CCC Topic Wise Practice Set-20 (CCC Email, Social Media and E-Governance)


CCC Online Test 50 Questions


01. SMTP is a simple:




--- Answer is----> B) IP protocol

02. A simple protocol is used for fetching email from a mailbox is__




--- Answer is-----> A) POP3

03. In SMTP the message can be any length.


--- Answer is-----> B) False

04. A protocol used for fetching email from mailbox is POP1 .


--- Answer is-----> B) False

05. A popular application of computer networking is the world wide web of Newsgroup called?




--- Answer is-----> C) Netnews

06. Email address is made up of__?




--- Answer is-----> B) Two parts

07. The program supplied by VSNL when you ask for internet connection for email access is__




--- Answer is-----> C) Pine

08. UUCP is UNIX to UNIX File Copy Protocol.


--- Answer is----->A) True

09. SMTP id stand for?




--- Answer is-----> B) Simple Mail Transfer Protocol

10. All incoming email message are to be stored in the outbox folder.


--- Answer is-----> A) False

11. The Email component of Internet Explorer is called




--- Answer is-----> C) Outlook Express

12. Messenger Mailbox is present in__?




--- Answer is-----> B) Netscape Communicator

13. A convenient place to store contact information for quick retrieval is__?




--- Answer is-----> C) Address box

14. Which of the following statement is not correct for digital signature?




--- Answer is-----> B) It is the scanned image of one's signature

15. Netscape Messenger is the email client packaged with Netscape Communicator 4.0


--- Answer is-----> A) True

16. Which of the following is not a protocol for email?




--- Answer is-----> B) UDP

17. Mail-header is offset from mail body by a line of asteriks.


--- Answer is-----> B) False

18. Recipient's log in name must form a part of his email address.


--- Answer is-----> B) False

19. Email messages are usually addressed and delivered to only one or two people.


--- Answer is-----> A) True

20. The two main file formats for images on the web are GIF and TIFF.


--- Answer is-----> B) False

21. SMTP is associated with electronic mail


--- Answer is-----> A) True

22. Email is limited to text based messages.


--- Answer is-----> B) False

23. The two part of email address is seperated by the @ symbol.


--- Answer is-----> A) True

24. Bounced mail are returned to the sender.


--- Answer is-----> A) True

25. A security attack in which someone inside a company is tricked into running a computer program that sends information from the person's computer to the outsider is known as Trojan Horse.


--- Answer is-----> A) True

26. In any good communication system, the message should be safe and secure.


--- Answer is-----> A) True

27. PCs connected with internet can also e used for education, entertainment, etc.


--- Answer is----->A) True

28. A listserv delivers communications from a large group of people right to your mailbox.


--- Answer is-----> A) True

29. The process of directing a message to the recipient's host is called routing.


--- Answer is-----> A) True

30. A simple protocol used for fetching email from a remote mailbox is POP3.


--- Answer is-----> A) True

31. Messenger allows you to store email addresses in its address book.


--- Answer is-----> A) True

32. A features of using e-commerce is that consumers can make purchases directly from the businesses on internet, saving time for both parties.


--- Answer is-----> A) True

33. E-commerce is not suitable for ?




--- Answer is-----> D) Online job searching

34. Amazon.com comes under the which model?




--- Answer is-----> A) B2C

35. The web pages of your website cannot be connected by hyperlinks.


--- Answer is-----> B) False

36. The power of hypertext is its simplicity and transparency.


--- Answer is-----> A) True

37. Software that may be used to help you to locate web pages on topics that you do not know the addresses for is called search engines.


--- Answer is-----> A) True

38. Identify the odd one out___?




--- Answer is-----> C) ISP

39. Which one is related to internet security?




--- Answer is-----> C) Firewall

40. Firewall cannot protect against viruses.


--- Answer is-----> B) False

41. In order to transfer message in a computer network, we use the techniques called packet switching.


--- Answer is-----> A) True

42. With a valid url a browser can go directly to the page without passing through other documents.


--- Answer is-----> A) True

43. Which of the following topology shares a single channel, on which all stations can receive and transmit?




--- Answer is-----> B) Bus

44. A network that can function without a server is a __?




--- Answer is-----> A) Ring Network

45. CSMA/CD access method is used in bus based network.


--- Answer is-----> A) True

46. WAN is based on ethernet.


--- Answer is-----> B) False

47. Local area network uses bounded medium.


--- Answer is-----> A) True

48. A fiber-optic cable can conduct laser light.


--- Answer is-----> A) True

49. LAN can span large geographic distances.


--- Answer is-----> B) False

50. The term gateway is commonly used to define a facility, which interconnects two networks so that users on one network can communicate with users on another network of a different type.


--- Answer is-----> A) True

Post a Comment

0 Comments