Networking and Internet - computer awareness questions

Networking and Internet - Marketing aptitude questions


Q1. ________________ is not a web browser.

1. FOXPRO
2. Mozilla
3. Netscape navigator
4. Internet explorer

View Answer / Hide Answer

ANSWER: FOXPRO




Q2. Which one of the following is similar to sending an email?

1. Creating a drawing
2. Picturing an event
3. Narrating a story
4. Writing a letter

View Answer / Hide Answer

ANSWER: Writing a letter




Q3. It is the one which provides the facility of exchanging information between computing devices and is a combination of hardware and software.

1. Digital device
2. Network
3. Peripheral
4. Expansion board

View Answer / Hide Answer

ANSWER: Network




Q4. The resources to all the computers in network are provided by the server which is a computer and they are connected by

1. Client
2. Mainframe
3. Network
4. Supercomputers

View Answer / Hide Answer

ANSWER: Network




Q5. What is the use of video conferencing?

1. It is used for communication purpose
2. It is used for live conferencing
3. It is used to talk to each other
4. All of the above

View Answer / Hide Answer

ANSWER: It is used for live conferencing




Q6. Which one of the following is the most important or powerful computer in a network?

1. Network station
2. Network client
3. Network Server
4. Desktop

View Answer / Hide Answer

ANSWER: Network Server




Q7. The connection of network which can only be attached to is

1. Intranet
2. Internet
3. Extranet
4. Virtual private network

View Answer / Hide Answer

ANSWER: Intranet




Q8. What is the term used for talking on net with the help of typed text?

1. New group
2. E-mail
3. Chatting
4. None of the above

View Answer / Hide Answer

ANSWER: Chatting




Q9. The internal network of a company is very large and would like to subnet into smaller parts. From the options given below, the device that will not be used to separate LAN and still protect critical resources is

1. The modem between computers
2. A router between subnet
3. An internal firewall
4. A switch between departments

View Answer / Hide Answer

ANSWER: The modem between computers




Q10. A small single site network is nothing but a

1. RAM
2. MAN
3. DSL
4. LAN

View Answer / Hide Answer

ANSWER: LAN




Q11. Connectivity is similar to

1. Power cord
2. Internet
3. Floppy disk
4. Data

View Answer / Hide Answer

ANSWER: Power cord




Q12. Which topology is used in Ethernet?

1. Ring
2. Mesh
3. Bus
4. Line

View Answer / Hide Answer

ANSWER: Bus




Q13. These are the components of an Ethernet LAN except

1. Fibre
2. Access point
3. Coax
4. STP

View Answer / Hide Answer

ANSWER: Access point




Q14. What is the full form of URL?

1. Unicode research locator
2. Uniform read locator
3. United research locator
4. Uniform resource locator

View Answer / Hide Answer

ANSWER: Uniform resource locator




Q15. When computers are connected in LAN then

1. Computers can share information and share peripheral equipment
2. Computers can run faster
3. Computers can go on line
4. All of the above

View Answer / Hide Answer

ANSWER: Computers can share information and share peripheral equipment




Q16. What are the requirements of wide area networks?

1. Same type
2. High bandwidth communication source link
3. High speed processor
4. All of the above

View Answer / Hide Answer

ANSWER: All of the above




Q17. _____________ is a search engine

1. Flash
2. Google
3. Internet explorer
4. Fire Fox

View Answer / Hide Answer

ANSWER: Google




Q18. Based on the packet’s address, the device that has been designed to forward packets to specific ports is

1. Specialty hub
2. Filtering hub
3. Port hub
4. Switching hub

View Answer / Hide Answer

ANSWER: Switching hub




Q19. ____________ topology is not of broadcast type.

1. Ring
2. Bus
3. Star
4. Mesh

View Answer / Hide Answer

ANSWER: Ring




Q20. Which one of the following devices is needed to communicate with computers using telephone lines?

1. VDU
2. Modem
3. Disk
4. CPU

View Answer / Hide Answer

ANSWER: Modem




Q21. If and email is received by an unknown person then

1. One should open it and respond asking their personal information
2. One should open it and respond saying you don’t know them
3. It should be deleted without opening it
4. It should be forwarded to police

View Answer / Hide Answer

ANSWER: It should be deleted without opening it




Q22. What does PROTOCOL consists of?

1. TCP/IT
2. TCD/IP
3. TCD/IT
4. TCP/IP

View Answer / Hide Answer

ANSWER: TCP/IP




Q23. To subnet LAN directly on the network server and to protect the resources of company that receives internet access through a network or gateway resources, the device which is best suited is

1. A router which will also act as a bridge.
2. VLAN
3. A multi-homed firewall
4. DSL modem

View Answer / Hide Answer

ANSWER: A multi-homed firewall




Q24. For a company’s business the term that involves the use of electronic platforms like intranets, extranets and internet is

1. E-business
2. E-marketing
3. E-commerce
4. E-procurement

View Answer / Hide Answer

ANSWER: E-business




Q25. Before buying which package can be downloaded through internet for testing purpose?

1. Backup copy
2. Beta software
3. Pirated software
4. Shareware

View Answer / Hide Answer

ANSWER: Beta software




Q26. What term is used if a search engine returns a web page if a match is found?

1. Link
2. Hit
3. Blog
4. Success.

View Answer / Hide Answer

ANSWER: Link




Q27. Which one of the following is not the feature of internet?

1. News group
2. Designing
3. E-mail
4. Chat

View Answer / Hide Answer

ANSWER: Designing




Q28. The benefit of using a firewall for LAN is

1. It provides greater security to LAN
2. It provide stricter access control to critical resources
3. Both 1 and 2
4. Neither 1 nor 2

View Answer / Hide Answer

ANSWER: Both 1 and 2




Q29. What do you mean by WWW in communication?

1. World wide web
2. With wide web
3. World with web
4. With wide web

View Answer / Hide Answer

ANSWER: World Wide Web




Q30. URL must contain

1. Protocol identifier
2. The unique registered domain name
3. WWW and the unique registered domain name
4. WWW

View Answer / Hide Answer

ANSWER: WWW




Q31. Which one of the following requires phone line but offers faster access speed than the dial up connection?

1. Digital subscefer line (DSL)
2. Cable access
3. Fibre optic serving
4. Modem

View Answer / Hide Answer

ANSWER: Digital subscefer line (DSL)




Q32. What is the term for the set of rules and regulations while working on internet?

1. Internet
2. Intranet
3. Protocol
4. WWW

View Answer / Hide Answer

ANSWER: Protocol




Q33. The statement that holds true regarding firewall is

1. It can either be hardware or software device.
2. It filters network traffic
3. It follows a set of rules
4. All of the above

View Answer / Hide Answer

ANSWER: All of the above




Q34. In a network, if a computer shares the resources to be used by others then that computer is called

1. Peer
2. Server
3. Mainframe
4. Client

View Answer / Hide Answer

ANSWER: Server




Q35. Which one of the following statement is correct for the term URL?

1. It is a type of programming object
2. It is a computer software program
3. It is the address of page on World Wide Web
4. It is an acronym for unlimited resource for learning

View Answer / Hide Answer

ANSWER: It is the address of page on World Wide Web




Q36. In a ring topology, the data can be transmitted only if the computer possess

1. Token
2. Packet
3. Data
4. Access method

View Answer / Hide Answer

ANSWER: Token




Q37. What is the name of the topology in which if the cable of a computer network is broken then the whole network goes down?

1. Mesh
2. Ring
3. Bus
4. Star

View Answer / Hide Answer

ANSWER: Bus




Q38. When static packet filter is used on the router then the statement which is not correct for firewall protection is

1. Static packet filtering is less secure than stateful filtering
2. Static packet filtering is more secure than dynamic packet filtering
3. Static packet filtering is less secure than dynamic proxy filtering
4. All of the above

View Answer / Hide Answer

ANSWER: Static packet filtering is more secure than dynamic packet filtering




Q39. The term used for transferring a file from another computer to your computer is

1. Upgrading a document
2. Uploading a document
3. Accessing a document
4. Downloading a document

View Answer / Hide Answer

ANSWER: Downloading a document




Q40. From the options given which one acts as a doorway to the rest of the website pages?

1. Home page
2. URL
3. Search engine
4. Browser

View Answer / Hide Answer

ANSWER: Home page




Q41. Which topology is used for large networks?

1. Bus
2. Line
3. Ring
4. Star

View Answer / Hide Answer

ANSWER: Star




Q42. In which OSI layers a packet filtering firewall operates?

1. At the network
2. At the gateway layer
3. At the transport layer
4. All of the above

View Answer / Hide Answer

ANSWER: At the transport layer




Q43. It is not used as a means for personal communications in internet.

1. Instanoles
2. Chat
3. Electronic mail
4. Instant messaging

View Answer / Hide Answer

ANSWER: Instanoles




Q44. What is the advantage of LAN?

1. Back up of data
2. Save data
3. Access the web
4. Share peripherals

View Answer / Hide Answer

ANSWER: Share peripherals




Q45. What term is often used for an email account that includes a storage area?

1. IP address
2. Hyperlink
3. Mailbox
4. Attachment

View Answer / Hide Answer

ANSWER: Mailbox




Q46. Which one of the following statement is not the benefit of firewall?

1. It limits security exposure
2. It is used for logging internet activity
3. It enforces the organizations security policy
4. It protects against virus

View Answer / Hide Answer

ANSWER: It protects against virus




Q47. In a LAN network which one of the following allows users to share computer programs and data?

1. File server
2. Print server
3. Communication server
4. All of the above

View Answer / Hide Answer

ANSWER: File server




Q48. The term which is used to see web pages is called

1. Spreadsheet
2. Protocol
3. Word processor
4. A browser

View Answer / Hide Answer

ANSWER: A browser




Q49. The Rate of transfer of data in LAN is

1. Tera bits per second
2. Kilo bits per second
3. Mega bits per second
4. Bits per second

View Answer / Hide Answer

ANSWER: Kilo bits per second




Q50. In email address, the symbol that is used to separate the user name with the ISP address is

1. #
2. &
3. @
4. %

View Answer / Hide Answer

ANSWER: @




Q51. The statement which does not hold true for modems is

1. The fastest transfer rate is 56kbps
2. It stands for modulator and demodulator
3. It uses the telephone lines
4. All of the above

View Answer / Hide Answer

ANSWER: The fastest transfer rate is 56kbps




Q52. One can access email from anywhere with the help of

1. Message board
2. Weblog
3. Webmail interface
4. Forum

View Answer / Hide Answer

ANSWER: Webmail interface




Q53. It is not a part of email address

1. Underscore (_)
2. At sign (@)
3. Period (.)
4. Space ( )

View Answer / Hide Answer

ANSWER: Space ( )




Q54. Modem is nothing but

1. Mainframe operating device manager
2. A type of secondary memory
3. Modulator demodulator
4. Micro operating device manager

View Answer / Hide Answer

ANSWER: Modulator demodulator




Q55. Modems are configured in such a manner that any incoming calls are automatically answered. Manufacturer provides inbuilt modems in many user computers. In this case the greatest security risk when dealing with the modems is

1. Server access without the knowledge of network administrator
2. Remote access without the knowledge of network administrator
3. Local access without the knowledge of network administrator
4. Client access without the knowledge of network administrator

View Answer / Hide Answer

ANSWER: Remote access without the knowledge of network administrator




Q56. IP address in computing stands for

1. Internet provider
2. International pin
3. Invalid pin
4. Internet protocol

View Answer / Hide Answer

ANSWER: Internet protocol




Q57. Which one of the following describes the contents of the message when sending an email?

1. To
2. Subject
3. CC
4. BCC

View Answer / Hide Answer

ANSWER: Subject




Q58. To which company does Gmail belong?

1. Rediff
2. Great mail
3. Yahoo
4. Google

View Answer / Hide Answer

ANSWER: Google




Q59. What do you mean by RAS?

1. Remote access service
2. Remote access security
3. Random access service
4. Random access security

View Answer / Hide Answer

ANSWER: Remote access service




Q60. Which service is used for sending or receiving main on the internet?

1. FTP
2. Gopher
3. Email
4. All of the above

View Answer / Hide Answer

ANSWER: Email




Q61. What do you mean by the term Wi-Fi in computer hardware?

1. Wireless network
2. Wire-fire
3. With wire network
4. With fiction

View Answer / Hide Answer

ANSWER: Wireless network




Q62. What do you mean by the term FTP?

1. File transmission program
2. File transfer protocol
3. Fast text processing
4. Fast transmission processor

View Answer / Hide Answer

ANSWER: File transfer protocol




Q63. Other than the dial-up connection, the network connection applicable to RAS is

1. VPN
2. ISDN
3. DSL
4. All of the above

View Answer / Hide Answer

ANSWER: All of the above




Q64. What do you mean by chat?

1. It is a transmission of messages and files through computer network
2. It is an online area in which users discuss a particular subject in writing
3. It is a type of conversation that takes place on a computer.
4. It is an internet standard that allows users to upload and download files.

View Answer / Hide Answer

ANSWER: It is a type of conversation that takes place on a computer.




Q65. To browse and search for information on the internet ______________ is used

1. Netscape
2. Telnet
3. FTP
4. Eudora

View Answer / Hide Answer

ANSWER: Netscape




Q66. The tem electric meeting is known as

1. Tele-shopping
2. Tele-officing
3. Tele-conferencing
4. Tele-banking

View Answer / Hide Answer

ANSWER: Tele-conferencing




Q67. Which computer program is used to run the websites?

1. FOXPRO
2. Mozilla
3. MS-Word
4. Unix

View Answer / Hide Answer

ANSWER: Mozilla


Post your comment

    Discussion

  • RE: Networking and Internet - computer awareness questions -rao (12/31/15)
  • explain about network layers, which is useful for exams
  • RE: Networking and Internet - computer awareness questions -rao (12/31/15)
  • explain about network layers, which is useful for exams
  • RE: Networking and Internet - computer awareness questions -Deeksha (02/13/15)
  • WWW- its world wide web , update it
  • RE: Networking and Internet - computer awareness questions -Roshani kujur (09/07/14)
  • Bilaspur

You may like