MODULE 1
1. What is the Internet?
A) A global network of interconnected computers
B) A local network within a single organization
C) A standalone computer system
D) A specialized network used only by governments
Answer: A) A global network of interconnected computers
2. Which of the following is NOT an Internet application?
A) Email
B) Web browsing
C) Word processing
D) Video conferencing
Answer: C) Word processing
3. When entering a website address into a browser, which part of the address is typically omitted?
A) Protocol
B) Domain name
C) Path
D) Subdomain
Answer: A) Protocol
4. What does URL stand for?
A) Universal Resource Locator
B) Uniform Resource Locator
C) Universal Routing Language
D) Unified Resource Locator
Answer: B) Uniform Resource Locator
5. Which component of a URL specifies the method used to access a resource?
A) Protocol
B) Domain name
C) Path
D) Query string
Answer: A) Protocol
6. The part of a URL that specifies the domain name of a website is called the:
A) Protocol
B) Host
C) Path
D) Query string
Answer: B) Host
7. Which of the following is NOT a valid protocol in a URL?
A) HTTP
B) FTP
C) SMTP
D) XML
Answer: D) XML
8. What is the purpose of searching the Internet?
A) To find information on specific topics
B) To send emails
C) To host websites
D) To play online games
Answer: A) To find information on specific topics
9. Which search engine is known for its PageRank algorithm?
A) Yahoo
B) Bing
C) Google
D) DuckDuckGo
Answer: C) Google
10. Which of the following is NOT a commonly used web browser?
A) Chrome
B) Safari
C) Apache
D) Firefox
Answer: C) Apache
11. Which component of a URL specifies a particular page or resource on a website?
A) Protocol
B) Domain name
C) Path
D) Query string
Answer: C) Path
12. What does HTTP stand for in a URL?
A) HyperText Transfer Protocol
B) Hypertext Transmission Protocol
C) Hyperlink Transfer Protocol
D) Hypertext Transfer Process
Answer: A) HyperText Transfer Protocol
13. Which of the following is NOT a valid domain suffix?
A) .com
B) .net
C) .org
D) .web
Answer: D) .web
14. Which organization oversees the assignment of IP addresses and domain names?
A) W3C
B) ICANN
C) IEEE
D) IETF
Answer: B) ICANN
15. Which protocol is commonly used for transferring files over the Internet?
A) HTTP
B) FTP
C) SMTP
D) POP3
Answer: B) FTP
16. Which of the following is NOT a valid URL scheme?
A) http
B) ftp
C) www
D) file
Answer: C) www
17. What is the primary function of a web browser?
A) Sending emails
B) Playing games
C) Viewing web pages
D) Creating documents
Answer: C) Viewing web pages
18. Which of the following is an example of a top-level domain?
A) google
B) .com
C) http
D) www
Answer: B) .com
19. Which protocol is commonly used for sending emails?
A) HTTP
B) FTP
C) SMTP
D) DNS
Answer: C) SMTP
20. Which component of a URL is used to pass parameters to a web server?
A) Protocol
B) Domain name
C) Path
D) Query string
Answer: D) Query string
21. What is the main purpose of an IP address?
A) To identify a specific website
B) To identify a specific device on a network
C) To encrypt data during transmission
D) To authenticate users
Answer: B) To identify a specific device on a network
22. Which of the following is NOT a characteristic of the Internet?
A) Centralized control
B) Decentralized architecture
C) Redundancy
D) Scalability
Answer: A) Centralized control
23. Which organization develops and publishes web standards?
A) ICANN
B) W3C
C) IEEE
D) IETF
Answer: B) W3C
24. What is the purpose of DNS?
A) To encrypt data during transmission
B) To translate domain names into IP addresses
C) To route emails to their destinations
D) To compress web pages for faster loading
Answer: B) To translate domain names into IP addresses
25. Which protocol is commonly used for secure communication over the Internet?
A) HTTP
B) FTPS
C) HTTPS
D) SMTP
Answer: C) HTTPS
26. Which of the following is NOT an example of a web browser?
A) Chrome
B) Safari
C) Firefox
D) Outlook
Answer: D) Outlook
27. What is the purpose of a firewall in Internet security?
A) To filter incoming and outgoing network traffic
B) To speed up internet connections
C) To provide encryption for data transmission
D) To prevent physical damage to network devices
Answer: A) To filter incoming and outgoing network traffic
28. Which protocol is commonly used for retrieving emails from a mail server?
A) HTTP
B) FTP
C) POP3
D) IMAP
Answer: C) POP3
29. What does HTML stand for?
A) HyperText Markup Language
B) Hyperlink Text Management Language
C) Hypertext Media Language
D) Hyperlink Transfer Markup Language
Answer: A) HyperText Markup Language
30. Which of the following is NOT a valid HTTP method?
A) GET
B) POST
C) SEND
D) DELETE
Answer: C) SEND
MODULE 2
Browser Types:
1. Which of the following is NOT a commonly used web browser?
A) Chrome
B) Safari
C) Firefox
D) Excel
Answer: D) Excel
2. Which web browser is developed and maintained by Apple Inc.?
A) Chrome
B) Safari
C) Firefox
D) Edge
Answer: B) Safari
3. Mozilla Firefox is known for its:
A) Open-source nature
B) Closed-source development
C) Microsoft ownership
D) Mobile-only usage
Answer: A) Open-source nature
4. Which browser was developed by Microsoft and replaced Internet Explorer?
A) Chrome
B) Safari
C) Firefox
D) Edge
Answer: D) Edge
5. Opera is a web browser developed by a company based in which country?
A) United States
B) China
C) Norway
D) Germany
Answer: C) Norway
6. Which of the following is a feature of Google Chrome browser?
A) Trident rendering engine
B) Presto rendering engine
C) Blink rendering engine
D) Gecko rendering engine
Answer: C) Blink rendering engine
7. Which browser is known for its focus on privacy and security, with features like "Do Not Track" and ad-
blocking?
A) Chrome
B) Safari
C) Firefox
D) Brave
Answer: D) Brave
8. Which browser is primarily associated with the Linux operating system?
A) Chrome
B) Safari
C) Firefox
D) Konqueror
Answer: D) Konqueror
9. Microsoft Edge is based on which rendering engine?
A) Trident
B) WebKit
C) Blink
D) Presto
Answer: C) Blink
10. Which browser is known for its speed and minimalist design, often used in mobile devices?
A) Chrome
B) Safari
C) Firefox
D) Opera Mini
Answer: D) Opera Mini
Social Networking Platforms:
11. Which social networking platform is primarily focused on professional networking and career
development?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook
Answer: C) LinkedIn
12. Facebook was founded by:
A) Mark Zuckerberg
B) Jack Dorsey
C) Evan Spiegel
D) Kevin Systrom
Answer: A) Mark Zuckerberg
13. Which social networking platform allows users to post short updates known as tweets?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook
Answer: A) Twitter
14. Which social networking platform is known for its microblogging features and multimedia content
sharing?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook
Answer: B) Tumblr
15. What is the primary focus of Flickr?
A) Professional networking
B) Microblogging
C) Photo sharing
D) Video sharing
Answer: C) Photo sharing
16. Which social networking platform is primarily focused on video sharing?
A) Facebook
B) Tumblr
C) LinkedIn
D) YouTube
Answer: D) YouTube
17. Which company owns WhatsApp?
A) Facebook
B) Twitter
C) Google
D) Microsoft
Answer: A) Facebook
18. Skype is primarily used for:
A) Microblogging
B) Video conferencing and VoIP
C) Professional networking
D) Photo sharing
Answer: B) Video conferencing and VoIP
19. What is the primary function of Yahoo?
A) Microblogging
B) Webmail and search engine
C) Professional networking
D) Photo sharing
Answer: B) Webmail and search engine
20. Which social networking platform allows users to create and share professional portfolios and
resumes?
A) Twitter
B) Tumblr
C) LinkedIn
D) Facebook
Answer: C) LinkedIn
21. What type of content is mainly shared on Facebook?
A) Short text updates
B) Photos and videos
C) Professional portfolios
D) Microblogging posts
Answer: B) Photos and videos
22. What distinguishes WhatsApp from other social networking platforms?
A) Its focus on professional networking
B) Its integration with email services
C) Its encryption for messaging
D) Its multimedia sharing capabilities
Answer: C) Its encryption for messaging
23. Tumblr is known for its emphasis on:
A) Professional networking
B) Microblogging
C) Video sharing
D) Photo editing
Answer: B) Microblogging
24. What is the primary function of Twitter?
A) Professional networking
B) Video sharing
C) Microblogging
D) Photo editing
Answer: C) Microblogging
25. LinkedIn is commonly used by professionals for:
A) Sharing personal photos
B) Microblogging
C) Building professional connections
D) Sharing memes
Answer: C) Building professional connections
26. What distinguishes Skype from other communication platforms?
A) Its focus on short text updates
B) Its integration with social media feeds
C) Its emphasis on video conferencing and VoIP
D) Its photo editing features
Answer: C) Its emphasis on video conferencing and VoIP
27. Flickr is primarily used for sharing:
A) Professional resumes
B) Short text updates
C) Photos
D) Videos
Answer: C) Photos
28. YouTube is primarily focused on:
A) Microblogging
B) Video sharing
C) Professional networking
D) Photo editing
Answer: B) Video sharing
29. What distinguishes WhatsApp from traditional text messaging?
A) Its focus on professional networking
B) Its integration with email services
C) Its use of the internet for messaging
D) Its multimedia sharing capabilities
Answer: C) Its use of the internet for messaging
30. Yahoo is known for its:
A) Microblogging features
B) Webmail and search engine services
C) Video sharing capabilities
D) Professional networking tools
Answer: B) Webmail and search engine services
MODULE 3
Email:
1. What is the primary purpose of email?
A) Instant messaging
B) Document sharing
C) Electronic communication
D) Social networking
Answer: C) Electronic communication
2. Which of the following is NOT an advantage of email?
A) Instantaneous communication
B) Cost-effectiveness
C) Limited storage capacity
D) Global reach
Answer: C) Limited storage capacity
3. Which component of an email address comes after the "@" symbol?
A) User ID
B) Domain name
C) Password
D) Message body
Answer: B) Domain name
4. What is the purpose of a password in email?
A) To identify the sender
B) To encrypt the message
C) To authenticate the user
D) To format the message
Answer: C) To authenticate the user
5. What is the main function of a mailer in email?
A) Sending and receiving emails
B) Formatting the message
C) Composing the message
D) Adding attachments
Answer: A) Sending and receiving emails
6. Which of the following is a component of an email message?
A) Domain name
B) User ID
C) Attachment
D) Password
Answer: C) Attachment
7. What does SMTP stand for in email?
A) Simple Mail Transfer Protocol
B) Secure Mail Transfer Protocol
C) Standard Mail Transfer Protocol
D) System Mail Transfer Protocol
Answer: A) Simple Mail Transfer Protocol
8. What component of an email message contains the recipient's email address?
A) Subject line
B) Body
C) From field
D) To field
Answer: D) To field
9. Which of the following is NOT a commonly used email protocol?
A) SMTP
B) POP3
C) HTTP
D) IMAP
Answer: C) HTTP
10. What is the purpose of CC and BCC fields in email?
A) To format the text
B) To authenticate the sender
C) To specify additional recipients
D) To add encryption
Answer: C) To specify additional recipients
11. Which email protocol allows users to access their emails from multiple devices while keeping them
synchronized?
A) SMTP
B) POP3
C) IMAP
D) HTTP
Answer: C) IMAP
12. What is the purpose of an email signature?
A) To identify the recipient
B) To authenticate the sender
C) To provide contact information
D) To add encryption
Answer: C) To provide contact information
13. Which of the following is NOT a component of an email message?
A) Subject line
B) Body
C) Footer
D) Attachment
Answer: C) Footer
14. Which of the following is a disadvantage of email?
A) Instantaneous communication
B) Potential for spam
C) Global reach
D) Low cost
Answer: B) Potential for spam
15. What is the primary function of an email client?
A) To send and receive emails
B) To create email addresses
C) To host email servers
D) To develop email protocols
Answer: A) To send and receive emails
G Suite:
16. What is Google Drive?
A) A cloud storage service
B) A social networking platform
C) A web browser
D) An email client
Answer: A) A cloud storage service
17. Which G Suite application is used for creating and editing text documents?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides
Answer: B) Google Documents
18. Which G Suite application is used for creating and managing spreadsheets?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides
Answer: C) Google Spreadsheets
19. Which G Suite application is used for creating presentations?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides
Answer: D) Google Slides
20. Which G Suite application is used for creating online forms and surveys?
A) Google Drive
B) Google Documents
C) Google Forms
D) Google Slides
Answer: C) Google Forms
21. What is the primary advantage of using Google Drive?
A) Unlimited storage space
B) Offline access to files
C) Real-time collaboration
D) Built-in antivirus protection
Answer: C) Real-time collaboration
22. Which G Suite application allows multiple users to collaborate on a single document simultaneously?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides
Answer: B) Google Documents
23. What is the main purpose of Google Forms?
A) Creating and editing text documents
B) Managing spreadsheets
C) Creating online forms and surveys
D) Creating presentations
Answer: C) Creating online forms and surveys
24. Which G Suite application is commonly used for data analysis and visualization?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Slides
Answer: C) Google Spreadsheets
25. What feature of Google Drive allows users to access their files even without an internet connection?
A) Offline mode
B) Drive sync
C) Cloud storage
D) File sharing
Answer: A) Offline mode
26. Which G Suite application is primarily used for storing and organizing files in the cloud?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Forms
Answer: A) Google Drive
27. What is the primary advantage of using Google Documents for word processing?
A) Advanced data analysis tools
B) Real-time collaboration
C) Multimedia presentation capabilities
D) Integration with social media platforms
Answer: B) Real-time collaboration
28. Which G Suite application is commonly used for creating slide presentations?
A) Google Drive
B) Google Documents
C) Google Slides
D) Google Forms
Answer: C) Google Slides
29. What is the primary advantage of using Google Forms for creating surveys?
A) Real-time collaboration
B) Advanced data analysis tools
C) Unlimited storage space
D) Integration with email clients
Answer: B) Advanced data analysis tools
30. Which G Suite application allows users to create and manage email accounts for their domain?
A) Google Drive
B) Google Documents
C) Google Spreadsheets
D) Google Workspace Admin
Answer: D) Google Workspace Admin
MODULE 4
1. What is the primary purpose of internet security?
a) To ensure high internet speed
b) To protect computer systems and data from unauthorized access or damage
c) To increase internet bandwidth
d) To enhance internet connectivity
Answer: b) To protect computer systems and data from unauthorized access or damage
2. Which of the following is not considered a common email threat?
a) Phishing
b) Spam
c) Cookies
d) Malware attachments
Answer: c) Cookies
3. Secure email utilizes which of the following technologies to protect sensitive information?
a) SSL/TLS encryption
b) Plain text transmission
c) HTTP protocol
d) No encryption
Answer: a) SSL/TLS encryption
4. What is the main purpose of antivirus software?
a) To enhance internet speed
b) To protect against viruses and malware
c) To increase computer storage
d) To improve computer performance
Answer: b) To protect against viruses and malware
5. Which of the following is NOT a function of a firewall?
a) Blocking unauthorized access
b) Monitoring network traffic
c) Identifying and removing viruses
d) Filtering incoming and outgoing data
Answer: c) Identifying and removing viruses
6. Cryptography involves:
a) Protecting data through encryption
b) Increasing internet bandwidth
c) Decreasing computer performance
d) Enhancing network speed
Answer: a) Protecting data through encryption
7. Digital signatures are primarily used for:
a) Sending encrypted emails
b) Verifying the authenticity of digital documents
c) Blocking internet access
d) Enhancing computer graphics
Answer: b) Verifying the authenticity of digital documents
8. Copyright issues primarily deal with:
a) Protecting intellectual property rights
b) Increasing computer processing speed
c) Enhancing internet connectivity
d) Improving network security
Answer: a) Protecting intellectual property rights
9. Which of the following is a common phishing technique?
a) Sending unsolicited emails with malicious attachments
b) Installing antivirus software
c) Creating fake websites to steal personal information
d) Encrypting sensitive emails
Answer: c) Creating fake websites to steal personal information
10. What is the main purpose of SSL/TLS encryption?
a) To slow down internet speed
b) To protect data during transmission over the internet
c) To increase computer storage
d) To reduce network latency
Answer: b) To protect data during transmission over the internet
11. What is the primary function of antivirus software?
a) To block unwanted emails
b) To protect against malware and viruses
c) To increase internet speed
d) To enhance computer graphics
Answer: b) To protect against malware and viruses
12. What type of software is designed to prevent unauthorized access to or from a private network?
a) Firewall
b) Antivirus
c) Encryption software
d) Phishing software
Answer: a) Firewall
13. Which of the following is NOT a common email threat?
a) Spoofing
b) Adware
c) Ransomware
d) SSL/TLS
Answer: d) SSL/TLS
14. What is the primary purpose of a digital signature?
a) To encrypt emails
b) To verify the identity of the sender
c) To speed up internet connection
d) To filter spam emails
Answer: b) To verify the identity of the sender
15. Which of the following is a common method to protect sensitive data during transmission?
a) Plain text
b) Encryption
c) Compression
d) No protection
Answer: b) Encryption
16. What is the main purpose of a firewall?
a) To increase internet speed
b) To protect against viruses and malware
c) To enhance computer graphics
d) To block unauthorized access to a network
Answer: d) To block unauthorized acc
Pradeep Kumar, [3/9/2024 1:15 PM]
ess to a network
17. Which of the following is NOT a common type of malware?
a) Trojan horse
b) Spyware
c) SSL/TLS
d) Ransomware
Answer: c) SSL/TLS
18. Which cryptographic technique uses a pair of keys for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital signature
Answer: b) Asymmetric encryption
19. What is the primary purpose of copyright laws?
a) To protect intellectual property rights
b) To increase internet speed
c) To enhance computer graphics
d) To block unauthorized access to a network
Answer: a) To protect intellectual property rights
20. What is a common feature of phishing emails?
a) They contain legitimate offers
b) They are sent from trusted sources
c) They attempt to deceive recipients into disclosing sensitive information
d) They are always marked as spam
Answer: c) They attempt to deceive recipients into disclosing sensitive information
21. Which of the following is NOT a function of antivirus software?
a) Scanning for and removing malware
b) Monitoring network traffic
c) Encrypting emails
d) Updating virus definitions
Answer: c) Encrypting emails
22. What is the primary purpose of a digital certificate?
a) To block unauthorized access to a network
b) To verify the identity of a website or user
c) To increase internet speed
d) To enhance computer graphics
Answer: b) To verify the identity of a website or user
23. Which type of attack involves tricking users into revealing sensitive information by pretending to be a
legitimate entity?
a) Phishing
b) DoS (Denial of Service)
c) SQL injection
d) Trojan horse
Answer: a) Phishing
24. What is the primary purpose of encryption?
a) To increase internet speed
b) To protect data from unauthorized access
c) To enhance computer graphics
d) To block spam emails
Answer: b) To protect data from unauthorized access
25. Which of the following is NOT a common type of firewall?
a) Packet-filtering firewall
b) Proxy firewall
c) Antivirus firewall
d) Stateful inspection firewall
Answer: c) Antivirus firewall
26. What is the main function of a proxy server in internet security?
a) To enhance computer graphics
b) To increase internet speed
c) To filter and forward network traffic
d) To encrypt emails
Answer: c) To filter and forward network traffic
27. Which cryptographic technique involves converting plaintext into ciphertext using a secret key?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital
signature
Answer: a) Symmetric encryption
28. What is the primary purpose of a VPN (Virtual Private Network)?
a) To increase internet speed
b) To protect data transmission over public networks
c) To enhance computer graphics
d) To filter spam emails
Answer: b) To protect data transmission over public networks
29. Which of the following is NOT a common feature of antivirus software?
a) Real-time scanning
b) Firewall protection
c) Automatic updates
d) Email encryption
Answer: d) Email encryption
30. Which type of attack involves flooding a network or server with excessive requests to disrupt normal
traffic?
a) Phishing
b) DoS (Denial of Service)
c) Spoofing
d) Trojan horse
Answer: b) DoS (Denial of Service)
31. What is the main purpose of SSL/TLS encryption?
a) To slow down internet speed
b) To protect data during transmission over the internet
c) To increase computer storage
d) To reduce network latency
Answer: b) To protect data during transmission over the internet
32. What is the primary function of antivirus software?
a) To block unwanted emails
b) To protect against malware and viruses
c) To increase internet speed
d) To enhance computer graphics
Answer: b) To protect against malware and viruses
33. What type of software is designed to prevent unauthorized a
Pradeep Kumar, [3/9/2024 1:15 PM]
ccess to or from a private network?
a) Firewall
b) Antivirus
c) Encryption software
d) Phishing software
Answer: a) Firewall
34. Which of the following is NOT a common email threat?
a) Spoofing
b) Adware
c) Ransomware
d) SSL/TLS
Answer: d) SSL/TLS
35. What is the primary purpose of a digital signature?
a) To encrypt emails
b) To verify the identity of the sender
c) To speed up internet connection
d) To filter spam emails
Answer: b) To verify the identity of the sender
36. Which of the following is a common method to protect sensitive data during transmission?
a) Plain text
b) Encryption
c) Compression
d) No protection
Answer: b) Encryption
37. What is the main purpose of a firewall?
a) To increase internet speed
b) To protect against viruses and malware
c) To enhance computer graphics
d) To block unauthorized access to a network
Answer: d) To block unauthorized access to a network
38. Which of the following is NOT a common type of malware?
a) Trojan horse
b) Spyware
c) SSL/TLS
d) Ransomware
Answer: c) SSL/TLS
39. Which cryptographic technique uses a pair of keys for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital signature
Answer: b) Asymmetric encryption
40. What is the primary purpose of copyright laws?
a) To protect intellectual property rights
b) To increase internet speed
c) To enhance computer graphics
d) To block unauthorized access to a network
Answer: a) To protect intellectual property rights
41. What is a common feature of phishing emails?
a) They contain legitimate offers
b) They are sent from trusted sources
c) They attempt to deceive recipients into disclosing sensitive information
d) They are always marked as spam
Answer: c) They attempt to deceive recipients into disclosing sensitive information
42. Which of the following is NOT a function of antivirus software?
a) Scanning for and removing malware
b) Monitoring network traffic
c) Encrypting emails
d) Updating virus definitions
Answer: c) Encrypting emails
43. What is the primary purpose of a digital certificate?
a) To block unauthorized access to a network
b) To verify the identity of a website or user
c) To increase internet speed
d) To enhance computer graphics
Answer: b) To verify the identity of a website or user
44. Which type of attack involves tricking users into revealing sensitive information by pretending to be a
legitimate entity?
a) Phishing
b) DoS (Denial of Service)
c) SQL injection
d) Trojan horse
Answer: a) Phishing
45. What is the primary purpose of encryption?
a) To increase internet speed
b) To protect data from unauthorized access
c) To enhance computer graphics
d) To block spam emails
Answer: b) To protect data from unauthorized access
46. Which of the following is NOT a common type of firewall?
a) Packet-filtering firewall
b) Proxy firewall
c) Antivirus firewall
d) Stateful inspection firewall
Answer: c) Antivirus firewall
47. What is the main function of a proxy server in internet security?
a) To enhance computer graphics
b) To increase internet speed
c) To filter and forward network traffic
d) To encrypt emails
Answer: c) To filter and forward network traffic
48. Which cryptographic technique involves converting plaintext into ciphertext using a secret key?
a) Symmetric encryption
b) Asymmetric encryption
c) One-time pad
d) Digital signature
Answer: a) Symmetric encryption
49. What is the primary purpose of a VPN (Virtual Private Network)?
a) To increase internet speed
b) To protect data transmission over public networks
c) To enhance computer graphics
d) To filter spam emails
Answer: b) To protect data transmission over public networks
50. Which of the following is NOT a common feature of antivirus software?
a) Real-time scanning
b) Firewall protection
c) Automatic updates
d) Email encryption
Answer: d) Email encryption
MODULE 5
1. What is the purpose of SWAYAM in higher education?
a) Providing scholarships to students
b) Offering online courses for free
c) Funding research projects
d) Building physical infrastructure for colleges
Answer: b) Offering online courses for free
2. Which initiative focuses on broadcasting educational content through DTH channels?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) Virtual labs
Answer: b) Swayam Prabha
3. Which platform is designed to store academic awards, certificates, and diplomas in digital format?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) National Digital Library of India
Answer: c) National Academic Depository
4. What is the primary function of the National Digital Library of India?
a) Broadcasting educational content through DTH channels
b) Offering online courses for free
c) Storing academic awards and certificates digitally
d) Providing access to digital educational resources
Answer: d) Providing access to digital educational resources
5. E-Sodh-Sindhu is focused on:
a) Offering scholarships to students
b) Providing access to research journals and databases
c) Broadcasting educational content through TV channels
d) Building physical infrastructure for colleges
Answer: b) Providing access to research journals and databases
6. Which initiative provides virtual laboratories for students to conduct experiments online?
a) e-acharya
b) e-Yantra
c) Virtual labs
d) NPTEL
Answer: c) Virtual labs
7. What is the main objective of the e-acharya initiative?
a) Offering online courses for free
b) Providing access to digital educational resources
c) Facilitating skill development among teachers
d) Building physical infrastructure for colleges
Answer: c) Facilitating skill development among teachers
8. e-Yantra is aimed at:
a) Broadcasting educational content through DTH channels
b) Offering scholarships to students
c) Providing virtual laboratories for students
d) Promoting robotics education and research
Answer: d) Promoting robotics education and research
9. NPTEL focuses on:
a) Providing access to digital educational resources
b) Offering online courses for free
c) Storing academic awards and certificates digitally
d) Facilitating skill development among teachers
Answer: b) Offering online courses for free
10. Which initiative is specifically designed for storing academic awards and certificates in digital format?
a) SWAYAM
b) National Academic Depository
c) National Digital Library of India
d) E-Sodh-Sindhu
Answer: b) National Academic Depository
11. Which initiative provides access to research journals and databases?
a) Swayam Prabha
b) National Academic Depository
c) Virtual labs
d) E-Sodh-Sindhu
Answer: d) E-Sodh-Sindhu
12. What is the primary focus of e-Yantra?
a) Offering scholarships to students
b) Providing virtual laboratories for students
c) Promoting robotics education and research
d) Broadcasting educational content through DTH channels
Answer: c) Promoting robotics education and research
13. NPTEL primarily offers:
a) Access to digital educational resources
b) Scholarships to students
c) Physical infrastructure for colleges
d) Online courses for free
Answer: d) Online courses for free
14. What is the purpose of SWAYAM Prabha?
a) Providing access to research journals and databases
b) Offering online courses for free
c) Broadcasting educational content through DTH channels
d) Storing academic awards and certificates digitally
Answer: c) Broadcasting educational content through DTH channels
15. What does the National Digital Library of India provide access to?
a) Virtual laboratories
b) Research journals and databases
c) Online courses for free
d) Digital educational resources
Answer: d)
Pradeep Kumar, [3/9/2024 1:15 PM]
Digital educational resources
16. Which initiative focuses on skill development among teachers?
a) e-acharya
b) e-Yantra
c) NPTEL
d) Virtual labs
Answer: a) e-acharya
17. What is the primary objective of the National Academic Depository?
a) Promoting robotics education
b) Broadcasting educational content
c) Storing academic awards digitally
d) Providing access to research journals
Answer: c) Storing academic awards digitally
18. E-Sodh-Sindhu is primarily concerned with:
a) Offering scholarships
b) Providing access to research databases
c) Broadcasting educational content
d) Storing academic certificates
Answer: b) Providing access to research databases
19. Which initiative offers virtual laboratories for conducting experiments online?
a) e-acharya
b) e-Yantra
c) Virtual labs
d) NPTEL
Answer: c) Virtual labs
20. What is the focus of NPTEL?
a) Broadcasting educational content
b) Providing access to digital resources
c) Offering online courses
d) Storing academic certificates
Answer: c) Offering online courses
21. What is the primary function of SWAYAM in higher education?
a) Offering scholarships to students
b) Providing access to online courses
c) Funding research projects
d) Building physical infrastructure for colleges
Answer: b) Providing access to online courses
22. Which initiative is focused on broadcasting educational content through DTH channels?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) Virtual labs
Answer: b) Swayam Prabha
23. Which platform stores academic awards, certificates, and diplomas in digital format?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) National Digital Library of India
Answer: c) National Academic Depository
24. What is the primary function of the National Digital Library of India?
a) Broadcasting educational content through DTH channels
b) Offering online courses for free
c) Storing academic awards and certificates digitally
d) Providing access to digital educational resources
Answer: d) Providing access to digital educational resources
25. E-Sodh-Sindhu primarily provides access to:
a) Scholarships for students
b) Research journals and databases
c) Online courses
d) Virtual laboratories
Answer: b) Research journals and databases
26. Which initiative provides virtual laboratories for conducting experiments online?
a) e-acharya
b) e-Yantra
c) Virtual labs
d) NPTEL
Answer: c) Virtual labs
27. What is the main focus of e-acharya
a) Offering scholarships to students
b) Providing access to digital educational resources
c) Facilitating skill development among teachers
d) Building physical infrastructure for colleges
Answer: c) Facilitating skill development among teachers
28. e-Yantra is aimed at promoting:
a) Broadcasting educational content
b) Robotics education and research
c) Online courses
d) Digital resource access
Answer: b) Robotics education and research
29. NPTEL primarily focuses on providing:
a) Access to digital educational resources
b) Scholarships for students
c) Physical infrastructure for colleges
d) Online courses
Answer: d) Online courses
30. Which initiative is specifically designed for storing academic awards and certificates digitally?
a) SWAYAM
b) National Academic Depository
c) National Digital Library of India
d) E-Sodh-Sindhu
Answer: b) National Academic Depository
31. What does E-Sodh-Sindhu primarily provide access to?
a) Scholarships
b) Research journals and databases
c) Online courses
d) Virtual laboratories
Answer: b) Research journals and databases
32. Which initiative offers virtual laboratories for conducting experiments online?
a) e-acharya
b) e-Yantra
c) Virtual labs
d) NPTEL
Answer: c) Virtual labs
33. What is the main focus of NPTEL?
a) Broadcastin
Pradeep Kumar, [3/9/2024 1:15 PM]
g educational content
b) Providing access to digital resources
c) Offering online courses
d) Storing academic certificates
Answer: c) Offering online courses
34. What is the primary function of SWAYAM in higher education?
a) Offering scholarships to students
b) Providing access to online courses
c) Funding research projects
d) Building physical infrastructure for colleges
Answer: b) Providing access to online courses
35. Which initiative is focused on broadcasting educational content through DTH channels?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) Virtual labs
Answer: b) Swayam Prabha
36. Which platform stores academic awards, certificates, and diplomas in digital format?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) National Digital Library of India
Answer: c) National Academic Depository
37. What is the primary function of the National Digital Library of India?
a) Broadcasting educational content through DTH channels
b) Offering online courses for free
c) Storing academic awards and certificates digitally
d) Providing access to digital educational resources
Answer: d) Providing access to digital educational resources
38. E-Sodh-Sindhu primarily provides access to:
a) Scholarships for students
b) Research journals and databases
c) Online courses
d) Virtual laboratories
Answer: b) Research journals and databases
39. Which initiative provides virtual laboratories for conducting experiments online?
a) e-acharya
b) e-Yantra
c) Virtual labs
d) NPTEL
Answer: c) Virtual labs
40. What is the main focus of e-acharya?
a) Offering scholarships to students
b) Providing access to digital educational resources
c) Facilitating skill development among teachers
d) Building physical infrastructure for colleges
Answer: c) Facilitating skill development among teachers
41. e-Yantra is aimed at promoting:
a) Broadcasting educational content
b) Robotics education and research
c) Online courses
d) Digital resource access
Answer: b) Robotics education and research
42. NPTEL primarily focuses on providing:
a) Access to digital educational resources
b) Scholarships for students
c) Physical infrastructure for colleges
d) Online courses
Answer: d) Online courses
43. Which initiative is specifically designed for storing academic awards and certificates digitally?
a) SWAYAM
b) National Academic Depository
c) National Digital Library of India
d) E-Sodh-Sindhu
Answer: b) National Academic Depository
44. What does E-Sodh-Sindhu primarily provide access to?
a) Scholarships
b) Research journals and databases
c) Online courses
d) Virtual laboratories
Answer: b) Research journals and databases
45. Which initiative offers virtual laboratories for conducting experiments online?
a) e-acharya
b) e-Yantra
c) Virtual labs
d) NPTEL
Answer: c) Virtual labs
46. What is the main focus of NPTEL?
a) Broadcasting educational content
b) Providing access to digital resources
c) Offering online courses
d) Storing academic certificates
Answer: c) Offering online courses
47. What is the primary function of SWAYAM in higher education?
a) Offering scholarships to students
b) Providing access to online courses
c) Funding research projects
d) Building physical infrastructure for colleges
Answer: b) Providing access to online courses
48. Which initiative is focused on broadcasting educational content through DTH channels?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) Virtual labs
Answer: b) Swayam Prabha
49. Which platform stores academic awards, certificates, and diplomas in digital format?
a) SWAYAM
b) Swayam Prabha
c) National Academic Depository
d) National Digital Library of India
Answer: c) National Academic Depository
50. What is the primary function of the National Digital Library of India?
a) Broadcasting educational content through DTH channels
b) Offering online courses for free
c) Storing academic awards and certificates digitally
d) Providing access to digital educational resources