Basic Internet MCQs
Basic Internet MCQs
A. .com
B. Http
C. HTML
D. URL
Which of the following is a correct format of Email address?
A. name@website.info
B. name@website@info
C. www.nameofebsite.com
D. All
Small files that are deposed on user’s hard drive when they visit
a website are best described as
A. Codes
B. Cookies
C. Trackers
D. None
What is the function of internet?
A. To receive e-mail
B. To advertise commercial products
C. To connect one computer to another
D. All of these
The mechanism to protect private networks from outside attack
is called:
A. Cyber Crime
B. Search Engine
C. Browser
D. Firewall
E. Antivirus
Which of the following is Mozilla Firefox?
A. Antivirus software
B. Web browser
C. URL
D. Code
A ___ identifies a location or a selection of text that you name
and identify for future reference.
A. Footer
B. Bookmark
C. Header
D. Page number
E. Bookmark
___ is used for sending emails while ___is used for receiving
emails.
A. POP. SMTP
B. SMTP, POP
C. POP, SMTP
D. HTTP, SMTP
Moving from one website to another is called :
A. Uploading
B. Browsing
C. Downloading
D. None
What is the three most popular social networking websites today ?
A. WhatsApp
B. Facebook
C. Twitter
D. Instagram
Which is he most visited website in the world?
A. Facebook
B. YouTube
C. Google
D. Instagram
E. Twitter
Which is the second most visited website after Google?
A. YouTube
B. Facebook
C. YouTube
D. Instagram
E. Twitter
Jam Koum & Brian Acton are the founders of:
A. Twitter
B. WhatsApp
C. YouTube
D. Facebook
E. All of these
Which is the Acquisition year of WhatsApp?
A. 2004
B. 2018
C. 2014
D. 2021
Headquarters of WhatsApp located in?
A. Washington
B. Hawaii
C. New York
D. California
E. None of these
WhatsApp was founded in the year____________?
A. 2005
B. 2009
C. 2001
D. 2018
Who is the current CEO of WhatsApp?
A. Elon Musk
B. Bill Gates
C. Jeff Bezof
D. Will Cathcart
Digital device is ____
A. digital clock
B. hard disk
C. input devices
D. None
Founders of WhatsApp are?
A. Jam Koum
B. Brian Acton
C. Bill Gates
D. Will Cathcart
E. Both A & B
When was LinkedIn founded?
A. 2009
B. 2003
C. 2012
D. 2006
Sergen Brin and Larry Page are the founder of:
A. Twitter
B. Facebook
C. YouTube
D. Google
E. Instagram
Google is a multinational technology company of the country:
A. France
B. China
C. USA
D. Russia
E. None of these
The crime that involves and uses of—– is known as cyber crime
A. computer devices
B. internet
C. both
D. none
The browser _____keep a list of web pages you have visited in
the current session :
A. History
B. Cache
C. Trail
D. None
A commonly used graphic format for the web is
A. Imp
B. Bmp
C. Text
D. GIF
The ______also called the web, contains billions of documents.
A. Web portal
B. HTFP
C. World Wide Web
D. Domain
HTTPS provides a ______communication over a computer
network.
A. secure
B. text
C. voice
D. video
In internet protocol stake , when data is sent from device A to
device B the 5th layer to receive data at B is:
A. Application layer
B. Transport layer
C. Link layer
D. None
The relational database environment has all of the following
components except
A. users
B. separate files
C. data base
D. All
Which of following contains a complete record of all activity that
affected the contents of database during a certain period of time
A. report writer
B. query language
C. Transaction log
D. none
Which type of function is not a member of a class, but can access its
private members?
A. static
B. friend
C. constructor
D. destructior
When a fully copied of database is copied to multiple site, it is
known
A. Replicated database
B. distributed data base
C. Hybrid database
D. none
What data type will you select to store classroom identification if there
are 125 room at maximum
A. integer
B. integer byte
C. integer long
D. none
The functionalities of presentation layer include
A. data compression
B. data encryption
C. data description
D. All
The translator which is used for C/C++ language is called ____
A. interpreter
B. compiler
C. Assembler
D. None
A user mode program can invoke as services by :
A. System call
B. message passing
C. executing a trap instruction
D. All
Spooling is required for devices such as :
A. Disks
B. Network adapter
C. Printers
D. None
The strcpy() functions argument are :
A. 4 parameters
B. 3 parameters
C. 2 parameters
D. None
In OSI model, as the data packet moves from the lower to upper
layer headers are
A. added
B. removed
C. rearranged
D. All
A semaphore :
A. testing
B. debugging
C. coding
D. none
Optical Fiber system is a telecommunication system.
A. telecommunication
B. Networking
C. software
D. None
Which of the following terms is associated with Internet E-mail?
A. Bookmark
B. Plotter
C. Slide Presentation
D. Microsoft Excel
E. Pie Chart
Email hacking means:
A. Sign Out
B. Log Out
C. Exit
D. Deactivate Account
What is the full form of G-mail?
A. Gold Mail
B. Great Mail
C. Grooming Mail
D. Google Mail
E. All of the above
What is the maximum attachment size in Yahoo mail?
A. 25 MB
B. 35 MB
C. 45 MB
D. 55 MB
E. None of the above
When you sent an email which of the following fields should
contain your email address?
A. To
B. From
C. Cc
D. Bcc
Where is the sent email saved?
A. Sentbox
B. outbox
C. inbox
D. None of the above
E. All of the above
Which one is the professional social media ______?
A. Linked in
B. E mail
C. Instagram
D. Facebook
Underline sign in HTML?
A. FTP
B. SNMP
C. TELNET
D. SMTP
E. None of these
Which is the parent organization of WhatsApp?
A. Twitter
B. Instagram
C. YouTube
D. Facebook
E. All of these
A computer cannot do anything without _____.
A. memory
B. keyboard
C. program
D. none
Which term identify a specific computer in web and the main page of the
entire site ?
A. URL
B. IP
C. Windows explorer
D. None
A service in which a user can chat with his or her friends and not with
public is called ______?
A. Instant Massaging
B. IMO
C. Whats app
D. None
Internet explorer falls under :
A. Browser
B. Operating System
C. .Compiler
D. None
The Internet was originally a project of which agency?
A. NSA
B. NSF
C. ARPA
D. None
Which of the following is the largest unit of storage?
A. MB
B. KB
C. TB
D. GB
E. None of these
A network that is used for sharing data, software, and hardware among
several users owning microcomputers is called __________?
A. WAN
B. MAN
C. LAN
D. VAN
which of the following is the correct format of email adress?
A. name@website.info
B. www.nameofwebsite.com
C. name@website.com.
D. name.website.com
A systems theory of management includes
A. Path
B. Tutorial
C. Ad-on
D. None
In OSI model, when data is sent from device A to device B, the
fifth layer to receive data at B is
A. Session layer
B. application layer
C. transport layer
D. None
___ device generates the data to be transmitted.
A. Transmitter
B. Source
C. Transmission
D. Receiver
___ takes the incoming data from the receiver.
A. Destination
B. Source
C. Transmitter
D. Transmission system
For point to point analog signaling, a bandwidth of up to about ____ is
possible.
A. 2 MHz
B. 1 MHz
C. 4 MHz
D. 3 MHz
A Web site’s front page or main page is called
A. Home Page
B. Browser Page
C. Search Page
D. none
What is an other name for junk Email?
A. Spoof
B. Spill
C. Spam
D. Spat
Http:// www.google.com is called ___?
A. URL
B. IP address
C. website
D. None
Be Up to your ears? means
A. to be very lazy
B. to be very clever
C. to be very busy
D. none
To view information on the web you must have a ___
A. Hypertext viewer
B. domain name server
C. web browser
D. cable modem
The Internet is which enables us to share information with other
people
A. 24
B. 36
C. 54
D. 44
Saving is a process –
A. To develop the document by recording the test with the use of keyboard
B. to change the face orentire form
C. to bring change in present status of the document
D. to copy the document frommemory to storage medium
Two are more computers connected to each other for sharing
information from a
A. Pipeline
B. router
C. server
D. network
By encryption of a text we mean?
A. Compressing it
B. expending it
C. scrambling it to preserve its security
D. hashing it
Letters, emails and telephone are related to:
A. Message
B. Channel
C. Feedback
D. Encoding
Which of the following is an Application Protocol____?
A. HTTP
B. TCP
C. IP
D. None of these
Which is not the function of the operating system? Linux, DOS, Oracle,
Window
A. Linux
B. DOS
C. Oracle
D. Window
In Internet explorer, favorites bar can be shown and hidden by choosing
it in toolbars option under……tab?
A. View
B. Edit
C. Help
D. None
Verification of a login name and password is known as:
A. authentication
B. configuration
C. accessibility
D. None
For conducting online video meetings useful solutions are
A. Hyperlink
B. Web site address
C. URL
D. None
Web browser stores previous information for web pages is termed as
A. auto complete
B. feed
C. web slices
D. none
Which of following is a web browser ?
A. Paint
B. Power point
C. Word
D. Fire fox
Cyber Security is used to protect?
A. hardware
B. data
C. software
D. All of those
Gmail,Hotmail and Yahoo are:
A. E-mail server
B. User server
C. Email client
D. None
Which term is not used by internet ?
A. IP
B. HTTP
C. TCP
D. BSNL
Microsoft office internet connect is
A. Search engine
B. Browser
C. Protocol
D. Gate way
Analogue computer works on_____
A. 1999
B. 1997
C. 2001
D. 1994
Who is the founder of Google?
A. Sergen Brin
B. Larry Page
C. Steve Jobs
D. Elon Musk
E. Both A & B
Google was founded in the year:
A. 1991
B. 2003
C. 1998
D. 2001
E. 1996
Oldest search engine is ________
A. Yahoo
B. Google
C. MSN
D. None
Website use information called__
A. proxy
B. defender
C. tracker
D. Virtual private network
A website content can be viewed in
A. internet
B. Links
C. Wi-fi
D. None of these
How many types of Website are there?
A. Four
B. Two
C. One
D. Three
The process of transferring files from a computer on the Internet to your
computer is called:
A. Forwarding
B. Downloading
C. Uploading
D. None
The four numbers in an IP address is called?
A. octets
B. coxtex
C. fourth
D. Binary
Which of the following protocols is used to transfer files from one host
to another over the internet?
A. TCP
B. IP
C. UDP
D. FTP
E. All of these
SMTP stands for
A. HTTP
B. SMTP
C. POP
D. IP Address
Which of the following is always a part of E-mail address 1?
A. Period (.)
B. Space ()
C. At sign (@)
D. Underscore (__)
E. All of these
Sending an E-mail is similar to :
A. Drawing a picture
B. Writing a letter
C. Talking on phone
D. sending a package
The topic of email is called ___ ?
A. Subject
B. Inbox
C. Context
D. None
___is designed to control the operations of a computer?
A. system software
B. Utility software
C. Application software
D. None
Which one of the following is not a search engine?
A. Yahoo
B. Windows
C. Google
D. Bing
HTTP stands for ____?
A. the Net
B. a network of networks
C. Both
D. None
Who is called the Father of Internet?
A. Vint Cerf
B. Charles Babbage
C. Tim Berners Lee
D. None of these
Email stands for:
A. Easy mail
B. Electronic mail
C. Electric mail
D. Eye mail
Hyperlinks can be
A. text
B. drawing objects
C. pictures
D. All
E.
____ was founded in 2009.
A. Twitter
B. WhatsApp
C. YouTube
D. Facebook
E. All of these
____ is the special type of software and hardware system that provides
service to its clients.
A. Biometric
B. Web Server
C. Operating system
D. Web page
Which of following is considered as latest browser ?
A. mosaic
B. google chrome
C. Mozila firebox
D. None
Which of the following is an example of Cloud Storage service?
A. Internet Explorer
B. Mozila Forefox
C. Skype
D. Dropbox
E. All of these
Which company launched a new AI-based app called
NotebooklM?
A. Meta
B. Microsoft
C. Amazon
D. Google
What is the process of connecting to the internet account is ?
A. Log in
B. sign in
C. sign out
D. None of these
The first network that initiated internet was
A. Inet
B. Vnet
C. ARPANET
D. None of these
What is the most used computer in the world?
A. Analog computer
B. Digital computer
C. Super computer
D. None these of these
Which technology is used to make web pages interactive and dynamic
by updating parts of the page without a full page reload?
A. HTML
B. CSS
C. AJAX
D. None of these
Headquarters of Google located in the city ________?
A. California
B. Paris
C. London
D. Vienna
E. None of these
Which is the most searched site in 2023?
A. YouTube
B. Google
C. Facebook
D. Wikipedia
What are radio signals?
A. Analog signals
B. Digital signals
C. Optical signals
D. Magnetic signals
What underline Tag used in HTML ?
A. <i>
B. <a>
C. <u>
D. None
When you find someone on a social networking site, what does this
allow them to see
A. They can see all of things you put on private so only friends can
see
B. Nothing the same as everyone else
C. They can see just your picture
D. None
What is the three most popular social networking websites today ?
A. Facebook,Myspace, Twitter
B. Google,Yahoo,Bin
C. Bebo, Blogster,Facebook
D. None
A voice mailbox in a voice mail system is
A. 1996
B. 1999
C. 1965
D. 1944
Which of the following is not a major reason for an email bounce?
A. .com
B. Http
C. HTML
D. URL
Which field type will you select if you need to enter long text in that
field?
A. Currency
B. Text
C. Memo
D. None
Which of the following is a correct format of Email address?
A. name@website.info
B. name@website@info
C. www.nameofebsite.com
D. All
Small files that are deposed on user’s hard drive when they visit
a website are best described as
A. Codes
B. Cookies
C. Trackers
D. None
What was the first personal computer (PC) made in the 1970s
called?
A. Apple-I
B. Altair
C. Apple II
D. Intel
IBM is also a big blue company ___
A. File Security
B. Virus Protection
C. peripheral sharing
D. System Security
E. All of these
The mechanism to protect private networks from outside attack
is called:
A. Cyber Crime
B. Search Engine
C. Browser
D. Firewall
E. Antivirus
Which of the following is Mozilla Firefox?
A. Antivirus software
B. Web browser
C. URL
D. Code
Who is known as creator of Portable Document Format (PDF)?
A. Footer
B. Bookmark
C. Header
D. Page number
E. Bookmark
___ is used for sending emails while ___is used for receiving
emails.
A. POP. SMTP
B. SMTP, POP
C. POP, SMTP
D. HTTP, SMTP
POP stands for:
A. Uploading
B. Browsing
C. Downloading
D. None
People to whom a copy of the email will be delivered but they are
notified will all the addresses the message is sent to is called: