cpct objective question of internet in english

 cpct objective question of internet in English(cpct objective)

1) Transfer of files from user’s computer onto server is:
A) Downloading
B) Sequencing
C) Accessing
D) Uploading
Ans: D) Uploading 


2) Which protocol provides e-mail facility among different hosts?
A) SMTP
B) FTP
C) TELNET
 D) SNMP
Ans: A) SMTP

3) The protocol which provides information about text and binary files that are organized in a menu structure is:
A) HTTP
B) FTP
C) POP
D) TCP/IP
Ans: C) TCP/IP

4) Requests made by the web browsers are responded by:
A) URL
B) Web Server
C) HTTP
D) Web Page
Ans: B) Web Server

5) Online textual talk, in real time, is called:
A) Downloading
B) Surfing
C) Chatting
D) Conferencing
Ans: C) Chatting

6) The e-mail system that supports audio is known as:
A) Sound mail
B) Voicemail
C) Conversation
D) Messaging
Ans: B) Voicemail


7) Which tag is used to deploy a picture on a web page?
A) Picture
B) Image
C) Img
D) Src
Ans: C) img

8) What is Google Chrome?
A) Web browser
B) Worm
C) Search Engine
D) Anti-Virus
Ans: A) Web Browser

9) A Device that connects dissimilar networks is called
A) Bridge
B) Rectifier
C) Gateway
D) Backbone
Ans:- C) Gateway

10) Junk e-mail is also called
A) Spam
B) Spoof
C) Spool
D) Sniffer
Ans:- A) Spam

11) The messages which help in tracking a user’s activity on a specific website are known as:
A) Mails
B) Packets
C) Cookies
D) Cracker
Ans:- C) Cookies

12) 192.6.200.123 is a/an:
A) Ethernet Address
B) IP Address
C) Computer Address
D) LAN Address
Ans:- B) IP Address

13) Which of the following protocol provides information about messages sent via e-mail?
A) FTP
B) TCP/IP
C) HTTP
D) SMTP
Ans:- D) SMTP

14) Web Documents are written in
A) HTML
B) C
C) C++
D) COBOL
Ans:- A) HTML

15) Which tag is used to hyperlink on the webpage through HTML Language?
A) <ahref>
B) <a>
C) <link>
D) <hlink>
Ans: A) <ahref>

16) Which of the following functions is used to quit from an e-mail account?
A) Sign In
B) Sign Out
C) Sign Up
D) Sign Down
Ans:- B) Sign Out

17) Which of the following is a browser?
A) Windows XP
B) C++
C) Power Cord
D) IE8
Ans: D) IE8

18) Which version of internet explorer gives the facility of side by side browsing?
Ans: Internet Explorer 11

19) In Internet Explorer 11, …………….. mode is enabled by default.
Ans: Enhanced protected.

20) Which command can be used in windows for testing the network connection?
Ans: Ping

21)  ……… is an area of memory assigned to store an e-mail message for the user.
Ans: Mail box

22) A  user can get files from another computer on the internet by using which protocol?
A)     FTP
B)      HTTP
C)      UTP
D)     TCP
Ans:- A) FTP

23) Which of the following devices is required for an internet connection?
A)     BIOS
B)      NIC Card
C)      CD Drive
D)     Joystick
Ans:- B) NIC Card

24) An e-mail message can be protected by:
A)     Mirroring
B)      Caching
C)      Encryption
D)     Resending
Ans:- C) Encryption

Which of the following is the main circuit board connecting different components of a computer together?
A)CPU
B)Switch board
C)Motherboard
D)NIC
Ans: C) Motherboard

25) Which of the following is slower than the CPU but faster than the main memory?
A) Cache memory
B) Hard Disk
C) DVD
D) ROM
Ans: A) Cache Memory

26) Magnetic Tape is a(n) ……………… memory.
A)Volatile
B)Random access
C)Optical
D)Sequential access
Ans: D) Sequential access

27) Which of the following is a type of computer generally known for large size, storage and processing power and used for large-scale computing?
A) Minicomputer
B) Mainframe computer
C) Microcomputer
D) PDA
Ans: B) Mainframe computer

28) Which of the following is considered as India’s first super computer built by C-DAC?
A) PARAM Yuva
B) PARAM Padma
C) PARAM 8000
D) PARAM Ishan
Ans: C) PARAM 8000

29) With respect to computer system, UPS stands for:
Ans: Uninterruptable Power Supply

30) Match the following:
Set 1 Set 2


I) MIPS A) Sequential access memory
II) SRAM B) Video Disk
III) Magnetic Tape C) Processor speed
IV) DVD D) Volatile memory
Ans: I-C, II-D, III-A, IV-B


31) The FORTRAN is a ……………… programming language
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
Ans: C) third Generation

32) Word processing software is the example of:
A) Utility software
B) Firmware
C) Application software
D) System Software
Ans: C) Application Software
 

https://amzn.to/2EAMkqm 33) Turing Plaintext to Ciphertext is called:
Ans: Encryption

34) With respect to computer security, CAPTCHA Stands for:
Ans: Completely automated public Turing test to tell computers and humans apart
35) Which of the following IP address classes uses 8 bits for network ID and 24 bits for host ID?
A)  Class-A
B)  Class-B
C)  Class-C
D)  Class-D
Ans:- A) Class-A

36) Which of the following contains links to other websites and presents information from diverse source in a unified way?
A)  Website
B)  Web Portal
C)  URL
D)  Web Server
Ans:- B) Web Portal

37) Which of the following is the most common protocol used for sending e-mails between two or more servers?
A)  FTP
B)  UDP
C)  HTTP
D)  SMTP
Ans:- D) SMTP

38) Which of the following is NOT a disadvantage of Internet?
A)  Spamming
B)  Cyber Terrorism
C)  E-Commerce
D)  Cyberbullying
Ans:-  C) E-Commerce

39) Which of the following Web Browsers uses "Incognito Mode" for private browsing?
A) Chrome
B) Internet Explorer
C) Opera
D) Mozilla Firefox
Ans:- A) Chrome

40) Which of the following commands can be used to test the connection between the local machine and a remote address or machine?
A) Ping
B) vmstat
C) free
D) ftp
Ans:-A)  ping

41) For a small  website, one needs to buy space from which of the following?
A)Network administrator
B)Telephone exchange
C)ISP
D)Internet
Ans:C) ISP

42) Which of the following provides services to connect to the internet?
A)IP address
B)TCP/IP connection
C)ISP
D)Google Chrome
Ans:- C) ISP


43) The network of computers that connects people all over the word is called:
A)Web
B)Internet
C)LAN
D)VLAN
Ans:- B) Internet

44) A strong password should have:
A)Only lower-case letters
B)Only upper-case letters
C)Both letters and digits but no special characters
D)A good mix of letters, digits and special characters.
Ans: A good mix of letters, digits and special characters.

45) In asymmetric cryptography, private key is generally used to:
A)Shorten the message
B)Decrypt the message
C)Hide (make invisible) the message
D)Truncate the message
Ans: B) Decrypt the message

46)What is Google ?
A)Search Engine
B)Spreadsheet
C)Word processor
D)Chat service on the web
Ans:-A) Search Engine

Comments

Popular posts from this blog

32 cpct objective question and answer in hindi

Computer Related Shortcut keys for cpct exam

microsoft office related cpct objective question and answer