1.
The feature SoundSentry is used to help peoples with
Correct Answer
C. Auditory Impairments
Explanation
The feature SoundSentry is used to help people with auditory impairments. Auditory impairments refer to any form of hearing loss or difficulty in processing sound. SoundSentry is designed to provide visual alerts or notifications to individuals who may not be able to hear auditory cues or alarms. This feature aims to assist those with auditory impairments by ensuring they receive important information or warnings through visual means, enhancing their ability to perceive and respond to their environment.
2.
The feature "Serial Keys" available in Windows OS is used by peoples having
Correct Answer
C. Difficulty is using Mouse and Keyboard
Explanation
The feature "Serial Keys" available in Windows OS is used by people who have difficulty using the mouse and keyboard. This feature allows users to navigate through the operating system and perform various tasks using only the keyboard. It provides an alternative method of input for individuals who may have physical limitations or disabilities that make it challenging to use a traditional mouse and keyboard setup.
3.
The computer that uses the services and data from the host computer are also called as
Correct Answer
C. Client
Explanation
A computer that uses the services and data from the host computer is referred to as a client. Clients rely on the server to provide them with resources and information. They typically connect to the server over a network and request services or access data. In contrast, a server is a computer that provides services and data to clients. Peer-to-peer refers to a network where computers can act as both clients and servers, sharing resources directly with each other. A standalone computer operates independently without relying on a network or server for services or data.
4.
Which of the following network architecture is biggest among all:
Correct Answer
D. WAN
Explanation
WAN (Wide Area Network) is the largest network architecture among all the options given. It covers a large geographical area, often spanning multiple cities or even countries. WAN connects multiple LANs (Local Area Networks) and allows for communication and data transfer over long distances. MAN (Metropolitan Area Network) covers a smaller area than WAN, typically within a city or town. PAN (Personal Area Network) is the smallest network, usually limited to a person's immediate surroundings. LAN (Local Area Network) is larger than PAN but smaller than WAN, typically covering a building or campus.
5.
The software that is used of access websites are also termed as
Correct Answer
D. Web Browser
Explanation
A web browser is the software used to access websites. It allows users to view and interact with web pages, download files, and navigate the internet. It is specifically designed to interpret and display web content, such as HTML, CSS, and JavaScript. While application software and system software are broader categories that encompass various types of software, a web browser is a specific type of application software that is used exclusively for accessing websites. Therefore, the correct answer is web browser.
6.
The device in network architecture that is used for converting digital data into analog signal and vice-versa _
Correct Answer
B. Modem
Explanation
A modem is a device used in network architecture to convert digital data into analog signals and vice versa. It is commonly used to connect a computer or other digital devices to the internet through a telephone line or cable connection. The modem modulates the digital data from the computer into analog signals that can be transmitted over the telephone line or cable, and then demodulates the analog signals back into digital data at the receiving end. This enables the transmission of data over long distances using existing telephone or cable infrastructure.
7.
The network connectivity that offers highest bandwidth among all are
Correct Answer
C. Cable Internet Access
Explanation
Cable Internet Access offers the highest bandwidth among all the given options. Dial-Up is a slower and outdated technology that uses telephone lines to connect to the internet. Broadband is a general term that encompasses various types of high-speed internet connections, including Cable Internet Access. WiMAX is a wireless broadband technology that provides high-speed internet access over long distances, but its bandwidth is generally lower than that of Cable Internet Access. Therefore, Cable Internet Access is the correct answer as it provides the highest bandwidth among the given options.
8.
Data that are transfered over internet/network are broken down into small pieces called as
Correct Answer
C. Packet
Explanation
When data is transferred over the internet or a network, it is broken down into small pieces called packets. These packets contain a portion of the data along with information such as the source and destination addresses. This fragmentation allows for efficient transmission and delivery of data, as packets can take different routes and be reassembled at the destination.
9.
Which one of the following is a Web based IM (Instant Messaging) service-
Correct Answer
C. Meebo
Explanation
Meebo is a web-based instant messaging service that allows users to chat with their contacts from various instant messaging platforms, such as Yahoo Messenger, Google Talk, and AIM, all in one place. Unlike Skype, which is primarily a voice and video calling service, Meebo focuses on text-based instant messaging. Therefore, Meebo is the correct answer for a web-based IM service.
10.
Fraudulent attempt over internet to obtain sensitive information such as usernames, passwords and credit card details
Correct Answer
C. pHishing
Explanation
Phishing refers to a fraudulent attempt over the internet to obtain sensitive information such as usernames, passwords, and credit card details. In a phishing attack, scammers typically disguise themselves as trustworthy entities, such as banks or popular websites, and send deceptive emails or messages to trick individuals into revealing their personal information. This information is then used for illegal activities, such as identity theft or financial fraud.
11.
Shift key, Ctrl key, Alt key, Windows key are also called as
Correct Answer
D. Modifier key
Explanation
The shift key, Ctrl key, Alt key, and Windows key are referred to as modifier keys because they modify the function of other keys when pressed in combination with them. They do not have specific symbols associated with them like symbol keys, and they are not considered general keys that perform basic functions. Modifier keys are used to enhance the functionality of a keyboard and allow for additional commands and shortcuts to be executed.
12.
______________ refers to the amount of data that a signal can carry.
Correct Answer
A. Protocol
Explanation
Protocol refers to the set of rules and guidelines that govern the communication between devices in a network. It defines how data is transmitted, received, and interpreted. While bandwidth refers to the amount of data that can be transmitted over a network in a given time, it does not specifically indicate the capacity of a signal to carry data. Broadband and cable are types of network connections that can support high bandwidth, but they do not directly determine the amount of data a signal can carry. Therefore, the correct answer is protocol, as it directly relates to the capacity of a signal to carry data.
13.
_____________ means selling and purchasing goods on internet.
Correct Answer
C. E-commerce
Explanation
E-commerce refers to the buying and selling of goods and services over the internet. It involves online transactions, electronic funds transfer, and online shopping. This term encompasses various activities such as online retailing, online marketplaces, and online auctions. Therefore, e-commerce is the correct answer as it specifically relates to the selling and purchasing of goods on the internet.
14.
Which term corresponds to the set of rules used for communication?
Correct Answer
A. Protocol
Explanation
A protocol is a set of rules that governs the way in which data is communicated between devices or systems. It ensures that information is transmitted in a standardized and efficient manner, allowing devices to understand and interpret the data being exchanged. Therefore, the term "protocol" accurately corresponds to the set of rules used for communication. Modem and ISP are not terms that specifically refer to communication rules, and "None of these" is not a valid option as the correct answer is "Protocol".
15.
Which of the social media platform can be used to share your comments for general public
Correct Answer
C. Blog
Explanation
A blog is a social media platform that can be used to share your comments with the general public. Unlike Facebook, WhatsApp, and Twitter, which are more interactive and focused on personal connections, a blog allows individuals to express their thoughts, opinions, and ideas in a more long-form and public manner. It provides a platform for individuals to share their comments with a wider audience, engage in discussions, and receive feedback from readers.
16.
Instant Messaging is based on real time processing
Correct Answer
A. True
Explanation
Instant messaging is a form of communication that allows users to exchange messages in real-time. Unlike email, which operates on a store-and-forward model, instant messaging relies on instant delivery and immediate response. This is achieved through real-time processing, where messages are sent and received instantly, enabling users to have live conversations. Therefore, the statement that instant messaging is based on real-time processing is true.
17.
A __________ connection uses your own telephone lines
Correct Answer
C. DSL
Explanation
DSL stands for Digital Subscriber Line, which is a type of internet connection that uses existing telephone lines to provide high-speed internet access. It allows users to connect to the internet without interfering with their telephone service. Therefore, DSL is the correct answer as it accurately describes a connection that utilizes one's own telephone lines.
18.
Which networking device is used for filtering of data?
Correct Answer
C. Bridge
Explanation
A bridge is a networking device that is used for filtering data. It operates at the data link layer of the OSI model and is responsible for forwarding packets between two network segments based on their MAC addresses. Bridges are used to divide a large network into smaller segments, reducing network congestion and improving overall performance. They examine the source and destination MAC addresses of incoming packets and selectively forward them to the appropriate segment, effectively filtering out unnecessary traffic.
19.
The feature that is allows a user to press and release a modifier key such as ctrl, alt, etc
Correct Answer
B. Sticky ket
Explanation
The correct answer is "Sticky key". Sticky keys is a feature that allows a user to press and release a modifier key such as ctrl, alt, etc, and have it remain active until another key is pressed. This is useful for individuals who may have difficulty pressing multiple keys simultaneously, as it allows them to perform keyboard shortcuts by pressing the keys one at a time.
20.
These keys are designed for peoples having vision impairment:
Correct Answer
C. Toggle key
Explanation
The toggle key is designed for people with vision impairment because it allows them to easily switch between different modes or settings on their device. This key provides a tactile and audible feedback, making it easier for individuals with visual impairments to navigate and use their devices effectively. It helps them toggle between different options or functions without relying solely on visual cues, enhancing their overall user experience.