namma_kalvi_12th_computer_applications_1_mark_question_paper_em_216954
namma_kalvi_12th_computer_applications_1_mark_question_paper_em_216954
in
49. Which of the following PHP statements will output Hello World on the screen?
<?php <?php <?php
printf("Hello World"); printf("Hello World"); printf("Hello World");
?> ?> ?>
a) sprintf (“Hello World”); b) print (“Hello World”);
c) printf (“Hello World”); d) echo (“Hello World”);
50. Which statement will output $x on the screen?
<?php
echo "\$x";
?>
a) echo “/$x”; b) echo “$$x”; c) echo “\$x”; d) echo “$x;
51. Which of the below symbols is a newline character?
a) \r b) /r c)/n d) \n
52. Which one of the following is the right way of defining a function in PHP?
a) function { function body }
b) function fumctionName(parameters) { function body }
c)functionName(parameters) { function body }
d) data type functionName(parameters) { function body }
53. A function in PHP which starts with __ (double underscore) is know as..
a) User Defined Function b) Inbuilt Function
c) Default Function d) Magic Function
54. PHP’s numerically indexed array begin with position ___________
a) -1 b) 0 c) 2 d) 1
55. Which of the following are correct ways of creating an array?
i) state[0] = “Tamilnadu”;
ii) $state[] = array(“Tamilnadu”);
iii) $state[0] = “Tamilnadu”;
iv) $state = array(“Tamilnadu”);
<?php
$state = array("Tamilnadu","Delhi","Kerala");
echo(array_search("Kerala", $state));
?>
a) iii) and iv) b) Only iv) c) ii) and iii) d) ii), iii) and iv)
Namma Kalvi www.nammakalvi.in
75. What will be displayed in a browser when the following PHP code is executed:
<?php
for ($counter = 20; $counter < 10;
$counter++){
echo “Welcome to Tamilnadu “;
}
echo “Counter is: $counter”;
?>
a) Welcome to Tamilnadu
b) Welcome to Tamilnadu Welcometo Tamilnadu Counter is: 22
c) Welcome to Tamilnadu Counteris: 22
d) Counter is: 20
76. What will be displayed in a browser when the following PHP code is executed:
<?php
for ($counter = 10; $counter < 10;
$counter = $counter + 5){
echo “Hello”;
}
?>
a) Hello Hello Hello Hello Hello b) Hello c) Hello Hello Hello d) None of the above
81. When you use the $_GET variable to collect data, the data is visible to..
a) none b) selected few c) everyone d) only you
82. Which one of the following should not be used while sending passwords or other sensitive
information?
a) GET b) NEXT c) REQUEST d) POST
83. Which directive determines whether PHP scripts on the server can accept file uploads?
a) file_input b) file_upload c) file_uploads d) file_intake
84. In HTML form <input type=”text”> is used for
a) Block of text b) One line text c) One paragraph d) None
85. HTML classes that is already defined and allow us to apply styles on it are called as
a) Javascript classes b) Css classes c) Pseudo classes d) None
86. If you would like to read a file character by character which function do you use?
a) fopen ( ) b) fgetc ( ) c) fread ( ) d) file ( )
87. PHP is a ______ typed language.
a) User b) Server c) Loosely d) System
88. What does fopen() function do in PHP?
a) It used to open Remote Computer b) It used to open Remote Server
c) It used to open folders in PHP d) It used to open files in PHP
89. How PHP files can be accessed?
a) Through Web Browser b) Through Web Server
c) Through HTML files d) All of Above
90. Which of the following functions reads the entire contents of a file?
a) fgets() b) fread() c) file_get_contents() d) readfile()
91. Which one of the following statements instantiates the mysqli class?
a) mysqli->new.mysqli() b) $mysqli = new mysqli()
c) $mysqli->new.mysqli() d) mysqli = new mysqli()
92. Which one is correct way, we can retrieve the data in the result set of MySQL using PHP?
a) mysql_fetch_row. b) mysql_fetch_object
c) mysql_fetch_array d) All the above
J. BASKARAN M.Sc., B.Ed. (C.S) J. ILAKKIA M.Sc., M.Phil., B.Ed. (C.S)
[email protected] [email protected]
Namma Kalvi www.nammakalvi.in
121. Communication over ------------ ------is be made up of voice, data, images and text messages.
a) whatsapp b) mobile network c) Social media d) software
122. Wi-Fi stands for---------------------
a) wireless optic fibre b) wired fidelity c) wired optic fibre d) Wireless Fidelity
123. A TCP/IP network with access restricted to members of an organization
a) WAN b) MAN c) LAN d) Intranet
124. RFID stands for --------------
a) Radio Frequency Identification. b) Real Frequency identity
c) Radio Frequency indicators d) Radio Free identification
125. It guarantees the sending of data is successful and which checks error on operation at OSI layer
is---
a) Transport Layer b) Network layer c) Application layer d) Physical layer
126. Which one of the following will secure data on transmissions
a) HTTPS b) SMTP c) FTP d) HTTP
127. ----------- provides e-mail service
a) SMTP b) FTP c) TCP d) DNS
128. ------------- refer to other host computers by using names rather than numbers.
a) SMTP b) FTP c) TCP d) DNS
129. TCP/IP is a combination of two protocols:
i. Transmission Control Protocol (TCP) ii. Internet Protocol (IP)
iii. Selection Protocol (SP) iv. Captial Protocol (CP)
a) i, ii b) ii, iii c) iii, iv d) i, iii
130. Which of the following is used to maintain all the directory of domain names?
a) Domain name space b) Domain name system
c) IP address d) Name space
131. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Hexadecimal c) Dotted-decimal d) a and b
132. How many bits are used in the IPv6 addresses?
a) 128 b) 16 c) 32 d) 64
133. Expansion of URL is
a) Uniform Resource Location b) Uniform Resource Locator
c) Universal Resource Location d) Universal Resource Locator
134. How many types are available in Relative URL?
a) 5 b) 4 c) 3 d) 2
135. Maximum characters used in the label of a node?
a) 63 b) 32 c) 255 d) 128
136. In domain name, sequence of labels are separated by
a) ; b) NULL c) : d) .(dot)
137. Pick the odd one out from the following.
a) label b) node c) server d) domain
138. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Name servers c) Resolver d) Domain
Namma Kalvi www.nammakalvi.in
139. Which is the contiguous area up to which the server has access?
a) Resolver b) Name servers c) Zone d) Domain
140. ISP stands for
a) Index service provider b) Internet Service Provider
c) Internet service Protocol d) International Service provider
141. TLD stands for
a) Top Level Domain b) Top Logical Domain
c) Term Level Data d) Top Level Data
142. Which of the following statements are true?
i) Domains name is a part of URL.
ii) URL made up of four parts
iii) The relative URL is a part of Absolute URL
iv) URL doesn’t contain any protocol
a) i & ii b) i, ii & iii c) ii d) i, ii & iv
143.Assertion (A) : The number of addresses used in IPv6 addressing method is 128 .
Reason (R) : IPv6 address is a 128 bit unique address.
a) A is true and R is false.
b) A is false and R is true.
c) Both A and R are correct and R is not the correct explanation of A.
d) Both A and R are correct and R is the correct explanation of A.
144. Match the following
a. domain - 1. Progress that initiates translation
b. zone - 2. contains database of domain names
c. name server - 3. single node
d. resolver - 4. contiguous nodes
a. 3214 b.3421 c. 1432 d. 3412
145. ARPANET stands for
a) American Research Project Agency Network b) American Research Programs And Network
c) Advanced Research Project Agency Network d) Advanced Research Project AreaNetwork
146. WWW was invented by
a) Tim Berners Lee b) John Napier c) Blaise Pascal d) Charles Babbage
147. Which cable is used in cable TV to connect with setup box?
a) Coaxial cable b) Fibre optics c) UTP cable d)USB cable
148. Expansion of UTP is
a) Universal Twisted Protocol b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair d) Uninterrupted Twisted Pair
149. Which medium is used in the optical fibre cables to transmit data?
a) Microwave b) sound c)light d) infrared
150. Which of the following is a small peripheral device with a sim slot to connect the computers to
Internet?
a) Dongles b) USB c) Mobiles d) Memory card
151. Which connector is used in the Ethernet cables?
a) RJ21 b) RJ11 c) RJ45 d) RJ61
Namma Kalvi www.nammakalvi.in
177. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Maximum and Minimum
c) Micro and Nano d) Maximum and Macro
178. Which of the following is not a category of micropayment?
a) Buying a movie ticket b) Subscription to e journals
c) Paying for smartphone app d) Buying a laptop
179. Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) ) (A) is true and (R) is false
c) Both (A) and (R) are correct, but (R) is not the correct explanation of (A
d) (A) is false and (R) is true
180. Which of the following is correctly matched?
a) Credit Cards - pay before
b) Debit Cards - pay now
c) Stored Value Card - pay later
d) Smart card - pay anytime
181. ECS stands for
a) Electronic Clearing Services b) Electronic Clearing Station
c) Electronic Cloning Services d) Electronic Cloning Station
182. Which of the following is not a Altcoin
a) Ethereum b) Namecoin c) Litecoin d) Bitcoin
183. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA
b) VPA is a unique ID
c) VPA does not includes numbers
d) Multiple bank accounts cannot have single VPA
184. Pick the odd one in the credit card transaction
a) acquirer b) marketing manager c) merchant d) card holder
185. Which of the following is true about debit card
i. debit cards cannot be used in ATMs
ii. debit cards cannot be used in online transactions
iii. debit cards do not need bank accounts
iv. debit cards and credit cards are identical in physical properties
A1 A2 A3 A4
a) B4 B3 B2 B1 b) B2 B1 B3 B4 c) B2 B3 B4 B1 d) B2 B4 B3 B1
187. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Triangulation fraud b) Clean fraud c) Friendly fraud d) Cyber squatting
188. Which of the following is not a security element involved in E-Commerce?
a) Privacy b) Confidentiality c) Authenticity d) Fishing
189. Asymmetric encryption is also called as
a) Secure Electronic Transaction b) RSA algorithm
c) Certification Authority d) Payment Information
190. The security authentication technology does not include
i) Digital Signatures
ii) Digital Time Stamps
iii) Digital Technology
iv) Digital Certificates
a) i, ii & iv b) i, ii & iii c) ii & iii d) all the above
191. PGP stands for
a) Pretty Good Privacy b) Private Good Privacy
c) Pretty Good Person d) Private Good Person
192. _____ protocol is used for securing credit cards transactions via the Internet
a) Symmetric Key Encryption b) Credit Card Verification
c) Secure Electronic Transaction (SET) d) Public Key Encryption
193. Secure Electronic Transaction (SET) was developed in
a) 1969 b) 1996 c) 1999 d) 1997
194. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) https:// c) htmls:// d) http://
195. 3-D Secure, a protocol was developed by
a) Rupay b) Master c) Visa d) PayTM
196. Which of the following is true about Ransomware
a) Ransomware is not a subset of malware b) Typopiracy is a form of ransomware
c) Ransomware deletes the file instantly d) Hackers demand ransom from the victim
197. EDI stands for
a) Electronic Details Information b) Electronic Details Interchange
c) Electronic Data Information d) Electronic Data Interchange
Namma Kalvi www.nammakalvi.in
198. Which of the following is an internationally recognized standard format for trade, transportation,
insurance, banking and customs?
a) FTPFACT b) SETFACT c) TSLFACT d) EDIFACT
199. Which is the first industry-specific EDI standard?
a) ANSI b) VISA c) Master d) TDCC
200. UNSM stands for?
a) Universal Natural Standard message b) United Nations Standard message
c) Universal Notations for Simple message d) United Nations Service message
201. Which of the following is a type of EDI?
a) Indirect EDI b) Unique EDI c) Collective EDI d) Direct EDI
202. Who is called as the father of EDI?
a) Ed Guilbert b) None of the above c) Pascal d) Charles Babbage
203. EDI interchanges starts with ____ and ends with ____
a) UNA, UNZ b) UNB, UNT c) UNA, UNT d) UNB, UNZ
204. EDIFACT stands for
a) EDI for Admissible Commerceand Trade
b) EDI for Administration, Commerce and Transport
c) EDI for Advisory Committee and Transport
d) EDI for Admissible Commercial Transport
205. The versions of EDIFACT are also called as
a) Directories b) Folders c) Message types d) Subsets
206. Number of characters in an single EDIFACT messages
a) 3 b) 4 c) 6 d) 5
PREPARED BY