MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Internet Protocols Class 10 MCQ Questions with Answers

Question 1.

Protocols are set of rules to govern………

(A) Communication
(B) Standard
(C) Metropolitan communication
(D) Bandwidth
Answer:
(A) Communication

Explanation:
Information that travels over the internet does so via a variety of languages known as protocols.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 2.

Which protocol is commonly used to retrieve email from a mail server?

(A) FTP
(B) IMAP
(C) HTML
(D) TELNET
Answer:
(B) IMAP

Explanation:
In computing, the Internet Message Access Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/TP connection.

Question 3.

A user can get files from another computer on the Internet by using:

(A) HTTP
(B) TELNET
(C) UTP
(D) FTP
Answer:
(D) FTP

Explanation:
The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server.

Question 4.

TCP is a commonly used protocol at:

(A) Application layer
(B) Transport layer
(C) Network layer
(D) Data Link layer
Answer:
(B) Transport layer

Explanation:
TCP stands for Transmission Control Protocol. It is a connection-oriented protocol that means it establishes the connection prior to the communication that occurs between the computing devices in a network. This protocol is used with an IP protocol, so together, they are referred to as a TCP/IP

Question 5.

Which part of TCP/IP is responsible for dividing a file or message into very small parts, at the source computer?

(A) TCP
(B) IP
(C) Both (A) and (B)
(D) None of these
Answer:
(A) TCP

Explanation:
TCP defines how the data is channelled into the network. Its responsibility is to specify how the data is assembled into smaller packets before being transmitted into the network. It ensures the data is assembled in the right order at the end point.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 6.

In Internet Protocol (IP), data is organised in the form of

(A) bundles
(B) packets
(C) switches
(D) parts
Answer:
(B) packets

Explanation:
The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

Question 7.

A simple protocol used for fetching e-mail from a mailbox is:

(A) POP2
(B) POP3
(C) IMAP
(D) None of the Above
Answer:
(B) POP3

Explanation:
POP3 allows you to download email messages on your local computer and read them even when you are offline. POP3 is designed to delete mail on the server as soon as the user has downloaded it. So, it is thought to be a store-and-forward service.

Question 8.

The process of exchanging data packets is called:

(A) Packet Switching
(B) Packet Sharing
(C) Packet Changing
(D) Packet Snatching
Answer:
(A) Packet Switching

Explanation:
In telecommunications, packet switching is a method of grouping data that is transmitted over a digital network into packets. Packets are made of a header and a payload.

Question 9.

POP3 stands for:

(A) Post Office Packet 3
(B) Post Office Protocol 3
(C) Post Office Period 3
(D) Post Office Point 3
Answer:
(B) Post Office Protocol 3

Explanation:
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 10.

The program for logging into and executing commands on a remote machine is:

(A) SSH
(B) PPP
(C) SMTP
(D) POP3
Answer:
(A) SSH

Explanation:
Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer.

Question 11.

The short form for Telecommunication Network is:

(A) Telenet
(B) TN
(C) TNT
(D) Telnet
Answer:
(D) Telnet

Explanation:
TELNET is a network protocol used on the Internet or LAN connections. The purpose of the TELNET protocol is to provide a fairly general, bi-directional, byte-oriented communications facility. ,

Question 12.

What is the secured version of File Transfer Protocol?

(A) EFTP
(B) SFTP
(C) SMTP
(D)EMTP
Answer:
(B) SFTP

Explanation:
Secure File Transfer Protocol (SFTP) is a network protocol. It is used for accessing, transferring and managing files on remote systems.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): SFTP allows businesses to securely transfer billing data, funds and data recovery files.
Reason(R): SFTP uses SSH to transfer files and requires that the client be authenticated by the server.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Secure File Transfer Protocol (SFTP) is a network protocol. It is used for accessing, transferring and managing files on remote systems. It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol. SFTP can work with many protocols but is most commonly used with SSH to provide secure authentication.

Question 2.

Assertion(A): The name ‘TELNET’ is derived from the words “Telecommunication Network”.
Reason(R): The TELNET program is designed to emulate a single terminal attached to the other computer.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
TELNET is a network protocol used on the Internet or LAN connections. The purpose of the TELNET protocol is to provide a fairly general, bi-directional, byte-oriented communications facility. It is typically used to provide user-oriented command line login sessions between hosts on the Internet.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 3.

Assertion(A): If you do not have a user name and password pair for authentication, you cannot upload/download files.
Reason(R): FTP servers need authentication to download or upload files.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
FTP known in full as, File Transfer Protocol. FTP is a protocol designed for transferring files over the Internet. Files stored on an FTP server can be accessed using an FTP client, such as a web browser, FTP software program, or a command line interface. In case a server has FTP protocol being used, that means that its URL is prefixed with a

Question 4.

Assertion(A): The SCP command can be used to send a file to a server or retrieve a file from a server.
Reason(R): It uses the SSH protocol for authentication. SCP is more secure than FTP which transmits passwords in plain text.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
It provides file transfers between hosts on a network. With SCR you can quickly transfer files between hosts along with basic file attributes such as access permission and timestamps that are not always available via FTP

Question 5.

Assertion(A): The purpose of the TELNET protocol is to provide a fairly general, bi-directional, byte- oriented communications facility.
Reason(R): TELNET clients have been available on most Unix systems for many years and are available for virtually all platforms.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
TELNET is a network protocol used on the Internet or LAN connections. It is typically used to provide user-oriented command line login sessions between hosts on the Internet. The name is derived from the words “Telecommunication Network” since the program is designed to emulate a single terminal attached to the other computer.

Question 6.

Assertion(A): TCP/IP protocol suite is considered as stateless.
Reason(R): Each request is considered as new, as it is unrelated to the previous request. Thus, being stateless it frees up the network paths that can be used continuously.

Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
TCP/IP Is a protocol suite that specifies how the data is exchanged over the internet. It provides end-to-end communication and identify how it should be broken into packets, addressed, transmitted and received at the end point or receiver. Thus, it performs sequencing and segmentation of data flowing over the network.

Case-Based MCQs

Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
I. Internet Protocols
For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols. For email communication, we use SMTP and POP For communication between browser and server HTTP and HTTPS protocols are used. We can use TELNET to access services available on a remote computer.

Question 1.

Which of the following is an Internet Protocol.

(A) HTTP
(B) FTP
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)

Explanation:
HTTP allows the retrieval of linked resources from across the web. The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 2.

SMTP protocol is:

(A) used for composing an email message.
(B) used in receiving incoming emails by pulling the message from server to client
(C) used in sending outgoing emails by pushing the message from client to server
(D) None of the above
Answer:
(C) used in sending outgoing emails by pushing the message from client to server

Explanation:
The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages.

Question 3.

POP protocol is:

(A) used for composing an email message.
(B) used in receiving incoming emails by pulling the message from server to client
(C) used in sending outgoing emails by pushing the message from client to server
(D) None of the above
Answer:
(B) used in receiving incoming emails by pulling the message from server to client

Explanation:
In computing, the Post Office Protocol is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 is the version in common use.

Question 4.

Which of the following internet protocols provides secure data transmission between server and browser with the help of encryption.

(A) HTTP
(B) HTTPS
(C) TELNET
(D) ARPANET
Answer:
(B) HTTPS

Explanation:
HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure I Socket Layer).

Question 5.

The full form of POP (e-mail protocol) is:

(A) Post Order Protocol
(B) Push Order Protocol
(C) Post Office Protocol
(D) Pull Over Protocol
Answer:
(C) Post Office Protocol

Explanation:
POP (Post Office Protocol) is used 5 to retrieve those mails at the receiver’s side.

Question 6.

Which of the following protocol is used for delivering data from the source to the destination?

(A) TCP
(B) IP
(C) SMTP
(D) ARPANET
Answer:
(C) SMTP

Explanation:
E-Mail uses these protocols to communicate with mailservers. SMTP (Simple Mail Transfer Protocol) is used to send the email.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 7.

The full Form of TELNET is

(A) Secure Mail Transfer Protocol
(B) Secure Mail Transmit Protocol
(C) Simple Mail Transmit Protocol
(D) Simple Mail Transfer Protocol
Answer:
(D) Simple Mail Transfer Protocol

Explanation:
TELNET is typically used to provide user-oriented command line login sessions between hosts on the Internet. The name is derived from the words “Telecommunication Network” since the program is designed to emulate a single terminal attached to the other computer.

II. TCP/IP Protocol
TCP/IR or the Transmission Control Protocol/ Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private computer network (an intranet or an extranet). TCP defines how applications can create channels of communication across a network. It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address.

IP defines how to address and route each packet to make sure it reaches the right destination. Each gateway computer on the network checks this IP address to determine where to forward the message. TCP/IP uses the client-server model of communication in which a user or machine (a client) is provided a service (like sending a webpage) by another computer (a server) in the network. Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously.

Question 1.

Which of the following protocols is used in the internet?

(A) HTTP
(B) DHCP
(C) POP
(D) All of the above
Answer:
(D) All of the above

Explanation:
HTTP is a widely used protocol and has been rapidly adopted over the Internet because of its simplicity. It is a stateless and connectionless protocol. The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture. The Post Office Protocol (POP) service is a network server by which client-based e-mail programs are connected to access a user’s e-mail on a central server.

Question 2.

Which protocol assigns IP address to the client connected to the internet?

(A) DHCP
(B) IP
(C) RPC
(D) RSVP
Answer:
(A) DHCP

Explanation:
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so they can communicate using IP (Internet Protocol).

Question 3.

Internet protocols are a set of rules to govern:

(A) communication between computers on a network
(B) standard
(C) metropolitan communication
(D) bandwidth
Answer:
(A) communication between computers on a network

Explanation:
For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 4.

Network layer at source is responsible for creating a packet from data coming from another

(A) station
(B) link
(C) node
(D) protocol
Answer:
(D) protocol

Explanation:
Protocol is a set of rules or procedures for transmitting data between electronic devices, such as computers.For example: SMTP POP FTP etc.

Question 5.

Several protocols for upper layers in Bluetooth use:

(A) UDP
(B) HSP
(C) ITC
(D) L2CAP
Answer:
(D) L2CAP

Explanation:
Logical Link Control and Adaptation Protocol (L2CAP) is a protocol used in the Bluetooth standard that provides adaption between higher layers and the baseband layer of the Bluetooth stack. It operates just above the host-controller interface (HCI) passing data frames from the higher layers to either HCI or Link Manager.

Question 6.

Which one of the following is not an application layer protocol used in internet?

(A) Remote procedure call
(B) Internet relay chat
(C) Resource reservation protocol
(D) Local procedure call
Answer:
(C) Resource reservation protocol

Explanation:
The Resource Reservation Protocol is a transport layer protocol designed to reserve resources across a network using the integrated services model.

Question 7.

Checksum is used on internet by several protocols although not at the

(A) season layer
(B) transport layer
(C) network layer
(D) data link layer
Answer:
(D) data link layer

Explanation:
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer.

III. E-mail and SMTP
e-mail uses protocols to communicate with mail servers. SMTP (Simple Mail Transfer Protocol) is used to send the e-mail. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive e-mails from a remote server to a local e-mail client. POP3 allows you to download e-mail messages on your local computer and read them even when you are offline. Most e-mail clients allow for data transfers up to 10 MB. SMTP is a standard electronic-mail protocol that handles the sending of mail from one SMTP to another SMTP server. To accomplish the transport, the SMTP server has its own MX (Mail Exchanger) record in the DNS database that corresponds to the domain for which it is configured to receive mail.

Question 1.

…………uses protocols to communicate with mail servers.

(A) Eprtail
(B) SMTP
(C) DNS
(D) MX
Answer:
(A) Eprtail

Explanation:
Email is the letter in the electronic form that is sent by one person and can be received by one or more people. The effect is almost the same as that of normal postal mail. In urbanised areas of the world, writing letters has become a passe’ and email has taken up a lot of the paper form. Email works on the SMTP standing for Simple Mail Transfer Protocol. The port used in it is 25.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 2.

SMTP stands for……….

(A) Simple Mail Trending Protocol
(B) Simple Mail Transfer Protocol
(C) Simple Mail Tracking Protocol
(D) Simple Mail Trust Protocol
Answer:
(B) Simple Mail Transfer Protocol

Explanation:
SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol for the transmission of electronic mail.

Question 3.

……….. is a standard mail protocol used to receive emails.

(A) SMTP
(B) DNS
(C) MX
(D) POP3
Answer:
(D) POP3

Explanation:
Most of the internet systems use SMTP as a method to send and receive mail from one user to another.

Question 4.

Most e-mail clients allow for data transfers up to……….

(A) 1 MB
(B) 3 MB
(C) 5 MB
(D) 10 MB
Answer:
(D) 10 MB

Explanation:
Many people use web-based email clients, like Yahoo Mail and Gmail. Those who require a lot more space – especially businesses – often have to invest in their own servers. To that end, programs like Postfix and Microsoft Exchange are two of the most popular options.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 5.

SMTP server has its own record.

(A) MX (Mail Exchanger)
(B) DNS
(C) None
(D) All of these
Answer:
(A) MX (Mail Exchanger)

Explanation:
The sender who wants to send an e-mail opens a TCP connection to the SMTP mail server. The SMTP server is always on the listening mode, and as soon as it listens the TCP connection from any user, the SMTP initiates the process of connection on that port. After successfully establishing the TCP connection the client process sends the mail instantly.

Question 6.

………….. database that corresponds to the domain for which it is configured to receive mail.

(A) DNS
(B) E-mail
(C) SMTP
(D) All of these
Answer:
(A) DNS

Explanation:
A DNS server is a computer server that contains a database of public IP addresses and their associated hostnames, and in most cases serves to resolve, or translate, those names to IP addresses as requested. DNS servers run special software and communicate with each other using special protocols.

MCQ Questions for Class 10 Computer Applications Chapter 2 Internet Protocols

Question 7.

Which version of POP is a standard mail protocol used to receive e-mails from a remote server to a local email client?

(A) Version 1
(B) Version 2
(C) Version 3
(D) Version 4
Answer:
(C) Version 3

Explanation:
POP stands for Post Office Protocol and 3 signifies version 3. It is a standard mail protocol used to receive e-mail from the mail server to the receiver’s point.
POP3 allows you to download email messages on your local computer and read them even when you are offline. POP3 is designed to delete mail on the server as soon as the user has downloaded it. So, it is thought to be a store-and-forward service.

MCQ Questions for Class 10 Computer Applications with Answers

error: Content is protected !!