Computer Internet & Networking Short Questions -1

Last updated on August 5, 2022
1 min read

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
What is the most common way to get a virus in your computer's hard disk ?
A
) By sending e-mails
B
) By uploading pictures from mobile phones to thecomputer
C
By opening e-mails
D
By installing games from their CDROMS
Question 2
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Web divide.
B
Internet divide.
C
digital divide.
D
broadband divide.
Question 3
What is the term for unsolicited e-mail ?
A
newsgroup
B
spam
C
backbone
D
Usenet
Question 4
Tunk e-mail is also called—
A
) spool
B
spoof
C
spam
D
sniffer script
Question 5
The process of connecting to the Internet account is
A
LOG IN
B
LOG OUT
C
SIGN OUT
D
SIGN IN
Question 6
What is an E-mail attachment?
A
A malicious parasite that feeds off of your messages and destroys the contents
B
A separate document from another program sent along with an E-mail message
C
A list of CC : or BCC : recipients
D
A receipt sent by the recipient
Question 7
The Internet allows you to —
A
connect to servers 'all around the world
B
send electronic mail
C
None of these
D
view Web pages
Question 8
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Webpage-, Home-page
B
Web-site, Home-page
C
Home-page, Webpage
D
Webpage, Web-site
Question 9
Which of the following is a Web browser ?
A
Power Point
B
Word
C
Paint
D
Fire fox
Question 10
The __ shows all the Web sites and pages that you have visited over a period of time.
A
history list
B
) status bar
C
tool bar
D
) task bar
Question 11
The __ also called the Web, contains billions of documents
A
Domain
B
) HTFP
C
World Wide Web
D
Web Portal
Question 12
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
protocol
B
top-level domain
C
domain name
D
host
Question 13
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
broadband divide.
B
Web divide.
C
Internet divide.
D
digital divide.
Question 14
Which of the following is an example of connectivity ?
A
data
B
floppy disk
C
Internet
D
power cord
Question 15
All of the following are examples of real security and privacy risks EXCEPT:
A
identity theft.
B
spam.
C
viruses.
D
hackers.
Question 16
Which of the following are all considered advantages of e-mail ?
A
Slow delivery, reliable, global and inexpensive
B
Convenience, speed of delivery, generality and reliability
C
Printable, global and expensive
D
Global, convenience and Microsoft owned
Question 17
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Notepad - Msn-messenger
B
Notepad-1 nternet Ex-plorer
C
MS-word - Internet -Explorer
D
Both (1) and (2)
Question 18
The HTML code written in a text editor to make webpages,
A
Source code
B
source element
C
HTML coding tags
D
Tags
Question 19
One advantage of dial-up Internet access is
A
it utilizes existing telephone service
B
None of these
C
modem speeds are very fast
D
it uses a router for security
E
it utilizes broadband technology
Question 20
If you receive an e-mail from someone you don't know, what should you do?
A
Delete it without opening it
B
Forward it to the police immediately
C
Reply and ask them for their personal information
D
Open it and respond to them saying you don't know them
Question 21
. Sending an E-mail is similar to
A
talking on the phone
B
drawing a picture
C
writing a letter
D
sending a package
Question 22
A commonly used graphic format for the web is
A
text
B
) GIF
C
bmp
D
Imp
Question 23
Choose the web-browser among the following:
A
) MSN messenger
B
Yahoo messenger
C
None of these
D
Netscape Navigator
E
Rediffbal. net
Question 24
A Web site address is a unique name that identifies a specific _ on the Web.
A
Web site
B
PDA
C
Web browser
D
Link
Question 25
The difference between people with access to computers and the Internet and those without this access is known as the:
A
digital divide.
B
Internet divide.
C
broadband divide.
D
Web divide.
Question 26
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
patch
B
version
C
tutorial
D
FAQ
Question 27
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
robotics.
B
computer forensics.
C
animation.
D
simulation.
Question 28
When sending an e-mail, the _ line describes the contents of the message.
A
to
B
subject
C
CC
D
contents
E
None of these
Question 29
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A receipt sent by the recipient
C
A list of CC: or BCC: recipients
D
A malicious parasite that feeds off of your messages and destroys the contents
Question 30
A word in a web page that, when clicked, opens another document is called —
A
URL
B
reference
C
hyperlink
D
anchor
There are 30 questions to complete.

Leave a Reply

Latest Posts

Previous Story

Computer fundamental MCQ Questions and answers -62

Next Story

Computer Internet & Networking Short Questions -2

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop