O level Internet Technology and web design
1. The main function of a browser is to
A) compile
HTML
B) interpret
HTML
C) de-compile
HTML
D) interpret
CGI programs
Answer: B
2. Spider is a________
A) a program
that crawls around the web and stores pages in search engines.
B) hacking
software that spreads virally
C) software
that examines network vulnerabilities
D) a protocol
for distributing large files
Answer: A
3. FTP does not use
A) two
transfer mode
B) control
connection to remote computer before file can be transferred
C) User
Datagram Protocol (UDP)
D)
authorization of a user through login and password verification
Answer: C
4 ___________ is used to enable the use of active documents
A) HTML
B) CGI
C) JAVA
D) All the above
Answer: D
5. In <IMG SRC=”C:PICTURE/BB1.gif” ALIGN=middle> ALIGN is
A) A tag
B) The head
C) The body
D) An
attribute
Answer: D
6. Web pages are uniquely defined using
A) IP
addresses
B) URL
C) Domain
D) File name
Answer: B
7. Which of the following services are available on the World Wide
Web?
i) Encryption
ii) HTTP
iii) HTML
iv) Firewalls
A) i) and ii)
B) ii) and
iii)
C) iii) and
iv)
D) i) and iv)
Answer: B
8. Internet uses
A) packet
switching
B) circuit
switching
C) telephone
switching
D) telex
switching
Answer: A
9. The ownership rights as related to content on the web are
governed under
A) Copyright
law
B) Patent law
C) Data
protection law
D) Privacy law
Answer: A
10. Multipurpose Internet Mail Extension (MIME) was developed
A) to support
email messages containing text and video
B) to support
email messages containing text, audio and video
C) to support
email messages containing audio and video
D) to support text-based email messages
Answer: B
11. Access control is implemented using
A) Cache
B) Firewall
C) Hyperlinks
D) JSP
Answer: B
12. Domain names are converted to
A) a binary
string
B)
alphanumeric string
C) IP
addresses
D) a
hexadecimal string
Answer: C
13. It is possible to display pictures in HTML specification by
using the tag.
A) <GR src
= Picture file>
B) <PIC src
=Picture file>
C) <IMG src
=Picture file>
D) <GIF
src=Picture file>
Answer: C
14. Desirable properties of a website are
i) a
meaningful address
ii) help and
search facilities
iii) links to
related sites
iv) features to allow users to give feedback
i), ii), iii)
B) i), ii),
iii), iv)
C) i), ii),
iii), iv), v)
D) i), ii),
iii), v)
Answer: C
15. URL specifies the following:
i) protocol
used
ii) domain
name of server hosting web page
iii) name of
folder with required information
iv) name of
document formatted using HTML
v) the name of
ISP
A) i), ii),
iii), iv)
B) ii), iii),
iv), v)
C) i), iii),
iv)
D) i), ii),
iii), v)
Answer: A
16. A search engine is a program to search
A) for
information
B) web pages
C) web pages
for specified index terms
D) web pages
for information using specified search terms
Answer: D
17. XML is
A) superset of
HTML
B) Extensible
Markup Language
C) part of DHTML
D)
presentation language
Answer: B
18. A world wide web contains web pages
A) residing in
many computers
B) created
using HTML
C) with links
to other web pages
D) residing in
many computers linked together using HTML
Answer: D
19. By an extranet we mean
A) an extra
fast computer network
B) the
intranets of two co-operating organizations interconnected via a secure leased
line
C) an extra
network used by an organization for higher reliability
D) an extra
connection to internet
Answer: B
20. Plug-in is a
A) Software
B) Hardware
C) Software
and hardware both used for specific purpose
D) Flash player
Answer: A
21. The rules with regards to conduct for Internet users is known as
A) Mosaic
B) Netiquette
C) Protocol
D) Internet Protocol
Answer:B
22. TCP/IP is
A)
Abbreviation for Transmission Control Protocol and Internet Protocol
B) A suite of
networking protocols
C) A standard
protocol that lets disparate types of computers communicate over the Net
D) All the
above
Answer:D
23. The protocol that allows a computer to use the Internet Protocol
with standard voice-grade telephone line and a high-speed modem is........
A) SLIP
B) SMTP
C) SGML
D) RTF
Answer:A
24. A Spider is
A) A Computer
virus
B) A Browser
C) A program
that catalogs web sites
D) A hacker
community
Answer:C
25. FTP does not use
A) Two
transfer mode
B) Control
connection to remote computer before file can be transferred
C) User
Datagram Protocol
D) Authorization of a user through login and
password verification
Answer:C
26. A terminal emulation
protocol that allows users to log-on to a host computer from remote computers
is
A) Telnet
B) TCP/IP
C) FTP
D)
Point-to-Point protocol (PPP)
Answer:A
27. Which of the following is used to enable the use of active
documents?
A) HTML
B) CGI
C) JAVA
D) All of the
above
Answer:D
28. A networking standard
developed by Xerox, Intel and DEC; capable of connecting as many as 1,024
workstations and transmitting data at a maximum speed of 10 Mbps
A) Ethernet
B) FDDI
C) File
Transfer protocol
D) Gopher
Answer:A
29. The HTML tags that create a table header are
A)
<head></head>
B)
<ttop></ttop>
C)
<th></th>
D)
<td></td>
Answer: C
30. Which of the following is
the correct HTML for inserting background image?
A)
<background img=”background.gif”>
B) <img
src=”background.gif” background />
C) <a
href=”background.gif”>
D) <body background=”background.gif”>
Answer:
D
31. TCP is a commonly used
protocol at
A)
Applications layer
B) Network
layer
C) Transport
Layer
D) Physical
Layer
Answer: C
32. The domain name in an URL refers to the
A) protocol
B) server
C) filename
D) directory
Answer: B
33. Cell base architecture is
known as
A) LAN
B) ATM
C) FDDI
D)
Client-Server
Answer: B
34. Telnet is
A) Terminal
network
B) Telephone
network
C)
Telecommunication network
D) Terrestrial
network
Answer: A
35. A software that prevents
external access to a system is termed as
A) Gateway
B) Firewall
C) Intrusion
Prevention system
D) Anti-Viruses
Answer:
B
36. E-mail address is
A)
Vml.@india.com
B)
@vrm@india.com
C)
Vrm.india.com
Answer: D
37. A web publishing tool developed by Microsoft is
A) Navigator
B) Hot Metal
C) Pagemill
D) Front Page
Answer: D
38. Which of the following
cable types is generally associated with the linear bus topology
A) Unshielded
twisted pair
B) Fiber Optic
C) Thin
coaxial cable
D) Telephone
cable
Answer: C
39. Error detection at a data link level is achieved by
A) Parity
B) Cyclic
redundancy code
C) Hamming
code
D)
Equalization
Answer: B
40. On Internet, which
version of the Internet Protocol is the most widely used
A) Ipv1
B) IPv6
C) IPv2
D) IPv4
Answer:
D
41. ________ are networks that connect people within a company to
each other and to the company network.
A) Extranets
B) Internets
C) Bitstreams
D) Intranets
Answer: D
42. The internet model or TCP/IP reference model specifically
applies to internet worked systems, and has 4 layers. The movement of data
packets across a network would be managed by which layer?
A) The link
layer
B) The (inter)
network layer
C) The
transport layer
D)
The application layer
Answer: A
43. Which is NOT a good Web
security strategy?
A) Restrict
access to the Web server; keep a minimum number of ports open
B) Limit the
users who can load software, edit or add files.
C) Add demo
programs, so users can test system without accessing production data.
D) Remove
unnecessary compilers and interpreters.
Answer: D
44. A passive threat to
computer security is
A) Malicious
Intent
B) Sabotage
C) Accident
Errors
D) Espionage
Agents
Answer: A
45. ________ are used to identify
a user who returns to a Website.
A) Cookies
B) Plug-ins
C) Scripts
D) ASPs
Answer:
A
46. E-mail message can be
protected by
A) Mirroring
B) Caching
C) Encryption
D) Resending
Answer: C
47. Multipurpose Internet
Mail Extension (MIME) was developed
A) to support
email messages containing text, audio and video
B) to support
FTP clients
C) to support
telnet between two machines
D) to support
text-based email messages only
Answer: A
48. The tag used in HTML to link it with other URL’s is:
A) <H>
B) <A>
C) <U>
D) <L>
Answer: B
49. HTTP stands for
A) Hyper Text
Transfer Protocol
B) Hyper Tetra
Transfer Protocol
C) Heavy Text
Transfer Protocol
D) Huge Text
Transfer Protocol
Answer: A
50. A reliable stream service in TCP is described as two-way
transmission, free of transmission ________, with no lost or duplicate
________, and the bytes are delivered in the same
________ in which they were transmitted.
A) errors;
bytes; manner
B) failure;
packets; sequence
C) errors;
activity; manner
D) errors;
bytes; sequence
Answer:
B
51.The memory allocation scheme subject to “external” fragmentation
is
A) Segmentation
(Transport Layer)
B) Swapping
C) pure demand
paging
D) multiple
fixed contiguous partitions
Answer: A
52.SSTF stands for
A)
Shortest-Seek-time-first scheduling
B) small –
small-time-first
C)
simple-seek-time-first
D)
small-simple-time-first scheduling
Answer: A
53. The total time to prepare a disk drive mechanism for a block of
data to be read from its
A) latency
B) latency
plus transmission time
C) latency
plus seek time
D) latency
plus seek time plus transmission time
Answer: C
54. Resolution of externally defined symbols is performed by
A) Linker
B) Loader
C) Compiler
D) Editor
Answer: A
55. The total time to prepare a disk drive mechanism for a block of
data to be read from is:
A) latency
B) latency
plus transmission time
C) latency
plus seek time
D) latency plus seek time plus transmission
time
Answer:
C
56. FTP Tool is to
A)
Used to transfer data/files among computers on the Internet
B)
Archive data/files
C)
Copy files from external sources
D)
Delete file from Internet
Answer: A
57. Multi programming system is
A)
A computer system that permits multiple users to run programs at same time
B)
A computer system that permits run similar programs at multiple time
C)
A computer system that permits multiple Programs to run at same time
D)
None of the above
Answer: C
58. The circuit used to store one bit of data is known as
A)
Register
B)
Encoder
C)
Decoder
D)
Flip Flop
Answer: D
59. ________ Command is used
to manipulate TCP/IP routing table.
A)
route
B)
ipconfig
C)
ifconfig
D)
traceroute
Answer: A
60. Which of the following is related to ipconfig in Microsoft
Windows?
A)
Display all current TCP/IP network configuration values
B)
Modify DHCP settings
C)
Modify DNS settings
D) All of the above
Answer:
A
61.Protocols are
A)
Agreements on how communication components and DTE's are to communicate
B)
Logical communication channels for transferring data
C)
Physical communication channels used for transferring data
D)
None of the above
Answer: A
62. Which data communication method is used to transmit the data
over a serial communication link?
A)
Simplex
B)
Half-duplex
C)
Full duplex
D)
Both B and C
Answer: D
63. In communication satellite, multiple repeaters are known as
A)
Detectors
B)
Modulators
C)
Stations
D)
Transponders
Answer: D
64. Error detection at the data link layer is achieved by
A)
Bit stuffing
B)
Cyclic redundancy codes
C)
Hamming codes
D)
Equalization
Answer: B
65. What are the transmission impairments?
A)
Attenuation
B)
Distortion
C)
Noise
D) All of the above
Answer: D
66. The topology with highest reliability is?
A) Bus
topology
B) Star
topology
C) Ring
Topology
D) Mesh
Topology
Answer: D
67. Baud means
A) The number
of bits transmitted per unit time
B) The number
of bytes transmitted per unit time
C) The rate
at which the signal changes
D) None of
the above
Answer: C
68. In OSI model cable is
used in
A) Physical
Layer
B) Network
layer
C) Transport
layer
D) Data link
layer
Answer: A
69. The TCP/IP model has
A) 7 layers
B) 3 layers
C) 4 layers
D) 5 layers
Answer: C
70. HTML is
A) Hyper Text
Markedup Language
B) Hyper Text
Markup Language
C) Hyper Text
Marked Language
D) Hyper Text Marking Language
Answer: B
71. Correct HTML Tag for largest heading:
A) <head>
B) <h6>
C) <heading>
D) <h1>
Answer: D
72. www is based on which model?
A) local-server
B) client-server
C) 3-tier
D) None of the above
Answer: B
73. The system that translates an IP address into
an easier to remember name is the
A) Packet switching
B) DNS
C) Domain
numbering system
D) None of the above
Answer: B
74. In an email address abc@dsdu.com, dsdu is
the
A)
host computer in a business with the name dsdu
B)
host computer in a commercial domain
C)
client computer in a commercial business
D) client computer in a commercial
domain
Answer: B
75. The way in which information is transmitted to multiple internet
connected devices is called....
A) Internet
connectivity
B) IP address
C) multicasting
D) multitasking
Answer: C
76. What protocol does PPP use to identify the Network layer
protocol?
A) NCP
B) ISDN
C) LCP
D) HDLC
Answer: A
77. How many broadcast domains are created when you segment a
network with a 12-port switch?
A) 1
B) 2
C) 5
D) 12
Answer: A
78. Which class of IP address has the most host addresses available
by default?
A) A
B) B
C) C
D) None of the above
Answer: A
79. Physical addresses will change from
A) Point-to-point
B) hop to hop
C) sender to
receiver
D) frame to frame
Answer: B
80. ARPANET stands for
(A) Advanced
Research Projects Agency Network
(B) Advance
Research Project Agency Network
(C)
Asymmetric Routing Project Advance Network
(D) None of the options
Answer: A
81. Which of the following layer is an end-to-end layer ?
(A) Data Link
Layer
(B) Transport
Layer
(C) Network
Layer
(D) Physical
Layer
Answer: B
82. Routers operate at which layer ?
(A) Network
(B) Physical
(C)
Data Link
(D)
Transport
Answer: A
83. Flow Control is performed at which of the following layer ?
(A) Network
(B) Physical
(C) Data Link
(D) None of the options
Answer: D (Transport Layer =>True)
84. <a> tag in HTML is used for creating
(A) List
(B) Links
(C) Address
(D) None of the options
Answer: B
85. Which topology is used by FDDI ?
(A) Bus
Topology
(B) Ring
Topology
(C) Dual Ring
Topology
(D) Mesh Topology
Answer: C
86. Which of the following is/are special address ?
(A) 0.0.0.0
(B) 127.0.0.1
(C)
127.[anything]
(D) All of the options
Answer: D
87. Connection oriented services at network layer in OSI model is called
(A) Datagram subnet
(B) Virtual
circuit
(C) Packet
switching
(D) None of the options
Answer: C
88. ISDN PRI has how many channels ?
(A) 22B+1D
(B) 23B +1D
(C) 24B+1D
(D) 25B+1D
Answer: B
89. The size of an ATM Cell is
(A) 51 octets
(B) 53 octets
(C) 55 octets
(D) None of the options
Answer: B
90. Which is the first Internet search engine?
(A) Google
(B) Archie
(C) Altavista
(D) WAIS
Answer: B
91. Who is making the Web standards?
(A) Mozilla
(B) Microsoft
(C) The World
Wide Web Consortium
(D) NVDIA
Answer: C
92. To set up the window to capture all Click events, we use which
of the following Statement?
(A)
window.captureEvents (Event.CLICK);
(B)
window.handleEvents (Event.CLICK);
(C)
window.routeEvents (Event.CLICK );
(D)
window.raiseEvents (Event.CLICK );
Answer: A
93. If you want to align text to the right side of an block element
in a cascading style sheet (CSS) then which of the following property would you
use?
(A) Right
align
(B) Justify
(C)
Left align
(D)
Text align
Answer: D
94. Routers operate at which layer
(A) Network
(B) Physical
(C) Data Link
(D) Transport
Answer: A
95. Data communication system spanning states, countries, or the
whole world is
(A) LAN
(B) WAN
(C) MAN
(D) None of the above
Answer: B
96. Expand WAN
(A) World area
network
(B) Wide area
network
(C) Web area
network
(D) None of the above
Answer: B
97. In TDM, slots are further divided into
(A) Seconds
(B) Frames
(C) Packets
(D) None of the above
Answer: B
98. Flow Control is performed at which of the following
layer
(A) Network
(B) Physical
(C) Data Link
(D) None of the above
Answer: D
99. In the layer hierarchy as the data packet moves from the upper
to the lower layers, headers are
(A) Added
(B) Removed
(C) Rearranged
(D) Modified
Answer: A
100. The transport layer protocols is
A) UDP
B) PPX
C) TCP
D) ALP
Answer: C
101. Which of the following
protocol is used by electronic mail?
A) telnet
B) ftp
C) smtp
D) rdp
Answer: C
102. Which of the following
is suitable for networking in a building?
A) WAN
B) LAN
C) MAN
D) BAN
Answer: B
103. Which of the following is not a search engine?
A) Google
B) Yahoo
C) Twitter
D) AltaVista
Answer: C
104. A Cookie is
A) An
advertisement displayed on a web page
B) A program
that records web site visits
C) Information
stored by web server on client system
D) A technology to store password on client
system
Answer: C
105. Extension of VRML files is
A) .vml
B) .vrm
C) .wrm
D) .wrl
Answer: D
106. An applet is a
A) picture
displayed on the web page
B) program
that can be embedded in another application
C) tag in HTML
program
D) compiler
Answer: B
107. SSL is a
A) Scripting
language
B) Browser
C) Secure
connection
D) Authoring
tool
Answer: C
108. The right to copy can be granted by
A) Court
B) Government
C) Company
D) Owner
Answer: D
109. What is the default scripting language in ASP?
A) JavaScript
B) Perl
C) EcmaScript
D) VBScript
Answer: D
110. E-mail message can be
protected by
A) Encryption
B) Caching
C) Mirroring
D) Shadowing
Answer: A
111. IP address of a packet
is normally analysed by
A) CPU
B) Router
C) Modem
D) Hub
Answer: B
112. MIME stands for:
A) Multipoint
Internet Mail Extensions
B) Multimedia
Interface Mail Extensions
C) Multipoint
Mail Extensions
D)
Multipurpose Internet Mail Extensions
Answer: D
113. Which connector is used
mostly with STP?
A) BNC
B) RJ-11
C) RJ-45
D) RJ-69
Answer: C
114. Which of the following cable media is not affected by
electromagnetic interference (EMI)?
A) Fibre optic
B) Co-axial
Cable
C) Shielded
Twisted Pair Cable (STP)
D) Unshielded
Twisted Pair Cable (UTP)
Answer: A
115. WebCrawler has a web robot called
A) Crawler
Robot
B) Crawl bot
C) Web bot
D) Web robot
Answer: C
116. A modem is not needed when accessing the internet through
A) Wi-Fi
B) LAN
C) Cable
D) None of the
above
Answer: B
117. WAN stands for
A) Wire
Accessible Network
B) Widely
Accessible Network
C) Wide Area
Network
D) Wire and
Network
Answer: C
118. Which tag is a container?
A)
<body>
B) <br>
C) <hr>
D) <td>
Answer: A
119. Which of the following is used to send or receive files between
two computers?
A) SLIP
B) URL
C) Internet Explorer
D) FTP
Answer: D
120. On the Internet which version of Internet Protocol is most
widely used
A) IPv1
B) IPv3
C) IPv4
D) IPv6
Answer: C
121. A web publishing tool
developed by Microsoft is
A) Netscape
Navigator
B) Front Page
C) Hot Metal
D) Page Mill
Answer: B
122. What is a Cookie?
A) Computer
Code used to show animation and play sound.
B) Information
sent to the computer that is used later to give information back to a visited
web site.
C) An
advertisement that will at sometime be displayed on your screen.
D) Computer
code that automatically records all purchases and payments, you make from your computer.
Answer: B
123. SMTP is associated with
A) TCP/IP
B) Electronic
Mail
C) Internet
Explorer
D) www
Answer: B
124. Secure Socket Layer
(SSL), a protocol developed by
(A) IETF
(B) APPLE
(C) Netscape
(D) HP
Answer: C
125. Which of the following is best suited for networking in a
building?
A) WAN
B) MAN
C) LAN
D) SAN
Answer: C
126. The pieces of
information that are sent over internet is
A) Cookies
B) Tags
C) Packets
D) Components
Answer: C
127. Which of the following
is NOT a valid image format?
A)
tiff
B) gif
C) jpeg
D) mpeg
Answer: D
128. Which type of physical
cable has fastest transmission speed?
A)
Twisted-wire Pairs
B) Co-axial
Cable
C) Fiber Optic
Cable
D) Micro-Wave
Answer: C
129. An applet is a
A) picture
displayed on a web page.
B) program
that can be embedded in another application.
C) tag is HTML
program.
D) security Protocol.
Answer: B
130. What is Internet?
A)
A Single Network
B)
A vast collection of different networks
C)
Interconnection of Local Area Networks
D)
None of the above
Answer: B
131. IPv6 address have a size
of
A)
32 bits
B)
64 bits
C)
128 bits
D)
256 bits
Answer: C
132. This protocol is used to transfer mail among mail servers
A)
HTTP
B)
SMTP
C)
FTP
D)
TELNET
Answer: B
133. Online Publishing means
A)
Creating and uploading web pages on web server
B)
Selling online books on web server
C)
Printing online books on web server
D)
Creating online books on web server
Answer: A
134. How can you open a link
in its own unique new window?
A)
TARGET=”_NEW_WINDOW”
B)
TARGET=”NEW”
C)
TARGET=”_BLANK”
D) TARGET=”_NEW”
Answer: C
135. Which protocol encrypts data between web server and browser?
A)
SIP
B)
HTTPS
C)
HTML
D)
SMTP
Answer: B
136. Which tcp port is used
by a web server, in general?
A)
21
B)
80
C)
25
D)
23
Answer: B
137. Which is not a valid
extension for HTML files?
A)
.htm
B)
.phtml
C)
.xml
D)
.shtml
Answer: C
138. Google service is an
example of
A)
a DNS server
B)
a database server
C)
a portal
D)
a search engine
Answer: D
139. What is a web crawler?
A)
A computer virus
B)
A browser
C)
A program that index web sites
D) A hacker community who hacks
web sites
Answer: C
140. What is World Wide Web?
A) A computer
game
B) A software
program
C) Another
name for the Internet
D) The part of
the Internet that enables information sharing
Answer: D
141. Which of the following protocol is used by remote login?
A) telnet
B) ftp
C) smtp
D) ntp
Answer: A
142. What is a spider?
A) A computer
virus
B) A program
that catalogs Web sites
C) A hacker
who breaks into computer systems
D) An
application for viewing web pages
Answer: B
143. Which of the following is a search engine?
A) Twitter
B) Facebook
C) myspace
D) google
Answer: D
144. What is a good way to
protect sensitive information sent via e-mail?
A) Write it in
another language
B) Keep the
message in attachment
C) Encrypt the
message
D) Send as a blind copy
Answer: C
145. What is the HTML element to bold a text?
A) <b>
B)
<bold>
C)
<wide>
D) <big>
Answer: A
146. Which of the following
is NOT considered to be malware?
A) viruses
B) spyware
C) worm
D) Human Ware
Answer: D
147. https is a
A) Scripting
language
B) Browser
C) Secure
connection
D) Authoring
tool
Answer: C
148. Which layer in
TCP/IP protocol deals with port addresses?
A) Data
link layer
B) Physical
Layer
C) Transport
Layer
D) Network
Layer
Answer: C
149. Switch is a
A ) Broadcast device
B)Unicast device
C) Multicast device
D) None of
the above
Answer: B
150. FTP is
A) Server
side encryption protocol
B) Control
connection to remote computer to transfer files
C) User
Datagram Protocol.
D)
Authorization of a user through login and password verification.
Answer: B
151. Client-side extensions:
A) Add
functionality to the script running on Server.
B) Add
functionality to the script running on user Computer.
C) Add
functionality to the script running on network devices
D)
Add functionality to the script running on firewall devices.
Answer: B
152. To join on the Internet, the computer has to be connected
through the
A) Internet
architecture board
B) Internet
society
C) Internet
service provider
D)
none of the mentioned
Answer: C
153. Which protocol assigns IP address to the client connected in the
Internet?
A) DHCP
B) IP
C) TCP
D)
Telnet
Answer: A
154. IRC stands for
A) Internet
Related Chat
B) Internet
Relay Chat
C) Internet
Related Content
D)
Internet Reliable Content
Answer: B
155. Computer network is
A) Collection
of hardware components and computers
B) Interconnected
by communication channel
C) Sharing
of resources and information
D) All of
the above
Answer: D
156. Integrated Services for Digital Network (ISDN) is a set of
communication standards for simultaneous digital transmission of:
A) voice
B) video
C) data
D)
All of the above
Answer: D
157. How to define hyperlink to open in New Page in HTML
A) <a
href=”http://www.oklesson.blogspot.com” target=”Blank”>Click Here</a>
B) <a
href=”http://www.oklesson.blogspot.com” target=”_Blank”>Click Here</a>
C) <a
href=”http://www.oklesson.blogspot.com” target=”#Blank”>Click Here</a>
D)
<a href=”http://www.oklesson.blogspot.com” target=”New”>Click
Here</a>
Answer: B
158. What is the use of bridge in network ?
A.
To connect
LANs
B.
To separate
LANs
C.
To control
Network speed
D.
All of the
above
Answer: A
159. A firewall is installed at the point where the secure internal
network and un-trusted external network meet which point is known as
A) Choke
point
B) Meeting
point
C) Firewall
point
D)
Secure point
Answer: A
160. IPv6 addressed have a size of
A) 32 bits
B) 64 bits
C) 128 bits
D) 256 bits
Answer: C
161. TCP/IP is a ______ hierarchical protocol suite developed before
the OSI model.
A) 7-layers
B) 5-layers
C) 4-layers
D) 3-layers
Answer: C
162. Provides a connection oriented reliable service for sending
messages
A) TCP
B) IP
C) UDP
D) All of the
above
Answer: A
163. The 4 byte IP address consists of
A) Network Address
B) Host Address
C) Both A) and B)
D) None of the above
Answer: C
Class |
Address range |
Class A |
1.0.0.1 to 126.255.255.254 |
Class B |
128.1.0.1 to 191.255.255.254 |
Class C |
192.0.1.1 to 223.255.254.254 |
Class D |
224.0.0.0 to 239.255.255.255 |
Class E |
240.0.0.0 to 254.255.255.254 |
164. The default port for SMTP is:
20, 21 |
File Transfer Protocol (FTP) |
TCP |
22 |
Secure Shell (SSH) |
TCP and UDP |
23 |
Telnet |
TCP |
25 |
Simple Mail Transfer Protocol (SMTP) |
TCP |
53 |
Domain Name System (DNS) |
TCP and UDP |
67, 68 |
Dynamic Host Configuration Protocol (DHCP) |
UDP |
69 |
Trivial File Transfer Protocol (TFTP) |
UDP |
80 |
HyperText Transfer Protocol (HTTP) |
TCP |
110 |
Post Office Protocol (POP3) |
TCP |
119 |
Network News Transport Protocol (NNTP) |
TCP |
123 |
Network Time Protocol (NTP) |
UDP |
A) 21
B) 23
C) 25
D) 80
Answer: C
165. In this topology there is a central controller or hub
A) Star
B) Mesh
C) Ring
D) Bus
Answer: A
166. A computer communication technology that provides a way to
interconnect multiple computers across
short distance is
A) LAN
B) WAN
C) MAN
D) None of the above
Answer: A
167. A webpage displays a picture. What tag was used
to display that picture?
A) picture
B) image
C) img
D) src
Answer: C
168. A proxy firewall filters at the
A) Physical layer
B) Application layer
C)
Data link layer
D)
Network layer
Answer: B
169. In the original ARPANET, _______ were directly connected
together.
A) IMPS
B) Host
Computer
C) Network
D) Routers
Answer: A
170. Switching in Internets done by using datagram approach to
packet switching at the?
A) Physical
layer
B)
Application Layer
C) Datalink
Layer
D) Network
Layer
Answer: D
171. What layer in the TCP/IP stack is equivalent to the Transport
layer of the OSI model?
A)
Application
B)
Host-to-Host
C) Internet
D) Network
Access
Answer: D
172. The computer jargon - WWWW, stands for:
A) World
Wide Wildlife Web
B) World
Wide Women's Web
C) World
Wide Web Worm
D)
World Wide Women's Week
Answer:
C
173. Which of this is not a class of IP address?
A) Class E
B) Class C
C) Class D
D) Class G
Answer: D
174. Choose the correct HTML tag for the smallest size heading?
A)
<h6>
B <h1>
C)
<heading>
D)
<header>
Answer: A
175. Which built-in method returns the length of the string?
A) size()
B) length()
C) index()
D) None of
the above
Answer: B
176. Search Engines are able to search ________ type of information?
A) Documents
B) Audio
C) Video
D) All of
the above
Answer: D
177. The term ‘Intellectual Property Rights’ covers
A)
Copyrights
B) Know-how
C) Trade
dress
D) All of
the above
Answer: D
178. Apart from <b> tag, what other tag makes text bold?
A)
<black>
B)
<strong>
C)
<bold>
D) None of
the above
Answer: B
179. The facilities available in the internet are :
(i) electronic
mail
(ii) remote
login
(iii) file
transfer
(iv) word
processing
(A) (i), (ii)
(B) (i), (ii)
and (iv)
(C) (i), (ii)
and (iii)
(D) (ii), (iii) and (iv)
Answer: C
180. A firewall may be implemented in :
(A) bridges
used in an intranet
(B) routers
which connect intranet to internet
(C) expensive
modem
(D) user’s application programs
Answer:
B
Sourrce: O level Old Paper
0 Comments
Hey, What do you think about this post