Page 139 - Web Applications (803) Class 11
P. 139

Solved Exercise




                                                                Section A
                                                        (Objective Type Questions)
                 A.  Choose the correct option.
                     1.  Which of the following is a worldwide network made up of numerous independently operated networks?
                        i.  Internet relay chat                          ii.  TCP/IP
                       iii.  ARPANET                                    iv.  Internet
                     2.  Which of the following is a piece of software that aids in the storage and organisation of passwords?
                        i.  Worm                                         ii.  Password manager
                       iii.  POP3                                       iv.  Firewall
                     3.  Phishing is the theft of a user’s personal information via ................................ .
                        i.  Fraudulent emails                            ii.  Phone call
                       iii.  Internet                                   iv.  Spam
                     4.  Which of the following govern the systematic use of e-resources, and serve as a deterrent to criminal cybercrime?
                        i.  Legal laws                                   ii.  Internet Laws
                       iii.  Cyber laws                                 iv.  Firewall
                     5.   Packets with ................................ are routed through multiple nodes in a network until they reach their destination
                       system.
                        i.  Cookie                                       ii.  IP address
                       iii.  MAC address                                iv.  Protocol
                     6.  Which of the following is NOT a malware?
                        i.  Humanware                                    ii.  Virus
                       iii.  Trojan                                     iv.  Worm
                     7.  Which of the following prevents illegal access to or from a network?
                        i.  Virus                                        ii.  Cookie
                       iii.  Firewall                                   iv.  Router
                     8.   Which of the following is defined by the notion that’s content can be modified on the client-side without requiring fresh
                       server-client communication?
                        i.  Static websites                              ii.   Dynamic websites
                       iii.  HTML codes                                 iv.  HTTP Protocols
                     9.  Which of the following is NOT a cyber-crime?
                        i.  Harassment by e-mail, text messages, or social media.  ii.  Posting offensive content to a person on a website.
                       iii.  Downloading homework from school website.   iv.  Using the Internet to defame my classmate.
                    10.   Which topology is appropriate for large organisations that need to carefully control and coordinate the operations of
                       distributed branch outlets?
                        i.  Ring                                         ii.  Bus
                       iii.  Mesh                                       iv.  Star
                    11.  Choose the option, which is not included in networking.                           [CBSE Handbook]
                        i.  Access to remote database                    ii.  Resource sharing
                       iii.  Power transferring                         iv.  Communication
                    12.  Data transfer rate is often measured in ................................ .        [CBSE Handbook]
                        i.  Mbps                                         ii.  Kbps
                       iii.  Bps                                        iv.  Gbps

                     Ans. 1.  iv.        2.  ii.       3.  i.         4.  iii.      5.  ii.        6.  i.        7.  iii.
                         8.  ii.         9.  iii.     10.  iv.       11.  iii.     12.  iii.

                                                                            Basics of Networking and Web Architecture  137
   134   135   136   137   138   139   140   141   142   143   144