0% found this document useful (0 votes)
163 views15 pages

Web Application and Security - MCQ

Uploaded by

nazifamnk2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views15 pages

Web Application and Security - MCQ

Uploaded by

nazifamnk2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Web Application and Security

Session 1: Working with accessibility options


1. Computer ___________ refers to the user friendliness of a computer system for all, regardless of their
disability.
a. Shortcut Keys
b. Accessibility
c. Ctrl & Alt Key
d. None of the above
b. Accessibility

2. What are the different type of impairments that impact computer usage?
a. Dyslexia
b. Visual Impairment
c. Hearing Impairment
d. All of the above
d. All of the above

3. Accessibility options are available in __________.


a. Setting
b. Control Panel
c. Desktop
d. None of the above
b. Control Panel

4. ___________ is an accessibility feature to help computer users with physical disabilities, but it is also used by
others as a means to reduce repetitive strain.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
c. Sticky Keys

5. _________ enables the user to hold and release a modifier key, like as Shift, Ctrl, Alt, or the Windows key, and
have it remain active until another key is pressed.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
c. Sticky Keys

6. The __________accessibility function instructs the keyboard to ignore short or repeated inputs, making typing
simpler for those people who have hand tremors.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
a. Filter keys
7. __________ is an accessibility feature for persons with vision impairment or cognitive problems.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
b. Toggle Keys

8. _________ is turned on, the computer emits sound cues when the locking keys such as Caps lock, Num lock
and Scroll lock are pressed.
a. Filter keys
b. Toggle Keys
c. Sticky Keys
d. None of the above
b. Toggle Keys

9. ___________ is designed to help users with auditory impairments.


a. Filter keys
b. Toggle Keys
c. Sound Sentry
d. None of the above
c. Sound Sentry

10. When the computer makes a sound, ________ produces visual effects such as a blinking title bar or a flashing
border.
a. Filter keys
b. Toggle Keys
c. Sound Sentry
d. None of the above
c. Sound Sentry

11. ___________ directs applications that provide information through sound to also give information visually,
through written captions or informative icons.
a. Filter keys
b. Show Sound
c. Sound Sentry
d. None of the above
b. Show Sound

12. ___________ is an accessibility feature to assist people with vision impairment. You can change the text size
and color, as well as the background color, to make it easier to read.
a. High Contrast
b. Show Sound
c. Sound Sentry
d. None of the above
a. High Contrast

13. _____________ is also an accessibility feature that assists people with vision impairment by changing the
blink rate and width of the cursor.
a. High Contrast
b. Cursor Options
c. Sound Sentry
d. None of the above
b. Cursor Options

14. The ____________option uses the keyboard (especially numeric keypad) as a pointing device instead of a
mouse.
a. High Contrast
b. Mouse key
c. Sound Sentry
d. None of the above
b. Mouse key

15. ____________ is an accessibility feature that assists people that have difficulty using a keyboard or a mouse
(or both). They can use special devices such as Sip, Puff and Breath Switches to provide input to the computer
through Serial Ports.
a. High Contrast
b. Mouse key
c. Serial Keys
d. None of the above
c. Serial Keys

16. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive
strain is ____________________.
a. Toggle Key
b. Sticky Key
c. Tab Key
d. None of the above
b. Sticky Key

17. Sound Sentry is intended to assist users who have ____________ disabilities.
a. Auditory Impairments
b. Cognitive Impairments
c. Visual Impairments
d. Dexterity Impairments
a. Auditory Impairments

18. The High Contrast feature in Microsoft Windows XP is designed to help persons who have _______________
impairments.
a. Auditory Impairments
b. Cognitive Impairments
c. Visual Impairments
d. Dexterity Impairments
c. Visual Impairments

19. ___________________ is designed to assist people that have difficulty using a keyboard or a mouse.
a. KeyboardKeys
b. MouseKeys
c. TabKeys
d. GeneralKeys
b. MouseKeys

Session 2: Networking Fundamentals


20. A ______________ is a collection of computers and other hardware components interconnected by
communication channels that allow sharing of resources and information.
a. Computer Network
b. Computer Sharing
c. Computer Receiving
d. None of the above
a. Computer Network

21. What are the examples of communication channels _________.


a. Cable Wire
b. Satellites
c. Both a) and b)
d. None of the above
c. Both a) and b)

22. Example of computer networks architecture __________.


a. Peer – to – Peer architecture
b. Client – Server architecture
c. Both a) and b)
d. None of the above
c. Both a) and b)

23. Networks in which all computers have an equal status are called __________.
a. Peer – to – Peer Network
b. Client – Server Network
c. Both a) and b)
d. None of the above
a. Peer – to – Peer Network

24. Networks in which certain computers have special dedicated tasks, providing services to other computers are
called__________.
a. Peer – to – Peer Network
b. Client – Server Network
c. Both a) and b)
d. None of the above
b. Client – Server Network
25. The computer provides services called ___________.
a. Client
b. Server
c. Node
d. None of the above
b. Server
26. The computer uses the services which are provided from the server is called __________.
a. Client
b. Server
c. Node
d. None of the above
a. Client

27. What are the major different types of network?


a. Local Area Network
b. Wide Area Network
c. Both a) and b)
d. None of the above
c. Both a) and b)

28. A ____________ is a network that connects computers and gadgets in a specific geographic area, such as a
house, school, computer laboratory, office building, or group of buildings.
a. Local Area Network
b. Wide Area Network
c. Both a) and b)
d. None of the above
a. Local Area Network

29. A ______________ network is one which covers a broad area across metropolitan city, regional, or national
boundaries.
a. Local Area Network
b. Wide Area Network
c. Both a) and b)
d. None of the above
b. Wide Area Network

30. The ___________ is a global network of interconnected computer networks that serve billions of people
worldwide by utilizing the standard Internet protocol suite.
a. Internet
b. Network
c. Arpanet
d. None of the above
a. Internet

31. WWW stands for ___________.


a. Web World Wide
b. World Wide Web
c. World Web Wide
d. None of the above
b. World Wide Web

32. WWW is also known as __________.


a. W2
b. W4
c. W3
d. W1
c. W3

33. __________ is a network of interconnected hypertext documents that may be accessed via the Internet.
a. World Wide Web
b. W3
c. Both a) and b)
d. None of the above
c. Both a) and b)

34. A ________ is a software program that is used to browse Web sites and serves as a bridge between the user
and the World Wide Web.
a. World Wide Web
b. Web Server
c. Web Browser
d. None of the above
c. Web Browser

35. What are the advantages associated with networking?


a. Data & File Sharing
b. Hardware Sharing
c. Internet Sharing
d. All of the above
d. All of the above

36. _________ helps to share hardware components such as printers, scanners etc.
a. Computer Network
b. Hardware Network
c. Information Network
d. None of the above
a. Computer Network

37. ISP stands for ___________.


a. Internet Sharing Provider
b. Internet Services Provider
c. Internet Social Provider
d. All of the above
b. Internet Services Provider

38. Example of Internet Service Provider in India ___________.


a. Bharat Sanchar Nigam Limited
b. Airtel
c. MTS
d. All of the above
d. All of the above

39. WiMAX stands for ____________.


a. WorldWide Interoperability for Microwave Access
b. WorldWide Interoperability for Micro Access
c. WorldWide Internet for Microwave Access
d. None of the above
a. WorldWide Interoperability for Microwave Access

40. DSL stands for ____________.


a. Dynamic Subscriber Line
b. Digital Subscriber Line
c. Digital Sub Line
d. None of the above
b. Digital Subscriber Line

41. ISDN stands for ___________.


a. Integrated Services Digital Network
b. Internet Services Dynamic Network
c. Integrated Sub Digital Network
d. Internet Sub Dynamic Network
a. Integrated Services Digital Network

42. Á __________ is a device that converts digital computer signals into analog signals that can travel over phone
lines.
a. Router
b. Modem
c. Bridge
d. None of the above
b. Modem

43. Modem is also known as ___________.


a. MOdulator/ DEModulator
b. Modular/DeModular
c. Modulate/DeModulate
d. None of the above
a. MOdulator/ DEModulator

44. Give the example of a Wired internet connectivity channel?


a. DSL
b. WiMax
c. Wi-Fi
c. All of the above
a. DSL
45. Give the example of a Wireless internet connectivity channel?
a. DSL
b. Dial – Up
c. WiMax
d. None of the above
c. WiMax

46. __________ Internet access is a form of Internet access that uses the facilities of the public switched
telephone network (PSTN) to establish a connection to an Internet service provider
a. Dial – up
b. 3G
c. WiMax
d. Wi-Fi
a. Dial – up

47. __________provide Internet access by transmitting digital data over wires of a local telephone network.
a. Dial – Up
b. Digital Subscriber Link (DSL)
c. 3G
d. WiMax
b. Digital Subscriber Link (DSL)

48. _________provides wireless communication and mobile broadband connection across cities and countries.
a. WiMax
b. Wi-Fi
c. DSL
d. None of the above
a. WiMax

49. ___________ is a widely used technology that allows electronic devices as as computers or mobile phones to
transmit data wirelessly over a network, including high-speed Internet connections.
a. WiMax
b. Wi-Fi
c. DSL
d. None of the above
b. Wi-Fi

50. How can we transfer data on the internet?


a. Using Box Switching
b. Using Packet Switching
c. Using Public Switching
d. Using Web Switching
b. Using Packet Switching

51. The acronym for LAN is _________________.


a. Large Area Network
b. Last Area Network
c. Local Area Network
d. None of the above
c. Local Area Network

52. Three types of Wired Internet Connectivity are ___________ , _________ & ___________.
a. 3G, DSL, Dial-Up
b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi
d. WiMax, DSL, Dial-up
b. Cable Internet Access, DSL, Dial-Up

53. Three types of Wireless Internet Connectivity are _________ , ___________ & _________.
a. 3G, DSL, Dial-Up
b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi
d. WiMax, DSL, Dial-up
c. WiMax, 3G, Wi-Fi

Session 3: Introduction to Instant Messaging


54. __________is a form of communication over the Internet that offers an instantaneous transmission of text-
based messages from sender to receiver.
a. Instant Messaging
b. Computer Software
c. Hardware
d. None of the above
a. Instant Messaging

55. Most instant messaging software include the option for performing________.
a. File transfer
b. Audio chat
c. Video calling
d. All of the above
d. All of the above

56. What are the key features of instant messaging ___________.


a. Text Message can be sent to one or more person
b. Audio calling and conferencing
c. Video calling and conferencing
d. All of the above
d. All of the above

57. Give some examples of application based instant messaging software?


a. Skype
b. Yahoo! Messenger
c. Rediff Bol
d. All of the above
d. All of the above

58. Give some examples of web based instant messaging software?


a. Meebo
b. Yahoo! Messenger
c. IMO
d. All of the above
d. All of the above

59. ______________ is a type of Internet communication software that allows the user for instant transfer of
text-based communications from sender to receiver.
a. Instant Messaging (IM)
b. Service Messaging (SM)
c. Fast Messaging (FM)
d. None of the above
a. Instant Messaging (IM)

60. ___________ , ____________ & _______________& Web Camera are required for audio and video
conferencing.
a. Joystick, Computer, Video
b. Text, Audio, Video
c. Microphone, Headphone, Speaker
d. Touch Screen, Speaker, Microphone
c. Microphone, Headphone, Speaker

Session 4: Chatting with a contact – Google Talk


61. What are the general rules and etiquettes for chatting?
a. Messages should be short and to the point
b. Always ask first if the other person has time to converse.
c. Typing your message in uppercase is extremely rude
d. All of the above
d. All of the above

Session 5: Creating and publishing web pages – Blog


62. A _________ is a discussion-style website that non-technical (or technical) people use to create personal web
sites.
a. Blog
b. Website
c. Social Media Site
d. None of the above
a. Blog

63. ___________ are similar to an online personal diary and simple to use.
a. Blog
b. Website
c. Social Media Site
d. None of the above
a. Blog

64. What are the popular blogs websites on the internet _________.
a. WordPress
b. Blogger
c. Blog
d. All of the above
d. All of the above

Session 6: Using Offline blog editors


65. Give an example of offline blog editors _____________.
a. Qumana
b. Windows Live Writer
c. Blogdesk
d. All of the above
d. All of the above

Session 7: Online Transactions


66. ___________ deals with transfer of money over the internet.
a. Online transactions
b. Offline transactions
c. Both a) and b)
d. None of the above
a. Online transactions

67. Which protocols are used to do the translation process securely?


a. Online Transfer process
b. Online Transaction Process
c. Both a) and b)
d. None of the above
b. Online Transaction Process

68. In what situation online shopping is useful.


a. A customer does not have enough time to go shopping.
b. Visiting a store expenses more than purchasing a product online.
c. A product or service that is not available in the local market only available online
d. All of the above
d. All of the above

69. Give some of the popular online transaction websites.


a. IRCTC
b. Flipkart
c. EBay
d. All of the above
d. All of the above

Session 8: Internet Security


70. What are the different online threats _________.
a. Phishing
b. Email Spoofing
c. Chat Spoofing
d. All of the above
d. All of the above
71. How can you reduce the risks over the internet?
a. Using Antivirus Software
b. Fire walls
c. Strong Password
d. All of the above
d. All of the above
72. Which combination is required to create a strong password.
a. Combination of Alphanumeric
b. Combination of Numbers
c. Combination of special characters
d. All of the above
d. All of the above

73. Do not keep password names such as _______.


a. Favorite color
b. Name of your friends & Relatives
c. Don’t use mobile number as password
d. All of the above
d. All of the above

74. Give the name of the website which can generate strong passwords automatically?
a. www.strongpasswordgenerator.com
b. www.wikipedia.com
c. www.cbseacademic.nic.in
d. None of the above
a. www.strongpasswordgenerator.com

75. __________ software helps to protect your data from unauthorized users.
a. W33 Software
b. Encryption Software
c. Unlock password Software
d. None of the above
b. Encryption Software

76. How we can keep our username and password private.


a. Don’t tell username & password to others
b. Don’t share username & password in internet café
c. Always clear browser history & cookies after using
d. All of the above
d. All of the above

77. How can I make secure transactions on the internet?


a. Use Antivirus and Antispyware programs
b. Your Firewall should be always ON
c. Open only that website which have a https://
d. All of the above
d. All of the above
78. _________ are programs that are created on your local computer when you visit websites.
a. Firewall
b. Cookies
c. History
d. All of the above
b. Cookies
79. __________ can be software or hardware that helps in the security of a computer and a network.
a. Firewall
b. Cookies
c. History
d. All of the above
a. Firewall

80. Web browsers have ___________ designed to store passwords used in forms on websites.
a. Cookies
b. Built – in password management
c. History
d. None of the above
b. Built – in password management

Session 9: Maintain workplace safety


81. What basic safety rules to follow at the workplace.
a. Fire Safety & Use of First aid
b. Falls and slips
c. Electrical Safety
d. All of the above
d. All of the above

82. Basic fire safety rules in an organization are __________.


a. Fire escape plans must be installed at proper levels
b. Conduct regular drills & Smoke alarms must be placed
c. Maintenance of safety equipment and No – smoking zone
d. All of the above
d. All of the above

83. Basic falls and slips safety rules in an organization are ___________.
a. Maintain a clean and clutter-free working area.
b. Workplace should be ventilated and receive light
c. Floors must be clean and dry
d. All of the above
d. All of the above

84. What are the different electrical safety rules?


a. Electrical equipment should be approved by a recognized organization
b. Worker should be trained to handle the electric equipment safely
c. Damaged and hazardous electrical equipment should be immediately replaced
d. All of the above
d. All of the above
85. Basic rules of using first aid are ___________.
a. Injured person should calm not to panic
b. Keep them warm if they are under shock
c. In the case of a back/neck injury, do not move the victim.
d. All of the above
d. All of the above

Session 10: Prevent accidents and emergencies


86. What are the different types of accidents?
a. Accidents at workplace
b. Industrial disease/illness
c. Clinical Accident
d. All of the above
d. All of the above

87. What protection should organizations take to handle accidents in the workplace?
a. Safety measures must be placed to prevent workplace accidents
b. Immediately call the medical team for any injury
c. Pay attention to and follow emergency drills
d. All of the above
d. All of the above

Session 11: Protect Health and Safety at work


88. What are the different types of hazards include _________.
a. Physical
b. Chemical
c. Biological
d. All of the above
d. All of the above

89. __________ is the process of emptying a place in case of an emergency, disaster.


a. Attention
b. Evacuation
c. Taking care
d. None of the above
b. Evacuation

90. What evacuation emergency should be followed by every company.


a. Company should have a evacuation policy
b. Organization must have a designated assembly point for emergencies
c. Floor plans with evacuation routes should be pasted in every floor
d. All of the above
d. All of the above

91. Give some examples of a healthy lifestyle.


a. Healthy eating habits
b. Physical activities
c. Stress Management
d. All of the above
d. All of the above

92. An organization can face some __________ that could put the lives of the employees in danger.
a. Issue
b. Health Hazards
c. Shortage
d. None of the above
b. Health Hazards

93. Hazards can be of different types depending on the ________ and the ______________ in which the
employees work.
a. Industry, Environment
b. Occupation, problem
c. Both a) and b)
d. None of the above
a. Industry, Environment

94. Organizations must have a designated ______________ for emergencies.


a. Evacuation policy
b. Assembly point for emergencies
c. Buddy system for special needs people
d. All of the above
d. All of the above

You might also like