.net domain is used for
1.educational institution
2. Internet infrastructure and service providers
3.International organizations
4.None of the above
A piece of icon or image on a web page associated with another webpage is called
1.url
2.hyperlink
3.plugin
4. none of the mentioned
An alternative of javascript on windows platform is
1.VBScript
2.ASP.NET
3.JSP
4.None of the mentioned
Dynamic web page
1.is same every time whenever it displays
2.generates on demand by a program or a request from browser
3.both (a) and (b)
4.none of the mentioned
In a URL, the ______ is the computer on which the information is located.
1.path
2.protocol
3.host
4.None of the mentioned
In a URL, the _______ is the full name of the file where the information is located.
1.path
2.protocol
3.HOST
4.None of the above
In internet terminology IP means
1.Internet Provider
2.Internet Protocol
3.Internet Procedure
4.Internet Processor
Its main purpose is to prohibit unauthorized access to your computer via the Internet.
1.popup blocker
2.firewall
3.spyware blocker
4.spam
The Internet is an example of a …………… network.
1.ring
2.bus
3.hybrid
4.mesh
The term DNS stands for
1.Domain Name System
2.Defense Nuclear System
3.Downloadable New Software
4.Dependent Name Server
The _________ is a standard for specifying any kind of information on the Internet.
1.URL
2.ULR
3.RLU
4.None of the mentioned
What is a web browser?
1.a program that can display a web page
2.a program used to view html documents
3.it enables user to access the resources of internet
4.all of the mentioned
Which of the following is a wrong direction to guard against a ‘Phishing’ attack?
1.Log on to a site by typing the proper URL in the address bar
2.Ensure that the URL of the login page starts with http:// and not https://
3. Give user id and password only at authenticated login page
4.Look for the lock sign/icon and verisign certificate
Which of the following statements is incorrect regarding multimedia on the web?
1.The MPEG, AIFF and WAV are cross-platform formats
2.The MPEG, AU and MIDI are cross-platform formats
3. The SND format has a relatively low fidelity
4.VRML can be used to model and display 3D interactive graphics
Which one of the following is not a search engine ?
1.Google
2.Chrome
3.Yahoo
4.Bing
Which protocol is used for secure communication over internet?
1.IP
2.UDP
3.HTTP
4.HTTPS
WWWW, in computer parlance, stands for
1.World Wide Web Worm
2.World Wide Wildlife Web
3.World Wide Women’s Web
4.World Wide Women’s Week
. ___________ forms the highest layer of TCP/IP and divides a message over file into smaller packets which are transmitted over the Internet.
1.TCP
2.IP
3.Telnet
4. FTP
A dial-up connection enables to connect to ISP using a
1.Modem
2.Router
3.Gateways
4.Bridge
A social networking service offered by Google Inc.
1. Facebook
2.Google+
3.Twitter
4.Instagram
A web cookie is a small piece of data
1.sent from a website and stored in user’s web browser while a user is browsing a website
2.sent from user and stored in the server while a user is browsing a website
3.sent from root server to all servers
4.none of the mentioned
A ________ is typically a database containing information about domain names and their correspondence IP address.
1.Telnet
2.FTP
3.TCP
4. DNS
……………. is a 32-bit number, normally expressed as four octets between the periods.
1.Port
2.Domain name
3.IP address
4.None of these
…………offer a quick and easy way to share files and resources directly.
1.CD
2.USB
3.Network
4.None of the above
Commercial messages on the net are identified as
1.Net ads
2. Internet commercials
3.Webmercials
4. Viral advertisements
Common gateway interface is used to
1.generate executable files from web content by web server
2.generate web pages
3.stream videos
4.none of the mentioned
DNS is an Internet service that translates domain names to or from __________.
1. MAC address
2.IP address
3.both (a) and (b)
4.None of the above
GIF stands for
1.Global Information Format
2.Graphics Information Format
3.Graphics Interchange File
4. Graphics Interchange Format
In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.
1. path
2.protocol
3.host
4.none of the above
In a URL, the _______ is the client-server program used to retrieve the document.
1.path
2.protocol
3.host
4.None of the above
Inserting spurious data or information into an organization’s system to disrupt or overload services is called
1.Interruption
2.Interception
3.Modification
4.Fabrication
IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following:
1.Number of bits required for IPv4 address is more than number of bits required for IPv6 address.
2.Number of bits required for IPv4 address is same as number of bits required for IPv6 address.
3.Number of bits required for IPv4 address is less than number of bits required for IPv6 address.
4.Number of bits required for IPv4 address is 64.
Manuel Castelle was the first to use the term
1.Internet society
2.Electronic society
3.Network society
4.Telematic society
The extensions .gov,.edu,.nic ,and .net are called as
1.Mail addresses
2.DNSs
3.Domain codes
4. Email targets
The Internet is a system of …………..
1.Software bundles
2.Web page
3.Web site
4.Interconnected Networks
The Internet Relay Chat was developed by
1.Jarkko Oikarinen
2.Tim Berners-Lee
3.Robert Cailliau
4.None of the above
The Internet was originally a project for this government agency.
1.ARPA
2.NSF
3.NSA
4.None of these
URL stands for:
1.Uniform Resource Loader
2.Uniform Research Locator
3.Uniform Research Loader
4.Uniform Resource Locator
What are cookies?
1.Cookies are text files stored on the client computer and they are kept for various information tracking purpose.
2.Cookies are binary files stored on the server computer and they are kept for various information tracking purpose.
3.Cookies are binary files stored on the client computer and they are kept for data storage purpose.
4.None of the above.
What do you need to put your web pages on the www ?
1.a connection to internet
2.a web browser
3.a web server
4.all of the above
What is the full form of PDF in the context of computer file system?
1.Personalised Data Format
2.Pixel Digital File
3.Pictured Data Format
4.Portable Document Format
What is the full form of URL ?
1.Uniform Reverse Location
2.Universal Resolution Location
3.Uniform Resource Locator
4.United Resource Locator
What is the full form of URL ?
1.Uniform Reverse Location
2.Universal Resolution Location
3.Uniform Resource Locator
4.United Resource Locator
What is the full form of URL?
1.Uniform Resource Library
2.Uniform Resource Locator
3.United Resource Library
4.United Resource Locators
Which is an instant messenger that is used for chatting?
1. Google Talk
2.AltaVista
3.MAC
4. Microsoft Office
Which of the following is an example of Web browser?
1.Yahoo
2.Google
3. Mozilla Firefox
4.Gmail
Which of the following is not a component of networking?
1.Hubs
2.Motherboard
3.Routers
4.Switches
Which of the following is not an example of search engine?
1.Google
2.Gmail
3.Yahoo
4.Altavista
Which of the following is not related to information security on the Internet ?
1.Data Encryption
2.Water marking
3.Data Hiding
4.Information Retrieval
Which of the following is the correct chronology of internet based facilities?
1.Google, Hotmail, Facebook, whatsapp
2.Facebook, Google, Hotmail, Whatsapp
3.Hotmail, Google, Facebook, Whatsapp
4.Hotmail, Facebook, Google, Whatsapp
Which one of the following is not a Web Browser?
1.Internet Explorer
2. MS Office
3.Safari
4.Mozilla Firefox
Which one of the following is not used to generate dynamic web pages?
1.PHP
2.ASP.NET
3.JSP
4.none of the mentioned
Which was the first search engine in the Internet?
1.Google
2.Archie
3.Alta Vista
4.WAIS
Who is the founder of Facebook?
1.Glen Recort
2.Tim Berners Le
3.Allen Turing
4. Mark Zuckerberg
www is based on which model?
1. Local-server
2. Client-server
3. 3-tier
4.None of the above
_________ is a repository of information linked together from points all over the world.
1.The WWW
2.HTTP
3.HTML
4.None of the mentioned