{"id":36994,"date":"2022-01-25T17:26:43","date_gmt":"2022-01-25T11:56:43","guid":{"rendered":"https:\/\/mcq-questions.com\/?p=36994"},"modified":"2022-02-25T09:29:19","modified_gmt":"2022-02-25T03:59:19","slug":"mcq-questions-for-class-10-computer-applications-chapter-1","status":"publish","type":"post","link":"https:\/\/mcq-questions.com\/mcq-questions-for-class-10-computer-applications-chapter-1\/","title":{"rendered":"MCQ Questions for Class 10 Computer Applications Chapter 1 Internet Basics"},"content":{"rendered":"

Internet Basics Class 10 MCQ Questions with Answers<\/h2>\n

Question 1.<\/p>\n

Chrome is a browser by which company?<\/h2>\n

(A) Microsoft
\n(B) Google
\n(C) Apple
\n(D) IBM
\nAnswer:
\n(B) Google<\/p>\n

Explanation:
\nGoogle Chrome is considered as a lightweight web browser of Google.<\/p>\n

\"MCQ<\/p>\n

Question 2.<\/p>\n

IP addresses of two computers on a network<\/h2>\n

(A) Can be the same
\n(B) Cannot be the same
\n(C) Are not defined
\n(D) Must match with a third computer
\nAnswer:
\n(B) Cannot be the same<\/p>\n

Explanation:
\nIP address is the address of a computer on the Internet (or any network). IP stands for Internet Protocol.<\/p>\n

Question 3.<\/p>\n

A domain name maps to :<\/h2>\n

(A) A URL
\n(B) A website
\n(C) An IP address
\n(D) A11 of these
\nAnswer:
\n(B) A website<\/p>\n

Explanation:
\nA domain name is a unique reference that identifies a website on the internet. A full domain name is a sequence of labels separated by dots<\/p>\n

Question 4<\/p>\n

WWW stands for : IH<\/h2>\n

(A) World Wide Web
\n(B) Word Wide Web
\n(C) World Way Web
\n(D) Web World Wide
\nAnswer:
\n(A) World Wide Web<\/p>\n

Explanation:
\nWWW stands for World Wide Web and is a subset of the Internet that contains a huge number of documents, audios, videos, images, etc.<\/p>\n

Question 5.<\/p>\n

Which of the following is not a web browser?<\/h2>\n

(A) Mozilla Firefox
\n(B) Google Chrome
\n(C) Internet Explorer
\n(D) Microsoft Frontpage
\nAnswer:
\n(D) Microsoft Frontpage<\/p>\n

Explanation:
\nMicrosoft Frontpage is a What You See Is What You Get (WYSIWYG) editor. It helps the user to create the web pages quickly.<\/p>\n

\"MCQ<\/p>\n

Question 6.<\/p>\n

Which of the following is not an ISP in India?<\/h2>\n

(A) MTNL
\n(B) Vodafone
\n(C) Airtel
\n(D) TCP
\nAnswer:
\n(D) TCP<\/p>\n

Explanation:
\nTCP\/IP or Transmission Control Protocol\/ Internet Protocol, is a set of communication protocols. It is used to interconnect network devices on the internet. It is known to be most reliable and error-free communication between the networking devices.<\/p>\n

Question 7.<\/p>\n

The device which is used to convert digital data into analog form and vice versa is called a<\/h2>\n

(A) Keyboard
\n(B) Modem
\n(C) Router
\n(D) Light pen
\nAnswer:
\n(B) Modem<\/p>\n

Explanation:
\nModem stands for Modulator Demodulator. It allows your computer to use the telephone line or cable to get connected with another computer.<\/p>\n

Question 8.<\/p>\n

The computer or server on the internet is also known as<\/h2>\n

(A) PC
\n(B) Host
\n(C) Browser
\n(D) Client
\nAnswer:
\n(B) Host<\/p>\n

Explanation:
\nA network host is a computer or other device connected to a computer network. A host may work as a server offering information resources, services, and applications to users or other hosts on the network. Hosts are assigned at least one network address.<\/p>\n

Question 9.<\/p>\n

Internet address is a :<\/h2>\n

(A) 8 bit number
\n(B) 16 bit number
\n(C) 32 bit number
\n(D) None of the above
\nAnswer:
\n(C) 32 bit number<\/p>\n

Explanation:
\nInternet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998.<\/p>\n

Question 10.<\/p>\n

In all computers on the internet, the ones owned and operated by educational institutions form part of:<\/h2>\n

(A) org domain
\n(B) univ domain
\n(C) edu domain
\n(D) mil domain
\nAnswer:
\n(C) edu domain<\/p>\n

Explanation:
\norg stands for organisation, univ for university, edu for educational institution and mil for military website.<\/p>\n

\"MCQ<\/p>\n

Question 11.<\/p>\n

In HTTPS, S means :<\/h2>\n

(A) Secret
\n(B) Socket
\n(C) Secure
\n(D) Software
\nAnswer:
\n(C) Secure<\/p>\n

Explanation:
\nThere is a protocol, https, that is used to securely type in login IDs and passwords and send them over the network. Https stands for secure HTTP Whatever you send using https, is secured by encryption.<\/p>\n

Assertion ans Reason Based MCQs<\/span><\/p>\n

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
\n(A) Both A and R are true and R is the correct explanation of A
\n(B) Both A and R are true but R is Not the correct explanation of A
\n(C) A is true and R is false
\n(D) A is false and R is true<\/p>\n

Question 1.<\/p>\n

Assertion (A): WWW is a subset of the Internet that contains a large set of documents, pictures,videos, links, etc.
\nReason (R): WWW is cross-platform dependent.<\/h2>\n

Answer:
\n(B) Both A and R are true but R is Not the correct explanation of A<\/p>\n

Explanation:
\nA global network of computer using the internet to exchange web documents is called as WWW. WWW is distributed as approximately 70 million active sites are there as of December 2007. It provides a single interface to many services. It is dynamic and interactive in nature.<\/p>\n

Question 2.<\/p>\n

Assertion (A): Web server is a system that delivers the content to an end user over the internet. Every web server has an IP address and a domain name. Reason (R): Web client is an application that communicates with a web server using an HTTP protocol.<\/h2>\n

Answer:
\n(B) Both A and R are true but R is Not the correct explanation of A<\/p>\n

Explanation:
\nA web server is a computer capable of storing a large number of web pages. It makes the web pages available on the web, on request by the user. It is also known as WWW server. The communication between client and server takes place using the HyperText Transfer Protocol (HTTP). A web client is defined as a computer that receives from and gives information to the web server. Example of web client is a web browser.<\/p>\n

Question 3.<\/p>\n

Assertion (A): The content in website are easily accessible to everybody.
\nReason (R): As, it does not require any login credentials.<\/h2>\n

Answer:
\n(A) Both A and R are true and R is the correct explanation of A<\/p>\n

Explanation:
\nA website is a collection of publicly accessible web pages and are linked together and share a single domain name. To access a website, login id, password or some other credentials are not required. The content of a website are easily accessible to everyone.<\/p>\n

\"MCQ<\/p>\n

Question 4.<\/p>\n

Assertion (A): Web Portal is the first page which appears when you open a website.
\nReason (R): Social media websites are platforms which allow the sharing of images or ideas.<\/h2>\n

Answer:
\n(D) A is false and R is true<\/p>\n

Explanation:
\nWeb portal is an idea of a website or service that offers a broad range of services such as email, games, etc. Only portal member can access the content. It requires login credentials. Social media is a platforms through which you can share your ideas, experience, thoughts or you can upload, download images, audio, video, e tc. Facebook, Instagram are some of the popular social media platforms.<\/p>\n

Question 5.<\/p>\n

Assertion (A): Static webpage is called flat or stationary web page.
\nReason (R): The static web page is a page whose changes are not automated.<\/h2>\n

Answer:
\n(A) Both A and R are true and R is the correct explanation of A<\/p>\n

Explanation:
\nA static Web page is a page that is built using HTML code and features the same presentation and content, regardless of user identity or other factors. Static Web pages are easier to code and assemble than dynamic Web pages, which may feature customizable content according to a user’s identity or other factors.
\nThe dynamic web page is a page in which a central database is used to store the product information. The changes in dynamic web page is mostly automated.<\/p>\n

\"MCQ<\/p>\n

Question 6.<\/p>\n

Assertion (A): A website address is also known as a URL.
\nReason (R): A website address is an Internet or intranet name that points to a location where a file, directory or website page is hosted.<\/h2>\n

Answer:
\n(A) Both A and R are true and R is the correct explanation of A<\/p>\n

Explanation:
\nUniform Resource Locator (URL) or website address refers to the addressor the location of a web page or the website on the Internet. Each website on the Internet has a unique address. For example, http:\/\/www.google.com is a URL. The first part of the URL is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name aTe separated by a colon and two forward slashes. “http:\/\/www.google.com”. In the above URL, “http” is the protocol identifier and “www.google.com” is the resource name.<\/p>\n

Case- Based MCQs<\/span><\/p>\n

Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
\nI. Secure data transmission Secure data transmission means that data\/ information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he\/she receives an unreadable message that cannot be easily converted into the actual message.<\/p>\n

The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.<\/p>\n

Question 1.<\/p>\n

Secure data transmission means :<\/h2>\n

(A) Data can be accessed by any unauthorized person during transmission.
\n(B) Data can not be accessed by any unauthorized person during transmission.
\n(C) Transmission of data
\n(D) None of the above
\nAnswer:
\n(B) Data can not be accessed by any unauthorized person during transmission.<\/p>\n

Explanation:
\nA secure data transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption.<\/p>\n

\"MCQ<\/p>\n

Question 2.<\/p>\n

Which of the following techniques can be used for security of data?<\/h2>\n

(A) Authentication
\n(B) Authorisation
\n(C) Encryption
\n(D) All of the above
\nAnswer:
\n(C) Encryption<\/p>\n

Explanation:
\nAuthentication is the process or action of verifying the identity of a user or process. Authorisation in system security is the process of giving the user permission to access a specific resource or function. Encryption in cyber security is the conversion of data from a readable format into an encoded format.<\/p>\n

Question 3.<\/p>\n

Caesar Cipher is :<\/h2>\n

(A) used for conversion of the actual message into an encrypted message
\n(B) an encryption technique
\n(C) both (A) and (B)
\n(D) None of the above
\nAnswer:
\n(C) both (A) and (B)<\/p>\n

Explanation:
\nIn cryptography, a Caesar cipher, also known as shift cipher, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.<\/p>\n

Question 4.<\/p>\n

Person ‘X’ has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called :<\/h2>\n

(A) Conversion
\n(B) Encryption
\n(C) Decryption
\n(D) None of the above
\nAnswer:
\n(C) Decryption<\/p>\n

Explanation:
\nThe conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.<\/p>\n

\"MCQ<\/p>\n

Question 5.<\/p>\n

A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?<\/h2>\n

(A) GSQTZXIV
\n(B) GSQTYXIV
\n(C) GSXTYXIV
\n(D) GSQSYXIV
\nAnswer:
\n(B) GSQTYXIV<\/p>\n

Explanation:
\nData encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.<\/p>\n

Question 6.<\/p>\n

An encryption algorithm is used to transform a readable message into:<\/h2>\n

(A) Text message
\n(B) Simple message
\n(C) Converted message
\n(D) Encrypted message
\nAnswer:
\n(D) Encrypted message<\/p>\n

Explanation:
\nAn encryption algorithm is a component for electronic data transport security. Actual mathematical steps are taken and enlisted when developing algorithms for encryption purposes, and. varying block ciphers are used to encrypt electronic data or numbers.<\/p>\n

Question 7.<\/p>\n

In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.<\/h2>\n

(A) 0
\n(B) 26
\n(C) both (A) and
\n(D) None of the above
\nAnswer:
\n(C) both (A) and<\/p>\n

Explanation:
\nThe Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher is based on transposition and involves shifting each letter of the plaintext message by a certain number of letters<\/p>\n

II. World Wide Web World Wide Web (WWW) or simply web is a set of programs, standards and protocols that allows the multimedia and hypertext files to be created, displayed and linked on the Internet. The World Wide Web was invented by British scientist Tim Berners-Lee in 1989 while working at CERN. It became publicly available on Internet for the first time. The Internet is the physical network of computers all over the world. The World Wide Web is a virtual network of web sites connected by hyperlinks (or “links”). Web sites are stored on servers on the internet, so, the World Wide Web is a part of the Internet. In 1969, the US Department of Defense, approved a project named ARPANET (Advanced Research Projects Agency Network). In 1970, NSF created a common network called CSNET. A more speedy network NSFnet was built. In 1995, a new name was given to the collection of all networks and was called Internet.<\/p>\n

Question 1.<\/p>\n

WWW stands for<\/h2>\n

(A) World Wide Web
\n(B) Word Wide Web
\n(C) World Way Web
\n(D) Web World Wide
\nAnswer:
\n(A) World Wide Web<\/p>\n

Explanation:
\nWWW stands for World Wide Web. It was developed in the CERN, Switzerland around the early 1990s.<\/p>\n

\"MCQ<\/p>\n

Question 2.<\/p>\n

World Wide Web (WWW) is a set of programs, standards and protocols that allows the multimedia and hypertext files to be created, displayed and linked on the<\/h2>\n

(A) ARPNET
\n(B) CSNET
\n(C) Internet
\n(D) CERN
\nAnswer:
\n(C) Internet<\/p>\n

Explanation:
\nA mean of connecting a computer to any other computer anywhere in the world is called as Internet. The initial Fact idea of the internet is credited to Leonard Kleinrock in 1961.<\/p>\n

Question 3.<\/p>\n

…………… are stored on servers of Internet.<\/h2>\n

(A) WWW
\n(B) Websites
\n(C) Internet
\n(D) Links
\nAnswer:
\n(B) Websites<\/p>\n

Explanation:
\nA website is a collection of publicly accessible web pages and are linked together and share a single domain name.<\/p>\n

Question 4.<\/p>\n

In ……. NSF created a common network called CSNET.<\/h2>\n

(A) 1950
\n(B) 1960
\n(C) 1970
\n(D) 1980
\nAnswer:
\n(C) 1970<\/p>\n

Explanation:
\nThe National Science Foundation (NSF) provided a grant to establish the Computer Science Network (CSNET) to provide networking services to all university computer scientists.<\/p>\n

Question 5.<\/p>\n

ARPANET stands for…………<\/h2>\n

(A) Advanced Research Projects Agency Network
\n(B) Advanced Research Product Agency Network
\n(C) Advanced Research Process Agency Network
\n(D) Advanced Research Plan Agency Network
\nAnswer:
\n(A) Advanced Research Projects Agency Network<\/p>\n

Explanation:
\nThe name of the initial network was the ARPANET (Advanced Research Projects Agency Network). After this beginn-ing, computer networks started getting built in and around the USA. In the early to mid-1970’s additional networks besides ARPAnet came into being.<\/p>\n

\"MCQ<\/p>\n

Question 6.<\/p>\n

The World Wide Web was invented in the year<\/h2>\n

(A) 1988
\n(B) 1989
\n(C) 1990
\n(D) 1992
\nAnswer:
\n(B) 1989<\/p>\n

Explanation:
\nA global network of computer using the internet to exchange web documents is called as WWW. On 6th August 1991, the World Wide Web became publicly available.<\/p>\n

Question 7.<\/p>\n

The World Wide Web is a virtual network of web sites connected by………<\/h2>\n

(A) Hyperlinks
\n(B) Internet
\n(C) Websites
\n(D) World Wide Web
\nAnswer:
\n(A) Hyperlinks<\/p>\n

Explanation:
\nA hyperlink is defined as an icon, graphic or text in a document that links to another file or document.III. IP ADDRESS IP addresses are in aaa.aaa.aaa.aaa format, where each aaa is a number from 0 to 255. The length of IP address is 4 bytes. IP addresses identify the host computers, so that packets of information reached to the correct computer, e.g. 162.192.1.89 The IP address has the following characteristics:<\/p>\n