Sie sind auf Seite 1von 16

MODULE-2: INTERNET & COMPUTER NETWORKS

1. The term Internet was launched in the year:-


a. 1978
b. 1969
c. 1999
d. 1979
2. ARPANET stands for
a. Advanced Research project Agency Network.
b. Advanced research Project agent net
c. All read Project Agent network
3. User get an access to different stores , purchase goods using checks .credit
cards, or electronic cash at:-
A. Cyber café
B. Cyber net
C. Cybermall
D. Shopping Mall
4. RSP means:-
a. Rigid Server project
b. Regional Service provider.
c. Regional Server Provider
d. Regional Service Project.
5. ISP stands for:-
a. Intranet Service Provider
b. Internet Service Provider
c. International server Provider
d. Internal service provider
6. In order to get connected to resources the browsers must go to address
known as :-
a. Uniform Resource Locators.
b. Uniform Research Location.
c. Universal Research Locator.
d. Uniform Regional Locator

Page 1
MODULE-2: INTERNET & COMPUTER NETWORKS

7. The term Protocols in Internet means:-


a. Rules for exchanging data between computers
b. Rules for enhancing performance of computer
c. Regional rules for accessing Internet.
8. The other name for Domain is
a. HTTP
b. Top level Domain
c. URL
9. WAN means:-
a. Wide Access network
b. Wide Area network
c. Wide Area Net
10.BPS stands for:-
a. Band width per second.
b. Bits per second
c. Bytes per second
d. Bits per section
11.Program that automatically submit your search request to several engines
simultaneously is called as:-
a. Meta search engine
b. Yahoo
c. Alta vista
d. Beta Search Engine.
12.WWW stands for:-
a. Wide World web
b. World wide web
c. Wide Word web
13.Method of Transmitting electronic messages is known as
a. Electrical mail
b. Electronic mail
c. SMS

Page 2
MODULE-2: INTERNET & COMPUTER NETWORKS

14.Mail List allows members to communicate by sending messages to


_______________
a. Address
b. Group
c. List Address
15.Discussion group excludes which of the following
a. Mailing List
b. Newsgroup
c. Chat groups.
d. E-mail
16.__________ is an extension of E-mail that allows 2 or more people to contact
each other Via direct, Live communication
a. SMS
b. Instant Messaging
c. E-Mail
17.To use instant messaging , list of friends are also known as
a. Buddies
b. Contacts
c. Address
18.The different approaches to eliminate and identify Spam are:-
a. Junk Mail Filter
b. Spam blockers
c. Anti Spam programs
d. Applet
19.A typical e-Mail message as 3 basic elements:-
a. Header
b. Message
c. Signature
d. Netiquette

Page 3
MODULE-2: INTERNET & COMPUTER NETWORKS

20.Header appear first and typically includes the following except :-


a. Address
b. Subject
c. Attachments
d. Virus
21.IM is known as :-
a. Infrared message
b. Instant Message
c. Internet Message
22.Newsgroups use a special network of computer called:-
a. User net
b. Internet
c. Use Net
23._____-is program that provides access to web resources.
a. DHTML
b. HTML
c. JAVA
d. Browser
24.A Popular chat service is called :-
a. Internet resource chat
b. Internet Relay chat
c. Internet reliable chat
25.The group that connects user who have never met face to face:-
b. E-mail
c. Chat groups
d. None of these.
26.If you connect computers together to communicate and exchange
information the result is :-
a. Network
b. Internet
c. Intranet

Page 4
MODULE-2: INTERNET & COMPUTER NETWORKS

27.The browser uses HTML:-


a. To Display Webpage
b. As a Protocol
c. Applet
28.Following is the language used for designing Web page:-
a. HTML
b. HLML
c. HTWL
29.When surfing the web the browser interprets the HTML Command found in a
doc file and display it as
a. Web page
b. Domain page
c. Java page
30.In the following Jane@esource.org what is the domain name:-
a. E-source
b. Jane
c. .org
31.Directory Search is also known as :-
a. Search engine
b. Dictionary
c. Index search
32.Here the middlemen is eliminated by allowing manufacturer to sell directly
to the consumer is known as:-
a. Business to consumer
b. Consumer to Consumer
c. Business to Business
33.The last part of the domain with (.) is known as headers.
a. True
b. False
34.______ are special program written in java .
a. Applets
b. Spider
c. Projects

Page 5
MODULE-2: INTERNET & COMPUTER NETWORKS

35.Adobe Acrobat is an example of


a. Protocol
b. Plug-in
c. Suite
36.These typically appear as underlined colored text & images
a. Protocol
b. Hyperlink
c. Applets
37.This Node in a computers network shares resource with other nodes
a. Client
b. Modem
c. Server

38.Someone who aids new users by answering questions is known in the


chatting section as
a. Master
b. Saint
c. Wizard
39.Special programs which continuously look for new information and update
the search services are.
a. Spiders
b. Meta engines
c. Web crawlers
40.Individuals selling to individuals on internet is known as
a. E-commerce
b. Business to consumer
c. Consumer to consumer
41.Criminals who are specialized in stealing , trading, and using stolen credit
cards over internet are known as
a. Thieves
b. pirates
c. carders

Page 6
MODULE-2: INTERNET & COMPUTER NETWORKS

42.Other name for electronic cash is


a. Digital cash
b. E-cash
c. Cyber cash
43.Internet allows its user to copy files to their known as
a. Copying
b. Format painter
c. Downloading
44.Copying files from your computer to another computer on internet is known
as
a. Downloading
b. Swapping
c. Uploading
45.Plug-ins operate as a part of :-
a. http
b. www
c. browser
46.An internet standard that allows you to connect to another
computer[host]on internet and to log on to that computer is known as:-
a. Plug-ins
b. Downloading
c. Telnet
47. The well known filters are:-
a. cyber shot
b. cyber Patrol
c. cyber sitter
d. net nanny

Page 7
MODULE-2: INTERNET & COMPUTER NETWORKS

48.Which of these are plug-ins:-


a. Acrobat Reader
b. Net nanny
c. Cosmos
d. Quick time
e. shockwave
49.E-money, world pay, pay pal are examples of:-
a. Web stores.
b. Auction sites
c. Electronic cash providers.
50.The other name for Directory search is also known as
a. Web search
b. Folder search
c. Index search
51.The browser uses HTML
a. As a temporary applet
b. As a protocol
c. To display web page.
52. If you connect computer together to communicate and exchange
information , the result is called as
a. Internet
b. Intranet
c. Network
53.____ is also known as voice bandwidth and low band width which is used in
standard telephone communication
a. Voice over
b. Voice band
c. Volume band
54.In start network a number of small computers or peripheral devices are
linked to central unit
a. True
b. False

Page 8
MODULE-2: INTERNET & COMPUTER NETWORKS

55.This is a device that is connected to a network. It could be any device such as


a data storage device, a printer or a computer.
a. Modem
b. Node
c. Server

56.This is a node that uses a resource from another node.


a. Server
b. Modem
c. Client
57.This is the central node for other nodes. It may be a server or simply a
connection point for cables from other nodes.
a. Client
b. Hub
c. Plug
58.A person who is a computer specialist responsible for efficient operation of
the network and implementation of new networks.
a. Software engineer
b. Computer analyst
c. Network Administrator
59.It is a large centralized computer, usually a minicomputer or a mainframe.
a. Host computer
b. Hub
c. None of these
60.Network interface cards (NIC)is examples of
a. LAN adapter
b. MAN adapter
c. WAN Adapters
61.These are expansion cards located within the system unit that connects the
computer to a network.
a. E-Cards
b. Network interface cards.
c. COSMOS

Page 9
MODULE-2: INTERNET & COMPUTER NETWORKS

62.when computers in one office are connected to one another, the network is
known as
a. LAN
b. MAN
c. WAN
63.LAN network when used at home is called as
a. Wan
b. Home Networks
c. MAN
64.This type of network is jointly owned by a group of organizations or by a
network service provider who charges a fee to provide network services.
a. WAN
b. LAN
c. MAN
65.They use microwave relays and satellites to reach users over long distances.
a. WAN
b. MAN
c. LAN.
66.The Largest of WAN is --
a. Intranet
b. Extranet
c. Internet
67.This term describes the physical arrangement of the network.
a. Configurations
b. Link
c. Art
68.This term defines how information and resources are shared.
a. Raid
b. Strategies
c. Architecture

Page
10
MODULE-2: INTERNET & COMPUTER NETWORKS

69.A network that can be configured or arranged in several ways is called as


a. Resources sharing
b. network’s topology
c. Hub
70.Star, Bus, Ring and Hierarchical are examples of
a. Terminals
b. Network topologies
c. Band with
71.In Star network,_____ may be a host computer or file server.
a. Switch
b. Plug-in
c. Hub
72.Here a number of small computers or peripheral devices are linked to a
central unit which is the “network hub” is a
a. Star Topology
b. Ring Topology
c. Bus Topology
73.Here there is no host computer and each device handles its own
communications. All communications travel along a common connecting
cable called a
a. Bus
b. Star
c. Hierarchical
74.There is no central computer and messages are passed around till it reaches
the correct destination.
a. BUS
b. Ring
c. Star
75.One Top level computer connected to next level computer which in turn is
connected to third level computer or peripheral devices is known as
a. Bus
b. hierarchical network
c. Ring

Page
11
MODULE-2: INTERNET & COMPUTER NETWORKS

76.The most common network strategies are terminal, client/server and peer-to-
peer.
a. True
b. False
77.In this type of network the nodes are either terminals with little or no
processing capabilities
a. Star network
b. terminal network
c. Peer-to-peer.
78.This type of network is based on specialization and use one computer to
coordinate and supply services to other nodes on the network.
a. Terminal
b. client/server
c. Peer to Peer
79.Here the nodes have equal authority and can act as both clients and servers:
a. Terminals
b. Client
c. Peer to peer
80.An intranet is a private network within an organization while an extranet is a
private network that connects more than one organization
a. True
b. False
81.It’s a part of Intranet, which can be accessed by certain external users via the
Internet.
a. Web page
b. Extra net
c. Netscape
82.A system that secures a network, shielding it from access by unauthorized
users is known as
a. Protection
b. Firewall
c. Spyware

Page
12
MODULE-2: INTERNET & COMPUTER NETWORKS

83.Many organizational firewalls include a special computer called a “proxy


server”. It acts as a gatekeeper.
a. False
b. True
84.All communications between the internal network and the outside world
must pass through it
a. Mainframe
b. Proxy Server
c. Terminal
85.________can be termed as a Network of Networks.
a. Internet
b. Extranet
c. Internet
86.Here a seller is not required to maintain a physical inventory of goods and
products are shipped directly from warehouses. This type of business is
known as
a. E-Mail
b. E-Commerce
c. Extranet
87. www.consumersearch.com and www.epinions.com are examples of
a. Search engines
b. Web organization
c. product review sites
88.A shopping bot is an automated shopping assistant that searches the Internet
for the best price of a product.
a. True
b. False
89. www.mysimon.com and www.shopping.yahoo.com are examples of
a. E-mail
b. Shopping bot
c. Shopping malls

Page
13
MODULE-2: INTERNET & COMPUTER NETWORKS

90.The sites which allows you to check the reputation of the vendor before
placing an order is known as
a. Seller review sites
b. Vendor review sites
c. Consumer review sites
91.“www.gomez.com” and “www.bizrate.com” are examples of
a. Shopping sites
b. Vendor review sites
c. Web malls
92.The programs that make computing easier are known as
a. Web browser
b. Web Utilities
c. Netscape
93.Web utilities facilitate sharing resources over the Internet while others
enhance the capabilities of your browser.
a. False
b. True
94.A software package that can be accessed through a web browser
a. web-based application
b. Web based applet
c. Web designing
95.These are programs that block access to selected sites
a. Firewalls
b. Filters
c. Plug-ins
96.These programs control spam, protect against computer viruses, provide
filters and much more.
a. Internet browsing
b. Internet Security Suites
c. Filters.

Page
14
MODULE-2: INTERNET & COMPUTER NETWORKS

97.McAfee and Norton are examples of


a. Web utilities
b. Internet Security Suites
c. Cosmos
98.Computer communications is the process of sharing data, programs and
information between two or more computers
a. True
b. False
99.Mozilla, Netscape, Internet Explorer are examples of
a. Software
b. browser application
c. online operating system
100. Moving through different web pages means
a. Browsing
b. Web Surfing
c. Web moving
101. A message is sent; it is reformatted or broken down into small parts called
packets which travel separately on different routes towards a common
destination.
a. True
b. False
102. It’s a high-frequency transmission cable and consists of a single solid-
copper core
a. Cable wire
b. Coaxial cable
c. twisted-pair cable
103. This cable transmits data as pulses of light through tiny tubes of glass.
a. Coaxial cable
b. twisted-pair cable
c. Fiber-optic cable
104. Short-range wireless standard that uses microwaves.
a. Bluetooth
b. WI-FI

Page
15
MODULE-2: INTERNET & COMPUTER NETWORKS

105. Global Positioning System (GPS)” is a network of 24 satellites developed by


the United States Department of Defense which continually sends location
information to the earth.
a. True
b. False.
106. Bandwidth indicates the volume of information that can move across the
communication channel in a given time.
a. True
b. False
107. This type of bandwidth is used in special leased lines to connect
minicomputers and mainframes as well as to transmit data over long
distances.
a. Voice band
b. Medium band
c. Voice over
108. This bandwidth used for high capacity transmissions
a. Medium band
b. Broadband
c. Narrow band
109. Which among these is not used as connection Technologies
a. Dial-up.
b. Cable
c. ISP
d. Wireless Modem
110. Real players & shockwaves are classified as Plug-in.
a. False
b. True

Page
16

Das könnte Ihnen auch gefallen