Internet & Web Technology MCQs > FREE SET - 1

1. The Internet began with the development of __________.
A USENET
B ARPANET
C Ethernet
D Intranet

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

2. How many classes of private IP addresses are there?
A Two
B Three
C Four
D Ten

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

3. Which type of transmission media is known as regular telephone wire?
A Twisted-pair wire
B Fiber optic cable
C Coaxial cable
D Wi-Fi

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

4. A circuit with about 100 transistors fabricated on a single chip is called ___________.
A MCR
B MSI
C MIS
D RJE

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

5. Which of the following is also called Junk e-mail?
A Spoof
B Spam
C Spill
D Worm

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

6. Verification of a login name and password is known as?
A Authentication
B Configuration
C Accessibility
D Logging in

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

7. GSM Stands for
A General System for Mobile Community
B Global System for Mobile Communication
C General System for Mobile Communication
D Global System for Mobile Community

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

8. Who was the inventor of World Wide Web?
A Marks Zuckerberg
B Thomas Reardon
C Tim Berners Lee
D Ray Tomlinson

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

9. The first spam email was sent by
A Gary Thuerk
B Adi Shamir
C Alan Kay
D Charles Thomas

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

10. The __________ of browser keeps a list of web pages you have visited during the current session.
A Favorites
B History
C Cache
D Trail

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

11. What is the maximum limit of free cloud storage on Google drive?
A 10 GB
B 15 GB
C 20 GB
D 20 GB

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

12. In E-R diagram, relationship is represented by ___________.
A Circular Shape
B Diamond Shape
C Ellipse Shape
D Square Shape

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

13. Which of the following must be contained in a URL?
A The letters, www
B A protocol identifier
C The unique registered domain name
D A protocol identifier, www and the unique registered domain name

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

14. Two or more computers connected to each other for sharing information form a ___________.
A Router
B Server
C Network
D Tunnel

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

15. ARPANET Stands for
A Advanced Research Projects Accountancy Network
B Advanced Research Protects Agency Newark
C Advanced Rich Projects Agency Network
D Advanced Research Projects Agency Network

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

16. How many layers are there in the TCP/IP protocol suite?
A 4
B 5
C 6
D 7

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

17. Which of the following is also called NAT proxy server?
A Web proxy
B SMTP proxy
C IP proxy
D TCP proxy

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

18. In recent years, the abbreviation __________ has specifically come of mean application software written for mobile devices, with the abbreviation in particular representing both the smaller size and smaller scope of the software.
A APPL
B APP
C APL
D APN

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

19. Which of the following function in Computers is the one that control processes and accept data in continuous fashion?
A Data traffic pattern
B Highway loop
C Feedback loop
D Data highway

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

20. The ___________ allows you to access your e-mail from anywhere.
A Webmail interface
B Message Board
C Weblog
D Forum

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

21. LANs can be connected by which of the following devices which operate on the data link layer?
A Hub
B Bridges
C HDLC
D Tunnel

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

22. Networks that use different technologies can be connected by using
A Packets
B Switches
C Bridges
D Routers

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

23. A repair for a known software bug, usually available at no charge on the Internet, is called ________
A Version
B Tutorial
C Patch
D FAQ

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

24. Which of the following is the communications protocol that sets the standard used by every computer that accesses Web- based information?
A XML
B DML
C HTTP
D HTML

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

25. Which of the following layers of the OSI model are included in the lower layers?
A Physical, Transport, Data Link, Network
B Application, Session, Presentation
C Data link, Physical, Network
D Session, Data Link, Physical

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

26. What is a common medium used for thieves to steal others identities?
A Telephone
B Pick pocketing
C Burglary
D Email

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

27. A device that connects to a network without the use of cables is said to be
A Open source
B Centralized
C Wireless
D Distributed

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

28. The server on the internet is also known as ___________.
A Repeater
B Host
C AND Gate
D Gateway

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

29. In the OSI model, the actual transmission of data is handled in the ____________ layer.
A Physical
B Data link
C Transport
D Network

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

30. VPN Stands for
A Virtual Personal Network
B Very Private Network
C Virtual Private Network
D Vicious Personal Network

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

31. A __________ is the term used when a search engine returns a Web page that matches the search criteria.
A Hit
B Link
C Blog
D View

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

32. The _________ layer is responsible for the delivery of a message from one process to another.
A Physical
B Transport
C Network
D Session

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

33. In CSMA/CD, the computer sends a fixed unit of data called __________.
A Node
B Packet
C Override
D Token

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

34. ER Diagram in DBMS is a graphical method used to represent _________.
A Primary Key and Candidate key
B Entity classes and their relationships
C Entity class and relationship to foreign key only
D Objects and methods with functions

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

35. The code for a Web page is written using
A A fifth generation language
B Peripherals
C Win Zip
D Hypertext Markup Language

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

36. Through ________ information travels between components on the motherboard.
A CMOS
B Peripherals
C Bus
D Flash memory

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

37. If you wish to extend the length of the network without having the signal degrade, you would use a ________.
A Repeater
B Router
C Gateway
D Switch

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

38. Which of the following term is used for unauthorized copying of software to be used for personal gain instead of personal backups?
A Program thievery
B Data snatching
C Software piracy
D Program looting

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

39. What's considered the backbone of the World Wide Web?
A URL
B HTML
C HTTP
D FTP

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

40. What is SKYLAKE?
A NASA
B Upcoming James Bond
C Intel 6th gen Core processors
D China

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

41. In network topology, all devices on a network are connected to a single continuous cable called
A Star
B Ring
C Bus
D Tree

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

42. A proxy server is used for which of the following?
A To provide security against unauthorized users
B To provide TCP/IP
C To process client requests for database access
D To process client requests for Web pages

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

43. A set of rules for creating markup languages that enables programming to capture specific types of data by creating their own elements is called________.
A XML
B HTML
C Ada
D XHTML

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

44. Which of the following allows users to upload files to an online site so they can be viewed and edited from another location?
A General-purpose applications
B Microsoft Outlook
C Web-hosted technology
D Office Live

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

45. Which one of the following is NOT a valid view in MS Front Page?
A Design View
B Folders View
C Navigation View
D Web Server View

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.


No comments:

Post a Comment

Your Feedback is hearty Requested to make the MCQs Collection better.

Popular Posts