"O" level course of DOEACC Scheme is equivalent to a Foundation Level Course in Computer Applications. Students can acquire this qualification by undergoing this course and passing the examination conducted by the NIELIT.
1. Each
question below gives a multiple choice of answers. . (1x10)
1.1 The rules with regards to conduct for Internet users is known as
A) Mosaic
B) Netiquette
C) Protocol
D) Internet Protocol
1.2 TCP/IP is
A) Abbreviation for
Transmission Control Protocol and Internet Protocol
B) A suite of
networking protocols
C) A standard protocol
that lets disparate types of computers communicate over the Net
D) All the above
1.3 The protocol that allows a computer to use the Internet Protocol
with standard voice-grade telephone line and a high-speed modem is
A) SLIP
B) SMTP
C) SGML
D) RTF
1.4 A Spider is
A) A Computer virus
B) A Browser
C) A program that catalogs web sites
D) A hacker community
1.5 FTP does not use
A) Two transfer mode
B) Control connection
to remote computer before file can be transferred
C) User Datagram Protocol
D) Authorization of a
user through login and password verification
1.6 A terminal emulation protocol that allows users to log-on to a
host computer from remote
computers is
A) Telnet
B) TCP/IP
C) FTP
D) Point-to-Point
protocol (PPP)
1.7 Which of the following is used to enable the use of active
documents?
A) HTML
B) CGI
C) JAVA
D) All of the above
1.8 A networking standard developed by Xerox, Intel and DEC; capable
of connecting as many as 1,024 workstations and transmitting data at a maximum
speed of 10 Mbps
A) Ethernet
B) FDDI
C) File Transfer
protocol
D) Gopher
1.9 The HTML tags that create a table header are
A)
<head></head>
B)
<ttop></ttop>
C) <th></th>
D)
<td></td>
1.10 Which of the following is the correct HTML for inserting
background image?
A) <background img=”background.gif”>
B) <img src=”background.gif”
background />
C) <a href=”background.gif”>
D) <body background=”background.gif”>
2. Each
statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in
the “tear-off” sheet attached to the question paper, following instructions
therein.
(1x10)
2.1 Client server
computing is the fundamental relationship of computers on the Net (or any
network) in which one
computer acts as a client by remotely connecting to another computer
that acts as a server. TRUE
2.2 Domain name will
change if a system’s IP address changes.
FALSE
2.3 Firewall protects
an organization’s computer systems from external access. TRUE
2.4 XML is a cross
platform, software and hardware independent tool for transmitting information over
the Net. TRUE
2.5 Just as HTML, XML
also uses predefined tags. FALSE
2.6 IP only allows
fixed packet sizes. FALSE
2.7 Cipher text is the
meaningful form of encrypted message that can be read in transit by anyone. FALSE
2.8 Meta search
engines are search engine tools that pass queries to a maximum of 6 search
engines. FALSE
2.9 TELNET is a
network protocol used on Internet to provide a bidirectional interactive
textoriented communications via a virtual terminal connection. TRUE
2.10 JavaScript can
read and write HTML elements. TRUE
3. Match
words and phrases in column X with the closest related meaning/
word(s)/phrase(s)
in column Y. Enter your selection in the “tear-off” answer sheet
attached
to the question paper, following instructions therein. (1x10)
A.
EDI System
B. User
Interface
C. MIME
D. Router
E.
B2C E-commerce
F. <HTML>
and </HTML>
G. SGML
H.
Dogpile
I. Public
Key Infrastructure
J. Bing
K. B2B
E-commerce
L. Signature
M. IPv6
|
3.1 An internet
standard that extends the format of e-mail to support text in character sets C
3.2 A hardware device
connected to a host on a LAN that acts as a gateway between different types of networks D
3.3 A set of
formatting codes for creating documents. G
3.4 A self service
model where customers configure and customize the products and services they wish
to pay E
3.5 An example of
metasearch engine H
3.6 The screen in
which you type a query and which displays the search results B
3.7 Set of computer
interchange standards for business documents such as invoices, bills and purchase
orders K
3.8 Any web document
must began and end with F
3.9 It is
automatically appended to an outgoing mail message or network news post L
3.10 A technique in
which two different keys are used for performing encryption and decryption I
4. Each
statement below has a blank space to fit one of the word(s) or phrase(s) in the
list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1x10)
A. POP
B. Hyperlinks
C. CERN
D. Hacker
E. Client-server
computing
F. Flame
G. Geocities
H. Address
book
I. WAIS
J. Filter
K. Authentication
L. Webmaster
M. XBM
|
4.1 A(n) ____H____
is a place where you can store the information about the people with whom you correspond.
4.2 ____C____
is a Swiss organization that developed WWW.
4.3 ____G____
is one of the popular free Web presence providers, which helps you to create
your own Website free of cost.
4.4 ____I____
is a powerful system for searching and retrieving information from databases scattered
across the Net.
4.5 System
administrator for a World Wide Web server is called as ____L____.
4.6 ____A____
is a protocol that is used to retrieve e-mail from a mail server.
4.7 The fundamental
relationship of computers on the Net in which one computer acts as a client by remotely
connecting to another computer that acts as a host is called as ____E____.
4.8 ____K____
is a security feature that allows access to information on an individual basis.
4.9 An inflammatory
remark or a message usually associated with e-mail or an article posted to a newsgroup
is referred to as ____F____.
4.10 ____D____ is a computer user who illegally
visits networked computers to look around or cause
Question ki solving kyon nahi di aapne
ReplyDeleteIf you are hesitant to get into web design Dubai company because you are not sure whether it's hard, don't worry. If you have the interest, drive, passion, and the right tools for the job, web design is not hard.
ReplyDeleteIt seems as if you've put a lot of efforts into this.Web Design Dubai
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteRevvLab’s web application development company team specializes in taking your project from concept to completion. With years of experience designing apps for different industries
ReplyDeleteWith its comprehensive curriculum, industry-relevant content, this certification can open doors to numerous opportunities and help you achieve your professional goals. boats for sale abu dhabi
ReplyDeleteThe strategic utilization of internet technologies has been empirically shown to enhance workplace efficiency and optimize business productivity. boat rental abu dhabi
ReplyDelete