Author name: Prasanna

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

HTML Basics Class 10 MCQ Questions with Answers

Question 1.

HTML is what type of language?

(A) Scripting Language
(B) Markup Language
(C) Programming Language
(D) Network Protocol
Answer:
(B) Markup Language

Explanation:
HTML is a markup language 1 used to build web pages and web applications.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 2.

Apart from <b> tag, what other tag makes text bold?

(A) <fat>
(B) <strong>
(C) <black>
(D) <emp>
Answer:
(B) <strong>

Explanation:
The HTML <strong> tag gives text a strong emphasis which traditionally means that the text is displayed as bold by the browser. This tag is also commonly referred to as the <strong> element.

Question 3.

How is a tag enclosed?

(A) ()
(B) <>
(C) []
(D) {>
Answer:
(B) <>

Explanation:
A tag is an HTML code that defines every structure on an HTML page. They also define the placement of text, images, links in an HTML document. HTML tags begins with “less-than” symbol (<) and end with “greater-than” symbol (>). These symbols are also called angular brackets. A start tag marks the beginning of a tag and its syntax is: <TAGNAME>. An end tag marks the end of a tag and its syntax is: </i’AGNAME>.

Question 4.

We can view the source code of html document in:

(A) Notepad
(B) PowerPoint
(C) Excel
(D) Paint
Answer:
(A) Notepad

Explanation:
Text editors are used by the users who have complete knowledge of HTML. The source code to create a web page are to be written in text editors. The two most commonly used text editors are Notepad and WordPad.

Question 5.

The value of #EFFFFFis .

(A) Green
(B) Black
(C) White
(D) Yeiiow
Answer:
(C) White

Explanation:
The RGB code for black is #000000 The RGB code for green is #008000 1 The RGB code for yellow is #FFFF0O

Question 6.

Which attribute does not come in <HR> tag?

(A) Size
(B) Color
(C) Width
(D) Length
Answer:
(D) Length

Explanation:
The short form of Horizontal Rule tag is <HR> tag. It draws a horizontal line through the part of the page to divide the page into two sections. The <HR> tag is an empty tag that creates a shaded horizontal rule (line) between text.

Question 7.

To display (x+y)2, correct HTML code is

(A) <SUB> (X+Y)2</SUB>
(B) X+Y < SUP> 2 </SUP >
(C) (X+Y) <SUP> 2 </SUP>
(D) <SUP> (X+Y)2</SUP>
Answer:
(C) (X+Y) <SUP> 2 </SUP>

Explanation:
The <SUP> tag is used to display the text as superscript. The superscript text will appear half a character height above the other characters.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 8.

The………….. tag is used to display the text as subscript.

(A) <ins>
(B) <SUB>
(C) <em>
(D)<strong>
Answer:
(B) <SUB>

Explanation:
The subscript text will appear half a character height beneath the other characters.

Question 9.

……………. defines the largest heading.

(A) <H1>
(B) <H2>
(C) <H3>
(D) <H4>
Answer:
(A) <H1>

Explanation:
<H1> is the largest heading and <H6> is the smallest heading.

Question 10.

BACKGROUND is an attribute of:

(A) <BODY> tag
(B) <FONT> tag
(C) <IMG> tag
(D) <A> tag
Answer:
(A) <BODY> tag

Explanation:
The <body> element contains the entire content of a web page. This tag is also commonly referred to as the <body> element. It must be the second element inside of the parent <html> element, following only the <head> element.

Question 11.

Which of the following is not a browser?

(A) Microsoft Bing
(B) Netscape Navigator
(C) Mozilla Firefox
(D) Opera
Answer:
(A) Microsoft Bing

Explanation:
Microsoft Bing is a web search engine owned and operated by Microsoft. The service has its origins in Microsoft’s previous search engines: MSN Search, Windows Live ‘ Search and later Live Search.

Question 12.

The tag contains the title of the document.

(A) HTML
(B) HEAD
(C) BODY
(D) < TITLE >
Answer:
(D) < TITLE >

Question 13.

The value of #0000FF is:

(A) Blue
(B) White
(C) Red
(D) none of the above
Answer:
(A) Blue

Explanation:
The RGB color code of white is #FFFFFF The RGB color code of red is

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): The source code to create a web page are to be written in text editors.
Reason(R): Text editors are used by the users who have complete knowledge of HTML.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
In the text editors, the user who had the complete knowledge of HTML code used them. The two most commonly used text editors are Notepad and WordPad.

Question 2.

Assertion(A): The <!DOCTYPE> declaration is not an HTML tag.
Reason(R): The <!DOCTYPE> is an instruction to the web browser about what version of HTML the page is written in.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
The <!DOCTYPE> dedarationmustbethevery first thing in your HTML document, before the <html> tag. It must be present at the top of the document and should be written as follows: c.’DOCTYPE htmi>

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 3.

Assertion(A): With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form.
Reason(R): You can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
HTML is used to design and create a web page. It is used as a scripting language. Besides HTML, there are other languages also like Java, PHP .NET, etc. using which websites can be created. With the commands or tags available in HTML you can add spreadsheets, video clips, sound clips, presentations and other applications directly in the web page.

Question 4.

Assertion(A): HTML is a platform independent language.
Reason(R): As the same HTML program works on any operating system without any modification.

Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
In computing, cross-platform software is a computer software that is implemented on multiple computing platforms.

Question 5.

Assertion(A): In HTML, the tag <HTML>is same as <html>.
Reason(R): HTML is not a case sensitive language

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Case sensitive means both uppercase and lowercase letters are treated as same. Thus, in HTML, tag and attributes are not case-sensitive.

Question 6.

Assertion(A): Attributes provides additional information about HTML elements used to create a web page.
Reason(R): Attributes are always mentioned in the end tag.

Answer:
(C) A is true and R is false

Explanation:
Attributes gives some additional information about the tag. All HTML elements can have their own attributes. Attributes are always mentioned in the start tag.

Case-Based MCQs

Attempt any ? sub-parts from each question. Each sub-part carries 1 mark.
I. HTML can be used to insert images in the following formats: GIF (Graphics Interchange Format) XBM (X Bitmap) JPG or JPEG (Joint Photographic Experts Group) PNG (Portable Network Graphics) The <IMG> tag is used to insert an image in a web page. It is very important to know that images are not technical part of the web page file, they are separate files which are inserted into the web page, when it is viewed by a browser.
So, a simple web page with one image is actually two files. When an HTML file is displayed in a browser, it requests the image file and places it on the web page where the tag appears.

Question 1.

Web browsers display images in the following format

(A) XBM
(B) JPEG
(C) GIF
(D) All of these
Answer:
(D) All of these

Explanation:
HTML supports various formats of the images, like Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG), etc. GIF is limited to an 8-bit palette or 256 colors. This makes the GIF format suitable for storing graphics with relatively few colors such as simple diagrams, shapes, logos and cartoon style images whereas JPEG is the best format for photographers. It contains million colors.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 2.

Which tag is used to insert an image in web page?

(A) <A>
(B) <TABLE>
(C) <IMG>
(D) <P>
Answer:
(C) <IMG>

Explanation:
Images can enhance the appearance and the design of a web page. In HTML, the <IMG> tag is used to define images. The <IMG> tag at a minimum, takes two attributes, ALT and SRC.

Question 3.

The correct HTML code for inserting an image is :

(A) <IMG href=”image.gif”>
(B) <IMG> image.gif</gif>
(C) < IMG src = “image.gif “>
(D) cIMAGE src = “image.gif”>
Answer:
(C) < IMG src = “image.gif “>

Explanation:
The syntax of inserting an image in a web page is: <IMG SRC=”URL”> The URL points to the location where the image is stored. The browser puts the image where the image tag occurs in the document.

Question 4.

src attribute used with <IMG> tag stands for :

(A) screen
(B) screen resolution count
(C) source
(D) structure
Answer:
(C) source

Explanation:
The SRC attribute is used to specify the URL of the image. The SRC attribute is mandatory to insert an image.

Question 5

attribute is used to specify the location of an image file.

(A) alt
(B) src
(C) align
(D) name
Answer:
(B) src

Explanation:
The SRC attribute is used to give te URL of an image. It is compulsory to use this attribute to insert an image.

Question 6.

The alternate text of an image can be displayed by using the <IMG> tag.

(A) src
(B) alt
(C) align
(D) None of these
Answer:
(B) alt

Explanation:
The Alt attribute contains the alternate text for an image. It appears on the web page if image does not appear on the web page due to some reason.
Syntax: <IMG SRC=”URL” ALT=”Text” >

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 7.

alt attribute allows

(A) addition of an alternate hyperlink
(B) addition of a border to image
(C) use of an alternate image in place of the specified image
(D) addition of alternate text about an image Answer:Option (D) is correct.

Explanation:
The text in the ALT attribute appears whenever the image is not shown by the browser for some reason.

II. HTML Structure
HTML document is a combination of various tags, which define the structure and appearance of the web page. Following four basic elements are always present in every HTML document:

The <HTML> tag tells the browser that this is an HTML document. You must begin your html files with this tag and must end your HTML file with matching closing tag.

The <HEAD > tag is used for text and tags that do not appear directly on the web page. It acts as a header of file and contains some information like setting the title of the web page.

The < TITLE > tag contains the document title. This tag lies between <HEAD> and </HEAD > tags. The title specified inside this tag appears on the browser’s title bar.

The <BODY> tag is used for text and tags that appears directly on the web page. It helps us to create a look and feel of the web page. It holds all your content words, pictures and other stuff.

Question 1.

An example of HTML editor is :

(A) Notepad
(B) Dreamweaver
(C) Microsoft frontpage
(D) All of these
Answer:
(D) All of these

Explanation:
Both Dreamweaver and Microsoft Frontpage areWYSIWYG editors. Notepad is a text editor.

Question 2.

The meaning of M in HTML is :

(A) Management
(B) Markup
(C) Modified
(D) Machine
Answer:
(B) Markup

Explanation:
HTML is a HyperText Markup Language which is the most widely used language to create web pages of a website.

Question 3.

Which of the following is the correct code of HTML page?

(A) <HTML>
(B) <HTML>
<HEAD> <TITLE> Hello
</HEADS >
</HTML>
(C) <HTML>
<BODY> Hello
</HTML>
(D) <HTML>
<HEAD> Hello <BODYs </HTMLs
Answer:
(B) <HTML>
<HEAD> <TITLE> Hello
</HEADS >
</HTML>

Explanation:
The structure of a HTML page is: <HTML>
<HEAD>
< title > Document header </title>
</HEAD>
<BODY>
Contents
</body>
</html>

Question 4.

Tags and text that do not display directly on the web page are placed in :

(A) BODY
(B) TABLE
(C) HEAD
(D) TITLE
Answer:
(C) HEAD

Explanation:
The <HEAD> tag defines the document header. It contains the information about a document’s title and style descriptions. It is written inside HTML tag. Syntax: <HEAD>…………</HEAD>

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 5.

A web page normally consists of:

(A) head and body
(B) top and bottom
(C) body and font
(D) body and title
Answer:
(A) head and body

Explanation:
An HTML document contains two distinct parts, the head section and the body section. The head section contains information about the document that is not displayed on the screen. The body section contains the elements that are to be displayed on the web page. Every HTML document should start by declaring that it is an HTML document.

Question 6.

Where do you place the < TITLE > tag in a HTML?

(A) BODY
(B) HEAD
(C) TITLE
(D) FONT
Answer:
(B) HEAD

Explanation:
The <TITLE> tag contains the title of the document. The title is displayed in the title bar at the top of the web browser. The title must be contained in the head section. Syntax: < TITLE > </title>

Question 7.

Which section is used for text and tags that are shown directly on your web pages?

(A) Meta
(B) Head
(C) Body
(D) Table
Answer:
(C) Body

Explanation:
The <body> element contains the entire content of a web page. This tag is also commonly referred to as the <body> element. It must be the second element inside of the parent <html> element, following only the <head> element. Syntax: <body> </body>

III. HTML AND ITS CAPABILITIES
HTML is the most widely used language to create web pages of a website. With CSS and JavaScript, it forms a pillar of web technologies for the World Wide Web. With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form. You can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.
HTML is an ideal software used to design and create a web page. It is used as a scripting language. Besides HTML, there are other languages also like Java, PHE .NET, etc. using which websites can be created. With the commands or tags available in HTML you can add spreadsheets, video clips, sound clips, presentations and other applications directly in the web page. HTML is a platform independent language. It is not a case sensitive language.

Question 1.

The full for of HTML is………….

(A) Hyper Text Markup Language
(B) Hyper Text Makeup Language
(C) Higher Text Markup Language
(D) Hyper Text mashup Language
Answer:
(A) Hyper Text Markup Language

Explanation:
HTML is a format that tells a computer how to display a web page. The documents themselves are plain text files with special “tags” or codes that a web browser uses to interpret and display information on your , computer screen .

Question 2.

The full form of CSS is ………..

(A) Categorised Style Sheet
(B) Console Style Sheet
(C) Cascading Style Sheet
(D) Cascading Settle Sheet
Answer:
(C) Cascading Style Sheet

Explanation:
CSS stands for Cascading Style Sheets.CSS describes how HTML elements are to be displayed on screen, paper, or in other media.CSS saves a lot of work. It can control the layout of multiple web pages all at once. External stylesheets are stored in CSS files.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 3.

Which of the following statement is/are TRUE?

(A) HTML is an ideal software used to design and create a web page.
(B) HTML is used as a scripting language.
(C) HTML forms a pillar of web technologies for the World Wide Web.
(D) All of these
Answer:
(D) All of these

Explanation:
HTML was invented in November 1990 by a scientist called Tim Berners Lee. The purpose was to make it easier for scientists at different universities to gain access to each

Question 4.

HTML program works on any operating system without any modification which means it is a language.

(A) Platform independent
(B) Platform dependent
(C) Case-sensitive
(D) None of these
Answer:
(A) Platform independent

Explanation:
HTML is a platform independent language as it can be operated on various operating systems.

Question 5.

The tag <HTML>is same as <html> which means HTML is a……language.

(A) Case sensitive
(B) Not a case sensitive language
(C) Platform dependent
(D) Platform independent
Answer:
(B) Not a case sensitive language

Explanation:
HTML is not a case-sensitive language as uppercase and lowercase letters are treated as same.

Question 6.

Which of the following is not a scripting language?

(A) PHP
(B) Java
(C) NET
(D) MS Office
Answer:
(D) MS Office

Explanation:
Microsoft Office, or simply Office, is a family of client-server software, and services developed by Microsoft. Initially a marketing term for an office suite (bundled set of productivity applications), the first version of Office contained Microsoft Word, Microsoft Excel, and Microsoft PowerPoint.

Question 7.

Which of the following function a user can perform using HTML?

(A) With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form.
(B) You can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.
(C) With the commands or tags available in HTML you can add spreadsheets, video clips, sound clips, presentations and other applications directly in the web page.
(D) All of these
Answer:
(D) All of these

Explanation:
With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form, you can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.

I. INSERTING IMAGES in HTML
Images can enhance the appearance and the design of a web page. In HTML, the <IMG> tag is used to define images. The <IMG> tag at a minimum, takes two attributes, ALT and SRC. <IMG> tag is empty tag. The attribute which specifies the URL (web address) of the image is SRC. The ALT attribute furnishes an alternate text for an image, if the user for some reason cannot view it (because of slow connection, or if the user uses a screen reader, an error in the SRC attribute). It supports various formats of the images, like GIF, JPEG, etc. GIF is limited to an 8-bit palette or 256 colors.
This makes the GIF format suitable for storing graphics with relatively few colors such as simple diagrams, shapes, logos and cartoon style images whereas JPEG is the best format for photographers. It contains 1 million colors.

Question 1.

What is the full form of JPEG?

(A) Joint Photographic Experts Group
(B) Zone Photographic Experts Group
(C) Joint Photography Experts Group
(D) Joint Photographic Excel Group
Answer:
(A) Joint Photographic Experts Group

Explanation:
The attribute which is used to enumerate the location where the linked text, phrase or image is going to open is called the target attribute.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 2.

The full form of GIF is……..

(A) Graphics Interchange Formation
(B) Graphical Interchange Format
(C) Graphics Interchange Format
(D) Graphics Interconnected Format
Answer:
(C) Graphics Interchange Format

Explanation:
The Graphics Interchange Format i is a bitmap image formal that was developed bv a team at the online services provider CompuServe led by American computer scientist Stove Wilhite and released on 15 June 1987.

Question 3.

The attributes of <IMG> tag is/are

(A) ALT
(B) SRC
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
Both SRC and ALT are the attributes of <IMG> tag.The SRC attribute is used to specify the URL of the image. The SRC attributeis mandatory to insert an image.The Alt attribute contains the alternate text for an image.

Question 4.

< IMG > is an empty tag which means

(A) It does not have opening tag
(B) It does not have closing tag
(C) It does not support any attribute
(D) None of these
Answer:
(B) It does not have closing tag

Explanation:
An empty tag is a tag which does not hold an end tag which means only starting tag is there in <IMG>. The </IMG> is not required.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 5.

In HTML, the < IMG > tag is used to define

(A) Website
(B) Webpages
(C) Images
(D) None of these
Answer:
(C) Images

Explanation:
In HTML, <IMG> tag is used to insert an image on the webpage. It used the SRC attribute.

Question 6.

Which of the following statements is/are FALSE?

(A) JPEG contains 256 colors.
(B) GIF is limited to an 8-bit palette or 1 millioncolors.
(C) GIF format is best suited for photographers.
(D) All of these
Answer:
(D) All of these

Explanation:
HTML supports various formats of the images, like Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG), etc. GIF is limited to an 8-bit palette or 256 colors.Most graphical web browsers can display both GIF and JPG images inline.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 7.

The ALT attribute is used to………..

(A) Specifies the URL.
(B) Furnish an alternate text for an image.
(C) Form diagrams, shapes, logos and cartoon style images.
(D) None of these
Answer:
(B) Furnish an alternate text for an image.

Explanation:
The <ALT> attribute is used to display text when the iipage is riot loaded by the browser.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics Read More »

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Mobile Technologies Class 10 MCQ Questions with Answers

Question 1.

Which is the world’s most widely used cellphone technology?

(A) GPS
(B) GPRS
(C) GSM
(D) CDMA
Answer:
(C) GSM

Explanation:
The Global System for Mobile Communications is a standard developed by the European Telecommunications Standards Institute to describe the protocols for second- generation digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 2.

CDMA uses ……….waves.

(A) Radio
(B) Micro
(C) Infrared
(D) Electromagnetic
Answer:
(D) Electromagnetic

Explanation:
Code-division multiple access is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communication channel.

Question 3.

Which technology is used to connect subscriber to nearest telephone exchange through using radio link?

(A) CDMA
(B) WLL
(C) GSM
(D) Wi-Fi
Answer:
(B) WLL

Explanation:
Wireless local loop, is the use of a wireless communications link as the “last mile / first mile” connection for delivering plain old telephone service or Internet access to telecommunications customers.

Question 4.

In TDMA, T stands for :

(A) Time
(B) Third
(C) Technology
(D) Triple
Answer:
(A) Time
Explanation:
Time-division multiple access is a channel access method for shared-medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots.

Question 5.

…………… is a mode of sending and receiving short messages from one phone to another.

(A) SMS
(B) MMS
(C) CDMA
(D) GSM
Answer:
(A) SMS

Explanation:
SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean.

Question 6.

Multimedia messaging is also known as………

(A) Color messaging
(B) Picture messaging
(C) Text messaging
(D) None of these
Answer:
(B) Picture messaging

Explanation:
MMS permits mobile subscribers to send multimedia files su ch as images, videos, audios, etc., as a message.

Question 7.

………. refers to the third generation of mobile telephony technology.

(A) 2G
(B) 3G
(C) 4G
(D) 5G
Answer:
(B) 3G

Explanation:
3G is generally used in phones i and handsets as a means to connect the phone ! to the internet in order to make voice and video calls, to download and upload data, and I to surf the Web.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 8.

SMS appeared on the wireless scene in 1991 in

(A) USA
(B) London
(C) Turkey
(D) Europe
Ans.
(D) Europe

Explanation:
An SMS message is sent from a device to a Short Message Service Center (SMSC), which, in turn, communicates with mobile networks to determine the subscriber’s location. Then, the message is forwarded as a small data packet to the destination device. Subsequent messages sent by the original source device undergo the same process, also known as store and forward.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): SMS messages are also sent via web-based browser applications, instant message (IM) applications and Voice over Internet Protocol (VoIP) applications, such as Skype.
Reason(R): SMS works fine with only English language.

Answer:
(C) A is true and R is false

Explanation:
SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean.
Question 2.

Assertion(A): MMS supports attachments just as e-mail does.
Reason(R): MMS is a store-and-forward method of transmitting graphics, video clips, sound files and short text messages over wireless networks via WAP protocol.

Answer:
(D) A is false and R is true

Explanation:
MMS is based on the concept of multimedia messaging. MMS does not support attachments as e-mail does. The important use of MMS is for communication between mobile phones.

Question 3.

Assertion(A): 3G offers higher data speed.
Reason(R): 3G does not support videoconferencing.

Answer:
(C) A is true and R is false
Explanation:
The International Telecommuni-cations Union (ITU) defined the third genera-tion (3G) of mobile telephony standards IMT- 2000 to facilitate growth, increase bandwidth, and support more diverse applications.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 4.

Assertion(A): 4G is a mobile multimedia, available anytime anywhere.
Reason(R): 4G is easier to standardize and it offers affordability.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
4G wireless technology is also referred to by “MAGIC” which stands for Mobile multimedia, Any-where, Global mobility solutions over, Integrated wireless and Customized services.

Question 5.

Assertion(A): The cost of upgrading to 3G device is expensive.
Reason(R): It requires closer base stations that is very expensive.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
3G refers to the third generation of cellular technology that enables mobile telephony. The third-generation standard follows two earlier generations that were deployed on mobile networks and across mobile phones.

Question 6.

Assertion(A): Class 0 SMS is displayed on the mobile screen without being saved in the message store or on the SIM card.
Reason(R): As Class SMS disappears after reading it.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Class 0 SMS (Short Message Service) text messages aren’t stored in the memory of the message recipient’s cell phone. Unless saved upon review by the message ? recipient, Class 0 SMS text messages disappear after being read. Class 0 messages can also be used to “ping” another cell phone. They can receive confirmation of a recipient’s messaging capabilities without the recipient even knowing they were pinged. While Class 0 messages can be abused, they can also be an effective troubleshooting tool for SMS communication

Case- Based MCQs

Attempt any four sub-parts from each question. Each sub-part carries 1 mark.
I. Mobile Technology
Mobile technology is a technology where the user uses mobile phone to do the operations related to communication system, for example to establish communication with friends, relatives and others. It uses to transmit the data from one system to others. Mobile Technology consists of portable two-way communications systems, computing devices, and the related networking equipment. Mobile technology is a technology which is used primarily in cellular communication system and other related aspects. It uses a network type in which several transmitters are able to send data on a single channel at the same time. This model is known as Code-Divisions Multiple Accesses (CDMA). This platform allows many users to use single frequencies, as it limits the possibility of frequency interference from two or more sources.

Over the years, the channel has grown. Mobile technology is evolving rapidly; its applications are becoming increasingly diverse over the years and are gradually replacing some similar sources on the market that are also used for communication, e.g. post office and land lines. Mobile technology has improved from a basic phone call and texting device into a multi-tasking system used for GPS navigation, internet browsing, gaming, instant messaging, etc. With the rise, professionals argue that computer technology’s future depends on wireless networking and mobile computing. Mobile technology is becoming more and more popular through tablets and portable computers. Mobile Technology is characterized as any device with internet capabilities that can be accessed from wherever the user is. Current devices in this class contain devices like smartphones, tablets, some iPods and laptops, although this list will certainly increase in the coming years.

Following are the key mobile technologies,
1. SMS: “SMS” means Short Message Service. It is now a days the oldest and most commonly used text messaging service. SMS was initially designed for phones using GSM (Global System for Mobile Communications) communication, but it is now supported by all major cellular phone systems.

2. MMS: MMS messaging known as Multimedia Messaging Service is a standard way to deliver multimedia content-including messages. In comparison to SMS, MMS can offer a variety of media including up to 40 seconds of video, one picture, a multi-image slideshow, or audio.

3. 3G: Number three in 3G’s name means third generation access technology which allows mobile phones to be connected to the internet. Every new technology has new frequency bands and higher rates of data transmission.

4. 4G: 4G is the fourth generation of mobile networking technology. It carries on from mobile technology of 3G and 2G. Compared with 3G, the 4G networks are very good. Premium 4G provides download speeds of about 14 Mbps, which is almost five times faster than that provided by its predecessor, the 3G network. Currently, 4G networks can reach speeds as high as 150 Mbps, enabling users to download gigabytes of data in minutes or even seconds, rather than hours like with 3G networks.

Question 1.

In which one of the following codes with specific characteristics can be applied to the transmission?

(A) CDMA
(B) GPRS
(C) GSM
(D) All of the above
Answer:
(A) CDMA

Explanation:
Code Division Multiple Access (CDMA) is a sort of multiplexing that facilitates various signals to occupy a single transmission channel. It optimizes the use of available S bandwidth. The technology is commonly used in ultra-high-frequency (UHF) cellular telephone systems, bands ranging between the 800-MHz and 1.9-GHz.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 2.

Write the full form of CDMA.

(A) Character-Divide Multiple Accesses
(B) Code-Divide Multiple Accesses
(C) Character-Divisions Media Accesses
(D) Code-Divisions Multiple Accesses
Answer:
(D) Code-Divisions Multiple Accesses

Explanation:
Code Divisions Multiple Access system is very different from time and frequency multiplexing. In this system, a user has access to the whole bandwidth for the entire duration. The basic principle is that different CDMA codes are used to distinguish among the different users.

Question 3.

Which of the following offers packet mode data transfer service over the cellular network?

(A) TCP
(B) GPRS
(C) GSM
(D)None of the above
Answer:
(B) GPRS

Explanation:
General Packet Radio System is also known as GPRS is a third-generation step toward internet access. GPRS is also known as GSM-IP that is a Global-System Mobile Communications Internet Protocol as it keeps the users of this system online, allows to make voice calls, and access internet on-the-go. Even Time-Division Multiple Access (TDMA) users benefit from this system as it provides packet radio access.

Question 4.

Which one of the following enables us to use the entire bandwidth simultaneously?

(A) TDMA
(B) CDMA
(C) FDMA
(D) All of the above
Answer:
(B) CDMA

Explanation:
CDMA allows up to 61 concurrent users in a 1.2288 MHz channel by processing each voice packet with two PN codes.

Question 5.

Mobile Computing allows transmission of data from one wireless-enabled device to another

(A) Any device
(B) Wired device
(C) Wireless-enabled device
(D) One of the above
Answer:
(C) Wireless-enabled device

Explanation:
Mobile technology is a form of technology and it is mostly used in cellular communication and other related aspects. It includes SMS, MMS, 3G and 4G. It is a portable electronic device and allows you to share the data from one phone to another.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 6.

Which of the following is supported data rates of 4G Networks?

(A) 1024 kbps
(B) 150 mbps
(C) 200 mbps
(D) None of the above
Answer:
(B) 150 mbps

Explanation;
4G is a mobile multimedia, available anytime anywhere, Global mobility support, integrated wireless solution, and customized personal service network system.

Question 7.

Write the full form of GSM.

(A) Globe System for Mobile Communications
(B) Global System for Media Communications
(C) Global System for Mobile Communications
(D) Global System for Mobile Characteristics Answer:Option (C) is correct.

Explanation:
GSM stands for Global System for Mobile Communications. It is a digital cellular technology used for transmitting mobile voice and data services.

II. First Generation
1G (First Generation) was introduced in 1980 and was based on narrow band analog cellular technology. It used circuit switching and only voice calls were available. It used radio waves for transmission. 1G used CDMA (Code Division Multiple Access). Each user was allocated a unique code sequence. The sender encoded the signal using the given code. The receiver also had the unique code and used it to decode the data. 2G (Second Generation) was introduced in 1990s and was based on GSM technology. It is used circuit switching but provided paging, SMS, voicemail and fax services. GSM (Global System for Mobile communications) is a combination of FDMA and TDMA. SIM (Subscriber Identification Module) cards are interchangeable modules which store subscriber and wireless provider information.

Question 1.

1G was introduced in………

(A) 1979
(B) 1980
(C) 1981
(D) 1982
Answer:
(B) 1980

Explanation:
Launched by Nippon Telegraph and Telephone in 1980,1G was first introduced to the citizens of Tokyo. By 1984, the first generational network covered all of Japan, making it the first country to have 1G service nationwide.

Question 2.

First Generation technology was based on narrow band technology.

(A) Cellular
(B) Digital
(C) Global
(D) None
Answer:
(A) Cellular

Explanation:
Wireless networks based on analog frequency division multiple access technologies. Many systems were individually tailored, country-specific solutions, including technologies such as AMPS, Nordic Mobile Telephone (NMT) and total access communications system (TACS).

Question 3.

1G technology uses for transmission.

(A) Wires
(B) Plugs
(C) Radio waves
(D) Optical fiber
Answer:
(C) Radio waves

Explanation:
Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic spectrum longer than infrared light. Radio waves have frequencies as high as 300 gigahertz (GHz) to as low as 30 hertz (Hz).

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 4.

In CDMA, C stands for………

(A) Cost
(B) Count
(C) Code
(D) Coast
Answer:
(C) Code

Explanation:
Code Division Multiple Access (CDMA) is an alternative cell phone technology to GSM. CDMA uses a “broad -spectrum” electromagnetic waves for signaling with wider bandwidth. This allows multiple people on multiple cell phones to be “communicated” over the same channel to share a bandwidth of frequencies.

Question 5.

Second Generation was based on……….

(A) GSM technology
(B) SIM technology
(C) Both (A) and (B)
(D) None of these
Answer:
(A) GSM technology

Explanation:
Global System for Mobile communications (GSM) is world’s most widely used cell phone technology having 80% mobile phone users. It is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks for mobile phones.

Question 6.

…………..is a combination of FDMA and TDMA.

(A) 1G
(B) 2G
(C) GSM
(D) SIM
Answer:
(C) GSM

Explanation:
The Global System for Mobile Communications is a standard developed by the European Telecommunications Standards Institute to describe the protocols for second generation digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991.

Question 7.

……………. are interchangeable m odules which store subscriber……..and wireless provider information.

(A) 1G
(B) 2G
(C) GSM
(D) SIM
Answer:
(D) SIM

Explanation:
SIM (Subscriber Identification Module) are inter- changeable modules which store subscriber and wireless provider information.

III. 3G and 4G
3G is the third generation of Wireless & Mobile technologies. The “G” in 3G stands for generation. 3G networks reach 2mbps. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the internet. 3G allows connection with other IP networks in order to make voice and video calls, to download and upload data and to surf the net. 4G is fourth-generation of wireless service, which refers to the next wave of high-speed mobile technologies that will be used to replace current 3G networks. 4G wireless network is next step of 3G, which is currently the most widespread, high-speed wireless service.

Question 1.

………….. is the Wireless & Mobile technologies.

(A) 1G
(B) 2G
(C) 3G
(D) 4G
Answer:
(C) 3G

Explanation:
3G is the third generation of Wireless & Mobile technologies. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 2.

………. refers to the next wave of high speed mobile technologies of 3G.

(A) 3G
(B) 4G
(C) Both (A) arid (B)
(D) None of these
Answer:
(B) 4G

Explanation:
4G is the fourth generation of mobile networking technology. It carries on from mobile technology of 3G and 2G. Compared with 3G, the 4G networks are very good. Premium 4G provides download speeds of about 14 Mbps, which is almost five times faster than that provided by its predecessor, the 3G network.

Question 3.

3G is mostly used with mobile phones and handsets as a means to connect the phone to the

(A) Wireless
(B) Internet
(C) Other Mobiles
(D) Network
Answer:
(B) Internet

Explanation:
Number three in 3 G’s name means third generation access technology which allows mobile phones to be connected to the internet. Every new technology has new frequency bands and higher rates of data transmission.

Question 4.

The “G” in 3G stands for ………

(A) Generation
(B) Genres
(C) Genetic
(D) Generator
Answer:
(A) Generation

Explanation:
It allows mobile operators to offer more service options to their users, including mobile broadband. 3G broadband offers greater flexibility and services by making more efficient use of mobile bandwidth. It is also known as IMT-2000.

Question 5.

3G allows connection with other IP networks in order to make .

(A) Voice
(B) Video calls
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
3G networks succeed 2G ones, offering faster data transfer rates and are ? the first to enable video calls. This makes , them especially suitable for use in modern ; smart phones, which require constant high- % speed internet connection for many of their if applications.

Question 6.

3G allows connection with other networks.

(A) IP
(B) MAC
(C) TCP
(D) HTTP
Answer:
(A) IP

Explanation:
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 7.

3G networks reach ……….

(A) 2Mbps
(B) 4Mbps
(C) 6Mbps
(D) 8Mbps
Answer:
(A) 2Mbps

Explanation:
3G is the third generation of wireless mobile telecommunications ‘ technology. It is the upgrade for 2.5G GPRS ’ and 2.75G EDGE networks, for faster data transfer.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies Read More »

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Internet and Web Services Class 10 MCQ Questions with Answers

Question 1.

A website used to provide online information and services to the citizens is an example of :

(A) e-Business
(B) e-Mail
(C) e-Governance
(D) e-Learning
Answer:
(C) e-Governance

Explanation:
Electronic governance or e-governance is the application of Information and Communication Technology (ICT) for delivering government services, exchange of information, communication Transactions, integration of various stand-alone systems and services between government-to-customer (G2C), government-to-business (G2B), government-to-government (G2G) as well as back office processes and interactions within the entire government framework.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 2.

The website of an electricity supply company which allows its customers to pay bills online is an example of:

(A) e-Business
(B) e-Mail
(C) e-Governance
(D) e-Learning
Answer:
(A) e-Business

Explanation:
Through online marketing (e-business), they can reach to many customers of far away places in a cost effective manner. Also, there is no need to incur huge cost of j setting up a shop/store to sell items.

Question 3.

The website of a school which allows the students to go through various lessons in their subjects is an example of:

(A) e-Business
(B) e-Mail
(C) e-Governance
(D)e-Learning
Answer:
(D)e-Learning

Explanation:
e-learning is used to describe a means of learning through technology such as a network, browser, CD-ROM or DVD multimedia platforms. e-Learning enables persons to learn at their own place.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 4.

Web address of national portal of India is :

(A) India.gov.in
(B) GOI.gov.in
(C) ncert.nic.in
(D) None of the above
Answer:
(A) India.gov.in

Explanation:

e-Governance involves applications which are used by government agencies/ organisations to provide better governance, http://india.gov.in is the national portal of India. A number of services have been launched by the government of India under the Digital India initiative to transform India into a digitally empowered society.

Question 5.

An email address is made up of:

(A) Four parts
(B) Two parts
(C) Single part
(D) Three parts
Answer:
(B) Two parts

Explanation:
The two main parts of an email address are: (i) Username (ii) Domain name of host server

Question 6.

e-Mails are stored in this folder before they are sent.

(A) Inbox
(B) Sent
(C) Outbox
(D) Message box
Answer:
(C) Outbox

Explanation:
Before the message is sent to the receiver, it is stored in the Outbox.

Question 7.

Which one of the following is an e-shopping website?

(A) Flipkart
(B) Amazon
(C) Snapdeal
(D) All of the above
Answer:
(D) All of the above

Explanation:
>e-Shopping is the action or activity of buying goods or services over the internet.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 8.

The full from of Bcc is ……….

(A) Broad Carbon Copy
(B) Blink Carbon Copy
(C) Blind Carbon Copy
(D) Best Carbon Copy
Answer:
(C) Blind Carbon Copy

Explanation:
Blind carbon copy enables you to send copy of e-mail but in this case, Bcc recipients are not visible to anyone.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): People may use the ATM cards for withdrawing the cash amount from their accounts.
Reason(R): People can also transfer money online from one bank to another bank.

(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Advanced transactional e-banking/ websites that allow bank customers to electronically transfer funds to/from their accounts, pay bills, and conduct other banking transaction online. An Automated Teller Machine (ATM) is an electronic banking outlet that allows customers to complete basic transactions without the aid of a branch representative or teller. Anyone with a credit card or debit card can access cash at most ATMs.

Question 2.

Assertion(A): E-learning refers to the use of the network and communication technology in teaching and learning. The letter “e” in e-learning stands for the word electronic. You can use the information from the internet in your work.
Reason(R): It is not easy for students to access the study material any time and at any place.

Answer:
(C) A is true and R is false

Explanation:
E-learning or “electronic learning” describes education using electronic devices and digital media. It increases your knowledge and skills. E-learning has now been used by various companies, organisations and schools to educate and upgrade the abilities of their employees and students. The term E-learning is used also in further and higher education to describe the use of the web and other Internet technologies to enhance the teaching and learning experience.

Question 3.

Assertion(A): E-banking saves time of the customer for doing bank transactions.
Reason(R): E-Banking allows you to access your accounts on the Internet from anywhere in the world at any time. It provides secure transaction on the Internet.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
E-Banking stands for Electronic Banking. This is a service which is provided via the banks in which you have an account. To access this service, you need to contact the bank. The bank provides a Username and a Password through which you can login on the e-portal of the bank. The e-portal of the bank provides various services to us, like you can maintain an account, transfer electronic currency, etc. E-Banking is used to access cash through an Automated Teller Machine (ATM) or Direct Deposit of paychecks into checking or savings accounts.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 4.

Assertion(A): One can do videoconferencing anytime anywhere according to his/her convenience unless the device is connected to the internet.
Reason(R): All videoconferences must have these three basic elements, however simple or complex. The conference can always be synthesised into environment, equipment and network.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Video conference is a technology that allows you to do conversation between multiple people among the same or different locations. Videoconferencing can save significant amounts of money in terms of both travel costs and time. It can also open up new methods of communication for example linking several schools together to enhance the learning experience.

Question 5.

Assertion(A): E-commerce saves time as with just a couple of clicks of the mouse, you can purchase your shopping orders and instantly move to other important things, which can save time.
Reason(R): Going through market requires a lot of time and efforts. And, also there is not guarantee whether the things will be best suited or not.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Online shopping or E-shopping is the process that consumers go through to purchase products or services over the Internet.

Question 6.

Assertion(A): E-Reservation is a process of booking tickets online. It is also called E-ticketing.
Reason(R): An E-ticket (electronic ticket) is a paperless electronic document used for ticketing passengers, particularly in the commercial airline industry.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
When a customer books a flight by telephone or using the web, the details of the reservation are stored in a computer. The customer can request that a hardcopy confirmation be sent by postal mail, but it is not needed at the check-in desk. A confirmation number is assigned to the passenger, along with the flight number(s), date(s), departure location(s), and destination location(s). When checking in at the airport, the passenger simply presents positive identification. Then necessary boarding passes are issued, and the passenger can check luggage and proceed through security to the gate area.
Case- Based Mcqs

Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
I. An email is a service of sending or receiving emails or messages in the form of text, audio, video, etc over the internet. Various service providers are providing email services to users. The most popular service providers in India are Gmail, Yahoo, Hotmail, Rediff, etc. An email address for an email account is a unique ID. This email ID is used to send and receive mails over the Internet. Each email address has two primary components: username and domain name. The username comes first, followed by the (@) symbol and then the domain name.

Question 1.

MIME stands for

(A) multipurpose internet mail extensions
(B) multipurpose internet mail email
(C) multipurpose internet mail end
(D) multipurpose internet mail extra
Answer:
(A) multipurpose internet mail extensions

Explanation:
Multipurpose Internet Mail Extensions is an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs.

Question 2.

When sender and receiver of an email are on same system, we need only two

(A) IP
(B) domain
(C) servers
(D) user agents
Answer:
(D) user agents

Explanation:
E-mail is a digital mechanism for exchanging messages through Internet or intranet communication platforms. A user agent is any software that retrieves and presents Web content for end users or is implemented using Web technologies.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 3.

Which of the following is the correct format of email address?

(A) name@website@info
(B) [email protected]
(C) www.nameofwebsite.com
(D) name.website.com
Answer:
(B) [email protected]

Explanation:
Each email address has two primary components: username and domain name. The username comes first, followed by the (@) symbol and then the domain name.

Question 4.

Unsolicited e-mail advertising is known as……….

(A) newsgroup
(B) junk ads
(C) spam
(D) none of the above
Answer:
(C) spam

Explanation:
Spam is an unsolicited mail sent in bulk.

Question 5.

NVT stands for:

(A) network virtual transmission
(B) network virtual test
(C) network virtual terminal
(D) network virtual tell
Answer:
(C) network virtual terminal

Explanation:
A network virtual terminal is a communications concept describing a variety of data terminal equipment (DTE), with different data rates, protocols, codes and formats, accommodated in the same network.

Question 6.

Mail access starts with client when user needs to download e-mail from the……….

(A) mail box
(B) mail server
(C) IP server
(D) internet
Answer:
(A) mail box

Question 7.

Which of the following is not an e-mail service provider?

(A) Yahoo
(B) Hotmail
(C) Rediff
(D) Pinterest
Answer:
(D) Pinterest

Explanation:
Pinterest is an American image sharing and social media service designed to enable saving and discovery of information on the internet using images and, on a smaller scale, animated GIFs and videos, in the form of pinboards.

II. e-GOVERNMENT
Due to the rapid rise of the internet and digitization, Governments all over the world are initiating steps to involve IT in all governmental processes. This is the concept of e-government. This is to ensure that the Govt, administration becomes a swifter and more transparent process. It also helps to saves huge costs.
E-Group is a feature provided by many social network services which helps you create, post, comment to and read from their “own interest” and “niche-specific forums”, often over a virtual network. “Groups” create a smaller network within a larger network and the users of the social network services can create, join, leave and report groups accordingly. “Groups” are maintained by “owners, moderators, or managers”, who can edit posts to “discussion threads” and “regulate member behavior” within the group.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 1.

Privacy law is intended to protect the personal information about:

(A) Individuals in society
(B) computer networks
(C) Employees
(D) students
Answer:
(C) Employees

Explanation:
Privacy law is the body of law that deals with the regulation, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or private organisations, or other individuals.

Question 2.

Which of the following has E-groups?

(A) Instagram
(B) Twitter
(C) Yahoo
(D) WhatsApp
Answer:
(C) Yahoo

Explanation:
e-groups is a free email group service that allows us to easily create and join email groups, e-mail groups offer a convenient way to connect with others who share the same interests and ideas.

Question 3.

Whenever a new comment is posted, users of the e-group receive notification that there is a new contribution to the discussion.

(A) SMS
(B) E-mail
(C) WhatsApp
(D) Call
Answer:
(B) E-mail

Explanation:
Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people.

Question 4.

e-Government:

(A) can be defined as the “application of e-commerce technologies to government and public services.”
(B) is the same as internet governance.
(C) can be defined as “increasing the participation in internet use by socially excluded groups”.
(D) none of the above.
Answer:
(A) can be defined as the “application of e-commerce technologies to government and public services.”

Explanation:
This is to ensure that the Govt, administration becomes a swifter and more transparent process. It also helps to save huge costs.

Question 5.

What does TAN stand for?

(A) Tax Deduction Account Number
(B) Tax Deduction and Collection Account Number
(C) Taxable Account Number
(D) Tax Account Number
Answer:
(B) Tax Deduction and Collection Account Number

Explanation:
Tax Deduction Account Number or Tax Collection Account Number is a 10-digit alpha- numeric number issued by the Income- tax Department (we will refer to it as TAN). TAN is to be obtained by all persons who are responsible for deducting tax at source (TDS) or who are required to collect tax at source (TCS).

Question 6.

An e-group is a collection of users.

(A) who conduct seminars
(B) who get together on weekends
(C) who have regular video conferences
(D) having the ability to access and contribute to forum topics
Answer:
(D) having the ability to access and contribute to forum topics

Explanation:
E-group refers to an online environment where users sharing common views and ideas can come together to meet and discuss topics of interest.

Question 7.

e-Group is a feature provided by many social network services which helps you create, post, comment to and read from their “own interest” and “niche-specific forums”, often over a………..

(A) Virtual Network
(B) Public Network
(C) Common Network
(D) Private Network
Answer:
(A) Virtual Network

Explanation:
A virtual network is a network where all devices, servers, virtual machines, and data centers that are connected are done so through software and wireless technology. This allows the reach of the network to be expanded as far as it needs to for peak efficiency, in addition to numerous other benefits.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

III. e-BUSINESS
e-business, commonly known as electronic or online business is a business where an online transaction takes place. In this transaction process, the buyer and the seller do not engage personally, but the sale happens through the internet. In 1996, Intel’s marketing and internet team coined the term “E-business
e-Commerce stands for electronic commerce and is a process through which an individual can buy, sell, deal, order and pay for the products and services over the internet. In this kind of transaction, the seller does not have to face the buyer to communicate. Few examples of e-commerce are online shopping, online ticket booking, online banking, social networking, etc.

Question 1.

Which of the following describes e-commerce?

(A) doing business
(B) sale of goods
(C) doing business electronically
(D) all of the above
Answer:
(C) doing business electronically

Explanation:

e-Commerce means buying and selling products online. People find it convenient to compare different products and buy them from the comforts of their home.

Question 2.

Which of the following is not considered to be one of the three phrases of e-commerce?

(A) innovation
(B) consolidation
(C) preservation
(D) reinvention
Answer:
(C) preservation

Explanation:
Preservation is not considered to be one of the three phases of e-commerce. The act of keeping something the same or of preventing it from being damaged is basically preservation.

Question 3.

Which segment do eBay and Amazon belong to?

(A) B2B
(B) B2C
(C) C2B
(D) C2C
Answer:
(B) B2C

Explanation:
Electronic commerce or e-commerce consists primarily of the distributing, buying, selling, marketing, and servicing of products or services over electronic systems such as the Internet and other computer networks. Amazon.com launched its online shopping site in 1996 and eBay was introduced in 1995.

Question 4.

Which of the following is not a key element of a business model?

(A) value proposition
(B) competitive advantage
(C) market strategy
(D) universal standards
Answer:
(B) competitive advantage

Explanation:
The key elements of a business model are: Key partners Key activities Value proposition Customer relationship Customer segment Key resource Distribution channel Cost structure Revenue stream

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 5.

The primary source of financing during the early years of e-commerce was

(A) bank loans
(B) large retail films
(C) venture capital funds
(D) initial public offerings
Answer:
(C) venture capital funds

Explanation:
Venture capital is a form of private equity financing that is provided by venture capital firms or funds to startups, early-stage, and emerging companies that have been deemed to have high growth potential or which have demonstrated high growth.

Question 6.

Which of the following is not a major type of e-commerce?

(A) C2B
(B) B2C
(C) B2B
(D) C2C
Answer:
Option (A) is correct.

Explanation:
Consumer-to-business is a business model in which consumers create value and businesses consume that value. For example, when a consumer writes reviews or when a consumer gives a useful idea for new product development then that consumer is creating value for the business if the business adopts the input.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 7.

The best products to sell in B2C e-commerce are:

(A) small products
(B) digital products
(C) speciality products
(D) fresh products
Answer:
(D) fresh products

Explanation:
Direct-to-consumer or business- to-consumer refers to selling products directly to customers, bypassing any third-party retailers, wholesalers, or any other middlemen

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services Read More »

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Internet Protocols Class 10 MCQ Questions with Answers

Question 1.

Protocols are set of rules to govern………

(A) Communication
(B) Standard
(C) Metropolitan communication
(D) Bandwidth
Answer:
(A) Communication

Explanation:
Information that travels over the internet does so via a variety of languages known as protocols.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 2.

Which protocol is commonly used to retrieve email from a mail server?

(A) FTP
(B) IMAP
(C) HTML
(D) TELNET
Answer:
(B) IMAP

Explanation:
In computing, the Internet Message Access Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/TP connection.

Question 3.

A user can get files from another computer on the Internet by using:

(A) HTTP
(B) TELNET
(C) UTP
(D) FTP
Answer:
(D) FTP

Explanation:
The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server.

Question 4.

TCP is a commonly used protocol at:

(A) Application layer
(B) Transport layer
(C) Network layer
(D) Data Link layer
Answer:
(B) Transport layer

Explanation:
TCP stands for Transmission Control Protocol. It is a connection-oriented protocol that means it establishes the connection prior to the communication that occurs between the computing devices in a network. This protocol is used with an IP protocol, so together, they are referred to as a TCP/IP

Question 5.

Which part of TCP/IP is responsible for dividing a file or message into very small parts, at the source computer?

(A) TCP
(B) IP
(C) Both (A) and (B)
(D) None of these
Answer:
(A) TCP

Explanation:
TCP defines how the data is channelled into the network. Its responsibility is to specify how the data is assembled into smaller packets before being transmitted into the network. It ensures the data is assembled in the right order at the end point.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 6.

In Internet Protocol (IP), data is organised in the form of

(A) bundles
(B) packets
(C) switches
(D) parts
Answer:
(B) packets

Explanation:
The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

Question 7.

A simple protocol used for fetching e-mail from a mailbox is:

(A) POP2
(B) POP3
(C) IMAP
(D) None of the Above
Answer:
(B) POP3

Explanation:
POP3 allows you to download email messages on your local computer and read them even when you are offline. POP3 is designed to delete mail on the server as soon as the user has downloaded it. So, it is thought to be a store-and-forward service.

Question 8.

The process of exchanging data packets is called:

(A) Packet Switching
(B) Packet Sharing
(C) Packet Changing
(D) Packet Snatching
Answer:
(A) Packet Switching

Explanation:
In telecommunications, packet switching is a method of grouping data that is transmitted over a digital network into packets. Packets are made of a header and a payload.

Question 9.

POP3 stands for:

(A) Post Office Packet 3
(B) Post Office Protocol 3
(C) Post Office Period 3
(D) Post Office Point 3
Answer:
(B) Post Office Protocol 3

Explanation:
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 10.

The program for logging into and executing commands on a remote machine is:

(A) SSH
(B) PPP
(C) SMTP
(D) POP3
Answer:
(A) SSH

Explanation:
Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer.

Question 11.

The short form for Telecommunication Network is:

(A) Telenet
(B) TN
(C) TNT
(D) Telnet
Answer:
(D) Telnet

Explanation:
TELNET is a network protocol used on the Internet or LAN connections. The purpose of the TELNET protocol is to provide a fairly general, bi-directional, byte-oriented communications facility. ,

Question 12.

What is the secured version of File Transfer Protocol?

(A) EFTP
(B) SFTP
(C) SMTP
(D)EMTP
Answer:
(B) SFTP

Explanation:
Secure File Transfer Protocol (SFTP) is a network protocol. It is used for accessing, transferring and managing files on remote systems.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): SFTP allows businesses to securely transfer billing data, funds and data recovery files.
Reason(R): SFTP uses SSH to transfer files and requires that the client be authenticated by the server.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Secure File Transfer Protocol (SFTP) is a network protocol. It is used for accessing, transferring and managing files on remote systems. It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol. SFTP can work with many protocols but is most commonly used with SSH to provide secure authentication.

Question 2.

Assertion(A): The name ‘TELNET’ is derived from the words “Telecommunication Network”.
Reason(R): The TELNET program is designed to emulate a single terminal attached to the other computer.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
TELNET is a network protocol used on the Internet or LAN connections. The purpose of the TELNET protocol is to provide a fairly general, bi-directional, byte-oriented communications facility. It is typically used to provide user-oriented command line login sessions between hosts on the Internet.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 3.

Assertion(A): If you do not have a user name and password pair for authentication, you cannot upload/download files.
Reason(R): FTP servers need authentication to download or upload files.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
FTP known in full as, File Transfer Protocol. FTP is a protocol designed for transferring files over the Internet. Files stored on an FTP server can be accessed using an FTP client, such as a web browser, FTP software program, or a command line interface. In case a server has FTP protocol being used, that means that its URL is prefixed with a

Question 4.

Assertion(A): The SCP command can be used to send a file to a server or retrieve a file from a server.
Reason(R): It uses the SSH protocol for authentication. SCP is more secure than FTP which transmits passwords in plain text.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
It provides file transfers between hosts on a network. With SCR you can quickly transfer files between hosts along with basic file attributes such as access permission and timestamps that are not always available via FTP

Question 5.

Assertion(A): The purpose of the TELNET protocol is to provide a fairly general, bi-directional, byte- oriented communications facility.
Reason(R): TELNET clients have been available on most Unix systems for many years and are available for virtually all platforms.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
TELNET is a network protocol used on the Internet or LAN connections. It is typically used to provide user-oriented command line login sessions between hosts on the Internet. The name is derived from the words “Telecommunication Network” since the program is designed to emulate a single terminal attached to the other computer.

Question 6.

Assertion(A): TCP/IP protocol suite is considered as stateless.
Reason(R): Each request is considered as new, as it is unrelated to the previous request. Thus, being stateless it frees up the network paths that can be used continuously.

Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
TCP/IP Is a protocol suite that specifies how the data is exchanged over the internet. It provides end-to-end communication and identify how it should be broken into packets, addressed, transmitted and received at the end point or receiver. Thus, it performs sequencing and segmentation of data flowing over the network.

Case-Based MCQs

Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
I. Internet Protocols
For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols. For email communication, we use SMTP and POP For communication between browser and server HTTP and HTTPS protocols are used. We can use TELNET to access services available on a remote computer.

Question 1.

Which of the following is an Internet Protocol.

(A) HTTP
(B) FTP
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)

Explanation:
HTTP allows the retrieval of linked resources from across the web. The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 2.

SMTP protocol is:

(A) used for composing an email message.
(B) used in receiving incoming emails by pulling the message from server to client
(C) used in sending outgoing emails by pushing the message from client to server
(D) None of the above
Answer:
(C) used in sending outgoing emails by pushing the message from client to server

Explanation:
The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages.

Question 3.

POP protocol is:

(A) used for composing an email message.
(B) used in receiving incoming emails by pulling the message from server to client
(C) used in sending outgoing emails by pushing the message from client to server
(D) None of the above
Answer:
(B) used in receiving incoming emails by pulling the message from server to client

Explanation:
In computing, the Post Office Protocol is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 is the version in common use.

Question 4.

Which of the following internet protocols provides secure data transmission between server and browser with the help of encryption.

(A) HTTP
(B) HTTPS
(C) TELNET
(D) ARPANET
Answer:
(B) HTTPS

Explanation:
HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure I Socket Layer).

Question 5.

The full form of POP (e-mail protocol) is:

(A) Post Order Protocol
(B) Push Order Protocol
(C) Post Office Protocol
(D) Pull Over Protocol
Answer:
(C) Post Office Protocol

Explanation:
POP (Post Office Protocol) is used 5 to retrieve those mails at the receiver’s side.

Question 6.

Which of the following protocol is used for delivering data from the source to the destination?

(A) TCP
(B) IP
(C) SMTP
(D) ARPANET
Answer:
(C) SMTP

Explanation:
E-Mail uses these protocols to communicate with mailservers. SMTP (Simple Mail Transfer Protocol) is used to send the email.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 7.

The full Form of TELNET is

(A) Secure Mail Transfer Protocol
(B) Secure Mail Transmit Protocol
(C) Simple Mail Transmit Protocol
(D) Simple Mail Transfer Protocol
Answer:
(D) Simple Mail Transfer Protocol

Explanation:
TELNET is typically used to provide user-oriented command line login sessions between hosts on the Internet. The name is derived from the words “Telecommunication Network” since the program is designed to emulate a single terminal attached to the other computer.

II. TCP/IP Protocol
TCP/IR or the Transmission Control Protocol/ Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private computer network (an intranet or an extranet). TCP defines how applications can create channels of communication across a network. It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address.

IP defines how to address and route each packet to make sure it reaches the right destination. Each gateway computer on the network checks this IP address to determine where to forward the message. TCP/IP uses the client-server model of communication in which a user or machine (a client) is provided a service (like sending a webpage) by another computer (a server) in the network. Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously.

Question 1.

Which of the following protocols is used in the internet?

(A) HTTP
(B) DHCP
(C) POP
(D) All of the above
Answer:
(D) All of the above

Explanation:
HTTP is a widely used protocol and has been rapidly adopted over the Internet because of its simplicity. It is a stateless and connectionless protocol. The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture. The Post Office Protocol (POP) service is a network server by which client-based e-mail programs are connected to access a user’s e-mail on a central server.

Question 2.

Which protocol assigns IP address to the client connected to the internet?

(A) DHCP
(B) IP
(C) RPC
(D) RSVP
Answer:
(A) DHCP

Explanation:
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so they can communicate using IP (Internet Protocol).

Question 3.

Internet protocols are a set of rules to govern:

(A) communication between computers on a network
(B) standard
(C) metropolitan communication
(D) bandwidth
Answer:
(A) communication between computers on a network

Explanation:
For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 4.

Network layer at source is responsible for creating a packet from data coming from another

(A) station
(B) link
(C) node
(D) protocol
Answer:
(D) protocol

Explanation:
Protocol is a set of rules or procedures for transmitting data between electronic devices, such as computers.For example: SMTP POP FTP etc.

Question 5.

Several protocols for upper layers in Bluetooth use:

(A) UDP
(B) HSP
(C) ITC
(D) L2CAP
Answer:
(D) L2CAP

Explanation:
Logical Link Control and Adaptation Protocol (L2CAP) is a protocol used in the Bluetooth standard that provides adaption between higher layers and the baseband layer of the Bluetooth stack. It operates just above the host-controller interface (HCI) passing data frames from the higher layers to either HCI or Link Manager.

Question 6.

Which one of the following is not an application layer protocol used in internet?

(A) Remote procedure call
(B) Internet relay chat
(C) Resource reservation protocol
(D) Local procedure call
Answer:
(C) Resource reservation protocol

Explanation:
The Resource Reservation Protocol is a transport layer protocol designed to reserve resources across a network using the integrated services model.

Question 7.

Checksum is used on internet by several protocols although not at the

(A) season layer
(B) transport layer
(C) network layer
(D) data link layer
Answer:
(D) data link layer

Explanation:
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer.

III. E-mail and SMTP
e-mail uses protocols to communicate with mail servers. SMTP (Simple Mail Transfer Protocol) is used to send the e-mail. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive e-mails from a remote server to a local e-mail client. POP3 allows you to download e-mail messages on your local computer and read them even when you are offline. Most e-mail clients allow for data transfers up to 10 MB. SMTP is a standard electronic-mail protocol that handles the sending of mail from one SMTP to another SMTP server. To accomplish the transport, the SMTP server has its own MX (Mail Exchanger) record in the DNS database that corresponds to the domain for which it is configured to receive mail.

Question 1.

…………uses protocols to communicate with mail servers.

(A) Eprtail
(B) SMTP
(C) DNS
(D) MX
Answer:
(A) Eprtail

Explanation:
Email is the letter in the electronic form that is sent by one person and can be received by one or more people. The effect is almost the same as that of normal postal mail. In urbanised areas of the world, writing letters has become a passe’ and email has taken up a lot of the paper form. Email works on the SMTP standing for Simple Mail Transfer Protocol. The port used in it is 25.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 2.

SMTP stands for……….

(A) Simple Mail Trending Protocol
(B) Simple Mail Transfer Protocol
(C) Simple Mail Tracking Protocol
(D) Simple Mail Trust Protocol
Answer:
(B) Simple Mail Transfer Protocol

Explanation:
SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol for the transmission of electronic mail.

Question 3.

……….. is a standard mail protocol used to receive emails.

(A) SMTP
(B) DNS
(C) MX
(D) POP3
Answer:
(D) POP3

Explanation:
Most of the internet systems use SMTP as a method to send and receive mail from one user to another.

Question 4.

Most e-mail clients allow for data transfers up to……….

(A) 1 MB
(B) 3 MB
(C) 5 MB
(D) 10 MB
Answer:
(D) 10 MB

Explanation:
Many people use web-based email clients, like Yahoo Mail and Gmail. Those who require a lot more space – especially businesses – often have to invest in their own servers. To that end, programs like Postfix and Microsoft Exchange are two of the most popular options.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 5.

SMTP server has its own record.

(A) MX (Mail Exchanger)
(B) DNS
(C) None
(D) All of these
Answer:
(A) MX (Mail Exchanger)

Explanation:
The sender who wants to send an e-mail opens a TCP connection to the SMTP mail server. The SMTP server is always on the listening mode, and as soon as it listens the TCP connection from any user, the SMTP initiates the process of connection on that port. After successfully establishing the TCP connection the client process sends the mail instantly.

Question 6.

………….. database that corresponds to the domain for which it is configured to receive mail.

(A) DNS
(B) E-mail
(C) SMTP
(D) All of these
Answer:
(A) DNS

Explanation:
A DNS server is a computer server that contains a database of public IP addresses and their associated hostnames, and in most cases serves to resolve, or translate, those names to IP addresses as requested. DNS servers run special software and communicate with each other using special protocols.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 7.

Which version of POP is a standard mail protocol used to receive e-mails from a remote server to a local email client?

(A) Version 1
(B) Version 2
(C) Version 3
(D) Version 4
Answer:
(C) Version 3

Explanation:
POP stands for Post Office Protocol and 3 signifies version 3. It is a standard mail protocol used to receive e-mail from the mail server to the receiver’s point.
POP3 allows you to download email messages on your local computer and read them even when you are offline. POP3 is designed to delete mail on the server as soon as the user has downloaded it. So, it is thought to be a store-and-forward service.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols Read More »

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Internet Basics Class 10 MCQ Questions with Answers

Question 1.

Chrome is a browser by which company?

(A) Microsoft
(B) Google
(C) Apple
(D) IBM
Answer:
(B) Google

Explanation:
Google Chrome is considered as a lightweight web browser of Google.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 2.

IP addresses of two computers on a network

(A) Can be the same
(B) Cannot be the same
(C) Are not defined
(D) Must match with a third computer
Answer:
(B) Cannot be the same

Explanation:
IP address is the address of a computer on the Internet (or any network). IP stands for Internet Protocol.

Question 3.

A domain name maps to :

(A) A URL
(B) A website
(C) An IP address
(D) A11 of these
Answer:
(B) A website

Explanation:
A domain name is a unique reference that identifies a website on the internet. A full domain name is a sequence of labels separated by dots

Question 4

WWW stands for : IH

(A) World Wide Web
(B) Word Wide Web
(C) World Way Web
(D) Web World Wide
Answer:
(A) World Wide Web

Explanation:
WWW stands for World Wide Web and is a subset of the Internet that contains a huge number of documents, audios, videos, images, etc.

Question 5.

Which of the following is not a web browser?

(A) Mozilla Firefox
(B) Google Chrome
(C) Internet Explorer
(D) Microsoft Frontpage
Answer:
(D) Microsoft Frontpage

Explanation:
Microsoft Frontpage is a What You See Is What You Get (WYSIWYG) editor. It helps the user to create the web pages quickly.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 6.

Which of the following is not an ISP in India?

(A) MTNL
(B) Vodafone
(C) Airtel
(D) TCP
Answer:
(D) TCP

Explanation:
TCP/IP or Transmission Control Protocol/ Internet Protocol, is a set of communication protocols. It is used to interconnect network devices on the internet. It is known to be most reliable and error-free communication between the networking devices.

Question 7.

The device which is used to convert digital data into analog form and vice versa is called a

(A) Keyboard
(B) Modem
(C) Router
(D) Light pen
Answer:
(B) Modem

Explanation:
Modem stands for Modulator Demodulator. It allows your computer to use the telephone line or cable to get connected with another computer.

Question 8.

The computer or server on the internet is also known as

(A) PC
(B) Host
(C) Browser
(D) Client
Answer:
(B) Host

Explanation:
A network host is a computer or other device connected to a computer network. A host may work as a server offering information resources, services, and applications to users or other hosts on the network. Hosts are assigned at least one network address.

Question 9.

Internet address is a :

(A) 8 bit number
(B) 16 bit number
(C) 32 bit number
(D) None of the above
Answer:
(C) 32 bit number

Explanation:
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998.

Question 10.

In all computers on the internet, the ones owned and operated by educational institutions form part of:

(A) org domain
(B) univ domain
(C) edu domain
(D) mil domain
Answer:
(C) edu domain

Explanation:
org stands for organisation, univ for university, edu for educational institution and mil for military website.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 11.

In HTTPS, S means :

(A) Secret
(B) Socket
(C) Secure
(D) Software
Answer:
(C) Secure

Explanation:
There is a protocol, https, that is used to securely type in login IDs and passwords and send them over the network. Https stands for secure HTTP Whatever you send using https, is secured by encryption.

Assertion ans Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion (A): WWW is a subset of the Internet that contains a large set of documents, pictures,videos, links, etc.
Reason (R): WWW is cross-platform dependent.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
A global network of computer using the internet to exchange web documents is called as WWW. WWW is distributed as approximately 70 million active sites are there as of December 2007. It provides a single interface to many services. It is dynamic and interactive in nature.

Question 2.

Assertion (A): Web server is a system that delivers the content to an end user over the internet. Every web server has an IP address and a domain name. Reason (R): Web client is an application that communicates with a web server using an HTTP protocol.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
A web server is a computer capable of storing a large number of web pages. It makes the web pages available on the web, on request by the user. It is also known as WWW server. The communication between client and server takes place using the HyperText Transfer Protocol (HTTP). A web client is defined as a computer that receives from and gives information to the web server. Example of web client is a web browser.

Question 3.

Assertion (A): The content in website are easily accessible to everybody.
Reason (R): As, it does not require any login credentials.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
A website is a collection of publicly accessible web pages and are linked together and share a single domain name. To access a website, login id, password or some other credentials are not required. The content of a website are easily accessible to everyone.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 4.

Assertion (A): Web Portal is the first page which appears when you open a website.
Reason (R): Social media websites are platforms which allow the sharing of images or ideas.

Answer:
(D) A is false and R is true

Explanation:
Web portal is an idea of a website or service that offers a broad range of services such as email, games, etc. Only portal member can access the content. It requires login credentials. Social media is a platforms through which you can share your ideas, experience, thoughts or you can upload, download images, audio, video, e tc. Facebook, Instagram are some of the popular social media platforms.

Question 5.

Assertion (A): Static webpage is called flat or stationary web page.
Reason (R): The static web page is a page whose changes are not automated.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
A static Web page is a page that is built using HTML code and features the same presentation and content, regardless of user identity or other factors. Static Web pages are easier to code and assemble than dynamic Web pages, which may feature customizable content according to a user’s identity or other factors.
The dynamic web page is a page in which a central database is used to store the product information. The changes in dynamic web page is mostly automated.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 6.

Assertion (A): A website address is also known as a URL.
Reason (R): A website address is an Internet or intranet name that points to a location where a file, directory or website page is hosted.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Uniform Resource Locator (URL) or website address refers to the addressor the location of a web page or the website on the Internet. Each website on the Internet has a unique address. For example, http://www.google.com is a URL. The first part of the URL is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name aTe separated by a colon and two forward slashes. “http://www.google.com”. In the above URL, “http” is the protocol identifier and “www.google.com” is the resource name.

Case- Based MCQs

Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
I. Secure data transmission Secure data transmission means that data/ information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message.

The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.

Question 1.

Secure data transmission means :

(A) Data can be accessed by any unauthorized person during transmission.
(B) Data can not be accessed by any unauthorized person during transmission.
(C) Transmission of data
(D) None of the above
Answer:
(B) Data can not be accessed by any unauthorized person during transmission.

Explanation:
A secure data transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 2.

Which of the following techniques can be used for security of data?

(A) Authentication
(B) Authorisation
(C) Encryption
(D) All of the above
Answer:
(C) Encryption

Explanation:
Authentication is the process or action of verifying the identity of a user or process. Authorisation in system security is the process of giving the user permission to access a specific resource or function. Encryption in cyber security is the conversion of data from a readable format into an encoded format.

Question 3.

Caesar Cipher is :

(A) used for conversion of the actual message into an encrypted message
(B) an encryption technique
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)

Explanation:
In cryptography, a Caesar cipher, also known as shift cipher, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

Question 4.

Person ‘X’ has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called :

(A) Conversion
(B) Encryption
(C) Decryption
(D) None of the above
Answer:
(C) Decryption

Explanation:
The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 5.

A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?

(A) GSQTZXIV
(B) GSQTYXIV
(C) GSXTYXIV
(D) GSQSYXIV
Answer:
(B) GSQTYXIV

Explanation:
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

Question 6.

An encryption algorithm is used to transform a readable message into:

(A) Text message
(B) Simple message
(C) Converted message
(D) Encrypted message
Answer:
(D) Encrypted message

Explanation:
An encryption algorithm is a component for electronic data transport security. Actual mathematical steps are taken and enlisted when developing algorithms for encryption purposes, and. varying block ciphers are used to encrypt electronic data or numbers.

Question 7.

In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.

(A) 0
(B) 26
(C) both (A) and
(D) None of the above
Answer:
(C) both (A) and

Explanation:
The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher is based on transposition and involves shifting each letter of the plaintext message by a certain number of letters

II. World Wide Web World Wide Web (WWW) or simply web is a set of programs, standards and protocols that allows the multimedia and hypertext files to be created, displayed and linked on the Internet. The World Wide Web was invented by British scientist Tim Berners-Lee in 1989 while working at CERN. It became publicly available on Internet for the first time. The Internet is the physical network of computers all over the world. The World Wide Web is a virtual network of web sites connected by hyperlinks (or “links”). Web sites are stored on servers on the internet, so, the World Wide Web is a part of the Internet. In 1969, the US Department of Defense, approved a project named ARPANET (Advanced Research Projects Agency Network). In 1970, NSF created a common network called CSNET. A more speedy network NSFnet was built. In 1995, a new name was given to the collection of all networks and was called Internet.

Question 1.

WWW stands for

(A) World Wide Web
(B) Word Wide Web
(C) World Way Web
(D) Web World Wide
Answer:
(A) World Wide Web

Explanation:
WWW stands for World Wide Web. It was developed in the CERN, Switzerland around the early 1990s.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 2.

World Wide Web (WWW) is a set of programs, standards and protocols that allows the multimedia and hypertext files to be created, displayed and linked on the

(A) ARPNET
(B) CSNET
(C) Internet
(D) CERN
Answer:
(C) Internet

Explanation:
A mean of connecting a computer to any other computer anywhere in the world is called as Internet. The initial Fact idea of the internet is credited to Leonard Kleinrock in 1961.

Question 3.

…………… are stored on servers of Internet.

(A) WWW
(B) Websites
(C) Internet
(D) Links
Answer:
(B) Websites

Explanation:
A website is a collection of publicly accessible web pages and are linked together and share a single domain name.

Question 4.

In ……. NSF created a common network called CSNET.

(A) 1950
(B) 1960
(C) 1970
(D) 1980
Answer:
(C) 1970

Explanation:
The National Science Foundation (NSF) provided a grant to establish the Computer Science Network (CSNET) to provide networking services to all university computer scientists.

Question 5.

ARPANET stands for…………

(A) Advanced Research Projects Agency Network
(B) Advanced Research Product Agency Network
(C) Advanced Research Process Agency Network
(D) Advanced Research Plan Agency Network
Answer:
(A) Advanced Research Projects Agency Network

Explanation:
The name of the initial network was the ARPANET (Advanced Research Projects Agency Network). After this beginn-ing, computer networks started getting built in and around the USA. In the early to mid-1970’s additional networks besides ARPAnet came into being.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 6.

The World Wide Web was invented in the year

(A) 1988
(B) 1989
(C) 1990
(D) 1992
Answer:
(B) 1989

Explanation:
A global network of computer using the internet to exchange web documents is called as WWW. On 6th August 1991, the World Wide Web became publicly available.

Question 7.

The World Wide Web is a virtual network of web sites connected by………

(A) Hyperlinks
(B) Internet
(C) Websites
(D) World Wide Web
Answer:
(A) Hyperlinks

Explanation:
A hyperlink is defined as an icon, graphic or text in a document that links to another file or document.III. IP ADDRESS IP addresses are in aaa.aaa.aaa.aaa format, where each aaa is a number from 0 to 255. The length of IP address is 4 bytes. IP addresses identify the host computers, so that packets of information reached to the correct computer, e.g. 162.192.1.89 The IP address has the following characteristics:

  •  IP addresses are unique.
  •  No two machines can have the same IP address.
  •  IP addresses are also global and standardised.
  • All machines connected to the Internet agree to use the same scheme for establishing an address.

Question 1.

Each computer connected to the Internet must:

(A) be a pentium machine
(B) have a unique IP address
(C) have a web browser
(D) have a modem connection
Answer:
(B) have a unique IP address

Explanation:
An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

Question 2.

An IP address is a string of numbers separated by periods.

(A) 3
(B) 4
(C) 2
(D) 5
Answer:
(B) 4

Explanation:
An IP address appears as four decimal numbers separated by periods. For example, you might use 204.132.40.155 as an IP for some device in your network.

Question 3.

IP addresses are converted into :

(A) a binary string
(B) alphanumeric string
(C) a hierarchy of domain names
(D) a hexadecimal string
Answer:
(C) a hierarchy of domain names

Explanation:
There are two hierarchical addressing systems on the Internet: domain names and IP addresses. People use domain names (like cbseacademic.nic.in) to visit websites. Computers translate those domain names to IP addresses (like 128.32.189.18) to locate and send data behind the scenes.

Question 4.

Which of the following translates domain names into IP addresses?

(A) URL
(B) Web address
(C) Domain abbreviation
(D) Domain name system
Answer:
(D) Domain name system

Explanation:
The domain name system (DNS) is an Internet protocol for translating domain names to IP addresses.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 5.

Identify the IP address from the following URL: http ://www. microsoft.com/ athome/ default, aspx

(A) microsoft.com
(B) http
(C) athome
(D) default, aspx
Answer:
(A) microsoft.com

Explanation:
Every web page has its own address called a Uniform Resource Locator (URL). Much like the address on an envelope with a name, street address, dty, state, and zip code, each part of a URL provides information about the web page.

Question 6.

The minimum value of IP address string is :

(A) 2
(B) 4
(C) 16
(D) 0
Answer:
(D) 0

Explanation:
Because each byte is 8 bits in length, each octet in an IP address ranges in value from a minimum of 0 to a maximum of 255 (28). Therefore, the full range of IP addresses in IPv4 annotation is from 0.0. 0.0 through 255.255.

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics

Question 7.

The maximum value of IP address string is :

(A) 256
(B) 128
(C) 255
(D) 512
Answer:
(C) 255

Explanation:
The full range of IP addresses in IPv4 annotation is from 0.0.0.0 through 255.255.255.255.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics Read More »

Dialogue Writing MCQ Questions with Answers Class 10 English

MCQ Questions for Class 10 English Grammar Dialogue Writing with Answers

I. Choose the most appropriate option to complete the sentences given below.

Julia : Hello Kevin, 1……….. you for ages. How are you?
Kevin : I’m fine. How about you? 2………….
Julia : Yes, I’m very well thanks. 3…………somewhere? Or 4………… somebody off a train?
Kevin : No, Actually 5…………….
Julia : That’s great. It means 6……….
Kevin : Yes, you are right.

1. (A) I see you every day
(B) I will always see you
(C) I had seen you
(D) I haven’t seen

2. (A) You look nice.
(B) You look pretty.
(C) You look very well.
(D) You look neat.

3. (A) Whereareyou
(B) Are you going
(C) is you going
(D) I-low are you?

4. (A) is you seeing
(B) are you seeing
(C) have you seeing
(D) had you seeing

5. (A) I’m going nowhere
(B) I’m happy.
(C) I’m happy to see you
(D) I’m going to Hyderabad to join my new job.

6. (A) that’s why you are here
(B) you are busy.
(C) you will shift to Hyderabad very soon.
(D) you will leave the college now.
Answer:
1. (D) I haven’t seen
2. (C) You look very well.
3. (B) Are you going
4. (B) are you seeing
5. (D) I’m going to Hyderabad to join my new job.
6. (C) you will shift to Hyderabad very soon.

Explanation:
1. In options (A), (B) and (C), the pronoun ‘you’ is used and again at the end of the blank, ‘you’ is used in the question, which makes the sentence incorrect.
2. ‘Nice’ is related to behaviour. ‘Pretty’ and ‘neat’ are just related to beauty and cleanliness. ‘Well’ is used to. define overall health and life situations.
3. Options (A) and (D) do not give any meaning with the sentences that follow Option (B) uses ‘is’ with ‘you’ which is not the correct usage. Only ‘are’ is used with ‘You’ whether in singular or in plural.
4. As the work is still in continuation, Present continuous tense is used. Only ‘are’ is used with ‘You’ whether in singular or in plural.
5. If someone is not going anywhere or receiving anyone1 so there is no point in coming to Kaiiway Station Expressing happiness is response to where are you going does not make sense.
6. As Kevin is getting new job in Hyderabad, so, shifting to Hyderabad is the most obvious choice.

Dialogue Writing MCQ Questions with Answers Class 10 English

II. Choose the most appropriate options to complete the dialogue given below. Write the correct answer in the answer sheet against the correct blank number.

Mohit : Nice to see you in the City again. How come you are here?
Ketan : 1………………..
Mohit : Are you still with the Tata group?
Ketan : Yes, in fact 2………………..
Mohit : That’s great Congratulations. Your Promotion and calls for a Party.
Ketan : Indeed it does. 3…………….?
Mohit : We would love to but we have to go for a Wedding tonight.
Ketan : Flow about Saturday evening?
Mohit : 4……………
Ketan : Good. Then you should come to my residence at around 7:30 pm.
Mohit : By the way. Where do you live?
Ketan : 5………… You must bring Your Family too.
1. (A) I have been there.
(B) I have come there.
(C) I have been posted here.
(D) I have send here.

2. (A) I have a promotion.
(B) I received a promotion.
(C) I received a promotion.
(D) I have been posted here on a Promotion.

3. (A) How would you like?
(B) When would you like?
(C) Today itself.
(D) Would you like to have it Tonight?

4. (A) Can be
(B) Ok
(C) That would quite suit us.
(D) Fine

5. (A) Here itself
(B) In Delhi
(C) In this city itself
(D) Oh, Sorry! I forgot to tell you. It is Flat 16,1 Floor, Vishnu Enclave.

6. (A) once again
(B) No problem
(C) I will try to be there
(D) will be there by 7:30 P M.
Answer:
1. (C) I have been posted here.
2. (D) I have been posted here on a Promotion.
3. (D) Would you like to have it Tonight?
4. (C) That would quite suit us.
5. (D) Oh, Sorry! I forgot to tell you. It is Flat 16, Second Floor, Vishnu Enclave.
6. (D) We will be there by 7:30 P.M.

Explanation:
1. When someone asks the reason for being present somewhere, responses like Options (A) and (B) about some other place is not correct. Option (D) does not make any sense as response to the question.
2. Simple response about Promotion without confirming to the question are incomplete responses. Option (D) gives the reason for being with Tata as well as reason for being there.
3. When someone Congratulates and looks forward to a Party, the correct response is to invite him or her for the Party as soon as it suits both.
4. As a response to a date for party, one must confirm or reject it in courtesy. Mere responses like ‘Ok’ and ‘Fine’ are not courteous.
5. One must know the address where the party is going to be hosted. So, complete address needs to be shared with the Invitees.
6. It is always better to confirm the attendance along with the Time at the Time of Parting.

Dialogue Writing MCQ Questions with Answers Class 10 English

III. Choose the most appropriate options to complete the dialogue given below. Write the correct answer in the answer sheet against the correct blank number.

David : Hello.
Meenu : HelIo
David : Is it 9897XXXXXX?
Meenu : Yes. 1……….
David : To Meenu, I am her friend David.
Meenu : David ! Its Meenu. 2………..?
David : I m calling from Indira Gandhi International Airport. I’m here for a visit.
Meenu : That’s great. 3…………?
David : I wanted to give you a surprise.
Meenu : When did you arrive? 4………….?
David : I just got here and I’m alone.
Meenu : 5. __________________ for Saket or Shall I send My Driver?
David : I think I’ll take a Cab as your Driver 6……………

1. (A)Who are you?
(B) Who’s this?
(C)Who is speaking?
(D) Who do you want to speak to?

2. (A)Where you have been?
(B) Where are you?
(C)Where are you calling from?
(D) Are you there?

3.(A)You can inform me.
(B) You could inform me.
(C)Why didn’t you let me know you were coming?
(D) Why didn’t you tell me?

4. (A)Who is with you?
(B) Who has come with you?
(C)No one has come with you.
(D) Is someone else accoútpanying you?

5. (A)In that case, ok.
(B) No problem
(D) nook a Cab
(C)In that case, you can you take a Cab

6. (A)may take time to reach the Airport
(B) may forget
(C)will be late
(D) doesn’t know the directions.
Answer:
1. (D) Who do you want to speak to?
2. (C) Where are you calling from?
3. (C) Why didn’t you let me know you were coming?
4. (D) Is someone else accompanying you?
5. (C) In that case, can you take a Cab
6. (A) may take time to reach the Airport.

Explanation:
I. While receiving a call, it is appropriate to know whom the Caller wants to talk to.
2. It does not seem that the speakers have been out of touch for long, so option (A) does not fit. It is impolite j to ask as mentioned in option (B). As there has no gap between the speaking or no interruption seems to 1 arise, so option (D) cannot be used.
3. As David has come to the town where Meenu resides, she is bound to complain about why she was not informed earlier so that she could have gone and received him at the Airport.
4. It is polite to enquire who else is coming with the speaker to make suitable arrangements for the Visit.
5. As Meenu cannot go and pick him up now because she was not aware of his arrival, the best option is to guide him how to reach her residence which has been done in option (C).
6. As David is already there, sending Driver will make him wait for extra time.

MCQ Questions for Class 10 English with Answers

Dialogue Writing MCQ Questions with Answers Class 10 English Read More »

error: Content is protected !!