Professional Documents
Culture Documents
17. YouTube, which provides a service of streaming videos online is provided by ....
1) Google 2) Microsoft 3) IBM 4) Apple 5) Sony
18. ...... is known as unauthorized access to others system.
1) Hacking 2) Encryption 3) Decryption 4) Trafficking 5) None of these
19. A connection from one HTML document to another HTML document is called:
1) Hyper Link 2) Connecting Link 3) Icon 4) All of these 5) None of these
20. Which of the following is not a social networking site?
1) WAYN 2) Hi 5 3) Orkut 4) Yahoo 5) Face book
21. In the URL https://twitter.com, what doess represent in 'https'?
1) Safe 2) System 3) Start-up 4) Semantic 5) Secured
22. The process of transforming information using an algorithm to make it unreadable by anyone is
usually referred to as:
1) Decryption 2) Encryption 3) Alphabet Coding 4) Encrography 5) Deptography
23. Which one of following helps a user in locating information over internet?
a) URL b) Search engine c) Domain d) Network e) None of these
24. The ___.converts digital signals to analog signals for the purpose of transmitting data over
telephone lines.
(a) Modem (b) Router (c) Gateway (d) Bridge (e) All of these
25. Pickup wrong definition
(a) Off line - is a system peripheral equipment not controlled by CPU
(b) Online - is system in which peripheral equipment is in direct contact with CPU
(c) Peripherals - are hardware under the control of CPU, like punched card readers, tapes,
drums,disk, output devices
(d) PL/I is the acronym Peripheral Listing /Index
(e) Program or routine is a set sequence of instructions given to computer for problem solving
26. Application layer provides basis for
A. Email services B.Directory services. C.File transfer, access, and management. D.Network
virtual terminal. E. Cabling
27. Layer that are used to deal with mechanical and electrical specifications are
A. Physical Layer B. Data Link Layer C. Network Layer D. Transport Layer E. Session layer
28. Network layer is responsible for the
A. Node to node communication B. Source to destination C. Hop to hop communication
D. both b and c E. access control