Вы находитесь на странице: 1из 4

(14)A user only gets textual matter of a Web page in

INFORMATION TECHNOLOGY (a)ISDN connection (b) Shell connection


ALL QUESTIONS (c)TCP/IP connection (d) none of these
(15)Which of the following is not a mobile broadband?
UNIT:1 –NETWORKING Technology?
A.MULTIPLE CHOICE QUESTIONS (a)Long term Evolution (b)Global System of Mobiles
(1)Which of the following topologies is a combination (c)Wi-MAX (d) ADSL
of more than one topologies? (16)Which of the following protocol lets you log in to a
(a)bus (b)tree remote computer?
(c)star (d)none of these (a)Wais (b) Gopher
(2)Which of the following is used for wireless (c)Telnet (d) Usenet
communication? (17)The first half of a MAC Address contains-
(a)optical fiber (b)UTP cable (a)Adapter Serial Number
(c)radio waves (d)Coaxial Cable (b)Manufacturer ID number
(3)Which of the following is not a transmission (c)Network ID number
medium? (d)Computer Serial Number
(a)Telephone network (b) Coaxial Cable (18)The query section of a URL is preceded by
(c)Modem (d) Microwaves (a)colon (b)semi-colon
(4)IP addresses of two computers on a network: (c) Question mark (d) double forward slash
(a) Can be the same (b) cannot be the same (19)Expand the following abbreviations:
(c) Are not defined (d)must watch which a ARPA, DNS, WAIS, ISP, LTE, CDMA, UMTS, EDGE,
Third computer FDDI, VSAT, IEEE, ISDN, RFOG, HFC, ICANN, TLD,
(5)Bluetooth can be used for: HTML, HTTP, FTP, XML
(a)Long distance communication (20) Which of the following is a cyber crime, where
(b)Short distance communication computer is being used as a target?
(c)In mobile phone only (a)Squatting (b) spamming
(d)None of the above (c)Snooping (c) Spoofing
(6)Microwaves are: (21)A malicious code that replicates itself is called a
(a)Unidirectional (b)Omni directional (a)Worm (b) Bot
(c)Guided media (d)Not used for communication (c)Cookie (d) Virus
(7)A repeater (22)Web hijacking is a process of
(a)Regenerates the received signal (a)Sniffing (b) Hacking
(b) Destroys the received signal (c)Spoofing (d) None of these
(c) Can be used as a hub (23)UN authorized access to a third party conversation
(d) None of the above is called as
(8)Satellite links are generally used for (a)Denial of service (b) Cyber Stalking
(a)PANs (b) LANs (c)Cyber Squatting (d) Eavesdropping
(c)MANs (d) All of the above (24) False victimization is an act of
(9)The first ever network of computers was installed (a)Denial of Service (b) Cyber Stalking
at------------- (c)Cyber Squatting (d) Eavesdropping
(a) Advanced Research Project Agency, USA (25)Counterfeiting comes under which of the
(b)National Research Laboratory, England Following category?
(c)European Organization for Nuclear Research (a)Hacking (b) Software piracy
(d)None of the above (c)On-line fraud (d) Phishing
(10)An Internet backbone is (26)Which of the following is a fraud over internet, to
(a) Larger transmission line (b )UTP cable fool people in to parting with their money?
(c)Radio waves (d) Coaxial Cable (a)Phishing (b)Vishing
(11)In which of the following, the bit is passed to (c)soft lifting (d)cross site Scripting
Avoid collision? (27)Non-repudiation is a future of
(a)Ethernet (b) Token ring (a)Encryption (b)firewall
(c)FDDI (d) None of the above (c)Digital signature (d)Public key
(12)The protocol for FDDI is derived from (28)Patent law comes under
(a)IEEE 802.4 token bus (a)Electronic signature
(b) IEEE 802.5 token ring (b)Intellectual property right
(c) IEEE 802.5 token time (c)Data Protection (d)None of these
(d)None of these (29)The Primary source of Cyber law in India is
(13)Which of the following is a level one connection in (a)Information technology Act-2000
Internet Access? (b)Internet control Act-2008
(a)Cable modem (b)Dial-up (c)Gateway (d)Direct
(c)Cyber Crime Cell Act (12)Which of the following method is used to move to
(d)Indian Penal Code the next row of the result set
(30)Expand the following abbreviations (a)next () (b) find next () (c) last () (d)forward ()
Wi-Fi, EPA, WEP, SSID, DoS (13)The address of a resource on the is known as:
XSS, SSL, VPN, ITAA, IDRBT (a)ISP (b) HTTP (c) URL (d) WWW
UNIT:2 –PROGRAMMING (14) A program that serves requested HTML files and
Pages.
(1)Which of the following key word is not an access
(a)Web address (b) Web page
Specifier?
(c)Web server (d) none of these
(a) Void (b) public
(15)HTML tags must be written within:
(c) Protected (d) private
(a)< > (b) { }
(2) Which of the following key word is not accessible
(c)[ ] (d) ( )
To a sub-class?
(16)Which of the following is the correct structure of
(a) Void (b) public
HTML tags?
(c) Protected (d) private
(a)< HTML > </HTML > < HEAD > </HEAD > < BODY >
(3)Which of the following statement is true?
</BODY >
(a)A super class is a subset of a sub class
(b) < HTML > <HEAD > </ HEAD > </HTML > < BODY >
(b)Class Second extends First means First is a sub
</BODY >
Class
(C) < HTML > <HEAD > < BODY > </BODY > < HEAD >
(c) Class Second extends First means Second is a
</HTML >
Super class
(d) < HTML > <HEAD > </ HEAD > <BODY > </ BODY >
(d) None of the above
</HTML >
(4)Which of the following method extracts specified
(17)Which of the following tags is used to specify the
No. of characters from a string?
Items in a list.
(a)subStr() (b)substring()
(a)< LI> (b) <OL>
(c) Take String () (d) Extract ()
(c) <UL> (d) < DL>
(5)Which of the following method (s)does not accept
(18)The IMAGE tag uses the---------attribute to specify
any arguments?
The URL of the image to be displayed .
(a) Pow () (b) to lower case
(a)SCR (b) SRC
(c)round () (d)All of the above
(c)Source (d) none of these
(6)Which of the following statement are true?
(19)The align attribute of < TABLE > tag refers to-------
(a)The trim () method removes space from one
Placement of the table in relation to the window
side
Screen.
(b) The trim () method is used to trim a number by
(a)Vertical (b) horizontal
removing zeroes
(c)Both a and b (d) none of these
(c) The trim () method removes spaces from both
(20)Choose the best suitable input type to input
sides of a string
Gender from the user:
(d) The trim () method is used to trim a string by
(a)Text (b) Submit
removing extra characters
(c) Checkbox (d) Radio
(7)Which of the following is not a valid method of the
(21)Elements, such as heading, paragraph and tables
string class?
Etc can be contained in the FORM element
(a)length () (b)concat () (c)trim () (d)round ()
(a)Holds True always (b) )Holds True sometimes
(8)Which of the following class contains methods for
(c)Is never True (d) none of these
basic numerical operations?
(22)Data entry on a web page can be done using:
(a)number (b)string (c)math (d)integer
(a)Tables (b) Formatting Tags
(9)Which of the following method is used to retrieve
(c)Forms (d) Lists
data from a table without modifying the contents of
(23)Which tag is used to embed an image in an HTML
the table?
Document.
(a)Execute () (b) query execute ()
(a)<FIX > (b) < IMG>
(c) Query () (d) execute Query ()
(c)<IMAGE> (d)<FIX IMAGE>
(10) Which of the following class libraries are
(24)To create a nested list we use the tag:
essentially required for setting up a connection with
(a)<OL> (b)<UL> (c)<NL>
the data base and retrieve data?
(d)combination of (a)and (b) as required
(a)Driver manager (b)Connection
(25)Input type=” ……………” will send to from to its
(c)Statement (d) All of the above
Destination place.
(11)Which of the following is not a primitive data type
(a)Button (b)File (c)Submit (d)Reset
in java?
(26)FACE is the attribute of which tag:
(a)float (b)int (c)string (d)void
(a)<BODY> (b)<FONT (c)<P> (d)<IMG>
(27)Radio buttons can be grouped together so that (9)MySQL is a/an
only one is selected at a time by using the attribute: (a)Relation Database (b) Database
(a)name (b)selected (c)checked (d)font (c)RDBMS (d) Table
(28)XML document is used to (10)USE < database name > command
(a)only interpret data (b)Store any kind of data (a) is not used in MySQL
(c)Store only highly structured data (b) is given before quitting MySQL
(like in databases) (c) Opens a table
(d) Store only loosely structured data (d) Opens a database
(like in letters) (11)Which of the following is a DML command?
(29)XML can be used to (a)CREATE (b) DELETE
(a)Exchange data (b) store data (c)ALTER (d) DROP
(c)Interpret data (d)All of these (12)A database
(30)Every XML document must begin with a (a)Contains tables (b) is a part of a table
(a)Root element (b)Child element (c) is same as a table (d) Removes data from table
(c)XML version details (d)Any of these (13)GRANT and REVOKE are---------commands.
UNIT:3 – R D M S (a)DDL (b) DML
(c)DCL (d) TCL
(1)Which of the following is a logical unit of work that
(14)ORDER BY clause is used to sort data
must succeed or fail in its entirety?
(a) In ascending order (b) in descending order
(a)Primary key (b) Database
(c) Both (a) and (b) (d) none of these
(c)Transaction (d) none of these
(15)A table can have
(2)When Auto commit is--------changes made to
(a)Only one candidate key
database are not committed unless explicitly
(b) Only one primary key
requested.
(c) Only one alternate key
(a)Equal to “-” (b) on
(d) No alternate key
(c) off (d)Equal to “%”
(16)Wild card characters are used
(3)When a CREATE TABLE command is issued, a -------
(a) In LIKE clause (b) in ORDER BY clause
occurs in the database.
(c) in BETWEEN clause (d) in IN clause
(a)ROLLBACK (b) COMMIT
(17)DDL is
(c)SAVEPOINT (d) ROLLBACK TO SAVEPOINT
(a) a part of SQL (b) a part of DML
(4)By default AUTOCOMMIT is---------
(c) a part of DCL (d) none of the above
(a) Disabled (b) enabled
(18)LIKE clause is used
(c) Inactive (d) none of these
(a) For pattern matching
(5)Which of the following statement or command?
(b) For table matching
Completes a transaction?
(c) For inserting similar data in a table
(a)INSERT INTO (b) COMMIT
(d) For deleting data from a table
(c)DELETE (d) SELECT
(19)Expand the use of following SQL functions:
(6)If Feroze deposits a cheque of Rs. 1200.00 in his
ASCII (), CONCAT (), INSTR (), TRIM (), REVERSE (),
account, which was given to him by Ali, two tasks:
LENGTH (), ROUND (), DAYNAME (), CURDATE (),
decreasing of Rs. 1200.00 from Ali’s account and
SYSDATE ()
increment of Rs. 1200.00in Feroze’s account are done-
------------ constitute(s) a transaction.
(a)First task (b) both the tasks UNIT:4 – IT APPLICATIONS
(c)None of these (d) Second tasks (1)On-line selling and buying of products is categorizes
(7)START TRANSACTION statement As
(a)Updates the current database (a) e-Commerce (b) e-Business
(b)Rolls back the current transaction (c) e-Store (d) none of these
(c)Commits the current transaction and starts a new (2)Which of the following process comes under
Transaction Electronic Document Interchange?
(d)Starts a new transaction only (a) Electronic Fund Transfer
(8)ROLLBACK statement (b) Electronic publishing
(a)Cancels the entire transaction (c) Electronic messaging
(b)Deletes the rows added to the table. (d) Corporate Digit Library
(c)Commits the current transaction and starts a new (3)Open Source electronic Commerce comes under
Transaction (a) Licensing Model (b) Business Model
(d)Rolls back all the insertions of rows made during (c) Data Exchange Model (d) none of these
the current transaction
(4)Business to Business electronic Commerce comes
Under
(a)Licensing Model (b) Business Model
(c)Data Exchange Model (d) none of these
(5)

Вам также может понравиться