after lockdown wo

24
Roll. No. ......................... O.M.R. Serial No. B.Com. (PART-III) EXAMINATION, 2021 GROUP - C4 INTERNET AND WORLD WIDE WEB + ESSENTIALS OF E-COMMERCE [ PAPER : Single (V+VI) ] Time : 1 : 30 Hours Max. Marks : 200 Question Booklet Series A Instructions to the Examinee : 1. Do not open this Booklet untill you are told to do so. 2. Candidates should fill their roll number, subject and series of question booklet details correctly, otherwise, in case of any discrepancy in the evaluation, it will be the responsibility of the examinee himself. 3. There are 100 questions in this question booklet, which are divided into two sections. Any 37 questions from the first section and any 38 questions from the second section are to be answered by the examinee. Thus the examinees have to answer only 75 questions. Four alternative answer to each question are given below the question, out of these four only one answer is correct. The answer which you think is correct or most appropriate, completely fill in the circle containing its letter in your answer sheet (O.M.R. Answer Sheet) with black or blue ball point pen. ijh{kkfFkZ;ksa ds fy, funsZ'k % 1. tc rd dgk u tk;s ] bl iz'uiqfLrdk dks u [kks ys aA 2. ijh{kkFkh Z vius vuq Øek a d] fo"k; ,o a i z 'uiq fLrdk dh fljht dk fooj.k ;FkkLFkku lgh&lgh Hkj s a ] vU;Fkk ew Y;ka du es a fdlh Hkh i z dkj dh fola xfr dh n'kk es a mldh ftEes nkjh Lo;a ijh{kkFkh Z dh gk s xhA 3. bl i z 'uiq fLrdk es a 100 i z 'u g S a ] tk s nk s [k.Mk s a es a foHkkftr g S a A iz Fke [k.M ls fdUgh a 37 ,oa f}rh; [k.M ls fdUgh a 38 i z 'uks a ds mÙkj ijh{kkFkh Z }kjk fn; s tkus g S a A bl i z dkj ijh{kkfFk Z ;k s a dk s ds oy 75 i z 'uks a ds mÙkj n s us g S a A i z R;s d i z 'u ds pkj oS dfYid mÙkj i z 'u ds uhps fn;s x;s gS a A bu pkjk s a es a ls ds oy ,d gh mÙkj lgh g S A ftl mÙkj dk s vki lgh ;k lcls mfpr le>rs gS a ] vius mÙkj&i=d (O.M.R. Answer Sheet) es a mlds v{kj okys o` Ùk dk s dkys ;k uhys ck W y Iokb a V i s u ls iw jk Hkj n s a A (Remaining instructions on last page) ¼'ks"k funsZ'k vfUre i`"B ij½ Question Booklet Number Paper ID 2 3 1

Upload: others

Post on 23-Oct-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AFTER LOCKDOWN WO

Roll. No. .........................

O.M.R. Serial No.

B.Com. (PART-III) EXAMINATION, 2021GROUP - C4

INTERNET AND WORLD WIDE WEB + ESSENTIALSOF E-COMMERCE

[ PAPER : Single (V+VI) ]

Time : 1 : 30 Hours Max. Marks : 200

Question BookletSeries

A

Instructions to the Examinee :

1. Do not open this Booklet untill you aretold to do so.

2. Candidates should fill their roll number,subject and series of question bookletdetails correctly, otherwise, in case ofany discrepancy in the evaluation, it willbe the responsibility of the examineehimself.

3. There are 100 questions in this questionbooklet, which are divided into twosections. Any 37 questions from the firstsection and any 38 questions from thesecond section are to be answered bythe examinee. Thus the examineeshave to answer only 75 questions. Fouralternative answer to each question aregiven below the question, out of thesefour only one answer is correct. Theanswer which you think is correct ormost appropriate, completely fill in thecircle containing its letter in your answersheet (O.M.R. Answer Sheet) with blackor blue ball point pen.

ijh{kkfFkZ;ksa ds fy, funsZ'k %

1. tc rd dgk u tk;s] bl iz'uiqfLrdk dks u[kksysaA

2. ijh{kkFkhZ vius vuqØekad] fo"k; ,oa iz'uiqfLrdk dhfljht dk fooj.k ;FkkLFkku lgh&lgh Hkjsa] vU;FkkewY;kadu esa fdlh Hkh izdkj dh folaxfr dh n'kk esamldh ftEesnkjh Lo;a ijh{kkFkhZ dh gksxhA

3. bl iz'uiqfLrdk esa 100 iz'u gSa] tks nks [k.Mksa esa

foHkkftr gSaA izFke [k.M ls fdUgha 37 ,oa f}rh; [k.M

ls fdUgha 38 iz'uksa ds mÙkj ijh{kkFkhZ }kjk fn;s tkus gSaA

bl izdkj ijh{kkfFkZ;ksa dks dsoy 75 iz'uksa ds mÙkj nsus

gSaA izR;sd iz'u ds pkj oSdfYid mÙkj iz'u ds uhps fn;s

x;s gSaA bu pkjksa esa ls dsoy ,d gh mÙkj lgh gSA ftl

mÙkj dks vki lgh ;k lcls mfpr le>rs gSa] vius

mÙkj&i=d (O.M.R. Answer Sheet) esa mlds

v{kj okys oÙk dks dkys ;k uhys ckWy IokbaV isu ls iwjk

Hkj nsaA

(Remaining instructions on last page) ¼'ks"k funsZ'k vfUre i`"B ij½

Question Booklet Number

Paper ID

2 3 1

Page 2: AFTER LOCKDOWN WO

Rough Work @ jQ dk;Z

Page 3: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 3 ) [P.T.O.]

1. Which type of Network is most likely confined

to a Building or a Campus ?

(A) Local Area

(B) Metropolitan Area

(C) Wide Area

(D) Departmental

2. Which best describes support over serial line

communication under the TCP/IP

Protocol ?

(A) SLIP

(B) PPP

(C) Both (A) and (B)

(D) None of the above

3. What does http stand for ?

(A) HTML Text Transfer Protocol

(B) Hyper Text Transfer Protocol

(C) High Transfer Tier Program

(D) HTML Type Transfer Protocol

4. How many bits are in a byte ?

(A) 8

(B) 1

(C) 24

(D) 256

5. Unix is :

(A) a Person

(B) a File

(C) a Program for copying files from one

computer to another

(D) an Operating System

1. fdlh Hkh Hkou vFkok dSEil esa fdl izdkj dk lhfer

usVodZ lcls vf/kd ilUn fd;k tkrk gS \

(A) yksdy ,fj;k

(B) esVªksiksfyVu ,fj;k

(C) okbM ,fj;k

(D) fMikVZesUVy

2. Vh-lh-ih-@vkbZ-ih- izksVksdkWy ds vUrxZr Øfed

js[kk lEizs"k.k gsrq fuEu esa ls lcls vf/kd lg;ksxh

gksrk gS %

(A) fLyi

(B) ih-ih-ih-

(C) nksuksa (A) ,oa (B)

(D) mijksDr esa ls dksbZ ugha

3. ,p-Vh-Vh-ih- dk vFkZ gS %

(A) ,p-Vh-,e-,y- VsDLV VªkWUlQj izksVksdkWy

(B) gkbij VsDLV VªkWUlQj izksVksdkWy

(C) gkbZ VªkWUlQj Vh;j izksxzke

(D) ,p-Vh-,e-,y- Vkbi VªkWUlQj izksVksdkWy

4. ,d ckbV esa fdrus fcV gksrs gSa \

(A) 8

(B) 1

(C) 24

(D) 256

5. ;wfuDl gS %

(A) ,d O;fä

(B) ,d Qkby

(C) ,d dEI;wVj ls nwljs dEI;wVj esa Qkby dkWih

djus dk izksxzke

(D) ,d vkWijsfVax flLVe

PAPER-V INTERNET AND WORLD WIDE WEB

Page 4: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 4 )

6. oh-vkj-,e-,y- gS %

(A) fotqvy fj;yVh ekWdZ&vi ySaXost

(B) opqZvy fj;yVh ekWdZ&vi ySaXost

(C) opqZvy fj;yVh ekWMfyax ySaXost

(D) fotqvy fj;yVh ekWMfyax ySaXost

7. izR;sd ,p-Vh-,e-,y- vkWys[k esa lekfgr gksrk

gS %

(A) ,p-Vh-,e-,y- VSx

(B) ckWMh VSx

(C) VkbVy VSx

(D) gsM VSx

8. osc ifCyf'kax dk nwljk vFkZ gksrk gS %

(A) MkWmuyksfMax

(B) viyksfMax

(C) ÝhyksfMax

(D) vuyksfMax

9. baVjusV mi;ksx djrk gS %

(A) iSdsV fLofpax

(B) lfdZV fLofpax

(C) VsyhQksu fLofpax

(D) VsysDl fLofpax

10. ,d lpZ batu fuEufyf[kr dks [kkstus dk ,d

izksxzkWe gksrk gS %

(A) lwpukvksa gsrq

(B) osc i"B gsrq

(C) fof'k"V lwfp;ksa gsrq osc i"B

(D) fof'k"V [kksth lwpukvksa gsrq osc i"B

6. VRML is :

(A) Visual Reality Mark-up Language

(B) Virtual Reality Mark-up Language

(C) Virtual Reality Modelling Language

(D) Visual Reality Modelling Language

7. Every HTML document should contain :

(A) HTML Tag

(B) BODY Tag

(C) TITLE Tag

(D) HEAD Tag

8. What is another term for Web Publishing ?

(A) Downloading

(B) Uploading

(C) Freeloading

(D) Unloading

9. Internet uses :

(A) Packet Switching

(B) Circuit Switching

(C) Telephone Switching

(D) Telex Switching

10. A Search Engine is a program to search :

(A) Information

(B) Web Pages

(C) Web Pages for Specified Index Terms

(D) Web Pages for Information using

Specified Search Terms

Page 5: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 5 )

11. Iyx&bu gS] ,d %

(A) lkW¶Vos;j

(B) gkMZos;j

(C) fof'k"V mn~ns';ksa gsrq iz;ksx gksus okys lkW¶Vos;j

o gkMZos;j

(D) ¶yS'k Iys;j

12. ,l-,l-,y- gS] ,d %

(A) fLØfIVax ySaXost

(B) czkmtj

(C) lqj{kk lEcU/k

(D) lays[ku lk/ku

13. baVjusV dks fdl ek/;e dk iz;ksx djrs le;

ekWMe dh vko';drk ugha gksrh gS \

(A) okbZ&QkbZ

(B) ySu

(C) dscy

(D) mi;qZDr esa ls dksbZ ugha

14. dksf'kdk vk/kkfjr lajpuk dgykrh gS %

(A) ySu

(B) ,-Vh-,e-

(C) ,Q-Mh-Mh-vkbZ-

(D) DykbaV&loZj

15. MsVk fyad Lrj ij v'kqf) [kkst izkIr dh tkrh

gS %

(A) iSfjVh

(B) gSfeax dksM

(C) pØh; vuko';d dksM

(D) lekuhdj.k

11. Plug-in is a :

(A) Software

(B) Hardware

(C) Software and Hardware both used for

specified purposes

(D) Flash Player

12. SSL is a :

(A) Scripting Language

(B) Browser

(C) Secure Connection

(D) Authoring Tool

13. A Modem is not needed when accessing the

Internet through :

(A) Wi-Fi

(B) LAN

(C) Cable

(D) None of the above

14. Cell base architecture is known as :

(A) LAN

(B) ATM

(C) FDDI

(D) Client-Server

15. Error Detection at a data link level is achieved

by :

(A) Parity

(B) Hamming Code

(C) Cyclic Redundancy Code

(D) Equalization

[P.T.O.]

Page 6: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 6 )

16. ,l-,e-Vh-ih- fdlls lEc) gS \

(A) Vh-lh-ih-@vkbZ-ih-

(B) MCY;w-MCY;w-MCY;w-

(C) baVjusV vUos"kd

(D) bySDVªkWfud esy

17. ,d ,iysV gS %

(A) osc i"B ij iznf'kZr ,d fp=

(B) ,d izksxzke tks nwljh ,Yihds'ku esa fufgr gks

ldrk gS

(C) ,p-Vh-,e-,y- izksxzke dk VSx

(D) lqj{kk izksVksdkWy

18. dEI;wVj lqj{kk gsrq fuf"Ø; vk'kadk gS %

(A) nqHkkZoukiw.kZ iz;kstu

(B) {kfriw.kZ fØ;k

(C) la;ksfxd =qfV

(D) tklwl izfrfuf/k

19. ________ dk iz;ksx ^mu iz;ksxdrkZvksa* dk irk

yxkus esa gksrk gS tks osclkbV ij nksckjk vkrs gSaA

(A) Iyx&bUl

(B) dqdht

(C) fLØIV~l

(D) ,-,l-ih-

20. cgqmn~ns'kh; baVjusV esy foLrkj ¼,e-vkbZ-,e-

bZ-½ fodflr fd;k x;k %

(A) fyf[kr] Jo.kh; ,oa pyfp=kRed bZ&esy lans'kksa

ds lg;ksx gsrq

(B) ,Q-Vh-ih- DykbaV lg;ksx gsrq

(C) nks e'khuksa ds e/; VsyusV lg;ksx gsrq

(D) dsoy fyf[kr vk/kkfjr bZ&esy lans'kksa ds lg;ksx

gsrq

16. SMTP is associated with :

(A) TCP/IP

(B) WWW

(C) Internet Explorer

(D) Electronic Mail

17. An Applet is a :

(A) Picture displayed on a Web Page

(B) Program that can be embedded in

another Application

(C) Tag in HTML Program

(D) Security Protocol

18. A Passive threat to computer security is :

(A) Malicious Intent

(B) Sabotage

(C) Accident Errors

(D) Espionage Agents

19. ________ are used to identify a user who

returns to a website.

(A) Plug-ins

(B) Cookies

(C) Scripts

(D) ASPs

20. Multipurpose Internet Mail Extension (MIME)

was developed :

(A) To support E-mail Messages Containing

Text, Audio and Video

(B) To support FTP clients

(C) To support Telnet between two machines

(D) To Support Text-based E-mail messages

only

Page 7: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 7 )

21. osc ØkWyj D;k gS \

(A) ,d dEI;wVj okW;jl

(B) ,d czkmtj

(C) osclkbV~l dh lwph iznkrk izksxzke

(D) ,d gSdj leqnk; tks osclkbV~l gSd djrk gS

22. dkWihjkbV dkuwu j{kk djrk gS %

(A) ewrZ lEifÙk dh

(B) vewrZ lEifÙk dh

(C) fof'k"V eky vFkok lsok ds uke dh

(D) fofHkUu Lo:iksa dh vfHkO;fDr;ksa ls lesfdr

fopkj dh

23. izksVksdkWy gSa %

(A) lapkj vo;oksa ,oa MsVk VfeZuy midj.kksa }kjk

lapkj ls lEcfU/kr Bgjko

(B) MsVk LFkkukUrj.k ls lEcfU/kr rkfdZd lapkj

pSuy

(C) MsVk LFkkukUrj.k ls lEcfU/kr 'kkjhfjd ¼HkkSfrd½

lapkj pSuy

(D) mi;qZDr esa ls dksbZ ugha

24. MsVk lapkj dk dkSu&lk izdkj Øfed lapkj fyad esa

MsVk lapkfjr djus ds fy, iz;ksx gksrk gS \

(A) flEiysDl

(B) v)Z MqIysDl

(C) iw.kZ MqIysDl

(D) mi;qZDr lHkh

25. ckWM dk vFkZ gS %

(A) izfr bdkbZ le; esa lapkfjr fcV~l dh

la[;k

(B) ladsr ifjofrZr gksus dh nj

(C) izfr bdkbZ le; esa lapkfjr ckbV~l dh

la[;k

(D) mi;qZDr esa ls dksbZ ugha

21. What is a Web Crawler ?

(A) A Computer virus

(B) A Browser

(C) A Program that index websites

(D) A Hacker Community who hacks

websites

22. Copyright law protects :

(A) Tangible Property

(B) Intangible Property

(C) The name of a particular good or service

(D) Ideas contained in varied forms of

expression

23. Protocols are :

(A) Agreements on how communication

components and DTE’s are to

communicate

(B) Logical communication Channels for

transferring data

(C) Physical communication channels used

for transferring data

(D) None of the above

24. Which data communication method is used

to transmit the data over a serial

communication link ?

(A) Simplex

(B) Half Duplex

(C) Full Duplex

(D) All of the above

25. Baud means :

(A) The number of bits transmitted per unit

time

(B) The rate at which the signal changes

(C) The number of bytes transmitted per unit

time

(D) None of the above

[P.T.O.]

Page 8: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 8 )

26. IRC stands for :

(A) Internet Related Chat

(B) Internet Related Content

(C) Internet Reliable Content

(D) Internet Relay Chat

27. Physical addresses will change from :

(A) Point-to-Point

(B) Sender to Receiver

(C) Hop to hop

(D) Frame to Frame

28. A can receive his e-mail, but he cannot send

e-mail. Which of the following is most likely

causing his problem ?

(A) SMTP

(B) POP3

(C) IMAP

(D) UART

29. A Proxy Firewall Filters at the :

(A) Physical Layer

(B) Application Layer

(C) Data Link Layer

(D) Network Layer

30. A web page displays a picture. What tag was

used to display that picture ?

(A) Picture

(B) Image

(C) img

(D) src

26. vkbZ-vkj-lh- dk vFkZ gS %

(A) baVjusV lEcfU/kr ckrphr

(B) baVjusV lEcfU/kr lkexzh

(C) baVjusV fo'oluh; lkexzh

(D) baVjusV izlkj.k lkexzh

27. HkkSfrd irs ifjofrZr gksaxs %

(A) fcUnq ls fcUnq rd

(B) izs"kd ls izkIrdrkZ

(C) gkWi Vw gkWi

(D) <k¡pk ls <k¡pk

28. A viuk bZ&esy izkIr rks djrk gS ij bZ&esy Hkst

ugha ldrkA fuEu esa ls mldh leL;k dk izeq[k

dkj.k D;k gS \

(A) ,l-,e-Vh-ih-

(B) ih-vks-ih- 3

(C) vkbZ-,e-,-ih-

(D) ;w-,-vkj-Vh-

29. ,d izfrfuf/k Qk;jokWy fQYVj gksrs gSa %

(A) HkkSfrd ijr

(B) ,Iyhds'ku ijr

(C) MsVk lEidZ ijr

(D) usVodZ ijr

30. ,d osci"B ,d fp= iznf'kZr djrk gSA bl fp=

dks iznf'kZr djus esa dkSu&lk VSx iz;ksx gksxk \

(A) fiDpj

(B) best

(C) vkbZ,eth

(D) ,lvkjlh

Page 9: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 9 )

31. Google Service is an example of :

(A) A DNS server

(B) A database server

(C) A Portal

(D) A Search Engine

32. The tag used in HTML to link it with other

URL’s is :

(A) <H>

(B) <A>

(C) <U>

(D) <L>

33. What product did Amazon First sell ?

(A) Online Advertising

(B) Books

(C) Music

(D) DVDs and Videos

34. A valid e-mail address is :

(A) [email protected]

(B) @[email protected]

(C) vrm.india.com

(D) [email protected]

35. Which type of Physical cable has the fastest

transmission speed ?

(A) Twisted-wire pairs

(B) Co-axial cable

(C) Fiber optic cable

(D) Micro-wave

31. xwxy lsok,¡ ,d mnkgj.k gSa %

(A) ,d Mh-,u-,l- loZj dk

(B) ,d MsVkcsl loZj dk

(C) ,d iksVZy dk

(D) ,d lpZ batu dk

32. ,p-Vh-,e-,y- esa dkSu&lk VSx nwljs ;w-vkj-,y-

ls lEidZ ds fy, mi;ksx gksrk gS \

(A) <H>

(B) <A>

(C) <U>

(D) <L>

33. ,estu us lcls igys dkSu&lk mRikn cspk Fkk \

(A) vkWuykbu foKkiu

(B) iqLrdsa

(C) laxhr

(D) Mh-oh-Mh- o pyfp=

34. ,d oS/k bZ&esy irk gS %

(A) [email protected]

(B) @[email protected]

(C) vrm.india.com

(D) [email protected]

35. fuEu esa ls dkSu&ls HkkSfrd rkj dh gLrkarj.k xfr

lcls rst gksrh gS \

(A) ?kqek;k gqvk rkj dh tksM+h

(B) pkj ijrh rkj

(C) vf{krUrq ra= rkj

(D) ekbØks ¼lw{e½ rjax

[P.T.O.]

Page 10: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 10 )

36. Which of the following is used to send or

receive files between two computers ?

(A) FTP

(B) SLIP

(C) URL

(D) Internet Explorer

37. IP address of a Packet is normally analyzed

by :

(A) CPU

(B) Router

(C) Modem

(D) Hub

38. A Spider is :

(A) a Browser

(B) a Computer virus

(C) a Program that catalogs websites

(D) a Hacker community

39. A Web Publishing tool developed by

Microsoft is :

(A) Netscape Navigator

(B) Hot Metal

(C) Page Mill

(D) Front Page

40. On Internet, which version of the Internet

Protocol is the most widely used :

(A) IPv1

(B) IPv6

(C) IPv4

(D) IPv2

36. nks dEI;wVlZ ds e/; Qkby Hkstus o izkIr djus gsrq

fuEu esa ls fdldk iz;ksx gksrk gS \

(A) ,Q-Vh-ih-

(B) fLyi

(C) ;w-vkj-,y-

(D) baVjusV vUos"kd

37. ,d iSdsV ds vkbZ-ih- irs dks fo'ysf"kr fd;k tkrk

gS %

(A) lh-ih-;w- }kjk

(B) jkmVj }kjk

(C) ekWMe }kjk

(D) gc }kjk

38. ,d LikbMj gS %

(A) ,d czkmtj

(B) ,d dEI;wVj okW;jl

(C) osclkbV lwph iznkrk izksxzke

(D) ,d gSsdj leqnk;

39. ekbØkslkW¶V }kjk fodflr ,d osc izdkf'kr midj.k

gS %

(A) usVLdsi usohxsVj

(B) gkWV esVy

(C) ist fey

(D) ÝaV ist

40. b.VjusV ij] b.VjusV izksVksdkWy dk dkSu&lk laLdj.k

lcls vf/kd mi;ksx gksrk gS \

(A) IPv1

(B) IPv6

(C) IPv4

(D) IPv2

Page 11: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 11 )

41. How many layers are there is in the OSI

model ?

(A) 7

(B) 3

(C) 5

(D) 10

42. Which TCP port is used by a web server to

serve web pages ?

(A) 8

(B) 80

(C) 25

(D) 23

43. Which of the following file is not compiled,

but is a simple ASCII text file that can be

parsed ?

(A) Java

(B) C++

(C) VRML

(D) Word

44. A smiley in chatting on Internet is also known

as :

(A) Punctuation

(B) Acronym

(C) Emoticon

(D) Icon

45. Website means :

(A) URL+Web Space+HTML Content

(B) URL+Web Space+Name Resolution

(C) URL+Web Space+Name Resolution+

HTML Content

(D) HTML Content+Web Space+Name

Resolution

41. vks-,l-vkbZ- ekWMy esa fdruh ijrsa gksrh gSa \

(A) 7

(B) 3

(C) 5

(D) 10

42. ,d osc loZj }kjk osc i"Bksa dks [kkstus ds fy,

dkSu&lk Vh-lh-ih- iksVZ mi;ksx gksrk gS \

(A) 8

(B) 80

(C) 25

(D) 23

43. fuEufyf[kr esa ls dkSu&lh Qkby ladfyr ugha gS]

ijUrq ,d lkekU; ,-,l-lh-vkbZ-vkbZ- fyf[kr

Qkby gS tksfd fu:fir gks ldrh gS %

(A) tkok

(B) lh$$

(C) oh-vkj-,e-,y-

(D) oMZ

44. baVjusV ij ckrphr esa iz;ksx gksus okyh fLefr;qDr

fp= (Smiley) gSa %

(A) fojke fpUg

(B) ifjo.khZ 'kCn

(C) beksVhdkWu

(D) vkWbdku ¼izfrek½

45. osclkbV dk vFkZ gS %

(A) ;w-vkj-,y-$osc Lisl$,p-Vh-,e-,y- lkexzh

(B) ;w-vkj-,y-$osc Lisl$uke izLrko

(C) ;w-vkj-,y-$osc Lisl$uke izLrko$,p-Vh-

,e-,y- lkexzh

(D) ,p-Vh-,e-,y- lkexzh$osc Lisl$uke

izLrko[P.T.O.]

Page 12: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 12 )

46. What protocol does PPP use to identify the

Network Layer Protocol ?

(A) NCP

(B) ISDN

(C) LCP

(D) HDLC

47. In this topology, there is a Central Controller

or hub :

(A) Mesh

(B) Star

(C) Ring

(D) Bus

48. The 4 byte IP Address consists of :

(A) Network Address

(B) Host Address

(C) Both (A) and (B)

(D) None of the above

49. WWW is based on which model ?

(A) Local-Server

(B) 3-tier

(C) Client-server

(D) None of the above

50. Integrated Services for Digital Network

(ISDN) is a set of communication standards

for simultaneous digital transmission of :

(A) Voice

(B) Video

(C) Data

(D) All of the above

46. ih-ih-ih- latky ijr izksVksdkWy dks igpkuus ds

fy, fdl izksVksdkWy dk iz;ksx djrk gS \

(A) ,u-lh-ih-

(B) vkbZ-,l-Mh-,u-

(C) ,y-lh-ih-

(D) ,p-Mh-,y-lh-

47. bl lkafLFkfr ¼VksiksykWth½ esa ,d dsUnzh; fu;U=d

vFkok gc gksrh gS %

(A) es'k

(B) LVkWj

(C) fjax

(D) cl

48. 4 ckbV vkbZ-ih- ,Mªsl fufgr gksrk gS %

(A) latky ,Mªsl

(B) vfrFks; ,Mªsl

(C) nksuksa (A) ,oa (B)

(D) mi;qZDr esa ls dksbZ ugha

49. MCY;w-MCY;w-MCY;w- fdl ekWMy ij vk/kkfjr gS \

(A) LFkkuh; loZj

(B) 3 Lrjh;

(C) xzkgd loZj

(D) mi;qZDr esa ls dksbZ ugha

50. fMftVy latky gsrq ,dhÑr lsok ¼vkbZ-,l-Mh-

,u-½ fuEu esa ls fdu ledkfyd fMftVy gLrkUrj.k

cuk;k x;k lapkj ekudksa dk lewg gS \

(A) Loj

(B) pyfp=

(C) MkVk

(D) mi;qZDr lHkh

Page 13: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 13 )

51. Websites use_______to compile personal

information on their visitors and, then use the

information to create customer profiles.

(A) Cookies

(B) Transition Pages

(C) Registration Form

(D) Both (A) and (C)

52. When measuring the effectiveness on an online

advertisement, the______is the percentage of

visitors to a page who click on advertisement.

(A) Click-through Rate

(B) Click Ratio

(C) Click Rate

(D) Hit Ratio

53. ________is a private corporate Network that

uses standard Internet Protocols and Interfaces.

(A) Ethernet

(B) Intranet

(C) Extranet

(D) LAN

54. Consumer Interaction, the essence of Consumer

Focused (B to C) e-commerce, is the front end

to_______.

(A) The Value Chain (Intra-Business E-

commerce)

(B) The Supply Chain (B2B E-commerce)

(C) Both of the above

(D) None of the above

55. Intra-business e-commerce is sometimes

called_____ E-commerce.

(A) B2C

(B) B2B

(C) B2G

(D) None of the above

51. osclkbV~l vius vkxUrqdksa dh futh lwpukvksa ds

ladyu ,oa muls xzkgd :ijs[kk rS;kj djus gsrq

fuEu esa ls fdldk iz;ksx djrh gS \

(A) dqdht

(B) ifjorhZ i"B

(C) iathdj.k izi=

(D) mi;qZDr (A) ,oa (C)

52. fdlh Hkh vkWuykbu foKkiu dh izHkko'khyrk dks

ukius gsrq fuEu esa ls vkxUrqdksa] tks foKkiu ij

fDyd djrs gSa] dk izfr'kr gS %

(A) fDyd&Fkwz nj

(B) fDyd vuqikr

(C) fDyd nj

(D) fgV vuqikr

53. fuEu esa ls ,d futh] fuxeh; latky gS tksb.VjusV izksVksdkWy ,oa varjQydksa ds ekudksa dkiz;ksx djrk gS] gS %(A) bFkjusV(B) bUVªkusV(C) ,DlVªkusV

(D) ySu

54. miHkksDrk laokn] tks miHkksDrk mUeq[k bZ&dkelZ dk

lkj gS] dk vxzkUr gksrk gS %

(A) ewY; Üka[kyk ¼vkUrfjd O;olk; bZ&dkWelZ½

(B) iwfrZ Üka[kyk ¼ch-Vw-ch- bZ&dkWelZ½

(C) mi;qZDr nksuksa

(D) mi;qZDr dksbZ ugha

55. vkUrfjd O;olk; bZ&dkWelZ dks dHkh&dHkh dgk

tkrk gS %

(A) ch-Vw-lh-

(B) ch-Vw-ch-

(C) ch-Vw-th-

(D) mi;qZDr dksbZ ugha

PAPER-VI ESSENTIALS OF E-COMMERCE

[P.T.O.]

Page 14: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 14 )

56. Which of the following describes E-commerce ?

(A) Buying Products from each other

(B) Buying services from each other

(C) Selling services from each other

(D) All of the above

57. Digital Products are best suited for B2C

e-commerce because they :

(A) are commodity like products

(B) can be mass-customized and personalized

(C) can be delivered at the time of purchase

(D) All of these

58. What is an arrangement made between E-

commerce sites that direct users from one site

to another ?

(A) Spam

(B) Viral Marketing

(C) Affiliate Programs

(D) None of these

59. What are materials that are necessary for

running a modern corporation, but do not relate

to the company's primary business activities ?

(A) Direct Materials

(B) Indirect Materials

(C) EDI

(D) None of these

60. What does Porter's five forces model

determine ?

(A) The relative attractiveness of an industry

(B) The competitive advantage of a competitor

(C) The distribution chain of a competitor

(D) The relative attractiveness of another

business

56. fuEufyf[kr esa ls D;k bZ&dkWelZ dh O;k[;k djrk

gS \

(A) ,d&nwljs ls mRiknksa dk Ø;

(B) ,d&nwljs ls lsokvksa dk Ø;

(C) ,d&nwljs dks lsokvksa dk foØ;

(D) mi;qZDr lHkh

57. fMftVy mRikn ch-Vw-lh- bZ&dkWelZ ds fy, vuqdwyre

gSa D;ksafd os %

(A) oLrq&ilUn mRikn gksrs gSa

(B) O;kid :i ls vuqdwfyr ,oa O;fDrxr gks

ldrs gSa

(C) Ø; ds le; gh mudh lqiqnZxh gks ldrh gS

(D) mi;qZDr lHkh

58. fuEu esa ls D;k bZ&dkWelZ lkbV~l dh ,d O;oLFkk

i)fr gS ftlesa miHkksxdrkZvksa dks ,d lkbV ls

nwljh lkbV ij funsZf'kr fd;k tkrk gS \

(A) LiSe

(B) ok;jy foi.ku

(C) lgc) izksxzke

(D) mi;ZqDr dksbZ ugha

59. og D;k lkexzh gS tks ,d vk/kqfud fuxe dks

pykus ds fy, vko';d gS] ijUrq ftudk dEiuh

dh izkFkfed fØ;kvksa ls dksbZ lEcU/k ugha gS \

(A) izR;{k lkexzh

(B) vizR;{k lkexzh

(C) bZ-Mh-vkbZ-

(D) mi;qZDr dksbZ ugha

60. iksVZj ds ik¡p cy n`"Vkar D;k fu/kkZfjr djrs

gSa \

(A) ,d m|ksx dk lkis{k vkd"kZ.k

(B) ,d izfr;ksxh dEiuh dk izfr;ksxh ykHk

(C) ,d izfr;ksxh dh forj.k Üka[kyk

(D) nwljs O;olk;ksa dk lkis{k vkd"kZ.k

Page 15: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 15 )

61. If it is easy for competitors to enter the market,

the threat of new entrants is considered :

(A) Low

(B) High

(C) More

(D) Less

62. Before starting a new company or expanding

current operations, consider______.

(A) Finance

(B) Porter's Five Forces model

(C) IT

(D) Bankruptcy

63. What type of ad appears on top of a web

page ?

(A) Banner ad

(B) Discount ad

(C) Pop under ad

(D) Pop up ad

64. What is the name for direct computer-

to-computer transfer of transaction information

contained in standard business documents ?

(A) Electronic data interchange

(B) Internet commence

(C) E-commerce

(D) Transaction Information Transfer

65. What is a system that not only captures spoken

words but also distinguishes word groupings to

form sentences ?

(A) Feature Analysis

(B) Pattern Classification

(C) ASR

(D) Language Processing

61. ;fn izfr;ksfx;ksa ds fy, cktkj esa izos'k djuk

vklku gS] rc uokxUrqdksa dh vk'kadk gksrh gS %

(A) fuEu

(B) mPp

(C) vf/kd

(D) U;wu

62. fdlh ubZ dEiuh dks 'kq: djus vFkok orZeku

ifjpkyuksa dks foLrkfjr djus ls igys] fuEu esa ls

fdl ij fopkj fd;k tkrk gS \

(A) foÙk

(B) iksVZj ds ik¡p cy n"Vkar

(C) vkbZ-Vh-

(D) fnokfy;kiu

63. osc i`"B ds Åijh LFkku ij fdl izdkj dk foKkiu

iznf'kZr gksrk gS \

(A) cSuj foKkiu

(B) NwV foKkiu

(C) fuEu ikWi foKkiu

(D) Åijh ikWi foKkiu

64. ekud O;olk; vkys[kksa esa lesfdr ysu&nsu dh

lwpukvksa dk lh/kk dEI;wVj ls dEI;wVj gLrkUrj.k

D;k dgykrk gS \

(A) bysDVªkWfud MkVk b.VjpsUt

(B) b.VjusV dkWelZ

(C) bZ&dkWelZ

(D) ysu&nsu dh lwpukvksa dk LFkkukUrj.k

65. og dkSu&lh iz.kkyh gS tks u dsoy cksys gq, 'kCnksa

dks idM+rh gS ijUrq lkFk gh lkFk okD;ksa dks cukus

gsrq 'kCn lewgksa esa vUrj Hkh djrh gS \

(A) Qhpj fo'ys"k.k

(B) izfr:i foHkktu

(C) ,-,l-vkj-

(D) Hkk"kk izfØ;k

[P.T.O.]

Page 16: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 16 )

66. fuEu esa ls D;k bZ&dkWelZ esa ØsfMV dkWMZ Hkqxrku dks

izekf.kr djrk o laHkkyrk gS \

(A) bZ&dkWelZ xsVos

(B) ises.V xsVos

(C) lkW¶Vos;j xsVos

(D) bZ&okysV~l

67. fuEu esa ls dkSu&lh bZ&dkWelZ osclkbV gS \

(A) ;kgw

(B) fcax

(C) xwxy

(D) vestu

68. ;fn foØsrk ,oa Øsrk nksuksa O;olk; QeZ gksa] rc

fuEu esa ls dkSu&lk bZ&dkWelZ dk izfr:i gS \

(A) ch-Vw-ch-

(B) lh-Vw-lh-

(C) lh-Vw-ch

(D) ch-Vw-lh-

69. fuEu esa ls dkSu&lk yac:i izfr:i dk mnkgj.k gS

\

(A) xwxy

(B) foyst

(C) usV&Ldsi

(D) ;kgw

70. fuEu esa ls dkSu&lk bZ&dkWelZ dk fodYi] Hkqxrku

fu;a=.k gksus rd] p;fur mRiknksa dks j[kus esa

lgk;rk djrk gS \

(A) ckWLdsV

(B) Vsª

(C) dkVZ

(D) mi;ZqDr dksbZ ugha

66. Which of the following authenticates and handles

credit card payment for E-

commerce ?

(A) E-commerce Gateway

(B) Payment Gateway

(C) Software Gateway

(D) E.Wallets

67. Which one is E-commerce website ?

(A) Yahoo

(B) Bing

(C) Google

(D) Amazon

68. What is the model in E-commerce if the seller

and buyer are both business firms ?

(A) B2B

(B) C2C

(C) C2B

(D) B2C

69. Which of the following is an example of vertical

portal ?

(A) Google

(B) Village

(C) Netscape

(D) Yahoo

70. Which option in E-commerce helps to

keep selected products until checkout

payments ?

(A) Basket

(B) Tray

(C) Cart

(D) None of these

Page 17: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 17 )

71. fuEu esa ls dkSu&lk izdkj ^uhykeh dk lkSnk

gS \

(A) ch-Vw-ch-

(B) ch-Vw-lh-

(C) lh-Vw-ch-

(D) lh-Vw-lh-

72. bZ&dkWelZ ds ch-Vw-lh- izdkj esa foØ; gsrq lcls

vPNk mRikn dkSu&lk gS \

(A) NksVs mRikn

(B) fMthVy mRikn

(C) fof'k"V mRikn

(D) rkts mRikn

73. leLr O;kolkf;d vko';drkvksa dk lek/kku

gS %

(A) bZ-vkj-ih-

(B) bZ-Mh-vkbZ-

(C) ,l-lh-,e-

(D) mi;qZDr esa ls dksbZ ugha

74. bZ&dkWelZ dk fuEu esa ls ,d dk;Z gS %

(A) foi.ku

(B) foKkiu

(C) Hk.Mkj.k

(D) mi;qZDr lHkh

75. fuEu esa ls xzkgdksa dk izfr'kr gS tks fdlh osolkbM

dk Hkze.k djrs gSa ,oa okLro esa dqN Ø; djrs gSa]

dgykrk gS %

(A) lgc) izksxzke

(B) LiSe

(C) fDyd&Fkwz

(D) ifjorZu nj

71. Which type deals with auction ?

(A) B2B

(B) B2C

(C) C2B

(D) C2C

72. The best product to sell in B2C E-commerce are

:

(A) Small products

(B) Digital products

(C) Speciality products

(D) Fresh products

73. The solution for All Business Needs is :

(A) ERP

(B) EDI

(C) SCM

(D) None of the above

74. Which is a function of E-commerce ?

(A) Maketing

(B) Advertising

(C) Warehousing

(D) All of the above

75. What is the percentage of customers who visit a

website and actually buy something called ?

(A) Affiliate Program

(B) Spam

(C) Click-through

(D) Conversion Rate

[P.T.O.]

Page 18: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 18 )

76. ØsfMV dkWMZ os IykWfLVd dkWMZ~l gSa ftu ij fMftVy

lwpukvksa dks ,df=r djus ds fy, fpi lfUufgr

gksrh gS] os dgykrs gSa %

(A) xzkgd lEcU/k izcU/k iz.kkyh dkWMZ~l

(B) bZ&ljdkjh igpku dkWMZ

(C) LekWVZ dkWMZ

(D) QsMh dkWMZ

77. bZ&dkWelZ esa ,-,y-bZ- dk iwjk uke D;k gS \

(A) ,Iyhds'ku fyad ,ecsfMax

(B) ,Iyhds'ku fyad bysDVªkWfuDl

(C) ,Iyhds'ku yhdst ,uscfyax

(D) mi;qZDr esa ls dksbZ ugha

78. vks-,y-,Dl- osclkbV lkSnk djrh gS %

(A) Qkbyksa dks viyksM djuk

(B) mRiknksa dk Ø;&foØ;

(C) vkys[kksa dks [kkstuk

(D) Qkbyksa dks nksckjk izkIr djuk

79. fuEu esa ls bZ&dkWelZ dk ,d dk;Z gS %

(A) foi.ku

(B) foKkiu

(C) Hk.Mkj.k

(D) mi;qZDr lHkh

80. ;fn LFkkukiUu mRiknksa vFkok lsokvksa dh vk'kadk

de gksrh gS] ;g gS %

(A) iwfrZdrkZvksa dh gkfu

(B) Øsrk dks ykHk

(C) iwfrZdrkZ dks ykHk

(D) mi;qZDr esa ls dksbZ ugha

76. What are Plastic Cards the size of a Credit Card

that contains an embedded chip an which digial

information can be stored ?

(A) Customer Relationship Management

Systems Cards

(B) E-Government Identity Cards

(C) Smart Cards

(D) Fedi Cards

77. What is the full form of ALE in E-commerce ?

(A) Application Link Embedding

(B) Application Link Electronics

(C) Application Leakage Enabling

(D) None of the above

78. OLX website deals in :

(A) Uploading files

(B) Buying and Selling Products

(C) Searching Documents

(D) Recovering Files

79. Which is a function of E-commerce ?

(A) Marketing

(B) Advertising

(C) Warehousing

(D) All of the above

80. If the threat of substitute products or services is

less, it is a(n) :

(A) Disadvantage to the supplier

(B) Advantage to the buyer

(C) Advantage to the supplier

(D) None of the above

Page 19: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 19 )

81. iSlkis dh lqfo/kk fuEu esa gS %

(A) bZcs-dks-bu

(B) vestu-dkWe

(C) f¶yidkVZ-dkWe

(D) mi;qZDr esa ls dksbZ ugha

82. vf}rh; ewY; uhykeh eq[; :i ls ykxw gksrh

gS %

(A) u;s mRiknksa ij

(B) iqjkus mRiknksa ij

(C) vfHk;kaf=dh mRiknksa ij

(D) mi;qZDr esa ls dksbZ ugha

83. fuEu esa ls D;k lqj{kk ra= ls lEcfU/kr ugha

gS \

(A) dwVys[ku

(B) fodksMu

(C) bZ&dS'k

(D) mi;qZDr lHkh

84. ,d mRikn vFkok lsok tks xzkgdksa }kjk ,d m|ksx

ls vk'kk dh tkrh gS] tks uokxUrqdksa }kjk izLrkfor

gksrh gS] ;fn os izfrLi/kkZ esa cus jguk pkgrs gSa]

dgykrh gS %

(A) izos'k ck/kk,¡

(B) ykxr ifjorZu

(C) fu"Bk dk;ZØe

(D) lgc) dk;ZØe

85. bZ&dkWelZ esa ysu&nsu gksrs gSa %

(A) dsoy dEI;wVj mi;ksx }kjk

(B) bZ&ehfM;k ds mi;ksx }kjk

(C) dsoy eksckby Qksu ds mi;ksx }kjk

(D) mi;qZDr esa ls dksbZ ugha

81. PaisaPay is facilitated in :

(A) eBay.co.in

(B) Amazon.com

(C) Flipkart.com

(D) None of the above

82. Unique value auction is mainly applies to :

(A) New products

(B) Second hand products

(C) Engineering products

(D) None of the above

83. Which of the following is not related to security

mechanism ?

(A) Encryption

(B) Decryption

(C) E-cash

(D) All of the above

84. A product or service that customers have come

to expect from an industry, which must be offered

by new entrants if they wish to compete and

survive, is known as :

(A) Entry barriers

(B) Switching costs

(C) Loyalty programs

(D) Affiliate programs

85. How the transactions, occur in E-commerce ?

(A) Using Computer only

(B) Using E-media

(C) Using Mobile Phones only

(D) None of the above

[P.T.O.]

Page 20: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 20 )

86. fuEu esa ls D;k O;fDrxr xzkgdksa ds vuq:i mRiknksa

dk ltu djrk gS \

(A) vuqdwyu

(B) ,d=hdj.k

(C) izR;{k lkexzh

(D) izfrykse uhykeh

87. fuEu esa ls dkSu&lh baVjusV vk/kkfjr dEiuh gksrh

gS tks baVjusV ij ,d O;fDr }kjk nwljs O;fDr dks

Hkqxrku djus esa ljyrk iznku djrh gS \

(A) bysDVªkWfud pSd

(B) bysDVªkWfud fcy izLrqrhdj.k ,oa Hkqxrku

(C) ifjorZu nj

(D) foÙkh; lkbcj e/;LFk

88. ,d lkW¶Vos;j vkSj lwpukvksa dk lewg] tks Hkqxrku

dh lqj{kk ,oa lwpuk iznku djus ds fy, cuk;k

tkrk gS] dgykrk gS %

(A) fMftVy okWysV

(B) ikWi&vi ,M

(C) 'kkWfiax dkWMZ

(D) dwVys[ku

89. lqjf{kr lkWdsV ijr fuEu esa ls D;k djrh gS \

(A) ,d osc loZj dks lqjf{kr ,oa futh dusD'ku

miyC/k djkuk

(B) lwpukvksa dk dwVys[ku djuk

(C) b.VjusV ij lwpukvksa dks Hkstuk

(D) mi;qZDr lHkh

90. fuEu esa ls D;k ,d izLrkfor mRikn] lsok vFkok

iz.kkyh dk ,d izfr:i gS \

(A) gSfdax

(B) LiwfQax

(C) ØSfdax

(D) MEiLVj Mkbfoax

86. Which of the following refers to creating products

tailored to individual customers ?

(A) Customization

(B) Aggregation

(C) Direct Materials

(D) Reverse Auction

87. Which of the following is an Internet based

company that makes it easy for one person to

pay another over the Internet ?

(A) Electronic Check

(B) Electronic Bill Presentment and Payment

(C) Conversion Rates

(D) Financial Cybermediary

88. A combination of software and information

designed to provide security and information for

payment is called :

(A) Digital wallet

(B) Pop-up ad

(C) Shopping card

(D) Encryption

89. Secure Sockets Layers does which of the

following ?

(A) Creates a secure, private connection to a

web server

(B) Encrypts Information

(C) Sends Information over the Internet

(D) All of the above

90. What is a model of a proposed product, service

or system ?

(A) Hacking

(B) Spoofing

(C) Cracking

(D) Dumpster Diving

Page 21: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 21 )

91. What is a separate and fully equipped facility

where the company can move immediately after

the disaster and resume business ?

(A) Disaster Recovery Plan

(B) Hot site

(C) Cold site

(D) Disaster Recovery Cost Curve

92. Which factor determines who has the right to

access different types of IT systems and

information ?

(A) Availability

(B) Reliability

(C) Accessibility

(D) Scalability

93. What automates business process ?

(A) Workflow

(B) ASP

(C) Workflow System

(D) EIP

94. Which will not harm computer resources ?

(A) Firewall

(B) Virus

(C) Trozan Horse

(D) None of the above

95. Which process can prevent data from lose due

to computer problems or human

errors ?

(A) Recovery

(B) Backup

(C) Benchmarking

(D) Data cleansing

91. fuEu esa ls ,d iFkd ,oa iw.kZr;k% lqlfTtr lqfo/

kk dkSu&lh gS] ftlesa ,d dEiuh vkink ds rqjUr

i'pkr vkxs c<+ ldrh gS ,oa O;olk; iqu% dj

ldrh gS \

(A) vkink izfrykHk ;kstuk

(B) gkWV lkbV

(C) dksYM lkbV

(D) vkink izfrykHk ykxr oØ

92. fuEu esa ls dkSu&lk dkjd fofHkUu izdkj dh vkbZ-

Vh- iz.kkfy;ksa ,oa lwpukvksa rd igq¡pus dk vf/kdkj

j[krk gS \

(A) miyC/krk

(B) fo'oluh;rk

(C) vfHkxE;rk

(D) ekiuh;rk

93. O;kolkf;d izfØ;k dks D;k Lopkfyr djrk gS \

(A) dk;Zizokg

(B) ,-,l-ih-

(C) dk;Zizokg iz.kkyh

(D) bZ-vkbZ-ih-

94. fuEu esa ls D;k dEI;wVj lalk/kuksa dks uqdlku ugha

igq¡pkrk gS \

(A) QkW;joky

(B) ok;jl

(C) Vªkstu gkWlZ

(D) mi;qZDr dksbZ ugha

95. dEI;wVj leL;kvksa ,oa ekuoh; xyfr;ksa ls dkSu&lh

izfØ;k MkVk dks [kksus ls jf{kr djrh gS \

(A) fjdojh

(B) cSdvi

(C) cSapekfdZax

(D) MsVk Dyhuftax

[P.T.O.]

Page 22: AFTER LOCKDOWN WO

KNP/I&WWW+EEC-A/95 ( 22 )

96. fuEu esa ls D;k nwljs O;fDr;ksa dh dEI;wVj iz.kkyh

dks /oLr dj nsrk gS ,oa lwpukvksa dh pksjh o u"V

dj nsrk gS \

(A) lkW¶Vos;lZ

(B) gSdfoftV~l

(C) gSdlZ

(D) fLØIV fdfMt+

97. bZ-vkj-ih- dk v/kZ gS %

(A) m|e ladYi ;kstuk

(B) m|e izfrykse ;kstuk

(C) m|e lalk/ku ;kstuk

(D) mi;qZDr dksbZ ugha

98. fuEu esa ls fdls okW;jl ls gkfu gksrh gS \

(A) dhcksMZ

(B) ekWuhVj

(C) izkslslj

(D) buesa ls dksbZ ugha

99. fuEu esa ls D;k futrk dk vk;ke ugha gS \

(A) O;fDrxr LFkku dh vko';drk

(B) gekjs vf/kdkjksa ij fu;a=.k dh Hkkouk dh

vko';drk

(C) gekjh futh lwpukvksa ij fu;a=.k dh Hkkouk

dh vko';drk

(D) mi;qZDr lHkh futrk ds vk;ke gSa

100. os LekWVZ dkWMZ tks MsVk dks i<+us ,oa fy[kus esa ,aVhuk

dk iz;ksx djrs gSa] dgykrs gSa %

(A) dkWUVsDV LekVZ dkWMZ

(B) dkWUVsDVysl LekVZ dkWMZ

(C) izkWDlhfeVh LekVZ dkWMZ

(D) nksuksa (B) ,oa (C)

96. Who breaks into other peoples' computer system

and steals and destroys information ?

(A) Softwares

(B) Hacktivists

(C) Hackers

(D) Script kiddies

97. ERP stands for :

(A) Enterprise Resolution Planning

(B) Enterprise Reverse Planning

(C) Enterprise Resource Planning

(D) None of the above

98. Which of the following to viruses harm ?

(A) Keyboard

(B) Monitor

(C) Processor

(D) None of the above

99. Which of the followng is not a dimension of

privacy ?

(A) Need for Personal Space

(B) Need to Feel in control of our possessions

(C) Need to feel in control of our personal

information

(D) All of the above are dimensions of privacy

100. The Smart Card which uses antenna for reading

and writing data ?

(A) Contact Smart Card

(B) Contactless Smart Card

(C) Proximity Smart Card

(D) Both (B) and (C)

Page 23: AFTER LOCKDOWN WO

Rough Work @ jQ dk;Z

Page 24: AFTER LOCKDOWN WO

Example :

Question :

Q.1

Q.2

Q.3

If more questions are answered by acandidate than the number assigned foreach section, then only those questionsas previously answered by him/her willbe evaluated.

4. Each question carries equal marks.Marks will be awarded according to thenumber of correct answers you have.

5. All answers are to be given on OMRAnswer Sheet only. Answers givenanywhere other than the place specifiedin the answer sheet will not beconsidered valid.

6. Before writing anything on the OMRAnswer Sheet, all the instructions givenin it should be read carefully.

7. After the completion of the examination,candidates should leave theexamination hall only after providingtheir question booklet and OMR AnswerSheet separately to the invigilator.

8. There will be no negative marking.9. Rough work, if any, should be done on

the blank pages provided for thepurpose in the booklet.

10. To bring and use of log-book, calculator,pager & cellular phone in examinationhall is prohibited.

11. In case of any difference found inEnglish and Hindi version of thequestion, the English version of thequestion will be held authentic.

Impt. On opening the question booklet,first check that all the pages of the questionbooklet are printed properly. If there is anydiscrepancy in the question Booklet, thenafter showing it to the invigilator, get anotherquestion Booklet of the same series.

mnkgj.k %

iz'u %

iz'u 1

iz'u 2

iz'u 3

;fn fdlh ijh{kkFkhZ }kjk izR;sd [k.M gsrq fu/kkZfjr iz'uksals vf/kd iz'uksa ds mÙkj fn;s tkrs gSa] rks mlds }kjkgy fd;s x;s izFker% ;Fkk fufnZ"V iz'uksÙkjksa dk ghewY;kadu fd;k tk;sxkA

4. izR;sd iz'u ds vad leku gSaA vkids ftrus mÙkjlgh gksaxs] mUgha ds vuqlkj vad iznku fd;s tk;saxsA

5. lHkh mÙkj dsoy vks0,e0vkj0 mÙkj&i=d (OMR

Answer Sheet) ij gh fn;s tkus gSaA mÙkj&i=desa fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;kx;k mÙkj ekU; ugha gksxkA

6. vks0,e0vkj0 mÙkj&i=d (OMR Answer

Sheet) ij dqN Hkh fy[kus ls iwoZ mlesa fn;s x;slHkh vuqns'kksa dks lko/kkuhiwoZd i<+ fy;k tk;sA

7. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kddks viuh iz'uiqfLrdk cqdysV ,oa vks0,e0vkj0'khV i`Fkd&i`Fkd miyC/k djkus ds ckn gh ijh{kkd{k ls izLFkku djsaA

8. fuxsfVo ekfdZax ugha gSA9. dksbZ Hkh jQ dk;Z] iz'u&iqfLrdk esa] jQ&dk;Z ds

fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A10. ijh{kk&d{k esa ykWx&cqd] dSYdqysVj] istj rFkk lsY;qyj

Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA

11. iz'u ds fgUnh ,oa vaxzsth :ikUrj.k esa fHkUurk gksus

dh n'kk esa iz'u dk vaxzsth :ikUrj.k gh ekU;

gksxkA

egRoiw.kZ% iz'uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysafd iz'uiqfLrdk ds lHkh i`"B HkyhHkk¡fr Nis gq, gSaA ;fniz'uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks fn[kkdjmlh fljht dh nwljh iz'uiqfLrdk izkIr dj ysaA

A C D

A D

A C D

BA C D

A D

A C D

B