Computer Internet & Networking Short Questions -1

Last updated on August 5, 2022
1 min read

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
Which of the following is a Web browser ?
A
Word
B
Power Point
C
Fire fox
D
Paint
Question 2
When sending an e-mail, the _ line describes the contents of the message.
A
None of these
B
to
C
CC
D
contents
E
subject
Question 3
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
tutorial
B
patch
C
version
D
FAQ
Question 4
The Internet allows you to —
A
send electronic mail
B
connect to servers 'all around the world
C
view Web pages
D
None of these
Question 5
A Web site address is a unique name that identifies a specific _ on the Web.
A
Web browser
B
Link
C
PDA
D
Web site
Question 6
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Webpage-, Home-page
B
Web-site, Home-page
C
Home-page, Webpage
D
Webpage, Web-site
Question 7
A commonly used graphic format for the web is
A
Imp
B
) GIF
C
bmp
D
text
Question 8
The __ shows all the Web sites and pages that you have visited over a period of time.
A
) task bar
B
tool bar
C
) status bar
D
history list
Question 9
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
broadband divide.
C
Web divide.
D
digital divide.
Question 10
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Web divide.
B
broadband divide.
C
Internet divide.
D
digital divide.
Question 11
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
top-level domain
B
host
C
protocol
D
domain name
Question 12
Choose the web-browser among the following:
A
Netscape Navigator
B
None of these
C
) MSN messenger
D
Yahoo messenger
E
Rediffbal. net
Question 13
Which of the following is an example of connectivity ?
A
Internet
B
floppy disk
C
power cord
D
data
Question 14
What is an E-mail attachment?
A
A malicious parasite that feeds off of your messages and destroys the contents
B
A receipt sent by the recipient
C
A separate document from another program sent along with an E-mail message
D
A list of CC : or BCC : recipients
Question 15
The process of connecting to the Internet account is
A
LOG OUT
B
LOG IN
C
SIGN IN
D
SIGN OUT
Question 16
The __ also called the Web, contains billions of documents
A
Domain
B
World Wide Web
C
) HTFP
D
Web Portal
Question 17
Which of the following are all considered advantages of e-mail ?
A
Printable, global and expensive
B
Slow delivery, reliable, global and inexpensive
C
Convenience, speed of delivery, generality and reliability
D
Global, convenience and Microsoft owned
Question 18
What is the most common way to get a virus in your computer's hard disk ?
A
By installing games from their CDROMS
B
By opening e-mails
C
) By uploading pictures from mobile phones to thecomputer
D
) By sending e-mails
Question 19
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
computer forensics.
B
simulation.
C
robotics.
D
animation.
Question 20
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Notepad - Msn-messenger
B
Both (1) and (2)
C
MS-word - Internet -Explorer
D
Notepad-1 nternet Ex-plorer
Question 21
All of the following are examples of real security and privacy risks EXCEPT:
A
spam.
B
identity theft.
C
hackers.
D
viruses.
Question 22
The HTML code written in a text editor to make webpages,
A
Tags
B
Source code
C
HTML coding tags
D
source element
Question 23
One advantage of dial-up Internet access is
A
it utilizes existing telephone service
B
it utilizes broadband technology
C
it uses a router for security
D
None of these
E
modem speeds are very fast
Question 24
What is the term for unsolicited e-mail ?
A
newsgroup
B
spam
C
backbone
D
Usenet
Question 25
Tunk e-mail is also called—
A
spoof
B
spam
C
) spool
D
sniffer script
Question 26
. Sending an E-mail is similar to
A
drawing a picture
B
writing a letter
C
talking on the phone
D
sending a package
Question 27
If you receive an e-mail from someone you don't know, what should you do?
A
Open it and respond to them saying you don't know them
B
Forward it to the police immediately
C
Reply and ask them for their personal information
D
Delete it without opening it
Question 28
The difference between people with access to computers and the Internet and those without this access is known as the:
A
digital divide.
B
broadband divide.
C
Internet divide.
D
Web divide.
Question 29
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A list of CC: or BCC: recipients
C
A malicious parasite that feeds off of your messages and destroys the contents
D
A receipt sent by the recipient
Question 30
A word in a web page that, when clicked, opens another document is called —
A
URL
B
reference
C
anchor
D
hyperlink
There are 30 questions to complete.

Leave a Reply

Latest Posts

Previous Story

Computer fundamental MCQ Questions and answers -62

Next Story

Computer Internet & Networking Short Questions -2

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop