"O" level course of DOEACC Scheme is equivalent to a Foundation Level Course in Computer Applications. Students can acquire this qualification by undergoing this course and passing the examination conducted by the NIELIT.
1.
Each question below gives a multiple choice of answers. (1x10)
1.1. The main function of a browser is to
A)
compile HTML
B) interpret HTML
C)
de-compile HTML
D)
interpret CGI programs
1.2. Spider is a________
A) a program that crawls around
the web and stores pages in search engines.
B)
hacking software that spreads virally
C)
software that examines network vulnerabilities
D)
a protocol for distributing large files
1.3. FTP does not use
A)
two transfer mode
B)
control connection to remote computer before file can be transferred
C) User Datagram Protocol (UDP)
D)
authorization of a user through login and password verification
1.4 ___________ is used to enable the use of
active documents
A)
HTML
B)
CGI
C)
JAVA
D) All the above
1.5. In <IMG SRC=”C:PICTURE/BB1.gif”
ALIGN=middle> ALIGN is
A)
A tag
B)
The head
C)
The body
D) An attribute
1.6 Web pages are uniquely defined using
A)
IP addresses
B) URL
C)
Domain
D)
File name
1.7. Which of the following services are
available on the World Wide Web?
i)
Encryption
ii)
HTTP
iii)
HTML
iv)
Firewalls
A) i) and ii)
B)
ii) and iii)
C)
iii) and iv)
D)
i) and iv)
1.8. Internet uses
A) packet switching
B)
circuit switching
C)
telephone switching
D)
telex switching
1.9 The ownership rights as related to content
on the web are governed under
A) Copyright law
B)
Patent law
C)
Data protection law
D)
Privacy law
1.10. Multipurpose Internet Mail Extension
(MIME) was developed
A)
to support email messages containing text and video
B) to support email messages
containing text, audio and video
C)
to support email messages containing audio and video
D)
to support text-based email messages
2.
Each statement below is either TRUE or FALSE. Choose the most appropriate one
and
ENTER in the “tear-off” sheet attached to the question paper, following
instructions
therein. (1x10)
2.1
TCP provides packet-level reliability. TRUE
2.2
Subnet mask allows flexible division of address bits into a network address
part and a host
address
part. TRUE
2.3
The Internet is managed and controlled by the US Government. FALSE
2.4
There are upto six levels of header tag in HTML. TRUE
2.5
Client sends the request in the form of URLs to the server. TRUE
2.6
A single hypertext document can contain link to one document on the World Wide
Web. FALSE
2.7
IP only allows fixed packet sizes. TRUE
2.8
DNS is a distributed database offering strong consistency and atomicity
guarantees. TRUE
2.9
HTTP uses TCP and DNS uses UDP. FALSE
2.10
Connectivity is equivalent to a point-to-point physical link. TRUE
3.
Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s)
in column Y. Enter your selection in the “tear-off” answer sheet
attached
to the question paper, following instructions therein. (1x10)
A.
Public key infrastructure
B.
FTP
D.
TCP
C. </HTML?>
and <HTML>
E.
Firewalls
F. https
G.
<HTML> and </HTML>
H.
Ping
I.
PPP
J.
UDP
K.
ATM
L.
POP3
M.
http
N.
Web browser
|
3.1
A technique in which two different keys are used for performing encryption and
decryption A
3.2
The Internet transfer protocol means that you are working through a secure web
connection F
3.3
Every web document must begin and end with G
3.4
The path up to destination is allocated before the transmission of message
begins D
3.5
Control Gateways in a computer by enabling selected connections from external
network and disabling selected connection to external networks E
3.6
It allows user to dial into the Internet I
3.7
It is a process that along with providing an interface to the user, sends
messages into a socket N
3.8
Connectionless protocol J
3.9
It is a cell relay protocol that in combination with SONET, allows high-speed
connections K
3.10
It is an application program that uses the services of ICMP to test the
reachability of a host H
4.
Each statement below has a blank space to fit one of the word(s) or phrase(s)
in the
list
below. Enter your choice in the “tear-off” answer sheet attached to the
question
paper,
following instructions therein. (1x10)
A.
Client-Server
B.
Telnet
C.
Internet Protocol
D.
Browser
E.
IMAP4
F.
Active
G.
Common Gateway Interface
H.
Net id
I.
FTP
J.
Host id
K.
Decryption
L.
EMAIL
M.
SMTP
|
4.1
____K____
transforms an intentionally unintelligible message (ciphertext) into meaningful
information.
4.2
____F____
document is a copy of a program retrieved by the client and executed at the
client
site.
4.3
Multipurpose Internet Mail Extension (MIME) is an extension of ____L____
that allows the
transfer
of multimedia and other non-ASCII messages.
4.4
POP3 and ____E____
are protocols used by a mail server in conjunction with SMTP to
receive
and hold email for hosts.
4.5
Domain Name System (DNS) is a _____A_____application that identifies each
host on the
Internet
with a unique user-friendly name.
4.6
In remote login, ____B____ is used to access distant service.
4.7
IPv6 is the latest version of the ____C____ which has a 128-bit address space, a
resource
allocation,
and increased security measures.
4.8
The ____G____
is a standard for creating and handling dynamic Web documents.
4.9
Java is a combination of a high-level programming language, a run-time
environment, and a
class
library that allows a programmer to write an active document and a ____D____
to run it.
4.10 The portion of
the IP address that identifies the network is called the ____H____.
GOOD
ReplyDeleteBy equipping you with the latest industry trends and best practices, this course can expand your job prospects and help you achieve your career aspirations. boat rental abu dhabi
ReplyDelete