1.
Which of the following represents a unique address of web resources
Correct Answer
A. URL
Explanation
A URL (Uniform Resource Locator) represents a unique address of web resources. It is a specific character string that provides the location of a web resource on the internet. URLs are used to access websites, web pages, files, and other online resources. They consist of various components, such as the protocol (e.g., HTTP, HTTPS), the domain name or IP address of the server, and the specific path or location of the resource on the server. URLs are widely used to navigate and access web content, making them a unique identifier for web resources.
2.
The Internet is limited to just few countries in the world.
Correct Answer
B. False
Explanation
The statement "The Internet is limited to just a few countries in the world" is false. The Internet is a global network that connects computers and devices worldwide, allowing information to be shared and accessed from anywhere. It is not limited to just a few countries, but rather accessible to people in almost every country around the world. The Internet has become an essential tool for communication, information sharing, and access to various services and resources globally.
3.
ARPANET was a project of DOD
Correct Answer
A. True
Explanation
ARPANET was indeed a project of the Department of Defense (DOD). It was a network developed by the Advanced Research Projects Agency (ARPA), an agency of the DOD. ARPANET was the first wide-area packet-switching network and served as the foundation for the modern internet. It was initially created to facilitate communication and data transfer between various research institutions and universities funded by the DOD. Therefore, the statement "ARPANET was a project of DOD" is true.
4.
Internet Engineering Taskforce takes care of Internet Evolution and smooth operation of the Internet.
Correct Answer
B. False
Explanation
The Internet Engineering Task Force (IETF) is responsible for the development and maintenance of Internet standards, protocols, and related technical specifications. While the IETF plays a crucial role in shaping the future of the Internet and ensuring its smooth operation, it does not specifically take care of Internet evolution. The evolution of the Internet involves a wide range of stakeholders, including researchers, engineers, policymakers, and users, who collectively contribute to its growth and development. Therefore, the given statement is false.
5.
Internet Provides a pool of information through WWW.
Correct Answer
A. True
Explanation
The statement is true because the internet does indeed provide a pool of information through the World Wide Web (WWW). The WWW is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It allows users to access a vast amount of information on various topics from around the world. With just a few clicks, users can search for and find information on almost any subject, making the internet a valuable tool for research, learning, and staying informed.
6.
E-mail is not a service, provided by the Internet.
Correct Answer
B. False
Explanation
The statement is false because e-mail is indeed a service provided by the Internet. E-mail stands for electronic mail, and it is a method of exchanging digital messages between users over the Internet. It allows individuals to send and receive messages, documents, and other files electronically, making communication faster and more efficient. Therefore, it is incorrect to say that e-mail is not a service provided by the Internet.
7.
FTP protocol is used to transfer files from one place to another.
Correct Answer
A. True
Explanation
FTP (File Transfer Protocol) is indeed used to transfer files from one place to another. It is a standard network protocol that allows for the transfer of files between a client and a server on a computer network. The client can upload, download, and manipulate files on the server using FTP commands. Therefore, the given answer "True" is correct.
8.
The Internet protocol does not play any role in the transmission of information over the internet.
Correct Answer
B. False
Explanation
The statement is false because the Internet protocol (IP) plays a crucial role in the transmission of information over the internet. IP is responsible for routing and addressing packets of data, ensuring that they are sent to the correct destination. It breaks down the data into smaller packets, adds the necessary addressing information, and routes them through various networks until they reach their intended destination. Without IP, the internet would not be able to function as a global network for transmitting information.
9.
DNS is a database that contains IP addresses.
Correct Answer
A. True
Explanation
DNS stands for Domain Name System. It is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.0.2.1) so that computers can communicate with each other. DNS acts as a database that stores the IP addresses associated with domain names, allowing users to access websites and services using easy-to-remember domain names instead of numerical IP addresses. Therefore, the statement "DNS is a database that contains IP addresses" is true.
10.
ARPANET is a foundation network of today’s Internet.
Correct Answer
A. True
Explanation
ARPANET was indeed the foundation network of today's Internet. It was the first operational packet-switching network and was developed by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense in the late 1960s. ARPANET laid the groundwork for the development of the Internet, connecting various research institutions and allowing for the exchange of data and communication between them. Over time, ARPANET evolved and expanded, eventually leading to the creation of the global network that we now know as the Internet.
11.
Internet is a
Correct Answer
B. WAN
Explanation
The correct answer is WAN because the question is asking about the type of network that the internet is. A WAN (Wide Area Network) is a network that covers a large geographical area and connects multiple smaller networks together. The internet is a prime example of a WAN as it connects computers and networks from all around the world. LAN (Local Area Network) and MAN (Metropolitan Area Network) are smaller in scale and cover a limited area, so they are not the correct answer.
12.
Which of the following protocol is used for the WWW:
Correct Answer
A. HTTP
Explanation
HTTP (Hypertext Transfer Protocol) is the correct answer because it is the primary protocol used for communication on the World Wide Web (WWW). HTTP allows for the transfer of hypertext documents, such as web pages, between a web server and a client's web browser. FTP (File Transfer Protocol) is used for transferring files, while W3C (World Wide Web Consortium) is an organization that develops standards and protocols for the web, but it is not a protocol itself. Therefore, the correct answer is HTTP.
13.
Which of the following hosts the websites:
Correct Answer
A. Web server
Explanation
A web server is responsible for hosting websites. It is a computer program that stores, processes, and delivers web pages to clients upon request. The web server receives requests from client machines and responds by sending the requested web pages back to the clients. Therefore, the correct answer is "Web server."
14.
Which of the following is used to search for information on the Internet:
Correct Answer
B. Search Engine
Explanation
A search engine is used to search for information on the Internet. It is a software program that allows users to enter keywords or phrases and retrieves a list of relevant websites, documents, or other resources that match the search query. Search engines use algorithms to analyze and index web pages, making it easier for users to find the information they are looking for. Unlike websites or email, search engines specifically focus on helping users find information from a vast amount of online content.
15.
​​​​​​A web site is a collection of:
Correct Answer
D. All of the above
Explanation
A web site is a collection of web pages, graphics files, and multimedia contents. Web pages are the building blocks of a website, containing the textual and visual information that users see. Graphics files include images, logos, icons, and other visual elements that enhance the appearance of the website. Multimedia contents refer to audio, video, and interactive elements that provide a richer user experience. Therefore, all of the given options - web pages, graphics files, and multimedia contents - are correct and make up the components of a website.
16.
Which of the following protocol is used to access the web pages:
Correct Answer
B. HTTP
Explanation
HTTP (Hypertext Transfer Protocol) is the correct answer because it is the protocol used to access web pages. FTP (File Transfer Protocol) is used for transferring files, TCP/IP (Transmission Control Protocol/Internet Protocol) is the underlying protocol used for internet communication, and "All of the above" is not correct as it includes protocols that are not specifically used for accessing web pages.
17.
The Internet runs on which of the following protocol:
Correct Answer
A. TCP/IP
Explanation
The Internet runs on the TCP/IP protocol. TCP/IP is a set of communication protocols that allows computers to connect and exchange data over the Internet. It is the foundation of internet communication, providing reliable and efficient transmission of data packets between devices. FTP and HTTP are specific protocols that operate on top of TCP/IP, enabling file transfer and web browsing respectively. Therefore, TCP/IP is the correct answer as it encompasses all the protocols necessary for internet communication.
18.
Each computer connected to the internet has a unique address, Which is known as:
Correct Answer
C. URL
Explanation
The correct answer is URL (Uniform Resource Locator). This is because a URL is a web address that identifies a specific resource on the internet. It is used to locate and access websites, web pages, files, and other resources. An IP address, on the other hand, is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. While a web address is a common term used to refer to a URL, it is not the technically accurate term. Therefore, the correct answer is URL.
19.
Who is responsible to provide you internet at your doorstep
Correct Answer
C. ISP
Explanation
The correct answer is ISP, which stands for Internet Service Provider. ISPs are responsible for providing internet services to individuals and businesses. They offer various types of internet connections, such as DSL, cable, fiber optic, or wireless, and ensure that the internet is accessible at the user's doorstep. ISPs play a crucial role in connecting users to the internet by providing the necessary infrastructure and managing the network. They also offer different plans and packages based on the user's requirements and location.
20.
Which of the following is/are the services provided on the Internet:
Correct Answer
D. All of the above
Explanation
All of the options mentioned (WWW, E-mail, VoIP) are services provided on the Internet. The World Wide Web (WWW) is a system of interconnected documents and other resources, linked by hyperlinks and URLs. E-mail allows users to send and receive messages electronically. VoIP (Voice over Internet Protocol) enables voice communication over the internet. Therefore, the correct answer is "All of the above".
21.
Who is responsible to set the standards for HTML and other specification for Web
Correct Answer
A. W3C
Explanation
W3C, also known as the World Wide Web Consortium, is responsible for setting the standards for HTML and other specifications for the web. They are an international community that develops open standards to ensure the long-term growth of the web. W3C works collaboratively with various organizations and individuals to create guidelines and protocols that promote compatibility and interoperability across different web platforms and devices.
22.
An e-mail address is composed of:
Correct Answer
D. All of the above
Explanation
An email address is composed of a user name, the "@" symbol, and a domain name. The user name is the unique identifier for the email account, the "@" symbol separates the user name from the domain name, and the domain name specifies the email provider or organization. Therefore, all of the given options are correct and necessary components of an email address.
23.
How many layers are found in OSI Model?
Correct Answer
D. 7
Explanation
The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layer above and below it. These layers, from bottom to top, are the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Therefore, the correct answer is 7.
24.
An IP address is composed of
Correct Answer
C. Both of the above
Explanation
An IP address is composed of both a Network Number and a Host Number. The Network Number identifies the network to which the device belongs, while the Host Number identifies the specific device within that network. Therefore, both components are necessary to uniquely identify a device on a network.
25.
Which of the following network device provides strength to digital signals?
Correct Answer
A. Repeater
Explanation
A repeater is a network device that strengthens digital signals by regenerating and retransmitting them. It receives weak signals, amplifies them, and then sends them out again, ensuring that the signal reaches its destination without any loss or degradation. Hubs and switches, on the other hand, are devices that allow multiple devices to connect to a network, but they do not specifically strengthen the signals. Therefore, the correct answer is Repeater.
26.
How many bits are constituted into the format of IP address
Correct Answer
C. 32
Explanation
An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It is represented by a series of 32 bits, which are divided into four octets. Each octet is represented by 8 bits, resulting in a total of 32 bits. Therefore, the correct answer is 32.
27.
Which of the following protocol is used in the Wide Area network?
Correct Answer
D. All of the above
Explanation
All of the above protocols (ATM, Sonet, X.25) are used in the Wide Area Network (WAN). ATM (Asynchronous Transfer Mode) is a protocol used for transmitting data, voice, and video over high-speed networks. Sonet (Synchronous Optical Networking) is a protocol used for transmitting data over optical fiber networks. X.25 is a protocol used for packet-switched networks, commonly used in older WANs. Therefore, all three protocols are used in the Wide Area Network.
28.
Which of the following protocol connects a local machine to a remote server through the virtual terminal?
Correct Answer
A. Telenet
Explanation
Telenet is the correct answer because it is a protocol that allows a local machine to connect to a remote server through the virtual terminal. Telenet provides a command-line interface for accessing and managing the remote server. FTP, HTTP, and other protocols mentioned are not specifically designed for connecting to a remote server through a virtual terminal, making them incorrect options.
29.
Which of the is used to protect your network from unauthorized access
Correct Answer
A. Firewall
Explanation
A firewall is used to protect a network from unauthorized access by monitoring and controlling incoming and outgoing network traffic. It acts as a barrier between the internal network and external networks, filtering the data packets based on predetermined security rules. This helps to prevent unauthorized access, block malicious activities, and ensure the security and integrity of the network. Switches and routers are network devices that perform different functions such as connecting devices within a network and routing data between networks, but they do not provide the same level of security as a firewall.
30.
Which of the following technique is used by the firewall to protect your private network from unauthorized access?
Correct Answer
D. All of the above
Explanation
Firewalls use multiple techniques to protect private networks from unauthorized access. Packet filtering is one such technique where the firewall examines each packet of data based on predefined rules and allows or blocks them accordingly. Application Level gateway, also known as a proxy server, acts as an intermediary between the client and the server, inspecting the application-level data and providing an additional layer of security. Circuit Level gateway works at the transport layer and establishes a connection between the client and the server, validating the session before allowing data transfer. Therefore, all of the mentioned techniques are used by firewalls to protect private networks.
31.
Copyright law grants exclusive rights to the copyright holders in relation to their work.
Correct Answer
A. True
Explanation
Copyright law does indeed grant exclusive rights to the copyright holders in relation to their work. These exclusive rights include the right to reproduce, distribute, publicly display, and create derivative works based on the original work. These rights allow copyright holders to control how their work is used and to potentially profit from its use.
32.
A database server is used to collect and store data from website visitors.
Correct Answer
A. True
Explanation
A database server is a software application that is specifically designed to collect and store data. It is commonly used to store information from website visitors, such as user profiles, login credentials, preferences, and other relevant data. By utilizing a database server, website owners can efficiently manage and organize the data collected from their visitors, enabling them to provide personalized experiences and make data-driven decisions. Therefore, the statement "A database server is used to collect and store data from website visitors" is true.
33.
Which of the following is correct in the reference of web publishing?
Correct Answer
A. Publishing data on web
Explanation
The correct answer is "Publishing data on web". Web publishing refers to the process of making information or data available to the public through the internet. This involves creating and uploading content such as text, images, videos, and documents to a website or web server, allowing users to access and view the content online. It is a common method of sharing information, communicating, and reaching a large audience globally.
34.
Which of the following is a server-side technology?
Correct Answer
D. All of the above
Explanation
All of the options listed - JSP, ASP, and Servlet - are server-side technologies. JSP (JavaServer Pages) is a technology used for creating dynamic web pages with Java. ASP (Active Server Pages) is a server-side scripting language developed by Microsoft. Servlets are Java classes that are used to extend the capabilities of servers and generate dynamic web content. Therefore, all of these options are correct as they are server-side technologies used for creating dynamic web applications.
35.
HTML is
Correct Answer
C. Hypertext Markup Language
Explanation
HTML stands for Hypertext Markup Language. It is a standard markup language used for creating web pages and applications. HTML uses tags to structure the content and define the layout of a web page. It is not "Hyper text Mail Language" or "Hypertext Mark language," as these options do not accurately describe the purpose and functionality of HTML. Therefore, the correct answer is "Hypertext Markup Language."
36.
E-Commerce is a;
Correct Answer
C. Both of the above
Explanation
E-commerce refers to the buying and selling of goods and services over the internet. It involves conducting business transactions electronically, using electronic devices such as computers, smartphones, and tablets. Therefore, the correct answer is "Both of the above" because e-commerce encompasses both providing services on the internet and conducting business through electronic devices.
37.
MIME stands for
Correct Answer
A. Multipurpose Internet Mail Extension
Explanation
MIME stands for Multipurpose Internet Mail Extension. It is a standard that allows email clients to exchange different types of data, such as text, images, audio, and video. MIME extends the capabilities of the Simple Mail Transfer Protocol (SMTP) by defining a set of rules for encoding non-text attachments and other multimedia content, making it possible to send and receive these files via email. This standardization ensures that emails with various types of content can be properly displayed and interpreted by different email clients and systems.
38.
How many types of topology?
Correct Answer
D. 6
39.
Which topology used in LAN
Correct Answer
D. All of the above
Explanation
All of the above options - Bus Topology, Ring Topology, and Star Topology - are correct answers because all three are commonly used topologies in LAN (Local Area Network) setups. Bus Topology is a network arrangement where all devices are connected to a single cable, Ring Topology is a network arrangement where devices are connected in a circular loop, and Star Topology is a network arrangement where devices are connected to a central hub or switch. Each topology has its own advantages and disadvantages, and the choice depends on the specific requirements of the network.