Basic Internet

51) Does PROTOCOL consists of?

Answer Is: (D) TCP/ IP

Explanation:

No answer description available for this question. Let us discuss.

52) The following Microsoft Internet ,Explorer, Microsoft edge, Chrome etc are which types of application.

Answer Is: (C) Browser

Explanation:

No answer description available for this question. Let us discuss.

53) What is internet ?

Answer Is: (B) a vast collection of different networks

Explanation:

No answer description available for this question. Let us discuss.

54) Saas stands for?

Answer Is: (A) Software as a service

Explanation:

No answer description available for this question. Let us discuss.

55) Email font should be

Answer Is: (B) Black in colour, easy to read, capital alphabets only where required

Explanation:

No answer description available for this question. Let us discuss.

56) A Web site's front page /main page is called

Answer Is: (B) Home Page

Explanation:

No answer description available for this question. Let us discuss.

57) ______ topology is not of Broadcast type.

Answer Is: (A) Ring

Explanation:

No answer description available for this question. Let us discuss.

58) The network establish for a particular business is called?

Answer Is: (C) Intranet

Explanation:

No answer description available for this question. Let us discuss.

59) Which of these should be avoided in an E-mail?

Answer Is: (A) Wrong E-mail address

Explanation:

No answer description available for this question. Let us discuss.

60) Transmission and delivery of information containing text, image, video, etc. to targeted recepient(s) over the internet is which type of service?

Answer Is: (A) Email

Explanation:

No answer description available for this question. Let us discuss.

61) A piece of Icon or image on a webpage associated with another webpage is call

Answer Is: (B) Hyperlink

Explanation:

No answer description available for this question. Let us discuss.

62) The software used for viewing web pages is switch type of application?

Answer Is: (D) Virus

Explanation:

No answer description available for this question. Let us discuss.

63) Viruses are_______

Answer Is: (C) Machine made

Explanation:

No answer description available for this question. Let us discuss.

64) A full domain name is a sequence of labels separed by _______

Answer Is: (B) dots

Explanation:

No answer description available for this question. Let us discuss.

65) Who coined the term "cyberspace"

Answer Is: (C) William Gibson

Explanation:

No answer description available for this question. Let us discuss.

66) Which one of the following is not used to generate dynamic web pages?

Answer Is: (D) All of the above

Explanation:

No answer description available for this question. Let us discuss.

67) Stuxnet is a________

Answer Is: (A) Worm

Explanation:

No answer description available for this question. Let us discuss.

68) Computer jargon, WWWWstands for

Answer Is: (A) world wide web worm

Explanation:

No answer description available for this question. Let us discuss.

69) Wildcard domain names start with label amendment _______

Answer Is: (B) *

Explanation:

No answer description available for this question. Let us discuss.

70) ......... is to protect data and passwords.

Answer Is: (A) Encryption

Explanation:

No answer description available for this question. Let us discuss.

71) What type of attack uses a fraudulent server with a relay address?

Answer Is: (B) MITM

Explanation:

No answer description available for this question. Let us discuss.

72) What is a web browser?

Answer Is: (D) All of the above

Explanation:

No answer description available for this question. Let us discuss.

73) Search engine which is most popular in China is

Answer Is: (D) baidu

Explanation:

No answer description available for this question. Let us discuss.

74) the full form of Malware is______

Answer Is: (C) Malicious Software

Explanation:

No answer description available for this question. Let us discuss.

75) Which one of the following protocol is not used ininternet?

Answer Is: (B) DHCP

Explanation:

No answer description available for this question. Let us discuss.

76) When did the cyber-security discourse emerge?

Answer Is: (A) 1970s

Explanation:

No answer description available for this question. Let us discuss.

77) Permting storage of files on a web based server is called?

Answer Is: (A) Cloud storage

Explanation:

No answer description available for this question. Let us discuss.

78) ____ is a search engine

Answer Is: (B) Google

Explanation:

No answer description available for this question. Let us discuss.

79) ________ indicates that the DHCP server is authorized and active

Answer Is: (B) DHCP white circle with green up arrow

Explanation:

No answer description available for this question. Let us discuss.

80) Which of the following is known as Malicious software?

Answer Is: (C) Malware

Explanation:

No answer description available for this question. Let us discuss.

81) Internet works on

Answer Is: (A) packet switching

Explanation:

No answer description available for this question. Let us discuss.

82) The Internet was originally a project of which agency?

Answer Is: (C) ARPA

Explanation:

No answer description available for this question. Let us discuss.

83) Which of the following is not a type of cloud?

Answer Is: (C) Protected

Explanation:

No answer description available for this question. Let us discuss.

84) Who coined the term " cyberspace"?

Answer Is: (C) William Gibson

Explanation:

No answer description available for this question. Let us discuss.

85) AJAX stends for

Answer Is: (A) asynchronous Javascript and xml

Explanation:

No answer description available for this question. Let us discuss.

86) The speed of your net access is defined in terms of

Answer Is: (C) kbps

Explanation:

No answer description available for this question. Let us discuss.

87) Full name of AOL is ____

Answer Is: (C) America Online

Explanation:

No answer description available for this question. Let us discuss.

88) URL stands for

Answer Is: (C) Uniform resource locator

Explanation:

No answer description available for this question. Let us discuss.

89) Which of this is an example of physical hacking?

Answer Is: (B) Inserting malware loaded USB to a system

Explanation:

No answer description available for this question. Let us discuss.

90) What is DHCP 003?

Answer Is: (D) DHCP absence WINS Servers

Explanation:

No answer description available for this question. Let us discuss.

91) HTML is used to create

Answer Is: (A) web pages

Explanation:

No answer description available for this question. Let us discuss.

92) Which of them is not wireless

Answer Is: (D) Phishing

Explanation:

No answer description available for this question. Let us discuss.

93) Code red is a(n)______

Answer Is: (B) Virus

Explanation:

No answer description available for this question. Let us discuss.

94) Which of these is not a medium for e-mail?

Answer Is: (D) Paper

Explanation:

No answer description available for this question. Let us discuss.

95) The name of the first popular web browser is______

Answer Is: (C) Mozilla

Explanation:

No answer description available for this question. Let us discuss.

96) Internet exploere is a _____

Answer Is: (A) web browser

Explanation:

No answer description available for this question. Let us discuss.

97) How does spyware infect a computer?

Answer Is: (D) all the above

Explanation:

No answer description available for this question. Let us discuss.

98) in email communication, the full name of CC is ______

Answer Is: (A) Carbon copy

Explanation:

No answer description available for this question. Let us discuss.

Comments (0)

Leave your comment

Please enter comment.

Please enter name.
Please enter valid email address.
Please enter valid website URL.

Up