Internet Basics Class 10 MCQ Questions with Answers
Question 1.
Chrome is a browser by which company?
(A) Microsoft
(B) Google
(C) Apple
(D) IBM
Answer:
(B) Google
Explanation:
Google Chrome is considered as a lightweight web browser of Google.
Question 2.
IP addresses of two computers on a network
(A) Can be the same
(B) Cannot be the same
(C) Are not defined
(D) Must match with a third computer
Answer:
(B) Cannot be the same
Explanation:
IP address is the address of a computer on the Internet (or any network). IP stands for Internet Protocol.
Question 3.
A domain name maps to :
(A) A URL
(B) A website
(C) An IP address
(D) A11 of these
Answer:
(B) A website
Explanation:
A domain name is a unique reference that identifies a website on the internet. A full domain name is a sequence of labels separated by dots
Question 4
WWW stands for : IH
(A) World Wide Web
(B) Word Wide Web
(C) World Way Web
(D) Web World Wide
Answer:
(A) World Wide Web
Explanation:
WWW stands for World Wide Web and is a subset of the Internet that contains a huge number of documents, audios, videos, images, etc.
Question 5.
Which of the following is not a web browser?
(A) Mozilla Firefox
(B) Google Chrome
(C) Internet Explorer
(D) Microsoft Frontpage
Answer:
(D) Microsoft Frontpage
Explanation:
Microsoft Frontpage is a What You See Is What You Get (WYSIWYG) editor. It helps the user to create the web pages quickly.
Question 6.
Which of the following is not an ISP in India?
(A) MTNL
(B) Vodafone
(C) Airtel
(D) TCP
Answer:
(D) TCP
Explanation:
TCP/IP or Transmission Control Protocol/ Internet Protocol, is a set of communication protocols. It is used to interconnect network devices on the internet. It is known to be most reliable and error-free communication between the networking devices.
Question 7.
The device which is used to convert digital data into analog form and vice versa is called a
(A) Keyboard
(B) Modem
(C) Router
(D) Light pen
Answer:
(B) Modem
Explanation:
Modem stands for Modulator Demodulator. It allows your computer to use the telephone line or cable to get connected with another computer.
Question 8.
The computer or server on the internet is also known as
(A) PC
(B) Host
(C) Browser
(D) Client
Answer:
(B) Host
Explanation:
A network host is a computer or other device connected to a computer network. A host may work as a server offering information resources, services, and applications to users or other hosts on the network. Hosts are assigned at least one network address.
Question 9.
Internet address is a :
(A) 8 bit number
(B) 16 bit number
(C) 32 bit number
(D) None of the above
Answer:
(C) 32 bit number
Explanation:
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998.
Question 10.
In all computers on the internet, the ones owned and operated by educational institutions form part of:
(A) org domain
(B) univ domain
(C) edu domain
(D) mil domain
Answer:
(C) edu domain
Explanation:
org stands for organisation, univ for university, edu for educational institution and mil for military website.
Question 11.
In HTTPS, S means :
(A) Secret
(B) Socket
(C) Secure
(D) Software
Answer:
(C) Secure
Explanation:
There is a protocol, https, that is used to securely type in login IDs and passwords and send them over the network. Https stands for secure HTTP Whatever you send using https, is secured by encryption.
Assertion ans Reason Based MCQs
Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true
Question 1.
Assertion (A): WWW is a subset of the Internet that contains a large set of documents, pictures,videos, links, etc.
Reason (R): WWW is cross-platform dependent.
Answer:
(B) Both A and R are true but R is Not the correct explanation of A
Explanation:
A global network of computer using the internet to exchange web documents is called as WWW. WWW is distributed as approximately 70 million active sites are there as of December 2007. It provides a single interface to many services. It is dynamic and interactive in nature.
Question 2.
Assertion (A): Web server is a system that delivers the content to an end user over the internet. Every web server has an IP address and a domain name. Reason (R): Web client is an application that communicates with a web server using an HTTP protocol.
Answer:
(B) Both A and R are true but R is Not the correct explanation of A
Explanation:
A web server is a computer capable of storing a large number of web pages. It makes the web pages available on the web, on request by the user. It is also known as WWW server. The communication between client and server takes place using the HyperText Transfer Protocol (HTTP). A web client is defined as a computer that receives from and gives information to the web server. Example of web client is a web browser.
Question 3.
Assertion (A): The content in website are easily accessible to everybody.
Reason (R): As, it does not require any login credentials.
Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
A website is a collection of publicly accessible web pages and are linked together and share a single domain name. To access a website, login id, password or some other credentials are not required. The content of a website are easily accessible to everyone.
Question 4.
Assertion (A): Web Portal is the first page which appears when you open a website.
Reason (R): Social media websites are platforms which allow the sharing of images or ideas.
Answer:
(D) A is false and R is true
Explanation:
Web portal is an idea of a website or service that offers a broad range of services such as email, games, etc. Only portal member can access the content. It requires login credentials. Social media is a platforms through which you can share your ideas, experience, thoughts or you can upload, download images, audio, video, e tc. Facebook, Instagram are some of the popular social media platforms.
Question 5.
Assertion (A): Static webpage is called flat or stationary web page.
Reason (R): The static web page is a page whose changes are not automated.
Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
A static Web page is a page that is built using HTML code and features the same presentation and content, regardless of user identity or other factors. Static Web pages are easier to code and assemble than dynamic Web pages, which may feature customizable content according to a user’s identity or other factors.
The dynamic web page is a page in which a central database is used to store the product information. The changes in dynamic web page is mostly automated.
Question 6.
Assertion (A): A website address is also known as a URL.
Reason (R): A website address is an Internet or intranet name that points to a location where a file, directory or website page is hosted.
Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
Uniform Resource Locator (URL) or website address refers to the addressor the location of a web page or the website on the Internet. Each website on the Internet has a unique address. For example, http://www.google.com is a URL. The first part of the URL is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name aTe separated by a colon and two forward slashes. “http://www.google.com”. In the above URL, “http” is the protocol identifier and “www.google.com” is the resource name.
Case- Based MCQs
Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
I. Secure data transmission Secure data transmission means that data/ information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message.
The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.
Question 1.
Secure data transmission means :
(A) Data can be accessed by any unauthorized person during transmission.
(B) Data can not be accessed by any unauthorized person during transmission.
(C) Transmission of data
(D) None of the above
Answer:
(B) Data can not be accessed by any unauthorized person during transmission.
Explanation:
A secure data transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption.
Question 2.
Which of the following techniques can be used for security of data?
(A) Authentication
(B) Authorisation
(C) Encryption
(D) All of the above
Answer:
(C) Encryption
Explanation:
Authentication is the process or action of verifying the identity of a user or process. Authorisation in system security is the process of giving the user permission to access a specific resource or function. Encryption in cyber security is the conversion of data from a readable format into an encoded format.
Question 3.
Caesar Cipher is :
(A) used for conversion of the actual message into an encrypted message
(B) an encryption technique
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)
Explanation:
In cryptography, a Caesar cipher, also known as shift cipher, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
Question 4.
Person ‘X’ has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called :
(A) Conversion
(B) Encryption
(C) Decryption
(D) None of the above
Answer:
(C) Decryption
Explanation:
The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.
Question 5.
A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?
(A) GSQTZXIV
(B) GSQTYXIV
(C) GSXTYXIV
(D) GSQSYXIV
Answer:
(B) GSQTYXIV
Explanation:
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.
Question 6.
An encryption algorithm is used to transform a readable message into:
(A) Text message
(B) Simple message
(C) Converted message
(D) Encrypted message
Answer:
(D) Encrypted message
Explanation:
An encryption algorithm is a component for electronic data transport security. Actual mathematical steps are taken and enlisted when developing algorithms for encryption purposes, and. varying block ciphers are used to encrypt electronic data or numbers.
Question 7.
In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.
(A) 0
(B) 26
(C) both (A) and
(D) None of the above
Answer:
(C) both (A) and
Explanation:
The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher is based on transposition and involves shifting each letter of the plaintext message by a certain number of letters
II. World Wide Web World Wide Web (WWW) or simply web is a set of programs, standards and protocols that allows the multimedia and hypertext files to be created, displayed and linked on the Internet. The World Wide Web was invented by British scientist Tim Berners-Lee in 1989 while working at CERN. It became publicly available on Internet for the first time. The Internet is the physical network of computers all over the world. The World Wide Web is a virtual network of web sites connected by hyperlinks (or “links”). Web sites are stored on servers on the internet, so, the World Wide Web is a part of the Internet. In 1969, the US Department of Defense, approved a project named ARPANET (Advanced Research Projects Agency Network). In 1970, NSF created a common network called CSNET. A more speedy network NSFnet was built. In 1995, a new name was given to the collection of all networks and was called Internet.
Question 1.
WWW stands for
(A) World Wide Web
(B) Word Wide Web
(C) World Way Web
(D) Web World Wide
Answer:
(A) World Wide Web
Explanation:
WWW stands for World Wide Web. It was developed in the CERN, Switzerland around the early 1990s.
Question 2.
World Wide Web (WWW) is a set of programs, standards and protocols that allows the multimedia and hypertext files to be created, displayed and linked on the
(A) ARPNET
(B) CSNET
(C) Internet
(D) CERN
Answer:
(C) Internet
Explanation:
A mean of connecting a computer to any other computer anywhere in the world is called as Internet. The initial Fact idea of the internet is credited to Leonard Kleinrock in 1961.
Question 3.
…………… are stored on servers of Internet.
(A) WWW
(B) Websites
(C) Internet
(D) Links
Answer:
(B) Websites
Explanation:
A website is a collection of publicly accessible web pages and are linked together and share a single domain name.
Question 4.
In ……. NSF created a common network called CSNET.
(A) 1950
(B) 1960
(C) 1970
(D) 1980
Answer:
(C) 1970
Explanation:
The National Science Foundation (NSF) provided a grant to establish the Computer Science Network (CSNET) to provide networking services to all university computer scientists.
Question 5.
ARPANET stands for…………
(A) Advanced Research Projects Agency Network
(B) Advanced Research Product Agency Network
(C) Advanced Research Process Agency Network
(D) Advanced Research Plan Agency Network
Answer:
(A) Advanced Research Projects Agency Network
Explanation:
The name of the initial network was the ARPANET (Advanced Research Projects Agency Network). After this beginn-ing, computer networks started getting built in and around the USA. In the early to mid-1970’s additional networks besides ARPAnet came into being.
Question 6.
The World Wide Web was invented in the year
(A) 1988
(B) 1989
(C) 1990
(D) 1992
Answer:
(B) 1989
Explanation:
A global network of computer using the internet to exchange web documents is called as WWW. On 6th August 1991, the World Wide Web became publicly available.
Question 7.
The World Wide Web is a virtual network of web sites connected by………
(A) Hyperlinks
(B) Internet
(C) Websites
(D) World Wide Web
Answer:
(A) Hyperlinks
Explanation:
A hyperlink is defined as an icon, graphic or text in a document that links to another file or document.III. IP ADDRESS IP addresses are in aaa.aaa.aaa.aaa format, where each aaa is a number from 0 to 255. The length of IP address is 4 bytes. IP addresses identify the host computers, so that packets of information reached to the correct computer, e.g. 162.192.1.89 The IP address has the following characteristics:
- IP addresses are unique.
- No two machines can have the same IP address.
- IP addresses are also global and standardised.
- All machines connected to the Internet agree to use the same scheme for establishing an address.
Question 1.
Each computer connected to the Internet must:
(A) be a pentium machine
(B) have a unique IP address
(C) have a web browser
(D) have a modem connection
Answer:
(B) have a unique IP address
Explanation:
An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
Question 2.
An IP address is a string of numbers separated by periods.
(A) 3
(B) 4
(C) 2
(D) 5
Answer:
(B) 4
Explanation:
An IP address appears as four decimal numbers separated by periods. For example, you might use 204.132.40.155 as an IP for some device in your network.
Question 3.
IP addresses are converted into :
(A) a binary string
(B) alphanumeric string
(C) a hierarchy of domain names
(D) a hexadecimal string
Answer:
(C) a hierarchy of domain names
Explanation:
There are two hierarchical addressing systems on the Internet: domain names and IP addresses. People use domain names (like cbseacademic.nic.in) to visit websites. Computers translate those domain names to IP addresses (like 128.32.189.18) to locate and send data behind the scenes.
Question 4.
Which of the following translates domain names into IP addresses?
(A) URL
(B) Web address
(C) Domain abbreviation
(D) Domain name system
Answer:
(D) Domain name system
Explanation:
The domain name system (DNS) is an Internet protocol for translating domain names to IP addresses.
Question 5.
Identify the IP address from the following URL: http ://www. microsoft.com/ athome/ default, aspx
(A) microsoft.com
(B) http
(C) athome
(D) default, aspx
Answer:
(A) microsoft.com
Explanation:
Every web page has its own address called a Uniform Resource Locator (URL). Much like the address on an envelope with a name, street address, dty, state, and zip code, each part of a URL provides information about the web page.
Question 6.
The minimum value of IP address string is :
(A) 2
(B) 4
(C) 16
(D) 0
Answer:
(D) 0
Explanation:
Because each byte is 8 bits in length, each octet in an IP address ranges in value from a minimum of 0 to a maximum of 255 (28). Therefore, the full range of IP addresses in IPv4 annotation is from 0.0. 0.0 through 255.255.
Question 7.
The maximum value of IP address string is :
(A) 256
(B) 128
(C) 255
(D) 512
Answer:
(C) 255
Explanation:
The full range of IP addresses in IPv4 annotation is from 0.0.0.0 through 255.255.255.255.