The document is a question bank for an exam on Internet Technology. It contains 40 multiple choice questions testing knowledge of topics like FTP, ISPs, firewalls, web browsers, URLs, and other internet and networking concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
105 views2 pages
Certificate Certificate
The document is a question bank for an exam on Internet Technology. It contains 40 multiple choice questions testing knowledge of topics like FTP, ISPs, firewalls, web browsers, URLs, and other internet and networking concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
QUESTION BANK FOR DCA I SEM Internet Technology (104) Hi-tech Institute Of Computers
MIZORAM STATE COUNCIL FOR TECHNIAL EDUCATION
Certificate Course Examination, December, 2019 Certificate in Computer Application Subject: Internet Technology (DCA - 104) Full Marks: 40 Time: 1 hour SETC Choose the correct answer from the following: (1X40=40) 1. How many parts are there in FTP server? a) One c) Three b) Two d) Four 2. Connections to the backbone are made by a) ISPs c) ARPANET b) LAN d) Internet 3. Which one of the following grants privileges to process and users? a) Password c) Filter b) Authorization d) Firewall 4. A code used to send message to someone is? a) Password c) Privacy b) Key d) Data 5. The growth rate of an internet per month is exponentially a) 14% c) 18% b) 12% d) 8% 6. Which one of the following is the Unix command that displays the path name of your terminal's device file a) tly c) tuy b) lty d) tty 7. Moving a file from one's computer to the remote computer is known as a) Copying c) Downloading b) Uploading d) Extracting 8. FTP sites expect you to use a special account called a) Non-Anonymous c) Server b) Anonymous d) Database 9. The full form of HTML is? a) High Tech Multimedia c) Hyper Text Markup Link b) Hyper Text Markup Language d) Hyper Technology Multimedia 10. The full form of ISP is a) Internet Standard Program c) Internal System Port b) Internet System Plan d) Internet Service Provider 11. Which one of the following gives rock solid protection against thieves and vandals? a) Zone alarm c) Proxy b) Firewall d) All of the above 12. Users within corporations and large organization typically connect to an 1SP via high speed link is called a) Dialup connection b) Broadband connection c) Direct connection d) None of the above 13. Buying and selling items online is a) Online shopping b) Online buying c) E-commerce d) All of the above 14. A company selling or buying products from other companies is a) Business to business b) Business to company a) Company to company d) Company to business 15. The concept of WWW was developed in a) India c) USA b) Japan d) Switzerland 16. The full form of MODEM is a) Modulator Demodulator c) Mode Emphasis b) Mode Multiplication d) None of the above 17. As a way to speed up file transfers and save space on the FTP server, files are commonly a) Compressed c) Trimmed b) Expanded d) All of the above 18. Which one of the following is software that is distributed for free on a trial basis? a) Freeware c) Trial version b) Shareware d) Firmware 19. The most common form of computer security is a) Authentication c) Password b) Stealing d) Callback 20. The study of structure refers to a) Analog c) Anatomy b) Strategy d) Categorize
20 QUESTION BANK FOR DCA I SEM Internet Technology (104) Hi-tech Institute Of Computers
21. How many types of hyperlink are there?
a) One c) Three b) Two d) Four • Text hyperlink • Image hyperlink • Bookmark hyperlink • E-mail hyperlink 22. Part of a complete website is a) Website c) Web browser b) Web page d) Bookmark 23. When a digital signal is converted into analog form, it is called a) Modulation c) Conversion b) Demodulation d) Radio Signal 24. Unauthorized access to computer system is called a) Hashing c) Hacking b) Cybercrime d) Trespassing 25. The process of taking encrypted data and rendering it readable for trusted users is? a) Decryption c) Cryptography b) Rendering d) Encryption 26. A computer language developed by sun Microsystems is? a) Android c) Symbian b) Linux d) Java 27. The upper most section of an e-mail is a) Header c) Margin b) Footer d) Top-level 28. Public messaging and bulletin board system is a) Usenet c) Arpanet b) Telnet d) Ethernet 29. A key which is known only to the owner is called? a) Kernel key c) Private key b) Public key d) Personal key 30. If your personal computer has access to the internet, then it is categorized as a) Server c) Node b) Network d) Client 31. The syntax of uniform resource locator (URL) is a) http://html/www.abc.com /ans.html b) http://www.abc.com/ansJhtml/html/ c) http://html/ans.html/www.abc.com d) http://www.abc.com/html/ans.html 32. Altering data before a computer processing and then changing back to its original state after the processing is completed is a) Data diddling c) Data jacking b) Data hacking d) All of the above 33. Which of the following is necessary to have by the Host computer to send and receive information across the internet? a) IP address c) Browser b) Web page d) Internet Connection 34. The full form of URL is a) Unreserved location c) Uniform resource locator b) Unit Resource language d) None 35. A user can execute the telnet command on his/her local computer to start a login session on a remote computer. This is called a) Remote login c) Remote chatting b) Online login d) Remote access 36. While up loading a file from computer to the server, files move from the local to a) Remote c) Desktop b) Local d) All of the above 37. World largest electronic discussion forum is a) Telnet c) Usenet b) Internet d) Server 38. The number topics through which you can chat with many people all over the world is called a) Internet c) Zone b) Servers d) Channel 39. The full form of ISOC is a) Internet society b) international standard office centre c) instruction of command d) internet socket 40. Preventing the network communication system falling in the hands of unauthorized is called? a) Controlling c) Security b) Hazard d) Prevention