Thursday, 25 April 2019

Internet, Web and Electronic Commerce

A protocol defines the rules for passing information between two 1 ) or more computers
A ) TRUE
B ) FALSE
2 ) A(n) __________ is a set of rules for sending information and messages over the Internet
A ) protocol
B ) ISP
C ) HTML
D ) applet
___ provides a fast, efficient alternative to traditional mail for sending and receiving electronic
documents.
3 )
A ) E-mail
B ) Topology
C ) e-Shopping
D ) Revolution
4 ) ____ are electronic systems that transmit data from one location to another.
A ) Communication Systems
B ) Communication Software
C ) Computer Systems
D ) Topology
5 ) ____ supports direct, "live" electronic communication between two or more friends or buddies.
A ) Instant Member
B ) Instant Messaging
C ) Internet Mail
D ) Invisible Message
_____ also known as voice grade and low bandwidth which is used for standard telephone
communication.
6 )
A ) Voice band
B ) Voice record
C ) Volume band
D ) Voice Over
______ is a concept related to using computer networks to link people 7 ) and resources.
A ) Data
B ) Information
C ) Linking
D ) Connectivity
8 ) …….….. is the transmission of telephone calls over computer networks.
A ) Voice over IP (VoIP)
B ) Volume over IP (VoIP)
C ) Vide over IP (VoIP)
D ) Vacuum over IP (VoIP)
A Firewall is a security system designed to protect an organization's network against external
threats.
9 )
A ) True
B ) False
10 ) Authority, Accuracy, Objectivity and Currency terms are related to ……..
A ) Application Software s
B ) Operating Systems
C ) Content Evaluation
D ) Accounting Softwares
11 ) B2C, C2C and B2B are types of --------
A ) E-mail
B ) E-commerce
C ) e-cash
D ) ISPs
Bharat Sanchar Nigam Limited (BSNL) and Videsh Sanchar Nigam Limited (VSNL) are most widely
used eLearning web sites.
12 )
A ) TRUE
B ) FALSE
Bharat Sanchar Nigam Limited (BSNL) and Videsh Sanchar Nigam Limited (VSNL) are most widely
used National Service Providers.
13 )
A ) TRUE
B ) FALSE
Communication Systems are electronic systems that transmit data from one location 14 ) to another.
A ) TRUE
B ) FALSE
Company “A” selling the goods to company “B” using Internet. What type of E-commerce they are
doing?
15 )
A ) Customer-to-Customer (C2C)
B ) Business-to-customer (B2C)
C ) Business-to-Business (B2B)
D ) None of these
16 ) Consumer to Consumer (C2C) e-commerce involves individuals selling to individuals.
A ) TRUE
B ) FALSE
17 ) Cyber Patrol, Cybersitter, Net Nanny are all examples of antivirus software.
A ) True
B ) False
18 ) Electronic commerce involving individuals selling to individuals is known as ………...
A ) A2C
B ) B2A
C ) B2B
D ) C2C
Every day, you receive e-mail messages from unknown senders. What is the term for this type of
security threat?
19 )
A ) Phishing
B ) Reading
C ) Spoofing
D ) Spam
20 ) File Compression is the transmission of telephone calls over computer networks.
A ) TRUE
B ) FALSE
21 ) Following are the examples of eCommerce, EXCEPT
A ) An individual purchases a book on the Internet.
B ) A government employee reserves a hotel room over the Internet.
C ) An individual paying his electricity bill through the Internet
D ) Sending an e-mail to your friend
Following are the types 22 ) of Modems except
A ) External
B ) Internal
C ) Wireless
D ) PDA
23 ) Following are three basic categories of Social Networking sites.
A ) Reuniting
B ) Friend-of-a-friend
C ) Netware
D ) Common Interest
24 ) Gtalk is used for the following purpose
A ) To send instant message
B ) To send a file
C ) To buy online items
D ) None of these
25 ) Gtalk is used for the following purpose, EXCEPT
A ) To send instant message
B ) To send a file
C ) To buy online items
If you are having rediffmail account with the name rocky@rediffmail.com and password "rocky".
Now you want to change the password "rocky" to "######". You can change this password with
the help of your System Administrator only.
26 )
A ) TRUE
B ) FALSE
If you are selecting "Quick Tabs" option, you can see all the web pages as shown in the given
image,
27 )
A ) TRUE
B ) FALSE
28 ) Keyword search and Directory search are two search approaches provided by Search Engines.
A ) TRUE
B ) FALSE
PayPal 29 ) offers a form of
A ) spam protection
B ) online stock trading
C ) spider detection
D ) digital cash
30 ) Plug-ins are programs that are automatically started and operate as a part of the browser
A ) TRUE
B ) FALSE
31 ) Primary search and Secondary search are two search approaches provided by Search Engines.
A ) TRUE
B ) FALSE
Process of copying information from your computer to a specially configured FTP server is called
as ……………
32 )
A ) Downloading
B ) Uploading
C ) Deleting
D ) Restoring
Process of copying information from your computer to a specially configured FTP server is called
as uploading.
33 )
A ) TRUE
B ) FALSE
Process of copying information to your computer from a specially configured FTP server is called
as ……………
34 )
A ) Downloading
B ) Uploading
C ) Deleting
D ) Restoring
Process of copying information to your computer from a specially configured FTP server is called
as downloading.
35 )
A ) TRUE
B ) FALSE
Process of copying information to your computer from a specially configured FTP server is known
as restoring.
36 )
A ) TRUE
B ) FALSE
Programs that automatically start and operate as a part of your 37 ) browser are called
A ) plug-ins.
B ) readers.
C ) pop-ups.
D ) ActiveX Controls.
38 ) Refer the image shown on the screen. Identify protocol name from the given URL.
A ) http
B ) www
C ) mkcl
D ) org
Refer the image shown on the screen. Which of the following statements about the given image
are true?
39 )
A ) The first part i.e. mkclsupport is the "user name" and second part i.e. gmail.com is the
"domain name"
B ) The given address is used to remove virus from your computer
C ) The first part i.e. mkclsupport is the "domain name" and second part i.e. gmail.com is the "user
name"
D ) All the options are correct
Refer the image shown on the screen. Which part of the given image defines top-level domain
(TLD)?
40 )
A ) http
B ) www
C ) mkcl
D ) org
Refer the image shown on the screen. You are using Yahoo messenger to chat with your friends.
Referring to the above scenario, you are using …………. activity of the Internet.
41 )
A ) Shopping
B ) Searching
C ) Communication
D ) e-Learning
Refer the image shown on the screen. You want to purchase mobile phone from the given web
page. Referring to the above scenario, you are using .......... activity of the Internet.
42 )
A ) e-blogs
B ) e-learning
C ) e-commerce
D ) e-post
Refer the image shown on the screen. You want to purchase mobile phone from the given web
page. Referring to the above scenario, you are using e-commerce activity of the Internet.
43 )
A ) TRUE
B ) FALSE
The TCP/ IP connects all system components and allows input and output devices to
communicate with the system unit.
44 )
A ) TRUE
B ) FALSE
The globally accepted wireless service for sending messages of up to 160 alphanumeric characters
between mobile subscribers and external systems such as email, paging, and voice mail systems
is popularly known as SMS.
45 )
A ) TRUE
B ) FALSE
The premier business-oriented social networking 46 ) site is …….
A ) Orkut
B ) LinkedIn
C ) Metalink
D ) MySpace
This is a program to block selected Web sites, set time limits, monitor use, and generates reports
on use.
47 )
A ) Center for European Nuclear Research (CERN)
B ) wireless modem
C ) filter
D ) client-server network
This is a type of communication system that uses the Internet to connect two or more people via
telephone.
48 )
A ) scanner
B ) e-mail
C ) facsimile (fax) machine
D ) Internet telephony
This is handheld, book-sized device that display text and graphics. This device is used to view
content downloaded from the web, read online newspapers, magazines and books.
49 )
A ) output
B ) handwriting recognition software
C ) e-book reader
D ) stylus
Using Google search Engine, you can search information in any language other than English
such as Marathi, Hindi etc. also
50 )
A ) TRUE
B ) FALSE
Utilities are programs that are used for retrieving, presenting, and traversing information resources
on the World Wide Web.
51 )
A ) TRUE
B ) FALSE
Voice over IP (VoIP) is the transmission of telephone calls over 52 ) computer networks.
A ) TRUE
B ) FALSE
53 ) Web pages that contain hypertext markup language commands are typically written in Java.
A ) TRUE
B ) FALSE
54 ) What is blog?
A ) Online Music
B ) Intranet
C ) A personal or corporate Google Search
D ) A personal or corporate website in the form of an online journal
55 ) What is PLUGIN?
A ) Content-control software
B ) programs to filter unwanted e-mail messages.
C ) Program that automatically starts and operates as a part of a web browser to fully experience
the content of a web site.
D ) None of these
What is the purpose 56 ) of a firewall?
A ) To provide secure off-site data storage for a computer or network
B ) To provide a computer or network with wireless access to the Internet
C ) To delete temporary Internet files and cookies from a computer or network.
D ) To protect a computer or network against unauthorized intrusion
57 ) What is the purpose of the refresh button in Internet Explorer?
A ) Search for web pages
B ) Remove your favorite websites
C ) Display the home page
D ) Reload the current page
When surfing the Web, the browser interprets the HTML command found in a document file, and
displays it as a(n)
58 )
A ) Web page.
B ) Java page.
C ) Applet page.
D ) domain page
59 ) Which of the following are the examples of eCommerce
A ) An individual purchases a book on the Internet.
B ) A government employee reserves a hotel room over the Internet.
C ) An individual paying his electricity bill through the Internet
D ) An individual paying his Mobile bill through the Internet
60 ) Which of the following network’s strategies are widely used on the Internet.
A ) terminal network
B ) Client/server network
C ) peer-to-peer network
D ) Organizational Internets
61 ) Which of the following terms are related to Content Evaluation?
A ) Authority
B ) Curiosity
C ) Objectivity
D ) Accuracy
Which one of the following option do you use to send your scanned photo to your friend through
the Internet?
62 )
A ) Send as an attachment in e-mail
A ) e-mail
B ) Google Talk
B ) File transfer using Google Talk
C ) Yahoo Messenger
C ) File transfer using Yahoo Messenger
D ) Java
D ) All of these
Wireless service providers provide Internet connections for computers with 63 ) wireless modems.
A ) TRUE
B ) FALSE
You are searching information over the internet and found the page given in the reference image.
Referring to the above scenario, identify the name of Internet Activity?
64 )
A ) Shopping
B ) Communicating
C ) Entertainment
D ) e-learning
You are searching information over the internet and found the page having information about
"Online Learning". Referring to the above scenario, identify the type of web site you are viewing?
65 )
A ) Shopping
B ) Communicating
C ) Entertainment
D ) e-learning
66 ) You can search information using …….
A ) Search Engines
B ) Metasearch Engines
C ) Specialized Search Engines
D ) All of these

No comments:

Post a Comment