

MCQOPTIONS
Saved Bookmarks
This section includes 52 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.
1. |
Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ |
A. | leased line |
B. | digital subscriber line |
C. | digital signal line |
D. | digital leased line |
Answer» C. digital signal line | |
2. |
Many email systems use ______ protocol to send messages from one server to another server. |
A. | HTTP |
B. | ARP |
C. | ICMP |
D. | SMTP |
Answer» E. | |
3. |
A user directly access a website through _________. |
A. | URL |
B. | Search Engine |
C. | WRL |
D. | Fire wall |
Answer» B. Search Engine | |
4. |
First cyberlaw which provides the legal infrastructure for e-commerce in India is |
A. | The Information Technology Act, 1996 |
B. | The Information Technology Act, 2000 |
C. | The Information Technology Act, 1998 |
D. | The Information Technology Act, 1990 |
Answer» C. The Information Technology Act, 1998 | |
5. |
A device that connects computer or router to broadband network is called __________. |
A. | Modem |
B. | Firewall |
C. | Memory card |
D. | Jump drive |
Answer» B. Firewall | |
6. |
________ is a device that joins telecommunication links and groups of computers together. |
A. | Router |
B. | Host |
C. | Hypermedia |
D. | Packets |
Answer» B. Host | |
7. |
Email addresses in ________ field are visible to all recipients. Email addresses in _______ field are visible to only the recipient. |
A. | To and Bcc, Cc |
B. | To and Cc, Bcc |
C. | Bcc, To |
D. | Cc and Bcc, To |
Answer» C. Bcc, To | |
8. |
Gmail manages the mail into ______ categories. |
A. | five |
B. | six |
C. | three |
D. | four |
Answer» D. four | |
9. |
E-mail is not a _______ way to transmit data. |
A. | Secure |
B. | Practical |
C. | Fast |
D. | Legal |
Answer» B. Practical | |
10. |
______ a protocol for sending email between servers on the intrenet. |
A. | Border Gateway Protocol (BGP) |
B. | Simple Mail Transfer Protocol (SMTP) |
C. | Real Time Protocol (RTP) |
D. | Hypertext Transfer Protocol (HTTP) |
Answer» C. Real Time Protocol (RTP) | |
11. |
A ______ main purpose is to prohibit unauthorized access to your computer via the Internet. |
A. | Popup blocker |
B. | Firewall |
C. | Spyware blocker |
D. | Spam assassin |
Answer» C. Spyware blocker | |
12. |
In the domain names, the expression .au stands for ______. |
A. | Antigua |
B. | Australia |
C. | Austria |
D. | African Union |
Answer» C. Austria | |
13. |
Information is sent over networks in small units called _________. |
A. | Sectors |
B. | Clusters |
C. | Packets |
D. | Frames |
Answer» D. Frames | |
14. |
An IP address is having |
A. | 8 bits |
B. | 16 bits |
C. | 24 bits |
D. | 32 bits |
Answer» E. | |
15. |
_________ is an Internet browser released by Apple. |
A. | Chrome |
B. | Firefox |
C. | Netscape |
D. | Safari |
Answer» E. | |
16. |
A/an ___________ is composed of several computers connected together to share resources and data. |
A. | internet |
B. | network |
C. | backbone |
D. | hyperlink |
Answer» C. backbone | |
17. |
______offers services such as search capabilities, e-mail, news, stock price, weather information, sports and entertainment. |
A. | Hostel |
B. | Portal |
C. | Article |
D. | Newspaper |
Answer» C. Article | |
18. |
A software which allows user to view the webpage is known as: |
A. | Internet Browser |
B. | Operating System |
C. | Website |
D. | Client |
Answer» B. Operating System | |
19. |
HTML is used to? |
A. | Make the Os of computer. |
B. | Write code for webpages |
C. | Networking |
D. | None of the above |
E. | Paint |
Answer» C. Networking | |
20. |
_______ is used in the physical layer of OSI model. |
A. | HTTP protocol |
B. | Coaxial cable |
C. | Error detection scheme |
D. | Error correction scheme |
Answer» B. Coaxial cable | |
21. |
Home page is the ______ page of a website. |
A. | about |
B. | last |
C. | first |
D. | middle |
Answer» D. middle | |
22. |
HTML is used to create a: |
A. | Web server |
B. | Word document |
C. | Web page |
D. | Database |
Answer» D. Database | |
23. |
File compression works by removing ___________ from a file. |
A. | unneeded data |
B. | old data |
C. | unsaved data |
D. | system data |
Answer» E. | |
24. |
In which city was India's first police station for cybercrimes inaugurated in 2001? |
A. | Chennai |
B. | Hyderabad |
C. | New Delhi |
D. | Bengaluru |
Answer» E. | |
25. |
In www.Google.com, www stands for: |
A. | Web World Wide |
B. | World Wide Web |
C. | Wide World Web |
D. | World Wide Weblinks |
Answer» C. Wide World Web | |
26. |
A reference to data that the reader can directly follow either by clicking, tapping or hovering is called ________. |
A. | Hyperlink |
B. | Quicklink |
C. | Domain Link |
D. | Public Link |
E. | None of the above |
Answer» B. Quicklink | |
27. |
A collection of related web pages is called: |
A. | client |
B. | search engine |
C. | server |
D. | website |
Answer» E. | |
28. |
______ also called the web, contains billions of documents. |
A. | World Wide Web |
B. | HTTP |
C. | Web portal |
D. | Domain |
Answer» B. HTTP | |
29. |
If a server stores data files for users to access, it is commonly called a/an ___________. |
A. | Application server |
B. | Database server |
C. | File server |
D. | Folder server |
Answer» D. Folder server | |
30. |
A video or photo experiencing a sudden spike in popularity in a short period of time is termed as ____. |
A. | Spam |
B. | Viral |
C. | Wi-Fi |
D. | Virus |
Answer» C. Wi-Fi | |
31. |
Choose the web-browser among the following: |
A. | MSN messenger |
B. | Yahoo messenger |
C. | Rediffbal.net |
D. | Netscape Navigator |
E. | None of these |
Answer» E. None of these | |
32. |
For sending and receiving date from and to other computers around the world through telephone lines we need:- |
A. | Fax |
B. | Modem |
C. | Hub |
D. | Scanner |
Answer» C. Hub | |
33. |
______ is a global address used to locate resources on the internet. |
A. | HTTP |
B. | URL |
C. | HTML |
D. | XML |
Answer» C. HTML | |
34. |
In how many ways e-mail hacking can be done? |
A. | Five |
B. | Six |
C. | Three |
D. | Four |
Answer» D. Four | |
35. |
Internet evolved from the basic ideas of ________(the first WAN that had only four sites in 1969) for interconnecting computers. |
A. | Research organisations |
B. | ARPANET |
C. | FTP |
D. | Telnet |
Answer» C. FTP | |
36. |
Internet explorer is a/an ________. |
A. | company |
B. | internet |
C. | Search Engine |
D. | Web browser |
Answer» E. | |
37. |
______ is an information space on the internet where documents and other resources are stored. |
A. | World Wide Web |
B. | Protocol |
C. | Web browser |
D. | File Explorer |
Answer» B. Protocol | |
38. |
Google is:- |
A. | Website |
B. | Search Engine |
C. | A virus program |
D. | Hardware |
Answer» C. A virus program | |
39. |
IMAP is a standard email protocol that stores email messages on a mail server and allows the end user to view and manipulate the messages. IMAP stands for? |
A. | Internet Mail Application Protocol |
B. | Internet Message Application Protocol |
C. | Internet Message Access Protocol |
D. | Internet Mail Access Protocol |
Answer» D. Internet Mail Access Protocol | |
40. |
POP is an email-related protocol. What is the full form of POP? |
A. | Partial Order Program |
B. | Post Office Protocol |
C. | Post Office Progress |
D. | Partial Order Protocol |
Answer» C. Post Office Progress | |
41. |
Protecting the data from unauthorized access is called:- |
A. | Data validity |
B. | Data encryption |
C. | Data security |
D. | Data inaccessibility |
Answer» D. Data inaccessibility | |
42. |
________ is an Internet browser released by Google. |
A. | Firefox |
B. | Netscape |
C. | Chrome |
D. | Safari |
Answer» D. Safari | |
43. |
HTML stands for__ |
A. | Hyper Text Making Links |
B. | Hyper Text Markup Language |
C. | Higher Textual Marking of Links |
D. | Hyper Text Mixer of Links |
E. | None of these |
Answer» C. Higher Textual Marking of Links | |
44. |
A main page or start page of website is known as…….. |
A. | Display Page |
B. | Home Page |
C. | Server Page |
D. | Domain Page |
E. | None of the above |
Answer» C. Server Page | |
45. |
Normally Internet traffic is measured in |
A. | Volts |
B. | Mbps |
C. | Erlangs |
D. | Watts |
Answer» C. Erlangs | |
46. |
A program, either talk numeric that is made available in digital format for automatic download over the internet is called ______. |
A. | vodcast |
B. | blog |
C. | prodcast |
D. | wiki |
E. | broadcast |
Answer» E. broadcast | |
47. |
A main page or starting page of website is known as ___________. |
A. | Display Page |
B. | Home Page |
C. | Server Page |
D. | Domain Page |
Answer» C. Server Page | |
48. |
India's first public internet service provider: |
A. | Videsh Sanchar Nigam Ltd. |
B. | Wipro Ltd. |
C. | Infosys Ltd. |
D. | TATA Communication Ltd. |
Answer» B. Wipro Ltd. | |
49. |
IP stands for. |
A. | Information Protocol |
B. | Internet Protocol |
C. | inet Protocol |
D. | Insert Protocol |
Answer» C. inet Protocol | |
50. |
WHICH_PROTOCOL_ASSIGNS_IP_ADDRESS_TO_THE_CLIENT_CONNECTED_IN_THE_INTERNET??$ |
A. | DHCP |
B. | IP |
C. | RPC |
D. | none of the mentioned |
Answer» B. IP | |