0% found this document useful (0 votes)
14 views

ICT All Module Questions

Ict

Uploaded by

bossali138786
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

ICT All Module Questions

Ict

Uploaded by

bossali138786
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 53

MODULE 1

1. What is the Internet?


A) A global network of interconnected computers
B) A local network within a single organization
C) A standalone computer system
D) A specialized network used only by governments

Answer: A) A global network of interconnected computers

2. Which of the following is NOT an Internet application?


A) Email
B) Web browsing
C) Word processing
D) Video conferencing

Answer: C) Word processing

3. When entering a website address into a browser, which part of the address is typically omitted?
A) Protocol
B) Domain name
C) Path
D) Subdomain

Answer: A) Protocol

4. What does URL stand for?


A) Universal Resource Locator
B) Uniform Resource Locator
C) Universal Routing Language
D) Unified Resource Locator
Answer: B) Uniform Resource Locator

5. Which component of a URL specifies the method used to access a resource?


A) Protocol
B) Domain name
C) Path
D) Query string

Answer: A) Protocol

6. The part of a URL that specifies the domain name of a website is called the:
A) Protocol
B) Host
C) Path
D) Query string

Answer: B) Host

7. Which of the following is NOT a valid protocol in a URL?


A) HTTP
B) FTP
C) SMTP
D) XML

Answer: D) XML

8. What is the purpose of searching the Internet?


A) To find information on specific topics
B) To send emails
C) To host websites
D) To play online games

Answer: A) To find information on specific topics

9. Which search engine is known for its PageRank algorithm?


A) Yahoo
B) Bing
C) Google
D) DuckDuckGo

Answer: C) Google

10. Which of the following is NOT a commonly used web browser?


A) Chrome
B) Safari
C) Apache
D) Firefox

Answer: C) Apache

11. Which component of a URL specifies a particular page or resource on a website?


A) Protocol
B) Domain name
C) Path
D) Query string

Answer: C) Path

12. What does HTTP stand for in a URL?


A) HyperText Transfer Protocol
B) Hypertext Transmission Protocol
C) Hyperlink Transfer Protocol
D) Hypertext Transfer Process

Answer: A) HyperText Transfer Protocol

13. Which of the following is NOT a valid domain suffix?


A) .com
B) .net
C) .org
D) .web

Answer: D) .web

14. Which organization oversees the assignment of IP addresses and domain names?
A) W3C
B) ICANN
C) IEEE
D) IETF

Answer: B) ICANN

15. Which protocol is commonly used for transferring files over the Internet?
A) HTTP
B) FTP
C) SMTP
D) POP3

Answer: B) FTP
16. Which of the following is NOT a valid URL scheme?
A) http
B) ftp
C) www
D) file

Answer: C) www

17. What is the primary function of a web browser?


A) Sending emails
B) Playing games
C) Viewing web pages
D) Creating documents

Answer: C) Viewing web pages

18. Which of the following is an example of a top-level domain?


A) google
B) .com
C) http
D) www

Answer: B) .com

19. Which protocol is commonly used for sending emails?


A) HTTP
B) FTP
C) SMTP
D) DNS
Answer: C) SMTP

20. Which component of a URL is used to pass parameters to a web server?


A) Protocol
B) Domain name
C) Path
D) Query string

Answer: D) Query string

21. What is the main purpose of an IP address?


A) To identify a specific website
B) To identify a specific device on a network
C) To encrypt data during transmission
D) To authenticate users

Answer: B) To identify a specific device on a network

22. Which of the following is NOT a characteristic of the Internet?


A) Centralized control
B) Decentralized architecture
C) Redundancy
D) Scalability

Answer: A) Centralized control

23. Which organization develops and publishes web standards?


A) ICANN
B) W3C
C) IEEE
D) IETF

Answer: B) W3C

24. What is the purpose of DNS?


A) To encrypt data during transmission
B) To translate domain names into IP addresses
C) To route emails to their destinations
D) To compress web pages for faster loading

Answer: B) To translate domain names into IP addresses

25. Which protocol is commonly used for secure communication over the Internet?
A) HTTP
B) FTPS
C) HTTPS
D) SMTP

Answer: C) HTTPS

26. Which of the following is NOT an example of a web browser?


A) Chrome
B) Safari
C) Firefox
D) Outlook

Answer: D) Outlook

27. What is the purpose of a firewall in Internet security?


A) To filter incoming and outgoing network traffic
B) To speed up internet connections
C) To provide encryption for data transmission
D) To prevent physical damage to network devices

Answer: A) To filter incoming and outgoing network traffic

28. Which protocol is commonly used for retrieving emails from a mail server?
A) HTTP
B) FTP
C) POP3
D) IMAP

Answer: C) POP3

29. What does HTML stand for?


A) HyperText Markup Language
B) Hyperlink Text Management Language
C) Hypertext Media Language
D) Hyperlink Transfer Markup Language

Answer: A) HyperText Markup Language

30. Which of the following is NOT a valid HTTP method?


A) GET
B) POST
C) SEND
D) DELETE

Answer: C) SEND
MODULE 2
Browser Types:

1. Which of the following is NOT a commonly used web browser?


A) Chrome
B) Safari
C) Firefox
D) Excel

Answer: D) Excel

2. Which web browser is developed and maintained by Apple Inc.?


A) Chrome
B) Safari
C) Firefox
D) Edge

Answer: B) Safari

3. Mozilla Firefox is known for its:


A) Open-source nature
B) Closed-source development
C) Microsoft ownership
D) Mobile-only usage

Answer: A) Open-source nature

4. Which browser was developed by Microsoft and replaced Internet Explorer?


A) Chrome
B) Safari
C) Firefox
D) Edge

Answer: D) Edge

5. Opera is a web browser developed by a company based in which country?


A) United States
B) China
C) Norway
D) Germany

Answer: C) Norway

6. Which of the following is a feature of Google Chrome browser?


A) Trident rendering engine
B) Presto rendering engine
C) Blink rendering engine
D) Gecko rendering engine

Answer: C) Blink rendering engine

7. Which browser is known for its focus on privacy and security, with features like "Do Not Track" and ad-
blocking?
A) Chrome
B) Safari
C) Firefox
D) Brave

Answer: D) Brave
8. Which browser is primarily associated with the Linux operating system?
A) Chrome
B) Safari
C) Firefox
D) Konqueror

Answer: D) Konqueror

9. Microsoft Edge is based on which rendering engine?


A) Trident
B) WebKit
C) Blink
D) Presto

Answer: C) Blink

10. Which browser is known for its speed and minimalist design, often used in mobile devices?
A) Chrome
B) Safari
C) Firefox
D) Opera Mini

Answer: D) Opera Mini

Social Networking Platforms:

11. Which social networking platform is primarily focused on professional networking and career
development?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook

Answer: C) LinkedIn

12. Facebook was founded by:


A) Mark Zuckerberg
B) Jack Dorsey
C) Evan Spiegel
D) Kevin Systrom

Answer: A) Mark Zuckerberg

13. Which social networking platform allows users to post short updates known as tweets?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook

Answer: A) Twitter

14. Which social networking platform is known for its microblogging features and multimedia content
sharing?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook

Answer: B) Tumblr
15. What is the primary focus of Flickr?
A) Professional networking
B) Microblogging
C) Photo sharing
D) Video sharing

Answer: C) Photo sharing

16. Which social networking platform is primarily focused on video sharing?


A) Facebook
B) Tumblr
C) LinkedIn
D) YouTube

Answer: D) YouTube

17. Which company owns WhatsApp?


A) Facebook
B) Twitter
C) Google
D) Microsoft

Answer: A) Facebook

18. Skype is primarily used for:


A) Microblogging
B) Video conferencing and VoIP
C) Professional networking
D) Photo sharing
Answer: B) Video conferencing and VoIP

19. What is the primary function of Yahoo?


A) Microblogging
B) Webmail and search engine
C) Professional networking
D) Photo sharing

Answer: B) Webmail and search engine

20. Which social networking platform allows users to create and share professional portfolios and
resumes?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook

Answer: C) LinkedIn

21. What type of content is mainly shared on Facebook?


A) Short text updates
B) Photos and videos
C) Professional portfolios
D) Microblogging posts

Answer: B) Photos and videos

22. What distinguishes WhatsApp from other social networking platforms?


A) Its focus on professional networking
B) Its integration with email services
C) Its encryption for messaging
D) Its multimedia sharing capabilities

Answer: C) Its encryption for messaging

23. Tumblr is known for its emphasis on:


A) Professional networking
B) Microblogging
C) Video sharing
D) Photo editing

Answer: B) Microblogging

24. What is the primary function of Twitter?


A) Professional networking
B) Video sharing
C) Microblogging
D) Photo editing

Answer: C) Microblogging

25. LinkedIn is commonly used by professionals for:


A) Sharing personal photos
B) Microblogging
C) Building professional connections
D) Sharing memes

Answer: C) Building professional connections

26. What distinguishes Skype from other communication platforms?


A) Its focus on short text updates
B) Its integration with social media feeds
C) Its emphasis on video conferencing and VoIP
D) Its photo editing features

Answer: C) Its emphasis on video conferencing and VoIP

27. Flickr is primarily used for sharing:


A) Professional resumes
B) Short text updates
C) Photos
D) Videos

Answer: C) Photos

28. YouTube is primarily focused on:


A) Microblogging
B) Video sharing
C) Professional networking
D) Photo editing

Answer: B) Video sharing

29. What distinguishes WhatsApp from traditional text messaging?


A) Its focus on professional networking
B) Its integration with email services
C) Its use of the internet for messaging
D) Its multimedia sharing capabilities

Answer: C) Its use of the internet for messaging


30. Yahoo is known for its:
A) Microblogging features
B) Webmail and search engine services
C) Video sharing capabilities
D) Professional networking tools

Answer: B) Webmail and search engine services

MODULE 3

Email:

1. What is the primary purpose of email?


A) Instant messaging
B) Document sharing
C) Electronic communication
D) Social networking

Answer: C) Electronic communication

2. Which of the following is NOT an advantage of email?


A) Instantaneous communication
B) Cost-effectiveness
C) Limited storage capacity
D) Global reach

Answer: C) Limited storage capacity

3. Which component of an email address comes after the "@" symbol?


A) User ID
B) Domain name
C) Password
D) Message body

Answer: B) Domain name

4. What is the purpose of a password in email?


A) To identify the sender
B) To encrypt the message
C) To authenticate the user
D) To format the message

Answer: C) To authenticate the user

5. What is the main function of a mailer in email?


A) Sending and receiving emails
B) Formatting the message
C) Composing the message
D) Adding attachments

Answer: A) Sending and receiving emails

6. Which of the following is a component of an email message?


A) Domain name
B) User ID
C) Attachment
D) Password

Answer: C) Attachment
7. What does SMTP stand for in email?
A) Simple Mail Transfer Protocol
B) Secure Mail Transfer Protocol
C) Standard Mail Transfer Protocol
D) System Mail Transfer Protocol

Answer: A) Simple Mail Transfer Protocol

8. What component of an email message contains the recipient's email address?


A) Subject line
B) Body
C) From field
D) To field

Answer: D) To field

9. Which of the following is NOT a commonly used email protocol?


A) SMTP
B) POP3
C) HTTP
D) IMAP

Answer: C) HTTP

10. What is the purpose of CC and BCC fields in email?


A) To format the text
B) To authenticate the sender
C) To specify additional recipients
D) To add encryption
Answer: C) To specify additional recipients

11. Which email protocol allows users to access their emails from multiple devices while keeping them
synchronized?
A) SMTP
B) POP3
C) IMAP
D) HTTP

Answer: C) IMAP

12. What is the purpose of an email signature?


A) To identify the recipient
B) To authenticate the sender
C) To provide contact information
D) To add encryption

Answer: C) To provide contact information

13. Which of the following is NOT a component of an email message?


A) Subject line
B) Body
C) Footer
D) Attachment

Answer: C) Footer

14. Which of the following is a disadvantage of email?


A) Instantaneous communication
B) Potential for spam
C) Global reach
D) Low cost

Answer: B) Potential for spam

15. What is the primary function of an email client?


A) To send and receive emails
B) To create email addresses
C) To host email servers
D) To develop email protocols

Answer: A) To send and receive emails

G Suite:

16. What is Google Drive?


A) A cloud storage service
B) A social networking platform
C) A web browser
D) An email client

Answer: A) A cloud storage service

17. Which G Suite application is used for creating and editing text documents?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides

Answer: B) Google Documents


18. Which G Suite application is used for creating and managing spreadsheets?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides

Answer: C) Google Spreadsheets

19. Which G Suite application is used for creating presentations?


A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides

Answer: D) Google Slides

20. Which G Suite application is used for creating online forms and surveys?
A) Google Drive
B) Google Documents
C) Google Forms
D) Google Slides

Answer: C) Google Forms

21. What is the primary advantage of using Google Drive?


A) Unlimited storage space
B) Offline access to files
C) Real-time collaboration
D) Built-in antivirus protection
Answer: C) Real-time collaboration

22. Which G Suite application allows multiple users to collaborate on a single document simultaneously?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides

Answer: B) Google Documents

23. What is the main purpose of Google Forms?


A) Creating and editing text documents
B) Managing spreadsheets
C) Creating online forms and surveys
D) Creating presentations

Answer: C) Creating online forms and surveys

24. Which G Suite application is commonly used for data analysis and visualization?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides

Answer: C) Google Spreadsheets

25. What feature of Google Drive allows users to access their files even without an internet connection?
A) Offline mode
B) Drive sync
C) Cloud storage
D) File sharing

Answer: A) Offline mode

26. Which G Suite application is primarily used for storing and organizing files in the cloud?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Forms

Answer: A) Google Drive

27. What is the primary advantage of using Google Documents for word processing?
A) Advanced data analysis tools
B) Real-time collaboration
C) Multimedia presentation capabilities
D) Integration with social media platforms

Answer: B) Real-time collaboration

28. Which G Suite application is commonly used for creating slide presentations?
A) Google Drive
B) Google Documents
C) Google Slides
D) Google Forms

Answer: C) Google Slides

29. What is the primary advantage of using Google Forms for creating surveys?
A) Real-time collaboration
B) Advanced data analysis tools
C) Unlimited storage space
D) Integration with email clients

Answer: B) Advanced data analysis tools

30. Which G Suite application allows users to create and manage email accounts for their domain?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Workspace Admin

Answer: D) Google Workspace Admin

MODULE 4
1. What is the primary purpose of internet security?
a) To ensure high internet speed
b) To protect computer systems and data from unauthorized access or damage
c) To increase internet bandwidth
d) To enhance internet connectivity

Answer: b) To protect computer systems and data from unauthorized access or damage

2. Which of the following is not considered a common email threat?


a) Phishing
b) Spam
c) Cookies
d) Malware attachments

Answer: c) Cookies
3. Secure email utilizes which of the following technologies to protect sensitive information?
a) SSL/TLS encryption
b) Plain text transmission
c) HTTP protocol
d) No encryption

Answer: a) SSL/TLS encryption

4. What is the main purpose of antivirus software?


a) To enhance internet speed
b) To protect against viruses and malware
c) To increase computer storage
d) To improve computer performance

Answer: b) To protect against viruses and malware

5. Which of the following is NOT a function of a firewall?


a) Blocking unauthorized access
b) Monitoring network traffic
c) Identifying and removing viruses
d) Filtering incoming and outgoing data

Answer: c) Identifying and removing viruses

6. Cryptography involves:
a) Protecting data through encryption
b) Increasing internet bandwidth
c) Decreasing computer performance
d) Enhancing network speed
Answer: a) Protecting data through encryption

7. Digital signatures are primarily used for:


a) Sending encrypted emails
b) Verifying the authenticity of digital documents
c) Blocking internet access
d) Enhancing computer graphics

Answer: b) Verifying the authenticity of digital documents

8. Copyright issues primarily deal with:


a) Protecting intellectual property rights
b) Increasing computer processing speed
c) Enhancing internet connectivity
d) Improving network security

Answer: a) Protecting intellectual property rights

9. Which of the following is a common phishing technique?


a) Sending unsolicited emails with malicious attachments
b) Installing antivirus software
c) Creating fake websites to steal personal information
d) Encrypting sensitive emails

Answer: c) Creating fake websites to steal personal information

10. What is the main purpose of SSL/TLS encryption?


a) To slow down internet speed
b) To protect data during transmission over the internet
c) To increase computer storage
d) To reduce network latency

Answer: b) To protect data during transmission over the internet

11. What is the primary function of antivirus software?


a) To block unwanted emails
b) To protect against malware and viruses
c) To increase internet speed
d) To enhance computer graphics

Answer: b) To protect against malware and viruses

12. What type of software is designed to prevent unauthorized access to or from a private network?
a) Firewall
b) Antivirus
c) Encryption software
d) Phishing software

Answer: a) Firewall

13. Which of the following is NOT a common email threat?


a) Spoofing
b) Adware
c) Ransomware
d) SSL/TLS

Answer: d) SSL/TLS

14. What is the primary purpose of a digital signature?


a) To encrypt emails
b) To verify the identity of the sender
c) To speed up internet connection
d) To filter spam emails

Answer: b) To verify the identity of the sender

15. Which of the following is a common method to protect sensitive data during transmission?
a) Plain text
b) Encryption
c) Compression
d) No protection

Answer: b) Encryption

16. What is the main purpose of a firewall?


a) To increase internet speed
b) To protect against viruses and malware
c) To enhance computer graphics
d) To block unauthorized access to a network

Answer: d) To block unauthorized acc

Pradeep Kumar, [3/9/2024 1:15 PM]


ess to a network

17. Which of the following is NOT a common type of malware?


a) Trojan horse
b) Spyware
c) SSL/TLS
d) Ransomware

Answer: c) SSL/TLS

18. Which cryptographic technique uses a pair of keys for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital signature

Answer: b) Asymmetric encryption

19. What is the primary purpose of copyright laws?


a) To protect intellectual property rights
b) To increase internet speed
c) To enhance computer graphics
d) To block unauthorized access to a network

Answer: a) To protect intellectual property rights

20. What is a common feature of phishing emails?


a) They contain legitimate offers
b) They are sent from trusted sources
c) They attempt to deceive recipients into disclosing sensitive information
d) They are always marked as spam

Answer: c) They attempt to deceive recipients into disclosing sensitive information

21. Which of the following is NOT a function of antivirus software?


a) Scanning for and removing malware
b) Monitoring network traffic
c) Encrypting emails
d) Updating virus definitions

Answer: c) Encrypting emails

22. What is the primary purpose of a digital certificate?


a) To block unauthorized access to a network
b) To verify the identity of a website or user
c) To increase internet speed
d) To enhance computer graphics

Answer: b) To verify the identity of a website or user

23. Which type of attack involves tricking users into revealing sensitive information by pretending to be a
legitimate entity?
a) Phishing
b) DoS (Denial of Service)
c) SQL injection
d) Trojan horse

Answer: a) Phishing

24. What is the primary purpose of encryption?


a) To increase internet speed
b) To protect data from unauthorized access
c) To enhance computer graphics
d) To block spam emails

Answer: b) To protect data from unauthorized access


25. Which of the following is NOT a common type of firewall?
a) Packet-filtering firewall
b) Proxy firewall
c) Antivirus firewall
d) Stateful inspection firewall

Answer: c) Antivirus firewall

26. What is the main function of a proxy server in internet security?


a) To enhance computer graphics
b) To increase internet speed
c) To filter and forward network traffic
d) To encrypt emails

Answer: c) To filter and forward network traffic

27. Which cryptographic technique involves converting plaintext into ciphertext using a secret key?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital

signature

Answer: a) Symmetric encryption

28. What is the primary purpose of a VPN (Virtual Private Network)?


a) To increase internet speed
b) To protect data transmission over public networks
c) To enhance computer graphics
d) To filter spam emails

Answer: b) To protect data transmission over public networks

29. Which of the following is NOT a common feature of antivirus software?


a) Real-time scanning
b) Firewall protection
c) Automatic updates
d) Email encryption

Answer: d) Email encryption

30. Which type of attack involves flooding a network or server with excessive requests to disrupt normal
traffic?
a) Phishing
b) DoS (Denial of Service)
c) Spoofing
d) Trojan horse

Answer: b) DoS (Denial of Service)

31. What is the main purpose of SSL/TLS encryption?


a) To slow down internet speed
b) To protect data during transmission over the internet
c) To increase computer storage
d) To reduce network latency

Answer: b) To protect data during transmission over the internet


32. What is the primary function of antivirus software?
a) To block unwanted emails
b) To protect against malware and viruses
c) To increase internet speed
d) To enhance computer graphics

Answer: b) To protect against malware and viruses

33. What type of software is designed to prevent unauthorized a

Pradeep Kumar, [3/9/2024 1:15 PM]


ccess to or from a private network?
a) Firewall
b) Antivirus
c) Encryption software
d) Phishing software

Answer: a) Firewall

34. Which of the following is NOT a common email threat?


a) Spoofing
b) Adware
c) Ransomware
d) SSL/TLS

Answer: d) SSL/TLS

35. What is the primary purpose of a digital signature?


a) To encrypt emails
b) To verify the identity of the sender
c) To speed up internet connection
d) To filter spam emails

Answer: b) To verify the identity of the sender

36. Which of the following is a common method to protect sensitive data during transmission?
a) Plain text
b) Encryption
c) Compression
d) No protection

Answer: b) Encryption

37. What is the main purpose of a firewall?


a) To increase internet speed
b) To protect against viruses and malware
c) To enhance computer graphics
d) To block unauthorized access to a network

Answer: d) To block unauthorized access to a network

38. Which of the following is NOT a common type of malware?


a) Trojan horse
b) Spyware
c) SSL/TLS
d) Ransomware

Answer: c) SSL/TLS

39. Which cryptographic technique uses a pair of keys for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital signature

Answer: b) Asymmetric encryption

40. What is the primary purpose of copyright laws?


a) To protect intellectual property rights
b) To increase internet speed
c) To enhance computer graphics
d) To block unauthorized access to a network

Answer: a) To protect intellectual property rights

41. What is a common feature of phishing emails?


a) They contain legitimate offers
b) They are sent from trusted sources
c) They attempt to deceive recipients into disclosing sensitive information
d) They are always marked as spam

Answer: c) They attempt to deceive recipients into disclosing sensitive information

42. Which of the following is NOT a function of antivirus software?


a) Scanning for and removing malware
b) Monitoring network traffic
c) Encrypting emails
d) Updating virus definitions

Answer: c) Encrypting emails


43. What is the primary purpose of a digital certificate?
a) To block unauthorized access to a network
b) To verify the identity of a website or user
c) To increase internet speed
d) To enhance computer graphics

Answer: b) To verify the identity of a website or user

44. Which type of attack involves tricking users into revealing sensitive information by pretending to be a
legitimate entity?
a) Phishing
b) DoS (Denial of Service)
c) SQL injection
d) Trojan horse

Answer: a) Phishing

45. What is the primary purpose of encryption?


a) To increase internet speed
b) To protect data from unauthorized access
c) To enhance computer graphics
d) To block spam emails

Answer: b) To protect data from unauthorized access

46. Which of the following is NOT a common type of firewall?


a) Packet-filtering firewall
b) Proxy firewall
c) Antivirus firewall
d) Stateful inspection firewall

Answer: c) Antivirus firewall

47. What is the main function of a proxy server in internet security?


a) To enhance computer graphics
b) To increase internet speed
c) To filter and forward network traffic
d) To encrypt emails

Answer: c) To filter and forward network traffic

48. Which cryptographic technique involves converting plaintext into ciphertext using a secret key?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital signature

Answer: a) Symmetric encryption

49. What is the primary purpose of a VPN (Virtual Private Network)?


a) To increase internet speed
b) To protect data transmission over public networks
c) To enhance computer graphics
d) To filter spam emails

Answer: b) To protect data transmission over public networks

50. Which of the following is NOT a common feature of antivirus software?


a) Real-time scanning
b) Firewall protection
c) Automatic updates
d) Email encryption

Answer: d) Email encryption

MODULE 5
1. What is the purpose of SWAYAM in higher education?

a) Providing scholarships to students

b) Offering online courses for free

c) Funding research projects

d) Building physical infrastructure for colleges

Answer: b) Offering online courses for free

2. Which initiative focuses on broadcasting educational content through DTH channels?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) Virtual labs

Answer: b) Swayam Prabha

3. Which platform is designed to store academic awards, certificates, and diplomas in digital format?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) National Digital Library of India


Answer: c) National Academic Depository

4. What is the primary function of the National Digital Library of India?

a) Broadcasting educational content through DTH channels

b) Offering online courses for free

c) Storing academic awards and certificates digitally

d) Providing access to digital educational resources

Answer: d) Providing access to digital educational resources

5. E-Sodh-Sindhu is focused on:

a) Offering scholarships to students

b) Providing access to research journals and databases

c) Broadcasting educational content through TV channels

d) Building physical infrastructure for colleges

Answer: b) Providing access to research journals and databases

6. Which initiative provides virtual laboratories for students to conduct experiments online?

a) e-acharya

b) e-Yantra

c) Virtual labs

d) NPTEL

Answer: c) Virtual labs

7. What is the main objective of the e-acharya initiative?

a) Offering online courses for free

b) Providing access to digital educational resources


c) Facilitating skill development among teachers

d) Building physical infrastructure for colleges

Answer: c) Facilitating skill development among teachers

8. e-Yantra is aimed at:

a) Broadcasting educational content through DTH channels

b) Offering scholarships to students

c) Providing virtual laboratories for students

d) Promoting robotics education and research

Answer: d) Promoting robotics education and research

9. NPTEL focuses on:

a) Providing access to digital educational resources

b) Offering online courses for free

c) Storing academic awards and certificates digitally

d) Facilitating skill development among teachers

Answer: b) Offering online courses for free

10. Which initiative is specifically designed for storing academic awards and certificates in digital format?

a) SWAYAM

b) National Academic Depository

c) National Digital Library of India

d) E-Sodh-Sindhu

Answer: b) National Academic Depository


11. Which initiative provides access to research journals and databases?

a) Swayam Prabha

b) National Academic Depository

c) Virtual labs

d) E-Sodh-Sindhu

Answer: d) E-Sodh-Sindhu

12. What is the primary focus of e-Yantra?

a) Offering scholarships to students

b) Providing virtual laboratories for students

c) Promoting robotics education and research

d) Broadcasting educational content through DTH channels

Answer: c) Promoting robotics education and research

13. NPTEL primarily offers:

a) Access to digital educational resources

b) Scholarships to students

c) Physical infrastructure for colleges

d) Online courses for free

Answer: d) Online courses for free

14. What is the purpose of SWAYAM Prabha?

a) Providing access to research journals and databases

b) Offering online courses for free

c) Broadcasting educational content through DTH channels

d) Storing academic awards and certificates digitally


Answer: c) Broadcasting educational content through DTH channels

15. What does the National Digital Library of India provide access to?

a) Virtual laboratories

b) Research journals and databases

c) Online courses for free

d) Digital educational resources

Answer: d)

Pradeep Kumar, [3/9/2024 1:15 PM]

Digital educational resources

16. Which initiative focuses on skill development among teachers?

a) e-acharya

b) e-Yantra

c) NPTEL

d) Virtual labs

Answer: a) e-acharya

17. What is the primary objective of the National Academic Depository?

a) Promoting robotics education

b) Broadcasting educational content

c) Storing academic awards digitally

d) Providing access to research journals

Answer: c) Storing academic awards digitally


18. E-Sodh-Sindhu is primarily concerned with:

a) Offering scholarships

b) Providing access to research databases

c) Broadcasting educational content

d) Storing academic certificates

Answer: b) Providing access to research databases

19. Which initiative offers virtual laboratories for conducting experiments online?

a) e-acharya

b) e-Yantra

c) Virtual labs

d) NPTEL

Answer: c) Virtual labs

20. What is the focus of NPTEL?

a) Broadcasting educational content

b) Providing access to digital resources

c) Offering online courses

d) Storing academic certificates

Answer: c) Offering online courses

21. What is the primary function of SWAYAM in higher education?

a) Offering scholarships to students

b) Providing access to online courses

c) Funding research projects


d) Building physical infrastructure for colleges

Answer: b) Providing access to online courses

22. Which initiative is focused on broadcasting educational content through DTH channels?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) Virtual labs

Answer: b) Swayam Prabha

23. Which platform stores academic awards, certificates, and diplomas in digital format?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) National Digital Library of India

Answer: c) National Academic Depository

24. What is the primary function of the National Digital Library of India?

a) Broadcasting educational content through DTH channels

b) Offering online courses for free

c) Storing academic awards and certificates digitally

d) Providing access to digital educational resources

Answer: d) Providing access to digital educational resources

25. E-Sodh-Sindhu primarily provides access to:


a) Scholarships for students

b) Research journals and databases

c) Online courses

d) Virtual laboratories

Answer: b) Research journals and databases

26. Which initiative provides virtual laboratories for conducting experiments online?

a) e-acharya

b) e-Yantra

c) Virtual labs

d) NPTEL

Answer: c) Virtual labs

27. What is the main focus of e-acharya

a) Offering scholarships to students

b) Providing access to digital educational resources

c) Facilitating skill development among teachers

d) Building physical infrastructure for colleges

Answer: c) Facilitating skill development among teachers

28. e-Yantra is aimed at promoting:

a) Broadcasting educational content

b) Robotics education and research

c) Online courses
d) Digital resource access

Answer: b) Robotics education and research

29. NPTEL primarily focuses on providing:

a) Access to digital educational resources

b) Scholarships for students

c) Physical infrastructure for colleges

d) Online courses

Answer: d) Online courses

30. Which initiative is specifically designed for storing academic awards and certificates digitally?

a) SWAYAM

b) National Academic Depository

c) National Digital Library of India

d) E-Sodh-Sindhu

Answer: b) National Academic Depository

31. What does E-Sodh-Sindhu primarily provide access to?

a) Scholarships

b) Research journals and databases

c) Online courses

d) Virtual laboratories

Answer: b) Research journals and databases

32. Which initiative offers virtual laboratories for conducting experiments online?
a) e-acharya

b) e-Yantra

c) Virtual labs

d) NPTEL

Answer: c) Virtual labs

33. What is the main focus of NPTEL?

a) Broadcastin

Pradeep Kumar, [3/9/2024 1:15 PM]

g educational content

b) Providing access to digital resources

c) Offering online courses

d) Storing academic certificates

Answer: c) Offering online courses

34. What is the primary function of SWAYAM in higher education?

a) Offering scholarships to students

b) Providing access to online courses

c) Funding research projects

d) Building physical infrastructure for colleges

Answer: b) Providing access to online courses

35. Which initiative is focused on broadcasting educational content through DTH channels?

a) SWAYAM

b) Swayam Prabha
c) National Academic Depository

d) Virtual labs

Answer: b) Swayam Prabha

36. Which platform stores academic awards, certificates, and diplomas in digital format?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) National Digital Library of India

Answer: c) National Academic Depository

37. What is the primary function of the National Digital Library of India?

a) Broadcasting educational content through DTH channels

b) Offering online courses for free

c) Storing academic awards and certificates digitally

d) Providing access to digital educational resources

Answer: d) Providing access to digital educational resources

38. E-Sodh-Sindhu primarily provides access to:

a) Scholarships for students

b) Research journals and databases

c) Online courses

d) Virtual laboratories

Answer: b) Research journals and databases


39. Which initiative provides virtual laboratories for conducting experiments online?

a) e-acharya

b) e-Yantra

c) Virtual labs

d) NPTEL

Answer: c) Virtual labs

40. What is the main focus of e-acharya?

a) Offering scholarships to students

b) Providing access to digital educational resources

c) Facilitating skill development among teachers

d) Building physical infrastructure for colleges

Answer: c) Facilitating skill development among teachers

41. e-Yantra is aimed at promoting:

a) Broadcasting educational content

b) Robotics education and research

c) Online courses

d) Digital resource access

Answer: b) Robotics education and research

42. NPTEL primarily focuses on providing:

a) Access to digital educational resources

b) Scholarships for students

c) Physical infrastructure for colleges

d) Online courses
Answer: d) Online courses

43. Which initiative is specifically designed for storing academic awards and certificates digitally?

a) SWAYAM

b) National Academic Depository

c) National Digital Library of India

d) E-Sodh-Sindhu

Answer: b) National Academic Depository

44. What does E-Sodh-Sindhu primarily provide access to?

a) Scholarships

b) Research journals and databases

c) Online courses

d) Virtual laboratories

Answer: b) Research journals and databases

45. Which initiative offers virtual laboratories for conducting experiments online?

a) e-acharya

b) e-Yantra

c) Virtual labs

d) NPTEL

Answer: c) Virtual labs

46. What is the main focus of NPTEL?

a) Broadcasting educational content


b) Providing access to digital resources

c) Offering online courses

d) Storing academic certificates

Answer: c) Offering online courses

47. What is the primary function of SWAYAM in higher education?

a) Offering scholarships to students

b) Providing access to online courses

c) Funding research projects

d) Building physical infrastructure for colleges

Answer: b) Providing access to online courses

48. Which initiative is focused on broadcasting educational content through DTH channels?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) Virtual labs

Answer: b) Swayam Prabha

49. Which platform stores academic awards, certificates, and diplomas in digital format?

a) SWAYAM

b) Swayam Prabha

c) National Academic Depository

d) National Digital Library of India

Answer: c) National Academic Depository


50. What is the primary function of the National Digital Library of India?

a) Broadcasting educational content through DTH channels

b) Offering online courses for free

c) Storing academic awards and certificates digitally

d) Providing access to digital educational resources

You might also like