Computer Internet & Networking Short Questions -1

1 min read

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
All of the following are examples of real security and privacy risks EXCEPT:
A
hackers.
B
identity theft.
C
viruses.
D
spam.
Question 2
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
computer forensics.
B
robotics.
C
simulation.
D
animation.
Question 3
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
digital divide.
C
Web divide.
D
broadband divide.
Question 4
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
digital divide.
C
Web divide.
D
broadband divide.
Question 5
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
digital divide.
C
Web divide.
D
broadband divide.
Question 6
Which of the following is a Web browser ?
A
Paint
B
Power Point
C
Word
D
Fire fox
Question 7
The Internet allows you to —
A
send electronic mail
B
view Web pages
C
connect to servers 'all around the world
D
None of these
Question 8
Tunk e-mail is also called—
A
spoof
B
spam
C
sniffer script
D
) spool
Question 9
What is the most common way to get a virus in your computer's hard disk ?
A
By installing games from their CDROMS
B
) By uploading pictures from mobile phones to thecomputer
C
) By sending e-mails
D
By opening e-mails
Question 10
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A receipt sent by the recipient
C
A malicious parasite that feeds off of your messages and destroys the contents
D
A list of CC: or BCC: recipients
Question 11
Which of the following are all considered advantages of e-mail ?
A
Printable, global and expensive
B
Global, convenience and Microsoft owned
C
Convenience, speed of delivery, generality and reliability
D
Slow delivery, reliable, global and inexpensive
Question 12
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A receipt sent by the recipient
C
A malicious parasite that feeds off of your messages and destroys the contents
D
A list of CC : or BCC : recipients
Question 13
. Sending an E-mail is similar to
A
drawing a picture
B
writing a letter
C
talking on the phone
D
sending a package
Question 14
The __ also called the Web, contains billions of documents
A
Web Portal
B
) HTFP
C
World Wide Web
D
Domain
Question 15
Choose the web-browser among the following:
A
) MSN messenger
B
Yahoo messenger
C
Rediffbal. net
D
None of these
E
Netscape Navigator
Question 16
The __ shows all the Web sites and pages that you have visited over a period of time.
A
) status bar
B
) task bar
C
tool bar
D
history list
Question 17
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
domain name
B
host
C
protocol
D
top-level domain
Question 18
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
version
B
tutorial
C
patch
D
FAQ
Question 19
A Web site address is a unique name that identifies a specific _ on the Web.
A
Web browser
B
PDA
C
Link
D
Web site
Question 20
A word in a web page that, when clicked, opens another document is called —
A
hyperlink
B
anchor
C
reference
D
URL
Question 21
When sending an e-mail, the _ line describes the contents of the message.
A
to
B
None of these
C
contents
D
CC
E
subject
Question 22
Which of the following is an example of connectivity ?
A
floppy disk
B
Internet
C
power cord
D
data
Question 23
The process of connecting to the Internet account is
A
SIGN IN
B
LOG OUT
C
LOG IN
D
SIGN OUT
Question 24
A commonly used graphic format for the web is
A
Imp
B
bmp
C
text
D
) GIF
Question 25
The HTML code written in a text editor to make webpages,
A
HTML coding tags
B
source element
C
Source code
D
Tags
Question 26
If you receive an e-mail from someone you don't know, what should you do?
A
Delete it without opening it
B
Forward it to the police immediately
C
Open it and respond to them saying you don't know them
D
Reply and ask them for their personal information
Question 27
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Home-page, Webpage
B
Webpage-, Home-page
C
Web-site, Home-page
D
Webpage, Web-site
Question 28
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Notepad - Msn-messenger
B
Notepad-1 nternet Ex-plorer
C
MS-word - Internet -Explorer
D
Both (1) and (2)
Question 29
One advantage of dial-up Internet access is
A
it utilizes broadband technology
B
None of these
C
it uses a router for security
D
modem speeds are very fast
E
it utilizes existing telephone service
Question 30
What is the term for unsolicited e-mail ?
A
newsgroup
B
Usenet
C
backbone
D
spam
There are 30 questions to complete.

Leave a Reply

Your email address will not be published.

Previous Story

Computer fundamental MCQ Questions and answers -62

Next Story

Computer Internet & Networking Short Questions -2

Latest from Blog

error: Content is protected !!