CBSE CBSE Class 10 IT (402) Class 10 Multiple Choice Questions Facebook Twitter Telegram WhatsApp MCQs of Web Applications and Security Set 1 MCQs of Web Applications and SecurityMCQs of Web Applications and Security 1 / 55P2P stands for: Peer to Peer Pipe to pipe Peer 2 Peer Pipe 2 Pipe 2 / 55A .................... network is one which connects computers and devices in a limited geographical area such as home, school etc. PAN MAN LAN WAN 3 / 55Identify the cognitive impairment from the following. Dyslexia ADHD Autism All of these 4 / 55Which of the following files can be shared over network? Text Sound Spreadsheet All of these 5 / 55Keep workplace a no-smoking zone is a basic rule of: Fire Safety Falls and Slips Electrical Safety First Aid 6 / 55Keyboard Accessibility options are useful for those who have: Physical disabilities Vision impairment Both a and b None of these 7 / 55Types of Occupational Hazards are: Physical hazards Biological hazards Ergonomic hazards All of these 8 / 55.................. is a computer that stores web sites and their related files for viewing on the Internet. Web server Web Client WWW Web 9 / 55Key Features of an instant messaging are: Text Messages can be sent to one or more person Audio calling and conferencing Video calling and conferencing All of these 10 / 55.................... converts the analog signals to digital and vice versa. Switch Modem Router None of these 11 / 55................ offers instantaneous transmission of text-based messages from sender to receiver. Email Traditional post Instant messaging All of these 12 / 55A computer network is a collection of 2 or ......................... computers. 5 7 9 More 13 / 55Effect of toggle keys can be checked by pressing ....................... key. Num Lock Caps Lock Scroll Lock All of these 14 / 55Others can view the blog post only after publishing it. True False 15 / 55Internet is an example of: LAN WAN MAN PAN 16 / 55WiMAX is a ............... technology. Wired Wireless Internet None of these 17 / 55Unfortunate incident that occurs unintentionally causing hazardous result or injury is called: Emergency Hazard Accident None of these 18 / 55The title of the blog comes at the .................... . Top Bottom Side None of these 19 / 55A web page may contain A web page can be viewed with the help of .................... . Web Browser Web server Internet Protocol 20 / 55SoundSentry is designed to help users with .................... impairments. Physical Auditory Visual None of these 21 / 55Basic safety rules to follow at workplace includes: Fire safety Falls and slips Electrical safety All of these 22 / 55Blogs are similar to an online .......................... . Book Notebook Journal Diary 23 / 55Which of the following are some of the measures to keep ourselves safe from electricity hazards and accidents? Electrical equipment used should be of sub-standard quality Workers should be trained to handle the electric equipment safely Circuits should not be overloaded Insulated tools and handling equipment must be used 24 / 55Computer Accessibility refers to the user friendliness of a computer system. True False 25 / 55The .................. is a global system of interconnected computer networks. Internet Intranet ARPANET None of these 26 / 55Toggle Keys is designed for people who have ....................... . Vision Impairment Cognitive Disabilities Both a and b None of these 27 / 55Firewalls could be a .................... . Hardware Software Both a and b None of these 28 / 55We can use blogs to convey messages about ....................... . Events News Reviews All of these 29 / 55Which of the following is not a web browser? Mozilla Firefox Internet Explorer Google Chrome None of these 30 / 55For using Google Talk, you should have ________ account. Gmail Skype Yahoo None of these 31 / 55.................... is a form of communication over internet. Email Video call Instant messaging All of these 32 / 55A computer network allows sharing of resources and information. True False 33 / 55Websites that offer free blog services are: www.WordPress.com www.blogger.com www.blogsome.com All of these 34 / 55Blog address should be unique. True False 35 / 55Which of the following options allows us to press Ctrl key and 'A' key separately? Filter keys Toggle keys Sticky keys Mouse keys 36 / 55Customers can pay online using .......................... . Credit card Debit card Internet banking All of these 37 / 55......................... is the process of clearing a place in case of an emergency. Buddy System Evacuation Clearing Vacating 38 / 55Learning .......................... is the social and civic responsibility of every human being. Computers First-aid Handling electrical equipment None of these 39 / 55Dial up connection is the fastest internet connection. True False 40 / 55........................ could transmit every key pressed on a keyboard to unauthorized users. Keypress Keylogger Antivirus None of these 41 / 55Which of the following passwords is not easy to crack? Name Date of birth Mobile number Mix of digits and letters 42 / 55..................... keys are used to reduce repetitive strain. Filter Sticky Toggle Control 43 / 55A person with disability or impairment cannot use computer. True False 44 / 55Which of the following technology is used to provide free internet in hotels, malls etc. to their customers? WiFi WiMAX Dial up Cable Internet Access 45 / 55Cookies are ...................... that are created on your local computer when you visit websites. Text files Folders Virus None of these 46 / 55Healthy life style includes: Healthy eating habits Sound sleep Physical activities All of these 47 / 55Which of the following are Online threats? Phishing Email Spoofing Chat spoofing All of these 48 / 55For audio and Video chat users should have .................... . Mike Speaker Web Cam All of these 49 / 55Which of the following technology is used for long distance? Dial up DSL Cable Internet Access WiMAX 50 / 55Any unexpected situation that needs immediate attention and action is called: Accident Emergency Occupational Hazard None of these 51 / 55Online threats can be reduced by using ............................ . Firewall Passwords Antivirus All of these 52 / 55Online shopping is an example of ........................... . E-learning E-commerce E-reservation All of these 53 / 55A computer who makes a request for services in Client Server Architecture is called ...................... . Server Client Node None of these 54 / 55Source of any potential harm is called: Emergency Accident Hazard All of these 55 / 55COD (in reference to online shopping) stands for .......................... . Catch on delivery Cash on delivery Cash over delivery None of these Your score isThe average score is 0% 0% Restart quiz
Case Study Questions Chapter 3 Pair of Linear Equations in Two Variables June 7, 2023June 3, 2024 Case Study Questions CBSE CBSE Class 10 Mathematics Class 10
Competency Based Questions Chapter 12 Improvement in Food Resources July 5, 2023January 15, 2025 CBSE CBSE Class 9 Science Class 9 Competency Based Questions
Assertion Reason Chapter 2 Sectors of The Indian Economy May 12, 2023June 2, 2024 Assertion Reason CBSE CBSE Class 10 Economics CBSE Class 10 Social Science Class 10