works by transferring fund directly from the consumer's bank.
(A) Credit Card (B) Smart Card (C) Debit Card (D) Payment Card
200) The ........... can keep the consumer purchases under a limit and do not allow him to exceed beyond his/her budget.
(A) Credit Card (B) Smart Card (C) Debit Card (D) Payment Card
201)also looks like a credit card but have a microchip embedded in their surface.
(A) Credit Card (B) Smart Card (C) Debit Card (D) Charge Card
202) A .......... contains user's private information, such as account information, health information etc.
(A) Credit Card (B) Smart Card (C) Debit Card (D) Payment Card
203)are popular in countries like US, Europe, Japan and some parts of Asia.
(A) Debit Card (B) Credit Card (C) Charge Card (D) Smart Card
204) A....... is another form of payment mechanism wherein the customer can pay through the card and it does not have
a credit limit.
(A) Debit Card (B) Credit Card (C) Charge Card (D) Smart Card
205)does not involve any type of card for online transaction.
(A) Net-Banking (B) Credit-Card (C) Smart-Banking (D) All of these
206)means transferring money from one bank to another electronically.
(A) Net-Banking (B) EFT (C) ATM (D) Net-Transaction
207) Full form of EFT is ...........
(A) Electronic Funds Transfer. (B) Electronic Finance Transfer.
(C) Electronic Funds Transaction. (D) None of these
208)is an electronic card for making secure online payments towards a merchant.
(A) E-Wallet (B) M-Wallet (C) L-Wallet (D) Card-Wallet
209) The term ........... is coined from two terms Rupee and Payment.
(A) RupeeP (B) RuPay (C) Rupees Payment (D) None of these
210)is a new card payment mechanism launched by NPCI.
(A) RupeeP (B) RuPay (C) Rupees Payment (D) None of these
211) Full form of NPCI is...........
(A) Nation's Payment Cost of India (B) National Payments Company of India.
(C) National Payments Corporation of India. (D) Nationalized Payments Corporation of India.
Ch-6 Object-Oriented Concepts
1) In Object-oriented methodology, the focus is on which of the following entities ?
(A) Data (B) Functions (C) Objects (D) All of the above
SHARDAYATAN[E.M.] STD-XII[COMPUTER STUDIES]
2) Which of the following best suits to Java ?
(A) A procedural programming language (B) An object oriented programming language
(C) A Query language (D) All of the above
3) Which of the following is used to distinguish objects from each other?
(A) Attributes (B) State (C) Behavior (D) All of the above
4) Which of the following is used to define common features of similar objects?
(A) Class (B) Object (C) Methods (D) All of the above
5) Which of the following is not a visibility symbol ?
(A) ~ (B) * (C) # (D) -
6) Which of the following is provided using encapsulation ?
(A) Data protection (B) Data sharing (C) Separation of data and methods (D) All of these
7) Which of the following is enabled by data abstraction ?
(A) Data protection (B) Data hiding
(C) To hide implementation details of method manipulating the data (D) All of these
8) With which of the following options polymorphism cannot be achieved ?
(A) Method overloading (B) Operator overloading (C) Data hiding (D) All of these
9) An aggregation model refers to which of the following relationships ?
(A) 'is-a' relationship (B) 'is-like' relationship (C) 'a-part-of relationship (D) All of these
10) An inheritance model refers to which of the following relationships ?
(A) 'is-a' relationship (B) 'has-a' relationship (C) 'a-part-of relationship (D) All of these
11) In class diagram, composition is represented using which of the following symbols ?
(A) Empty diamond symbol (B) Filled diamond symbol (C) Empty triangle symbol (D) All of these
1) Object-oriented programming concepts started originating in the...........
(A) 1950s (B) 1960s (C) 1970s (D) 1980s
2) Since mid. ........ object-oriented programming had become the main programming paradigm used in the creation
of new software.
(A) 1950s (B) 1960s (C) 1970s (D) 1980s
3) Some of the popular programming languages that support............programming are C++, Java, C#, VB.net,
ASP.net and PHP.
(A) object-oriented (B) structural (C) modular (D) procedural
4) The way of programming can be divided into .......... categories.
(A) four (B) three (C) two (D) one
5) Java is a ......... programming language.
(A) object-oriented (B) structural (C) modular (D) procedural
6) The categories are. ........ and object-oriented.
(A) objective (B) structure/procedural (C) modular (D) functional
7) In. ........ programming, the focus is on writing functions or procedures which operate on data.
(A) procedural (B) modular (C) functional (D) none of these
8) In object-oriented. ....... , the focus is on objects which contain data and functionality together.
(A) pattern (B) prototype (C) paradigm (D) example
9) The power of object-oriented programming language enables the programmer to create modular, reusable
and......... code.
(A) complete (B) accomplished (C) perfect (D) executable
10) Flexibility is gained by being able to change or replace ........... without disturbing other parts of code.
(A) modules (B) parts (C) functions (D) methods
11) Object-oriented programming uses. ........ as its fundamental building block.
(A) method (B) class (C) object (D) procedure
12) A computer language is object-oriented if they support four specific object properties called
(A) abstraction (B) encapsulation (C) polymorphism and Inheritance (D) all of these
13) C# is a ......... programming language.
(A) object-oriented (B) structural (C) modular (D) procedural
14) In the real world, ........... are the entities of which the world is comprised.
(A) methods (B) classes (C) objects (D) procedures
15) Some objects can be. ........ things like person, car or a cup of coffee.
(A) abstract (B) concrete (C) real (D) solid
16) Some objects may be............that do not represent things which can be touched or seen.
(A) abstract (B) concrete (C) real (D) solid
17) All objects have unique .......... and are distinguishable from each other.
(A) personality (B) objects (C) procedures (D) identity
18) In object-oriented terminology characteristics are known as properties or...........
(A) features (B) attributes (C) values (D) states
19) To uniquely distinguish one person from other,the. .........of its characteristics is used.
(A) worth (B) cost (C) value (D) property
20) When two people have same name, they can be distinguished using other attributes like.........
(A) color (B) name (C) birth-date (D) behavior
21) To identify......... , the value of the attributes is used.
(A) personality (B) objects (C) procedures (D) identity
22) There is always a behavior associated with
(A) personality (B) objects (C) procedures (D) identity
23) The behaviour of objects is also known as
(A) method (B) technique (C) process (D) procedure
24) The ......... of the object can change due to its behavior.