Computer Internet & Networking Short Questions -1

Last updated on August 5, 2022
1 min read

Computer Internet & Networking Short Questions -1

Internet=1

Question 1
. Sending an E-mail is similar to
A
talking on the phone
B
writing a letter
C
sending a package
D
drawing a picture
Question 2
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
A
version
B
tutorial
C
patch
D
FAQ
Question 3
The Internet allows you to —
A
connect to servers 'all around the world
B
view Web pages
C
None of these
D
send electronic mail
Question 4
The __ also called the Web, contains billions of documents
A
Web Portal
B
World Wide Web
C
) HTFP
D
Domain
Question 5
The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
digital divide.
C
Web divide.
D
broadband divide.
Question 6
. The difference between people with access to computers and the Internet and those without this access is known as the:
A
Internet divide.
B
digital divide.
C
broadband divide.
D
Web divide.
Question 7
The difference between people with access to computers and the Internet and those without this access is known as the:
A
broadband divide.
B
Web divide.
C
Internet divide.
D
digital divide.
Question 8
What is the most common way to get a virus in your computer's hard disk ?
A
) By sending e-mails
B
) By uploading pictures from mobile phones to thecomputer
C
By opening e-mails
D
By installing games from their CDROMS
Question 9
A Web site address is a unique name that identifies a specific _ on the Web.
A
Web browser
B
Link
C
Web site
D
PDA
Question 10
A word in a web page that, when clicked, opens another document is called —
A
anchor
B
URL
C
reference
D
hyperlink
Question 11
When we run a program in HTML coding, _ is used as backend and __works as frontend.
A
Notepad - Msn-messenger
B
Both (1) and (2)
C
MS-word - Internet -Explorer
D
Notepad-1 nternet Ex-plorer
Question 12
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A malicious parasite that feeds off of your messages and destroys the contents
C
A receipt sent by the recipient
D
A list of CC : or BCC : recipients
Question 13
If you receive an e-mail from someone you don't know, what should you do?
A
Reply and ask them for their personal information
B
Open it and respond to them saying you don't know them
C
Delete it without opening it
D
Forward it to the police immediately
Question 14
What is the term for unsolicited e-mail ?
A
spam
B
backbone
C
Usenet
D
newsgroup
Question 15
The HTML code written in a text editor to make webpages,
A
Tags
B
HTML coding tags
C
source element
D
Source code
Question 16
Which of the following is an example of connectivity ?
A
floppy disk
B
power cord
C
data
D
Internet
Question 17
Tunk e-mail is also called—
A
spam
B
) spool
C
spoof
D
sniffer script
Question 18
Which of the following are all considered advantages of e-mail ?
A
Global, convenience and Microsoft owned
B
Printable, global and expensive
C
Slow delivery, reliable, global and inexpensive
D
Convenience, speed of delivery, generality and reliability
Question 19
The process of connecting to the Internet account is
A
LOG IN
B
LOG OUT
C
SIGN IN
D
SIGN OUT
Question 20
A commonly used graphic format for the web is
A
Imp
B
text
C
) GIF
D
bmp
Question 21
When sending an e-mail, the _ line describes the contents of the message.
A
contents
B
subject
C
None of these
D
to
E
CC
Question 22
In the URL http:/www.prenhall.com, the portion labelled http is the___
A
protocol
B
host
C
domain name
D
top-level domain
Question 23
The ability to recover and read deleted or damaged files from a criminal's computer is an ex-ample of a law enforcement specialty called:
A
robotics.
B
animation.
C
simulation.
D
computer forensics.
Question 24
Which of the following is a Web browser ?
A
Paint
B
Word
C
Power Point
D
Fire fox
Question 25
All of the following are examples of real security and privacy risks EXCEPT:
A
viruses.
B
hackers.
C
identity theft.
D
spam.
Question 26
The __ shows all the Web sites and pages that you have visited over a period of time.
A
) task bar
B
history list
C
tool bar
D
) status bar
Question 27
Choose the web-browser among the following:
A
None of these
B
Rediffbal. net
C
) MSN messenger
D
Netscape Navigator
E
Yahoo messenger
Question 28
One advantage of dial-up Internet access is
A
it utilizes existing telephone service
B
it uses a router for security
C
it utilizes broadband technology
D
None of these
E
modem speeds are very fast
Question 29
What is an E-mail attachment?
A
A separate document from another program sent along with an E-mail message
B
A list of CC: or BCC: recipients
C
A malicious parasite that feeds off of your messages and destroys the contents
D
A receipt sent by the recipient
Question 30
__ is collection of web-pages and __ is the very first page that we see on opening of a website.
A
Home-page, Webpage
B
Web-site, Home-page
C
Webpage, Web-site
D
Webpage-, Home-page
There are 30 questions to complete.

Leave a Reply

Latest Posts

Previous Story

Computer fundamental MCQ Questions and answers -62

Next Story

Computer Internet & Networking Short Questions -2

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop