Computers-Internet (NCO- Cyber Olympiad (SOF) Class 10): Questions 1 - 7 of 12

Access detailed explanations (illustrated with images and videos) to 461 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 300.00 or

How to register?

Question number: 1

» Computers » Internet

Edit
MCQ▾

Question

Whenever you search anything by using some text or words, they are called ________

Choices

Choice (4) Response

a.

Command

b.

Indexes

c.

Keywords

d.

Hyperlinks

Question number: 2

» Computers » Internet

Edit
MCQ▾

Question

A Software needed for looking into the various sites on the net is ________.

Choices

Choice (4) Response

a.

Webpage

b.

Browser

c.

HTML

d.

Domain

Question number: 3

» Computers » Internet

Edit
MCQ▾

Question

In Gmail’s Contact manager, when you mark contacts under different groups

Choices

Choice (4) Response

a.

The contacts shall be removed from ‘All contacts’ group.

b.

The contacts shall be deleted from ‘All contacts’ group.

c.

The contacts shall NOT be removed from ‘All contacts’ group.

d.

None of the above

Question number: 4

» Computers » Internet

Edit
MCQ▾

Question

AltaVista, Google and Bing are some examples of ________.

Choices

Choice (4) Response

a.

HTTP

b.

ULR

c.

Search Engines

d.

Web Browsers

Question number: 5

» Computers » Internet

Edit
MCQ▾

Question

Privacy of a message is handled by ________.

Choices

Choice (4) Response

a.

Decryption

b.

Encryption

c.

Zip

d.

Compression

Question number: 6

» Computers » Internet

Edit
MCQ▾

Question

________ is computer programs that secretly gather information about the user and relays it to advertisers or other interested parties.

Choices

Choice (4) Response

a.

Malware

b.

Spyware

c.

Spybot

d.

Both b. and c. are correct

Question number: 7

» Computers » Internet

Edit
MCQ▾

Question

Malware includes ________.

Choices

Choice (4) Response

a.

Trojan Horses

b.

Viruses

c.

Worms

d.

All a. , b. and c. are correct

Developed by: