UNIT-4
Web Application and Security Class 10 MCQ
Session 1: Working with accessibility options
1. Computer ___________ refers to the user friendliness of a computer system
for all, regardless of their disability.
a. Shortcut Keys b. Accessibility c. Ctrl & Alt Key d. None of the
above
2. What are the different type of impairments that impact computer usage?
a. Dyslexia b. Visual Impairment c. Hearing Impairment d. All of the
above
3. Accessibility options are available in __________.
a. Setting b. Control Panel c. Desktop d. None of the above
4. ___________ is an accessibility feature to help computer users with physical
disabilities, but it is also used by others as a means to reduce repetitive
strain.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
5. _________ enables the user to hold and release a modifier key, like as Shift,
Ctrl, Alt, or the Windows key, and have it remain active until another key is
pressed.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the
above
6. The __________accessibility function instructs the keyboard to ignore short
or repeated inputs, making typing simpler for those people who have hand
tremors.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
7. __________ is an accessibility feature for persons with vision impairment or
cognitive problems.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
8. _________ is turned on, the computer emits sound cues when the locking
keys such as Caps lock, Num lock and Scroll lock are pressed.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
9. ___________ is designed to help users with auditory impairments.
a. Filter keys b. Toggle Keys c. Sound Sentryd. None of the above
10. When the computer makes a sound, ________ produces visual effects such
as a blinking title bar or a flashing border.
a. Filter keys b. Toggle Keys c. Sound Sentryd. None of the above
11. ___________ directs applications that provide information through sound to
also give information visually, through written captions or informative icons.
a. Filter keys b. Show Sound c. Sound Sentry d. None of the above
12. ___________ is an accessibility feature to assist people with vision
impairment. You can change the text size and color, as well as the
background color, to make it easier to read.
a. High Contrast b. Show Sound c. Sound Sentry d. None of the
above
13. _____________ is also an accessibility feature that assists people with
vision impairment by changing the blink rate and width of the cursor.
a. High Contrast b. Cursor Options c. Sound Sentry d. None of the
above
14. The ____________option uses the keyboard (especially numeric keypad) as
a pointing device instead of a mouse.
a. High Contrast b. Mouse key c. Sound Sentry d. None of the above
15. ____________ is an accessibility feature that assists people that have
difficulty using a keyboard or a mouse (or both). They can use special
devices such as Sip, Puff and Breath Switches to provide input to the
computer through Serial Ports.
a. High Contrast b. Mouse key c. Serial Keys d. None of the above
16. The option in Microsoft Windows XP used for helping users with physical
disabilities and to reduce repetitive strain is ____________________.
a. Toggle Key b. Sticky Key c. Tab Key d. None of the above
17. Sound Sentry is intended to assist users who have ____________
disabilities.
a. Auditory Impairments b. Cognitive Impairments c. Visual
Impairments
d. Dexterity Impairments
18. The High Contrast feature in Microsoft Windows XP is designed to help
persons who have _______________ impairments.
a. Auditory Impairments b. Cognitive Impairments c. Visual
Impairments
d. Dexterity Impairments
19. ___________________ is designed to assist people that have difficulty using a
keyboard or a mouse.
a. KeyboardKeys b. MouseKeys c. TabKeys d. GeneralKeys
Session 2: Networking Fundamentals
20. A ______________ is a collection of computers and other hardware
components interconnected by communication channels that allow sharing
of resources and information.
a. Computer Network b. Computer Sharing c. Computer Receiving d.
None of the above
21. What are the examples of communication channels _________.
a. Cable Wire b. Satellites c. Both a) and b) d. None of the
above
22. Example of computer networks architecture __________.
a. Peer – to – Peer architecture b. Client – Server architecture
c. Both a) and b) d. None of the above
23. Networks in which all computers have an equal status are called
__________.
a. Peer – to – Peer Network b. Client – Server Network
c. Both a) and b) d. None of the above
24. Networks in which certain computers have special dedicated tasks,
providing services to other computers are called__________.
a. Peer – to – Peer Network b. Client – Server Network
c. Both a) and b) d. None of the above
25. The computer provides services called ___________.
a. Client b. Server c. Node d. None of the above
26. The computer uses the services which are provided from the server is
called __________.
a. Client b. Server c. Node d. None of the above
27. What are the major different types of network?
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above
28. A ____________ is a network that connects computers and gadgets in a
specific geographic area, such as a house, school, computer laboratory,
office building, or group of buildings.
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above
29. A ______________ network is one which covers a broad area across
metropolitan city, regional, or national boundaries.
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above
30. The ___________ is a global network of interconnected computer networks
that serve billions of people worldwide by utilizing the standard Internet
protocol suite.
a. Internet b. Network c. Arpanet d. None of the above
31. WWW stands for ___________.
a. Web World Wide b. World Wide Web c. World Web Wide d. None of
the above
32. WWW is also known as __________.
a. W2 b. W4 c. W3 d. W1
33. __________ is a network of interconnected hypertext documents that may
be accessed via the Internet.
a. World Wide Web b. W3 c. Both a) and b) d. None of the above
34. A ________ is a software program that is used to browse Web sites and
serves as a bridge between the user and the World Wide Web.
a. World Wide Web b. Web Server c. Web Browser d. None of the above
35. What are the advantages associated with networking?
a. Data & File Sharing b. Hardware Sharing c. Internet Sharing d. All of
the above
36. _________ helps to share hardware components such as printers, scanners
etc.
a. Computer Network b. Hardware Network c. Information Network d.None
of the above
37. ISP stands for ___________.
a. Internet Sharing Provider b. Internet Services Provider c. Internet Social
Provider
d. All of the above
38. Example of Internet Service Provider in India ___________.
a. Bharat Sanchar Nigam Limited b. Airtel c. MTS d. All of the
above
39. WiMAX stands for ____________.
a. WorldWide Interoperability for Microwave Access
b. WorldWide Interoperability for Micro Access
c. WorldWide Internet for Microwave Access
d. None of the above
40. DSL stands for ____________.
a. Dynamic Subscriber Line b. Digital Subscriber Line c. Digital Sub Line
d. None of the above
41. ISDN stands for ___________.
a. Integrated Services Digital Network b. Internet Services Dynamic
Network
c. Integrated Sub Digital Network d. Internet Sub Dynamic Network
42. Á __________ is a device that converts digital computer signals into analog
signals that can travel over phone lines.
a. Router b. Modem c. Bridge d. None of the above
43. Modem is also known as ___________.
a. MOdulator/ DEModulator b. Modular/DeModular c. Modulate/DeModulate
d. None of the above
44. Give the example of a Wired internet connectivity channel?
a. DSL b. WiMax c. Wi-Fi d. All of the above
45. Give the example of a Wireless internet connectivity channel?
a. DSL b. Dial – Up c. WiMax d. None of the above
46. __________ Internet access is a form of Internet access that uses the
facilities of the public switched telephone network (PSTN) to establish a
connection to an Internet service provider
a. Dial – up b. 3G c. WiMax d. Wi-Fi
47. __________provide Internet access by transmitting digital data over wires
of a local telephone network.
a. Dial – Up b. Digital Subscriber Link (DSL) c. 3G d. WiMax
48. _________provides wireless communication and mobile broadband
connection across cities and countries.
a. WiMax b. Wi-Fi c. DSL d. None of the above
49. ___________ is a widely used technology that allows electronic devices as
as computers or mobile phones to transmit data wirelessly over a network,
including high-speed Internet connections.
a. WiMax b. Wi-Fi c. DSL d. None of the above
50. How can we transfer data on the internet?
a. Using Box Switching b. Using Packet Switching
c. Using Public Switching d. Using Web Switching
51. The acronym for LAN is _________________.
a. Large Area Network b. Last Area Network c. Local Area Network
d. None of the above
52. Three types of Wired Internet Connectivity are ___________ , _________ &
___________.
a. 3G, DSL, Dial-Up b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi d. WiMax, DSL, Dial-up
53. Three types of Wireless Internet Connectivity are _________ , ___________ &
_________.
a. 3G, DSL, Dial-Up b. Cable Internet Access, DSL, Dial-Up
c. WiMax, 3G, Wi-Fi d. WiMax, DSL, Dial-up
Session 3: Introduction to Instant Messaging
54. __________is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
a. Instant Messaging b. Computer Software c. Hardware d. None of the
above
55. Most instant messaging software include the option for
performing________.
a. File transfer b. Audio chat c. Video calling d. All of the above
56. What are the key features of instant messaging ___________.
a. Text Message can be sent to one or more person b. Audio calling and
conferencing
c. Video calling and conferencing d. All of the above
57. Give some examples of application based instant messaging software?
a. Skype b. Yahoo! Messenger c. Rediff Bol d. All of the above
58. Give some examples of web based instant messaging software?
a. Meebo b. Yahoo! Messenger c. IMO d. All of the
above
59. ______________ is a type of Internet communication software that allows
the user for instant transfer of text-based communications from sender to
receiver.
a. Instant Messaging (IM) b. Service Messaging (SM)
c. Fast Messaging (FM) d. None of the above
60. ___________ , ____________ & _______________& Web Camera are required for
audio and video conferencing.
a. Joystick, Computer, Video b. Text, Audio, Video
c. Microphone, Headphone, Speaker d. Touch Screen, Speaker, Microphone
Session 4: Chatting with a contact – Google Talk
61. What are the general rules and etiquettes for chatting?
a. Messages should be short and to the point
b. Always ask first if the other person has time to converse.
c. Typing your message in uppercase is extremely rude
d. All of the above
Session 5: Creating and publishing web pages – Blog
62. A _________ is a discussion-style website that non-technical (or technical)
people use to create personal web sites.
a. Blog b. Website c. Social Media Site d. None of the above
63. ___________ are similar to an online personal diary and simple to use.
a. Blog b. Website c. Social Media Site d. None of the above
64. What are the popular blogs websites on the internet _________.
a. WordPress b. Blogger c. Blog d. All of the above
Session 6: Using Offline blog editors
65. Give an example of offline blog editors _____________.
a. Qumana b. Windows Live Writer c. Blogdesk d. All of the above
Session 7: Online Transactions
66. ___________ deals with transfer of money over the internet.
a. Online transactions b. Offline transactions c. Both a) and b)
d. None of the above
67. Which protocols are used to do the translation process securely?
a. Online Transfer process b. Online Transaction Process c. Both
a) and b)
d. None of the above
68. In what situation online shopping is useful.
a. A customer does not have enough time to go shopping.
b. Visiting a store expenses more than purchasing a product online.
c. A product or service that is not available in the local market only available online
d. All of the above
69. Give some of the popular online transaction websites.
a. IRCTC b. Flipkart c. EBay d. All of the above
Session 8: Internet Security
70. What are the different online threats _________.
a. Phishing b. Email Spoofing c. Chat Spoofing d. All of the above
71. How can you reduce the risks over the internet?
a. Using Antivirus Software b. Fire walls c. Strong Password d. All of
the above
72. Which combination is required to create a strong password.
a. Combination of Alphanumeric b. Combination of Numbers
c. Combination of special characters d. All of the above
73. Do not keep password names such as _______.
a. Favorite color b. Name of your friends & Relatives
c. Don’t use mobile number as password d. All of the above
74. Give the name of the website which can generate strong passwords
automatically?
a. www.strongpasswordgenerator.com b. www.wikipedia.com
c. www.cbseacademic.nic.in d. None of the above
75. __________ software helps to protect your data from unauthorized users.
a. W33 Software b. Encryption Software c. Unlock password
Software
d. None of the above
76. How we can keep our username and password private.
a. Don’t tell username & password to others
b. Don’t share username & password in internet café
c. Always clear browser history & cookies after using
d. All of the above
77. How can I make secure transactions on the internet?
a. Use Antivirus and Antispyware programs b. Your Firewall should be
always ON
c. Open only that website which have a https:// d. All of the above
78. _________ are programs that are created on your local computer when you
visit websites.
a. Firewall b. Cookies c. History d. All of the above
79. __________ can be software or hardware that helps in the security of a
computer and a network.
a. Firewall b. Cookies c. History d. All of the above
80. Web browsers have ___________ designed to store passwords used in
forms on websites.
a. Cookies b. Built – in password management c. History d. None of
the above
Session 9: Maintain workplace safety
81. What basic safety rules to follow at the workplace.
a. Fire Safety & Use of First aid b. Falls and slips c. Electrical Safety
d. All of the above
82. Basic fire safety rules in an organization are __________.
a. Fire escape plans must be installed at proper levels
b. Conduct regular drills & Smoke alarms must be placed
c. Maintenance of safety equipment and No – smoking zone
d. All of the above
83. Basic falls and slips safety rules in an organization are ___________.
a. Maintain a clean and clutter-free working area.
b. Workplace should be ventilated and receive light c. Floors must
be clean and dry
d. All of the above
84. What are the different electrical safety rules?
a. Electrical equipment should be approved by a recognized organization
b. Worker should be trained to handle the electric equipment safely
c. Damaged and hazardous electrical equipment should be immediately replaced
d. All of the above
85. Basic rules of using first aid are ___________.
a. Injured person should calm not to panic
b. Keep them warm if they are under shock
c. In the case of a back/neck injury, do not move the victim.
d. All of the above
Session 10: Prevent accidents and emergencies
86. What are the different types of accidents?
a. Accidents at workplace b. Industrial disease/illness
c. Clinical Accident d. All of the above
87. What protection should organizations take to handle accidents in the
workplace?
a. Safety measures must be placed to prevent workplace accidents
b. Immediately call the medical team for any injury
c. Pay attention to and follow emergency drills
d. All of the above
Session 11: Protect Health and Safety at work
88. What are the different types of hazards include _________.
a. Physical b. Chemical c. Biological d. All of the above
89. __________ is the process of emptying a place in case of an emergency,
disaster.
a. Attention b. Evacuation c. Taking care d. None of the above
90. What evacuation emergency should be followed by every company.
a. Company should have a evacuation policy
b. Organization must have a designated assembly point for emergencies
c. Floor plans with evacuation routes should be pasted in every floor
d. All of the above
91. Give some examples of a healthy lifestyle.
a. Healthy eating habits b. Physical activities c. Stress Management
d. All of the above
92. An organization can face some __________ that could put the lives of the
employees in danger.
a. Issue b. Health Hazards c. Shortage d. None of the above
93. Hazards can be of different types depending on the ________ and the
______________ in which the employees work.
a. Industry, Environment b. Occupation, problem c. Both a) and b) d.
None of the above
94. Organizations must have a designated ______________ for emergencies.
a. Evacuation policy b. Assembly point for emergencies
c. Buddy system for special needs people d. All of the above
95. What does PSTN stand for?
a. Public Switched Telephone Network b. Private Switched Telephone
Network
c. Public Switched Telecom Network d. None of the above
96. What does DSL stand for?
a. Digital Subscriber LAN b. Digital Subscriber telephone Line
c. None of the above d. Digital Subscriber Line
97. What type of information is used for managing accounts in some instant
messaging software, such as Yahoo! Messenger and Windows Live
Messenger?
a. Email addresses b. None of the above c. Mobile Numbers d.
Standard Names
98. Blog is similar to _____________?
a. A book b. A diary c. A notebook d. None of the above
99. What equipment do users need to have for audio and video chat?
a. Speakers b. Web Camera c. Microphone d. All of the above
100. What is the term for messages received in instant messaging software
when the recipient is not logged in?
a. Online Messages b. Real Time Messages c. Offline Messages d. None
of the above
101. Which technology is commonly used for long-distance communication?
a. WiMAX b. DSL c. Dial-up d. Cable Internet Access
102. Which technology is typically preferred in hilly terrain?
a. Dial-up b. Cable Internet Access c. None of the Above d.
WiMAX
103. What does WAP stand for?
a. Wireless Access Pointer b. Wireless Access Point c. None of the
above
d. Wireless Across Point
104. Which technology is commonly used to provide free internet access to
customers in places like hotels and malls?
a. Cable Internet Access
b. WiMAX
c. WiFi
d. Dial-up
105. Which of the following is a form of communication over the internet?
a. Email b. Video Call c. Instant Messaging d. All of the
above
106. Which type of communication offers instantaneous transmission of
text-based messages from sender to receiver?
a. Email b. Traditional Post c. Instant Messaging d. None of
the above
107. Which technology among the options listed is considered a wireless
technology?
a. 3G b. DSL c. Cable Internet Access d. Dial-up
108. Is dial-up connection the fastest type of internet connection?
a. True b. False
109. What can we use blogs to convey messages about?
a. Events b. News c. Reviews d. All of the above
110. Which websites offer free blog services?
a. www.blogger.com b. www.blogsome.com c. www.WordPress.com d. All
of the above
111. Which technology uses the cable TV infrastructure?
a. Dial-up b. Cable Internet Access c. WiMAX d. 3G
112. Which of the following features are commonly found in most instant
messaging software?
a. Video Calling b. File transfer c. Audio Chat d. All of the above
113. Which type of signal is able to travel over phone lines?
a. Analog b. None of the above c. Digital d. Both analog and digital
114. What type of communication does Google Talk provide?
a. Text b. Both a) and b) c. Voice d. None of the above
115. When someone in your Google Talk contact list is online, what color dot
appears next to their name?
a. Red b. Yellow c. Green d. Blue
116. What are some general etiquette guidelines to follow when chatting
online?
a. Give people time to respond. b. Messages should be short and to the
point.
c. Both a) and b) d. None of the above
117. What can we create in WordPress?
a. A website b. A blog c. Both a) and b) d. None of the
above
118. Where does the title come in a blog?
a. At the top b. In between c. At the bottom d. None of the above
120. When can others view a blog post?
a. After creating the post b. After inserting pictures
c. After publishing the post d. After inserting videos
121. Which of the following features are typically found in instant
messaging software?
a. Sending text messages to one or more people b. Audio calling and
conferencing
c. Video calling and conferencing d. All of the above
122. OLTP stands for_____________.
a. Offline Transaction Process b. Online Transaction Procedure
c. Online Transaction Process d. None of the above
123. Customers can pay for online purchases using:
a. Debit Card b. Credit Card c. Internet Banking d. All of the
above
124. Which of the following is an example of application-based instant
messaging software?
a. Google Talk b. Skype c. Both a and b d. None of the above
125. Which of the following are considered online threats?
a. Chat spoofing b. Email spoofing c. Phishing d. All of the above
126. What can be done to reduce the risk of online threats?
a. Install Antivirus software b. Use a strong password
c. Use a Firewall d. All of the above
127. Which of the following password formats is considered to be difficult to
crack?
a. Using a friend’s name as a password b. Using a favorite color as a
password
c. Using a mobile number as a password
d. Using a combination of alphanumeric and special characters as a
password
128. What type of password can help reduce the risk of a security breach?
a. Weak b. Week c. Strong d. None of the above
129. What is the term used to describe software that can transmit every key
pressed on a keyboard to unauthorized users?
a. Keyloggers b. Keylog c. Keypress d. None of the above
130. Which instant messaging software needs to be installed before it can
be used?
a. IMO b. Google Talk c. Meebo d. All of the
above
131. What type of account do you need to use Google Talk?
a. Yahoo b. Skype c. None of the above d. Gmail
132. How can we create a blog offline?
a. By using Qumana b. Either by using any Offline Blog Editor or
Qumana
c. By using any Offline Blog Editor d. None of the above
133. Which of the following is an example of an offline blog editor?
a. Windows Live Writer b. Blogdesk c. Qumana d. All of the above
134. Qumana is a blog editor that is___________.
a. a paid service b. available for free c. shareware d. None
of the above
135. Qumana is known for being:
a. easy to use b. free c. simple d. All of the above
136. To use Yahoo! Messenger, what type of account do you need to have?
a. A Gmail account b. Neither a Yahoo Mail nor Gmail account
c. Both a Yahoo Mail and Gmail account d. A Yahoo Mail account
137. Which of the following instant messaging services provide chat
services?
a. MSN b. Sify c. Rediff d. All of the above
138. Examples of online funds transfer.
a. RTGS b. NEFT c. Both a) and b) d. None of the above
139. The benefits of online transactions.
a. convenience b. speed c. low risk of theft d. All of the above
140. Online shopping is a type of___________.
a. E-Booking b. E-commerce c. E-reservation d. None of the
above
141. The process of transferring money over the internet is referred to
as______________.
a. Online transaction b. Offline transaction c. Both a) and b) d. None of the above
142. What we will do for protection for hackers?
a. Keep the operating system and software applications up to date
b. Clear browser cookies frequently c. Install firewalls d.
All of the above
143. What are cookies?
a. Folders that store website data b. Large files that store website data
c. Small files that store website data d. None of the above
144. What could a firewall be?
a. Hardware b. Software c. Both a) and b) d. None of the
above
145. What are some examples of web browsers?
a. Edge b. Opera c. Mozilla Firefox d. All of the above
146. What are some basic safety rules to follow at the workplace?
a. Fire safety b. Electrical safety c. Falls and slips d. All of the
above
147. What are the basic fire safety rules in an organization?
a. Conduct regular drills b. Smoke alarms must be placed at proper
intervals
c. Both a) and b) d. None of the above
148. What is the general rule to follow for secure online transactions?
a. Use any antivirus and antispyware software b. Share personal information with
the website
c. Use any website for such transactions d. All of the above
149. Which symbol represents a digital certificate indicating a secure
transaction in the web browser’s address bar?
a. Lock b. Key c. Both of the above d. None of the
above
150. Which of the following can help reduce the risk of online threats?
a. Antivirus software b. Strong passwords c. Firewall protection d. All of the
above
151. What is the name of the portal that is commonly used for booking train
tickets?
a. Flipkart b. Redbus c. IRCTC d. EBay
152. What are examples of accidents that can occur in the workplace?
a. Slips and fall accidents. b. Fire accidents. c. Both a) and b) d.
None of the above.
153. Which payment method allows customers to pay for their purchase
after they have received the product?
a. COD b. Credit Card c. Debit Card d. None of the above
154. What does the acronym IRCTC stand for?
a. Indian Railway Catering and Tourist Corporation
b. Indian Railway Catering and Tourism Corporation
c. Indian Railway Catering and Tourism Coordinator
d. None of the above
155. What is the basic rule for keeping the workplace safe from fire?
a. Keep the workplace a no-smoking zone b. Use proper footwear to avoid
falls and slips
c. Ensure proper lighting and visibility d. None of the above
156. A customer is considered to be doing online shopping when___________.
a. a product is available offline at lower rates b. they have sufficient time
to visit a store
c. It costs more to visit a store than to buy anything online. d. None
of the above
157. What is the term for any unexpected situation that needs immediate
attention and action?
a. Emergency. b. Accident. c. Occupational hazard. d. None of the
above.
158. What is the term for a source of any potential harm?
a. Accident. b. Emergency. c. Hazard. d. All of the above.
159. In the context of online shopping, what does the abbreviation COD
stand for?
a. Catch on Delivery b. Cash on Delivery c. Cash Over Delivery d.
None of the above
160. Which of the following is the social and civic responsibility of every
human being?
a. Computer skills. b. First Aid. c. Handling electrical equipment. d. None
of the above.
161. What is our responsibility when checking medical-related items in a
first aid kit?
a. Cost. b. Color. c. Expiry. d. None of the above.
162. What are some of the measures to prevent electrical hazards and
accidents?
a. Use only electrical equipment approved by a recognized organization.
b. Avoid overloading circuits. c. Train workers to handle electric equipment
safely.
d. All of the above.
163. What are the rules of First Aid?
a. Do not move the victim in case of back/neck injury.
b. Assure the injured to remain calm and not to panic.
c. Both a) and b) d. None of the above.
164. What is the term for hazards that occur due to occupation?
a. Chemical hazards. b. Occupational hazards. c. Electrical hazards. d. All of
the above.
165. What are the types of occupational hazards?
a. Biological hazards. b. Physical hazards. c. Ergonomic hazards. d. All
of the above.
166. What is the term for an unfortunate incident that occurs
unintentionally causing hazardous results, injury, or unwanted results?
a. Emergency. b. Accident. c. Hazard. d. None of the above.