Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

QUESTION BANK FOR DCA I SEM Internet Technology (104) Hi-tech Institute Of Computers

MIZORAM STATE COUNCIL FOR TECHNIAL EDUCATION


Certificate Course Examination, December, 2019
Certificate in Computer Application
Subject: Internet Technology (DCA - 104)
Full Marks: 40 Time: 1 hour
SETC
Choose the correct answer from the following: (1X40=40)
1. How many parts are there in FTP server?
a) One c) Three b) Two d) Four
2. Connections to the backbone are made by
a) ISPs c) ARPANET b) LAN d) Internet
3. Which one of the following grants privileges to process and users?
a) Password c) Filter b) Authorization d) Firewall
4. A code used to send message to someone is?
a) Password c) Privacy b) Key d) Data
5. The growth rate of an internet per month is exponentially
a) 14% c) 18% b) 12% d) 8%
6. Which one of the following is the Unix command that displays the path name of your terminal's device file
a) tly c) tuy b) lty d) tty
7. Moving a file from one's computer to the remote computer is known as
a) Copying c) Downloading b) Uploading d) Extracting
8. FTP sites expect you to use a special account called
a) Non-Anonymous c) Server b) Anonymous d) Database
9. The full form of HTML is?
a) High Tech Multimedia c) Hyper Text Markup Link
b) Hyper Text Markup Language d) Hyper Technology Multimedia
10. The full form of ISP is
a) Internet Standard Program c) Internal System Port
b) Internet System Plan d) Internet Service Provider
11. Which one of the following gives rock solid protection against thieves and vandals?
a) Zone alarm c) Proxy b) Firewall d) All of the above
12. Users within corporations and large organization typically connect to an 1SP via high speed link is called
a) Dialup connection b) Broadband connection c) Direct connection d) None of the above
13. Buying and selling items online is
a) Online shopping b) Online buying c) E-commerce d) All of the above
14. A company selling or buying products from other companies is
a) Business to business b) Business to company a) Company to company d) Company to business
15. The concept of WWW was developed in
a) India c) USA b) Japan d) Switzerland
16. The full form of MODEM is
a) Modulator Demodulator c) Mode Emphasis b) Mode Multiplication d) None of the above
17. As a way to speed up file transfers and save space on the FTP server, files are commonly
a) Compressed c) Trimmed b) Expanded d) All of the above
18. Which one of the following is software that is distributed for free on a trial basis?
a) Freeware c) Trial version b) Shareware d) Firmware
19. The most common form of computer security is
a) Authentication c) Password b) Stealing d) Callback
20. The study of structure refers to
a) Analog c) Anatomy b) Strategy d) Categorize

20
QUESTION BANK FOR DCA I SEM Internet Technology (104) Hi-tech Institute Of Computers

21. How many types of hyperlink are there?


a) One c) Three b) Two d) Four
• Text hyperlink • Image hyperlink • Bookmark hyperlink • E-mail hyperlink
22. Part of a complete website is
a) Website c) Web browser b) Web page d) Bookmark
23. When a digital signal is converted into analog form, it is called
a) Modulation c) Conversion b) Demodulation d) Radio Signal
24. Unauthorized access to computer system is called
a) Hashing c) Hacking b) Cybercrime d) Trespassing
25. The process of taking encrypted data and rendering it readable for trusted users is?
a) Decryption c) Cryptography b) Rendering d) Encryption
26. A computer language developed by sun Microsystems is?
a) Android c) Symbian b) Linux d) Java
27. The upper most section of an e-mail is
a) Header c) Margin b) Footer d) Top-level
28. Public messaging and bulletin board system is
a) Usenet c) Arpanet b) Telnet d) Ethernet
29. A key which is known only to the owner is called?
a) Kernel key c) Private key b) Public key d) Personal key
30. If your personal computer has access to the internet, then it is categorized as
a) Server c) Node b) Network d) Client
31. The syntax of uniform resource locator (URL) is
a) http://html/www.abc.com /ans.html b) http://www.abc.com/ansJhtml/html/
c) http://html/ans.html/www.abc.com d) http://www.abc.com/html/ans.html
32. Altering data before a computer processing and then changing back to its original state after the processing
is completed is
a) Data diddling c) Data jacking b) Data hacking d) All of the above
33. Which of the following is necessary to have by the Host computer to send and receive information across
the internet?
a) IP address c) Browser b) Web page d) Internet Connection
34. The full form of URL is
a) Unreserved location c) Uniform resource locator b) Unit Resource language d) None
35. A user can execute the telnet command on his/her local computer to start a login session on a remote
computer. This is called
a) Remote login c) Remote chatting b) Online login d) Remote access
36. While up loading a file from computer to the server, files move from the local to
a) Remote c) Desktop b) Local d) All of the above
37. World largest electronic discussion forum is
a) Telnet c) Usenet b) Internet d) Server
38. The number topics through which you can chat with many people all over the world is called
a) Internet c) Zone b) Servers d) Channel
39. The full form of ISOC is
a) Internet society b) international standard office centre
c) instruction of command d) internet socket
40. Preventing the network communication system falling in the hands of unauthorized is called?
a) Controlling c) Security b) Hazard d) Prevention

-oXo-

21

You might also like