0% found this document useful (0 votes)
192 views22 pages

104dec2014 Jun2019

Uploaded by

Norman Ralte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views22 pages

104dec2014 Jun2019

Uploaded by

Norman Ralte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

IV.

Fill in the blanks: (10x1=10) MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
Certificate Course Examination, December, 2014
a) The internet is most often used for the exchange of Certificate in Computer Application
…………. and information. (Pictures/ Messages) Subject: Internet Technologies (CCA-104)
b) When a computer is flooded with more request than it can
Full Mark : 40 Time : 1 hours
handle, it crashes, which is called………….….....……..
…………. (Distributed Denial of Service/ Trojan attack) I. Write down the full form for the following abbreviations: (10x1 =10)
c) ………….….....…… helps to locate topic on the internet.
(Navigator/ Search engine) 1) ARPANET - Advanced Research Project Agency Network
d) Internet explorer is the default………….….....…… installed 2) HTML - Hypertext Markup Language
in windows operating system. (Web browser/ Web page) 3) IRC - Internet Relay Chat
e) Email address is made of………….….....…… (Three part/ 4) ASCII - American Standard Code For Information Interchange
5) SMTP - Simple Mail Transfer Protocol
two part)
6) POP3 - Post Office Protocol version 3
f) The email component of internet explorer is called ………… 7) VoIP - Voice over Internet Protocol
……………… (Gmail/ Outlook Express) 8) JS - Java Script
g) ………….…..... is maintaining business relationship and 9) SSL - Secure Sockets Layer
selling information. (E-Commerce/ M-Commerce) 10) PKE - Public Key Encryption
h) Java was developed by ………….….....…………………
(Apple/ Sun Microsystem) II. Select the correct answer from the given choice (10x1=10)
1) A word that look underlined on a web page usually is
i) The process of translating information from its original form
A. An important word B. A link to another webpage
into an encoded, incomprehensible form is called ………… C. The web address D. A mistake
…………………….. (Decryption/ Encryption). Ans : a link to another webpage
j) A computer program that place destructive code in programs such
games to erase either hard disk or programs on disks is called 2) Which of the following protocol is used for WWW?
………….….....……… (Boots sector virus/ Trojan Horse) A. ftp B. TCP/IP
C. http D. ISP
Ans : http

3) Which is not an advantage of using email?


A. speed B. Ease of use
C. low cost D. Privacy
Ans : Privacy
4) A telnet session is established by Ans : Hacking, Viruses, Software piracy
A. word for windows B. Telnet client
C. Outlook Express D. None of the above 10) Which of the following is not a type of firewall?
Ans : Telnet client A. Packet filtering firewall B. Stage full inspection
C. Proxy firewall D. Alta vista
5) SMTP is a simple Ans : Alta vista
A. TCP Protocol B. IP Protocol
C. TCP/IP Protocol D. None of the above III. State whether the following statements are TRUE or FALSE:
Ans : None of the above (10x1=10)
a) E-Commerce means buying and selling item online. T
6) Which of the following statement is not correct for digital b) An email address is not case sensitive. F
signature c) The act of exploring the web is known as surfing. T
A. It is a mechanism for authentication
d) Newsgroup is the world largest electronic discussion forum. T
B. It is scanned image of one picture
C. It is created by encryting information e) A convenient place to store contact information for quick
D. it cannot be duplicate retrieval is the address box. T
Ans : it is scanned image of one picture f) Email messages are usually addressed and delivered to only
one or two people. F
7) Scripting language can be used to provide g) When java programs are run inside the browser, they are
A. Simple feature to the webpage called JavaScript. F
B. Main feature to the webpage
h) Java is supported on more platforms than JavaScript. F
C. Dynamic feature to the webpage
D. None of the above i) Firewall is hardware or software designed to protect against
Ans : Dynamic feature to the web page network hackers. T
j) Password is a method of authentication. T
8) Javascript is used for
A. client-side program B. Creating interactive form
C. Data validation D. All of the above
Ans : All of the above

9) Network are vulnerable to computer crime like


A. theft, vandalism, graffiti
B. Hacking, Viruses, software piracy
C. Internet addiction, sabotage, negligence
D. None of the above
20. Software that is used to search through a database of webpages is called MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
a) Wikipedia b) search website Certificate Course Examination, December, 2015
c) search engine d) google Certificate in Computer Application
Ans : search engine Subject : Internet Technology (CCA-104)

C. State TRUE OR FALSE (10X1=10)


Full Mark : 40 Time : 1 hour
1. The ARPANET was to connect universities, research laboratories and some A. Write the full form of the following Abbreviations. (10x1=10)
military laboratories. T
1. ARPANET : Advanced Research Project Agency Network
2. The internet is owned by the United States of America. F 2. POP3 : Post Office Protocol version 3
3. The Father of the World Wide Web is Tim Berner-Lee. T 3. IRC : Internet Relay Chat
4. FTP : File transfer Protocol
4. Telnet is used for remote login. T
5. WWW : World Wide Web
5. IRC is used for exchanging photos and videos. F 6. IIS : Internet Information Service
6. Related site on the Internet is hyperlink. T 7. HTTP : Hypertext Transfer Protocol
8. URL : Uniform Resource Locator
7. The basic requirement of Internet security are confidentiality, integrity and 9. TCP : Transmission Control Protocol
availability. T 10. USENET : User Network
8. An email can be sent only one address at a time. F
B. Choose the correct answer (20X1=20)
9. Cryptography is the science of information security. T 1. Protocols are
10. Software that you remind to register all the time is often called nagware. T a) set of rules b) set of maps
c) set of computers d) set of products
Ans : set of rules

2. What is the term used for unsolicited e-mail?


a) newsgroup b) Usenet
c) Flaming d) Spam
Ans : spam

3. Buying and selling the product over electronic system like Internet is
called
a) online shopping b) net banking
c) e-commerce d) digital marketing
Ans : e-commerce
4. A computer virus is a 12. A collaborative network that uses internet to link business with their
a) hardware b) Software supplier is
c) bacteria d) freeware a) Intrenet b) Extranet
Ans : freeware c) Intranet d) Externet
Ans : Extranet
5. Which is the device that converts computer output into a form that can be
transmitted over a telephone line 13. The email is made of 2 part; the host name and the
a) Teleport b) multiplexer a) username b) userid
b) Concentrator d) modem c) hosted d) mailname
Ans : Modem Ans : username

6. The FTP was started in the year 14. The first page that you normally view at a website is the
a) 1971 b) 1972 a) Webpage b) Endpage
c) 1973 d) 1974 b) Start page d) Homepage
Ans : 1973 Ans : homepage

7. Which of the following is not a web browser? 15. Pick the odd one out
a) opera b) internet Explorer a) Business –to-business b) business-to-customer
c) Google d) Apple Safari b) Digital middleman d) customer-to-business
Ans : Google Ans : customer-to-business

8. ISP stands for 16. Which of the following is not a cyber crime?
a) Indian Service Provider b) Internet Service Provider a) hacking b) worm attack
c) Internet Service Provision d) Internal Service Provider c) denial of service attack d) blocking attack
Ans : Internet Service Provider Ans : blocking attack

9. Which of the following URL is the correct? 17. Getting e-mail on the mobile phone is possible due to
a) http:google.com b) http://www.google a) SMTP b) HTTP
c) http:\\www.google.com d) http://www.google.com c) FTTP d) IMAP4
Ans : http://www.google.com Ans : IMAP4

10. The most common protocol used to access URL address on the Internet is the 18. The two part of email is separated by the symbol
a) SMTP b) HTTP a) # b) % c) @ d) &
c) FTP d) IMAP Ans : @
Ans : HTTP
19. The most common form of security is
11. Firewall are used to protect against a) thumb print b) body scan
a) unauthorized attack b) data driven attacks c) password d) voice
c) virus attacks d) fire attacks Ans : password
Ans : unauthorized attack
38. Full form of FTP is MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
a) File Telnet Protocol b) File Transfer Protocol Certificate Course Examination, December, 2016
c) Free transmission propagation d) File theft prevention Certificate in Computer Application
39. The company which developed clients, servers and other web software is Subject : Internet Technology (DCA-104)
called
a) Microsoft Corporation b) Netscape Communication Corporation Full Mark : 40 Time : 1 hour
c) CERN d) MIT
40. USENET means A. Choose the correct answer (1X40=40)
a) User-network b) user service network 1. Network of network is called a/an
c) User network technique d) utility service network a) Internet b) LAN c) web d) www
2. IPR stands for
a) Intellectual Property Right
b) Information Public Relation
c) Indian Press Report
d) None of the above
3. Which one of the following is an interconnection between several
computers of different kind across the world?
a) Intranet b) internet c) website d) LAN
4. Which one of the following is correct?
a) intranet is a computer-based worldwide information network
b) www is computer based worldwide information network
c) internet is a computer-based worldwide information network
d) none of the above
5. Difference computers and networks are united with common thread of
how many protocols?
a) One b) two c) three d) four
6. Which one of the following is not the characteristic of internet?
a) disorganized b) dynamic c) widely used d) free of charge
7. Which one of the following supervised the starting of internet at the
beginning?
a) W3C b) URL c) ISP d) ARPANET
8. Most of the services in the internet can be accessed through which of the
following?
a) web browser b) www c) LAN d) IP address
9. Which one of the following generic term is used to describe a client,
server or a network?
a) network b) server c) nodes d) IP
10. E-Mail (Electronic Mail) was started in the year
a) 1990 b) 1970 c) 1973 d) 1979
11. A URL is divided into how many part? 25. Text hyperlinks are generally denotes in
a) One b) two c) three d) four a) Red color and underlined b) green color and underlined
12. The username and domain name in an email are separated by a symbol? c) Black color and underlined d) blue color and underlined
a) # b) & c) @ d) % 26. Conversion of analog signal to its digital form at the destination is called
13. SMTP stands for a) demodulation b) modulation c) modem d) conversion
a) Simple Mail Transfer Port b) Simple Mail Transfer Protocol 27. Buying and selling items online is called
c) Simple Mail Transport Protocol d) Simple Mail Transfer Process a) Commerce on the internet b) E-Commerce
14. E-Mail address/ addresses of secondary recipient(s) to whom copy need to c) Online shopping d) net surfing
be sent is 28. These days, CEO‟s of the organization are talking face to face to their
a) Cc b) To c) Bcc d) sender junior officer using web cameras and internet facilities. This is called
15. If a movie with a sound is to be transmitted, which one of the format has a) Video chatting b) skyping
to be used? c) Net meeting d) etiquette
a) Mp3 b) JPEG c) GIF d) MPEG 29. Point out which one of the following is not the nature of poor Netiquette.
16. Changing the standard code into a different code means a) Poor programmer and spelling error b) junk mails
a) phising b) decoding c) encryption d) coding c) harsh language d) spam mails
17. Which one of the following is an e-mail message is the personal information 30. Communication that do not waste the user‟s times are considered as
which automatically appears at the bottom of the outgoing message? a) Time management b) Good communication
a) Attachment b) Signature c) subject d) date c) Reliable ISP d) Good netiquette
18. Which one of the following puts the world of online communication on your 31. IRC stands for
computer desktop? a) Information and related crime b) internet relay chat
a) Outlook express b) netscape mail c) email clients d) server c) Internet relay code d) information research centre
19. Which one of the following is responsible for addressing and sending of date 32. TCP stands for
from one computer to another? a) Transmission Control Port b) Transfer Control Protocol
a) addressing b) TCP c) IP d) ISP c) Transmission Control Protocol d) Transfer Control port
20. HTML stands for 33. Company selling or buying products from other company is called
a) Hyper Text Mark Language b) High Text Markup Language a) Business to business b) Business to customer
c) Hyper Text Markup Language d) None of the above c) Customer to customer d) Company to company
21. Which one of the following translates the alphabetic address into 34. NVT stand for
numerical address, so e-mail can be sent to the proper location? a) Network Virtual terminal b) network Visual Terminal
a) IP address b) DNS c) routing d) MIME c) Network Virtual term d) none of the above
22. Which one of the following is a company that provides access to the 35. To read incoming mail, choose
internet? a) spam b) outbox c) draft d) inbox
a) ISP b) WWW c) HTTP d) Google 36. URL stands for
23. A technology that facilitates an integration of text, data, image graphics, a) Uniform resource Locator b) Uniform Resource Location
audio, videos and animation in digital form in computer is called. c) Uniform Report locator d) none of the above
a) Hypertext b) MPEG c) modem d) multimedia 37. Yahoo! Is basically
24. HTTP stands for b) Internet server b) internet service provider
a) Hyper Text Transport Protocol b) Hyper Text transfer Protocol d) Hyper Text transfer Protocol d) search engine
c) Hyper Text Transmission Protocol d) none of the above
35. Which one of the following is a set of rules for exchanging information MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
on the internet? Diploma Course Examination, December, 2017
a) Modem c) Modulation Diploma in Computer Application
b) Internet Protocol d) Internet rules Subject : Internet Technology (DCA-104)
36. Video conference is also known as
a) Live telecast c) Streaming Full Mark : 40 Time : 1 hour
b) Whiteboard application d) Chatting
37. Which one of the following is used for opening remote e-mail boxes? A. Choose the correct answer (1X40=40)
a) SMTP c) POP3 1. The expanding rate of the internet per month is ?
b) ASCII d) IMAP-4 a) 26% b) 33% c) 16% d) 12%
38. Which one of the following is a company that provides access to the 2. WWW was started in the year?
Internet? a) 2001 c) 1992
a) ISP c) LAN b) 1998 d) 1997
b) WWW d) HTML script 3. Which one of the following is the default browser in windows system?
39. Software that is distributed for free on a trial basis is called? a) Google c) Mozilla
a) Freeware c) Nagware b) Internet Explorer d) Chrome
b) Trial period d) Shareware 4. Which one of the following refers to the study of structure?
40. Which one of the following changes an arrow of a mouse to a pointing a) Element c) Protocol
hand? b) Anatomy d) None of these
a) Hyperlink c) Web pages 5. Which one of the following is a computer based worldwide information
b) Hypertext d) Browser network?
a) Internet c) Web
b) Intranet d) Ethernet
6. Which one of the following is not included in the syntax of an email?
a) Character c) Space
b) Number d) Full stop
7. In e-mail our reply includes the original message called?
a) Space c) Trash
b) Draft d) Quoting
8. Information in a book, magazine, newspaper, etc is
a) Linear c) Both a) and b)
b) Non-linear d) None of the above
9. SMTP means
a) Switch Mode Transfer Protocol c) Systematic Mail Transfer Protocol
b) Simple Mail Transfer Protocol d) None of these
10. The full form of NVT is?
a) Network Virtual Terminal c) Network View Terminal
b) Net View Technology d) Network Virtual Topology
11. Which one of the following uses a set of rules to exchange messages 23. The full form of HTML is
with other Internet points at the information packet level? a) High Tech Multimedia c) Hyper Text Markup Link
a) LAN b) ARPANET c) TCP d) Lynx b) Hyper Text Markup Language d) Hyper Technology Multimedia
12. Some older version of SMTP cannot handle message more than? 24. The world‟s largest electronic discussion forum is?
a) 128 KB c) 32 KB a) Whatapp c) Usenet
b) 64 KB d) 16 KB b) Facebook d) All of these
13. Which one of the following is also called drawler, robot or bot.? 25. If the search request fails in Yahoo, it is automatically routed to
a) Spider c) Excite a) Google c) Yahoo itself
b) hyperlink d) None of these b) AltaVista d) HotBot
14. A technology that facilitates and integration of text, data, image, graphics 26. “Unlawful acts wherein the computer is either a tool or target or both”
etc is? means?
a) Multimedia c) Updating a) Unauthorized access c) Hacking
b) Upgrading d) Integration b) Cheating d) Cyber crime
15. The excellent browser for browsing text only is? 27. The first graphical interface software package released in the year 1993
a) Lynx c) Mozilla was?
b) HTML d) Mosaic a) HotBot c) CERN
16. Which one of the following attack is normally prevalent in financial b) Mosaic d) Google
institutions or for purpose of committing financial crime? 28. Buying and selling items on the Net is called?
a) Phishing attack c) Trajan attack a) Commerce on the internet c) Online shopping
b) Salami attack d) Virus attack b) Internet banking d) E-commerce
17. The common encoding scheme used on newsgroup is called? 29. The technology by which a digital signal is converted to its analog form
a) Unicode c) Encoder is called?
b) Newslink d) Uuencode a) Converter c) Digitizer
18. Browsers are sometimes referred to as b) Rectifier d) Modulation
a) Navigator c) Explorer 30. “The conventional rules for correct behavior on the internet is?
b) Web clients d) Server a) Net-Smart c) Netiquette
19. Network of networks is called? b) Etiquette d) None of these
a) Ethernet c) ARPANET 31. A program the helps the user to navigate the world wide web is?
b) LAN d) Internet a) Search engine c) Programming
20. Which one of the following generic term id used to describe a client, b) Google d) Web browser
server or network? 32. The full form of CGI is?
a) Protocol c) Networks a) Common group of information c) Common gateway interface
b) Elements d) Nodes b) Common gateway information d) Channel group information
21. Remote login can be done using? 33. The personal information of the sender which is written at the bottom of
a) Command c) Telnet the e-mail message is?
b) HTTP d) Lynx a) Sender data c) sender address
22. URL full form is? b) Signature d) Information
a) Uniform Resource Locator c) Unit Resource Link 34. Which one of the following refers to hijacking?
b) Universal Research Locator d) Universal Resource Link a) Logic bomb c) Web jacking
b) Web bombing d) Trojan attack
36. The method of talking face to face using web cameras and internet MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
facilities is known as? Diploma Course Examination, December 2018
a) Chatting c) Browsing Semester-I, Diploma in Computer Application
b) Online d) Net Meeting Subject : Internet Technology (DCA-104)
37. The full form of GUI is?
a) Graphics user internet c) Graphical user interface
b) Graphics unused interlace d) Graphics user information A. Choose the correct answer (1X40=40)
38. The personal information of the sender which is written at the bottom of 1. Which one of the following is not included in the syntax of an email?
the e-mail message is? a) Character c) Space
a) Sender data c) Sender address b) Number d) Fullstop
b) Signature d) Information 2. Public messaging and bulletin board is?
39. Video conference is also known as a) www c) Thrash
a) Live telecast c) Streaming b) Draft d) Usenet
b) Whiteboard application d) Chatting 3. Information in a book, magazine, newspaper etc is?
40. Http protocol is used for? a) Linear c) Both (a) & (b)
a) www c) ISP b) Non-linear d) None of these
b) Browser d) All of them 4. The most common service of the internet is?
a) ISP c) Protocol
b) E-mail d) Social media
5. Computer that holds the file for one or more website is?
a) Server c) Excite
b) Hyperlink d) Internet
6. A technology that facilitates an integration of text, data, image,
graphic etc is?
a) Multimedia c) Updating
b) Upgrading d) Integration
7. The fastest growing area of the internet is?
a) Internet c) Facebook
b) Online shopping d) www
8. Browser are sometimes referred to as
a) Navigator c) Explorer
b) Web clients d) Server
9. Network of network is called?
a) Ethernet c) ARPANET
b) LAN d) Internet
10. Modern connecting to a single modem among a bank of modems at
ISP, this connection is called?
a) Broadband c) Least
b) Dedicated d) Dial-up
11. Computer-based worldwide information network is? 24. The world‟s largest electronic discussion forum is?
a) Internet c) Worldwide computer a) Whatapp c) Usenet
b) Social media d) Supercomputer b) Facebook d) all of these
12. Connections to the backbone are made by? 25. If the search request fails in Yahoo, it is automatically routed to
a) LAN c) ISP a) Google c) Yahoo itself
b) ARPANET d) Lynx b) Alta Vista d) HotBot
13. The internet started as a U.S government project in the year 1969 called 26. The excellent browser for browsing text only is
a) LAN c) ISP a) Lynx c) Mozilla
b) ARPANET d) VSNL b) HTML d) Mosaic
14. The most common transfer protocol used on the internet is? 27. Conversion of analog signal to its digital form is called?
a) HTTP c) WWW a) Converter c) Digitizer
b) URL d) Email b) Modulation d) Demodulation
15. The expanding rate of the internet per month is? 28. Father of the www is?
a) 26% c) 16% a) Bill gates c) Tim Berner-Lee
b) 33% d) 12% b) John William Wood d) jack Dorsey
16. Hypertext uses links also called 29. Which one of the following is a set of rules for exchanging information
a) Lynx c) Hyperlinks on the internet?
b) Multitext d) Hypolinks a) Modem c) Modulation
17. Most of the internet services can be access through? b) Internet protocol d) Internet rules
a) Social media c) Computer 30. Which one of the following is used for opening remote e-mail boxes?
b) Web Browser d) Wifi a) SMTP c) POP3
18. The study of structure refers to? b) ASCII d) IMAP-4
a) Elements c) Protocol 31. Which one of the following is a company that provides access to the
b) Anatomy d) None of these internet?
19. Computer that request information from servers is? a) ISP c) LAN
a) Clients PC c) Browse b) WWW d) HTML script
b) User d) Network Card 32. News group in internet also refers to?
20. Remote login can be done using? a) Online c) Chat
a) Command c) Telnet b) Forum d) Netiquette
b) HTTP d) Lynx 33. Connecting to an ISP via high speed link is?
21. A place on the internet where information about an organization is stored is? a) Broadband connection c) LAN line connection
a) hardisk c) Google drive b) Dedicated connection d) Direct connection
b) Website d) All of the above 34. The first graphical interface software package released in the year 1993
22. When a mouse pointer passes over a hyperlink, it changes from? was?
a) Arrow to pointing hand c) Arrow to line a) HotBot c) CERN
b) Hand to arrow d) None of these b) Mosaic d) Google
23. Software that is distributed for free on a trial basis is called 35. The conventional rules for correct behavior on the internet is?
a) Freeware c) Nagware a) Net-Smart c) Netiquette
b) Trial period d) Shareware b) Etiquette d) None of these
IV. Write the full form for the following terms: (10x0.5=5) MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
Certificate Course Examination, June, 2014
1. IMAP : Internet Mail Access Protocol Certificate in Computer Application
Subject : Internet Technology (CCA-104)
2. OSI : Open Systems Interconnection
Full Mark : 40 Time : 1 hour
3. SNMP : Simple network management Protocol
Answer all questions:
4. ROFL : Rolling On Floor Laughing
I. Tick ( √ ) the correct answer : (15x1=15)
5. FAQ : Frequently Ask Question 1. Which transmission mode is used for data communication along
telephone lines?
6. ASAP : As Soon as Possible a) Parallel b) Serial
c) Synchronous d) Asynchronous
7. ADSL : Asymmetric Digital Subscriber Line Ans : Serial
2. Who invented the modem?
8. ARPANet : Advanced Research Project Agency Network a) Wang Laboratories Ltd. b) AT & T Information Systems, USA
c) Apple Computers Inc. d) Digital Equipment Corps.
9. ASCII : American Standard Code for Information Interchange Ans : AT&T Information Systems, USA
3. What is Internet?
10. ICANN : Internet Corporation for Assigned Names and Numbers a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
Ans : a vast collection of different network
***************** 4. To join the Internet, the computer has to be connected to a
a) internet architecture board b) internet society
c) internet service provider d) none of the mentioned
Ans : internet service provider
5. Software which allows user to view the webpage is called
a) operating system b) web browser
c) website d) interpreter
Ans : web browser
6. Which of the following website is used to search other websites by
typing in a keyword
a) social networks b) routers
c) search engines d) none of the above
Ans : search engines
7. Which of the following is a valid website? Ans : Cyberstalking
a) www.google.co b) www.google 15. In cyber law terminology „DoS‟ means
c) www.google.com d) www@google.com a) Denial of Service b) Disc operating System
Ans : www.google.com c) Distant operator Service d) None of the above
8. Whenever user opens any website the main page is called Ans : Denial of Service
a) Backend page b) Homepage II. Fill in the blanks: (10x1=10)
c) Frontend d) Backend 1. The virus that are commonly found in word documents are called
Ans : Homepage Macro virus
9. Which of the following is true? 2. The study of encryption is called Cryptography
a) Plotters are not available for microcomputer systems 3. E-banking is also known as Internet Banking
b) Micro-computer are not programmed like conventional computers 4. Credit Card is also known as plastic money.
c) Mini-computers are task-oriented 5. Anti-Virus software detects and removes or quarantines computer
d) The contents of ROM are easily changed viruses.
Ans : Mini-computer are task oriented 6. ERP stands for Enterprise Resource Planning
10. Which of the following describes e-commerce? 7. Email spoofing refers to email that appears to have been originated
a) doing business electronically b) doing business from one source when it was actually sent from another source.
c) sale of goods d) all of the above 8. RSS feed web technology provides news that can automatically
Ans : doing business electronically download right to your desktop.
11. What is Netiquette ? 9. Wiki web technology allows its community members to continuously
a) The proper use of manners and etiquette on the Internet change the contents on a web site.
b) Using a net to catch fish 10. Bitcoin is a payment system introduced as open-source software in
c) Being mean to other people on Facebook 2009 by developer Satoshi Nakamoto.
d) Using proper manners at the dinner table
III. State whether the following are TRUE or FALSE: (10X1=10)
Ans : The proper use of manners and etiquette on the internet
1. POP is the incoming e-mail server. T
12. What is considered shouting over the Internet ?
2. Once the e-mail is sent, the message is broken into pieces called
a) Screaming at your computer
frames. F
b) Writing in all CAPS
3. Trojan horse is malicious program that do not replicate automatically. T
c) Putting a lot of exclamation marks at the end of a sentence
4. Malware is an independent malicious program that needs not any host
d) Not answering a friend request on Facebook
program. F
Ans : Writing in all CAPS
5. By hacking a web server taking control on another person‟s website
13. Accurate and complete data enters the system for processing and
called as web hijacking. F
remains accurate thereafter, is said to have
6. Bots computer virus records every movement you make on your computer. F
a) Integrity b) Security
7. A piece of icon or image on a web page associated with another
c) Viruses d) Data integrity
webpage is called plugin. F
Ans : Security
8. A web cookie is a small piece of data sent from a website and stored
14. The use of the Internet or other electronic means to stalk or harass an
in user‟s web browser while a user is browsing a website. T
individual, a group of individuals, or an organization is termed:
9. The Internet is most accurately categorized as MAN. F
a) Cyberspace b) Cyberstalking
10. Internet based communication was initially used for political campaigns. T
c) Cyberbullying d) None of these
4. Once the e-mail is sent, the message is broken into pieces called ………….
a) Packet b) Digit c) Strings d) bytes MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
Ans : Packet Certificate Course Examination, June, 2015
Certificate in Computer Application
5. The internet is most often used for the exchange of …………… and Subject : Internet Technology (CCA-104)
information
a) data b) Message c) file d) Pictures
Ans : data Full Mark : 40 Time : 1 hour
A. Write the full form of the following Abbreviations. (10x1=10)
6. The internet is controlled by …………….
a) Government of USA b) European Union 1. IMAP : Internet Mail Access Protocol
c) Scientist of Switzerland d) None 2. HTTP : Hypertext Transfer Protocol
Ans : None 3. URL : Uniform Resource Locator
4. IRC : Internet Relay Chat
7. …………… is a software that is distributed for free on a trial basis.
a) Shareware b) software 5. POP : Post Office Protocol
c) Freeware d) hardware 6. SMTP : Simple Mail Transfer Protocol
Ans : Shareware 7. FTP : File Transfer Protocol
8. HTML : Hypertext Markup Language
8. The email is made up of two part, the user name and the ………………… 9. ISP : Internet Service Provider
a) Company name b) hostid 10. MODEM : Modulator Demodulator
c) hostname d) serverid
Ans : hostname
B. Choose the correct answer (10X1=10)
1. A word in a web page that when click opens another document is called
9. Firewall are used to protect againts ……………
a) anchor b) hyperlink
a) unauthorized attack b) data driven attack
c) URL d) reference
c) virus attack d) fire attack
Ans : hyperlink
Ans : unauthorized attack
2. Unsolicited commercial email is commonly known as
10. A collaborative network that uses internet technology to link business with
a) junk b) spam
their supplier is………………
c) hoaxes d) thrash
a) Internet b) Extranet
Ans : spam
c) Intranet d) WAN
Ans : Extranet
3. In cyber law terminology „DoS‟ means
-
a) Disk operating system b) Denial of Service
c) Distant Operating Service d) None of the above
Ans : denial of service
4. The use of the internet or other electronic means to stalk or harass an C. State TRUE OR FALSE (10X1=10)
individual, group or organization is termed as
a) cyberspace b) Cyberbullying 1. The first page that you normally view at the website is the homepage. T
c) cyberstalking d) cyberharassing 2. Downloading means transferring file(s) from the computer to the internet. F
Ans : cyberstalking 3. The term Internet and Intranet have the same meaning. F
4. HTML is used to write programs for animation and games in the
5. Who provide the internet?
a) TCP b) FTP browser. F
b) ISP d) HTTP 5. Example of domains name are .com, .net, .edu etc. F
Ans : ISP 6. The URL specifies the internet address of a file store on a host computer
connected to the Internet. T
6. Which software from the following is not a browser. 7. An e-mail address is case sensitive. T
a) Opera b) Mozilla Firefox 8. Selling and buying of service or goods over the internet is e-commerce. T
c) Internet Explorer d) Google
9. A communication protocol is a set of rule that every computer follows to
Ans : Google
transfer information. F
7. Which from the following is not a search engine? 10. A computer network consists of five or more computers connected to one
a) Facebook b) Yahoo another. T
c) Google d) Altavista
Ans : Facebook D. Fill in the blanks (10X1=10)
1. A ……….…… is a network in which a small number of computer
8. Which from the following is a threat to user on the internet? share hardware, software and/or information
a) worms b) Trojan a) Computer Network b) LAN Network
c) virus d) All of the above c) Peer to peer netwok d) MAN Network
Ans : All of the above Ans : LAN Network

9. Technology used to provide Internet over the telephone network is 2. …………………… is known as the father of World Wide Web
a) ISP b) WWW a) Robert Caliliau b) Charles Darwin
c) HTTP d) DSL c) Tim Thompson d) Tim Berners-Lee
Ans : DSL Ans : Tim Berner Lee

10. Which one of the following is a valid IP address 3. The …………….. technology enables you to make calls over your
a) 350.12.555.50 b) 1.777.215.4545 computer network.
c) 192.168.350.20 d) 192.168.50.110 a) Internet Voice Protocol b) Voice over Internet Protocol
Ans : 192.168.50.110 c) Digital Telephony Subscriber
d) Universal Asynchronous Receiver Transmitter
Ans : Voice over Internet Protocol
20. The right to copy or duplicate material can be granted only by the owner of MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
the information is called Certificate Course Examination, June, 2016
a) Copyright b) Privacy Act Certificate in Computer Application
c) Encrypting d) Auditing Subject : Internet Technology (CCA-104)
Ans : Copyright
Full Mark : 40 Time : 1 hour
C. State TRUE OR FALSE (10X1=10) A. Write the full form of the following Abbreviations. (10x1=10)

1. The file extension name of HTML is .html T 1. E-mail : Electronic Mail


2. FTP : File transfer Protocol
2. Moving a file from one‟s own computer to the remote computer is
3. IP : Internet Protocol
known as downloading. F
4. TCP : Transmission Control Protocol
3. Internet Relay Chat (IRC) was developed by Jakko Oikarimen. T 5. E-commerce : Electronic Commerce
4. The main use of smiley is to indicate a joke when the text might not be 6. HTML : Hypertext Markup Language
clear. T 7. ISP : Internet Service Provider
8. W3C : World Wide Web Consortium
5. A search engine is software that searches through a database of web 9. NNTP : Network News Transfer Protocol
pages for specific information. T 10. WWW : World Wide Web
6. Java is a computer language developed by Microsoft. F
B. Choose the correct answer (20X1=20)
7. E-Commerce is maintaining business relationships and selling 1. Which of the following is a network of network
information. T a) www b) internet
c) ARPANET d) URL
8. Video Conferencing is a third type of technology. T
Ans : internet
9. JavaScript is one of the new breed of web languages called scripting
language. T 2. Who is the father of WWW
a) Tim Berner Lee b) John Berner Lee
10. Proxy server is a firewall. T c) Bill Gates d) Sepp Blatter
Ans : Tim Berner Lee

3. Which one of the following is an application that display web pages?


a) Web Browser b) hypertext
c) Internet d) modem
Ans : hypertext

4. Moving a file from a remote computer to one‟s computer is called


a) uploading b) downloading
c) transferring d) dialup
Ans : transferring
5. Rmdir command perform which one of the following? 13. JavaScript can be combined directly with
a) Delete b) copy a) URL b) HTML
b) rename d) cut c) WWW d) HTTP
Ans : delete Ans : HTML

6. The software used in Internet Relay Chat (IRC) is 14. Which one of the following is a means of protecting private information
a) Google b) Bluetooth against unauthorized access of information ?
c) Facebook d) MIRC a) Cryptography b) Security
Ans : MIRC b) Password d) Antivirus
Ans : Cryptography
7. e-mail address is made up of
a) one part b) three part 15. Which one of the following is a computer system which deals with
c) two part d) four part protecting various sources and information of a computer system?
Ans : two part a) Cryptography b) Security
b) Password d) Antivirus
8. The act of exploring the web is known as Ans : Security
a) surfing b) browsing
c) serving d) networking 16. Which one of the following is a combination of hardware and software
Ans : surfing that are used to protect the network?
a) Antivirus b) Firmware
9. When Java program are run inside a browser they are called c) Password d) Firewall
a) active b) UNIX Ans : Firewall
c) applets d) None of the above
Ans : applets 17. Which one of the following is the most common form of computer
security?
10. The technology that you use your computer to have live video across the a) Password b) Cryptography
internet is c) Antivirus d) Firewall
a) Java b) chatting Ans : Password
c) Video Conferencing d) telephony
Ans : video conferencing 18. The process of taking data and modifying it so that it cannot be read by
untrusted users is called?
11. High speed connectivity over normal phone line is a) Decryption b) Firewall
a) MBone b) Streaming c) Encryption d) None of the above
c) ActiveX d) DSL Ans : Encryption
Ans : DSL
19. Collection and analysis of data is called
12. Java is an oriented full-fledged programming language in the script of a) Hacking b) Auditing
a) C++ b) C c) Scrambling d) Surfing
c) Java d) DSL Ans : Auditing
Ans : C++
33. A program which looks through its database for information that matches MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
your request is Diploma Course Examination, June, 2017
a) Search engine c) Net meeting Diploma in Computer Application
b) Google d) Web Browser Subject : Internet Technology (DCA-104)
34. Buying and selling items on the Net is called
a) Commerce on the Internet c) Online Shopping Full Mark : 40 Time : 1 hour
b) Internet Banking d) E-Commerce
35. People from all over the world participate in dicussions on thousands of A. Choose the correct answer (1X40=40)
topics in specific areas of interest called 1. The first graphical interface package that was released in the year 1993
a) Usenet c) Newsgroup was
b) Telnet d) Chatting a) LAN b) ARPANET c) Mosaic d) Lynx
36. FTP sites expect you to use a special account called 2. Some older version of SMTP cannot handle message more than
a) User account c) FTP site a) 128 KB c) 32 KB
b) Anonymous d) Host b) 64 KB d) 16 KB
37. The Boolean operators AND, OR, NOT used by 3. Which one of the following is the default browser in windows system?
a) Info seek c) HotBot a) Google c) Mozilla
b) Google d) Excite b) Internet Explorer d) Chrome
38. The technique by which a digital signal is converted to its analog form is 4. Which one of the following is not included in the syntax of an email?
called a) Character c) Space
a) Converter c) Digitizer b) Number d) Full stop
b) Rectifier d) Modulation 5. URL full form is
39. Video conference is also known as a) Uniform Resource Locator c) Unit Resource Link
a) Live telecast c) Streaming b) Universal Research Locator d) Universal Resource Link
b) Whiteboard application d) Chatting 6. In e-mail our reply includes the original message called
40. Which one of the following is called scripting language? a) Conversation c) Thrash
a) JavaScript c) Language script b) Draft d) Quoting
b) ActiveX d) HTML Script 7. The full form of NVT is
a) Network Virtual Terminal c) Network View terminal
b) Net view Technology d) Network Virtual Topology
8. Information in a book, magazine, newspaper, etc is
a) Linear c) Both a) and b)
b) Non-linear d) None of the above
9. ASP means
a) Automatic Search Page c) Auto search page
b) Active Server Page d) Active Search Page
10. Which pair of the following is under HotBot?
a) Java and Linux c) Microsoft and Linux
b) Ordinary HTML and activeX d) All of the above
11. The expanding rate if the internet per month is 23. The full form of USENET is
a) 26% b) 33% c) 16% d) 12% a) Using network c) User network
12. Access of web information from any computer hardware running any OS b) Useful network d) none of the above
using any type of display is called 24. Which one of the following attack is normally prevalent in financial
a) Cross-platform c) Browsing institutions or for purpose of committing financial crime?
b) Mosaic d) Surfing a) Phishing attack c) Trojan attack
13. Browsers are sometimes referred to as b) Salami attack d) Virus attack
a) Navigator c) Explorer 25. Users within corporations and large organizations typically connect to an
b) Web clients d) Server ISP via a high speed link is called
14. The full form of POP is? a) Dial up connection c) Leased connection
a) Page Optional Program c) Postal option protocol b) Direct Connection d) Broadband connection
b) Post optional protocol d) Post Office Protocol 26. The process of determining the identity of a user who is attempting to
15. Which one of the following changes an arrow of a mouse to a pointing access a system is called
hand? a) Password c) Authentication
a) Hyperlink c) Web pages b) Authorization d) Hacking
b) Hypertext d) Browser 27. Which one of the following is created by Digital Electronics Corporation
16. Software that is distributed for free on a trial basis is called of USA?
a) Freeware c) Nagware a) HotBot c) Yahoo
b) Trial period d) Shareware b) AltaVista d) Google
17. WWW was started in the year? 28. Which one of the following means that a company provides information
a) 2001 b) 1998 c) 1992 d) 1997 about several other companies on a website?
18. Which one of the following contains 66 million pages in its database? a) Business to Business c) Digital Middleman
a) Lycos c) Excite b) Business to Customer d) All of the above
b) Google d) All of the above 29. Which one of the following is used for sending text files, altering things
19. Hardware and software combination that are built using routers, servers and a such as feed and carriage return?
variety of software is called? a) Line mode c) ASCII mode
a) Antivirus c) Hacking b) Binary mode d) All of the above
b) Firewall d) Networking 30. If the search request fails in Yahoo, it is automatically routed to
20. Which one of the following is a global network made up of thousands of a) Google c) Yahoo itself
networks that communicates with each other? b) AltaVista d) Hotbot
a) Internet c) Web 31. “Unlawful acts wherein the computer is either a tool or target of both”
b) Intranet d) Ethernet means
21. Which one of the following generic term is used to describe a client, a) Unauthorized access c) Hacking
server, or network? b) Cheating d) Cyber Crime
a) Protocol c) Networks 32. Collection of news group is called
b) Elements d) Nodes a) Usenet c) Protocol
22. Remote login can be done using b) Telnet d) Mosaic
a) Command c) HTTP
b) Telnet d) Lynx
32. Company selling or buying products from other companies is called MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
a) Business to Business c) Customer to customer Diploma Course Examination, June, 2018
b) Business to Customer d) Company to company Diploma in Computer Application Semester - I
33. These days CEO‟ of the organization are talking face to face./ to their Subject : Internet Technology (DCA-104)
junior officer using web cameras and internet facilities. This is called
a) Video chatting c) Net meeting Full Mark : 40 Time : 1 hour
b) Skyping d) Etiquette
34. Point out which one of the following is not the nature of poor Netiquette. A. Choose the correct answer (1X40=40)
a) Poor grammer and spelling errors c) Harsh language 1. Network of networks is called a/an
b) Junk mails d) Spam mails a) Internet b) LAN c) Web d) www
35. Unauthorized access to computer system or network is referred to as 2. Which one of the following generic term is used to describe a client,
a) Cyber crime c) Intruding server, or a network?
b) Hacking d) Salami attack a) Network c) Nodes
36. Browsers are sometimes referred to as b) Server d) IP
a) Web clients c) User 3. To read incoming mail choose
b) Server d) Navigator a) Spam c) Draft
37. Full form of FTP is b) Outbox d) Inbox
a) File Telnet Protocol c) Free Transmission Propagation 4. Which one of the following is an interconnection between several
b) File Transfer Protocol d) File theft prevention computers of different kinds across the world?
38. IRC stands for a) Intranet c) Website
a) Information related crime c) Internet relay code b) Internet d) LAN
b) Internet Relay Chat d) Information research centre 5. Which one of the following is correct?
39. USENET means a) Intranet is a computer-based worldwide information network
a) User-network c) User network technique b) www is a computer-based worldwide information network
b) User service network d) Utility service network c) Internet is a computer-based worldwide information network
40. Yahoo! Is basically d) None of the above
a) Internet server c) Hypertext transfer protocol 6. Which one of the following is not the characteristic of internet?
b) Internet service provider d) Search Engine a) Disorganized c) Widely used
b) Dynamic d) Free of charged
7. Changing the standard code into a different code means
a) Phasing c) Encryption
b) Decoding d) Coding
8. Different computer and network are united with common thread of how
many protocols?
a) One b) Two c) Three d) Four
9. Which one of the following supervised the starting of internet at the
beginning
a) W3C c) ISP
b) URL d) ARPANET
10. E-mail (Electronic mail) was started in the year 22. In order to use Netscape messenger, which one of the following
a) 1990 b) 1970 c) 1973 d) 1979 sequences have to do?
11. Most of the services in the internet can be accessed through which of the a) Highlight start, Netscape messenger, Netscape communicator
following b) Netscape messenger, highlight start, Netscape communicator
a) Web Browser c) LAN c) Highlight start, programs, Netscape communicator, Netscape
b) www d) IP address messenger
12. Which one of the following syntax is used in specifying a Uniform d) Highlight start, program, Netscape messenger
Resource Locator (URL) ? 23. Which one of the following is responsible for addressing and sending of
a) http://www.abc.com/html/mylove.html data from one computer to another?
b) http://html/www.abc.com/mylove.html a) Addressing c) IP
c) http://www.abc.com/mylove.html/html b) TCP d) ISP
d) None of the above 24. A technology that facilitates an integration of text, data, image, graphics,
13. A URL is divided into how many parts? audio, videos and animation in digital form in computer is called
a) One b) Two c) Three d) Four a) Hypertext c) Modem
14. E-mail address/ addresses of secondary recipient(s) to whom copy needs to b) Mpeg d) Multimedia
be sent is 25. Conversion of analog signal to its digital form at the destination is called
a) Cc b) To c) Bcc d) Sender a) Demodulation c) Modem
15. The user name and domain name in an e-mail are separated by a symbol? b) Modulation d) Conversion
a) # b) & c) @ d) % 26. Which one of the following is a company that provides access to the
16. If a movie with sound is to be transmitted, which one of the format has to be internet
used? a) ISP c) HTTP
a) Mp3 b) JPEG c) GIF d) MPEG b) WWW d) Google
17. Which one of the following is not out of the five section of an e-mail? 27. Communication that do not waste the user‟s time are considered as
a) Header c) Signature a) Time management c) Reliable ISP
b) Body d) Footer b) Good communication d) Good netiquette
18. Which one of the following puts the world of online communication on your 28. Text hyperlinks are generally denoted in
computer desktop? a) Red color and underlined c) Black color and underlined
a) Outlook express c) Email clients b) Green color and underlined d) Blue color and underlined
b) Netscape mail d) Server 29. Using e-mail we can reply to a message sent by others. Our reply
19. Which one of the following in an e-mail message is the personal information includes the original message also known as
which automatically appears at the bottom of the outgoing message? a) Drafting c) Diddling
a) Attachment c) Subject b) Saved message d) Quoting
b) Signature d) Date 30. Buying and selling items online is called
20. Which one of the following translate the alphabetic address into a) Commerce on the internet c) Online shopping
numerical address, so e-mail can be sent to the proper location? b) E-commerce d) Net surfing
a) IP address c) Routing 31. The company which developed clients, servers and other web software is
b) DNS d) MIME called
21. A web browser is a program that helps the user to navigate the a) Microsoft corporation c) CERN
a) www c) LAN b) Netscape communications corporation d) MIT
b) Hyperlinks d) TCP
35. If the search request fails in Yahoo, it is automatically routed to MIZORAM STATE COUNCIL FOR TECHNICAL EDUCATION
a) google c) Yahoo itself Diploma Course Examination, June 2019
b) AltaVista d) HotBot Semester-I, Diploma in Computer Application
36. The excellent browser for browsing text only is Subject : Internet Technology (DCA-104)
a) Lynx c) Mozilla
b) HTML d) Mosaic
37. Which one of the following attacks is normally prevalent in financial A. Choose the correct answer (1X40=40)
institutions or for purpose of committing financial crime? 1. WWW was started in the year?
a) Phishing attack c) Trojan attack a) 2001 c) 1992
b) Salami attack d) Virus attack b) 1998 d) 1997
38. The personal information of the sender which is written at the bottom of 2. Which one of the following is the default browser in windows system?
the email message is? a) Google c) Mozilla
a) Sender data c) Sender address b) Internet explorer d) Chrome
b) Signature d) Information 3. Which one of the following refers to the study of structure?
39. Video Conference is also known as a) Elements c) Protocol
a) Live telecast c) Streaming b) Anatomy d) None of these
b) Whiteboard application d) Chatting 4. The full form of NVT is?
40. Buying and selling items on the Net is called? a) Network Virtual Terminal c) Network View Terminal
a) Commerce on the internet c) Online shopping b) Net view technology d) Network Virtual Topology
b) Internet banking d) E-commerce 5. Which one of the following uses a set of rules of exchange messages
with other internet points at the information packet level?
a) LAN c) TCP
b) ARPANET d) Lynx
6. Some older version of SMTP cannot handle message more than?
a) 128KB c) 32 KB
b) 64 KB d) 16 KB
7. URL full form is?
a) Uniform Resource locator c) Unit Resource Link
b) Universal Research Locator d) Universal Resource Link
8. The expanding rate of the internet per month is?
a) 26% c) 16%
b) 33% d) 12%
9. Which one of the following is a computer based worldwide
information network?
a) Internet c) Web
b) Intranet d) Ethernet
10. Which one of the following is not included in the syntax of an email?
a) Character c) Space
b) Number d) Full stop
11. A technology that facilitates an integration of text, data, image, graphics etc is? 23. Remote login can be done using?
a) Multimedia c) Updating a) Command c) Telnet
b) Upgrading d) Integration b) HTTP d) Lynx
12. The common encoding scheme used on newsgroup is called? 24. The full form of HTML is?
a) Unicode c) Encoder a) High Tech Multimedia c) Hyper Text Markup Link
b) Newslink d) uuencode b) Hyper Text Markup Language d) Hyper Technology Multimedia
13. In e-mail our reply includes the original message called? 25. Software that is distributed for free on a trial basis is called?
a) Conversation c) Trash a) Freeware c) Nagware
b) Draft d) Quoting b) Trial period d) Shareware
14. The technique by which a digital signal is converted to its analog form is 26. Network of network is called
called? a) Ethernet c) ARPANET
a) Converter c) Digitizer b) LAN d) Internet
b) Rectifier d) Modulation 27. Which one of the following generic term is used to describe a client,
15. Which one of the following refers to hijacking? server or network?
a) Logic bomb c) Web jacking a) Protocol c) Networks
b) Web bombing d) Trojan attack b) Elements d) Nodes
16. Which one of the following is a set of rules for exchanging information 28. Which one of the following changes an arrow of a mouse to a pointing hand
on the internet? a) Hyperlink c) Web pages
a) Modem c) Modulation b) Hypertext d) Browser
b) Internet protocol d) Internet rules 29. The world‟s largest electronic discussion forum is?
17. Which one of the following is used for opening remote e-mail boxes? a) WhatsApp c) Usenet
a) SMTP c) POP3 b) Facebook d) All of the above
b) ASCII d) IMAP-4 30. “Unlawful acts wherein the computer is either a tool or target or both”
18. Which one of the following is a company that provides access to the means ?
internet? a) Unauthorized access c) Hacking
a) ISP c) LAN b) Cheating d) Cyber Crime
b) WWW d) HTML script 31. The first graphical interface software package released in the year 1993 was?
19. Information in book, magazine, newspaper etc is? a) HotBot c) CERN
a) Linear c) Both (a) & (b) b) Mosaic d) Google
b) Non-Linear d) none of the above 32. The conventional rule for correct behavior on the internet is?
20. SMTP means? a) Net-smart c) Netiquette
a) Switch mode Transfer Protocol c) Systematic Mail Transfer Protocol b) Etiquette d) None of the above
b) Simple Mail Transfer Protocol d) None of the above 33. A program that helps the user to navigate the world wide web is?
21. Which one of the following is also called crawler, robot or bot.? a) Search engine c) Programming
a) Spider c) Excite b) Google d) Web Browser
b) Hyperlink d) None of the above 34. The full form of CGI is?
22. Browser are sometimes referred to as a) Common group of information c) Common Gateway Interface
a) Navigator c) Explorer b) Common Gateway Information d) Channel Group Information
b) Web Clients d) Server

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy