Академический Документы
Профессиональный Документы
Культура Документы
Ans (a)
a)NCP
b)UNIX
c)TCP/IP
d) ACM
11. What consists of hardware and software and allows voice, video, and data to be
communicated over traditional copper-wire telephone lines?
a) ISDN
b) Cable modem
c) Communications satellite
d) Bandwidth
Ans (a)
12. A network that spans a geographical are covering a metropolitan city is called_________
a)LAN
b)MAN
c)WAN
d)None of these
Answer:b
13. What is the use of video conferencing?
a) It is used for communication purpose
b) It is used for live conferencing
c)It is used to talk to each other
d)All of the above
ANSWER: It is used for live conferencing
14. What is the full form of URL?
a) Unicode research locator
c) United research locator
ANSWER: Uniform resource locator
a) ISDN
b) Modem
c)CPU
d) DSL
21. The communications rules or protocols that allow browsers to connect with web servers is
____.
a) HTTP
b) HTML
c) Java
d)URL
Ans (a)
22. 13.IPv6 addressed have a size of___________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
Answer:c
23. All of the following are examples of real security and privacy risks EXCEPT:
a) Hackers
b)Spam
c)Viruses
d) Identity theft.
Answer: B
24.Which of the following devices allows users to make phone calls as well as browse the World
Wide Web?
a) Teleputers
b)Cell phones
c)Smartphones
d)Modems
Ans (c)
25. HTML is a
a) Programming Language
b)Scripting Language
c)Web Browser
d) Network Protocol
Ans: B Scripting Language
26. Which of the following services is not provide by ISP
a) Email
b) internet banking
c) cable televisions
d)
27. Internet tools which are used by millions of users are__________
a)WWW
b)Email
c)FTP
d)Telnet
28. The ______ addressing system uses the letter addressing system and vowels addressing
system
a)internet
b) IP
c) email
d)
29. A Net working system and devices inside a single building is called _________
Ans (a)
a)NCP
b)UNIX
c)TCP/IP
d) ACM
30. Internet access by transmitting digital data over the wires of a local telephone network is
provided by
a) leased line b) digital subscriber line
c) digital signal line d) none of these
31. There are _________internet service providers.
a) local
b) regional
c)national and international
who registered with ISP need an_______
a)Username
b)Email address
c) Internet account
d) telephone number
a)NCP
b)UNIX
c)TCP/IP
d) ACM
b) Information Retrieval
d)All of the above
34. If want to connect to your own computer through the internet from another location ,you can
use __________
a)E-mail
b) FTP
35. Which of the following is used by the browser to connect to the location of the internet
resources?
a)Linkers
b)Protocol
c)Cable
d)URL
b)Email address
c) Internet account
d) telephone number
38.The ISP are the companies which allows the users to use the internet for a ___________
a)Price
b) Promotional offers c)Place
d) product
Answer:a
39. Using a user name and password, the ISP will allow the user to connect or _________
a) Log on
b)Download
c)Upload
d) Log out
40.ISP exchanges internet traffic between their networks by
a) internet exchange point
b) subscriber end point
c) ISP end point
(b) (a) Value pricing (b) International pricing (c) Geographical pricing (d) rate of return
pricing.
45.The viruses spreads through
a)Mails b)Pen drives and cds
c) Websites d)All the above
46..Which products are people most likely to be more uncomfortable buying on the Internet?
a. Books
b. Furniture c. Movies d. All of the above
Answer: B
47. How do users prevent and protect themselves against viruses?
a. Do not open e-mail attachments, use an OS that has virus security features,
scan other users media storage devices before using them on your
computer.
b. Missing Files or folders should be deleted.
c. Files with weird and obscene messages should be stored.
d. Delete unwanted SPAM from your computer.
46. is to protect data and passwords.
A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation
47. A .. is a program that can infect other programs by modifying them, the
modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answer: B
48. Which products are people most likely to be comfortable buying on the Internet?
a. Books
b. PCs
c. CDs
d. All of the above
B
A search engine is a program to search
a) For information
b) Web pages c) Web pages for specified index terms
d) Web pages for information using specified search terms
58.
Which of the following is a name, term, sign, symbol, design, or a combination of these, that
identifies that maker or seller of a product or service?
Label
Co-brand
Brand
Product
The viruses spreads through
a)Mails
b)Pen drives and cds
c) Websites
d)All the above
198. means giving a name to the products by which it should
become known and familiar among the public.
(a) Branding (b) Promotion (c) pricing (d) none of these.
The number of customers exposed to the brand is called .
(a)Brand equity (b) Brand licensing (c) Brand awareness.
Which of the following is not a service?
(c) Hospital (b) Banking (c) Insurance (d)none of these.
9.Which products are people most likely to be more uncomfortable buying on the
Internet?
a. Books
b. Furniture
c. Movies
d. All of the above
Answer: B
10. Which products are people most likely to be comfortable buying on the Internet?
a. Books
b. PCs
c. CDs
d. All of the above
To join the internet, the computer has to be connected to a--------------a) Intetrnet architecture board
b) Internet society
c) Internet service provider
d) None of the mentioned
3. Some of the Internet users are------------a)Stu
dents
b) faculty
c)Scientist
d) All of the above
4. Internet requires
a) An international agreement to connect computers
b)A local area network
c) A commonly agreed set of rules to communicate between computers
d) A World Wide Web
5. A search engine is a program to search
a) For information
b) Web pages c) Web pages for specified index terms
d) Web pages for information using specified search terms
6. Internet addresses must always have at least
a) A country name or organization type
b) Internet service providers name
c) Name of organization
d) Name of individual
9. What consists of hardware and software and allows voice, video, and data to be communicated
over traditional copper-wire telephone lines?
a) ISDN
b) Cable modem
c) Communications satellite
d) Bandwidth
Ans (a)
10. A network that spans a geographical are covering a metropolitan city is called_________
a)LAN
b)MAN
c)WAN
d)None of these
Answer:b
11.the ISP are the companies which allows the users to use the internet for a ___________
a)Price
b) Promotional offers c)Place
d) product
Answer:a
12. IPv6 addressed have a size of___________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
Answer:c
24.Which of the following devices allows users to make phone calls as well as browse the World
Wide Web?
a) Teleputers
b)Cell phones
c)Smartphones
d)Modems
Ans (c)
25. HTML is a
a) Programming Language
b)Scripting Language
c)Web Browser
d) Network Protocol
Ans: B Scripting Language
26. Which of the following services is not provide by ISP
a) Email
b) internet banking
c) cable televisions
d)
27. Internet tools which are used by millions of users are__________
a)WWW
b)Email
c)FTP
d)Telnet
28. The ______ addressing system uses the letter addressing system and vowels addressing
system
a)internet
b) IP
c) email
d)
29.
30.A Net working system and devices inside a single building is called _________
32. Internet access by transmitting digital data over the wires of a local telephone network is
provided by
a) leased line b) digital subscriber line
c) digital signal line d) none of these
33. There are _________internet service providers.
a) local
b) regional
c)national and international
who registered with ISP need an_______
a)Username
b)Email address
c) Internet account
d) telephone number
b)UNIX
c)TCP/IP
d) ACM
35. Frequency of failure and network recovery time after a failure are measures of the _______
of a network.
a)performance
b )reliability
c) security
d) feasibility
b )reliability
c) security
d) feasibility
37. Internet is
a)complex system
b)decentralised system
b) FTP
39. Which of the following is used by the browser to connect to the location of the internet
resources?
a)Linkers
b)Protocol
c)Cable
d)URL