-
question_answer1)
What is the primary function of a web server?
A)
To store, process and deliver web pages done
clear
B)
To allocate IP address over Internet done
clear
C)
To provide maintenance services done
clear
D)
To set default port for emailing done
clear
View Solution play_arrow
-
question_answer2)
Identify the following:
- It is used for location information on the Internet. |
- It matches search terms with indexed pages. |
A)
Database done
clear
B)
Deep Web done
clear
C)
URL done
clear
D)
Search Engine done
clear
View Solution play_arrow
-
question_answer3)
Which of the following is a protocol used on the Internet?
A)
IEEE done
clear
B)
TCP done
clear
C)
ITU done
clear
D)
VCP done
clear
View Solution play_arrow
-
question_answer4)
Identify the following:
- It is one of the services offered by the Internet. |
- A search query submitted by user is passed to multiple search engines and then their response is merged into a result list. |
A)
Negative search done
clear
B)
Root search done
clear
C)
Metasearch done
clear
D)
Megasearch done
clear
View Solution play_arrow
-
question_answer5)
Broadband connection is provided over _____________.
A)
Twisted pair cables done
clear
B)
Fiber optics cable done
clear
C)
Coaxial cables done
clear
D)
All of these done
clear
View Solution play_arrow
-
question_answer6)
__________ is a public location, that offers Wi-Fi access to the public using a laptop, wireless phone or other suitable portable devices, to access the Internet.
A)
Virtual venue done
clear
B)
Wi-Fi venue done
clear
C)
Hotspots done
clear
D)
Wireless spots done
clear
View Solution play_arrow
-
question_answer7)
__________ is a mass mailing e-mail worm that attach random documents in its e-mail and send them to e-mail addresses in the host's address book.
A)
Sircam done
clear
B)
Zeus done
clear
C)
Sunday done
clear
D)
Stoned done
clear
View Solution play_arrow
-
question_answer8)
In _______ topology, every workstation has exactly two neighbours for communication and there is no need of a central connection point.
A)
Bus done
clear
B)
Star done
clear
C)
Ring done
clear
D)
Tree done
clear
View Solution play_arrow
-
question_answer9)
A specially designed webpage that brings information together from diverse sources in a uniform way is called a web portal. Which of the following options offers web portal services?
A)
B)
C)
D)
All of these done
clear
View Solution play_arrow
-
question_answer10)
What is Reverse blog?
A)
A blog in which older posts appears first. done
clear
B)
A blog which is composed by a single user. done
clear
C)
A blog that creates reverse proxy. done
clear
D)
A blog which is composed by its users rather than a single blogger. done
clear
View Solution play_arrow
-
question_answer11)
_______ is a method to acquire sensitive information like usernames, passwords and banking details - like credit card PIN, etc.
A)
Phishing done
clear
B)
Encrypting done
clear
C)
Infecting done
clear
D)
Sprucing done
clear
View Solution play_arrow
-
question_answer12)
In twisted pair cables, two insulated wires are twisted around one another to_________.
A)
Increase the speed of data transfer done
clear
B)
Provide wireless transmission done
clear
C)
Eliminate hindrance of signals due to adjacent pair or another resources done
clear
D)
Both [A] and [B] done
clear
View Solution play_arrow
-
question_answer13)
Which of the following statements is CORRECT?
A)
A Trojan horse replicates itself without any human action. done
clear
B)
Virus is a hardware and can be easily detected. done
clear
C)
Ping Pong is an example of computer virus. done
clear
D)
Computer virus is a biological organism. done
clear
View Solution play_arrow
-
question_answer14)
Match the following:
(a) Ping Pong |
(i) A Trojan horse which delete system files, rename folders and creates many empty folders |
(b) Acid rain |
(ii) A boot sector virus |
(c) Blaster |
(iii) A Computer worm that upon execution display two messages, one of which was for Bill Gates. |
A)
(a) - (i), (b) - (ii), (c) - (iii) done
clear
B)
(a) - (ii), (b) - (i), (c) - (iii) done
clear
C)
(a) - (iii), (b) - (i), (c) - (ii) done
clear
D)
(a) - (iii), (b) - (ii), (c) - (i) done
clear
View Solution play_arrow
-
question_answer15)
Computer programs that can replicate themselves without any human action and cause harm to the computer by consuming memory or network bandwidth are called _______________.
A)
Web Spider done
clear
B)
Worms done
clear
C)
Meta search done
clear
D)
None of these done
clear
View Solution play_arrow
-
question_answer16)
Which of the following statements is true for a Boot Sector Virus?
A)
It infects boot/master boot records on a hard disk. done
clear
B)
It is most active while a computer system is booting. done
clear
C)
Disk Killer is a well-known boot virus. done
clear
D)
All of these done
clear
View Solution play_arrow
-
question_answer17)
For which of the reasons dial up connections were taken over by DSL?
A)
DSL were more cheaper than dial up access done
clear
B)
DSL provides a continuous connection to the Internet and is more faster. done
clear
C)
In DSL, a user calls the ISP's access phone number to establish the connection, hence it is more secure. done
clear
D)
All of these done
clear
View Solution play_arrow
-
question_answer18)
Which of the following statements is CORRECT for Program File virus?
A)
It infects executable/program files like .exe and .com files. done
clear
B)
It is loaded in memory as soon as a program executes. done
clear
C)
Sunday virus is an example of program file virus. done
clear
D)
All of these done
clear
View Solution play_arrow
-
question_answer19)
Your computer does not have a virus if it is ______.
A)
Frequently crashing or hanging done
clear
B)
Consuming less memory done
clear
C)
Randomly displaying unusual messages done
clear
D)
Majorly dropping its speed done
clear
View Solution play_arrow
-
question_answer20)
To prevent virus from infecting your computer, you should ______________.
A)
Equip your PC with a licensed antivirus program done
clear
B)
Scan flash drives and optical discs before copying data from them done
clear
C)
Not install pirated software from unknown sources on your computer done
clear
D)
All of these done
clear
View Solution play_arrow
-
question_answer21)
Which of the following statements hold(s) true about client-server architecture?
Statement 1: In this architecture, the server has more powerful central processor, memory and larger disk drives than clients. |
Statement 2: A client/server network is utilised by desktop computers only. |
A)
Only Statement 1 done
clear
B)
Only Statement 2 done
clear
C)
Both Statement 1 and Statement 2 done
clear
D)
Neither Statement 1 nor Statement 2 done
clear
View Solution play_arrow
-
question_answer22)
Two transmission channels are shown here. Select the statement which is CORRECT about them.
A)
B)
C)
D)
View Solution play_arrow
-
question_answer23)
Consider the peer-to-peer network architecture shown here and select the statement(s) which is/are true about it.
|
(i) Each workstation has equivalent capabilities and responsibilities. |
(ii) There is no server. |
(iii) Files can be shared between workstations. |
(iv) A printer connected to one workstation can be accessed by it only, not by the other workstations. |
A)
(i) and (ii) only done
clear
B)
(ii) and (iii) only done
clear
C)
(i), (ii) and (iii) done
clear
D)
(ii), (iii) and (iv) done
clear
View Solution play_arrow
-
question_answer24)
Identify the following:
- It is software program. |
- It monitors a user's computing habits. |
- It records user's personal information. |
- It sends the recorded information to third parties without the user's knowledge. |
A)
Spyware done
clear
B)
Keybloggers done
clear
C)
Archiver done
clear
D)
None of these done
clear
View Solution play_arrow
-
question_answer25)
Match the following.
Column-I |
Column-II |
(a) E - Commerce |
(i) Founder of the World Wide Web |
(b) FTP |
(ii) Company that offers Internet services |
(c) Tim Berners-Lee |
(iii) Host computer connected to the web that contains data in the form of web pages |
(d) ISP |
(iv) Online Trading |
(e) Web server |
(v) A protocol used for exchanging files |
A)
(a) - (iv), (b) - (v), (c) - (i), (d) - (iii), (e) - (ii) done
clear
B)
(a) - (v), (b) - (iv), (c) - (i), (d) - (iii), (e) - (ii) done
clear
C)
(a) - (iv), (b) - (v), (c) - (i), (d) - (ii), (e) - (iii) done
clear
D)
(a) - (v), (b) - (iv), (c) - (i), (d) - (ii), (e) - (iii) done
clear
View Solution play_arrow