Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

FYJC TEST 2,MARCH 2023

Subject : IT (All Streams - 97/98/99)


Max. Marks : 20
Duration : 30 mins.
NOTE:
1. All questions are compulsory.
2. Students must make note of the acknowledgement- ‘Thanks’ message received after submitting the paper to ensure that the
paper is submitted successfully.
3. Students must also create PDF of their responses by clicking on ‘Get or Print PDF of answers’ and save it for reference.

STUDENT DETAILS:

Enter all details correctly.

Student Name: ( Lastname Firstname Middlename)


*

Modh Pragat Bhadresh

Stream: *

Commerce

Arts

Science
3

Class:
*

FYJC

SYJC

Division: *

Roll No (In figures only e.g. 1201)


*

962

MCQ1 ( SINGLE CORRECT ANSWER)                                          6 MARKS

Select ONLY ONE answer from the given options


6

Which of the following security procedure is used for encrypted data transmission,
authentication of client-server information and secured TCP/IP connections for
message integrity? * (1 Point)

Encryption

SSL

Firewall

Anti-virus software

Select the correct DBMS example list- * (1 Point)

MySQL, PopularSQL, MSAccess, Java

MySQL, MSExcel, DB2, Sybase

MySQL, MSAccess, PostgreSQL, Sybase

Oracle, PostgreSQL, Sybase,Java


8

Since past one month Mr. Peter had been repeatedly receiving threatening emails
and abusive chat messages from one particular person. This has disturbed him
mentally. He has been a victim of which of the crimes? * (1 Point)

Hacking

Phishing

Cyberstalking

Copyright violation

What will be the correct sequence of values of variable ‘c’ displayed in the given
code?

<script language="javascript">
     var a=30,b=20,c=0;
     c=++a+b;
     alert(c);
     c=b--;
    alert(c);
</script> * (1 Point)

50,20

50,19

51,20

51,19
10

The default CLI on Ubuntu 18.04 is called as ______? * (1 Point)

Hash

Bash

Mesh

Prompt

11

Which of the following is a correct step for recovering from cyber-attack? * (1 Point)

Introduce the lessons/ activities /courses for students & teachers.

Prohibit the use of personal devices on the network.

Investigation should be carried out with support from a professional expert.

There is not urgency to recover the lost data.

MCQ2 (TWO CORRECT ANSWERS):-                                   5 MARKS

Select ANY TWO answers from the given options.


12

Which of the following are examples of ‘Unauthorized Access’? * (1 Point)

Copying someone’s music and claiming ownership

Illegal use of login & passwords

Extracting confidential information

Harass or threaten someone on the internet

Stealing organizational information

13

MAN network can be identified by which of the following characteristics? * (1 Point)

It’s area is limited to offices, schools, hospitals etc.

It covers a large geographical area and may be used for ISP

Internet is the best example of this network.

It uses satellite link for communication

It’s design is hard to design and maintain


14

If a DBA(database administrator) performs the following operations on a database

1) Inserts a record in the ‘student’ table

2) Deletes an old table

3) Deletes a record from the ‘attendance’ table

4) Alters the student table structure.

then which type of SQL commands have been executed by the DBA * (1 Point)

DCL

DLL

DDL

DML

TCL

15

Which of the following are the correct variable declarations in javascript? * (1 Point)

var 1a=10

var b_2

var stud.name

var stud name

var name1
16

parseInt() will give output as 200 for which of the following? * (1 Point)

parseInt(‘CP200’)

parseInt(‘200CP’)

parseInt(‘20CP0’)

parseInt(‘200’)

parseInt(‘201CP’)

MCQ3 (THREE CORRECT ANSWERS):                           4 MARKS

Select ONLY THREE answers from the given options.

17

Which of the following are the protocols used for sending and receiving emails? *
(1 Point)

HTTP

IRC

IMAP

POP3

FTP

SMTP
18

Which of the following are valid arithmetic expressions in JavaScript? * (1 Point)

b+c=30/6*2

c=30*2/6

30*6/2=b+c

z=30%2/6

a*b=30*6

b=30+2*6
19

Mr. KK received an SMS claiming to be from a bank where he had his account. The
message informed him that his account is blocked and he must click on the given
link to unblock it. Mr. KK clicked on the link and received an OTP. He entered it on the
webpage and after this an amount of Rs.10,000 was deducted from his account.

Select the correct answers for the given questions-

Q1. What type of cybercrime does the case study refer to?

Q2. What should have been the first step taken by Mr. KK after receiving the SMS?

Q3. What should have Mr. KK not done after clicking on the link? * (1 Point)

Cracking

Phishing

As first step Mr. KK should have forwarded the received SMS to other friends.

As first step Mr. KK should have must verified the authenticity of SMS by calling bank

After clicking on the link Mr. KK should not have entered the received OTP

After clicking on the link Mr.KK should not have entered the address
20

Which of the following statements are TRUE? * (1 Point)

Computer crime is alternatively referred to as hi-tech crime.

Copyright owners do not have right to control the reproduction of their work

IT Act 2000 was amended in 2007 and 2011.

Morals are dictated by the society, culture and religion.

Today plagiarism is found in reports, essays etc.

There is no harm in opening emails from strangers

REARRANGE THE GIVEN CODING STEPS :                                  3 MARKS

Select the correct order of coding steps for the given questions.

21

i. </SCRIPT></HEAD>

ii. <SCRIPT language=”javascript”>

iii. alert(“Welcome to javascript coding”);

iv. <HEAD> * (1 Point)

i, ii,iii,iv

i, iii, ii, iv

iv,i,iii,ii

iv,ii,iii,i
22

i. </SELECT>

ii. <FORM><SELECT name=”subjects” multiple>

iii. <OPTION>IT</OPTION><OPTION>BK</OPTION>

iv.<INPUT type=”submit”></FORM> * (1 Point)

iv,iii,ii,i

ii,iii,i,iv

iv,iii,i,ii

i,iii,ii,iv

23

i. document.write(“The multiplication of the number with 5 is:”+ b); }

ii. var a,b;

iii. a=prompt(“Enter any number”); b=a*5;

iv. function multiply() { * (1 Point)

iv,iii,ii,i

ii,iii,i,iv

iv,ii,iii,i

i,ii,iii,iv

MATCH THE COLUMNS:                 2 MARKS


Select the correct matching pairs from the given columns.

24

Select the correct matching pairs.


* (1 Point)

1-f, 2-c, 3-a

1-c, 2-d, 3-b

1-c, 2-a, 3-e

1-e, 2-a, 3-f


25

Select the correct matching pairs. * (1 Point)

1-b,2-a,3-e

1-e,2-c,3-f

1-e,2-a,3-d

1-b,2-e,3-f

Go back to thank you page

This content is created by the owner of the form. The data you submit will be sent to the form owner. Microsoft is not responsible
for the privacy or security practices of its customers, including those of this form owner. Never give out your password.

Powered by Microsoft Forms | Privacy and cookies | Terms of use

You might also like