Networking and Internet

1. Network components are connected to the same cable in the _________ topology.
1) Star 2) Ring 3) Bus 4) Mesh 


2. Two or more computers connected to each other for sharing information form a : -

1) network 2) router 3) server 4) tunnel 5) pipeline

3. A computer check the ______ of user names and passwords for a match before granting access.
1) Website 2) Network 3) Backup file 4) Database

4. What is the term for unsolicited e- mail?
1) Newsgroup 2) Usenet 3) Backbone 4) Flaming 5) Spam

5. The code for web page is written using
1) A fifth generation language
2) Win zip
3) Perl
4) Hypertext markup language
5) URL

6. Small application programs that run on a web page and may ensure a form is completed properly or provide
animation are known as –
1) Flash 2) Spiders 3) Cookies 4) Applets 5) Sparks

7. ____ a collection of web pages and __ is the very first page that we see on opening of a web site.
1) Home page, Web page
2) Web-site, Home page
3) Web-page, Home-page
4) Web-page, Web Site

8. When we run a program in HTML coding, ______ is used as backend and ______ works as frontend.
1) Notepad-Internet=Explorer
2) Notepad-Msn-massager
3) Ms-Word-“Internet Explorer”
4) Both (1) and (2)

9. Which is the following refers to a small, single site network?
1) LAN 2) DSL 3) RAM 4) USB 5) CPU

10. If you receive an e-mail from someone you don’t know, what should you do?
1) Forward it to the police immediately
2) Delete it without opening it
3) Open it and respond to them saying you don’t know them
4) Reply and ask them for their personal information
5) Reply and tell the, you want to keep in touch with them

11. Computer connected to a LAN (Local Area Network) can
1) run faster
2) go on line
3) share information and /or share peripheral equipment
4) E-mail

12. The total set of interlinked hypertext documents worldwide
1) HTTP 2) Browser 3) WWW 4) B2B

13. Every computer connected to an intranet or extranet must have a distinct_____
1) Firewall 2) proxy server 3) IP address 4) domain name

14. Firewalls are used to protect against___.
1) Unauthorized Attacks
2) Virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) All of these

15. in a ring topology, the computer in possession of the can_ transmit data
1) packet 2) data 3) access method 4) token

16. URL stands for ……..
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator

17. What is the other name for a LAN Card?
1) NIC 2) Network Connector 3) MODEM 4) Internet Card

18. Which of the following cables can transmit data at high speeds
1) Coaxial Cable 2) Optic Fiber Cable 3) Twisted pair Cable 4) UTP Cable

19. What is the name of the latest Server Operating System developed by Microsoft?
1) Windows NT 2) Windows 2000 3) Windows XP 4) Windows 2003

20. What is the address given to a computer connected to a network called?
1) System Address 2) SYSID 3) Process ID 4) IP Address

21. A(n) _______is a private corporate network, used exclusively by company employees.
1) Internet 2) local area network 3) peer-to-peer 4) intranet

22. The Word FTP stands for
1) File Translate Protocol
2) File Transit Protocol
3) File Transfer protocol
4) file typing protocol

23. The linking of computers with a communication system is called
1) Networking 2) Pairing 3) Interlocking 4) Assembling 5) Sharing

24. The 1st network that initiated the internet was
1) ARPANET 2) NSF net 3) Vnet 4) Inet

25. The network interface card of LAN is related to following layer of OSI Model-1) Transport
2) Network
3) Data Link
4) Physical
5) All of these

26. The process of a computer receiving information from a server on the Internet is known as—
1) Pulling 2) Pushing 3) Downloading 4) Transferring

27. ______________ servers store and manages files for network users.
1) Authentication 2) Main 3) Web 4) File

28. A communication processor that connects dissimilar networks by providing the translation from one s et of
protocol to another is—
1) Bridge 2) Gateway 3) Router 4) Modem 5) All of these

29. …………….are used to identify a user who returns to a Website.
1) Cookies 2) Plug-ins 3) Scripts 4) ASPs

30. A modem performs
1) Modulation 2) Demodulation 3) Data compression 4) All of these

31. Which of the following is NOT done by modem?
1) Transmission Speed
2) Data Accuracy
3) Error detection and Correction
4) Data Compression

32. What is NOT a feature of networking?
1) Reliability
2) Greater storage space
3) Connectivity
4) All are features of networking

33. The internet is......
1) a large network of networks
2) an internal communication system for a business
3) a communication system for the Indian government
4) All of these

34. All of the following are examples of real security and privacy risks EXCEPT:
1) hackers. 2) spam. 3) viruses. 4) identity theft

35. Servers are computers that provide resources to other computers connected to a:
1) network. 2) mainframe. 3) supercomputer. 4) client.

36. DSL is an example of a(n)____________connection.
1) network 2) Wireless 3) Slow 4) Broadband

37. The term that refers to computers that provide resources to other computers in a network is:
1) Server 2) mainframe. 3) platform. 4) resource provider.

38. The linking of computers with a communication system is called
1) Networking
2) Pairing
3) Interlocking
4) Assembling
5) Sharing

39. __________in a ring topology , the computer in possession of the can transmit data
1) Packet 2) Data 3) access method 4) token

40. Web site is a collection of
1) HTML documents
2) Graphic files
3) Audio and Video files
4) All of the above

41. You must install a (n)_____on a network if you want to share a broadband Internet connection.
1) Router 2) Modem 3) Node 4) Cable

42. Which term identifies a specific computer on the web and the main page of the entire site
1) URL 2) Web site address 3) Hyperlink 4) Domain name

43. Which of the following performs modulation and demodulation
1) Coaxial cable 2) Satellite 3) Modem 4) Optical fiber

44. Which one of the following is not a broadband communication medium
1) Microwave 2) Fibre optic cable 3) Twisted pair 4) Coaxial cable

45. When we opens an internet site we see www. What is the full form of WWW?
1) World wide word
2) World wide web
3) Word widing works
4) Words wide spiderman web

46. MAN is a
1) Cost 2) Company 3) Network 4) Country

47. Terminal is a
1) Device used to give supply to a computer
2) Point at which data may leave or enter the computer..
3) Point where wires are interconnected
4) An input/output device

48. Which of these is a correct format of Email address?
1) Contact.website.info
2) Contactwebsite.info
3) contact@website.info
4) contact@website@info.

49. What does HTTP stands for?
1) Hypertext Transfer Protocol
2) Hypertext Transfer Plotter
3) Head Tail Transfer Plot
4) Head Tail Transfer Protocol

50. What does BCC means in Email?
1) Black Carbon Copy
2) Blind Carbon Copy
3) Business Computer Center
4) Business Computer Card

51. Which protocol provides E-mail facility among different hosts?
1) SMTP 2) FTP 3) TELNET 4) SNMP

52. A browser is a:
1) Line that delineates the edge of a program windows
2) Software program especially designed for viewing web pages on the internet.
3) Tool for resizing the window
4) Device used for modifying the window
5) All of these

53. The server on the internet is also known as a
1) Repeater 2) Host 3) Gateway 4) ISP

54. ‘WWW’ stands for ________
1) World word web 2) World wide web 3) World white web 4) World work web

55. The code for a web page is written using-----

1) Win Zip 2) Perl 3) HTML 4) URL

56. The server on the internet is also known as
1) Repeater 2) Host 3) Gateway 4) AND Gate

57. Typical data transfer rate in LAN are of the order of
1) Kilo bits per second
2) Meg bits per second
3) Bit per second
4) None of the above

58. Which of the following is suitable for networking with in a building?
1) WAN 2) VAN 3) LAN 4) MAN

59. The following software can be used to browse the Internet
1) Netscape Navigator
2) Microsoft Internet Explorer
3) NCSA Mosaic
4) All of the above

60. The communication protocol used by internet is
1) HTTP 2) WWW 3) TCP/IP 4) All of the above

61. The first page that you normally view at a Web Site is its
1) Home page 2) Master page 3) First page 4) Banner Page

62. Which of the following i s not a Web Browser
1) Opera 2) Netscape 3) Microsoft Outlook 4) Internet Explorer

63. VIRUS stands for
1) Very Important Record user Searched
2) Verify Interchanged result until source
3) Virtual Information Resource Under Seize
4) Very Important Resource Under Search

64. What is the name of the list that stores the URLs of web pages and links visited in the past few days?
1) Link List 2) Page List 3) History List 4) List

65. A connections from one HTML document to another HTML document is called
1) Hyper Link 2) Connecting Link 3) ICON 4) All of these

66. ___________ is an area of memory assigned to store any e - mail message for the user
1) Outlook Express 2) Yahoo.com 3) Post-Box 4) Mailbox

67. Viruses, Trojan horses and Worms are
1) able to harm computer system
2) unable to detect if affected on computer
3) user-friendly applications
4) harmless applications resident on computer

68. The OSI model is divided into _______ processes called layers.
1) five 2) six 3) seven 4) eight

69. Servers are computers that provide resources to other computers connected to a___________
1) mainframe 2) network 3) supercomputer 4) client

70. A _____ is a computer attached to the internet that runs special web server software and can send web pages
out to other computers over the Internet.
1) Web client 2) Web system 3) Web page 4) Web Server

71. Documents converted to ________ can be published to the web.
1) A .doc file 2) http 3) machine language 4) HTML

72. ____________ are lists of commands that appear on the screen.
1) GUIs 2) Icons 3) Menus 4) Windows

73. Verification of a login name and password is known as:
1) Configuration 2) Accessibility 3) Authentication 4) logging in

74. Direct X is a _____
1) Computer Part
2) Software that drives Graphic hardware
3) A User Interface
4) None of these

75. In the URL http://www.upscportal.com/, the portion labeled http is the
1) Host 2) domain name 3) protocol 4) top-level domain

76. Unwanted repetitious messages, such as unsolicited bulk e -mail is known as
1) Spam 2) Trash 3) Calibri 4) Courier

77. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks


78. Which of the following is the communication protocol that set the standard used by every computer that accesses web based information
1) XML 2) DML 3) HTTP 4) HTML


79. The standard protocol of the Internet is ___________
1) TCP/IP 2) JAVA 3) HTML 4) Flash

80. E-mail(electronic Mail) is
1) An internet standard that allows users to upload and download files
2) A real-time typed conversation that take place on a computer
3) An online area in which users conduct written discussion about a particular subject
4) The Transmission of messages and files via a computer network

81. A chat is
1) An internet standard that allows users to upload and download files
2) A typed conversation that takes place on a computer
3) An online area in which user conduct written discussions about a particular subject
4) The transmission of message and file via a computer network

82. The process of a computer receiving information from a server on the internet is known as
1) Pulling 2) Pushing 3) Downloading 4) Transferring

83. Digital Banking Can be resorted through
1) Mobile Phones 2) Internet 3) Telephones 4) All of these

84. Which of the slowest internet connection service?
1) DSL
2) T1
3) Cable modem
4) Leased Line
5) Dial up service

85. …………….are used to identify a user who returns to a WebsSite.

1) Cookies 2) Plug-ins 3) Scripts 4) ASPs

86. Bandwidth refers to ____________
1) The cost of the cable required to implement a WAN
2) The cost of the cable required to implement a LAN
3) The amount of information a peer to peer network can store
4) The amount of information a communications medium can transfer in a given amount of time
5) None of these

87. The term, "hypertext", means—
1) Non-sequential writing
2) Hypermedia
3) Blinking text
4) Text with heavy formatting

88. The code for a web page is written using-----1) Win Zip 2) Perl 3) HTML 4) URL

89. A(n)________________ is a private corporate network, used exclusively by company employees.
1) Internet 2) local area network 3) peer-to-peer 4) intranet

90. What is the name of the list that stores the URLs of web pages and links visited in the past few days?
1) Link List 2) Page List 3) History List 4) List

91. One advantage of dial-up internet access is
1) It utilizes broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast

92. If you wish to extend the length of the network without having the signal degrade, you would use a
1) Repeater 2) Router 3) Gateway 4) Switch

93. The ability to easily add additional users means that a network is –
1) Scalable 2) Dedicated 3) Decentralized 4) Secure

94. What is the most common way to get a virus in your computer’s hard disk?
1) By installing games from their CDROMS
2) By uploading pictures from mobile phones to the computer
3) By opening e-mails
4) By sending e-mails

95. Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as
1) An ASCII code 2) A magnetic tape 3) An OCR scanner 4) A bar code

96. E-commerce allows companies to
1) Issue important
business reports
2) Conduct business
over the internet
3) Support decision
making processes
4) Keep track of paper
base transactions

97. The device used to carry digital data on analog lines is called as
1) Modem 2) Multiplexer 3) Modulator 4) Demodulator

98. A result of a computer virus can not lead to ___.
1) Disk Crash
2) Mother Board Crash
3) Corruption of program
4) Deletion of files

99. This is a standard way for a Web server to pass a Web user's request to an application program and to receive
data back to forward to the user-1) Interrupt request
2) Forward DNS lookup
3) Data-Link layer
4) File Transfer Protocol
5) Common gateway interface

100. The OSI model is divided into _______ processes called layers.
1) five 2) six 3) seven 4) eight

101. Servers are computers that provide resources to other computers connected to a___________
1) mainframe 2) network 3) supercomputer 4) client

102. Which of the following organizations looks at standards for representation of data on the Internet?
1) ISOC 2) W3C 3) IEEE 4) IETE

103. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
1) Instructions.
2) The operating system.
3) Application software.
4) The system unit.

104. Which of the following controls the manner of interaction between the user and the operating sy stem?
1) User interface 2) Language translator 3) Platform 4) Screen saver

105. _______Servers are computers that provide resources to other computers connected to a
1) Mainframe 2) Network 3) Supercomputer 4) Client

106. Which term identifies a specific computer on the web and the main page of the entire site
1) URL 2) Web site address 3) Hyperlink 4) Domain name

107. Which of the following would most likely NOT be a symptom of a virus?
1) Existing program files and icons disappear.
2) The CD-ROM stops functioning.
3) The Web browser opens to an unusual home page.
4) Odd messages or images are displayed on the screen.

108. The HTML stands for
1) High transfer machine language
2) High Transmission Markup Language
3) Hypertext Markup Language
4) Hypermedia markup language

109. A ………. is a software program used to view web pages.
1) Site 2) Host 3) Link 4) Browser

110. Two or more computers connected to each other for sharing information form a : -1) Network 2) Router 3) Server 4) Tunnel

111. Sending an E-mail is similar to
1) Writing a letter
2) Drawing a picture
3) Talking on the phone
4) Sending a package

112. A hard copy of a file created on a computer refer to data
1) Saved on a floppy disk
2) Printed on a printer
3) Backed up on a tape drive
4) Sent as an e-mail

113. Which of the following is a web browser?
1) Paint 2) Power point 3) Fire fox 4) Word
5) All are web browsers

114. A program designed to destroy data on your computer which can travel to “infect” other computer is called a
1) Disease 2) Torpedo 3) Hurricane 4) Virus

115. The Internet allows you to :-1) Send electronic mail
2) View web pages.
3) Connect to servers all around the world
4) All of the above

116. A device that connects to a network without the use of cable is said to be:
1) Distributed 2) Wireless 3) Centralized 4) Open source

117. Junk e- mil is also called
1) Spam 2) Spoof 3) Sniffer Script 4) Spool

118. The speed at which the Network accepts the data is called.
1) Bandwidth
2) Interlacing
3) Response Time
4) Scanning
5) Maximum Speed

119. The HTML code written in a text editor to make web pages is
1) HTML coding tags
2) Source Code
3) Source Element
4) Tags

120. A set of rules that computer on a network use to communicate with each other are called.
1) Rules 2) Regulations 3) Protocol 4) Netiquettes

121. The process of connecting in the internet account is
1) LOG IN 2) LOG OUT 3) SIGN IN 4) SIGN OUT

122. Arranging of data in a logical sequence is known as
1) Classifying 2) Searching 3) Sorting 4) Reproducing

123. Firewalls are used to protect against
1) Unauthorized Attacks
2) Virus Attacks
3) Data Driven Attacks
4) Fire Attacks

124. A MODEM is connected in between a telephone line and a ________
1) Network
2) Computer
3) Communication Adapter
4) Serial Port
5) All of These

125. The most important or powerful computer in a typical network is
1) Desktop 2) Network Client 3) Network Server 4) Network Station
- 32 -126. Which of the following is an example of connectivity?
1) Internet 2) Floppy disk 3) Power card 4) Data

127. A(n) __________ is a combination of hardware and software that facilitates the sharing of information
between computer devices.
1) Network 2) Peripheral 3) Expansion board 4) Digital device

128. Servers are computer that provide resources to the other computer con nected to a ___________
1) Network 2) Mainframe 3) Super computer 4) Client

129. Connections to the Internet using a phone line and a modem are called_______ connections
1) Digital
2) Dial-up
3) Broadband
4) Dish
5) Both 2 and 3

130. To access a mainframe or super computer, user often u se
1) Terminal 2) Node 3) Desktop 4) Handheld

131. The _________ shows all the web sites and pages that you have visited over a period of time
1) Status bar 2) Task bar 3) History bar 4) Tool bar

132. Personal computer can be connected together to form a __________
1) Server 2) Super Computer 3) Enterprise 4) Network

133. A word in a web page that when clicked opens another document is called
1) Anchor 2) Hyperlink 3) Reference 4) URL

134. A proxy server is used for which of the following
1) To provide security against unauthorized users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP/IP

135. A _______ is collection of computers and device connected together.
1) Protocol 2) Memory Card 3) Network 4) Central Processing Unit

136. The _________, also called the web, Contains billions of documents
1) World Wide Web 2) HTTP 3) Web Portal 4) Domain

137. What is an e- mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an E-mail message
3) A malicious parasite that feed off of your massage and destroys the contents
4) A list of CC : or BCC recipients
5) None of these

138. A Characteristic of a file server is which of the following ?
1) Manages file operations and i s shared on a network
2) Manages file operations and is limited to one PC
3) Acts as a fat client and is shared on a network
4) Acts as a fat Client and is limited to one PCr

Image description