Q No.1 A word on a web page which opens other document when clicks on it is a...
Q No.2 Internet banking means
Q No.3 Which of following is a example of continuity?
Q No.4 When sending an e-mail, the......... line describes the contents of the message
Q No.5 is a device which uses for data transmission through telecommunication line.
Q No.6 Specialized programs that assist users in locating information on the Web are called.............
Q No.7 Unsolicited e-mail is called a
Q No.8 A code of webpage has been written by using
Q No.9 What is an E-mail attachment ?
Q No.10 Which of the following must be contained in a URL?
Q No.11 ____________ is a device that connects two or more networks.
Q No.12 ___________uses HTTP.
Q No.13 WWW. Uses _____________ protocol
Q No.14 Website is a collection of
Q No.15 A website's main page is called its
Q No.16 Which of the following cannot be part of an email address?
Q No.17 It helps to connect a computer from internet-
Q No.18 Which field .org is related to?
Q No.19 .com is related to
Q No.20 In computer terminology, what is the full form of IDN ?
Q No.21 An address that starts from WWW is related to-
Q No.22 is selling and buying of goods and services through internet
Q No.23 Address of a website is called an
Q No.24 Internet service is provided in India through
Q No.25 Full name of Modem is-
Q No.26 Full name of E-mail is
Q No.27 Full form of Internet is
Q No.28 A device which sends data by telephone is.................
Q No.29 _____________is called information highway
Q No.30 At Full form of WWW is
Q No.31 Yahoo, Google and MSN are.
Q No.32 Which of the following is not term of information technology ?
Q No.33 Which of the following is not defined in information technology?
Q No.34 When internet is used to send a message then this facility is called.....
Q No.35 Passwords enables users to
Q No.36 What is an e-mail?
Q No.37 A chat is
Q No.38 Secret code that restricts entry in the same programs is-
Q No.39 Sending an e-mail is like a
Q No.40 The process of a computer receiving information from a server on the internet is known as-
Q No.41 IT stands for-
Q No.42 Junk e-mail is also called-
Q No.43 The internet allows you to
Q No.44 A program designed to destroy data on your computer which can travel to infect other computers is called a
Q No.45 What is the most common way to get a virus in your computers hard disk
Q No.46 Marketing of internet banking means
Q No.47 Most websites have a main page, the........... which acts as a doorway to the rest of the website pages.
Q No.48 If you are going to a site you use often, instead of having to type in the address every time, you should
Q No.49 Output which is made up of pictures, sounds and video is called........
Q No.50 The vast network of computers that connects millions of people all over the world is called
Q No.51 Coded entries which are used to gain access to a computer system are called
Q No.52 The "home page" of a website is..........
Q No.53 The internet is a system of
Q No.54 Which of the following are all considered advantages of e-mail?
Q No.55 A...... is a software program used to view Web pages.
Q No.56 ___________allows voice conversations to travel over the Internet.
Q No.57 Which of the following is not true concerning user IDs and passwords?
Q No.58 A computer..... is a set of program instructions that can attach itself to a file reproduce itself and spread to other files.
Q No.59 Programs such as Internet Explorer that serve as navigable windows into the Web are called....
Q No.60 ___________this is the act of copying or downloading a program from a network and making multple copies of it.
Q No.61 Which of the following is the communications protocol that sets the standard used by every computer that accesses Web-based information?
Q No.62 A... is a computer attached to the Internet that runs a special Web server software and can send Web pages out to other computers over the Internet.
Q No.63 The standard protocol of the internet is
Q No.64 The acronym HTML stands for
Q No.65 The software that allows users to surf the internet is called a/an________
Q No.66 A modems
Q No.67 A Web site address is a unique name that identifies a specific __________on the web
Q No.68 The Internet allows you to .......
Q No.69 Which of the following are required to complete an e-mail......
Q No.70 Junk e-mail is also called ...
Q No.71 To view information on the web you must have......
Q No.72 ____________ is the most popular internet activity.
Q No.73 What is e-commerce?
Q No.74 Which of the following functions are not performed by servers?
Q No.75 To reload a Web page, press the
Q No.76 A popular way to learn about computers without ever going to a classroom is called........
Q No.77 A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a.......
Q No.78 The __________folder retains copies of messages that you have started but are not yet ready to send
Q No.79 __________are attempts by individuals to obtain confidential information from you by falsifying their identity,
Q No.80 What are the two parts of an E-mail address?
Q No.81 An email account includes a storage area, often called a _________
Q No.82 Mr. XYZ wants to send an electronic message to a friend. He use this type of application......
Q No.83 What is the name given to those applications that combine text, sound, graphics, motion video and/or animation?
Q No.84 What is a URL?
Q No.85 A computer hacker is
Q No.86 Video conferencing is:
Q No.87 Which of the following is free e-mail service provider?
Q No.88 HTML stands for-
Q No.89 A computer virus is-
Q No.90 The software that is used to create text-based documents are referred to as
Q No.91 ___________is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
Q No.92 DOS can not retrieve any data from a disk if a computer virus corrupts the-of the computer.
Q No.93 Which one of the following is an example of a Web Browser?
Q No.94 ICMP is used for-
Q No.95 Which of the following is a valid domain name extension?
Q No.96 URL stands for-
Q No.97 An IP address is... bit number.
Q No.98 In Computer terminology, what is the full form of FTP?
Q No.99 What is the full form of ISDN ?
Q No.100 The ______________uses an addressing scheme known as URL to indicate the location of files on the web.
Q No.101 The attribute ______________specifies (in pixel the distance between two adjacent cells.
Q No.102 The system that converts an IP address into an easy to remember format is called:
Q No.103 In HTTP, P stands for:
Q No.104 What is the full form of DHCP in networking system?
Q No.105 The internet works by using a protocol called TCP IP. What is the full form of TCP/IP?
Q No.106 Which one of the following determines how different programs exchange data over the internet ?
Q No.107 Which one of the following is NOT a search engine?
Q No.108 Which one of the following is NOT a wired broadband?
Q No.109 ___________ enables a user to remotely access another computer and terminals over the Internet.
Q No.110 In the field of computer VIRUS stands for-
Q No.111 One who gains unauthorized access, destroys vital data denies legitimate user's service or causes problems for their targets is called-
Q No.112 Which of the following is not a cybercrime?
Q No.113 The domain name of the E-mail address mark.sttol@ITdesk.info is
Q No.114 Which one of the following protocols is used for secure communication over computer network?