cpct objective question of internet in english
cpct objective question of internet in English(cpct objective)
1) Transfer of files from user’s computer onto server is:A) Downloading
B) Sequencing
C) Accessing
D) Uploading
Ans: D) Uploading
2) Which protocol provides e-mail facility among different hosts?
A) SMTP
B) FTP
C) TELNET
D) SNMP
Ans: A) SMTP
3) The protocol which provides information about text and binary files that are organized in a menu structure is:
A) HTTP
B) FTP
C) POP
D) TCP/IP
Ans: C) TCP/IP
4) Requests made by the web browsers are responded by:
A) URL
B) Web Server
C) HTTP
D) Web Page
Ans: B) Web Server
5) Online textual talk, in real time, is called:
A) Downloading
B) Surfing
C) Chatting
D) Conferencing
Ans: C) Chatting
6) The e-mail system that supports audio is known as:
A) Sound mail
B) Voicemail
C) Conversation
D) Messaging
Ans: B) Voicemail
7) Which tag is used to deploy a picture on a web page?
A) Picture
B) Image
C) Img
D) Src
Ans: C) img
8) What is Google Chrome?
A) Web browser
B) Worm
C) Search Engine
D) Anti-Virus
Ans: A) Web Browser
9) A Device that connects dissimilar networks is called
A) Bridge
B) Rectifier
C) Gateway
D) Backbone
Ans:- C) Gateway
10) Junk e-mail is also called
A) Spam
B) Spoof
C) Spool
D) Sniffer
Ans:- A) Spam
11) The messages which help in tracking a user’s activity on a specific website are known as:
A) Mails
B) Packets
C) Cookies
D) Cracker
Ans:- C) Cookies
12) 192.6.200.123 is a/an:
A) Ethernet Address
B) IP Address
C) Computer Address
D) LAN Address
Ans:- B) IP Address
13) Which of the following protocol provides information about messages sent via e-mail?
A) FTP
B) TCP/IP
C) HTTP
D) SMTP
Ans:- D) SMTP
14) Web Documents are written in
A) HTML
B) C
C) C++
D) COBOL
Ans:- A) HTML
15) Which tag is used to hyperlink on the webpage through HTML Language?
A) <ahref>
B) <a>
C) <link>
D) <hlink>
Ans: A) <ahref>
16) Which of the following functions is used to quit from an e-mail account?
A) Sign In
B) Sign Out
C) Sign Up
D) Sign Down
Ans:- B) Sign Out
17) Which of the following is a browser?
A) Windows XP
B) C++
C) Power Cord
D) IE8
Ans: D) IE8
18) Which version of internet explorer gives the facility of side by side browsing?
Ans: Internet Explorer 11
19) In Internet Explorer 11, …………….. mode is enabled by default.
Ans: Enhanced protected.
20) Which command can be used in windows for testing the network connection?
Ans: Ping
21) ……… is an area of memory assigned to store an e-mail message for the user.
Ans: Mail box
22) A user can get files from another computer on the internet by using which protocol?
A) FTP
B) HTTP
C) UTP
D) TCP
Ans:- A) FTP
23) Which of the following devices is required for an internet connection?
A) BIOS
B) NIC Card
C) CD Drive
D) Joystick
Ans:- B) NIC Card
24) An e-mail message can be protected by:
A) Mirroring
B) Caching
C) Encryption
D) Resending
Ans:- C) Encryption
Which of the following is the main circuit board connecting different components of a computer together?
A)CPU
B)Switch board
C)Motherboard
D)NIC
Ans: C) Motherboard
25) Which of the following is slower than the CPU but faster than the main memory?
A) Cache memory
B) Hard Disk
C) DVD
D) ROM
Ans: A) Cache Memory
26) Magnetic Tape is a(n) ……………… memory.
A)Volatile
B)Random access
C)Optical
D)Sequential access
Ans: D) Sequential access
27) Which of the following is a type of computer generally known for large size, storage and processing power and used for large-scale computing?
A) Minicomputer
B) Mainframe computer
C) Microcomputer
D) PDA
Ans: B) Mainframe computer
28) Which of the following is considered as India’s first super computer built by C-DAC?
A) PARAM Yuva
B) PARAM Padma
C) PARAM 8000
D) PARAM Ishan
Ans: C) PARAM 8000
29) With respect to computer system, UPS stands for:
Ans: Uninterruptable Power Supply
30) Match the following:
Set 1 Set 2
I) MIPS A) Sequential access memory
II) SRAM B) Video Disk
III) Magnetic Tape C) Processor speed
IV) DVD D) Volatile memory
Ans: I-C, II-D, III-A, IV-B
31) The FORTRAN is a ……………… programming language
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
Ans: C) third Generation
32) Word processing software is the example of:
A) Utility software
B) Firmware
C) Application software
D) System Software
Ans: C) Application Software
https://amzn.to/2EAMkqm 33) Turing Plaintext to Ciphertext is called:
Ans: Encryption
34) With respect to computer security, CAPTCHA Stands for:
Ans: Completely automated public Turing test to tell computers and humans apart
35) Which of the following IP address classes uses 8 bits for network ID and 24 bits for host ID?
A) Class-A
B) Class-B
C) Class-C
D) Class-D
Ans:- A) Class-A
36) Which of the following contains links to other websites and presents information from diverse source in a unified way?
A) Website
B) Web Portal
C) URL
D) Web Server
Ans:- B) Web Portal
37) Which of the following is the most common protocol used for sending e-mails between two or more servers?
A) FTP
B) UDP
C) HTTP
D) SMTP
Ans:- D) SMTP
38) Which of the following is NOT a disadvantage of Internet?
A) Spamming
B) Cyber Terrorism
C) E-Commerce
D) Cyberbullying
Ans:- C) E-Commerce
39) Which of the following Web Browsers uses "Incognito Mode" for private browsing?
A) Chrome
B) Internet Explorer
C) Opera
D) Mozilla Firefox
Ans:- A) Chrome
40) Which of the following commands can be used to test the connection between the local machine and a remote address or machine?
A) Ping
B) vmstat
C) free
D) ftp
Ans:-A) ping
41) For a small website, one needs to buy space from which of the following?
A)Network administrator
B)Telephone exchange
C)ISP
D)Internet
Ans:C) ISP
42) Which of the following provides services to connect to the internet?
A)IP address
B)TCP/IP connection
C)ISP
D)Google Chrome
Ans:- C) ISP
43) The network of computers that connects people all over the word is called:
A)Web
B)Internet
C)LAN
D)VLAN
Ans:- B) Internet
44) A strong password should have:
A)Only lower-case letters
B)Only upper-case letters
C)Both letters and digits but no special characters
D)A good mix of letters, digits and special characters.
Ans: A good mix of letters, digits and special characters.
45) In asymmetric cryptography, private key is generally used to:
A)Shorten the message
B)Decrypt the message
C)Hide (make invisible) the message
D)Truncate the message
Ans: B) Decrypt the message
46)What is Google ?
A)Search Engine
B)Spreadsheet
C)Word processor
D)Chat service on the web
Ans:-A) Search Engine
Comments
Post a Comment