We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5
1.
___ are devices used to transmit data over b) host
telecommunication lines c) gateway a) Drives d) Repeater b) Drive bays Ans - B c) Modems 7. Which of the following protocols is used for d) Platform WWW? Ans - C a) FTP 2. Internet access by transmitting digital data over b) HTTP the wires of a local telephone network is provided c) W3 by _ d) All of these a) leased line Ans - B b) digital signal line 8. TCP is a commonly used protocol at c) digital subscriber line a) Application layer b) Transport layer d) digital leased line c) Network layer d) Data link layer Ans - C Ans - B 3. Which of the following protocols is used in the internet? 9. Voice mail, E-mail, Online service, the internet and the WWW are all example of a) HTTP b) DHCP a) Computer categories b) Connectivity c) DNS d) All of these c) Telecommuting d) None of these Ans - D Ans - C 4. Which one of the following is not used in media access control? 10. In Modems a) Ethernet a) Digital signal is amplified b) digital subscriber line b) Several digital signals are multiplexed c) fiber distributed data interface c) A digital signal changes some characteristic of a carrier wave d) packet switching d) None of these Ans - D Ans - C 5. The Process of keeping addresses in memory for future use is called 11. In reality, Internet Protocol recognizes only a) Routing a) An IP address b) Resolving b) A location of the host c) Caching c) A postal mail address d) None of these d) None of these Ans - C Ans - A 6. The server on the internet is also known as a a) hub 12. A small network making up the internet and 17. The E-mail component of Internet Explorer is also having a small numbers of computers within it called is called a) Message box a) Host b) Outlook Express b) Address c) Messenger Mailbox c) Subdomain d) None of these d) None of these Ans - B Ans - C 18. Free of cost repair of software bug available at 13. World Wide Web pages can be described as Internet is called multimedia pages. This means that the pages may a) Version contain b) Ad-on a) Text, pictures, sound c) Tutorial b) Text and pictures only d) Patch c) Video clips, sound, text, pictures Ans - D d) None of these 19. A ____ shares hardware, software and data Ans - C among authorized user. 14. File to the Web site is transferred by using: a) IP a) HTTP b) CPU b) ASCII c) Network c) FTP d) DNS d) None of these Ans - C Ans - C 20. The collection of links throughout the internet 15. To use Telnet and the host’s resources, you will creates an interconnected network called the need to know a) Slide Presentation b) Bookmarks a) TCP/IP address b) Electronic address c) Pie chart d) Plotter c) The address of the Internet host d) None of Ans - B these 21. The software that allows users to surf the Ans - C internet is called a __ 16. A simple protocol used for fetching e-mail from a) Search engine a mailbox is b) Internet service provider a) POP2 c) Multimedia application b) POP3 d) Browser c) IMAP Ans - D d) None of these 22. ____ is a software application used to enable Ans - B computers users to locate and access web pages. a) Website d) Auxilary b) Web browser Ans - B c) Search engine 28. A ___ is the simplest form of website, in which the site‟s content is delivered without the use d) Modem of server side processing. Ans - B a) Dynamic Website 23. Which of the following is not a web browser? b) E-Commerce Website a) Google chrome c) Static website b) Mozilla firefox d) Social Networking Website c) Internet explorer Ans - C d) Yahoo 29. Which of the following website type is used to Ans - D create beautiful animation? 24. Internet was created during the era of ___ a) Dynamic generation compuers. b) E-Commerce (a) second (b) third c) Static (c) fourth (d) fifth d) Flash Ans - C Ans - D 25. A collection of computers used for online data storage through the Internet is __ called . 30. ____ programs are automatically loaded and operates as a part of browser. (a) mainframe computer a) Add-ons (b) micro-computer b) Utilities (c) cloud computer c) Widgets (d) laptop d) Plug-ins Ans - C Ans - D 26. Computer networks in the form of LAN, WAN, MAN and the Internet help in _. 31. What is a CMS in web design (a) sharing of information a) Content Management System (b) transactions of e-commerce b) Creative Management System (c) sharing of hardware (like printers) c) Content Mixing System (d) all of them d) Creative Managerial System Ans - D Ans - A 27. ____ storage means storing important data and 32. Which of the following statements is false documents online for self and group viewing. a) You can make a website without using HTML a) Primary b) You can make a website without using PHP b) Cloud c) You can make a website without CSS c) Secondary d) You can make a website without using JavaScript Ans - A Ans - D 33. Which of the following is true? 38. The second part of email address identifies __ . a) You need a server to host your website files (a) name of individual user (b) name of the email server b) You don’t need a server to host your website files (c) name of the mobile phone operator (d) name of bank c) You can create a website without using HTML Ans - B d) You can’t create a website without a CMS 39. Each user of a email communication should Ans - A possess ___ . 34. A ____ is a document commonly written and is (a) a unique identifier, called email ID accessible through the internet or other network using a browser? (b) pen drive a) Accounts (c) external hard disk b) Data (d) DVD writer c) Web page Ans - A d) Search engine 40. The email ID of the secondary recipient of email is entered in __ field. Ans - C (a) To (b) CC 35. A __ is a unique name that identifies a website. (c) BCC (d) Subject a) TCP/IP Ans - B b) Scroll name 41. An email sent from unknown persons for c) Domain name improving the sale, image, appeal or other d) Register name characteristics of a product is called _. Ans - C (a) Junk (b) Important (c) Virus (d) Trojan 36. How can you tell the email that you have read Ans - A from the email that you have not read? 42. It is a good practice to ___ email messages a) The unread mail will be on top from unknown senders to avoid virus b) The unread mail will be on botton infection of computer. c) The unread mail will be bold (a) avoid opening attachments in d) The unread mail will be blue (b) open message and all attachments of Ans - C (c) sit looking for 37. Which of the following is an advantage of an (d) invite more spammers to send email? Ans - A a) Desired length 43. Images and videos attached to a junk email b) Ease of communication may __. c) Lower cost (a) contain anti-virus d) All of these (b) repair troubles in the operating system (c) help fast working of computers Ans - A (d) contain trojens and virusses to attack a 49. You’d like each of the emails you sent to display computer your name and other details automatically at Ans - D the end of the message. Which feature helps you to set this up? 44. Mail access starts with client when user needs to download e-mail from the a) Footers b) Signatures c) Tables d) Frames a) Mail Box Ans - B b) Mail Server 50. SGML stands for c) IP server (a) Standard Grand Markup Language d) Internet (b) Synchronized Generalized Markup Language Ans - A (c) Standard Generalized Markup Language 45. If you have to send multimedia data over SMTP (d) Simple Generalized Markup Language it has to be encoded into __ Ans - C a) Binary b) Signal c) ASCII d) None of these Ans - C 46. The primary place for receiving an email is ___ . (a) spam bin (b) inbox (c) sent mails (d) draft Ans - B 47. The actual message of an email is called the ___ . (a) content (b) attachment (c) subject (d) BCC Ans - A 48. The email ID of the primary recipient of email is entered in __ field. (a) To (b) CC (c) BCC (d) Subject