Computer Internet & Networking Short Questions -1
Internet=1
Question 1 |
When sending an e-mail, the _ line describes the contents of the message.
None of these | |
CC | |
contents | |
to | |
subject |
Question 2 |
The __ also called the Web, contains billions of
documents
Web Portal | |
) HTFP | |
World Wide Web | |
Domain |
Question 3 |
Which of the following is a Web browser ?
Paint | |
Word | |
Fire fox | |
Power Point |
Question 4 |
Choose the web-browser among the following:
None of these | |
Yahoo messenger | |
Rediffbal. net | |
) MSN messenger | |
Netscape Navigator |
Question 5 |
A Web site address is a unique name that identifies a specific _ on the Web.
PDA | |
Web site | |
Web browser | |
Link |
Question 6 |
A commonly used graphic format for the web is
) GIF | |
bmp | |
text | |
Imp |
Question 7 |
What is the most common way to get a virus in your
computer's hard disk ?
By opening e-mails | |
) By uploading pictures from mobile phones to thecomputer | |
) By sending e-mails | |
By installing games from their CDROMS |
Question 8 |
The difference between people with access to computers and the Internet and those without this access is known as
the:
Web divide. | |
broadband divide. | |
digital divide. | |
Internet divide. |
Question 9 |
What is the term for unsolicited e-mail ?
Usenet | |
spam | |
backbone | |
newsgroup |
Question 10 |
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
tutorial | |
patch | |
version | |
FAQ |
Question 11 |
The __ shows all the Web sites and pages that you have
visited over a period of time.
) task bar | |
) status bar | |
tool bar | |
history list |
Question 12 |
What is an E-mail attachment?
A receipt sent by the recipient | |
A separate document from another program sent along
with an E-mail message
| |
A malicious parasite that feeds off of your messages
and destroys the contents
| |
A list of CC : or BCC : recipients |
Question 13 |
Which of the following are all considered advantages of
e-mail ?
Convenience, speed of delivery, generality and reliability | |
Slow delivery, reliable, global and inexpensive | |
Printable, global and expensive | |
Global, convenience and Microsoft owned |
Question 14 |
. The difference between people with access to computers
and the Internet and those without this access is known as
the:
digital divide. | |
Web divide. | |
Internet divide. | |
broadband divide. |
Question 15 |
If you receive an e-mail from someone you don't know, what should you do?
Reply and ask them for their personal information | |
Delete it without opening it | |
Forward it to the police immediately | |
Open it and respond to them saying you don't know them |
Question 16 |
. Sending an E-mail is similar to
writing a letter | |
drawing a picture | |
talking on the phone | |
sending a package |
Question 17 |
The Internet allows you to —
send electronic mail | |
connect to servers 'all around the world | |
view Web pages | |
None of these |
Question 18 |
The ability to recover and read deleted or damaged files
from a criminal's computer is an ex-ample of a law
enforcement specialty called:
computer forensics. | |
simulation. | |
robotics. | |
animation. |
Question 19 |
One advantage of dial-up Internet access is
it uses a router for security | |
it utilizes broadband technology | |
it utilizes existing telephone service | |
None of these | |
modem speeds are very fast |
Question 20 |
The difference between people with access to computers and the Internet and those without this access is known as
the:
digital divide. | |
Internet divide. | |
broadband divide. | |
Web divide. |
Question 21 |
Which of the following is an example of connectivity ?
Internet | |
power cord | |
floppy disk | |
data |
Question 22 |
The process of connecting to the Internet account is
LOG OUT | |
SIGN IN | |
LOG IN | |
SIGN OUT |
Question 23 |
Tunk e-mail is also called—
spoof | |
) spool | |
sniffer script | |
spam |
Question 24 |
When we run a program in HTML coding, _ is used as backend and __works as frontend.
MS-word - Internet -Explorer | |
Notepad - Msn-messenger | |
Both (1) and (2) | |
Notepad-1 nternet Ex-plorer |
Question 25 |
What is an E-mail attachment?
A malicious parasite that feeds off of your messages
and destroys the contents
| |
A list of CC: or BCC: recipients | |
A receipt sent by the recipient | |
A separate document from another program sent along
with an E-mail message
|
Question 26 |
All of the following are examples of real security and
privacy risks EXCEPT:
spam. | |
identity theft. | |
hackers. | |
viruses. |
Question 27 |
A word in a web page that, when clicked, opens another document is called —
URL | |
reference | |
anchor | |
hyperlink |
Question 28 |
The HTML code written in a text editor to make webpages,
Source code | |
HTML coding tags | |
source element | |
Tags |
Question 29 |
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
Web-site, Home-page | |
Webpage, Web-site | |
Webpage-, Home-page | |
Home-page, Webpage |
Question 30 |
In the URL http:/www.prenhall.com, the portion labelled http is the___
top-level domain | |
host | |
domain name | |
protocol |
There are 30 questions to complete.