You are on page 1of 20

COMPUTER

parikshaplus.org
1. The acronym w3c stands for _________ 6. Which of the following is not a C2C business model?
(A) world web wide. (A) Manufacturer’s website for selling home appliances
(B) wide world web online
(C) world wide web (B) Website for auctioning used goods
(D) world wide web control (C) Website for posting content related to selling and/or
Ans: C. world wide web buying houses
(D) Website allowing anyone to publish advertisements
2. HTML is a ______ language related to selling and/or buying cars
(A) procedural (B) markup Ans: A. Manufacturer’s website for selling home
(C) object oriented (D) object based appliances online
Ans: B. markup
7. Electronic wallets refer to
3. HTML documents stored in the file in the form (A) Website selling electronic appliances online
______ (B) Mechanism for secure e-payments
(A) .hxm (C) Wallets housing smart/credit/debit cards
(B) .html or .htm (D) Wallets fitted with electronically operated locks
(C) .hm Ans: B. Mechanism for secure e-payments
(D) .hml
Ans: B. .html or .htm 8. Match the following terms:

4. To change xxxx@yyyy.zzzz to an IP address, we


should use the _______ protocol
(A) TELNET
(B) DNS
(C) NVT
(D) none of the above (A) 1-b, 2-d, 3-a, 4-c
Ans: B. DNS (B) 1-d, 2-c, 3-b, 4-a
(C) 1-d, 2-a, 3-b, 4-c
5. Match the following terms: (D) 1-b, 2-a, 3-d, 4-c
Ans: A. 1-b, 2-d, 3-a, 4-c

9. Digital Library of India is a library with


(A) printed books about e-Commerce, e-governance
and ICT
(B) computerized issue/renewal/return of books
(A) 1-d, 2-b, 3-a, 4-c (C) library with collection of books in PDF format
(B) 1-d, 2-c, 3-b, 4-a (D) computers with Internet facility for catalogue and
(C) 1-d, 2-a, 3-b, 4-c web browsing
(D) 1-b, 2-a, 3-d, 4-c Ans: C. library with collection of books in PDF format
Ans: D. 1-b, 2-a, 3-d, 4-c

Page - 1
COMPUTER
parikshaplus.org
10. COBIT was an acronym for 15. Which of the following depicts correct
(A) Cost of Business in Information Technology chronological order for scope of COBIT framework
(B) Control Objectives for Information and Related (A) Management, Audit, Control, IT Governance,
Technology Governance of Enterprise IT
(C) Computerization of Business Intelligence (B) Control, Audit, Management, IT Governance,
Techniques Governance of Enterprise IT
(D) Computerization of Information Related (C) Audit, Control, Management, IT Governance,
Technology Governance of Enterprise IT
Ans: B. Control Objectives for Information and Related (D) Governance of Enterprise IT, Audit, Control,
Technology Management, IT Governance
Ans: C. Audit, Control, Management, IT Governance,
11. Which of the Following is correct special charecter Governance of Enterprise IT
Code
(A) & code (B) & amp 16. HTTP is
(C) & copy. (D) # code (A) Request-Response Protocol
Ans: B. & amp (B) Stateful
(C) Secured
12. By default, ordered list use _____ sequence of (D) All of above
numbers Ans: A. Request-Response Protocol
(A) octal (B) hexadecimal
(C) binary (D) decimal 17. The default size of block in Apache HDFS is
Ans: D. decimal (A) 512 bytes
(B) 64 MB
13. The _____ element is used to insert a horizontal (C) 1024 KB
rule. (D) None of the above
(A) hr (B) rule Ans: B. 64 MB
(C) rh (D) line
Ans: A. hr 18. Payment Gateway refers to
(A) a merchant service authorizing payments for e-
14. In ERP, data migration refers to businesses
(A) Upgrading ERP software (B) a merchant service to resolve financial disputes
(B) Upgrading both hardware and ERP software (C) networking switch at a bank/financial institution
(C) backup of data on an ERP system (D) none of the above
(D) moving, copying and restructuring data from an Ans: A. merchant service authorizing payments for e-
existing system to the ERP system businesses
Ans: Ans: D. moving, copying and restructuring data
from an existing system to the ERP system 19. ‚Collaborative application development‛ means
(A) software development by a team of developers
(B) software targeting many applications
(C) opening the source code of application/components
for other developers
(D) outsourcing application code development
Ans: C. opening the source code of
application/components for other developers

Page - 2
COMPUTER
parikshaplus.org
20. Electronic data interchange means Ans: A. type =‛reset‛
(A) a software for copying data from one computer to
another 26. CSS introduces the position property and a
(B) a software for synchronizing data across many capability called ________.
devices (A) absolute (B) position property.
(C) import/export of electronic devices used for data (C) positioning (D) positioned
storage Ans: A. absolute
(D) sets of formats/standards used for electronic
exchange of business information 27. Which of the following is not correct?
Ans: D. sets of formats/standards used for electronic (A) 110101002 = 324 base 8
exchange of business information (B) 01 1011 0100 base 2 = 2B4 base 8
(C) 1 01 01 0 110 base 2 = 526 base 8 = 156 base 16
21. Types of entities are called _______ (D) 34 base 8 = 24 base 16
(A) parameter entities. Ans: D. 34 base 8 = 24 base 16
(B) ignore entities.
(C) percent entities 28. Match the following terms:
(D) normal entities.
Ans: A. parameter entities.

22. Types of entities are called _______


(A) parameter entities.
(B) ignore entities.
(C) percent entities (A) 1-c, 2-d, 3-a, 4-b
(D) normal entities. (B) 1-d, 2-c, 3-b, 4-a
Ans: A. parameter entities. (C) 1-d, 2-a, 3-b, 4-c
(D) 1-b, 2-a, 3-c, 4-d
23. XML documents are called ________ sections Ans: A. 1-c, 2-d, 3-a, 4-b
(A) CDATA (B) EDATA
(C) scripting code. (D) parser 29. To represent one billion (1 billion = 1000 million),
Ans: A. CDATA minimum number of bits needed are
(A) 12 (B) 30
24. The ____ and ______ attributes specify the layout (C) 15 (D) 20
of frames within the browser window. Ans: B. 30
(A) frames and frameset.
(B) font and style. 30. Match the following terms:
(C) cols and rows
(D) forms and fonts.
Ans: B. font and style.

25 . The ________ attribute in an input element inserts (A) 1-c, 2-d, 3-a, 4-b
a button that, when click will clear the contents of reset. (B) 1-b, 2-a, 3-c, 4-d
(A) type =‛reset‛ (C) 1-d, 2-c, 3-b, 4-a
(B) ype = ‚input‛. (D) 1-d, 2-c, 3-a, 4-b
(C) type = ‚thread‛. Ans: D. 1-d, 2-c, 3-a, 4-b
(D) type = ‛ ‚.
Page - 3
COMPUTER
parikshaplus.org
31. ________ element is a grouping element 37. _______ is an example for an application that has a
(A) dw (B) Span built in XML parser
(C) Span, dw. (D) italic (A) Microsoft Internet Explorer (IE5).
Ans: B. Span (B) Google chrome
(C) Epic
32. A language that is used for creating other languages (D) Mozilla Firefox
is called __________ Ans: A. Microsoft Internet Explorer (IE5).
(A) markup language
(B) meta language 38. An element that contains a plus sign next to it, is
(C) schema language called _________.
(D) software language (A) pixel element.
Ans: B. meta language (B) positive element.
(C) style sheet element
33. All XML documents must contain exactly one (D) container element
_____ Ans: D. container element
(A) root element.
(B) prolog 39. ________ enables computer to process the
(C) child element. characters for most of the world’s major languages.
(D) function (A) Multicode (B) ASCII code
Ans: A. root element. (C) Unicode (D) Text code
Ans: C. Unicode
34. Lines preceding the root element are the ______ of
the XML document 40. ________ is enclosed in angle brackets.
(A) child (B) function (A) Character data.
(C) prolog (D) comments (B) Markup text.
Ans: C. prolog (C) Container element.
(D) Procedure
35. a software program is called, ______ is required to Ans: B. Markup text.
process an XML document
(A) XML object model (B) XML compiler. 41. ________ is the text between a start and an end tag.
(C) XML parser (D) XML Interpreter. (A) Markup text
Ans: C. XML parser (B) Container element
(C) Procedure
36. An XML document is considered to be syntactically (D) Character data
incorrect if ___________ Ans: D. Character data
(A) contains a start tag & end tag. Solution: No Explanation Available
(B) properly rested tags.
(C) attribute values in quotes 42. Space, tabs, line fields and carriage returns are
(D) contains two root elements examples for ________
Ans: D. contains two root elements (A) special references
(B) special elements
(C) special text.
(D) White Space
Ans: D. White Space
Solution: No Explanation available
Page - 4
COMPUTER
parikshaplus.org
43. The process of converting insignificant whitespace 48. Which of the following techniques is employed for
characters into a single white space character or entirely improving transmission efficiency of digital
removing it is called ___________ documents?
(A) interchanging (B) preservation (A) Encryption
(C) normalization (D) comparison (B) USB
Ans: C. normalization (C) Compression
(D) Steganography
44. ________ begins with an ampersand and end with a Ans: C. Compression
semi colon.
(A) White spaces 49. Which of the following does not require OCR
(B) Character data software component?
(C) Text elements (A) Assistive technologies
(D) Entity references (B) Extracting text from scanned documents
Ans: D. Entity references (C) Face recognition
(D) License number identification
45. The ______ file defines the structure of the XML Ans: C. Face recognition
document.
(A) DLL extension 50. A captcha is used for verifying if a web-user
(B) DTD extension (A) is a machine or a human being
(C) XML extension (B) is frequent or infrequent visitor
(D) DDT extension. (C) has logged out
Ans: B. DTD extension (D) is a registered user or not
Solution: DTD has been the standard for XML schema Ans: A. is a machine or a human being
definition
51. Which of the following is true for HTML?
46. ‚Hotspot‛ refers to (A) Browser displays only body part
(A) most heated part of computer system (B) Browser displays only header part
(B) region where there is no network (C) Browser displays body and header both
(C) region with internet access using wi-fi (D) None of the above
(D) a heat sink Ans: A. Browser displays only body part
Ans: C. region with internet access using wi-fi
52. URL includes
47. Which of the following is not a required component (A) Protocol type
of Aadhaar card issued by UIDAI? (B) Path of web resource
(A) Face image (C) Domain Name and Port Number
(B) Fingerprint Image (D) All of above
(C) Iris image Ans: D. All of above
(D) Voice recording
Ans: D. Voice recording 53. Which of the following software is not a web
server?
(A) Apache
(B) Internet Information Services (IIS)
(C) Mongoose
(D) Python
Ans: D. Python
Page - 5
COMPUTER
parikshaplus.org
54. In HTML, colour code #FF7F3F represents a color 59. A cross-compiler is a
in which intensity levels of primary colors are (A) compiler for object oriented languages
(A) Red = 255, Green = 127 and Blue = 63 (B) compiler for JAVA written in C
(B) Blue = 255, Green = 127 and Red = 63 (C) compiler that can generate machine codes for other
(C) Green = 255, Blue = 127 and Red = 63 platform
(D) Invalid color code (D) compiler for non-procedural languages
Ans: A. Red = 255, Green = 127 and Blue = 63 Ans: D. compiler for non-procedural languages

55. In Internet communication, ‘‘cookie’’ is used for 60. Basic XML can be described as:
(A) storing authentication information at server side for (A) A hierarchical structure of tagged elements,
entire session attributes and text.
(B) storing authentication information at client side for (B) All the HTML tags plus a set of new XML only
entire session tags.
(C) detecting intrusion at client side for entire session (C) Object-oriented structure of rows and columns.
(D) detecting intrusion at server side for entire session (D) Processing instructions (PIs) for text data.
Ans: A. storing authentication information at server Ans: A. A hierarchical structure of tagged elements,
side for entire session attributes and text.

56. Which of the following is not system software? 61. A client _______ a service.
(A) WinZip (B) Compiler (A) requests (B) provides
(C) Virtual Machine (D) YACC (C) a or b (D) a and b
Ans: A. WinZip Ans: A. requests

57. Which of the following E-commerce model is also a 62. A server _______ a service
part of E-governance? (A) requests (B) provides
(A) B2B (B) G2C (C) a or b (D) a and b
(C) B2C (D) C2C Ans: B. provides
Ans: B. G2C
63. WiFi is a short name for ___________
58. Match the following terms: (A) Wired Fidelity
(B) Wireless Fidelity
(C) Wireless Frequency
(D) None of above
Ans: B. Wireless Fidelity

64. Responsibility of implementation of IT/ITeS Policy


(A) 1-c, 2-d, 3-b, 4-a lies with
(B) 1-c, 2-a, 3-b, 4-d (A) State Technology park Unit
(C) 1-d, 2-c, 3-a, 4-b (B) Ministry of IT at State and Center
(D) 1-d, 2-b, 3-a, 4-c (C) Director (IT) in consultation with DST
Ans: A. 1-c, 2-d, 3-b, 4-a (D) Industrial Commissioner
Ans: C. Director (IT) in consultation with DST

Page - 6
COMPUTER
parikshaplus.org
65. In India Subject to a ceiling of Rs. 25 crores, Ans: D. Citizens can download e-documents but can
Capital Subsidy for Horizontal IT/ITeS Parks shall be not upload any document in their accounts.
(A) 10% of fixed capital investment (excluding the cost
of land) 69. Match the following terms: Applicable to india
(B) Rs. 200 per sq. ft. for built-up area
(C) 25% of fixed capital investment (excluding the cost
of land)
(D) Rs. 300 per sq. ft. for built-up area
Ans: C. 25% of fixed capital investment (excluding the
cost of land)

66. Match the following terms: (A) 1-b, 2-d, 3-a, 4-c
(B) 1-b, 2-c, 3-d, 4-a
(C) 1-d, 2-a, 3-b, 4-c
(D) 1-d, 2-c, 3-a, 4-b
Ans: D. 1-d, 2-c, 3-a, 4-b

(A) 1-d, 2-b, 3-a, 4-c 70. Match the following terms:
(B) 1-d, 2-c, 3-b, 4-a
(C) 1-d, 2-a, 3-b, 4-c
(D) 1-b, 2-a, 3-d, 4-c
Ans: C. 1-d, 2-a, 3-b, 4-c

67. In As per IT/ITeS Policy (2016-21), term BPO


refers to (A) 1-b, 2-d, 3-a, 4-c
(A) Business Process Outsourcing (B) 1-d, 2-c, 3-a, 4-b
(B) Business Process Outcomes (C) 1-d, 2-a, 3-b, 4-c
(C) Best Processing Outcomes (D) 1-d, 2-c, 3-b, 4-a
(D) Business Practices and Outcomes Ans: B. 1-d, 2-c, 3-a, 4-b
Ans: A. Business Process Outsourcing
71. To change an IP address to xxxx@yyyy.zzzz, we
68. In india Which of the following is not CORRECT should use the _______ protocol
about ‚DigiLocker‛? (A) TELNET (B) DNS
(A) Signing for DigiLocker requires an individual’s (C) NVT (D) none of the above
mobile number Ans: B. DNS
(B) DigiLocker is a platform for issuance and
verification of documents & certificates in a digital 72. Internet is
way, thus eliminating the use of physical (A) a local computer network
documents. (B) a world wide network of computers
(C) Organizations registered with DigiLocker can (C) an interconnected network of computers
store electronic copies of documents/certificates (D) a world wide interconnected network of computers
directly into citizens’s lockers. which use a common protocol to communicate with one
(D) Citizens can download e-documents but can not another
upload any document in their accounts.

Page - 7
COMPUTER
parikshaplus.org
Ans: D. a world wide interconnected network of Ans: C. inverse
computers which use a common protocol to
communicate with one another 79. Internet addresses must always have at least
(i) a country name or organization type
73. Each computer connected to the internet must (ii) internet service provider’s name
(A) be an IBM PC (iii) name of organization
(B) have a unique IP address (iv) name of individual
(C) be internet compatible (v) type of organization
(D) have a modem connection (A) i, ii, iii
Ans: B. have a unique IP address (B) ii, iii, iv
(C) i, iii
74. To change xxxx@yyyy.edu to an IP address, we (D) ii, iii, iv, v
should use the _______ domain in the DNS protocol. Ans: C. i, iii
(A) generic
(B) country 80. By Electronic Commerce we mean:
(C) inverse (A) Commerce of electronic goods
(D) none of the above (B) Commerce which depends on electronics
Ans: A. generic (C) Commerce which is based on the use of internet
(D) Commerce which is based on transactions using
75. IP address is currently computers connected by telecommunication network
(A) 4 bytes long Ans: D. Commerce which is based on transactions
(B) available in plenty using computers connected by telecommunication
(C) 6 bytes long network
(D) not assigned as it is all used up
Ans: A. 4 bytes long 81. Internet uses
(A) Packet switching
76. To change xxxx@yyyy.zzzz.us to an IP address, we (B) Circuit switching
should use the _______ domain in the DNS protocol (C) Telephone switching
(A) generic (B) country (D) Telex switching
(C) inverse (D) none of the above Ans: A. Packet switching
Ans: B. country
82. For carrying out B2B e-Commerce the following
77. IP addresses are converted to infrastructure is essential:
(A) a binary string I. World Wide Web
(B) alphanumeric string II. Corporate network
(C) a hierarchy of domain names III. Electronic Data Interchange standards
(D) a hexadecimal string IV. Secure Payment Services
Ans: C. a hierarchy of domain names V. Secure electronic communication link connecting
businesses
78. To change an IP address to xxxx@yyyy.edu, we (A) i, ii, iii
should use the _______ domain in the DNS protocol. (B) ii, iii, iv
(A) generic (C) ii, iii, iv, v
(B) country (D) i, ii, iii, iv, v
(C) inverse Ans: C. ii, iii, iv, v
(D) none of the above
Page - 8
COMPUTER
parikshaplus.org
83. Usually TCP/IP uses the services of _________ 89. For carrying out B2C e-Commerce the following
before using any other application program infrastructure is essential
(A) FTP i. World Wide Web
(B) DNS ii. Corporate network
(C) NVT iii. Electronic Data Interchange standards
(D) none of the above iv. Secure Payment Services
Ans: B. DNS v. Secure electronic communication link connecting
businesses
84. The domain xxxx@yyyy.com is a(n) _________ (A) i, iv
domain (B) i, iii, iv
(A) generic (B) country (C) ii, iii
(C) inverse (D) none of the above (D) i, ii, iii, iv
Ans: A. generic Ans: A. i, iv

85. The domain xxxx@yyyy.gov is a(n) _________ 90. For carrying out C2C e-Commerce the following
domain. infrastructure is essential
(A) generic (B) country i. World Wide Web
(C) inverse (D) none of the above ii. Corporate network
Ans: A. generic iii. Electronic Data Interchange standards
iv. Secure Payment Services
86. The domain xxxx@yyyy.fr is a(n) _________ v. Secure electronic communication link connecting
domain businesses
(A) generic (A) i and ii
(B) country (B) ii and iv
(C) inverse (C) i and iii
(D) none of the above (D) i and iv
Ans: B. country Ans: C. i and iii

87. Internet data is broken up as 91. The packets of an internet message


(A) fixed length packets (A) take a predetermined path
(B) variable length packets (B) take a path based on packet priority
(C) not packetized (C) go along different paths based on path availability
(D) 64 bytes packets (D) take the shortest path from source to destination
Ans: B. variable length packets Ans: C. go along different paths based on path
availability
88. Internet packet data structure consists of
I. source address 92. The domain 121.24.34.12.in-addr.arpa is a(n)
II. destination address _______ domain.
III. serial number of packets (A) generic
IV. message bytes (B) country
V. Control bits for error checking (C) inverse
VI. Path identification bits (D) none of the above
(A) i, ii, iii (B) i, ii, iii, iv Ans: C. inverse
(C) i, ii, iii, iv, v (D) i, ii, iii, iv, v, vi
Ans: C. i, ii, iii, iv, v
Page - 9
COMPUTER
parikshaplus.org
93. Advantages of B2C commerce are 98. The TELNET client uses a ________driver, while
(i) Business gets a wide reach to customers the TELNET server uses a _______ driver
(ii) Payment for services easy (A) terminal; pseudoterminal
(iii) Shop can be open 24 hours a day seven days a (B) pseudoterminal; terminal
week (C) TELNET
(iv) Privacy of transaction always maintained (D) none of the above
(A) i and ii Ans: A. terminal; pseudoterminal
(B) ii and iii
(C) i and iii 99. Advantages of B2C commerce to customers are
(D) iii and iv (i) wide variety of goods can be accessed and
Ans: C. i and iii comparative prices can be found
(ii) shopping can be done at any time
94. The time taken by internet packets (iii) privacy of transactions can be guaranteed
(A) can be predetermined before transmission (iv) security of transactions can be guaranteed
(B) may be different for different packets (A) i and ii (B) ii and iii
(C) is irrelevant for audio packets (C) iii and iv (D) i and iv
Ans: C. is irrelevant for audio packets Ans: A. i and ii

95. The general client-server program in the Internet is 100. The FTP establishes _________ connection(s).
_________ (A) one (B) two
(A) FTP (C) three (D) none of the above
(B) TFTP Ans: B. two
(C) TELNET
(D) none of the above 101. Which connection is opened during the entire
Ans: C. TELNET session in FTP?
(A) control
96. B2C commerce (B) data
(A) includes services such as legal advice (C) a and b
(B) means only shopping for physical goods (D) neither a nor b
(C) means only customers should approach customers Ans: A. control
to sell Solution: The File Transfer Protocol (FTP) is a
(D) means only customers should approach business to standard network protocol used for the transfer of
buy computer files between a client and server on a
Ans: A. includes services such as legal advice computer network.

97. By an intranet we mean 102. Which connection is opened and closed during a
(A) a LAN of an organization session in FTP?
(B) a Wide Area Network connecting all branches of (A) control
an organization (B) data
(C) a corporate computer network (C) a and b
(D) a network connecting all computers of an (D) neither a nor b
organization and using the internet protocol Ans: B. data
Ans: D. a network connecting all computers of an Solution: FTP is built on a client-server model
organization and using the internet protocol architecture using separate control and data connections
between the client and the server
Page - 10
COMPUTER
parikshaplus.org
103. If the file to transfer is very large, we should use 107. What is meant by ‚web 2.0‛?
the services of _________. (A) The resurgence of internet companies with more
(A) FTP (B) TFTP interactive focus, such as blogging and social
(C) a or b (D) neither a nor b networking
Ans: A. FTP (B) Any website which has survived the dot.com bust
(C) Sites made using new technology
104. Which protocol transfers a small file faster? (D) Internet companies who focus on retail sales
(A) FTP Ans: A. The resurgence of internet companies with
(B) TFTP more interactive focus, such as blogging and social
(C) a or b networking
(D) neither a nor b
Ans: B. TFTP 108. In Electronic cash payment
Solution: Trivial File Transfer Protocol (TFTP) is an (i) a customer withdraws ‚coins‛ in various
Internet software utility for transferring files that is denominations signed by the bank
simpler to use than the File Transfer Protocol (FTP) but (ii) the bank has a database of issued coins
less capable (iii) the bank has a database of spent coins
(iv) the bank cannot trace a customer
105. What is search engine optimization? (A) i, ii
(A) Paying for placement on a search engine results (B) i, ii, iii
page (C) i, ii, iii, iv
(B) Building a site which has the qualities that search (D) ii, iii, iv
engines look for, which will ultimately get the site Ans: B. i, ii, iii
a high rank in the listings
(C) Optimization of a site so it gets more affiliate 109. Electronic Data Interchange (EDI) standards are
revenue (A) not universally available
(D) Selling memberships to the site (B) essential for B2B commerce
Ans: B. Building a site which has the qualities that (C) not required for B2B commerce
search engines look for, which will ultimately get the (D) still being evolved
site a high rank in the listings Ans: B. essential for B2B commerce
Solution: Electronic data interchange (EDI) is the
106. What are meta tags? concept of businesses electronically communicating
(A) The content of the site information that was traditionally communicated on
(B) Embedded information about your website such as paper, such as purchase orders and invoices
keywords
(C) Links to other sites 110. The main protocol for sending e-mail in the
(D) Images on the site TCP/IP protocol suite is called _____
Ans: B. Embedded information about your website (A) SMTP
such as keywords (B) SNMP
(C) FTP
(D) none of the above
Ans: A. SMTP
Solution: Simple Mail Transfer Protocol (SMTP) is an
Internet standard for email transmission. First defined
by RFC 821 in 1982, it was updated in 2008 with

Page - 11
COMPUTER
parikshaplus.org
Extended SMTP additions by RFC 5321; which is the Solution: In the SMTP model user deals with the user
protocol in widespread use today. agent (UA) for example Microsoft outlook, netscape,
Mozilla etc
111. By an extranet we mean
(A) an extra fast computer network 116. World Wide Web
(B) the intranets of two co-operating organizations (A) is another name for internet
interconnected via a secure leased line (B) world wide connection for computers
(C) an extra network used by an organization for higher (C) a collection of linked information residing on
reliability computers connected by the internet
(D) an extra connection to internet provided to co- (D) a collection of world wide information
operating organization Ans: C. a collection of linked information residing on
Ans: B. the intranets of two co-operating organizations computers connected by the internet
interconnected via a secure leased line
117. In SMTP, the entity that is used to transfer the
112. Electronic Data Interchange is necessary in message is called the ________
(A) B2C e-Commerce (A) MTA
(B) C2C e-Commerce (B) UA
(C) B2B e-Commerce (C) MA
(D) Commerce using internet (D) none of the above
Ans: C. B2B e-Commerce Ans: A. MTA
Solution: Within the Internet email system, a message
113. To transfer an e-mail to a private network, we transfer agent or mail transfer agent (MTA) or mail
need to have a relay is software that transfers electronic mail messages
(A) mail router from one computer to another using SMTP
(B) mail gateway
(C) mail agent 118. In the destination e-mail address
(D) none of the above xxxx@yyyy.zzzz.tttt, _______ defines the local part of
Ans: B. mail gateway the destination
(A) tttt
114. Electronic Data Interchange (EDI) requires (B) xxxx
(A) representation of common business documents in (C) yyyy
computer readable forms (D) none of the above
(B) data entry operators by receivers Ans: B. xxxx
(C) special value added networks
(D) special hardware at co-operating Business premises 119. Among services available on the World Wide Web
Ans: A. representation of common business documents are
in computer readable forms (i) Encryption
(ii) HTTP
115. In SMTP, the entity that is used to prepare the (iii) HTML
message is called the ________ (iv) Firewalls
(A) MTA (B) UA (A) i and ii (B) ii and iii
(C) MA (D) none of the above (C) iii and iv (D) i and iv
Ans: B. UA Ans: B. ii and iii

Page - 12
COMPUTER
parikshaplus.org
120. In the destination e-mail address Solution: EDIFACT. United Nations/Electronic Data
xxxx@yyyy.zzzz.tttt, _______ defines the domain Interchange for Administration, Commerce and
name of the destination Transport (UN/EDIFACT) is the international EDI
(A) xxxx standard developed under the United Nations.The
(B) yyyy EDIFACT standard provides: a set of syntax rules to
(C) yyyy.zzzz.tttt structure data.
(D) none of the above
Ans: C. yyyy.zzzz.tttt 125. When an e-mail is sent, it is first stored in a(n)
__________
121. EDIFACT is a standard (A) mailbox
(A) for representing business forms used in e- (B) spool
Commerce (C) expander
(B) for e-mail transaction for e-Commerce (D) none of the above
(C) for ftp in e-Commerce Ans: B. spool
(D) protocol used in e-Commerce
Ans: A. for representing business forms used in e- 126. ANSI X.12 is a standard developed by
Commerce (A) American National Standard Institute
Solution: EDIFACT stands for Electronic Data (B) International Standard Institute
Interchange For Administration, Commerce and (C) European Common Market
Transport (D) United Nations Economic Commission for Europe
Ans: A. American National Standard Institute
122. A world wide web contains web pages Solution: ASC X12. Chartered by the American
(A) residing in many computers National Standards Institute (ANSI) in 1979, it
(B) created using HTML develops and maintains the X12 Electronic data
(C) with links to other web pages interchange (EDI) and Context Inspired Component
(D) residing in many computers linked together using Architecture (CICA) standards along with XML
HTML schemas which drive business processes globally.
Ans: D. residing in many computers linked together
using HTML 127. When an e-mail is received, it is first stored in a(n)
__________
123. In an e-mail address, _______ separates the local (A) mailbox
part from the domain part (B) spool
(A) @ (at sign) (C) expander
(B) . (dot) (D) none of the above
(C) # (pound sign) Ans: A. mailbox
(D) none of the above
Ans: A. @ (at sign)

124. EDIFACT standard was developed by


(A) American National Standard Institute
(B) International Standard Institute
(C) European Common Market
(D) United Nations Economic Commission for Europe
Ans: D. United Nations Economic Commission for
Europe
Page - 13
COMPUTER
parikshaplus.org
128. In B2B e-Commerce 131. The official network management protocol in
(i) Co-operating Business should give an EDI standard TCP/IP protocol suite is called _____
to be used (A) SNTP
(ii) Programs must be developed to translate EDI forms (B) SNMP
to a form accepted by application program (C) SMTP
(iii) Method of transmitting/receiving data should be (D) none of the above
mutually agreed Ans: B. SNMP
(iv) It is essential to use internet Solution: Simple Network Management Protocol
(A) i, ii (SNMP) is an Internet Standard protocol for collecting
(B) i, ii, iii and organizing information about managed devices on
(C) i, ii, iii, iv IP networks and for modifying that information to
(D) ii, iii, iv change device behavior. Devices that typically support
Ans: B. i, ii, iii SNMP include cable modems, routers, switches,
servers, workstations, printers, and more. reference link
129. The supplementary protocol that allows the use of SNMP
non-ASCII characters in an e- mail is called the
_________ protocol. 132. A manager station in SNMP is a __________.
(A) MIME (A) client
(B) POP (B) server
(C) POP2 (C) both a and b
(D) none of the above (D) none of the above
Ans: A. MIME Ans: A. client
Solution: Multipurpose Internet Mail Extensions
(MIME) is an Internet standard that extends the format 133. An agent in SNMP is a __________
of email to support: Text in character sets other than (A) client
ASCII. Non-text attachments: audio, video, images, (B) server
application programs etc. (C) both a and b
(D) none of the above
130. The supplementary protocol that fetches e-mail Ans: B. server
from an e-mail server is called the _________ protocol
(A) MIME 134. A web page is located using a
(B) POP (A) Universal Record Linking
(C) POP2 (B) Universal Resource Locator
(D) none of the above (C) Universal Record Locator
Ans: B. POP (D) Uniformly Reachable Links
Solution: the Post Office Protocol (POP) is an Ans: B. Universal Resource Locator
application-layer Internet standard protocol used by e-
mail clients to retrieve e-mail from a mail server. POP 135. A URL specifies the following:
version 3 (POP3) is the version in common use. (i) protocol used
(ii) domain name of server hosting web page
(iii) name of folder with required information
(iv) name of document formatted using HTML
(v) the name of ISP
(A) i, ii, iii, iv (B) ii, iii, iv, v
(C) i, iii, iv (D) i, ii, iii, v
Page - 14
COMPUTER
parikshaplus.org
Ans: A. i, ii, iii, iv 140. The management component in the Internet that
sends messages is called _______
136. A router is an example of a _______ in SNMP (A) SNMP
(A) client (B) SMI
(B) server (C) MIB
(C) both a and b (D) none of the above
(D) none of the above Ans: A. SNMP
Ans: B. server Solution: Simple Network Management Protocol
(SNMP) is an Internet Standard protocol for collecting
137. Management in the Internet is achieved through and organizing information about managed devices on
_______ components. IP networks and for modifying that information to
(A) 1 change device behavior. Devices that typically support
(B) 2 SNMP include cable modems, routers, switches,
(C) 3 servers, workstations, printers, and more
(D) none of the above
Ans: C. 3 141. A search engine is a program to search
(A) for information
138. The management component in the Internet that is (B) web pages
used to name the objects is called __________. (C) web pages for specified index terms
(A) SNMP (D) web pages for information using specified search
(B) SMI terms
(C) MIB Ans: D. web pages for information using specified
(D) none of the above search terms
Ans: B. SMI
Solution: the Structure of Management Information 142. HTML stands for
(SMI), an adapted subset of ASN.1, operates in Simple (A) Hyper Text Making Links
Network Management Protocol (SNMP) to define sets (B) Hyper Text Markup Language
("modules") of related managed objects in a (C) Higher Textual Marking of Links
Management Information Base (MIB). (D) Hyper Text Mixer of Links
Ans: B. Hyper Text Markup Language
139. The management component in the Internet that Solution: Hypertext Markup Language (HTML) is the
creates a database of object is called _______ standard markup language for creating web pages and
(A) SNMP web applications. With Cascading Style Sheets (CSS)
(B) SMI and JavaScript
(C) MIB
(D) none of the above 143. The second section of a request message in HTTP
Ans: C. MIB is the__________
Solution: A management information base (MIB) is a (A) header (B) request line
database used for managing the entities in a (C) body (D) a blank line
communication network. Most often associated with the Ans: A. header
Simple Network Management Protocol (SNMP), the
term is also used more generically in contexts such as
in OSI/ISO Network management model

Page - 15
COMPUTER
parikshaplus.org
144. The third section of a request message in HTTP is 149. In _______ each object is defined by a numeric
the__________ identifier
(A) header (B) request line (A) SNMP (B) SMI
(C) body (D) a blank line (C) MIB (D) none of the above
Ans: D. a blank line Ans: C. MIB

145. An URL is normally made of _______ parts 150. The identifier for the object named sys under the
(A) 3 mib object is ______.
(B) 4 (A) 1
(C) 2 (B) 1.3.6.1.2.1
(D) none of the above (C) 1.3.6.1.2.1.1
Ans: B. 4 (D) none of the above
Ans: C. 1.3.6.1.2.1.1
146. In the URL HTTP://xxxx:yyyy/zzzz, the method is
_________. 151. SNMP uses _________ messages to send and
(A) HTTP (B) xxxx retrieve messages.
(C) yyyy (D) zzzz (A) 1
Ans: A. HTTP (B) 3
(C) 5
147. XLL definition is used along with XML to specify (D) none of the above
(A) The data types of the contents of XML document Ans: C. 5
(B) The presentation of XML document
(C) The links with other documents 152. If a manager needs to get some information from
(D) The structure of XML document an agent, it uses the _______ message.
Ans: C. The links with other documents (A) GetRequest
Solution: XML Linking Language, or XLink, is an (B) GetNextRequest
XML markup language and W3C specification that (C) SetRequest
provides methods for creating internal and external (D) a or b
links within XML documents, and associating metadata Ans: D. a or b
with those links
153. If an agent needs to send some information to a
148. DTD definition is used along with XML to specify manager, it uses the _________ message
(A) The data types of the contents of XML document (A) GetRequest (B) SetRequest
(B) The presentation of XML document (C) GetResponse (D) Trap
(C) The links with other documents Ans: C. GetResponse
(D) The structure of XML document
Ans: A. The data types of the contents of XML 154. The first section of a response message in HTTP is
document the __________
Solution: A document type definition (DTD) defines (A) header
the valid building blocks of an XML document. It (B) status line
defines the document structure with a list of validated (C) body
elements and attributes. A DTD can be declared inline (D) a blank line
inside an XML document, or as an external reference Ans: B. status line

Page - 16
COMPUTER
parikshaplus.org
155. The fourth section of a response message in HTTP Ans: D. Trap
is the __________.
(A) header (B) request line 161. HTTP messages are divided into _______
(C) body (D) a blank line categories
Ans: C. body (A) 2
(B) 5
156. HTML is similar to a (C) 3
(A) word processing language (D) none of the above
(B) screen editor Ans: A. 2
(C) scripting language
(D) search engine 162. A browser is an HTTP _________.
Ans: A. word processing language (A) client
(B) server
157. Desirable properties of a website are (C) agent
(i) a meaningful address (D) none of the above
(ii) Help and search facilities Ans: A. client
(iii) Links to related sites
(iv) Features to allow users to give feedback 163. In HTTP, the message sent from the client to the
(v) Hosting on a mainframe server is called a ______.
(A) i, ii, iii (A) response
(B) i, ii, iii, iv (B) request
(C) i, ii, iii, iv, v (C) demand
(D) i, ii, iii, v (D) none of the above
Ans: B. i, ii, iii, iv Ans: B. request

158. XSL definition is used along with XML definition 164. HTML uses
to specify (A) pre-specified tags
(A) The data types of the contents of XML document (B) user defined tags
(B) The presentation of XML document (C) tags only for linking
(C) The links with other documents (D) fixed tags defined by the language
(D) The structure of XML document Ans: D. fixed tags defined by the language
Ans: B. The presentation of XML document
165. HTML tags define
159. If a manager needs to change the setting of an (A) The data types of elements of document
agent, it uses the ____________ message (B) Presentation of specified elements of a document
(A) GetRequest (C) The contents of the document
(B) GetNextRequest (D) The structure of the document
(C) SetRequest Ans: B. Presentation of specified elements of a
(D) Trap document
Ans: C. SetRequest
166. CGI is mostly associated with a _______
160. If an agent needs to report a situation to the document.
manager, it uses the ___________ message (A) static (B) dynamic
(A) GetRequest (B) SetRequest (C) active (D) none of the above
(C) GetResponse (D) Trap Ans: B. dynamic
Page - 17
COMPUTER
parikshaplus.org
167. Java is mostly associated with a _______ 173. The tags used for specifying fonts BOLD and
document. Italic in HTML are
(A) static (i) ‚<B>‛
(B) dynamic (ii) ‚<I>‛
(C) active (iii) ‚<U>‛
(D) none of the above (iv) ‚<L>‛
Ans: C. active (A) (i) and (ii)
(B) (i) and (iii)
168. The advantages of XML over HTML are (C) (ii) and (iv)
(i) It allows processing of data stored in web-pages (D) (i),(ii) and (iii)
(ii) It uses meaningful tags which aids in understanding Ans: A. ‚<A>‛
the nature of a document
(iii) Is simpler than HTML 174. A web page document that is stored in the server
(iv)It separates presentation and structure of document and can be retrieved by a browser is called a _______
(A) (i),(ii) and (iii) document
(B) (i),(ii) and(iv) (A) static (B) dynamic
(C) (ii),(iii) and (iv) (C) active (D) none of the above
(D) (i),(iii) and (iv) Ans: A. static
Ans: B. (i),(ii) and(iv)
175. A web page document that is stored in the server
169. In HTTP, the message sent from the server to the but should be run before the result can be retrieved by a
client is called a ______ browser is called a _______ document.
(A) response (B) request (A) static
(C) demand (D) none of the above (B) dynamic
Ans: A. response (C) active
(D) none of the above
170. A request or a response in HTTP is made of Ans: B. dynamic
_______ components
(A) 3 176. HTML is mostly associated with a _______
(B) 4 document
(C) 2 (A) static
(D) none of the above (B) dynamic
Ans: B. 4 (C) active
(D) none of the above
171. The first section of a request message in HTTP is Ans: A. static
the __________.
(A) header (B) request line 177. XML uses
(C) body (D) a blank line (A) user define tags
Ans: B. request line (B) pre-defined tags
(C) both predefined and user-defined tags
172. The tag used in HTML to link it with other URL’s (D) Extended tags used in HTML and makes them
is powerful
(A) ‚<A>‛ (B) ‚<H>‛ Ans: A. user define tags
(C) ‚<U>‛ (D) ‚<L>‛
Ans: A. ‚<A>‛
Page - 18
COMPUTER
parikshaplus.org
178. In order to interpret XML documents one should 183. In the URL HTTP://xxxx:yyyy/zzzz, the name of
(A) Use standardized tags the port is _________.
(B) Have a document type definition which defines the (A) HTTP
tags (B) xxxx
(C) Define the tags separately (C) yyyy
(D) Specify tag filename (D) zzzz
Ans: B. Have a document type definition which defines Ans: C. yyyy
the tags
184. In the URL HTTP://xxxx:yyyy/zzzz, the pathname
179. The four section of a request message in HTTP is of the file or directory where the web page is located is
the __________ _______
(A) header (B) request line (A) HTTP
(C) body (D) a blank line (B) xxxx
Ans: C. body (C) yyyy
(D) zzzz
180. It is possible to display pictures (i.e, images) in Ans: D. zzzz
HTML specification by using the tag
(A) ‚<GR src = Picture file>‛ 185. HTML and XML are markup languages
(B) ‚<PIC src =Picture file>‛ (A) Specially development for the web
(C) ‚<IMG src =Picture file>‛ (B) Are based on SGML
(D) ‚<GIF src=Picture file>‛ (C) Are versions of SGML
Ans: C. ‚<IMG src =Picture file>‛ (D) Independent of SGML
Ans: B. Are based on SGML
181. SGML stands for
(A) Standard Generalized Markup Language
(B) Structured General Markup Language
(C) Standard Graphics Mapping Language
(D) Standard General Markup Link
Ans: A. Standard Generalized Markup Language

182. In the URL HTTP://xxxx:yyyy/zzzz, the name of


the host (or an alias for it) is _________
(A) HTTP
(B) xxxx
(C) yyyy
(D) zzzz
Ans: B. xxxx

Page - 19

You might also like