Networking and Internet
1. Network components are connected to the same cable in the
_________ topology.
1) Star 2) Ring 3) Bus 4) Mesh
2. Two or more computers connected to each other for sharing
information form a : -
1) network 2) router 3) server 4) tunnel 5) pipeline
3. A computer check the ______ of user names and passwords for a
match before granting access.
1) Website 2) Network 3) Backup file 4) Database
4. What is the term for unsolicited e- mail?
1) Newsgroup 2) Usenet 3) Backbone 4) Flaming 5) Spam
5. The code for web page is written using
1) A fifth generation language
2) Win zip
3) Perl
4) Hypertext markup language
5) URL
6. Small application programs that run on a web page and may ensure
a form is completed properly or provide
animation are known as –
1) Flash 2) Spiders 3) Cookies 4) Applets 5) Sparks
7. ____ a collection of web pages and __ is the very first page
that we see on opening of a web site.
1) Home page, Web page
2) Web-site, Home page
3) Web-page, Home-page
4) Web-page, Web Site
8. When we run a program in HTML coding, ______ is used as backend
and ______ works as frontend.
1) Notepad-Internet=Explorer
2) Notepad-Msn-massager
3) Ms-Word-“Internet Explorer”
4) Both (1) and (2)
9. Which is the following refers to a small, single site
network?
1) LAN 2) DSL 3) RAM 4) USB 5) CPU
10. If you receive an e-mail from someone you don’t know, what
should you do?
1) Forward it to the police immediately
2) Delete it without opening it
3) Open it and respond to them saying you don’t know them
4) Reply and ask them for their personal information
5) Reply and tell the, you want to keep in touch with them
11. Computer connected to a LAN (Local Area Network) can
1) run faster
2) go on line
3) share information and /or share peripheral equipment
4) E-mail
12. The total set of interlinked hypertext documents
worldwide
1) HTTP 2) Browser 3) WWW 4) B2B
13. Every computer connected to an intranet or extranet must have a
distinct_____
1) Firewall 2) proxy server 3) IP address 4) domain name
14. Firewalls are used to protect against___.
1) Unauthorized Attacks
2) Virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) All of these
15. in a ring topology, the computer in possession of the can_
transmit data
1) packet 2) data 3) access method 4) token
16. URL stands for ……..
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
17. What is the other name for a LAN Card?
1) NIC 2) Network Connector 3) MODEM 4) Internet Card
18. Which of the following cables can transmit data at high
speeds
1) Coaxial Cable 2) Optic Fiber Cable 3) Twisted pair Cable 4) UTP
Cable
19. What is the name of the latest Server Operating System
developed by Microsoft?
1) Windows NT 2) Windows 2000 3) Windows XP 4) Windows 2003
20. What is the address given to a computer connected to a network
called?
1) System Address 2) SYSID 3) Process ID 4) IP Address
21. A(n) _______is a private corporate network, used exclusively by
company employees.
1) Internet 2) local area network 3) peer-to-peer 4) intranet
22. The Word FTP stands for
1) File Translate Protocol
2) File Transit Protocol
3) File Transfer protocol
4) file typing protocol
23. The linking of computers with a communication system is
called
1) Networking 2) Pairing 3) Interlocking 4) Assembling 5)
Sharing
24. The 1st network that initiated the internet was
1) ARPANET 2) NSF net 3) Vnet 4)
Inet
25. The network interface card of LAN is related to following layer
of OSI Model-1) Transport
2) Network
3) Data Link
4) Physical
5) All of these
26. The process of a computer receiving information from a server
on the Internet is known as—
1) Pulling 2) Pushing 3) Downloading 4) Transferring
27. ______________ servers store and manages files for network
users.
1) Authentication 2) Main 3) Web 4) File
28. A communication processor that connects dissimilar networks by
providing the translation from one s et of
protocol to another is—
1) Bridge 2) Gateway 3) Router 4) Modem 5) All of these
29. …………….are used to identify a user who returns to a
Website.
1) Cookies 2) Plug-ins 3) Scripts 4) ASPs
30. A modem performs
1) Modulation 2) Demodulation 3) Data compression 4) All of
these
31. Which of the following is NOT done by modem?
1) Transmission Speed
2) Data Accuracy
3) Error detection and Correction
4) Data Compression
32. What is NOT a feature of networking?
1) Reliability
2) Greater storage space
3) Connectivity
4) All are features of networking
33. The internet is......
1) a large network of networks
2) an internal communication system for a business
3) a communication system for the Indian government
4) All of these
34. All of the following are examples of real security and privacy
risks EXCEPT:
1) hackers. 2) spam. 3) viruses. 4) identity theft
35. Servers are computers that provide resources to other computers
connected to a:
1) network. 2) mainframe. 3) supercomputer. 4) client.
36. DSL is an example of a(n)____________connection.
1) network 2) Wireless 3) Slow 4) Broadband
37. The term that refers to computers that provide resources to
other computers in a network is:
1) Server 2) mainframe. 3) platform. 4) resource provider.
38. The linking of computers with a communication system is
called
1) Networking
2) Pairing
3) Interlocking
4) Assembling
5) Sharing
39. __________in a ring topology , the computer in possession of
the can transmit data
1) Packet 2) Data 3) access method 4) token
40. Web site is a collection of
1) HTML documents
2) Graphic files
3) Audio and Video files
4) All of the above
41. You must install a (n)_____on a network if you want to share a
broadband Internet connection.
1) Router 2) Modem 3) Node 4) Cable
42. Which term identifies a specific computer on the web and the
main page of the entire site
1) URL 2) Web site address 3) Hyperlink 4) Domain name
43. Which of the following performs modulation and
demodulation
1) Coaxial cable 2) Satellite 3) Modem 4) Optical fiber
44. Which one of the following is not a broadband communication
medium
1) Microwave 2) Fibre optic cable 3) Twisted pair 4) Coaxial
cable
45. When we opens an internet site we see www. What is the full
form of WWW?
1) World wide word
2) World wide web
3) Word widing works
4) Words wide spiderman web
46. MAN is a
1) Cost 2) Company 3) Network 4) Country
47. Terminal is a
1) Device used to give supply to a computer
2) Point at which data may leave or enter the computer..
3) Point where wires are interconnected
4) An input/output device
48. Which of these is a correct format of Email address?
1) Contact.website.info
2) Contactwebsite.info
3) contact@website.info
4) contact@website@info.
49. What does HTTP stands for?
1) Hypertext Transfer Protocol
2) Hypertext Transfer Plotter
3) Head Tail Transfer Plot
4) Head Tail Transfer Protocol
50. What does BCC means in Email?
1) Black Carbon Copy
2) Blind Carbon Copy
3) Business Computer Center
4) Business Computer Card
51. Which protocol provides E-mail facility among different
hosts?
1) SMTP 2) FTP 3) TELNET 4) SNMP
52. A browser is a:
1) Line that delineates the edge of a program windows
2) Software program especially designed for viewing web pages on
the internet.
3) Tool for resizing the window
4) Device used for modifying the window
5) All of these
53. The server on the internet is also known as a
1) Repeater 2) Host 3) Gateway 4) ISP
54. ‘WWW’ stands for ________
1) World word web 2) World wide web 3) World white web 4) World
work web
55. The code for a web page is written using-----
1) Win Zip 2) Perl 3) HTML 4) URL
56. The server on the internet is also known as
1) Repeater 2) Host 3) Gateway 4) AND Gate
57. Typical data transfer rate in LAN are of the order of
1) Kilo bits per second
2) Meg bits per second
3) Bit per second
4) None of the above
58. Which of the following is suitable for networking with in a
building?
1) WAN 2) VAN 3) LAN 4) MAN
59. The following software can be used to browse the Internet
1) Netscape Navigator
2) Microsoft Internet Explorer
3) NCSA Mosaic
4) All of the above
60. The communication protocol used by internet is
1) HTTP 2) WWW 3) TCP/IP 4) All of the above
61. The first page that you normally view at a Web Site is
its
1) Home page 2) Master page 3) First page 4) Banner Page
62. Which of the following i s not a Web Browser
1) Opera 2) Netscape 3) Microsoft Outlook 4) Internet
Explorer
63. VIRUS stands for
1) Very Important Record user Searched
2) Verify Interchanged result until source
3) Virtual Information Resource Under Seize
4) Very Important Resource Under Search
64. What is the name of the list that stores the URLs of web pages
and links visited in the past few days?
1) Link List 2) Page List 3) History List 4) List
65. A connections from one HTML document to another HTML document
is called
1) Hyper Link 2) Connecting Link 3) ICON 4) All of these
66. ___________ is an area of memory assigned to store any e - mail
message for the user
1) Outlook Express 2) Yahoo.com 3) Post-Box 4) Mailbox
67. Viruses, Trojan horses and Worms are
1) able to harm computer system
2) unable to detect if affected on computer
3) user-friendly applications
4) harmless applications resident on computer
68. The OSI model is divided into _______ processes called
layers.
1) five 2) six 3) seven 4) eight
69. Servers are computers that provide resources to other computers
connected to a___________
1) mainframe 2) network 3) supercomputer 4) client
70. A _____ is a computer attached to the internet that runs
special web server software and can send web pages
out to other computers over the Internet.
1) Web client 2) Web system 3) Web page 4) Web Server
71. Documents converted to ________ can be published to the
web.
1) A .doc file 2) http 3) machine language 4) HTML
72. ____________ are lists of commands that appear on the
screen.
1) GUIs 2) Icons 3) Menus 4) Windows
73. Verification of a login name and password is known as:
1) Configuration 2) Accessibility 3) Authentication 4) logging
in
74. Direct X is a _____
1) Computer Part
2) Software that drives Graphic hardware
3) A User Interface
4) None of these
75. In the URL http://www.upscportal.com/, the portion labeled http
is the
1) Host 2) domain name 3) protocol 4) top-level domain
76. Unwanted repetitious messages, such as unsolicited bulk e -mail
is known as
1) Spam 2) Trash 3) Calibri 4) Courier
77. Small application programs that run on a web page and may
ensure a form is completed properly or provide animation are known
as
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks
78. Which of the following is the communication protocol that set
the standard used by every computer that accesses web based
information
1) XML 2) DML 3) HTTP 4) HTML
79. The standard protocol of the Internet is ___________
1) TCP/IP 2) JAVA 3) HTML 4) Flash
80. E-mail(electronic Mail) is
1) An internet standard that allows users to upload and download
files
2) A real-time typed conversation that take place on a
computer
3) An online area in which users conduct written discussion about a
particular subject
4) The Transmission of messages and files via a computer
network
81. A chat is
1) An internet standard that allows users to upload and download
files
2) A typed conversation that takes place on a computer
3) An online area in which user conduct written discussions about a
particular subject
4) The transmission of message and file via a computer
network
82. The process of a computer receiving information from a server
on the internet is known as
1) Pulling 2) Pushing 3) Downloading 4) Transferring
83. Digital Banking Can be resorted through
1) Mobile Phones 2) Internet 3) Telephones 4) All of these
84. Which of the slowest internet connection service?
1) DSL
2) T1
3) Cable modem
4) Leased Line
5) Dial up service
85. …………….are used to identify a user who returns to a
WebsSite.
1) Cookies 2) Plug-ins 3) Scripts 4) ASPs
86. Bandwidth refers to ____________
1) The cost of the cable required to implement a WAN
2) The cost of the cable required to implement a LAN
3) The amount of information a peer to peer network can store
4) The amount of information a communications medium can transfer
in a given amount of time
5) None of these
87. The term, "hypertext", means—
1) Non-sequential writing
2) Hypermedia
3) Blinking text
4) Text with heavy formatting
88. The code for a web page is written using-----1) Win Zip 2) Perl
3) HTML 4) URL
89. A(n)________________ is a private corporate network, used
exclusively by company employees.
1) Internet 2) local area network 3) peer-to-peer 4) intranet
90. What is the name of the list that stores the URLs of web pages
and links visited in the past few days?
1) Link List 2) Page List 3) History List 4) List
91. One advantage of dial-up internet access is
1) It utilizes broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
92. If you wish to extend the length of the network without having
the signal degrade, you would use a
1) Repeater 2) Router 3) Gateway 4) Switch
93. The ability to easily add additional users means that a network
is –
1) Scalable 2) Dedicated 3) Decentralized 4) Secure
94. What is the most common way to get a virus in your computer’s
hard disk?
1) By installing games from their CDROMS
2) By uploading pictures from mobile phones to the computer
3) By opening e-mails
4) By sending e-mails
95. Codes consisting of bars or lines of varying widths or lengths
that are computer readable are known as
1) An ASCII code 2) A magnetic tape 3) An OCR scanner 4) A bar
code
96. E-commerce allows companies to
1) Issue important
business reports
2) Conduct business
over the internet
3) Support decision
making processes
4) Keep track of paper
base transactions
97. The device used to carry digital data on analog lines is called
as
1) Modem 2) Multiplexer 3) Modulator 4) Demodulator
98. A result of a computer virus can not lead to ___.
1) Disk Crash
2) Mother Board Crash
3) Corruption of program
4) Deletion of files
99. This is a standard way for a Web server to pass a Web user's
request to an application program and to receive
data back to forward to the user-1) Interrupt request
2) Forward DNS lookup
3) Data-Link layer
4) File Transfer Protocol
5) Common gateway interface
100. The OSI model is divided into _______ processes called
layers.
1) five 2) six 3) seven 4) eight
101. Servers are computers that provide resources to other
computers connected to a___________
1) mainframe 2) network 3) supercomputer 4) client
102. Which of the following organizations looks at standards for
representation of data on the Internet?
1) ISOC 2) W3C 3) IEEE 4) IETE
103. The steps and tasks needed to process data, such as responses
to questions or clicking an icon, are called:
1) Instructions.
2) The operating system.
3) Application software.
4) The system unit.
104. Which of the following controls the manner of interaction
between the user and the operating sy stem?
1) User interface 2) Language translator 3) Platform 4) Screen
saver
105. _______Servers are computers that provide resources to other
computers connected to a
1) Mainframe 2) Network 3) Supercomputer 4) Client
106. Which term identifies a specific computer on the web and the
main page of the entire site
1) URL 2) Web site address 3) Hyperlink 4) Domain name
107. Which of the following would most likely NOT be a symptom of a
virus?
1) Existing program files and icons disappear.
2) The CD-ROM stops functioning.
3) The Web browser opens to an unusual home page.
4) Odd messages or images are displayed on the screen.
108. The HTML stands for
1) High transfer machine language
2) High Transmission Markup Language
3) Hypertext Markup Language
4) Hypermedia markup language
109. A ………. is a software program used to view web pages.
1) Site 2) Host 3) Link 4) Browser
110. Two or more computers connected to each other for sharing
information form a : -1) Network 2) Router 3) Server 4)
Tunnel
111. Sending an E-mail is similar to
1) Writing a letter
2) Drawing a picture
3) Talking on the phone
4) Sending a package
112. A hard copy of a file created on a computer refer to
data
1) Saved on a floppy disk
2) Printed on a printer
3) Backed up on a tape drive
4) Sent as an e-mail
113. Which of the following is a web browser?
1) Paint 2) Power point 3) Fire fox 4) Word
5) All are web browsers
114. A program designed to destroy data on your computer which can
travel to “infect” other computer is called a
1) Disease 2) Torpedo 3) Hurricane 4) Virus
115. The Internet allows you to :-1) Send electronic mail
2) View web pages.
3) Connect to servers all around the world
4) All of the above
116. A device that connects to a network without the use of cable
is said to be:
1) Distributed 2) Wireless 3) Centralized 4) Open source
117. Junk e- mil is also called
1) Spam 2) Spoof 3) Sniffer Script 4) Spool
118. The speed at which the Network accepts the data is
called.
1) Bandwidth
2) Interlacing
3) Response Time
4) Scanning
5) Maximum Speed
119. The HTML code written in a text editor to make web pages
is
1) HTML coding tags
2) Source Code
3) Source Element
4) Tags
120. A set of rules that computer on a network use to communicate
with each other are called.
1) Rules 2) Regulations 3) Protocol 4) Netiquettes
121. The process of connecting in the internet account is
1) LOG IN 2) LOG OUT 3) SIGN IN 4) SIGN OUT
122. Arranging of data in a logical sequence is known as
1) Classifying 2) Searching 3) Sorting 4) Reproducing
123. Firewalls are used to protect against
1) Unauthorized Attacks
2) Virus Attacks
3) Data Driven Attacks
4) Fire Attacks
124. A MODEM is connected in between a telephone line and a
________
1) Network
2) Computer
3) Communication Adapter
4) Serial Port
5) All of These
125. The most important or powerful computer in a typical network
is
1) Desktop 2) Network Client 3) Network Server 4) Network
Station
- 32 -126. Which of the following is an example of
connectivity?
1) Internet 2) Floppy disk 3) Power card 4) Data
127. A(n) __________ is a combination of hardware and software that
facilitates the sharing of information
between computer devices.
1) Network 2) Peripheral 3) Expansion board 4) Digital device
128. Servers are computer that provide resources to the other
computer con nected to a ___________
1) Network 2) Mainframe 3) Super computer 4) Client
129. Connections to the Internet using a phone line and a modem are
called_______ connections
1) Digital
2) Dial-up
3) Broadband
4) Dish
5) Both 2 and 3
130. To access a mainframe or super computer, user often u se
1) Terminal 2) Node 3) Desktop 4) Handheld
131. The _________ shows all the web sites and pages that you have
visited over a period of time
1) Status bar 2) Task bar 3) History bar 4) Tool bar
132. Personal computer can be connected together to form a
__________
1) Server 2) Super Computer 3) Enterprise 4) Network
133. A word in a web page that when clicked opens another document
is called
1) Anchor 2) Hyperlink 3) Reference 4) URL
134. A proxy server is used for which of the following
1) To provide security against unauthorized users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP/IP
135. A _______ is collection of computers and device connected
together.
1) Protocol 2) Memory Card 3) Network 4) Central Processing
Unit
136. The _________, also called the web, Contains billions of
documents
1) World Wide Web 2) HTTP 3) Web Portal 4) Domain
137. What is an e- mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an
E-mail message
3) A malicious parasite that feed off of your massage and destroys
the contents
4) A list of CC : or BCC recipients
5) None of these
138. A Characteristic of a file server is which of the following
?
1) Manages file operations and i s shared on a network
2) Manages file operations and is limited to one PC
3) Acts as a fat client and is shared on a network
4) Acts as a fat Client and is limited to one
PCr
Banking terms with basic explanations
Financial terms with basic explanations and examples
How to prepare for any interview
UNESCO World heritage sites in India
Excellent video on everyone having something special
Best computer awareness question bank
Subjective topics and tips for SBI Associate PO
Maths various questions for practice
Various vacancies in Govt general insurance
20 lakh vacancies in Indian banking sector
Basic questions for banking interview