Tag: web technology

Questions Related to web technology

How do you change the left margin of an element?

  1. indent:

  2. text-indent:

  3. margin-left:

  4. margin:


Correct Option: C

AI Explanation

To change the left margin of an element, you can use the CSS property margin-left. This property allows you to specify the amount of space between the left edge of the element and its surrounding content.

Let's go through each option to understand why it is correct or incorrect:

Option A) indent - This option is incorrect because the indent property is used to specify the indentation of the first line in a block of text. It does not affect the margin of an element.

Option B) text-indent - This option is incorrect because the text-indent property is used to specify the indentation of the first line in a block of text. It does not affect the margin of an element.

Option C) margin-left - This option is correct because the margin-left property allows you to change the left margin of an element. By specifying a value, you can increase or decrease the amount of space between the left edge of the element and its surrounding content.

Option D) margin - This option is incorrect because the margin property is a shorthand property that allows you to set the margin on all four sides of an element at once. It does not specifically target the left margin.

The correct answer is C) margin-left. This option is correct because it specifically targets the left margin of an element.

To define the space between the element's border and content, you use the padding property, but are you allowed to use negative values?

  1. True

  2. False


Correct Option: B

1.Which among the following is not a security / privacy risk?

  1. (A)Spam

  2. (B)Hacking

  3. (C)Virus

  4. (D)Phishing

  5. (E)Vishing


Correct Option: A

AI Explanation

To answer this question, we need to understand the concepts of security and privacy risks.

Option A) Spam - This option is correct because spam refers to unsolicited and unwanted emails or messages, which can be annoying but generally do not pose a significant security or privacy risk.

Option B) Hacking - This option is incorrect because hacking refers to unauthorized access and manipulation of computer systems or networks, which can lead to security breaches and privacy violations.

Option C) Virus - This option is incorrect because a virus is a type of malicious software that can infect computer systems and cause harm, including data loss and privacy breaches.

Option D) Phishing - This option is incorrect because phishing is a type of cyber attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information, such as passwords or credit card details.

Option E) Vishing - This option is incorrect because vishing is a type of social engineering attack where attackers use voice communication to deceive individuals into revealing sensitive information, such as personal or financial details.

The correct answer is A) Spam. Spam is not a security or privacy risk, although it can be a nuisance.

  1. (A)Social networking sites

  2. (B)Mobile Phones

  3. (C)E-mails

  4. (D)Cyber caf

  5. (E)All of the above


Correct Option: B

3.When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?

  1. (A)spam

  2. (B)hacking

  3. (C)Phishing

  4. (D)Vishing

  5. (E)Simulation


Correct Option: C
  1. (A) gap between people having access to mobile and internet access

  2. (B) gap between people having access to internet /IT and no internet/IT

  3. (C) gap between people having access to broadband and narrowband internet

  4. (D) gap between people having access to internet banking and normal banking

  5. (E)Gap between the people having an email account and no email account


Correct Option: B

5.Which among the following is the most common source of Viruses to the hard disk of your computer?

  1. (A)Incoming Email

  2. (B)Outgoing Email

  3. (C)CD Roms

  4. (D)Websites

  5. (E)Mobile


Correct Option: A

AI Explanation

To answer this question, you need to understand the common sources of viruses that can infect the hard disk of a computer. Let's go through each option to understand why it is correct or incorrect:

Option A) Incoming Email - This option is correct. Incoming emails can often contain attachments or links that may contain viruses. Clicking on or downloading these attachments can infect your computer's hard disk.

Option B) Outgoing Email - This option is incorrect. Outgoing emails don't typically pose a risk of infecting your computer's hard disk with viruses. The risk lies in the attachments or links received through incoming emails.

Option C) CD Roms - This option is incorrect. While it is possible for CD Roms to contain viruses, they are not the most common source of viruses to the hard disk of a computer.

Option D) Websites - This option is incorrect. While websites can sometimes contain malicious code or links that can infect your computer, they are not the most common source of viruses in comparison to incoming emails.

Option E) Mobile - This option is incorrect. Mobile devices, such as smartphones, can be a source of viruses, but they do not directly infect the hard disk of a computer.

The correct answer is A) Incoming Email. This option is correct because incoming emails often carry attachments or links that may contain viruses, making it the most common source of viruses to the hard disk of a computer.

6.What is the fullform of W3C?

  1. (A)World Wide Web Consortium

  2. (B)World Wide Web Company

  3. (C)World Wide Web Center

  4. (D)World Wide Web Command

  5. (E)None of them


Correct Option: A

10.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?

  1. (A)Virtual keyboard

  2. (B)Finger Touching

  3. (C)Touchscreen

  4. (D)ShapeWriter

  5. (E)Dasher


Correct Option: A