Computer Internet & Networking Short Questions -1

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
The Internet allows you to —
A
connect to servers 'all around the world
B
view Web pages
C
send electronic mail
D
None of these
Question 2
If you receive an e-mail from someone you don't know, what should you do?
A
Reply and ask them for their personal information
B
Open it and respond to them saying you don't know them
C
Forward it to the police immediately
D
Delete it without opening it
Question 3
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Both (1) and (2)
B
MS-word - Internet -Explorer
C
Notepad-1 nternet Ex-plorer
D
Notepad - Msn-messenger
Question 4
A Web site address is a unique name that identifies a specific _ on the Web.
A
PDA
B
Link
C
Web browser
D
Web site
Question 5
Choose the web-browser among the following:
A
Yahoo messenger
B
Netscape Navigator
C
) MSN messenger
D
Rediffbal. net
E
None of these
Question 6
What is the most common way to get a virus in your computer's hard disk ?
A
By installing games from their CDROMS
B
By opening e-mails
C
) By uploading pictures from mobile phones to thecomputer
D
) By sending e-mails
Question 7
What is the term for unsolicited e-mail ?
A
backbone
B
newsgroup
C
spam
D
Usenet
Question 8
Which of the following are all considered advantages of e-mail ?
A
Global, convenience and Microsoft owned
B
Convenience, speed of delivery, generality and reliability
C
Printable, global and expensive
D
Slow delivery, reliable, global and inexpensive
Question 9
The difference between people with access to computers and the Internet and those without this access is known as the:
A
broadband divide.
B
Internet divide.
C
Web divide.
D
digital divide.
Question 10
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
patch
B
tutorial
C
FAQ
D
version
Question 11
The __ also called the Web, contains billions of documents
A
Web Portal
B
Domain
C
) HTFP
D
World Wide Web
Question 12
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
Web divide.
B
digital divide.
C
broadband divide.
D
Internet divide.
Question 13
All of the following are examples of real security and privacy risks EXCEPT:
A
spam.
B
identity theft.
C
hackers.
D
viruses.
Question 14
Which of the following is a Web browser ?
A
Power Point
B
Paint
C
Word
D
Fire fox
Question 15
When sending an e-mail, the _ line describes the contents of the message.
A
CC
B
to
C
None of these
D
subject
E
contents
Question 16
A word in a web page that, when clicked, opens another document is called —
A
reference
B
URL
C
hyperlink
D
anchor
Question 17
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A receipt sent by the recipient
C
A list of CC: or BCC: recipients
D
A malicious parasite that feeds off of your messages and destroys the contents
Question 18
Which of the following is an example of connectivity ?
A
power cord
B
floppy disk
C
data
D
Internet
Question 19
The __ shows all the Web sites and pages that you have visited over a period of time.
A
history list
B
tool bar
C
) task bar
D
) status bar
Question 20
A commonly used graphic format for the web is
A
bmp
B
Imp
C
) GIF
D
text
Question 21
What is an E-mail attachment?
A
A receipt sent by the recipient
B
A list of CC : or BCC : recipients
C
A separate document from another program sent along with an E-mail message
D
A malicious parasite that feeds off of your messages and destroys the contents
Question 22
The HTML code written in a text editor to make webpages,
A
Tags
B
source element
C
Source code
D
HTML coding tags
Question 23
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Webpage-, Home-page
B
Web-site, Home-page
C
Home-page, Webpage
D
Webpage, Web-site
Question 24
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
domain name
B
host
C
protocol
D
top-level domain
Question 25
Tunk e-mail is also called—
A
) spool
B
sniffer script
C
spam
D
spoof
Question 26
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
digital divide.
C
Web divide.
D
broadband divide.
Question 27
One advantage of dial-up Internet access is
A
None of these
B
it uses a router for security
C
modem speeds are very fast
D
it utilizes broadband technology
E
it utilizes existing telephone service
Question 28
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
robotics.
B
computer forensics.
C
animation.
D
simulation.
Question 29
. Sending an E-mail is similar to
A
talking on the phone
B
writing a letter
C
drawing a picture
D
sending a package
Question 30
The process of connecting to the Internet account is
A
LOG OUT
B
LOG IN
C
SIGN OUT
D
SIGN IN
There are 30 questions to complete.

Leave a Comment