after lockdown wo
TRANSCRIPT
Roll. No. .........................
O.M.R. Serial No.
B.Com. (PART-III) EXAMINATION, 2021GROUP - C4
INTERNET AND WORLD WIDE WEB + ESSENTIALSOF E-COMMERCE
[ PAPER : Single (V+VI) ]
Time : 1 : 30 Hours Max. Marks : 200
Question BookletSeries
A
Instructions to the Examinee :
1. Do not open this Booklet untill you aretold to do so.
2. Candidates should fill their roll number,subject and series of question bookletdetails correctly, otherwise, in case ofany discrepancy in the evaluation, it willbe the responsibility of the examineehimself.
3. There are 100 questions in this questionbooklet, which are divided into twosections. Any 37 questions from the firstsection and any 38 questions from thesecond section are to be answered bythe examinee. Thus the examineeshave to answer only 75 questions. Fouralternative answer to each question aregiven below the question, out of thesefour only one answer is correct. Theanswer which you think is correct ormost appropriate, completely fill in thecircle containing its letter in your answersheet (O.M.R. Answer Sheet) with blackor blue ball point pen.
ijh{kkfFkZ;ksa ds fy, funsZ'k %
1. tc rd dgk u tk;s] bl iz'uiqfLrdk dks u[kksysaA
2. ijh{kkFkhZ vius vuqØekad] fo"k; ,oa iz'uiqfLrdk dhfljht dk fooj.k ;FkkLFkku lgh&lgh Hkjsa] vU;FkkewY;kadu esa fdlh Hkh izdkj dh folaxfr dh n'kk esamldh ftEesnkjh Lo;a ijh{kkFkhZ dh gksxhA
3. bl iz'uiqfLrdk esa 100 iz'u gSa] tks nks [k.Mksa esa
foHkkftr gSaA izFke [k.M ls fdUgha 37 ,oa f}rh; [k.M
ls fdUgha 38 iz'uksa ds mÙkj ijh{kkFkhZ }kjk fn;s tkus gSaA
bl izdkj ijh{kkfFkZ;ksa dks dsoy 75 iz'uksa ds mÙkj nsus
gSaA izR;sd iz'u ds pkj oSdfYid mÙkj iz'u ds uhps fn;s
x;s gSaA bu pkjksa esa ls dsoy ,d gh mÙkj lgh gSA ftl
mÙkj dks vki lgh ;k lcls mfpr le>rs gSa] vius
mÙkj&i=d (O.M.R. Answer Sheet) esa mlds
v{kj okys oÙk dks dkys ;k uhys ckWy IokbaV isu ls iwjk
Hkj nsaA
(Remaining instructions on last page) ¼'ks"k funsZ'k vfUre i`"B ij½
Question Booklet Number
Paper ID
2 3 1
Rough Work @ jQ dk;Z
KNP/I&WWW+EEC-A/95 ( 3 ) [P.T.O.]
1. Which type of Network is most likely confined
to a Building or a Campus ?
(A) Local Area
(B) Metropolitan Area
(C) Wide Area
(D) Departmental
2. Which best describes support over serial line
communication under the TCP/IP
Protocol ?
(A) SLIP
(B) PPP
(C) Both (A) and (B)
(D) None of the above
3. What does http stand for ?
(A) HTML Text Transfer Protocol
(B) Hyper Text Transfer Protocol
(C) High Transfer Tier Program
(D) HTML Type Transfer Protocol
4. How many bits are in a byte ?
(A) 8
(B) 1
(C) 24
(D) 256
5. Unix is :
(A) a Person
(B) a File
(C) a Program for copying files from one
computer to another
(D) an Operating System
1. fdlh Hkh Hkou vFkok dSEil esa fdl izdkj dk lhfer
usVodZ lcls vf/kd ilUn fd;k tkrk gS \
(A) yksdy ,fj;k
(B) esVªksiksfyVu ,fj;k
(C) okbM ,fj;k
(D) fMikVZesUVy
2. Vh-lh-ih-@vkbZ-ih- izksVksdkWy ds vUrxZr Øfed
js[kk lEizs"k.k gsrq fuEu esa ls lcls vf/kd lg;ksxh
gksrk gS %
(A) fLyi
(B) ih-ih-ih-
(C) nksuksa (A) ,oa (B)
(D) mijksDr esa ls dksbZ ugha
3. ,p-Vh-Vh-ih- dk vFkZ gS %
(A) ,p-Vh-,e-,y- VsDLV VªkWUlQj izksVksdkWy
(B) gkbij VsDLV VªkWUlQj izksVksdkWy
(C) gkbZ VªkWUlQj Vh;j izksxzke
(D) ,p-Vh-,e-,y- Vkbi VªkWUlQj izksVksdkWy
4. ,d ckbV esa fdrus fcV gksrs gSa \
(A) 8
(B) 1
(C) 24
(D) 256
5. ;wfuDl gS %
(A) ,d O;fä
(B) ,d Qkby
(C) ,d dEI;wVj ls nwljs dEI;wVj esa Qkby dkWih
djus dk izksxzke
(D) ,d vkWijsfVax flLVe
PAPER-V INTERNET AND WORLD WIDE WEB
KNP/I&WWW+EEC-A/95 ( 4 )
6. oh-vkj-,e-,y- gS %
(A) fotqvy fj;yVh ekWdZ&vi ySaXost
(B) opqZvy fj;yVh ekWdZ&vi ySaXost
(C) opqZvy fj;yVh ekWMfyax ySaXost
(D) fotqvy fj;yVh ekWMfyax ySaXost
7. izR;sd ,p-Vh-,e-,y- vkWys[k esa lekfgr gksrk
gS %
(A) ,p-Vh-,e-,y- VSx
(B) ckWMh VSx
(C) VkbVy VSx
(D) gsM VSx
8. osc ifCyf'kax dk nwljk vFkZ gksrk gS %
(A) MkWmuyksfMax
(B) viyksfMax
(C) ÝhyksfMax
(D) vuyksfMax
9. baVjusV mi;ksx djrk gS %
(A) iSdsV fLofpax
(B) lfdZV fLofpax
(C) VsyhQksu fLofpax
(D) VsysDl fLofpax
10. ,d lpZ batu fuEufyf[kr dks [kkstus dk ,d
izksxzkWe gksrk gS %
(A) lwpukvksa gsrq
(B) osc i"B gsrq
(C) fof'k"V lwfp;ksa gsrq osc i"B
(D) fof'k"V [kksth lwpukvksa gsrq osc i"B
6. VRML is :
(A) Visual Reality Mark-up Language
(B) Virtual Reality Mark-up Language
(C) Virtual Reality Modelling Language
(D) Visual Reality Modelling Language
7. Every HTML document should contain :
(A) HTML Tag
(B) BODY Tag
(C) TITLE Tag
(D) HEAD Tag
8. What is another term for Web Publishing ?
(A) Downloading
(B) Uploading
(C) Freeloading
(D) Unloading
9. Internet uses :
(A) Packet Switching
(B) Circuit Switching
(C) Telephone Switching
(D) Telex Switching
10. A Search Engine is a program to search :
(A) Information
(B) Web Pages
(C) Web Pages for Specified Index Terms
(D) Web Pages for Information using
Specified Search Terms
KNP/I&WWW+EEC-A/95 ( 5 )
11. Iyx&bu gS] ,d %
(A) lkW¶Vos;j
(B) gkMZos;j
(C) fof'k"V mn~ns';ksa gsrq iz;ksx gksus okys lkW¶Vos;j
o gkMZos;j
(D) ¶yS'k Iys;j
12. ,l-,l-,y- gS] ,d %
(A) fLØfIVax ySaXost
(B) czkmtj
(C) lqj{kk lEcU/k
(D) lays[ku lk/ku
13. baVjusV dks fdl ek/;e dk iz;ksx djrs le;
ekWMe dh vko';drk ugha gksrh gS \
(A) okbZ&QkbZ
(B) ySu
(C) dscy
(D) mi;qZDr esa ls dksbZ ugha
14. dksf'kdk vk/kkfjr lajpuk dgykrh gS %
(A) ySu
(B) ,-Vh-,e-
(C) ,Q-Mh-Mh-vkbZ-
(D) DykbaV&loZj
15. MsVk fyad Lrj ij v'kqf) [kkst izkIr dh tkrh
gS %
(A) iSfjVh
(B) gSfeax dksM
(C) pØh; vuko';d dksM
(D) lekuhdj.k
11. Plug-in is a :
(A) Software
(B) Hardware
(C) Software and Hardware both used for
specified purposes
(D) Flash Player
12. SSL is a :
(A) Scripting Language
(B) Browser
(C) Secure Connection
(D) Authoring Tool
13. A Modem is not needed when accessing the
Internet through :
(A) Wi-Fi
(B) LAN
(C) Cable
(D) None of the above
14. Cell base architecture is known as :
(A) LAN
(B) ATM
(C) FDDI
(D) Client-Server
15. Error Detection at a data link level is achieved
by :
(A) Parity
(B) Hamming Code
(C) Cyclic Redundancy Code
(D) Equalization
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 6 )
16. ,l-,e-Vh-ih- fdlls lEc) gS \
(A) Vh-lh-ih-@vkbZ-ih-
(B) MCY;w-MCY;w-MCY;w-
(C) baVjusV vUos"kd
(D) bySDVªkWfud esy
17. ,d ,iysV gS %
(A) osc i"B ij iznf'kZr ,d fp=
(B) ,d izksxzke tks nwljh ,Yihds'ku esa fufgr gks
ldrk gS
(C) ,p-Vh-,e-,y- izksxzke dk VSx
(D) lqj{kk izksVksdkWy
18. dEI;wVj lqj{kk gsrq fuf"Ø; vk'kadk gS %
(A) nqHkkZoukiw.kZ iz;kstu
(B) {kfriw.kZ fØ;k
(C) la;ksfxd =qfV
(D) tklwl izfrfuf/k
19. ________ dk iz;ksx ^mu iz;ksxdrkZvksa* dk irk
yxkus esa gksrk gS tks osclkbV ij nksckjk vkrs gSaA
(A) Iyx&bUl
(B) dqdht
(C) fLØIV~l
(D) ,-,l-ih-
20. cgqmn~ns'kh; baVjusV esy foLrkj ¼,e-vkbZ-,e-
bZ-½ fodflr fd;k x;k %
(A) fyf[kr] Jo.kh; ,oa pyfp=kRed bZ&esy lans'kksa
ds lg;ksx gsrq
(B) ,Q-Vh-ih- DykbaV lg;ksx gsrq
(C) nks e'khuksa ds e/; VsyusV lg;ksx gsrq
(D) dsoy fyf[kr vk/kkfjr bZ&esy lans'kksa ds lg;ksx
gsrq
16. SMTP is associated with :
(A) TCP/IP
(B) WWW
(C) Internet Explorer
(D) Electronic Mail
17. An Applet is a :
(A) Picture displayed on a Web Page
(B) Program that can be embedded in
another Application
(C) Tag in HTML Program
(D) Security Protocol
18. A Passive threat to computer security is :
(A) Malicious Intent
(B) Sabotage
(C) Accident Errors
(D) Espionage Agents
19. ________ are used to identify a user who
returns to a website.
(A) Plug-ins
(B) Cookies
(C) Scripts
(D) ASPs
20. Multipurpose Internet Mail Extension (MIME)
was developed :
(A) To support E-mail Messages Containing
Text, Audio and Video
(B) To support FTP clients
(C) To support Telnet between two machines
(D) To Support Text-based E-mail messages
only
KNP/I&WWW+EEC-A/95 ( 7 )
21. osc ØkWyj D;k gS \
(A) ,d dEI;wVj okW;jl
(B) ,d czkmtj
(C) osclkbV~l dh lwph iznkrk izksxzke
(D) ,d gSdj leqnk; tks osclkbV~l gSd djrk gS
22. dkWihjkbV dkuwu j{kk djrk gS %
(A) ewrZ lEifÙk dh
(B) vewrZ lEifÙk dh
(C) fof'k"V eky vFkok lsok ds uke dh
(D) fofHkUu Lo:iksa dh vfHkO;fDr;ksa ls lesfdr
fopkj dh
23. izksVksdkWy gSa %
(A) lapkj vo;oksa ,oa MsVk VfeZuy midj.kksa }kjk
lapkj ls lEcfU/kr Bgjko
(B) MsVk LFkkukUrj.k ls lEcfU/kr rkfdZd lapkj
pSuy
(C) MsVk LFkkukUrj.k ls lEcfU/kr 'kkjhfjd ¼HkkSfrd½
lapkj pSuy
(D) mi;qZDr esa ls dksbZ ugha
24. MsVk lapkj dk dkSu&lk izdkj Øfed lapkj fyad esa
MsVk lapkfjr djus ds fy, iz;ksx gksrk gS \
(A) flEiysDl
(B) v)Z MqIysDl
(C) iw.kZ MqIysDl
(D) mi;qZDr lHkh
25. ckWM dk vFkZ gS %
(A) izfr bdkbZ le; esa lapkfjr fcV~l dh
la[;k
(B) ladsr ifjofrZr gksus dh nj
(C) izfr bdkbZ le; esa lapkfjr ckbV~l dh
la[;k
(D) mi;qZDr esa ls dksbZ ugha
21. What is a Web Crawler ?
(A) A Computer virus
(B) A Browser
(C) A Program that index websites
(D) A Hacker Community who hacks
websites
22. Copyright law protects :
(A) Tangible Property
(B) Intangible Property
(C) The name of a particular good or service
(D) Ideas contained in varied forms of
expression
23. Protocols are :
(A) Agreements on how communication
components and DTE’s are to
communicate
(B) Logical communication Channels for
transferring data
(C) Physical communication channels used
for transferring data
(D) None of the above
24. Which data communication method is used
to transmit the data over a serial
communication link ?
(A) Simplex
(B) Half Duplex
(C) Full Duplex
(D) All of the above
25. Baud means :
(A) The number of bits transmitted per unit
time
(B) The rate at which the signal changes
(C) The number of bytes transmitted per unit
time
(D) None of the above
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 8 )
26. IRC stands for :
(A) Internet Related Chat
(B) Internet Related Content
(C) Internet Reliable Content
(D) Internet Relay Chat
27. Physical addresses will change from :
(A) Point-to-Point
(B) Sender to Receiver
(C) Hop to hop
(D) Frame to Frame
28. A can receive his e-mail, but he cannot send
e-mail. Which of the following is most likely
causing his problem ?
(A) SMTP
(B) POP3
(C) IMAP
(D) UART
29. A Proxy Firewall Filters at the :
(A) Physical Layer
(B) Application Layer
(C) Data Link Layer
(D) Network Layer
30. A web page displays a picture. What tag was
used to display that picture ?
(A) Picture
(B) Image
(C) img
(D) src
26. vkbZ-vkj-lh- dk vFkZ gS %
(A) baVjusV lEcfU/kr ckrphr
(B) baVjusV lEcfU/kr lkexzh
(C) baVjusV fo'oluh; lkexzh
(D) baVjusV izlkj.k lkexzh
27. HkkSfrd irs ifjofrZr gksaxs %
(A) fcUnq ls fcUnq rd
(B) izs"kd ls izkIrdrkZ
(C) gkWi Vw gkWi
(D) <k¡pk ls <k¡pk
28. A viuk bZ&esy izkIr rks djrk gS ij bZ&esy Hkst
ugha ldrkA fuEu esa ls mldh leL;k dk izeq[k
dkj.k D;k gS \
(A) ,l-,e-Vh-ih-
(B) ih-vks-ih- 3
(C) vkbZ-,e-,-ih-
(D) ;w-,-vkj-Vh-
29. ,d izfrfuf/k Qk;jokWy fQYVj gksrs gSa %
(A) HkkSfrd ijr
(B) ,Iyhds'ku ijr
(C) MsVk lEidZ ijr
(D) usVodZ ijr
30. ,d osci"B ,d fp= iznf'kZr djrk gSA bl fp=
dks iznf'kZr djus esa dkSu&lk VSx iz;ksx gksxk \
(A) fiDpj
(B) best
(C) vkbZ,eth
(D) ,lvkjlh
KNP/I&WWW+EEC-A/95 ( 9 )
31. Google Service is an example of :
(A) A DNS server
(B) A database server
(C) A Portal
(D) A Search Engine
32. The tag used in HTML to link it with other
URL’s is :
(A) <H>
(B) <A>
(C) <U>
(D) <L>
33. What product did Amazon First sell ?
(A) Online Advertising
(B) Books
(C) Music
(D) DVDs and Videos
34. A valid e-mail address is :
(B) @[email protected]
(C) vrm.india.com
35. Which type of Physical cable has the fastest
transmission speed ?
(A) Twisted-wire pairs
(B) Co-axial cable
(C) Fiber optic cable
(D) Micro-wave
31. xwxy lsok,¡ ,d mnkgj.k gSa %
(A) ,d Mh-,u-,l- loZj dk
(B) ,d MsVkcsl loZj dk
(C) ,d iksVZy dk
(D) ,d lpZ batu dk
32. ,p-Vh-,e-,y- esa dkSu&lk VSx nwljs ;w-vkj-,y-
ls lEidZ ds fy, mi;ksx gksrk gS \
(A) <H>
(B) <A>
(C) <U>
(D) <L>
33. ,estu us lcls igys dkSu&lk mRikn cspk Fkk \
(A) vkWuykbu foKkiu
(B) iqLrdsa
(C) laxhr
(D) Mh-oh-Mh- o pyfp=
34. ,d oS/k bZ&esy irk gS %
(B) @[email protected]
(C) vrm.india.com
35. fuEu esa ls dkSu&ls HkkSfrd rkj dh gLrkarj.k xfr
lcls rst gksrh gS \
(A) ?kqek;k gqvk rkj dh tksM+h
(B) pkj ijrh rkj
(C) vf{krUrq ra= rkj
(D) ekbØks ¼lw{e½ rjax
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 10 )
36. Which of the following is used to send or
receive files between two computers ?
(A) FTP
(B) SLIP
(C) URL
(D) Internet Explorer
37. IP address of a Packet is normally analyzed
by :
(A) CPU
(B) Router
(C) Modem
(D) Hub
38. A Spider is :
(A) a Browser
(B) a Computer virus
(C) a Program that catalogs websites
(D) a Hacker community
39. A Web Publishing tool developed by
Microsoft is :
(A) Netscape Navigator
(B) Hot Metal
(C) Page Mill
(D) Front Page
40. On Internet, which version of the Internet
Protocol is the most widely used :
(A) IPv1
(B) IPv6
(C) IPv4
(D) IPv2
36. nks dEI;wVlZ ds e/; Qkby Hkstus o izkIr djus gsrq
fuEu esa ls fdldk iz;ksx gksrk gS \
(A) ,Q-Vh-ih-
(B) fLyi
(C) ;w-vkj-,y-
(D) baVjusV vUos"kd
37. ,d iSdsV ds vkbZ-ih- irs dks fo'ysf"kr fd;k tkrk
gS %
(A) lh-ih-;w- }kjk
(B) jkmVj }kjk
(C) ekWMe }kjk
(D) gc }kjk
38. ,d LikbMj gS %
(A) ,d czkmtj
(B) ,d dEI;wVj okW;jl
(C) osclkbV lwph iznkrk izksxzke
(D) ,d gSsdj leqnk;
39. ekbØkslkW¶V }kjk fodflr ,d osc izdkf'kr midj.k
gS %
(A) usVLdsi usohxsVj
(B) gkWV esVy
(C) ist fey
(D) ÝaV ist
40. b.VjusV ij] b.VjusV izksVksdkWy dk dkSu&lk laLdj.k
lcls vf/kd mi;ksx gksrk gS \
(A) IPv1
(B) IPv6
(C) IPv4
(D) IPv2
KNP/I&WWW+EEC-A/95 ( 11 )
41. How many layers are there is in the OSI
model ?
(A) 7
(B) 3
(C) 5
(D) 10
42. Which TCP port is used by a web server to
serve web pages ?
(A) 8
(B) 80
(C) 25
(D) 23
43. Which of the following file is not compiled,
but is a simple ASCII text file that can be
parsed ?
(A) Java
(B) C++
(C) VRML
(D) Word
44. A smiley in chatting on Internet is also known
as :
(A) Punctuation
(B) Acronym
(C) Emoticon
(D) Icon
45. Website means :
(A) URL+Web Space+HTML Content
(B) URL+Web Space+Name Resolution
(C) URL+Web Space+Name Resolution+
HTML Content
(D) HTML Content+Web Space+Name
Resolution
41. vks-,l-vkbZ- ekWMy esa fdruh ijrsa gksrh gSa \
(A) 7
(B) 3
(C) 5
(D) 10
42. ,d osc loZj }kjk osc i"Bksa dks [kkstus ds fy,
dkSu&lk Vh-lh-ih- iksVZ mi;ksx gksrk gS \
(A) 8
(B) 80
(C) 25
(D) 23
43. fuEufyf[kr esa ls dkSu&lh Qkby ladfyr ugha gS]
ijUrq ,d lkekU; ,-,l-lh-vkbZ-vkbZ- fyf[kr
Qkby gS tksfd fu:fir gks ldrh gS %
(A) tkok
(B) lh$$
(C) oh-vkj-,e-,y-
(D) oMZ
44. baVjusV ij ckrphr esa iz;ksx gksus okyh fLefr;qDr
fp= (Smiley) gSa %
(A) fojke fpUg
(B) ifjo.khZ 'kCn
(C) beksVhdkWu
(D) vkWbdku ¼izfrek½
45. osclkbV dk vFkZ gS %
(A) ;w-vkj-,y-$osc Lisl$,p-Vh-,e-,y- lkexzh
(B) ;w-vkj-,y-$osc Lisl$uke izLrko
(C) ;w-vkj-,y-$osc Lisl$uke izLrko$,p-Vh-
,e-,y- lkexzh
(D) ,p-Vh-,e-,y- lkexzh$osc Lisl$uke
izLrko[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 12 )
46. What protocol does PPP use to identify the
Network Layer Protocol ?
(A) NCP
(B) ISDN
(C) LCP
(D) HDLC
47. In this topology, there is a Central Controller
or hub :
(A) Mesh
(B) Star
(C) Ring
(D) Bus
48. The 4 byte IP Address consists of :
(A) Network Address
(B) Host Address
(C) Both (A) and (B)
(D) None of the above
49. WWW is based on which model ?
(A) Local-Server
(B) 3-tier
(C) Client-server
(D) None of the above
50. Integrated Services for Digital Network
(ISDN) is a set of communication standards
for simultaneous digital transmission of :
(A) Voice
(B) Video
(C) Data
(D) All of the above
46. ih-ih-ih- latky ijr izksVksdkWy dks igpkuus ds
fy, fdl izksVksdkWy dk iz;ksx djrk gS \
(A) ,u-lh-ih-
(B) vkbZ-,l-Mh-,u-
(C) ,y-lh-ih-
(D) ,p-Mh-,y-lh-
47. bl lkafLFkfr ¼VksiksykWth½ esa ,d dsUnzh; fu;U=d
vFkok gc gksrh gS %
(A) es'k
(B) LVkWj
(C) fjax
(D) cl
48. 4 ckbV vkbZ-ih- ,Mªsl fufgr gksrk gS %
(A) latky ,Mªsl
(B) vfrFks; ,Mªsl
(C) nksuksa (A) ,oa (B)
(D) mi;qZDr esa ls dksbZ ugha
49. MCY;w-MCY;w-MCY;w- fdl ekWMy ij vk/kkfjr gS \
(A) LFkkuh; loZj
(B) 3 Lrjh;
(C) xzkgd loZj
(D) mi;qZDr esa ls dksbZ ugha
50. fMftVy latky gsrq ,dhÑr lsok ¼vkbZ-,l-Mh-
,u-½ fuEu esa ls fdu ledkfyd fMftVy gLrkUrj.k
cuk;k x;k lapkj ekudksa dk lewg gS \
(A) Loj
(B) pyfp=
(C) MkVk
(D) mi;qZDr lHkh
KNP/I&WWW+EEC-A/95 ( 13 )
51. Websites use_______to compile personal
information on their visitors and, then use the
information to create customer profiles.
(A) Cookies
(B) Transition Pages
(C) Registration Form
(D) Both (A) and (C)
52. When measuring the effectiveness on an online
advertisement, the______is the percentage of
visitors to a page who click on advertisement.
(A) Click-through Rate
(B) Click Ratio
(C) Click Rate
(D) Hit Ratio
53. ________is a private corporate Network that
uses standard Internet Protocols and Interfaces.
(A) Ethernet
(B) Intranet
(C) Extranet
(D) LAN
54. Consumer Interaction, the essence of Consumer
Focused (B to C) e-commerce, is the front end
to_______.
(A) The Value Chain (Intra-Business E-
commerce)
(B) The Supply Chain (B2B E-commerce)
(C) Both of the above
(D) None of the above
55. Intra-business e-commerce is sometimes
called_____ E-commerce.
(A) B2C
(B) B2B
(C) B2G
(D) None of the above
51. osclkbV~l vius vkxUrqdksa dh futh lwpukvksa ds
ladyu ,oa muls xzkgd :ijs[kk rS;kj djus gsrq
fuEu esa ls fdldk iz;ksx djrh gS \
(A) dqdht
(B) ifjorhZ i"B
(C) iathdj.k izi=
(D) mi;qZDr (A) ,oa (C)
52. fdlh Hkh vkWuykbu foKkiu dh izHkko'khyrk dks
ukius gsrq fuEu esa ls vkxUrqdksa] tks foKkiu ij
fDyd djrs gSa] dk izfr'kr gS %
(A) fDyd&Fkwz nj
(B) fDyd vuqikr
(C) fDyd nj
(D) fgV vuqikr
53. fuEu esa ls ,d futh] fuxeh; latky gS tksb.VjusV izksVksdkWy ,oa varjQydksa ds ekudksa dkiz;ksx djrk gS] gS %(A) bFkjusV(B) bUVªkusV(C) ,DlVªkusV
(D) ySu
54. miHkksDrk laokn] tks miHkksDrk mUeq[k bZ&dkelZ dk
lkj gS] dk vxzkUr gksrk gS %
(A) ewY; Üka[kyk ¼vkUrfjd O;olk; bZ&dkWelZ½
(B) iwfrZ Üka[kyk ¼ch-Vw-ch- bZ&dkWelZ½
(C) mi;qZDr nksuksa
(D) mi;qZDr dksbZ ugha
55. vkUrfjd O;olk; bZ&dkWelZ dks dHkh&dHkh dgk
tkrk gS %
(A) ch-Vw-lh-
(B) ch-Vw-ch-
(C) ch-Vw-th-
(D) mi;qZDr dksbZ ugha
PAPER-VI ESSENTIALS OF E-COMMERCE
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 14 )
56. Which of the following describes E-commerce ?
(A) Buying Products from each other
(B) Buying services from each other
(C) Selling services from each other
(D) All of the above
57. Digital Products are best suited for B2C
e-commerce because they :
(A) are commodity like products
(B) can be mass-customized and personalized
(C) can be delivered at the time of purchase
(D) All of these
58. What is an arrangement made between E-
commerce sites that direct users from one site
to another ?
(A) Spam
(B) Viral Marketing
(C) Affiliate Programs
(D) None of these
59. What are materials that are necessary for
running a modern corporation, but do not relate
to the company's primary business activities ?
(A) Direct Materials
(B) Indirect Materials
(C) EDI
(D) None of these
60. What does Porter's five forces model
determine ?
(A) The relative attractiveness of an industry
(B) The competitive advantage of a competitor
(C) The distribution chain of a competitor
(D) The relative attractiveness of another
business
56. fuEufyf[kr esa ls D;k bZ&dkWelZ dh O;k[;k djrk
gS \
(A) ,d&nwljs ls mRiknksa dk Ø;
(B) ,d&nwljs ls lsokvksa dk Ø;
(C) ,d&nwljs dks lsokvksa dk foØ;
(D) mi;qZDr lHkh
57. fMftVy mRikn ch-Vw-lh- bZ&dkWelZ ds fy, vuqdwyre
gSa D;ksafd os %
(A) oLrq&ilUn mRikn gksrs gSa
(B) O;kid :i ls vuqdwfyr ,oa O;fDrxr gks
ldrs gSa
(C) Ø; ds le; gh mudh lqiqnZxh gks ldrh gS
(D) mi;qZDr lHkh
58. fuEu esa ls D;k bZ&dkWelZ lkbV~l dh ,d O;oLFkk
i)fr gS ftlesa miHkksxdrkZvksa dks ,d lkbV ls
nwljh lkbV ij funsZf'kr fd;k tkrk gS \
(A) LiSe
(B) ok;jy foi.ku
(C) lgc) izksxzke
(D) mi;ZqDr dksbZ ugha
59. og D;k lkexzh gS tks ,d vk/kqfud fuxe dks
pykus ds fy, vko';d gS] ijUrq ftudk dEiuh
dh izkFkfed fØ;kvksa ls dksbZ lEcU/k ugha gS \
(A) izR;{k lkexzh
(B) vizR;{k lkexzh
(C) bZ-Mh-vkbZ-
(D) mi;qZDr dksbZ ugha
60. iksVZj ds ik¡p cy n`"Vkar D;k fu/kkZfjr djrs
gSa \
(A) ,d m|ksx dk lkis{k vkd"kZ.k
(B) ,d izfr;ksxh dEiuh dk izfr;ksxh ykHk
(C) ,d izfr;ksxh dh forj.k Üka[kyk
(D) nwljs O;olk;ksa dk lkis{k vkd"kZ.k
KNP/I&WWW+EEC-A/95 ( 15 )
61. If it is easy for competitors to enter the market,
the threat of new entrants is considered :
(A) Low
(B) High
(C) More
(D) Less
62. Before starting a new company or expanding
current operations, consider______.
(A) Finance
(B) Porter's Five Forces model
(C) IT
(D) Bankruptcy
63. What type of ad appears on top of a web
page ?
(A) Banner ad
(B) Discount ad
(C) Pop under ad
(D) Pop up ad
64. What is the name for direct computer-
to-computer transfer of transaction information
contained in standard business documents ?
(A) Electronic data interchange
(B) Internet commence
(C) E-commerce
(D) Transaction Information Transfer
65. What is a system that not only captures spoken
words but also distinguishes word groupings to
form sentences ?
(A) Feature Analysis
(B) Pattern Classification
(C) ASR
(D) Language Processing
61. ;fn izfr;ksfx;ksa ds fy, cktkj esa izos'k djuk
vklku gS] rc uokxUrqdksa dh vk'kadk gksrh gS %
(A) fuEu
(B) mPp
(C) vf/kd
(D) U;wu
62. fdlh ubZ dEiuh dks 'kq: djus vFkok orZeku
ifjpkyuksa dks foLrkfjr djus ls igys] fuEu esa ls
fdl ij fopkj fd;k tkrk gS \
(A) foÙk
(B) iksVZj ds ik¡p cy n"Vkar
(C) vkbZ-Vh-
(D) fnokfy;kiu
63. osc i`"B ds Åijh LFkku ij fdl izdkj dk foKkiu
iznf'kZr gksrk gS \
(A) cSuj foKkiu
(B) NwV foKkiu
(C) fuEu ikWi foKkiu
(D) Åijh ikWi foKkiu
64. ekud O;olk; vkys[kksa esa lesfdr ysu&nsu dh
lwpukvksa dk lh/kk dEI;wVj ls dEI;wVj gLrkUrj.k
D;k dgykrk gS \
(A) bysDVªkWfud MkVk b.VjpsUt
(B) b.VjusV dkWelZ
(C) bZ&dkWelZ
(D) ysu&nsu dh lwpukvksa dk LFkkukUrj.k
65. og dkSu&lh iz.kkyh gS tks u dsoy cksys gq, 'kCnksa
dks idM+rh gS ijUrq lkFk gh lkFk okD;ksa dks cukus
gsrq 'kCn lewgksa esa vUrj Hkh djrh gS \
(A) Qhpj fo'ys"k.k
(B) izfr:i foHkktu
(C) ,-,l-vkj-
(D) Hkk"kk izfØ;k
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 16 )
66. fuEu esa ls D;k bZ&dkWelZ esa ØsfMV dkWMZ Hkqxrku dks
izekf.kr djrk o laHkkyrk gS \
(A) bZ&dkWelZ xsVos
(B) ises.V xsVos
(C) lkW¶Vos;j xsVos
(D) bZ&okysV~l
67. fuEu esa ls dkSu&lh bZ&dkWelZ osclkbV gS \
(A) ;kgw
(B) fcax
(C) xwxy
(D) vestu
68. ;fn foØsrk ,oa Øsrk nksuksa O;olk; QeZ gksa] rc
fuEu esa ls dkSu&lk bZ&dkWelZ dk izfr:i gS \
(A) ch-Vw-ch-
(B) lh-Vw-lh-
(C) lh-Vw-ch
(D) ch-Vw-lh-
69. fuEu esa ls dkSu&lk yac:i izfr:i dk mnkgj.k gS
\
(A) xwxy
(B) foyst
(C) usV&Ldsi
(D) ;kgw
70. fuEu esa ls dkSu&lk bZ&dkWelZ dk fodYi] Hkqxrku
fu;a=.k gksus rd] p;fur mRiknksa dks j[kus esa
lgk;rk djrk gS \
(A) ckWLdsV
(B) Vsª
(C) dkVZ
(D) mi;ZqDr dksbZ ugha
66. Which of the following authenticates and handles
credit card payment for E-
commerce ?
(A) E-commerce Gateway
(B) Payment Gateway
(C) Software Gateway
(D) E.Wallets
67. Which one is E-commerce website ?
(A) Yahoo
(B) Bing
(C) Google
(D) Amazon
68. What is the model in E-commerce if the seller
and buyer are both business firms ?
(A) B2B
(B) C2C
(C) C2B
(D) B2C
69. Which of the following is an example of vertical
portal ?
(A) Google
(B) Village
(C) Netscape
(D) Yahoo
70. Which option in E-commerce helps to
keep selected products until checkout
payments ?
(A) Basket
(B) Tray
(C) Cart
(D) None of these
KNP/I&WWW+EEC-A/95 ( 17 )
71. fuEu esa ls dkSu&lk izdkj ^uhykeh dk lkSnk
gS \
(A) ch-Vw-ch-
(B) ch-Vw-lh-
(C) lh-Vw-ch-
(D) lh-Vw-lh-
72. bZ&dkWelZ ds ch-Vw-lh- izdkj esa foØ; gsrq lcls
vPNk mRikn dkSu&lk gS \
(A) NksVs mRikn
(B) fMthVy mRikn
(C) fof'k"V mRikn
(D) rkts mRikn
73. leLr O;kolkf;d vko';drkvksa dk lek/kku
gS %
(A) bZ-vkj-ih-
(B) bZ-Mh-vkbZ-
(C) ,l-lh-,e-
(D) mi;qZDr esa ls dksbZ ugha
74. bZ&dkWelZ dk fuEu esa ls ,d dk;Z gS %
(A) foi.ku
(B) foKkiu
(C) Hk.Mkj.k
(D) mi;qZDr lHkh
75. fuEu esa ls xzkgdksa dk izfr'kr gS tks fdlh osolkbM
dk Hkze.k djrs gSa ,oa okLro esa dqN Ø; djrs gSa]
dgykrk gS %
(A) lgc) izksxzke
(B) LiSe
(C) fDyd&Fkwz
(D) ifjorZu nj
71. Which type deals with auction ?
(A) B2B
(B) B2C
(C) C2B
(D) C2C
72. The best product to sell in B2C E-commerce are
:
(A) Small products
(B) Digital products
(C) Speciality products
(D) Fresh products
73. The solution for All Business Needs is :
(A) ERP
(B) EDI
(C) SCM
(D) None of the above
74. Which is a function of E-commerce ?
(A) Maketing
(B) Advertising
(C) Warehousing
(D) All of the above
75. What is the percentage of customers who visit a
website and actually buy something called ?
(A) Affiliate Program
(B) Spam
(C) Click-through
(D) Conversion Rate
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 18 )
76. ØsfMV dkWMZ os IykWfLVd dkWMZ~l gSa ftu ij fMftVy
lwpukvksa dks ,df=r djus ds fy, fpi lfUufgr
gksrh gS] os dgykrs gSa %
(A) xzkgd lEcU/k izcU/k iz.kkyh dkWMZ~l
(B) bZ&ljdkjh igpku dkWMZ
(C) LekWVZ dkWMZ
(D) QsMh dkWMZ
77. bZ&dkWelZ esa ,-,y-bZ- dk iwjk uke D;k gS \
(A) ,Iyhds'ku fyad ,ecsfMax
(B) ,Iyhds'ku fyad bysDVªkWfuDl
(C) ,Iyhds'ku yhdst ,uscfyax
(D) mi;qZDr esa ls dksbZ ugha
78. vks-,y-,Dl- osclkbV lkSnk djrh gS %
(A) Qkbyksa dks viyksM djuk
(B) mRiknksa dk Ø;&foØ;
(C) vkys[kksa dks [kkstuk
(D) Qkbyksa dks nksckjk izkIr djuk
79. fuEu esa ls bZ&dkWelZ dk ,d dk;Z gS %
(A) foi.ku
(B) foKkiu
(C) Hk.Mkj.k
(D) mi;qZDr lHkh
80. ;fn LFkkukiUu mRiknksa vFkok lsokvksa dh vk'kadk
de gksrh gS] ;g gS %
(A) iwfrZdrkZvksa dh gkfu
(B) Øsrk dks ykHk
(C) iwfrZdrkZ dks ykHk
(D) mi;qZDr esa ls dksbZ ugha
76. What are Plastic Cards the size of a Credit Card
that contains an embedded chip an which digial
information can be stored ?
(A) Customer Relationship Management
Systems Cards
(B) E-Government Identity Cards
(C) Smart Cards
(D) Fedi Cards
77. What is the full form of ALE in E-commerce ?
(A) Application Link Embedding
(B) Application Link Electronics
(C) Application Leakage Enabling
(D) None of the above
78. OLX website deals in :
(A) Uploading files
(B) Buying and Selling Products
(C) Searching Documents
(D) Recovering Files
79. Which is a function of E-commerce ?
(A) Marketing
(B) Advertising
(C) Warehousing
(D) All of the above
80. If the threat of substitute products or services is
less, it is a(n) :
(A) Disadvantage to the supplier
(B) Advantage to the buyer
(C) Advantage to the supplier
(D) None of the above
KNP/I&WWW+EEC-A/95 ( 19 )
81. iSlkis dh lqfo/kk fuEu esa gS %
(A) bZcs-dks-bu
(B) vestu-dkWe
(C) f¶yidkVZ-dkWe
(D) mi;qZDr esa ls dksbZ ugha
82. vf}rh; ewY; uhykeh eq[; :i ls ykxw gksrh
gS %
(A) u;s mRiknksa ij
(B) iqjkus mRiknksa ij
(C) vfHk;kaf=dh mRiknksa ij
(D) mi;qZDr esa ls dksbZ ugha
83. fuEu esa ls D;k lqj{kk ra= ls lEcfU/kr ugha
gS \
(A) dwVys[ku
(B) fodksMu
(C) bZ&dS'k
(D) mi;qZDr lHkh
84. ,d mRikn vFkok lsok tks xzkgdksa }kjk ,d m|ksx
ls vk'kk dh tkrh gS] tks uokxUrqdksa }kjk izLrkfor
gksrh gS] ;fn os izfrLi/kkZ esa cus jguk pkgrs gSa]
dgykrh gS %
(A) izos'k ck/kk,¡
(B) ykxr ifjorZu
(C) fu"Bk dk;ZØe
(D) lgc) dk;ZØe
85. bZ&dkWelZ esa ysu&nsu gksrs gSa %
(A) dsoy dEI;wVj mi;ksx }kjk
(B) bZ&ehfM;k ds mi;ksx }kjk
(C) dsoy eksckby Qksu ds mi;ksx }kjk
(D) mi;qZDr esa ls dksbZ ugha
81. PaisaPay is facilitated in :
(A) eBay.co.in
(B) Amazon.com
(C) Flipkart.com
(D) None of the above
82. Unique value auction is mainly applies to :
(A) New products
(B) Second hand products
(C) Engineering products
(D) None of the above
83. Which of the following is not related to security
mechanism ?
(A) Encryption
(B) Decryption
(C) E-cash
(D) All of the above
84. A product or service that customers have come
to expect from an industry, which must be offered
by new entrants if they wish to compete and
survive, is known as :
(A) Entry barriers
(B) Switching costs
(C) Loyalty programs
(D) Affiliate programs
85. How the transactions, occur in E-commerce ?
(A) Using Computer only
(B) Using E-media
(C) Using Mobile Phones only
(D) None of the above
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 20 )
86. fuEu esa ls D;k O;fDrxr xzkgdksa ds vuq:i mRiknksa
dk ltu djrk gS \
(A) vuqdwyu
(B) ,d=hdj.k
(C) izR;{k lkexzh
(D) izfrykse uhykeh
87. fuEu esa ls dkSu&lh baVjusV vk/kkfjr dEiuh gksrh
gS tks baVjusV ij ,d O;fDr }kjk nwljs O;fDr dks
Hkqxrku djus esa ljyrk iznku djrh gS \
(A) bysDVªkWfud pSd
(B) bysDVªkWfud fcy izLrqrhdj.k ,oa Hkqxrku
(C) ifjorZu nj
(D) foÙkh; lkbcj e/;LFk
88. ,d lkW¶Vos;j vkSj lwpukvksa dk lewg] tks Hkqxrku
dh lqj{kk ,oa lwpuk iznku djus ds fy, cuk;k
tkrk gS] dgykrk gS %
(A) fMftVy okWysV
(B) ikWi&vi ,M
(C) 'kkWfiax dkWMZ
(D) dwVys[ku
89. lqjf{kr lkWdsV ijr fuEu esa ls D;k djrh gS \
(A) ,d osc loZj dks lqjf{kr ,oa futh dusD'ku
miyC/k djkuk
(B) lwpukvksa dk dwVys[ku djuk
(C) b.VjusV ij lwpukvksa dks Hkstuk
(D) mi;qZDr lHkh
90. fuEu esa ls D;k ,d izLrkfor mRikn] lsok vFkok
iz.kkyh dk ,d izfr:i gS \
(A) gSfdax
(B) LiwfQax
(C) ØSfdax
(D) MEiLVj Mkbfoax
86. Which of the following refers to creating products
tailored to individual customers ?
(A) Customization
(B) Aggregation
(C) Direct Materials
(D) Reverse Auction
87. Which of the following is an Internet based
company that makes it easy for one person to
pay another over the Internet ?
(A) Electronic Check
(B) Electronic Bill Presentment and Payment
(C) Conversion Rates
(D) Financial Cybermediary
88. A combination of software and information
designed to provide security and information for
payment is called :
(A) Digital wallet
(B) Pop-up ad
(C) Shopping card
(D) Encryption
89. Secure Sockets Layers does which of the
following ?
(A) Creates a secure, private connection to a
web server
(B) Encrypts Information
(C) Sends Information over the Internet
(D) All of the above
90. What is a model of a proposed product, service
or system ?
(A) Hacking
(B) Spoofing
(C) Cracking
(D) Dumpster Diving
KNP/I&WWW+EEC-A/95 ( 21 )
91. What is a separate and fully equipped facility
where the company can move immediately after
the disaster and resume business ?
(A) Disaster Recovery Plan
(B) Hot site
(C) Cold site
(D) Disaster Recovery Cost Curve
92. Which factor determines who has the right to
access different types of IT systems and
information ?
(A) Availability
(B) Reliability
(C) Accessibility
(D) Scalability
93. What automates business process ?
(A) Workflow
(B) ASP
(C) Workflow System
(D) EIP
94. Which will not harm computer resources ?
(A) Firewall
(B) Virus
(C) Trozan Horse
(D) None of the above
95. Which process can prevent data from lose due
to computer problems or human
errors ?
(A) Recovery
(B) Backup
(C) Benchmarking
(D) Data cleansing
91. fuEu esa ls ,d iFkd ,oa iw.kZr;k% lqlfTtr lqfo/
kk dkSu&lh gS] ftlesa ,d dEiuh vkink ds rqjUr
i'pkr vkxs c<+ ldrh gS ,oa O;olk; iqu% dj
ldrh gS \
(A) vkink izfrykHk ;kstuk
(B) gkWV lkbV
(C) dksYM lkbV
(D) vkink izfrykHk ykxr oØ
92. fuEu esa ls dkSu&lk dkjd fofHkUu izdkj dh vkbZ-
Vh- iz.kkfy;ksa ,oa lwpukvksa rd igq¡pus dk vf/kdkj
j[krk gS \
(A) miyC/krk
(B) fo'oluh;rk
(C) vfHkxE;rk
(D) ekiuh;rk
93. O;kolkf;d izfØ;k dks D;k Lopkfyr djrk gS \
(A) dk;Zizokg
(B) ,-,l-ih-
(C) dk;Zizokg iz.kkyh
(D) bZ-vkbZ-ih-
94. fuEu esa ls D;k dEI;wVj lalk/kuksa dks uqdlku ugha
igq¡pkrk gS \
(A) QkW;joky
(B) ok;jl
(C) Vªkstu gkWlZ
(D) mi;qZDr dksbZ ugha
95. dEI;wVj leL;kvksa ,oa ekuoh; xyfr;ksa ls dkSu&lh
izfØ;k MkVk dks [kksus ls jf{kr djrh gS \
(A) fjdojh
(B) cSdvi
(C) cSapekfdZax
(D) MsVk Dyhuftax
[P.T.O.]
KNP/I&WWW+EEC-A/95 ( 22 )
96. fuEu esa ls D;k nwljs O;fDr;ksa dh dEI;wVj iz.kkyh
dks /oLr dj nsrk gS ,oa lwpukvksa dh pksjh o u"V
dj nsrk gS \
(A) lkW¶Vos;lZ
(B) gSdfoftV~l
(C) gSdlZ
(D) fLØIV fdfMt+
97. bZ-vkj-ih- dk v/kZ gS %
(A) m|e ladYi ;kstuk
(B) m|e izfrykse ;kstuk
(C) m|e lalk/ku ;kstuk
(D) mi;qZDr dksbZ ugha
98. fuEu esa ls fdls okW;jl ls gkfu gksrh gS \
(A) dhcksMZ
(B) ekWuhVj
(C) izkslslj
(D) buesa ls dksbZ ugha
99. fuEu esa ls D;k futrk dk vk;ke ugha gS \
(A) O;fDrxr LFkku dh vko';drk
(B) gekjs vf/kdkjksa ij fu;a=.k dh Hkkouk dh
vko';drk
(C) gekjh futh lwpukvksa ij fu;a=.k dh Hkkouk
dh vko';drk
(D) mi;qZDr lHkh futrk ds vk;ke gSa
100. os LekWVZ dkWMZ tks MsVk dks i<+us ,oa fy[kus esa ,aVhuk
dk iz;ksx djrs gSa] dgykrs gSa %
(A) dkWUVsDV LekVZ dkWMZ
(B) dkWUVsDVysl LekVZ dkWMZ
(C) izkWDlhfeVh LekVZ dkWMZ
(D) nksuksa (B) ,oa (C)
96. Who breaks into other peoples' computer system
and steals and destroys information ?
(A) Softwares
(B) Hacktivists
(C) Hackers
(D) Script kiddies
97. ERP stands for :
(A) Enterprise Resolution Planning
(B) Enterprise Reverse Planning
(C) Enterprise Resource Planning
(D) None of the above
98. Which of the following to viruses harm ?
(A) Keyboard
(B) Monitor
(C) Processor
(D) None of the above
99. Which of the followng is not a dimension of
privacy ?
(A) Need for Personal Space
(B) Need to Feel in control of our possessions
(C) Need to feel in control of our personal
information
(D) All of the above are dimensions of privacy
100. The Smart Card which uses antenna for reading
and writing data ?
(A) Contact Smart Card
(B) Contactless Smart Card
(C) Proximity Smart Card
(D) Both (B) and (C)
Rough Work @ jQ dk;Z
Example :
Question :
Q.1
Q.2
Q.3
If more questions are answered by acandidate than the number assigned foreach section, then only those questionsas previously answered by him/her willbe evaluated.
4. Each question carries equal marks.Marks will be awarded according to thenumber of correct answers you have.
5. All answers are to be given on OMRAnswer Sheet only. Answers givenanywhere other than the place specifiedin the answer sheet will not beconsidered valid.
6. Before writing anything on the OMRAnswer Sheet, all the instructions givenin it should be read carefully.
7. After the completion of the examination,candidates should leave theexamination hall only after providingtheir question booklet and OMR AnswerSheet separately to the invigilator.
8. There will be no negative marking.9. Rough work, if any, should be done on
the blank pages provided for thepurpose in the booklet.
10. To bring and use of log-book, calculator,pager & cellular phone in examinationhall is prohibited.
11. In case of any difference found inEnglish and Hindi version of thequestion, the English version of thequestion will be held authentic.
Impt. On opening the question booklet,first check that all the pages of the questionbooklet are printed properly. If there is anydiscrepancy in the question Booklet, thenafter showing it to the invigilator, get anotherquestion Booklet of the same series.
mnkgj.k %
iz'u %
iz'u 1
iz'u 2
iz'u 3
;fn fdlh ijh{kkFkhZ }kjk izR;sd [k.M gsrq fu/kkZfjr iz'uksals vf/kd iz'uksa ds mÙkj fn;s tkrs gSa] rks mlds }kjkgy fd;s x;s izFker% ;Fkk fufnZ"V iz'uksÙkjksa dk ghewY;kadu fd;k tk;sxkA
4. izR;sd iz'u ds vad leku gSaA vkids ftrus mÙkjlgh gksaxs] mUgha ds vuqlkj vad iznku fd;s tk;saxsA
5. lHkh mÙkj dsoy vks0,e0vkj0 mÙkj&i=d (OMR
Answer Sheet) ij gh fn;s tkus gSaA mÙkj&i=desa fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;kx;k mÙkj ekU; ugha gksxkA
6. vks0,e0vkj0 mÙkj&i=d (OMR Answer
Sheet) ij dqN Hkh fy[kus ls iwoZ mlesa fn;s x;slHkh vuqns'kksa dks lko/kkuhiwoZd i<+ fy;k tk;sA
7. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kddks viuh iz'uiqfLrdk cqdysV ,oa vks0,e0vkj0'khV i`Fkd&i`Fkd miyC/k djkus ds ckn gh ijh{kkd{k ls izLFkku djsaA
8. fuxsfVo ekfdZax ugha gSA9. dksbZ Hkh jQ dk;Z] iz'u&iqfLrdk esa] jQ&dk;Z ds
fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A10. ijh{kk&d{k esa ykWx&cqd] dSYdqysVj] istj rFkk lsY;qyj
Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA
11. iz'u ds fgUnh ,oa vaxzsth :ikUrj.k esa fHkUurk gksus
dh n'kk esa iz'u dk vaxzsth :ikUrj.k gh ekU;
gksxkA
egRoiw.kZ% iz'uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysafd iz'uiqfLrdk ds lHkh i`"B HkyhHkk¡fr Nis gq, gSaA ;fniz'uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks fn[kkdjmlh fljht dh nwljh iz'uiqfLrdk izkIr dj ysaA
A C D
A D
A C D
BA C D
A D
A C D
B