Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

It can be said that ______________ provides a very strong connection or network between computers globally. (A) Internet (B) Local Area Network (C) Wide Area Network (D) Metropolitan Area Network

Answer»

Correct option is  (A) Internet

2.

True or False:1. Packets used packet switching to allow multiple computers to communicate on a single network2. The full form of TCP/IP is Transmission Control Protocol and Internet Protocol.

Answer»

1. False

2. True

3.

______________ used packet switching to allow multiple computers to communicate on a single network.

Answer»

Advanced Research Projects Agency Network

4.

The first workable prototype of the internet came in the late 1960’s with the creation of ______________ (A) Advanced Research Projects Agency Network (B) Transmission Control Protocol and Internet Protocol (C) World Wide Web (D) Local Area Network

Answer»

(A) Advanced Research Projects Agency Network

5.

Full form of TCP/IP is ______________(A) Transmission Control Protocol and Internet Protocol (B) Transfer Control Protocol and Internet Protocol (C) Transmission Control Password and Internet Password (D) Transfer Control Process and Internet Password

Answer»

(A) Transmission Control Protocol and Internet Protocol

6.

______________ used packet switching to allow multiple computers to communicate on a single network. (A) Advanced Research Projects Agency Network (B) Transmission Control Protocol and Internet Protocol (C) World Wide Web (D) Local Area Network

Answer»

(A) Advanced Research Projects Agency Network

7.

Full form of HTTP is ______________ (A) Hyper Text Transfer Protocol (B) Hyper Test Transfer Protocol (C) Hyper Transfer Text D) Hyper Text Transfer Process

Answer»

(A) Hyper Text Transfer Protocol

8.

______________ communications model that set standards for how data could be transmitted between multiple networks.

Answer»

Transmission Control Protocol and Internet Protocol

9.

Advanced Research Projects Agency Network used ______________ switching to allow multiple computers to communicate on a ______________ network.(A) Internet (B) Advanced Research Projects Agency Network (C) Packet (D) Single (E) Network

Answer»

(C) Packet (D) Single

10.

______________ communications model that set standards for how data could be transmitted between multiple networks. (A) Advanced Research Projects Agency Network (B) Transmission Control Protocol and Internet Protocol (C) World Wide Web (D) Local Area Network

Answer»

(B) Transmission Control Protocol and Internet Protocol

11.

Full form of WWW is ______________ (A) World Wide Website (B) Web Wide World (C) World Wide Web (D) Wide Web World

Answer»

(C) World Wide Web

12.

A ______________ is a set of rules that governs the communications between computers on a network. (A) Protocol (B) Transmission Control Protocol & Internet Protocol (C) Domain Name System (D) Dynamic Host Configuration Protocol

Answer»

Correct option is  (A) Protocol

13.

Tim Berners-Lee invented the ______________ (A) Advanced Research Projects Agency Network (B) Transmission Control Protocol and Internet Protocol (C) World Wide Web (D) Local Area Network

Answer»

(C) World Wide Web

14.

True or False:1. Tim Berners-Lee invented the World Wide Web.2. A DNS is a set of rules that governs the communications between computers on a network. Protocol.

Answer»

1. True

2. False

15.

Tim Berners-Lee invented the ______________

Answer»

World Wide Web

16.

“The man indulged in mad whims”. Who considers the man’s work as “mad whims?”(a) The man himself(b) the writer(c) the people in workers’ paradise

Answer»

(c) the people in workers’ paradise.

17.

IT Enabled Services (ITES), also called as ______________

Answer»

Web Enabled Services

18.

Explain the meaning of ITES.

Answer»

1. The full form of ITES is IT Enabled Services. 

2. IT Enabled Services (ITES), also called as Web-Enabled Services. 

3. IT Enabled Services covers the entire amount of operations that exploit Information Technology for improving the efficiency of an organization.

19.

True or False:1. With the help of the Internet, one can easily be in touch with anyone in the whole world by sending electronic mail, by chatting.2. It can be said that services provide a very strong connection or network between computers globally.

Answer»

1. True

2. False

20.

IT Enabled Services (ITES), also called ______________ or ______________ or ______________ (A) Local Area Network (B) Wide Area Network (C) Web Enabled Services (D) Remote Services (E) Tele-Working

Answer»

(C) Web Enabled Services (D) Remote Services (E) Tele-Working

21.

IT Enabled Services (ITES), also called as ______________(A) Web Enabled Services (B) Word Enabled Services (C) Wide Enabled Services (D) Web Engineer Services

Answer»

(A) Web Enabled Services

22.

True or False:1. The full form of ITES is IT Enabled Services.2. T Enabled Services (ITES), also called as Information Technology.

Answer»

1. True

2. False

23.

Full form of IMAP is ______________ (A) Internet Message Access Protocol (B) Internet Message Access Process (C) Internet Message Access Program (D) Information Message Access Protocol

Answer»

(A) Internet Message Access Protocol

24.

______________ maintains a copy of all the emails on server. (A) File Transfer Protocol (B) Hyper Text Transfer Protocol (C) Internet Message Access Protocol (D) Internet Relay Chat

Answer»

(C) Internet Message Access Protocol

25.

‘Kerala Communication channel’ conducts a TV program based on Education policies of Kerala Govt. They want to take the feedback from the viewers through their website.1. While creating this site, which type of tag is used to accept multiple line of text from the viewers,2. Name any two attributes of this tag.

Answer»

1. <TEXTAREA>

2. Cols, rows, name

26.

______________ is used for receiving e-mail messages from server on the Internet. (A) File Transfer Protocol (B) HyperText Transfer Protocol (C) Internet Message Access Protocol (D) Internet Relay Chat

Answer»

(D) Simple Mail Transfer Protocol

27.

Match the following:Column ‘A’ Column ‘B’(1) IT Enabled Services (ITES)(A) HTML &amp; PHP(2) Web Designer and Developer(B) Web Enabled Services(3) Software Developer (C)Scripting Skill (4) Database Manager(D) SQL Skills

Answer»
Column ‘A’ Column ‘B’
(1) IT Enabled Services (ITES)(B) Web Enabled Services 
(2) Web Designer and Developer (A) HTML & PHP
(3) Software Developer (C) Scripting Skill 
(4) Database Manager(D) SQL Skills
28.

______________ is used for receiving e-mail messages from server on the Internet.

Answer»

Internet Message Access Protocol

29.

______________ is used for sending e-mail messages to the Server on the Internet. (A) File Transfer Protocol (B) Hyper Text Transfer Protocol (C) Internet Message Access Protocol (D) Simple Mail Transfer Protocol

Answer»

(D) Simple Mail Transfer Protocol

30.

______________ is used for sending e-mail messages to the Server on the Internet.

Answer»

Simple Mail Transfer Protocol

31.

Match the following:Column ‘A’ Column ‘B’(1) Domain Name System (A) Sending and receiving web pages(2) Dynamic Host Configuration Protocol(B) Transfer and manipulate files(3)File Transfer Protocol (C)Automatically assign internet addresses(4) HyperText Transfer Protocol(D) Translates Network Address

Answer»
Column ‘A’ Column ‘B’
(1) Domain Name System (D) Translates Network Address
(2) Dynamic Host Configuration Protocol(C) Automatically assign internet addresses
(3)File Transfer Protocol (B) Transfer and manipulate files
(4) Hyper Text Transfer Protocol(A) Sending and receiving web pages
32.

Match the following:Column ‘A’ Column ‘B’(1) Internet Message  Access Protocol(A) Receiving e-mail messages from the server(2) Internet Relay Chat(B) Used for Internet chat(3) Post Office Protocol Version 3(C) Receiving an email fromremote mail servers(4) Simple MailTransfer Protocoll(D) Sending e-mail messages  to the Server(5) Transmission Control     Protocol &amp; Internet Protocol(E) Sending e-mail messages  to the Server

Answer»
Column ‘A’ Column ‘B’
(1) Internet Message
  Access Protocol
(A) Receiving e-mail messages from the server
(2) Internet Relay Chat(B) Used for Internet chat
(3) Post Office
 Protocol Version 3
(C) Receiving an email from
  remote mail servers
(4) Simple Mail
Transfer Protocoll
(D) Sending e-mail messages
  to the Server
(5) Transmission Control     Protocol
 & Internet Protocol
(E) Breaks down the message into packets
33.

First Generation (1G) was developed in the year …… (a) 1980 (b) 1983 (c) 1982 (d) 1981

Answer»

First Generation (1G) was developed in 1981

34.

Fill inRFID has a …… and a ….. or a ……

Answer»

reader, tag and label

35.

Expand EDGE(a) Extra Data rates for Global Evolution(b) Enhanced Data rates for Global Evolution (c) Entry Data rates for Global Evolution(d) Extra Dual rate for Global Evolution

Answer»

(b) Enhanced Data rates for Global Evolution

36.

CMDA stands for(a) Code Divide Multiple Access (b) Code Divide Mobile Access (c) Code Division Multiple Access(d) Code Division Mobile Access

Answer»

(c) Code Division Multiple Access

37.

Fill in the blanks.1. GSM means …… communication.2. SIM means ……… technology.3. TMDA means ………

Answer»

1. Global System for Mobile

2. Subscriber Identity Module

3. Time Division Multiple Access

38.

Match the following:(i) 1G – (I) GSM(ii) 2G – (II) UMTS(iii) 3G – (III) GPRS(iv) 2-3G Bridge – (IV) NMT(a) IV I II II(b) I II III IV(c) IV III II I(d) II I IV III

Answer»

(a)  IV I II III

39.

How many components of a RFID system are there?(a) 1 (b) 2(c) 3 (d) 4

Answer»

There are 3 components of a RFID system

40.

How many parts are there in RFID tags are there?(a) 1(b) 2 (c) 3 (d) 4

Answer»

There are 2 RFID in tags

41.

Which one of the following will be easy the way to uses Internet technology and the public telecommunication system to securely share business’s information with suppliers, vendors, partners and customers.(a) Extranet (b) Intranet (c) arpanet (d) arcnet

Answer»

(a) Extranet

42.

Expand NMT.(a) North Mobile Telephone(b) Nordic Mobile Telephone(c) Nordic Movement Telephone(d) Nurture Mobile Telephone

Answer»

(b) Nordic Mobile Telephone

43.

Pick the odd one out:(a) HTTP (b) SFTL (c) SSL (d) SNMP

Answer»

Answer is (d) SNMP

44.

List out the benefits of WiFi

Answer»

1. It provides mobility.

2. It provides connection to Internet.

3. Flexibility of LAN.

4. Ensures connectivity.

5. It allows places that are remote to benefit from connectivity.

6. Low cost, high benefit

45.

Find the Network management protocol from the following (a) ICMP (b) HTTP (c) TCP/IP (d) SFTP

Answer»

Network management protocol from ICMP

46.

IP connectionless datagram service was developed in the year(a) 1972 (b) 1974 (c) 1976 (d) 1978

Answer»

IP connectionless datagram service was developed in 1974

47.

How many types of RFID System available and what are they?

Answer»

Two types of RFID Systems: 

1. Active RFID system:

the tag has its own power source. These systems used for larger distances and to track high value goods like vehicles.

2. Passive RFID system:

the tag gets power through power from a reader antenna to the tag „ antenna. They are used for shorter range trAnswer:mission.

48.

List out the components of a RFID enabled system?

Answer»

Main Components of a RFID System

1. A RFID tag: It has silicon microchip attached to a small antenna and mounted on a substrate.

2. A reader: It has a scanner with antennas to trAnswer:mit and receive signals, used for communication.

3. A Controller: It is the host computer with a Microprocessor which receives the reader input and process the data.

49.

Find the wrongly matched pair(a) Network Communication Protocol – HTTP, TCP/IP(b) Network Security Protocol – ICMP(c) Network Management Protocol – SNMP

Answer»

(b) Network Security Protocol – ICMP

50.

Write short notes on HTTP, HTTPS, FTP?

Answer»

1. HTTP – A protocol used between a web client and a web server protects non-secure data trAnswer:missions. The core protocol of the World Wide Web.

2. HTTPS – A protocol used between a web client and a web server permits secure data trAnswer:missions.

3. FTP – Used between computers for sending and receiving data. Enables a client to send and receive complete files from a server.