Web Browser and Networking
Web Browser and Networking
a) Internet Provider
b) Internet Protocol
c) Internet Procedure
d) Internet Processor
2.Its main purpose is to prohibit unauthorized access to your computer via the Internet
a)popup blocker
b)firewall
c)spyware blocker
d)spam
3.What do you need to put your web pages on the www ?
a)a connection to internet
b)a web browser
c)a web server
d)all of the above
4.Which of the following is not related to information security on the Internet ?
a)Data Encryption
b)Water marking
c)Data Hiding
d)Information Retrieval
5.Which of the following is a wrong direction to guard against a ‘Phishing’ attack?
a)Log on to a site by typing the proper URL in the address bar
b)Ensure that the URL of the login page starts with http:// and not https://
c)Give user id and password only at authenticated login page
d)Look for the lock sign/icon and verisign certificate
6.WWW, in computer parlance, stands for
a)World Wide Web
b)World Wide Wildlife
c)World Wide Women’s
d)World Wide Women’s Week
7.………………. is a 32-bit number, normally expressed as four octets between the periods.
a)Port
b)Domain name
c)IP address
d)None of these
8.The term DNS stands for
a) Domain Name System
b)Defense Nuclear System
c)Downloadable New Software
d)Dependent Name Server
27.…………offer a quick and easy way to share files and resources directly.
a) CD
b) USB
c) Network
d) None of the above
28. Which one of the following is not a Web Browser?
a) Internet Explorer
b) MS Office
c) Safari
d) Mozilla Firefox
29. What is the full form of PDF in the context of computer file system?
a) Personalised Data Format
b) Pixel Digital File
c) Pictured Data Format
d) Portable Document Format
30. A social networking service offered by Google Inc
a) Facebook
b) Google+
c) Twitter
d) Instagram
31. ISP stands for
a) International Server Protocol
b) Internal Storage Protocol
c) Internet Service Provider
d) Internet Storage Provider
32. Which of the following is not a component of networking?
a) Hubs
b) Motherboard
c) Routers
d) Switches
33. The extensions .gov,.edu,.nic ,and .net are called as
a) Mail addresses
b) DNSs
C) Domain codes
d) Email targets
34. Which is an instant messenger that is used for chatting?
a) Google Talk
b) AltaVista
c) MAC
d) Microsoft Office
35. Commercial messages on the net are identified as
a) Net ads
b) Internet commercials
c) Webmercials
d) Viral advertisements
39. Which protocol is used for secure communication over internet?
a) IP
b) UDP
c) HTTP
d) HTTPS
40. Who is the founder of Facebook?
a) Glen Recort
b) Tim Berners Le
c) Allen Turing
d) Mark Zuckerberg
41.
The software that enables the user to interact with the contents present on a web page?
a) www
b) HTTP
c) Browser
d) URL
42. Process of copying file from remote server to local drive is called as _________
a) Downloading
b) Refreshing
c) Browsing
d) Uploading
43. Websites used for building network with friends and relatives is called as ________.
a) E Commerce
b) Net Banking
c) Social Networking
d) Blogging
44. Websites used to sell and buy something are categorized under __________.
a) Search Engines
b) E-Commerce Website
c) Social Networking Sites
d) Entertainment Sites
45. Google is an example of ___________.
a) Entertainment
b) Search Engine
c) Social Network
d) None of these
46. ______ is the process of fetching all the web pages linked to a web site.
a) Crawling
b) Processing
c) Calculating Relevancy
d0Indexing
47. Another name of internet is __________.
a) Virtual Space
b) Data Space
c) Information Space
d) Cyber Space