1. Which of the following is a computer code ?
A) UPS
B) IEEE
C) ASCII
d) HTTP
Answer: C) ASCII
2. What is FTP ?
A) File Translation Process
B) File Transfer Process
C) Folder Transfer Protocol
D) File Transfer Protocol
Answer: D) File Transfer Protocol
3) A computer can store data on all of the following devices except
A) Keyboard B) Floppy disk C) Hdd d) Cd-RW
Answer: A) Keyboard
4) Authentication of any electronic record by means of an electronic procedure is called
Answer: B) digital signature
5) A markup language used for creating web pages and web applications
A) COBOl
B) HTML
C) Pl/1
D) HTTP
Answer: B) HTML
6) 86. Choose the output device.
A) Sensors
B) microphone
C) Scanner
D) monitor
Answer: D) monitor
87. An attack that tricks people into providing sensitive information
A) Ransomware
B) Adware
C) Phishing
D) dOS attack
Answer: C) Phishing
8. A ________ is a network security system that uses rules to control incoming and
outgoing network traffic.
A) Key logger
B) Telnet
C) Spyware
D) Firewall
Answer: D) Firewall
9. Section 66A of Information Technology Act, 2000 is concerned with
A) Preventing posting of harmful and offensive information
B) Preventing unauthorised access of computer resources
C) Controlling domain name service
D) Controlling internet service providers
Answer: A) Preventing posting of harmful and offensive information
10. Which of the following is a Cyber Crime ?
A) Testing
B) Ethical hacking
C) Child grooming
D) debugging
Answer: C) Child grooming