0% found this document useful (0 votes)
293 views25 pages

Basic Internet MCQs

Uploaded by

mewax99203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
293 views25 pages

Basic Internet MCQs

Uploaded by

mewax99203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Which of the following is not a major reason for an email bounce?

A. Domain server is down


B. Stale file handle
C. bad domain name
D. Bad user account name
Which of the following is a top-level domain?

A. .com
B. Http
C. HTML
D. URL
Which of the following is a correct format of Email address?

A. name@website.info
B. name@website@info
C. www.nameofebsite.com
D. All
Small files that are deposed on user’s hard drive when they visit
a website are best described as

A. Codes
B. Cookies
C. Trackers
D. None
What is the function of internet?

A. To receive e-mail
B. To advertise commercial products
C. To connect one computer to another
D. All of these
The mechanism to protect private networks from outside attack
is called:

A. Cyber Crime
B. Search Engine
C. Browser
D. Firewall
E. Antivirus
Which of the following is Mozilla Firefox?
A. Antivirus software
B. Web browser
C. URL
D. Code
A ___ identifies a location or a selection of text that you name
and identify for future reference.

A. Footer
B. Bookmark
C. Header
D. Page number
E. Bookmark
___ is used for sending emails while ___is used for receiving
emails.

A. POP. SMTP
B. SMTP, POP
C. POP, SMTP
D. HTTP, SMTP
Moving from one website to another is called :

A. Uploading
B. Browsing
C. Downloading
D. None
What is the three most popular social networking websites today ?

A. Facebook, Myspace, Twitter


B. Google,Yahoo,Bin
C. Bebo, Blogster, Facebook
D. None
Elon Musk pulled out 44 billion dollars deal to buy:

A. WhatsApp
B. Facebook
C. Twitter
D. Instagram
Which is he most visited website in the world?

A. Facebook
B. YouTube
C. Google
D. Instagram
E. Twitter
Which is the second most visited website after Google?

A. YouTube
B. Facebook
C. YouTube
D. Instagram
E. Twitter
Jam Koum & Brian Acton are the founders of:

A. Twitter
B. WhatsApp
C. YouTube
D. Facebook
E. All of these
Which is the Acquisition year of WhatsApp?

A. 2004
B. 2018
C. 2014
D. 2021
Headquarters of WhatsApp located in?

A. Washington
B. Hawaii
C. New York
D. California
E. None of these
WhatsApp was founded in the year____________?

A. 2005
B. 2009
C. 2001
D. 2018
Who is the current CEO of WhatsApp?

A. Elon Musk
B. Bill Gates
C. Jeff Bezof
D. Will Cathcart
Digital device is ____

A. digital clock
B. hard disk
C. input devices
D. None
Founders of WhatsApp are?

A. Jam Koum
B. Brian Acton
C. Bill Gates
D. Will Cathcart
E. Both A & B
When was LinkedIn founded?

A. 2009
B. 2003
C. 2012
D. 2006
Sergen Brin and Larry Page are the founder of:

A. Twitter
B. Facebook
C. YouTube
D. Google
E. Instagram
Google is a multinational technology company of the country:

A. France
B. China
C. USA
D. Russia
E. None of these
The crime that involves and uses of—– is known as cyber crime

A. computer devices
B. internet
C. both
D. none
The browser _____keep a list of web pages you have visited in
the current session :

A. History
B. Cache
C. Trail
D. None
A commonly used graphic format for the web is

A. Imp
B. Bmp
C. Text
D. GIF
The ______also called the web, contains billions of documents.

A. Web portal
B. HTFP
C. World Wide Web
D. Domain
HTTPS provides a ______communication over a computer
network.

A. secure
B. text
C. voice
D. video
In internet protocol stake , when data is sent from device A to
device B the 5th layer to receive data at B is:

A. Application layer
B. Transport layer
C. Link layer
D. None
The relational database environment has all of the following
components except

A. users
B. separate files
C. data base
D. All
Which of following contains a complete record of all activity that
affected the contents of database during a certain period of time

A. report writer
B. query language
C. Transaction log
D. none
Which type of function is not a member of a class, but can access its
private members?

A. static
B. friend
C. constructor
D. destructior
When a fully copied of database is copied to multiple site, it is
known

A. Replicated database
B. distributed data base
C. Hybrid database
D. none
What data type will you select to store classroom identification if there
are 125 room at maximum

A. integer
B. integer byte
C. integer long
D. none
The functionalities of presentation layer include

A. data compression
B. data encryption
C. data description
D. All
The translator which is used for C/C++ language is called ____

A. interpreter
B. compiler
C. Assembler
D. None
A user mode program can invoke as services by :

A. System call
B. message passing
C. executing a trap instruction
D. All
Spooling is required for devices such as :

A. Disks
B. Network adapter
C. Printers
D. None
The strcpy() functions argument are :

A. 4 parameters
B. 3 parameters
C. 2 parameters
D. None
In OSI model, as the data packet moves from the lower to upper
layer headers are

A. added
B. removed
C. rearranged
D. All
A semaphore :

A. merely is referred to a variable.


B. merely is referred to a consonant.
C. Both
D. None
The process of writing a program by using any language is called

A. testing
B. debugging
C. coding
D. none
Optical Fiber system is a telecommunication system.
A. telecommunication
B. Networking
C. software
D. None
Which of the following terms is associated with Internet E-mail?

A. Bookmark
B. Plotter
C. Slide Presentation
D. Microsoft Excel
E. Pie Chart
Email hacking means:

A. Finding email password


B. Finding email address
C. Finding email server
D. Illegal access to open email accounts of others
If you want to close your email account, you should click on:

A. Sign Out
B. Log Out
C. Exit
D. Deactivate Account
What is the full form of G-mail?

A. Gold Mail
B. Great Mail
C. Grooming Mail
D. Google Mail
E. All of the above
What is the maximum attachment size in Yahoo mail?

A. 25 MB
B. 35 MB
C. 45 MB
D. 55 MB
E. None of the above
When you sent an email which of the following fields should
contain your email address?
A. To
B. From
C. Cc
D. Bcc
Where is the sent email saved?

A. Sentbox
B. outbox
C. inbox
D. None of the above
E. All of the above
Which one is the professional social media ______?

A. Linked in
B. E mail
C. Instagram
D. Facebook
Underline sign in HTML?

A. < under >


B. < u >
C. < un >
D. None
Which protocol provides E-mail facility among different hosts?

A. FTP
B. SNMP
C. TELNET
D. SMTP
E. None of these
Which is the parent organization of WhatsApp?

A. Twitter
B. Instagram
C. YouTube
D. Facebook
E. All of these
A computer cannot do anything without _____.

A. memory
B. keyboard
C. program
D. none
Which term identify a specific computer in web and the main page of the
entire site ?

A. URL
B. IP
C. Windows explorer
D. None
A service in which a user can chat with his or her friends and not with
public is called ______?

A. Instant Massaging
B. IMO
C. Whats app
D. None
Internet explorer falls under :

A. Browser
B. Operating System
C. .Compiler
D. None
The Internet was originally a project of which agency?

A. NSA
B. NSF
C. ARPA
D. None
Which of the following is the largest unit of storage?

A. MB
B. KB
C. TB
D. GB
E. None of these
A network that is used for sharing data, software, and hardware among
several users owning microcomputers is called __________?

A. WAN
B. MAN
C. LAN
D. VAN
which of the following is the correct format of email adress?

A. name@website.info
B. www.nameofwebsite.com
C. name@website.com.
D. name.website.com
A systems theory of management includes

A. the manager as the control mechanism


B. the use of objectives or standards of performance describing what is
being achieved
C. Both
D. All
Free of-cost repair of software bugs available on the Internet is called
——–?

A. Path
B. Tutorial
C. Ad-on
D. None
In OSI model, when data is sent from device A to device B, the
fifth layer to receive data at B is

A. Session layer
B. application layer
C. transport layer
D. None
___ device generates the data to be transmitted.

A. Transmitter
B. Source
C. Transmission
D. Receiver
___ takes the incoming data from the receiver.

A. Destination
B. Source
C. Transmitter
D. Transmission system
For point to point analog signaling, a bandwidth of up to about ____ is
possible.

A. 2 MHz
B. 1 MHz
C. 4 MHz
D. 3 MHz
A Web site’s front page or main page is called

A. Home Page
B. Browser Page
C. Search Page
D. none
What is an other name for junk Email?

A. Spoof
B. Spill
C. Spam
D. Spat
Http:// www.google.com is called ___?

A. URL
B. IP address
C. website
D. None
Be Up to your ears? means

A. to be very lazy
B. to be very clever
C. to be very busy
D. none
To view information on the web you must have a ___

A. Hypertext viewer
B. domain name server
C. web browser
D. cable modem
The Internet is which enables us to share information with other
people

A. Network of devices in an office


B. Network of devices in a country
C. Network of network around the world
D. None of these
Which statement about the internet is true

A. Internet is a world-wide global system of interconnected computer


networks.
B. Internet uses the standard internet Protocol TCP/IP
C. Both A & B
D. None of these
Elon Musk made a deal to buy Twitter in April 2022 for billion US dollars:

A. 24
B. 36
C. 54
D. 44
Saving is a process –

A. To develop the document by recording the test with the use of keyboard
B. to change the face orentire form
C. to bring change in present status of the document
D. to copy the document frommemory to storage medium
Two are more computers connected to each other for sharing
information from a

A. Pipeline
B. router
C. server
D. network
By encryption of a text we mean?

A. Compressing it
B. expending it
C. scrambling it to preserve its security
D. hashing it
Letters, emails and telephone are related to:
A. Message
B. Channel
C. Feedback
D. Encoding
Which of the following is an Application Protocol____?

A. HTTP
B. TCP
C. IP
D. None of these
Which is not the function of the operating system? Linux, DOS, Oracle,
Window

A. Linux
B. DOS
C. Oracle
D. Window
In Internet explorer, favorites bar can be shown and hidden by choosing
it in toolbars option under……tab?

A. View
B. Edit
C. Help
D. None
Verification of a login name and password is known as:

A. authentication
B. configuration
C. accessibility
D. None
For conducting online video meetings useful solutions are

A. Google Drive, Google


B. Amazon and Microsoft cloud solution like S3 and Azure
C. Google meet, Zoom, Microsoft teams
D. All of these
Which term identifies a specific computer on the web and the main page of
the entire site?

A. Hyperlink
B. Web site address
C. URL
D. None
Web browser stores previous information for web pages is termed as

A. auto complete
B. feed
C. web slices
D. none
Which of following is a web browser ?

A. Paint
B. Power point
C. Word
D. Fire fox
Cyber Security is used to protect?

A. hardware
B. data
C. software
D. All of those
Gmail,Hotmail and Yahoo are:

A. E-mail server
B. User server
C. Email client
D. None
Which term is not used by internet ?

A. IP
B. HTTP
C. TCP
D. BSNL
Microsoft office internet connect is

A. Business relationship database


B. A scanning and OCR application
C. Both
D. None
The code for a Web page is written using _____ .
A. A fifth generation language
B. Win Zip
C. Peripherals
D. Hypertext Markup Language
What is telnet?

A. Search engine
B. Browser
C. Protocol
D. Gate way
Analogue computer works on_____

A. Continuous electrical pulses


B. Continuous electronic pulses
C. Both
D. None
MAN stands for

A. Metropolitan Area Network


B. Main Area Network
C. Median Area Network
D. None
Google is a search engine operating since:

A. 1999
B. 1997
C. 2001
D. 1994
Who is the founder of Google?

A. Sergen Brin
B. Larry Page
C. Steve Jobs
D. Elon Musk
E. Both A & B
Google was founded in the year:

A. 1991
B. 2003
C. 1998
D. 2001
E. 1996
Oldest search engine is ________

A. Yahoo
B. Google
C. MSN
D. None
Website use information called__

A. proxy
B. defender
C. tracker
D. Virtual private network
A website content can be viewed in

A. internet
B. Links
C. Wi-fi
D. None of these
How many types of Website are there?

A. Four
B. Two
C. One
D. Three
The process of transferring files from a computer on the Internet to your
computer is called:

A. Forwarding
B. Downloading
C. Uploading
D. None
The four numbers in an IP address is called?

A. octets
B. coxtex
C. fourth
D. Binary
Which of the following protocols is used to transfer files from one host
to another over the internet?

A. TCP
B. IP
C. UDP
D. FTP
E. All of these
SMTP stands for

A. Simple Merge Transfer Protocol


B. Simple Mail Transfer Protocol
C. Senior Mail Transfer Protocol
D. Simple Mail Tentative Protocol
E. None of these
Which of the following protocol pushes email messages to the server?

A. HTTP
B. SMTP
C. POP
D. IP Address
Which of the following is always a part of E-mail address 1?

A. Period (.)
B. Space ()
C. At sign (@)
D. Underscore (__)
E. All of these
Sending an E-mail is similar to :

A. Drawing a picture
B. Writing a letter
C. Talking on phone
D. sending a package
The topic of email is called ___ ?

A. Subject
B. Inbox
C. Context
D. None
___is designed to control the operations of a computer?

A. system software
B. Utility software
C. Application software
D. None
Which one of the following is not a search engine?

A. Yahoo
B. Windows
C. Google
D. Bing
HTTP stands for ____?

A. Hypertext Transfer Protocol


B. Hypertext Transfer Protection
C. Hyper Transfer Protocol
D. None
Internet is also called

A. the Net
B. a network of networks
C. Both
D. None
Who is called the Father of Internet?

A. Vint Cerf
B. Charles Babbage
C. Tim Berners Lee
D. None of these
Email stands for:

A. Easy mail
B. Electronic mail
C. Electric mail
D. Eye mail
Hyperlinks can be

A. text
B. drawing objects
C. pictures
D. All
E.
____ was founded in 2009.

A. Twitter
B. WhatsApp
C. YouTube
D. Facebook
E. All of these
____ is the special type of software and hardware system that provides
service to its clients.

A. Biometric
B. Web Server
C. Operating system
D. Web page
Which of following is considered as latest browser ?

A. mosaic
B. google chrome
C. Mozila firebox
D. None
Which of the following is an example of Cloud Storage service?

A. Internet Explorer
B. Mozila Forefox
C. Skype
D. Dropbox
E. All of these
Which company launched a new AI-based app called
NotebooklM?

A. Meta
B. Microsoft
C. Amazon
D. Google
What is the process of connecting to the internet account is ?

A. Log in
B. sign in
C. sign out
D. None of these
The first network that initiated internet was

A. Inet
B. Vnet
C. ARPANET
D. None of these
What is the most used computer in the world?

A. Analog computer
B. Digital computer
C. Super computer
D. None these of these
Which technology is used to make web pages interactive and dynamic
by updating parts of the page without a full page reload?

A. HTML
B. CSS
C. AJAX
D. None of these
Headquarters of Google located in the city ________?

A. California
B. Paris
C. London
D. Vienna
E. None of these
Which is the most searched site in 2023?

A. YouTube
B. Google
C. Facebook
D. Wikipedia
What are radio signals?

A. Analog signals
B. Digital signals
C. Optical signals
D. Magnetic signals
What underline Tag used in HTML ?

A. <i>
B. <a>
C. <u>
D. None
When you find someone on a social networking site, what does this
allow them to see

A. They can see all of things you put on private so only friends can
see
B. Nothing the same as everyone else
C. They can see just your picture
D. None
What is the three most popular social networking websites today ?

A. Facebook,Myspace, Twitter
B. Google,Yahoo,Bin
C. Bebo, Blogster,Facebook
D. None
A voice mailbox in a voice mail system is

A. Storage location on a hard disk


B. Processor
C. Hard disk
D. None
Who co-founded Hotmail in ___and then sold it to Microsoft is
Sabeer Bhatia__

A. 1996
B. 1999
C. 1965
D. 1944
Which of the following is not a major reason for an email bounce?

A. Domain server is down


B. Stale file handle
C. bad domain name
D. Bad user account name
Which of the following is a top-level domain?

A. .com
B. Http
C. HTML
D. URL
Which field type will you select if you need to enter long text in that
field?

A. Currency
B. Text
C. Memo
D. None
Which of the following is a correct format of Email address?

A. name@website.info
B. name@website@info
C. www.nameofebsite.com
D. All
Small files that are deposed on user’s hard drive when they visit
a website are best described as

A. Codes
B. Cookies
C. Trackers
D. None
What was the first personal computer (PC) made in the 1970s
called?

A. Apple-I
B. Altair
C. Apple II
D. Intel
IBM is also a big blue company ___

A. American calculator company


B. British computer company
C. American computer company
D. None
What is the function of internet?
A. To receive e-mail
B. To advertise commercial products
C. To connect one computer to another
D. All of these
Which one is one of the benefits of using a network___?

A. File Security
B. Virus Protection
C. peripheral sharing
D. System Security
E. All of these
The mechanism to protect private networks from outside attack
is called:

A. Cyber Crime
B. Search Engine
C. Browser
D. Firewall
E. Antivirus
Which of the following is Mozilla Firefox?

A. Antivirus software
B. Web browser
C. URL
D. Code
Who is known as creator of Portable Document Format (PDF)?

A. Dennis hit Richard


B. Tim Berners Lee
C. Charles Babbage
D. Charles Geschke
E. None of these
A ___ identifies a location or a selection of text that you name
and identify for future reference.

A. Footer
B. Bookmark
C. Header
D. Page number
E. Bookmark
___ is used for sending emails while ___is used for receiving
emails.

A. POP. SMTP
B. SMTP, POP
C. POP, SMTP
D. HTTP, SMTP
POP stands for:

A. Post Office Procedure


B. Post Organization Protocol
C. Paper Office Protocol
D. Post Office Protocol
Moving from one website to another is called :

A. Uploading
B. Browsing
C. Downloading
D. None
People to whom a copy of the email will be delivered but they are
notified will all the addresses the message is sent to is called:

A. Blind Carbon Copy


B. Carbon Copy
C. Draft
D. All of these

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy