0% found this document useful (0 votes)
16 views19 pages

namma_kalvi_12th_computer_applications_1_mark_question_paper_em_216954

The document contains a series of one-mark questions for XII Computer Application students, covering topics such as multimedia, database management, and PHP programming. It includes multiple-choice questions, fill-in-the-blanks, and matching exercises designed to aid students in their exam preparation. The authors, J. Baskaran and J. Ilakkia, provide their contact information and encourage students to start their preparation immediately.

Uploaded by

anukavinesh1122
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views19 pages

namma_kalvi_12th_computer_applications_1_mark_question_paper_em_216954

The document contains a series of one-mark questions for XII Computer Application students, covering topics such as multimedia, database management, and PHP programming. It includes multiple-choice questions, fill-in-the-blanks, and matching exercises designed to aid students in their exam preparation. The authors, J. Baskaran and J. Ilakkia, provide their contact information and encourage students to start their preparation immediately.

Uploaded by

anukavinesh1122
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Namma Kalvi www.nammakalvi.

in

DO IT NOW!!! SOMETIMES LATER BECOMES NEVER!!!

START YOUR PREPARATION NOW AND SUCCEED IN YOUR EXAMS!

Textual one mark


QUESTION
FOR
XII- COMPUTER APPLICATION

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.
Namma Kalvi www.nammakalvi.in

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.

One mark test


1. ________ refers to any type of application that involves more than one type of media such as text,
Graphics video animation and sound
a) an executable file b) multimedia c) desktop publishing d) hypertext
2. One of the disadvantages of the multimedia is its __
a) adaptability b) relativity c) usability d) cost
3. Expand JPEG
a) Joint photo experts gross b) joint photographic expression group
c) Joint processor experts group d) joint photographic experts group
4. You need hardware, software and __ to make multimedia
a) Network b) programming knowledge c) good idea d) compact disk drive
5. Match the following by choosing the right one
1. Text – TGA
2. Image – MIDI
3. Sound – MPEG
4. Video – RTF
a. 4, 1, 2, 3 b. 2, 3, 4, 1 c. 1, 2, 3, 4 d. 3, 4, 1, 2
6. Find the odd one on the following which is not an image format
a) TIFF b) RTF c) BMP d) JPEG
7. ___ is the process displaying still images they give continuous movement
a) Animation b) Sound c) MP3 d) Text formats
8. The live telecasting of real time program through Internet is known as ____
a) Data manipulation b) web hosting c) web casting d) none of the above
9. GIF use _______ color look up table
a) 8 GB b) 8 KB c) 8 MB d) 8 bit
10. RTF file format was introduced by ______
a) TCS b) Microsoft c) Apple d) IBM
11. DTP stands for ______________
(a) Desktop Printer (b) Desktop Publication
(c) Doctor To Patient (d) Desktop Publishing
12. ____________ is a DTP software.
(a) Lotus 1-2-3 (b) Flash (c) Maya (d) PageMaker
13. Which menu contains the New option?
(a) Type menu (b) Edit menu (c) Layout menu (d) File menu
14. In PageMaker Window, the area outside of the dark border is referred to as _________.
(a) page (b) dashboard (c) blackboard (d) pasteboard
15. Shortcut to close a document in PageMaker is ______________
(a) Ctrl + C (b) Ctrl + B (c) Ctrl + A (d) Ctrl + W
16. A __________ tool is used for magnifying the particular portion of the area.
(a) Text tool (b) Zoom tool (c) Line tool (d) Hand tool
17. _________ tool is used for drawing boxes.
(a) Rectangle (b) Ellipse (c) Line (d) Text
Namma Kalvi www.nammakalvi.in

18. Place option is present in _____________ menu.


(a) Window (b) Layout (c) Edit (d) File
19. To select an entire document using the keyboard, press ___________
(a) Ctrl + C (b) Ctrl + B (c) Ctrl + A (d) Ctrl + D
20. Character formatting consists of which of the following text properties?
(a) Bold (b) All of these (c) Underline (d) Italic
21. Which tool lets you edit text?
(a) Type tool (b) Text tool (c) Crop tool (d) Hand tool
22. Shortcut to print a document in Pagemaker is ___________
(a) Ctrl + A (b) Ctrl + V (c) Ctrl + C (d) Ctrl + P
23. Adobe PageMaker is a _______software.
24. _______Bar is the topmost part of the PageMaker window.
25. _______ is the process of moving up and down or left and right through the document window.
26. _______tool is used to draw a circle.
27. The Insert pages option is available on clicking the_______menu.
28. Match the following.
Cut - (i) Ctrl + Z
Copy - (ii) Ctrl + V
Paste - (iii) Ctrl + X
Undo - (v) Ctrl + C
29 Choose the odd man out.
i. Adobe PageMaker, QuarkXPress, Adobe InDesign, Audacity
ii. File, Edit, Layout, Type, Zip
iii. Pointer Tool, Line tool, Hide Tool, Hand Tool
iv. Bold, Italic, Portrait, Underline
30. Choose the correct statement.
i. (a) Text can be selected using mouse only.
(b) Text can be selected using mouse or the keyboard.
ii. (a) DTP is an abbreviation for Desktop publishing.
(b) DTP is an abbreviation for Desktop publication.
31 Choose the correct pair
(a) Edit and Cut (b) Undo and Redo (c) Undo and Copy (d) Edit and New
32. Which language is used to request information from a Database?
a) Compiler b) Structural c) Query d) Relational
33. The ---------- diagram gives a logical structure of the database graphically?
a) Database b) Entity c) Architectural Representation d) Entity-Relationship
34. An entity set that does not have enough attributes to form primary key is known as
a) Identity set b) Weak entity set c) Strong entity set d) Owner set
Namma Kalvi www.nammakalvi.in

35. ---------- Command is used to delete a database.


a) drop database_name b) Delete database_name
c) drop database database_name d) Delete database database_name
36. Which type of below DBMS is MySQL?
a) Relational b) Hierarchical c) Object Oriented d) Network
37. MySQL is freely available and is open source.
a) True b) False
38. ---------- represents a “tuple” in a relational database?
a) Column b) Row c) Table d) Object
39. Communication is established with MySQL using
a) Network calls b) SQL c) Java d) API’s
40. Which is the MySQL instance responsible for data processing?
a) MySQL Client b) Server Daemon Program c) SQL d) MySQL Server
41. The structure representing the organizational view of entire database is known as -------- in
MySQL database.
a) Instance b) View c) Schema d) Table
42. What does PHP stand for?
a) Personal Home Page b) Pre-processor Home Page
c) Pretext Hypertext Processor d) Hypertext Preprocessor
43. What does PHP files have a default file extension?
a) .php b) .xml c) .html d) .ph
44. A PHP script should start with ___ and end with ___:
a) <?php ?> b) < ? php ?> c) < ? ?> d) <php>
45. Which of the following must be installed on your computer so as to run PHP script?
a) windows b) IIS c) Apache d) Adobe
46. We can use ___ to comment a single line?
i) /? ii) // iii) # iv) /* */
a) Only (ii) b) (ii), (iii) and (iv) c) (i), (iii) and (iv) d) Both (ii) and (iv)
47. Which of the following PHP statement/statements will store 41 in variable num?
(i) int $num = 41 (ii) int num = 41; (iii) $num = 41; (iv) 111 = $num;
a) Both (i) and (ii) b) Only (iii). c) All of the mentioned d) Only (i)
48. What will be the output of the following PHP code?
<?php
$num = 1;
$num1 = 2;
print $num."+".$num1;
?>
a) 1+2 b) 3 c) 1.+.2 d) Error
Namma Kalvi www.nammakalvi.in

49. Which of the following PHP statements will output Hello World on the screen?
<?php <?php <?php
printf("Hello World"); printf("Hello World"); printf("Hello World");
?> ?> ?>
a) sprintf (“Hello World”); b) print (“Hello World”);
c) printf (“Hello World”); d) echo (“Hello World”);
50. Which statement will output $x on the screen?
<?php
echo "\$x";
?>
a) echo “/$x”; b) echo “$$x”; c) echo “\$x”; d) echo “$x;
51. Which of the below symbols is a newline character?
a) \r b) /r c)/n d) \n
52. Which one of the following is the right way of defining a function in PHP?
a) function { function body }
b) function fumctionName(parameters) { function body }
c)functionName(parameters) { function body }
d) data type functionName(parameters) { function body }
53. A function in PHP which starts with __ (double underscore) is know as..
a) User Defined Function b) Inbuilt Function
c) Default Function d) Magic Function
54. PHP’s numerically indexed array begin with position ___________
a) -1 b) 0 c) 2 d) 1
55. Which of the following are correct ways of creating an array?
i) state[0] = “Tamilnadu”;
ii) $state[] = array(“Tamilnadu”);
iii) $state[0] = “Tamilnadu”;
iv) $state = array(“Tamilnadu”);
<?php
$state = array("Tamilnadu","Delhi","Kerala");
echo(array_search("Kerala", $state));
?>
a) iii) and iv) b) Only iv) c) ii) and iii) d) ii), iii) and iv)
Namma Kalvi www.nammakalvi.in

56. What will be the output of the following PHP code?


<?php
$a=array(“A”,”Cat”,”Dog”,”A”,”Dog”);
$b=array(“A”,”A”,”Cat”,”A”,”Tiger”);
$c=array_combine($a,$b);
print_r(array_count_values($c));
?>
a) Array ( [A] => 2 [Cat] => 1 [Dog] => 4 [Tiger] => 1 )
b) Array ( [A] => 2 [Cat] => 2 [Dog] => 1 [Tiger] => 1 )
c) Array ( [A] => 6 [Cat] => 1 [Dog] => 2 [Tiger] => 1 )
d) Array ( [A] => 5 [Cat] => 2 [Dog] => 2 [Tiger] => 1 )
57. For finding nonempty elements in array we use

a) is_array ( ) function b) array_count ( ) function


c) sizeof ( ) function d) count ( ) function
58. Indices of arrays can be either strings or numbers and they are denoted as
a) $my_array {4} b) None of them c) $my_array| 4 | d) $my_array [4]
59. PHP arrays are also called as
a) Vector arrays b) Perl arrays c) All of them d) Hashes
60. As compared to associative arrays vector arrays are much
a) None of them b) Slower c) Stable d) Faster
61. What functions count elements in
an array?
a) Array_Count b) Sizeof c) count d) Count_array
62. What will be the output of the
following PHP code?
<?php
$x;
if ($x)
print “hi” ;
else
print “how are u”;
?>
a) error b) hi c) how are u d) no output
63. What will be the output of the
following PHP code ?
<?php
$x = 0;
if ($x++)
print “hi”;
else
print “how are u”;
?>
a) how are u b) no output c) error d) hi
Namma Kalvi www.nammakalvi.in

64. What will be the output of the


following PHP code ?
<?php
$x;
if ($x == 0)
print “hi” ;
else
print “how are u”;
print “hello”
?>
a) hi b) hihello c) how are uhello d) no output
65. Statement which is used to make choice between two options and only option is to be performed is
written as
a. if statement b. else one statement c. then else statement d. if else statement
66. What will be the output of the following PHP code ?
<?php
$a = “”;
if ($a)
print “all”;
if
else
print “some”;
?>

a) error b) some c) all d) no output

67. What will be the output of the following PHP code ?


<?php
$a = “”;
if ($a)
print “all”;
if
else
print “some”;
?>

a) some b) all c) error d) no output

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Namma Kalvi www.nammakalvi.in

68. What will be the output of the following PHP code ?


<?php
$x = 10;
$y = 20;
if ($x > $y + $y != 3)
print “hi” ;
else
print “how are u”;
?>
a) error b) hi c) how are u d) no output

69. What will be the output of the following PHP code ?


<?php
$x = 10;
$y = 20;
if ($x > $y && 1||1)
print “hi” ;
else
print “how are u”;
?>
a) hi b) error c) how are u d) no output

70. What will be the output of the following PHP code ?


<?php
if (-100)
print “hi” ;
else
print “how are u”;
?>
a) hi b) error c) how are u d) no output

71. Most complicated looping structure is


a) DoWhile b) While c) For d) None of them
72. Loops that iterate for fixed number of times is called
a) Bounded loops b) Unbounded loops c) While loops d) For loops
73. Which loop evaluates condition expression as Boolean, if it is true, it executes statements and
when it is false it will terminate?
a) For each loop b) For loop c) While loop d) All of them
74. Which loop evaluates condition expression as Boolean, if it is true, it executes statements and
when it is false it will terminate?
a) While loop b) For each loop c)For loop d) All of them
Namma Kalvi www.nammakalvi.in

75. What will be displayed in a browser when the following PHP code is executed:
<?php
for ($counter = 20; $counter < 10;
$counter++){
echo “Welcome to Tamilnadu “;
}
echo “Counter is: $counter”;
?>
a) Welcome to Tamilnadu
b) Welcome to Tamilnadu Welcometo Tamilnadu Counter is: 22
c) Welcome to Tamilnadu Counteris: 22
d) Counter is: 20

76. What will be displayed in a browser when the following PHP code is executed:
<?php
for ($counter = 10; $counter < 10;
$counter = $counter + 5){
echo “Hello”;
}
?>
a) Hello Hello Hello Hello Hello b) Hello c) Hello Hello Hello d) None of the above

77. PHP supports four types of looping techniques;


a) foreach loop b) while loop c) for loop d) all the above

78. Consider the following code


<? php
$count=12;
do{
printf(“%d squared=%d<br/>”,
$count, pow($count,2));
} while($count<4);
?>
What will be the output of the code.
a) “12 squared =141” b) 12 squared=141 c) 12 squared141 d) Execution error

79. What will be the output of the


following PHP code ?
<?php
for ($x = 1; $x < 10;++$x)
{
print “*\t”;
}
?>
a) ********** b) *********** c) ********* d) Infinite loop
Namma Kalvi www.nammakalvi.in

80. What will be the output of the


following PHP code ?
<?php
for ($x = -1; $x < 10;--$x)
{
print $x;
}
?>
a) 123456713910412 b) 1234567139104 c) 123456713910 d) Infinite loop

81. When you use the $_GET variable to collect data, the data is visible to..
a) none b) selected few c) everyone d) only you
82. Which one of the following should not be used while sending passwords or other sensitive
information?
a) GET b) NEXT c) REQUEST d) POST
83. Which directive determines whether PHP scripts on the server can accept file uploads?
a) file_input b) file_upload c) file_uploads d) file_intake
84. In HTML form <input type=”text”> is used for
a) Block of text b) One line text c) One paragraph d) None
85. HTML classes that is already defined and allow us to apply styles on it are called as
a) Javascript classes b) Css classes c) Pseudo classes d) None
86. If you would like to read a file character by character which function do you use?
a) fopen ( ) b) fgetc ( ) c) fread ( ) d) file ( )
87. PHP is a ______ typed language.
a) User b) Server c) Loosely d) System
88. What does fopen() function do in PHP?
a) It used to open Remote Computer b) It used to open Remote Server
c) It used to open folders in PHP d) It used to open files in PHP
89. How PHP files can be accessed?
a) Through Web Browser b) Through Web Server
c) Through HTML files d) All of Above
90. Which of the following functions reads the entire contents of a file?
a) fgets() b) fread() c) file_get_contents() d) readfile()
91. Which one of the following statements instantiates the mysqli class?
a) mysqli->new.mysqli() b) $mysqli = new mysqli()
c) $mysqli->new.mysqli() d) mysqli = new mysqli()
92. Which one is correct way, we can retrieve the data in the result set of MySQL using PHP?
a) mysql_fetch_row. b) mysql_fetch_object
c) mysql_fetch_array d) All the above
J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)
[email protected] [email protected]
Namma Kalvi www.nammakalvi.in

93. How Can we Create a Database Using PHP and MySQL?


a) mysqli_create_db(“Database Name”) b) create_db(“Database Name”)
c) mysqli_create_db(“Data”) d) create_db(“Data”)
94. Which is the correct function to execute the SQL queries in PHP ?
a) mysql_query(“Connection Object”,”SQL Query”)
b) query(“Connection Object”,”SQL Query”)
c) mysqli_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
95. Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Database Object”); b) close(“Connection Object”);
c) mysql_close(“Connection Object”); d) mysqli_close(“Connection Object”);
96. Which is the correct function to establish Connection in PHP ?
a) mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
b) mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
c) connect(“Server Name “,”User Name”,”Password”,”DB Name”);
d) mysqli_connect (“Database Object”);

97. Which is the not a correct MySQL Function in PHP ?


a) mysqli_affected_rows() Function b) Mysqli_close() Function
c) mysqli_select_data() Function d) Mysqli_connect() Function
98. How many parameter are required for MYSQLi connect function in PHP ?
a) 3 b) 2 c) 5 d) 4
99. How many parameter are required for MYSQLi query function in PHP ?
a) 4 b) 5 c) 2 d) 3
100. How many parameter are required for MYSQLi Close function in PHP ?
a) 5 b) 3 c) 2 d) 1
101. Which version of PHP supports MySQLi fuctions ?
a) Version 5.0 b) Version 4.0 c) Version 3.0 d) Version 2.0
102. A set of computers connecting together is called as ----------
a) Hub b) Server c) Network d) Node
103. Computer network devices that originates route and terminate the data were called as
a) Cable b) Resource c) Node d) Hub
104. Match the period and methods available on history of computer networking in the Internet
a) 1950 - X.25 TCP/IP
b) 1966 - SAGE
c) 1976 - WAN
d) 1972 - ARCNET
a) 4321 b) 2341 c) 1234 d) 3421
105. Western Electric introduced the first widely used ----------------- that implemented true computer
control.
a) Host b) Arpanet c) Packet switch d) Telephone switch
Namma Kalvi www.nammakalvi.in

106. Wi-Fi is short name for


a) Wired fidelity b) Wired fiber optic c) Wireless Fidelity d) Wireless fiber optic
107. People everywhere can express and publish their ideas and opinions via
a) Server b) Tele-medicine c) blogging d) Node
108. Which one of the following periods, the speed capacity supported towards gigabit on computer
network?
a) SABRE b) ARCNET c) NEW FIBRE OPTICS d) SAGE
109. One among them was challenging to the business people on computer networking
a) Both a & b b) Viruses c) Hacking d) none of this above
110. ---------- able to predict, manage, and protect the computer network at Internet
a) Broadband provider b) Artificial intelligence c) Cloud computing d) Transceivers
111. -------------use less power comparing with single transmitter or satellite often cell towers nearer
a) WIFI b) Transistors c) Mobile devices d) Communication
112. People now a days getting relaxed via
a) Corporate company b) Business c) Social media d) News papers
113. Which one of the following is not the social media
a) Facebook b) twitter c) Gmail d) Linkedin
114. Facebook was created at ------------year
a) 2002 b) 2010 c) 2013 d) 2004
115. In mobile network, land areas for network coverage was distributed as
a) Range b) cells c) Firmware d) Service
116. Which one were harmful to computer
a) Hackers b) Browser c) Bloggers d) twitter
117. Which innovation made the people to use Internet?
a) Mobile App b) Social web c) Mobile technology d) Both a & b.
118. The-----------, “the Net,” is a worldwide system of computer networks
a) Internet b) protocol c) communication d) mobile
119. Which one of the following will be easy the way to uses Internet technology and the public
telecommunication system to securely share business’s information with suppliers, vendors, partners
and customers.
a) arpanet b) arcnet c) Extranet d) Intranet
120. Match the following and choose the correct answer
i. HTTP - The core protocol of the World Wide Web.
ii. FTP - enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS - Refer to other host computers by using names rather than numbers.
a) i, ii, iii, iv b) iv, iii, ii, i c) iii, iv, i, ii d) ii, iii, iv, i
Namma Kalvi www.nammakalvi.in

121. Communication over ------------ ------is be made up of voice, data, images and text messages.
a) whatsapp b) mobile network c) Social media d) software
122. Wi-Fi stands for---------------------
a) wireless optic fibre b) wired fidelity c) wired optic fibre d) Wireless Fidelity
123. A TCP/IP network with access restricted to members of an organization
a) WAN b) MAN c) LAN d) Intranet
124. RFID stands for --------------
a) Radio Frequency Identification. b) Real Frequency identity
c) Radio Frequency indicators d) Radio Free identification
125. It guarantees the sending of data is successful and which checks error on operation at OSI layer
is---
a) Transport Layer b) Network layer c) Application layer d) Physical layer
126. Which one of the following will secure data on transmissions
a) HTTPS b) SMTP c) FTP d) HTTP
127. ----------- provides e-mail service
a) SMTP b) FTP c) TCP d) DNS
128. ------------- refer to other host computers by using names rather than numbers.
a) SMTP b) FTP c) TCP d) DNS
129. TCP/IP is a combination of two protocols:
i. Transmission Control Protocol (TCP) ii. Internet Protocol (IP)
iii. Selection Protocol (SP) iv. Captial Protocol (CP)
a) i, ii b) ii, iii c) iii, iv d) i, iii

130. Which of the following is used to maintain all the directory of domain names?
a) Domain name space b) Domain name system
c) IP address d) Name space
131. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Hexadecimal c) Dotted-decimal d) a and b
132. How many bits are used in the IPv6 addresses?
a) 128 b) 16 c) 32 d) 64
133. Expansion of URL is
a) Uniform Resource Location b) Uniform Resource Locator
c) Universal Resource Location d) Universal Resource Locator
134. How many types are available in Relative URL?
a) 5 b) 4 c) 3 d) 2
135. Maximum characters used in the label of a node?
a) 63 b) 32 c) 255 d) 128
136. In domain name, sequence of labels are separated by
a) ; b) NULL c) : d) .(dot)
137. Pick the odd one out from the following.
a) label b) node c) server d) domain
138. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Name servers c) Resolver d) Domain
Namma Kalvi www.nammakalvi.in

139. Which is the contiguous area up to which the server has access?
a) Resolver b) Name servers c) Zone d) Domain
140. ISP stands for
a) Index service provider b) Internet Service Provider
c) Internet service Protocol d) International Service provider
141. TLD stands for
a) Top Level Domain b) Top Logical Domain
c) Term Level Data d) Top Level Data
142. Which of the following statements are true?
i) Domains name is a part of URL.
ii) URL made up of four parts
iii) The relative URL is a part of Absolute URL
iv) URL doesn’t contain any protocol
a) i & ii b) i, ii & iii c) ii d) i, ii & iv
143.Assertion (A) : The number of addresses used in IPv6 addressing method is 128 .
Reason (R) : IPv6 address is a 128 bit unique address.
a) A is true and R is false.
b) A is false and R is true.
c) Both A and R are correct and R is not the correct explanation of A.
d) Both A and R are correct and R is the correct explanation of A.
144. Match the following
a. domain - 1. Progress that initiates translation
b. zone - 2. contains database of domain names
c. name server - 3. single node
d. resolver - 4. contiguous nodes
a. 3214 b.3421 c. 1432 d. 3412
145. ARPANET stands for
a) American Research Project Agency Network b) American Research Programs And Network
c) Advanced Research Project Agency Network d) Advanced Research Project AreaNetwork
146. WWW was invented by
a) Tim Berners Lee b) John Napier c) Blaise Pascal d) Charles Babbage
147. Which cable is used in cable TV to connect with setup box?
a) Coaxial cable b) Fibre optics c) UTP cable d)USB cable
148. Expansion of UTP is
a) Universal Twisted Protocol b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair d) Uninterrupted Twisted Pair
149. Which medium is used in the optical fibre cables to transmit data?
a) Microwave b) sound c)light d) infrared
150. Which of the following is a small peripheral device with a sim slot to connect the computers to
Internet?
a) Dongles b) USB c) Mobiles d) Memory card
151. Which connector is used in the Ethernet cables?
a) RJ21 b) RJ11 c) RJ45 d) RJ61
Namma Kalvi www.nammakalvi.in

152. Which of the following connector is called as champ connector?


a) RJ45 b) RJ61 c) RJ21 d) RJ11
153. How many pins are used in RJ45 cables?
a) 25 b) 50 c) 6 d) 8
154. Which wiring standard is used for connecting two computers directly?
a) straight Through wiring b) Rollover wiring
c) Cross Over wiring d) None
155. pick the odd one out from the following cables
a) roll over b) null modem c) cross over d) straight through
156. Match the following
1. Ethernet - Port
2. RJ45 connector - Ethernet
3. RJ45 jack - Plug
4. RJ45 cable - 802.3
a.1, 2, 4, 3 b. 4, 3, 1, 2 c. 4, 1, 3, 2 d. 4, 2, 1, 3
157. If the source code of a software is freely accessible by the public, then it is known as
a) Firmware b) freeware c) Open source d) Public source
158. Which of the following is a software program that replicates the functioning of a computer
network?
a) Network testing b) Network simulation c) Network software d ) Network calculator
159. Which of the following can document every incident that happened in the simulation and are
used for examination?
a) Network hardware b) Net Exam c) Net document d) Trace file
160. Which is an example of network simulator?
a) TCL b) simulator c) Ns2 d) C++
161. Fill in the blanks : NS2 comprises of ______key languages?
a) 3 b) 13 c) 4 d) 2
162. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) C++ & NS2 c) C++ & OTcl d) UNIX & C++
163. Which of the following is not a network simulation software?
a) OPNET b) Ns2 c) SSFNet d) C++
164. Which of the following is a open source network monitoring software?
a) C++ b) OMNet++ c) Open NMS d) OPNET
165. Open NMS was released in …………………
a) 2000 b) 1999 c) 2003 d) 2004
166. OpenNMS Group was created by……………….
a) Balog b) David Hustace c) Matt Brozowski d) All of them.
J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)
[email protected] [email protected]
Namma Kalvi www.nammakalvi.in

167. A company can be called E-Business if


a) it conduct business electronically over the Internet.
b) it has many branches across the world.
c) it sells commodities to a foreign country.
d) it has many employees.
168. Which of the following is not a tangible good?
a) Mobile Apps b) Mobile c) Medicine d) Flower bouquet
169. SME stands for
a) Short messaging enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Small and medium sized enterprises
170. The dotcom phenomenon deals with________
a) Internet based companies b) Mobile phone companies
c) Textile industries d) All the above
171. Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) Dotcom burst: 2000 – 2002
c) The Third Wave of Electronic Commerce: 2010 – Present
d) The Second Wave of ElectronicCommerce: 2004 – 2009
172. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) (A) is false and (R) is true
c) (A) is true and (R) is false
d) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
173. Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to a third party outside its own country
c) Work outsourced to a third party locally
d) Work outsourced to new employees
174. G2G systems are classified into
a) Internal facing and external facing
b) Internet flag and Extranet flag
c) Internal flag and external flag
d) Internet facing and Extranet facing
175. ____ host the e-books on their websites.
a) Licensing sites
b) Community sites
c) Digital publishing sites
d) Bulk-buying sites
Namma Kalvi www.nammakalvi.in

176. Which of the following is not a characteristics of E-Commerce


a) Products cannot be inspected physically before purchase.
b) Scope of business is global.
c) Resource focus supply side
d) Goods are delivered instantly.

177. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Maximum and Minimum
c) Micro and Nano d) Maximum and Macro
178. Which of the following is not a category of micropayment?
a) Buying a movie ticket b) Subscription to e journals
c) Paying for smartphone app d) Buying a laptop
179. Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) ) (A) is true and (R) is false
c) Both (A) and (R) are correct, but (R) is not the correct explanation of (A
d) (A) is false and (R) is true
180. Which of the following is correctly matched?
a) Credit Cards - pay before
b) Debit Cards - pay now
c) Stored Value Card - pay later
d) Smart card - pay anytime
181. ECS stands for
a) Electronic Clearing Services b) Electronic Clearing Station
c) Electronic Cloning Services d) Electronic Cloning Station
182. Which of the following is not a Altcoin
a) Ethereum b) Namecoin c) Litecoin d) Bitcoin
183. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA
b) VPA is a unique ID
c) VPA does not includes numbers
d) Multiple bank accounts cannot have single VPA
184. Pick the odd one in the credit card transaction
a) acquirer b) marketing manager c) merchant d) card holder
185. Which of the following is true about debit card
i. debit cards cannot be used in ATMs
ii. debit cards cannot be used in online transactions
iii. debit cards do not need bank accounts
iv. debit cards and credit cards are identical in physical properties

a) iii alone b) ii, iii, iv c) i, ii, iii d) iv alone

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Namma Kalvi www.nammakalvi.in

186. Match the following


List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) MII Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit

A1 A2 A3 A4
a) B4 B3 B2 B1 b) B2 B1 B3 B4 c) B2 B3 B4 B1 d) B2 B4 B3 B1
187. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Triangulation fraud b) Clean fraud c) Friendly fraud d) Cyber squatting
188. Which of the following is not a security element involved in E-Commerce?
a) Privacy b) Confidentiality c) Authenticity d) Fishing
189. Asymmetric encryption is also called as
a) Secure Electronic Transaction b) RSA algorithm
c) Certification Authority d) Payment Information
190. The security authentication technology does not include
i) Digital Signatures
ii) Digital Time Stamps
iii) Digital Technology
iv) Digital Certificates
a) i, ii & iv b) i, ii & iii c) ii & iii d) all the above
191. PGP stands for
a) Pretty Good Privacy b) Private Good Privacy
c) Pretty Good Person d) Private Good Person
192. _____ protocol is used for securing credit cards transactions via the Internet
a) Symmetric Key Encryption b) Credit Card Verification
c) Secure Electronic Transaction (SET) d) Public Key Encryption
193. Secure Electronic Transaction (SET) was developed in
a) 1969 b) 1996 c) 1999 d) 1997
194. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) https:// c) htmls:// d) http://
195. 3-D Secure, a protocol was developed by
a) Rupay b) Master c) Visa d) PayTM
196. Which of the following is true about Ransomware
a) Ransomware is not a subset of malware b) Typopiracy is a form of ransomware
c) Ransomware deletes the file instantly d) Hackers demand ransom from the victim
197. EDI stands for
a) Electronic Details Information b) Electronic Details Interchange
c) Electronic Data Information d) Electronic Data Interchange
Namma Kalvi www.nammakalvi.in

198. Which of the following is an internationally recognized standard format for trade, transportation,
insurance, banking and customs?
a) FTPFACT b) SETFACT c) TSLFACT d) EDIFACT
199. Which is the first industry-specific EDI standard?
a) ANSI b) VISA c) Master d) TDCC
200. UNSM stands for?
a) Universal Natural Standard message b) United Nations Standard message
c) Universal Notations for Simple message d) United Nations Service message
201. Which of the following is a type of EDI?
a) Indirect EDI b) Unique EDI c) Collective EDI d) Direct EDI
202. Who is called as the father of EDI?
a) Ed Guilbert b) None of the above c) Pascal d) Charles Babbage
203. EDI interchanges starts with ____ and ends with ____
a) UNA, UNZ b) UNB, UNT c) UNA, UNT d) UNB, UNZ
204. EDIFACT stands for
a) EDI for Admissible Commerceand Trade
b) EDI for Administration, Commerce and Transport
c) EDI for Advisory Committee and Transport
d) EDI for Admissible Commercial Transport
205. The versions of EDIFACT are also called as
a) Directories b) Folders c) Message types d) Subsets
206. Number of characters in an single EDIFACT messages
a) 3 b) 4 c) 6 d) 5

PREPARED BY

J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)


[email protected] [email protected]
Puducherry. Puducherry.

****ALL THE BEST ****

You might also like