In this page we have given CBSE Board Class 12 Computer Science with Python Book Chapter Mobile Telecommunications Technologies, Network Security and Internet Services MCQ Question and Answer. All the questions below are important for our CBSE Champs.
- Board – CBSE.
- Class – 12
- Subject- Computer Science with Python.
- Topic- MCQ.
- Number of MCQ- 120.
1) It is a device which is portable and is based on cellular network.
a) Pager
b) Mobile
c) Walky-Talky
d) Cordless Phone
Ans – b) Mobile
2) A cellular network is nothing but a …………………..
a) Radio network
b) cable network
c) computer network
d) All of these
Ans – a) Radio network
3) In this network land is divided into the areas called ……………………
a) cells
b) points
c) places
d) venues
Ans – a) cells
4) The network of cells enables the mobile devices to communicate even if they are moving from one cell to another via ……………………..
a) Base stations
b) Railway stations
c) Bus stations
d) None of these
Ans – a) Base stations
5) These ……………….. cell systems were severely constrained by restricted mobility, low capacity, limited service and poor speech quality.
a) Single
b) double
c) triple
d) quarterly
Ans – a) Single
6) The use of ……………… technology and microprocessors made mobile system smaller, lighter, and more sophisticated.
a) bus conductor
b) semi conductor
c) static conductor
d) None of these
Ans – b) semi conductor
7) The 1G Mobile System was introduced in late ……………
a) 1950s
b) 1960s
c) 1970s
d) 1990s
Ans – c) 1970s
8) The 1G mobile system was based on the …………………… cellular technology
a) analog
b) digital
c) catalogue
d) None of these
Ans – a) analog
9) 1G mobile systems voice was modulated to a frequency of about …………….. MHz
a) 50
b) 100
c) 150
d) 200
Ans – c) 150
10) FDMA stands for
a) Frequency Division Multiple Access
b) Frequency Divisible Multiple Access
c) Frequently Divided Multipurpose Access
d) Frequently Distributed Multiple Access
Ans – a) Frequency Division Multiple Access
11) In this each user utilizes a portion of the frequency bandwith available.
a) CDMA
b) FDMA
c) TDMA
d) BDMA
Ans – b) FDMA
12) Each user has its frequency ……………………
a) address
b) number
c) domain
d) signal
Ans – c) domain
13) CDMA stands for
a) Code Division Multiple Access
b) Coding Divisible Multiple Access
c) Coding Divided Multipurpose Access
d) Coded Distributed Multiple Access
Ans – a) Code Division Multiple Access
14) In this each user is allocated a unique code sequence.
a) CDMA
b) FDMA
c) TDMA
d) BDMA
Ans – a) CDMA
15) The receiver decodes the signal according the unique code and recovers the …………….. data
a) fake
b) duplicate
c) original
d) lost
Ans – c) original
16) TDMA stands for
a) Time Division Multiple Access
b) Timing Divisible Multiple Access
c) Timing Divided Multipurpose Access
d) Time Distributed Multiple Access
Ans – a) Time Division Multiple Access
17) In this each user is allowed to transmit only within time intervals.
a) CDMA b) FDMA c) TDMA d) BDMA
Ans – c) TDMA
18) Different users transmit in different ……………… slots.
a) Day b) Memory c) Time d) Address
Ans – c) Time
19) 2G mobile system was introduced in early ……………
a) 1992 b) 1950 c) 1990 d) 1980
Ans – c) 1990
20) The mobile system that uses digital signals for transmission of voice.
a) 1G b) 2G c) 4G d) 3G
Ans – b) 2G
21) This enables the mobile systems to provide paging, SMS, voicemail and fax services.
a) 2G
b) 1G
c) 3G
d) 5G
Ans – a) 2G
22) 2G system was based on …………………….. technology.
a) GSM
b) CDMA
c) FDMA
d) HCM
Ans – a) GSM
23) GSM standard was defined by ETSI in ……………..
a) 1922
b) 1947
c) 1989
d) 1980
Ans – c) 1989
24) GSM stands for
a) Global System for Mobile Communications
b) General System for Mobile Communication
c) Generated System for Mobile Communication
d) None of these
Ans – a) Global System for Mobile Communications
25) GSM is a combination of ………………… and …………………………
a) CDMA and TDMA
b) FDMA and TDMA
c) CDMA and BDMA
d) FDMA and BDMA
Ans – b) FDMA and TDMA
26) With GSM, all subscriber and wireless provider information is stored on interchangeable modules known as ……………..
a) PIN
b) UPIN
c) SIM cards
d) MTPIN
Ans – c) SIM cards
27) SIM stands for
a) Subscriber Identification Module
b) Subscriber Intelligence Module
c) Subscribed Identification Module
d) Subscribed Identified Module
Ans – a) Subscriber Identification Module
28) GPRS stands for
a) General Packet Radio Service
b) General Packed Radio Service
c) Generated Packet Radio Service
d) Generally Packed Radio Service
Ans – a) General Packet Radio Service
29) The mobile technology using packet switched domain instead of circuit switched domain were termed as ……………….. mobile systems.
a) 2G
b) 2.5G
c) 3G
d) 4G
Ans – b) 2.5G
30) The technology which adds multimedia facilities to 2G phones by allowing video, audio and graphics applications.
a) 2G
b) 2.5G
c) 3G
d) 4G
Ans – b) 2.5G
31) The idea behind …………….. is to have a single network standard instead of the different types adopted in the US, Europe and Asia.
a) 2G
b) 2.5G
c) 3G
d) 4G
Ans – c) 3G
32) This mobile system is also known as Universal Mobile Telecommunications System (UMTS) or IMT -2000.
a) 5G
b) 4G
c) 1G
d) 3G
Ans – d) 3G
33) The abbreviation of UMTS is
a) Universal Mobile Telecommunications System
b) Uniformed Mobile Telecommunication System
c) Universally Moduled Telecommunication System
d) Universally Mobility of Telecommunication System
Ans – a) Universal Mobile Telecommunications System
34) This network will be based on packet switching only and is able to support faster transmission.
a) 5G b) 4G c) 1G d) 3G
Ans – b) 4G
35) It deals with policies adopted by network administrators to protect the network from unauthorized access and misuse of network resources.
a) Network Security b) Hacking c) Conditions d) Terms
Ans – a) Network Security
36) This also ensures that the authorized users have adequate access to all the network resources.
a) Network Security b) Hacking c) Conditions d) Terms
Ans – a) Network Security
37) It is a malicious program that infects the host program and gain control over the system without the owner’s knowledge.
a) Trojan horse
b) Virus
c) Spam
d) Worm
Ans – b) Virus
38) It gets spread through external media such as CDs, browsing infected internet sites and from email attachments.
a) Trojan horse
b) Virus
c) Spam
d) Worm
Ans – b) Virus
39) The virus which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions.
a) File Virus b) Macro Virus c) Boot sector virus d) None of these
Ans – a) File Virus
40) The viruses that infects the boot sector of floppy disks or hard drives.
a) File Virus b) Macro Virus c) Boot sector virus d) Spam
Ans – c) Boot sector virus
41) The virus which inserts unwanted words or phrases in the document.
a) File Virus b) Macro Virus c) Boot sector virus d) Cache
Ans – b) Macro Virus
42) It is a malicious program like a virus which does not gets attach to itself to a host program.
a) Virus
b) Spam
c) Trojan horse
d) Worm
Ans – d) Worm
43) A copy of the ………………. scans the network for another machine that has a specific security hole.
a) Virus
b) Spam
c) Trojan horse
d) Worm
Ans – d) Worm
44) It is a malicious program that contains hidden malicious functions and tricks users into installing them by appearing to be legitimate programs
a) Virus b) Spam c) Trojan horse d) Worm
Ans – c) Trojan horse
45) It will contact a central server and reports back information such as passwords, user IDs, and captured keystrokes.
a) Virus b) Trojan horse c) Worm d) Spam
Ans – d) Spam
46) It means endless repetition of worthless text.
a) Virus b) Trojan horse c) Worm d) Spam
Ans – d) Spam
47) In addition to wasting people’s time, ………… also eats up a lot of network bandwidth.
a) Virus b) Worm c) Spam d) Trojan horse
Ans – c) Spam
48) It contains the name of website from which it has come from and a unique ID tag.
a) Cookies
b) worm
c) cache
d) spam
Ans – a) Cookies
49) It is stored on your hard drive until you delete them or they reach their expiry date.
a) cache
b) spam
c) cookies
d) worm
Ans – c) cookies
50) It helps in preventing unauthorized internet users to access private networks connected to the internet.
a) Firewall
b) Antivirus
c) Spyware
d) Network Security
Ans – a) Firewall
51) It examines all (inbound and outbound) traffic routed between the two networks to see if it meets certain criteria.
a) Antivirus
b) Network Security
c) Protocols
d) Firewall
Ans – d) Firewall
52) It is a crime which a computer and internet is used in all legitimate way to harm the user.
a) Theft b) Cyber crime c) Murder d) All of these
Ans – b) Cyber crime
53) These criminals may use computer technology to access personal information, business trade secrets, or use the internet for exploitive or malicious purposes.
a) Murderers b) Drug Peddlars c) Cyber d) Robbers
Ans – c) Cyber
54) The crime which can be against persons or against property or against the government.
a) Theft b) Cyber crime c) Murder d) All of these
Ans – b) Cyber crime
55) The law which is an attempt to integrate the challenges presented by human activity on the internet with legal system of laws applicable to the physical world.
a) Cyberlaw b) Criminal law c) family law d) labour law
Ans – a) Cyberlaw
56) The ………………. law was implemented due to the tendency of misusing of technology has been risen, there was a need of strict statutory laws to regulate the criminal activities in the cyber world and to protect the true sense of technology .
a) Cyberlaw b) Criminal law c) family law d) labour law
Ans – a) Cyberlaw
57) The …………………… Act, 2000 (ITA) was enacted by the Parliament of India to protect the filed of e-commerce, e-governance, e-banking as we as penalties and punishment in the field of Cyber Crimes.
a) Income Tax
b) Industrial
c) Information Technology
d) All of these
Ans – c) Information Technology
58) The Information Technology Act 2000 was amended in the form of IT Amendment Act,
a) 2005 b) 2014 c) 2016 d) 2008
Ans – d) 2008
59) The electronic device with data processing capability, performing computer functions like logical arithmetic and memory functions with input, storage and output capabilities and therefore any high end programmable gadgets like a washing machine or switches and routers used in a network can be brought under this definition.
a) Computer system
b) Network system
c) Security system
d) Cyber
Ans – a) Computer system
60) IPR stands for
a) Indian Public Railway
b) Intellectual Property Rights
c) Internal Property Rights
d) Instrumental Property Rights
Ans – b) Intellectual Property Rights
61) These are the rights which are given to an individual over the invention of their own.
a) Intellectual Property Rights
b) Industrial Rights
c) Human Rights
d) Consumer Rights
Ans – a) Intellectual Property Rights
62) It usually gives the creator an exclusive rights over the use of his/her creation for a certain period of time.
a) Intellectual Property Rights
b) Industrial Rights
c) Human Rights
d) Consumer Rights
Ans – a) Intellectual Property Rights
63) It is used for a specific product designed by an individual.
a) Trademark
b) copyright
c) patent
d) None of these
Ans – c) patent
64) The owner can take a legal action if someone uses the …………………….. without his/her permission.
a) car b) name c) property d) Patent
Ans – d) Patent
65) With the help of ……………… right, the owner can stop others form making using or selling the product design.
a) Trademark b) copyright c) patent d) None of these
Ans – c) patent
66) It can be defined as a name or a different sign or a device identifying a product or a service.
a) Copyright b) Trademark c) Infringement d) Patent
Ans – b) Trademark
67) It is also known as brand name and should be officially registered and legally restricted to the use of the specific person or the company.
a) Patent b) Copyright c) Trademark d) Infringement
Ans – c) Trademark
68) It is the term used for written document and legal action can be taken if copyrights are violated.
a) Copyright b) Trademark c) Infringement d) Patent
Ans – a) Copyright
69) The term hacking was first used by …………… during 1950s and 1960s.
a) M.I.T
b) CIT
c) BIT
d) HIT
Ans – a) M.I.T
70) The terms which is used for the people who are engaged in harmless technical experiments and fun learning activities.
a) Phishing
b) Tracking
c) hacking
d) Cracking
Ans – c) hacking
71) The computer enthusiast who uses his computer programming skills to intentionally access a computer without authorization is known as ……………………
a) Spamming b) Phishing c) Frauds d) hacking
Ans – d) hacking
72) The computer enthusiast who is involved in the activity of hacking by accessing the computer without the intention of destroying data or maliciously harming the computer.
a) Player b) hacker c) destroyer d) None of these
Ans – b) hacker
73) It is a method by which a person who gains unauthorized access to computer with the intention of causing damage.
a) Breaking
b) healing
c) faking
d) cracking
Ans – d) cracking
74) The language which helps in creating and designing web content and has variety of tags, attributes for defining the layout and structure of the web document.
a) XML
b) Java
c) Python
d) HTML
Ans – d) HTML
75) A HTML document has the extension of
a) .docx b).pptx c) .accdb d) .htm or .html
Ans – d) .htm or .html
76) The text which is linked to another document.
a) attach text
b) add text
c) join text d) hyperlink
Ans – d) hyperlink
77) XML stands for
a) Extended Markup Language
b) Expandable Making Language
c) Extensible Markup Language
d) EXtension Marking Language
Ans – c) Extensible Markup Language
78) It is a case sensitive and designed to be self descriptive.
a) HTML b) DDL c) XML d) DML
Ans – c) XML
79) WWW stands for
a) World Wide Web
b) World Wild Web
c) Wide World Web
d) World Wide Wrestling
Ans – a) World Wide Web
80) It is defined as the hypertext information retrieval system on the Internet.
a) WWW
b) WWF
c) WWE
d) WHO
Ans – a) WWW
81) The WWW was invented by
a) Elon Musk
b) Bill Gates
c) James Bond
d) Tim Berners- Lee
Ans – d) Tim Berners- Lee
82) It consists web pages which use HTML to interchange information on the internet.
a) WWW
b) WWF
c) WHO
d) FTP
Ans – a) WWW
83) All the webpages on WWW use …………….. transfer protocol for any information with the capability for making hypertext jumps.
a) FTP
b) TCP/IP
c) HTTP
d) PPP
Ans – c) HTTP
84) It is the electronic document designed in HTML that displays information in textual or graphical form.
a) net page
b) Top page
c) Home page
d) Webpage
Ans – d) Webpage
85) Traversal from one webpage to another web page is possible through ………………….
a) attach text
b) add text
c) join text
d) hyperlink
Ans – d) hyperlink
86) The webpage which displays the same kind of information whenever a user visits it.
a) static
b) dynamic
c) active
d) Sequential
Ans – a) static
87) This webpage only has .htm or .html as extension.
a) active
b) Sequential
c) Static
d) dynamic
Ans – c) Static
88) It is the webpage which uses scripting languages to display the changing content on the webpage.
a) static
b) dynamic
c) active
d) Sequential
Ans – b) dynamic
89) The webpage which has .php, .asp, or .jsp as extension.
a) static
b) active
c) dynamic
d) sequential
Ans – c) dynamic
90) The programming language which can be embedded or integrated with other languages.
a) HTML
b) XML
c) C++
d) Scripting language
Ans – d) Scripting language
91) On some webpages the contents change in response to an action done by the user.
a) Client-Side Scripting
b) Server- Side Scripting
c) Host-Side Scripting
d) Node – Side Scripting
Ans – a) Client-Side Scripting
92) In this technology, the content is generated on the user’s local computer.
a) Client-Side Scripting
b) Server- Side Scripting
c) Host-Side Scripting
d) Node – Side Scripting
Ans – a) Client-Side Scripting
93) The webpages which displays the current time, date forums, submission forms, shopping carts etc.
a) Client-Side Scripting
b) Server- Side Scripting
c) Host-Side Scripting
d) Node – Side Scripting
Ans – b) Server- Side Scripting
94) The webpages which uses applications running on the server to generate the web content.
a) Node-side scripting
b) client-side scripting
c) host-side scripting
d) server-side scripting
Ans – d) server-side scripting
95) It has multiple webpages providing information about a particular entity.
a) Directory b) Dictionary c) Website d) All of these
Ans – c) Website
96) The software program which is used to navigate the webpages on the internet.
a) Website b) Web browser c) Client d) Webpage
Ans – b) Web browser
97) It interprets the coding language of the webpage and displays it in the graphics form.
a) Browser b) Interpreter c) translator d) debugger
Ans – a) Browser
98) The ……………….. of the webpage is written on the address bar tells the web browser which page to access.
a) Postal address
b) web address
c) email address
d) none of these
Ans – b) web address
99) URL stands for
a) Unified Resource Locator
b) Uniform Resource Locator
c) Universally Resource Locator
d) Uniformed Remotely Located
Ans – b) Uniform Resource Locator
100) It the address bar of the browser where the web address of a web page is written.
a) HTML b) URL c) SRL d) VRL
Ans – b) URL
101) It is a formatted text string used to identify a network resource on the internet.
a) URL b) SRL c) XML d) HTML
Ans – a) URL
102) The ………………….. substring identifies the protocol to be used to access the network resource.
a) File Transfer Protocol
b) Transmission Control Protocol
c) Network Protocol
d) Hyper text Transfer Protocol
Ans – c) Network Protocol
103) These ………………….. are short names followed by three characters ‘://’.
a) variables b) strings c) nickname d) username
Ans – b) strings
104) It identifies the host/server that holds the resource.
a) client name b) host name c) cast name d) none of these
Ans – b) host name
105) Host names are mapped into numeric ………………… address.
a) web address b) e-mail address c) IP d) FTP
Ans – c) IP
106) An …………………….. address is a binary number that uniquely identifies computers and other devices on a TCP/IP network.
a) IP b) FTP c) cell address d) web address
Ans – a) IP
107) DNS stands for
a) Domain Name System
b) Domain Name Service
c) Domain Naming Service
d) Domain Naming System
Ans – b) Domain Name Service
108) These servers collaborates to provide mapping between host names and IP addresses.
a) DNRS b) DNS c) DSN d) NDS
Ans – b) DNS
109) This substring contains a path to one specific network resource on the host/server.
a) URL Resource Location
b) URL Resource Locator
c) URL Resource Locality
d) URL Reliable Locator
Ans – a) URL Resource Location
110) The computer or a group of computers that stores webpages on the internet.
a) Web server
b) host server
c) client server
d) node server
Ans – a) Web server
111) It makes use of special programs such as Apache or IIS to deliver webpages to web browser over http protocol.
a) Web server b) host server c) client server d) node server
Ans – a) Web server
112) In order to access a webpage, the user writes the …………….. of the site on the address bar of the browser.
a) name b) sign c) number d) URL
Ans – d) URL
113) It translates the contents into all text, pictures, links, videos etc.
a) website b) web browser c) webpage d) translator
Ans – b) web browser
114) A single ………….. may support multiple websites or a single website may be hosted on several linked servers.
a) Web server b) host server c) client server d) node server
Ans – a) Web server
115) The process of uploading/saving the web content on a web server to make it available on WWW.
a) Web Casting b) Web hosting c) Web declaring d) none of these
Ans – b) Web hosting
116) If a individual or a company wants to make its website available on the internet, it should be ……………….. on a webserver.
a) displayed b) casted c) hosted d) declared
Ans – c) hosted
117) The term web 2.0 was given by …………………….. in 2004.
a) Zenobia Sethna Media
b) Katy Bhavnagri Media
c) Kate Perry Media
d) O’Reilly Media
Ans – d) O’Reilly Media
118) It refers to new generation of dynamic and interactive websites.
a) Web 1.0
b) web 2.0
c) web 3.0
d) web 4.0
Ans – b) web 2.0
119) AJAX stands for
a) Asynchronous JavaScript and XML
b) Asynchronized JavaScripted And XML
c) Asynchronization JavaScript and XML
d) All of these
Ans – a) Asynchronous JavaScript and XML
120) This helps a dynamic website connect to the webserver and download small amount of old databased on the interaction with the user.
a) AJAX b) MAX c) CAMA d) AMAX
Ans – a) AJAX