Computer Internet & Networking Short Questions -1

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
When sending an e-mail, the _ line describes the contents of the message.
A
CC
B
subject
C
to
D
contents
E
None of these
Question 2
What is the most common way to get a virus in your computer's hard disk ?
A
) By sending e-mails
B
By installing games from their CDROMS
C
By opening e-mails
D
) By uploading pictures from mobile phones to thecomputer
Question 3
The Internet allows you to —
A
None of these
B
view Web pages
C
send electronic mail
D
connect to servers 'all around the world
Question 4
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
robotics.
B
simulation.
C
animation.
D
computer forensics.
Question 5
The HTML code written in a text editor to make webpages,
A
HTML coding tags
B
source element
C
Tags
D
Source code
Question 6
One advantage of dial-up Internet access is
A
it utilizes existing telephone service
B
it uses a router for security
C
it utilizes broadband technology
D
None of these
E
modem speeds are very fast
Question 7
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
tutorial
B
patch
C
version
D
FAQ
Question 8
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Webpage, Web-site
B
Home-page, Webpage
C
Webpage-, Home-page
D
Web-site, Home-page
Question 9
. Sending an E-mail is similar to
A
writing a letter
B
sending a package
C
drawing a picture
D
talking on the phone
Question 10
Which of the following is an example of connectivity ?
A
data
B
floppy disk
C
Internet
D
power cord
Question 11
All of the following are examples of real security and privacy risks EXCEPT:
A
spam.
B
hackers.
C
viruses.
D
identity theft.
Question 12
The __ shows all the Web sites and pages that you have visited over a period of time.
A
) task bar
B
history list
C
tool bar
D
) status bar
Question 13
What is an E-mail attachment?
A
A malicious parasite that feeds off of your messages and destroys the contents
B
A list of CC: or BCC: recipients
C
A receipt sent by the recipient
D
A separate document from another program sent along with an E-mail message
Question 14
A word in a web page that, when clicked, opens another document is called —
A
hyperlink
B
URL
C
anchor
D
reference
Question 15
A Web site address is a unique name that identifies a specific _ on the Web.
A
Web browser
B
Web site
C
Link
D
PDA
Question 16
The difference between people with access to computers and the Internet and those without this access is known as the:
A
broadband divide.
B
Internet divide.
C
digital divide.
D
Web divide.
Question 17
Choose the web-browser among the following:
A
Yahoo messenger
B
Rediffbal. net
C
Netscape Navigator
D
) MSN messenger
E
None of these
Question 18
A commonly used graphic format for the web is
A
Imp
B
) GIF
C
bmp
D
text
Question 19
Which of the following are all considered advantages of e-mail ?
A
Printable, global and expensive
B
Slow delivery, reliable, global and inexpensive
C
Global, convenience and Microsoft owned
D
Convenience, speed of delivery, generality and reliability
Question 20
If you receive an e-mail from someone you don't know, what should you do?
A
Delete it without opening it
B
Reply and ask them for their personal information
C
Forward it to the police immediately
D
Open it and respond to them saying you don't know them
Question 21
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Web divide.
B
digital divide.
C
broadband divide.
D
Internet divide.
Question 22
The process of connecting to the Internet account is
A
SIGN OUT
B
SIGN IN
C
LOG IN
D
LOG OUT
Question 23
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
protocol
B
top-level domain
C
host
D
domain name
Question 24
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
digital divide.
B
broadband divide.
C
Web divide.
D
Internet divide.
Question 25
Tunk e-mail is also called—
A
) spool
B
spam
C
spoof
D
sniffer script
Question 26
What is an E-mail attachment?
A
A malicious parasite that feeds off of your messages and destroys the contents
B
A list of CC : or BCC : recipients
C
A receipt sent by the recipient
D
A separate document from another program sent along with an E-mail message
Question 27
The __ also called the Web, contains billions of documents
A
) HTFP
B
Web Portal
C
World Wide Web
D
Domain
Question 28
Which of the following is a Web browser ?
A
Word
B
Fire fox
C
Power Point
D
Paint
Question 29
What is the term for unsolicited e-mail ?
A
newsgroup
B
backbone
C
Usenet
D
spam
Question 30
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Notepad-1 nternet Ex-plorer
B
Notepad - Msn-messenger
C
Both (1) and (2)
D
MS-word - Internet -Explorer
There are 30 questions to complete.

Leave a Comment