Computer Internet & Networking Short Questions -1

Last updated on August 5, 2022
1 min read

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
Tunk e-mail is also called—
A
) spool
B
sniffer script
C
spam
D
spoof
Question 2
The process of connecting to the Internet account is
A
SIGN OUT
B
SIGN IN
C
LOG IN
D
LOG OUT
Question 3
All of the following are examples of real security and privacy risks EXCEPT:
A
spam.
B
identity theft.
C
viruses.
D
hackers.
Question 4
Choose the web-browser among the following:
A
Rediffbal. net
B
) MSN messenger
C
Netscape Navigator
D
None of these
E
Yahoo messenger
Question 5
A commonly used graphic format for the web is
A
) GIF
B
text
C
Imp
D
bmp
Question 6
What is an E-mail attachment?
A
A receipt sent by the recipient
B
A separate document from another program sent along with an E-mail message
C
A list of CC : or BCC : recipients
D
A malicious parasite that feeds off of your messages and destroys the contents
Question 7
What is an E-mail attachment?
A
A malicious parasite that feeds off of your messages and destroys the contents
B
A separate document from another program sent along with an E-mail message
C
A list of CC: or BCC: recipients
D
A receipt sent by the recipient
Question 8
What is the most common way to get a virus in your computer's hard disk ?
A
) By uploading pictures from mobile phones to thecomputer
B
By installing games from their CDROMS
C
) By sending e-mails
D
By opening e-mails
Question 9
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
version
B
patch
C
FAQ
D
tutorial
Question 10
The difference between people with access to computers and the Internet and those without this access is known as the:
A
broadband divide.
B
Web divide.
C
digital divide.
D
Internet divide.
Question 11
One advantage of dial-up Internet access is
A
None of these
B
it uses a router for security
C
it utilizes broadband technology
D
modem speeds are very fast
E
it utilizes existing telephone service
Question 12
Which of the following is a Web browser ?
A
Word
B
Power Point
C
Fire fox
D
Paint
Question 13
Which of the following are all considered advantages of e-mail ?
A
Slow delivery, reliable, global and inexpensive
B
Convenience, speed of delivery, generality and reliability
C
Global, convenience and Microsoft owned
D
Printable, global and expensive
Question 14
A Web site address is a unique name that identifies a specific _ on the Web.
A
PDA
B
Link
C
Web browser
D
Web site
Question 15
The difference between people with access to computers and the Internet and those without this access is known as the:
A
digital divide.
B
Internet divide.
C
broadband divide.
D
Web divide.
Question 16
The __ shows all the Web sites and pages that you have visited over a period of time.
A
) status bar
B
) task bar
C
history list
D
tool bar
Question 17
The Internet allows you to —
A
None of these
B
connect to servers 'all around the world
C
send electronic mail
D
view Web pages
Question 18
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
domain name
B
host
C
protocol
D
top-level domain
Question 19
Which of the following is an example of connectivity ?
A
floppy disk
B
power cord
C
Internet
D
data
Question 20
A word in a web page that, when clicked, opens another document is called —
A
reference
B
hyperlink
C
URL
D
anchor
Question 21
If you receive an e-mail from someone you don't know, what should you do?
A
Forward it to the police immediately
B
Reply and ask them for their personal information
C
Delete it without opening it
D
Open it and respond to them saying you don't know them
Question 22
When sending an e-mail, the _ line describes the contents of the message.
A
None of these
B
contents
C
CC
D
subject
E
to
Question 23
What is the term for unsolicited e-mail ?
A
spam
B
newsgroup
C
Usenet
D
backbone
Question 24
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Webpage, Web-site
B
Webpage-, Home-page
C
Home-page, Webpage
D
Web-site, Home-page
Question 25
The HTML code written in a text editor to make webpages,
A
source element
B
HTML coding tags
C
Source code
D
Tags
Question 26
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
simulation.
B
animation.
C
robotics.
D
computer forensics.
Question 27
. Sending an E-mail is similar to
A
drawing a picture
B
writing a letter
C
talking on the phone
D
sending a package
Question 28
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Notepad - Msn-messenger
B
Notepad-1 nternet Ex-plorer
C
MS-word - Internet -Explorer
D
Both (1) and (2)
Question 29
The __ also called the Web, contains billions of documents
A
Web Portal
B
World Wide Web
C
Domain
D
) HTFP
Question 30
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
Web divide.
B
digital divide.
C
Internet divide.
D
broadband divide.
There are 30 questions to complete.

Leave a Reply

Latest Posts

Previous Story

Computer fundamental MCQ Questions and answers -62

Next Story

Computer Internet & Networking Short Questions -2

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop