O level Internet Technology and web design

1. The main function of a browser is to

A) compile HTML

B) interpret HTML

C) de-compile HTML

D) interpret CGI programs

 

Answer: B

 

2. Spider is a________

A) a program that crawls around the web and stores pages in search engines.

B) hacking software that spreads virally

C) software that examines network vulnerabilities

D) a protocol for distributing large files

 

Answer: A

 

3.  FTP does not use

A) two transfer mode

B) control connection to remote computer before file can be transferred

C) User Datagram Protocol (UDP)

D) authorization of a user through login and password verification

 

Answer: C

 

4 ___________ is used to enable the use of active documents

A) HTML

B) CGI

C) JAVA

D) All the above

Answer: D

 

5. In <IMG SRC=”C:PICTURE/BB1.gif” ALIGN=middle> ALIGN is

A) A tag

B) The head

C) The body

D) An attribute

 

Answer: D

 

6. Web pages are uniquely defined using

A) IP addresses

B) URL

C) Domain

D) File name

 

Answer: B

 

7. Which of the following services are available on the World Wide Web?

i) Encryption

ii) HTTP

iii) HTML

iv) Firewalls

A) i) and ii)

B) ii) and iii)

C) iii) and iv)

D) i) and iv)

 

Answer: B

 

8. Internet uses

A) packet switching

B) circuit switching

C) telephone switching

D) telex switching

Answer: A

 

9. The ownership rights as related to content on the web are governed under

A) Copyright law

B) Patent law

C) Data protection law

D) Privacy law

 

Answer: A

 

10. Multipurpose Internet Mail Extension (MIME) was developed

A) to support email messages containing text and video

B) to support email messages containing text, audio and video

C) to support email messages containing audio and video

D) to support text-based email messages

Answer: B

 

11. Access control is implemented using

A) Cache

B) Firewall

C) Hyperlinks

D) JSP

 

Answer: B

 

12. Domain names are converted to

A) a binary string

B) alphanumeric string

C) IP addresses

D) a hexadecimal string

 

Answer: C

 

 

13. It is possible to display pictures in HTML specification by using the tag.

A) <GR src = Picture file>

B) <PIC src =Picture file>

C) <IMG src =Picture file>

D) <GIF src=Picture file>

 

Answer: C

 

14. Desirable properties of a website are

i) a meaningful address

ii) help and search facilities

iii) links to related sites

iv) features to allow users to give feedback

i), ii), iii)

B) i), ii), iii), iv)

C) i), ii), iii), iv), v)

D) i), ii), iii), v)

 

Answer: C

 

15. URL specifies the following:

i) protocol used

ii) domain name of server hosting web page

iii) name of folder with required information

iv) name of document formatted using HTML

v) the name of ISP

A) i), ii), iii), iv)

B) ii), iii), iv), v)

C) i), iii), iv)

D) i), ii), iii), v)

 

Answer: A

 

16. A search engine is a program to search

A) for information

B) web pages

C) web pages for specified index terms

D) web pages for information using specified search terms

 

Answer: D

 

17. XML is

A) superset of HTML

B) Extensible Markup Language

C) part of DHTML

D) presentation language

 

Answer: B

 

18. A world wide web contains web pages

A) residing in many computers

B) created using HTML

C) with links to other web pages

D) residing in many computers linked together using HTML

 

Answer: D

 

19. By an extranet we mean

A) an extra fast computer network

B) the intranets of two co-operating organizations interconnected via a secure leased line

C) an extra network used by an organization for higher reliability

D) an extra connection to internet

 

Answer: B

 

20. Plug-in is a

A) Software

B) Hardware

C) Software and hardware both used for specific purpose

D) Flash player

Answer: A

 

21. The rules with regards to conduct for Internet users is known as

A) Mosaic

B) Netiquette

C) Protocol

D) Internet Protocol

 

Answer:B

 

22. TCP/IP is

A) Abbreviation for Transmission Control Protocol and Internet Protocol

B) A suite of networking protocols

C) A standard protocol that lets disparate types of computers communicate over the Net

D) All the above

 

Answer:D

 

23. The protocol that allows a computer to use the Internet Protocol with standard voice-grade telephone line and a high-speed modem is........

A) SLIP

B) SMTP

C) SGML

D) RTF

 

Answer:A

 

24. A Spider is

A) A Computer virus

B) A Browser

C) A program that catalogs web sites

D) A hacker community

 

Answer:C

 

25. FTP does not use

A) Two transfer mode

B) Control connection to remote computer before file can be transferred

C) User Datagram Protocol

D) Authorization of a user through login and password verification

Answer:C

26.  A terminal emulation protocol that allows users to log-on to a host computer from remote computers is

A) Telnet

B) TCP/IP

C) FTP

D) Point-to-Point protocol (PPP)

 

Answer:A

 

27. Which of the following is used to enable the use of active documents?

A) HTML

B) CGI

C) JAVA

D) All of the above

 

Answer:D

28.  A networking standard developed by Xerox, Intel and DEC; capable of connecting as many as 1,024 workstations and transmitting data at a maximum speed of 10 Mbps

A) Ethernet

B) FDDI

C) File Transfer protocol

D) Gopher

 

Answer:A

 

29. The HTML tags that create a table header are

A) <head></head>

B) <ttop></ttop>

C) <th></th>

D) <td></td>

 

Answer: C

30.  Which of the following is the correct HTML for inserting background image?

A) <background img=”background.gif”>

B) <img src=”background.gif” background />

C) <a href=”background.gif”>

D) <body background=”background.gif”>

Answer: D

31.  TCP is a commonly used protocol at

A) Applications layer

B) Network layer

C) Transport Layer

D) Physical Layer

 

Answer: C

 

32. The domain name in an URL refers to the

A) protocol

B) server

C) filename

D) directory

 

Answer: B

 

33.  Cell base architecture is known as

A) LAN

B) ATM

C) FDDI

D) Client-Server

 

Answer: B

 

34. Telnet is

A) Terminal network

B) Telephone network

C) Telecommunication network

D) Terrestrial network

 

Answer: A

 

35.  A software that prevents external access to a system is termed as

A) Gateway

B) Firewall

C) Intrusion Prevention system

D) Anti-Viruses

Answer: B

36. E-mail address is

A) Vml.@india.com

B) @vrm@india.com

C) Vrm.india.com

D) vrm@india.com

Answer: D

 

37. A web publishing tool developed by Microsoft is

A) Navigator

B) Hot Metal

C) Pagemill

D) Front Page

 

Answer: D

 

38.  Which of the following cable types is generally associated with the linear bus topology

A) Unshielded twisted pair

B) Fiber Optic

C) Thin coaxial cable

D) Telephone cable

 

Answer: C

 

39. Error detection at a data link level is achieved by

A) Parity

B) Cyclic redundancy code

C) Hamming code

D) Equalization

 

Answer: B

 

40.  On Internet, which version of the Internet Protocol is the most widely used

A) Ipv1

B) IPv6

C) IPv2

D) IPv4

 

Answer: D

41. ________ are networks that connect people within a company to each other and to the company network.

A) Extranets

B) Internets

C) Bitstreams

D) Intranets

 

Answer: D

 

42. The internet model or TCP/IP reference model specifically applies to internet worked systems, and has 4 layers. The movement of data packets across a network would be managed by which layer?

A) The link layer

B) The (inter) network layer

C) The transport layer

D) The application layer        

 

Answer: A

 

43.  Which is NOT a good Web security strategy?

A) Restrict access to the Web server; keep a minimum number of ports open

B) Limit the users who can load software, edit or add files.

C) Add demo programs, so users can test system without accessing production data.

D) Remove unnecessary compilers and interpreters.

 

Answer: D

 

44.  A passive threat to computer security is

A) Malicious Intent

B) Sabotage

C) Accident Errors

D) Espionage Agents

Answer: A

 

45.  ________ are used to identify a user who returns to a Website.

A) Cookies

B) Plug-ins

C) Scripts

D) ASPs

Answer: A

46.  E-mail message can be protected by

A) Mirroring

B) Caching

C) Encryption

D) Resending

 

Answer: C

 

47.  Multipurpose Internet Mail Extension (MIME) was developed

A) to support email messages containing text, audio and video

B) to support FTP clients

C) to support telnet between two machines

D) to support text-based email messages only

 

Answer: A

 

48. The tag used in HTML to link it with other URL’s is:

A) <H>

B) <A>

C) <U>

D) <L>

 

Answer: B

 

49. HTTP stands for

A) Hyper Text Transfer Protocol

B) Hyper Tetra Transfer Protocol

C) Heavy Text Transfer Protocol

D) Huge Text Transfer Protocol

 

Answer: A

50. A reliable stream service in TCP is described as two-way transmission, free of transmission ________, with no lost or duplicate ________, and the bytes are delivered in the same

________ in which they were transmitted.

A) errors; bytes; manner

B) failure; packets; sequence

C) errors; activity; manner

D) errors; bytes; sequence

 

Answer: B

51.The memory allocation scheme subject to “external” fragmentation is

A) Segmentation (Transport Layer)

B) Swapping

C) pure demand paging

D) multiple fixed contiguous partitions

 

Answer: A

 

52.SSTF stands for

A) Shortest-Seek-time-first scheduling

B) small – small-time-first

C) simple-seek-time-first

D) small-simple-time-first scheduling

 

Answer: A

 

53. The total time to prepare a disk drive mechanism for a block of data to be read from its

A) latency

B) latency plus transmission time

C) latency plus seek time

D) latency plus seek time plus transmission time

 

Answer: C

 

54. Resolution of externally defined symbols is performed by

A) Linker

B) Loader

C) Compiler

D) Editor

 

Answer: A

 

55. The total time to prepare a disk drive mechanism for a block of data to be read from is:

A) latency

B) latency plus transmission time

C) latency plus seek time

D) latency plus seek time plus transmission time

Answer: C

56. FTP Tool is to

A) Used to transfer data/files among computers on the Internet

B) Archive data/files

C) Copy files from external sources

D) Delete file from Internet

 

Answer: A

 

57. Multi programming system is

A) A computer system that permits multiple users to run programs at same time

B) A computer system that permits run similar programs at multiple time

C) A computer system that permits multiple Programs to run at same time

D) None of the above

 

Answer: C

 

58. The circuit used to store one bit of data is known as

A) Register

B) Encoder

C) Decoder

D) Flip Flop

 

Answer: D

 

59.  ________ Command is used to manipulate TCP/IP routing table.

A) route

B) ipconfig

C) ifconfig

D) traceroute

 

Answer: A

 

60. Which of the following is related to ipconfig in Microsoft Windows?

A) Display all current TCP/IP network configuration values

B) Modify DHCP settings

C) Modify DNS settings

D) All of the above

Answer: A

61.Protocols are

A) Agreements on how communication components and DTE's are to communicate

B) Logical communication channels for transferring data

C) Physical communication channels used for transferring data

D) None of the above

 

Answer:  A

 

62. Which data communication method is used to transmit the data over a serial communication link?

A) Simplex

B) Half-duplex

C) Full duplex

D) Both B and C

 

Answer:  D

 

63. In communication satellite, multiple repeaters are known as

A) Detectors

B) Modulators

C) Stations

D) Transponders

 

Answer:  D

 

64. Error detection at the data link layer is achieved by

A) Bit stuffing

B) Cyclic redundancy codes

C) Hamming codes

D) Equalization

 

Answer:  B

 

65. What are the transmission impairments?

A) Attenuation

B) Distortion

C) Noise

D) All of the above

Answer:  D

66. The topology with highest reliability is?

A) Bus topology

B) Star topology

C) Ring Topology

D) Mesh Topology

 

Answer:   D

 

67. Baud means

A) The number of bits transmitted per unit time

B) The number of bytes transmitted per unit time

C) The rate at which the signal changes

D) None of the above

 

Answer:  C

 

68.  In OSI model cable is used in

A) Physical Layer

B) Network layer

C) Transport layer

D) Data link layer

 

Answer:  A

 

69. The TCP/IP model has

A) 7 layers

B) 3 layers

C) 4 layers

D) 5 layers

 

Answer:  C

 

70. HTML is

A) Hyper Text Markedup Language

B) Hyper Text Markup Language

C) Hyper Text Marked Language

D) Hyper Text Marking Language

Answer:  B

71. Correct HTML Tag for largest heading:

A) <head>

B) <h6>

C) <heading>

D) <h1>

Answer:   D

72. www is based on which model?

A) local-server

B) client-server

C) 3-tier

D) None of the above

Answer:  B

73. The system that translates an IP address into

an easier to remember name is the

A) Packet switching

B) DNS

C) Domain numbering system

D) None of the above

Answer:  B

74. In an email address abc@dsdu.com, dsdu is

the

A) host computer in a business with the name dsdu

B) host computer in a commercial domain

C) client computer in a commercial business

D) client computer in a commercial domain

Answer:  B

75. The way in which information is transmitted to multiple internet connected devices is called....

A) Internet connectivity

B) IP address

C) multicasting

D) multitasking

Answer:   C

76. What protocol does PPP use to identify the Network layer protocol?

A) NCP

B) ISDN

C) LCP

D) HDLC

Answer:  A

77. How many broadcast domains are created when you segment a network with a 12-port switch?

A) 1

B) 2

C) 5

D) 12

Answer:  A

78. Which class of IP address has the most host addresses available by default?

A) A

B) B

C) C

D) None of the above

Answer:  A

79. Physical addresses will change from

A) Point-to-point

B) hop to hop

C) sender to receiver

D) frame to frame

Answer:  B

80. ARPANET stands for

(A) Advanced Research Projects Agency Network

(B) Advance Research Project Agency Network

(C) Asymmetric Routing Project Advance Network

(D) None of the options

Answer:  A

81. Which of the following layer is an end-to-end layer ?

(A) Data Link Layer

(B) Transport Layer

(C) Network Layer

(D) Physical Layer

 

Answer:  B

 

82. Routers operate at which layer ?

(A) Network

(B) Physical

(C) Data Link

(D) Transport

 

Answer:  A

83. Flow Control is performed at which of the following layer ?

(A) Network

(B) Physical

(C) Data Link

(D) None of the options

Answer:  D (Transport Layer =>True)

84. <a> tag in HTML is used for creating

(A) List

(B) Links

(C) Address

(D) None of the options

Answer:  B

85. Which topology is used by FDDI ?

(A) Bus Topology

(B) Ring Topology

(C) Dual Ring Topology

(D) Mesh Topology

Answer:   C

86. Which of the following is/are special address ?

(A) 0.0.0.0

(B) 127.0.0.1

(C) 127.[anything]

(D) All of the options

Answer:  D

87. Connection oriented services at network layer in OSI model is called

(A) Datagram subnet

(B) Virtual circuit

(C) Packet switching

(D) None of the options

Answer:  C

88. ISDN PRI has how many channels ?

(A) 22B+1D

(B) 23B +1D

(C) 24B+1D

(D) 25B+1D

Answer:  B

89. The size of an ATM Cell is

(A) 51 octets

(B) 53 octets

(C) 55 octets

(D) None of the options

Answer:  B

90. Which is the first Internet search engine?

(A) Google

(B) Archie

(C) Altavista

(D) WAIS

Answer:  B

91. Who is making the Web standards?

(A) Mozilla

(B) Microsoft

(C) The World Wide Web Consortium

(D) NVDIA

Answer:  C

92. To set up the window to capture all Click events, we use which of the following Statement?

(A) window.captureEvents (Event.CLICK);

(B) window.handleEvents (Event.CLICK);

(C) window.routeEvents (Event.CLICK );

(D) window.raiseEvents (Event.CLICK );

 

Answer:  A

 

93. If you want to align text to the right side of an block element in a cascading style sheet (CSS) then which of the following property would you use?

(A) Right align

(B) Justify

(C) Left align

(D) Text align

 

Answer:  D

 

94. Routers operate at which layer

(A) Network

(B) Physical

(C) Data Link

(D) Transport

 

Answer:  A

 

95. Data communication system spanning states, countries, or the whole world is

(A) LAN

(B) WAN

(C) MAN

(D) None of the above

Answer:  B

96. Expand WAN

(A) World area network

(B) Wide area network

(C) Web area network

(D) None of the above

Answer:   B

97. In TDM, slots are further divided into

(A) Seconds

(B) Frames

(C) Packets

(D) None of the above

 

Answer:  B

 

98. Flow Control is performed at which of the following layer

(A) Network

(B) Physical

(C) Data Link

(D) None of the above

 

Answer:  D

 

99. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are

(A) Added

(B) Removed

(C) Rearranged

(D) Modified

Answer:  A

100. The transport layer protocols is

A) UDP

B) PPX

C) TCP

D) ALP

 

Answer:  C

 

101.  Which of the following protocol is used by electronic mail?

A) telnet

B) ftp

C) smtp

D) rdp

 

Answer:  C

 

102.  Which of the following is suitable for networking in a building?

A) WAN

B) LAN

C) MAN

D) BAN

 

Answer:  B

 

103. Which of the following is not a search engine?

A) Google

B) Yahoo

C) Twitter

D) AltaVista

 

Answer:  C

 

104.  A Cookie is

A) An advertisement displayed on a web page

B) A program that records web site visits

C) Information stored by web server on client system

D) A technology to store password on client system

Answer:  C

105. Extension of VRML files is

A) .vml

B) .vrm

C) .wrm

D) .wrl

 

Answer:  D

 

106.  An applet is a

A) picture displayed on the web page

B) program that can be embedded in another application

C) tag in HTML program

D) compiler

 

Answer:  B

 

107.  SSL is a

A) Scripting language

B) Browser

C) Secure connection

D) Authoring tool

 

Answer:  C

 

108. The right to copy can be granted by

A) Court

B) Government

C) Company

D) Owner

 

Answer:  D

 

109. What is the default scripting language in ASP?

A) JavaScript

B) Perl

C) EcmaScript

D) VBScript

 

Answer:  D

 

110.  E-mail message can be protected by

A) Encryption

B) Caching

C) Mirroring

D) Shadowing

 

Answer:  A

 

111.  IP address of a packet is normally analysed by

A) CPU

B) Router

C) Modem

D) Hub

 

Answer:  B

 

112.  MIME stands for:

A) Multipoint Internet Mail Extensions

B) Multimedia Interface Mail Extensions

C) Multipoint Mail Extensions

D) Multipurpose Internet Mail Extensions

 

Answer:  D

 

113.  Which connector is used mostly with STP?

A) BNC

B) RJ-11

C) RJ-45

D) RJ-69

Answer:  C

 

114. Which of the following cable media is not affected by electromagnetic interference (EMI)?

A) Fibre optic

B) Co-axial Cable

C) Shielded Twisted Pair Cable (STP)

D) Unshielded Twisted Pair Cable (UTP)

 

Answer:  A

 

115. WebCrawler has a web robot called

A) Crawler Robot

B) Crawl bot

C) Web bot

D) Web robot

Answer:  C

116. A modem is not needed when accessing the internet through

A) Wi-Fi

B) LAN

C) Cable

D) None of the above

 

Answer:  B

 

117.  WAN stands for

A) Wire Accessible Network

B) Widely Accessible Network

C) Wide Area Network

D) Wire and Network

 

Answer:  C

 

118. Which tag is a container?

A) <body>

B) <br>

C) <hr>

D) <td>

 

Answer:  A

 

119. Which of the following is used to send or receive files between two computers?

A) SLIP

B) URL

C) Internet Explorer

D) FTP

Answer:  D

120. On the Internet which version of Internet Protocol is most widely used

A) IPv1

B) IPv3

C) IPv4

D) IPv6

 

Answer:  C

 

121.  A web publishing tool developed by Microsoft is

A) Netscape Navigator

B) Front Page

C) Hot Metal

D) Page Mill

 

Answer:  B

 

122.  What is a Cookie?

A) Computer Code used to show animation and play sound.

B) Information sent to the computer that is used later to give information back to a visited web site.

C) An advertisement that will at sometime be displayed on your screen.

D) Computer code that automatically records all purchases and payments, you make from your computer.

 

Answer:  B

 

123.  SMTP is associated with

A) TCP/IP

B) Electronic Mail

C) Internet Explorer

D) www

 

Answer:  B

 

124.  Secure Socket Layer (SSL), a protocol developed by

(A) IETF

(B) APPLE

(C) Netscape

(D) HP

Answer:  C

125. Which of the following is best suited for networking in a building?

A) WAN

B) MAN

C) LAN

D) SAN

 

Answer:  C

 

126.  The pieces of information that are sent over internet is

A) Cookies

B) Tags

C) Packets

D) Components

 

Answer:  C

 

127.  Which of the following is NOT a valid image format?

A) tiff      

B) gif

C) jpeg

D) mpeg

 

Answer:  D

 

128.  Which type of physical cable has fastest transmission speed?

A) Twisted-wire Pairs

B) Co-axial Cable

C) Fiber Optic Cable

D) Micro-Wave

 

Answer:  C

 

129.  An applet is a

A) picture displayed on a web page.

B) program that can be embedded in another application.

C) tag is HTML program.

D) security Protocol.

Answer:  B

130. What is Internet?

A) A Single Network

B) A vast collection of different networks

C) Interconnection of Local Area Networks

D) None of the above

Answer:  B

 

131.  IPv6 address have a size of

A) 32 bits

B) 64 bits

C) 128 bits

D) 256 bits

 

Answer:  C

 

132. This protocol is used to transfer mail among mail servers

A) HTTP

B) SMTP

C) FTP

D) TELNET

 

Answer:  B

 

133. Online Publishing means

A) Creating and uploading web pages on web server

B) Selling online books on web server

C) Printing online books on web server

D) Creating online books on web server

 

Answer:  A

 

134.  How can you open a link in its own unique new window?

A) TARGET=”_NEW_WINDOW”

B) TARGET=”NEW”

C) TARGET=”_BLANK”

D) TARGET=”_NEW”

Answer:  C

135. Which protocol encrypts data between web server and browser?

A) SIP

B) HTTPS

C) HTML

D) SMTP

 

Answer:  B

 

136.  Which tcp port is used by a web server, in general?

A) 21

B) 80

C) 25

D) 23

 

Answer:  B

 

137.  Which is not a valid extension for HTML files?

A) .htm

B) .phtml

C) .xml

D) .shtml

 

Answer:  C

 

138.  Google service is an example of

A) a DNS server

B) a database server

C) a portal

D) a search engine

 

Answer:  D

 

139.  What is a web crawler?

A) A computer virus

B) A browser

C) A program that index web sites

D) A hacker community who hacks web sites

Answer:  C

140. What is World Wide Web?

A) A computer game

B) A software program

C) Another name for the Internet

D) The part of the Internet that enables information sharing

 

Answer:  D

 

141. Which of the following protocol is used by remote login?

A) telnet

B) ftp

C) smtp

D) ntp

 

Answer:  A

 

142.  What is a spider?

A) A computer virus

B) A program that catalogs Web sites

C) A hacker who breaks into computer systems

D) An application for viewing web pages

 

Answer:  B

 

143. Which of the following is a search engine?

A) Twitter

B) Facebook

C) myspace

D) google

 

Answer:  D

 

144.  What is a good way to protect sensitive information sent via e-mail?

A) Write it in another language

B) Keep the message in attachment

C) Encrypt the message

D) Send as a blind copy

Answer:  C

145. What is the HTML element to bold a text?

A) <b>

B) <bold>

C) <wide>

D) <big>

 

Answer:  A

 

146.  Which of the following is NOT considered to be malware?

A) viruses

B) spyware

C) worm

D) Human Ware

 

Answer: D

 

147. https is a

A) Scripting language

B) Browser

C) Secure connection

D) Authoring tool

 

Answer: C

 

148. Which layer in TCP/IP protocol deals with port addresses?

A) Data link layer

B) Physical Layer

C) Transport Layer

D) Network Layer

 

Answer:  C

 

149.  Switch is a 

A ) Broadcast device

B)Unicast device

C)  Multicast device

D) None of the above

 

Answer:  B

 

150. FTP is

A) Server side encryption protocol

B) Control connection to remote computer to transfer files

C) User Datagram Protocol.

D) Authorization of a user through login and password verification.

Answer:  B

151. Client-side extensions:

A) Add functionality to the script running on Server.

B) Add functionality to the script running on user Computer.

C) Add functionality to the script running on network devices

D) Add functionality to the script running on firewall devices.

Answer:  B

152. To join on the Internet, the computer has to be connected through the

A) Internet architecture board

B) Internet society

C) Internet service provider

D) none of the mentioned

Answer:  C

153. Which protocol assigns IP address to the client connected in the Internet?

A) DHCP

B) IP

C) TCP

D) Telnet

Answer:  A

154. IRC stands for

A) Internet Related Chat

B) Internet Relay Chat

C) Internet Related Content

D) Internet Reliable Content

Answer:  B

155. Computer network is

A) Collection of hardware components and computers

B) Interconnected by communication channel

C) Sharing of resources and information

D) All of the above

 

Answer:  D

 

156. Integrated Services for Digital Network (ISDN) is a set of communication standards for simultaneous digital  transmission of:

A) voice

B) video

C) data

D) All of the above

Answer:  D

157. How to define hyperlink to open in New Page in HTML

A) <a href=”http://www.oklesson.blogspot.com” target=”Blank”>Click Here</a>

B) <a href=”http://www.oklesson.blogspot.com” target=”_Blank”>Click Here</a>

C) <a href=”http://www.oklesson.blogspot.com” target=”#Blank”>Click Here</a>

D) <a href=”http://www.oklesson.blogspot.com” target=”New”>Click Here</a>

Answer:  B

158. What is the use of bridge in network ?

A.  To connect LANs

B.  To separate LANs

C.   To control Network speed

D.  All of the above

 

Answer:  A

 

159. A firewall is installed at the point where the secure internal network and un-trusted external network meet which point is known as

A) Choke point

B) Meeting point

C) Firewall point

D) Secure point

Answer:  A

160. IPv6 addressed have a size of

A) 32 bits

B) 64 bits

C) 128 bits

D) 256 bits

 

Answer:  C

 

161. TCP/IP is a ______ hierarchical protocol suite developed before the OSI model.

A) 7-layers

B) 5-layers

C) 4-layers

D) 3-layers

 

Answer:  C

 

162. Provides a connection oriented reliable service for sending messages

A)  TCP

B) IP

C) UDP

D) All of the above

 

Answer:  A

 

163. The 4 byte IP address consists of

A) Network Address

B) Host Address

C) Both A) and B)

D) None of the above

 

Answer:  C

 

Class

Address range

Class A

1.0.0.1 to 126.255.255.254

Class B

128.1.0.1 to 191.255.255.254

Class C

192.0.1.1 to 223.255.254.254

Class D

224.0.0.0 to 239.255.255.255

Class E

240.0.0.0 to 254.255.255.254

 

164. The default port for SMTP is:

20, 21

File Transfer Protocol (FTP)

TCP

22

Secure Shell (SSH)

TCP and UDP

23

Telnet

TCP

25

Simple Mail Transfer Protocol (SMTP)

TCP

53

Domain Name System (DNS)

TCP and UDP

67, 68

Dynamic Host Configuration Protocol (DHCP)

UDP

69

Trivial File Transfer Protocol (TFTP)

UDP

80

HyperText Transfer Protocol (HTTP)

TCP

110

Post Office Protocol (POP3)

TCP

119

Network News Transport Protocol (NNTP)

TCP

123

Network Time Protocol (NTP)

UDP

A) 21

B) 23

C) 25

D) 80

 

Answer:  C

 

 

165. In this topology there is a central controller or hub

A) Star

B) Mesh

C) Ring

D) Bus

 

Answer:  A

 

166. A computer communication technology that provides a way to interconnect multiple computers  across short distance is

A) LAN

B) WAN

C) MAN

D) None of the above

 

Answer:  A

167. A webpage displays a picture. What tag was used

to display that picture?

A) picture

B) image

C) img

D) src

 

Answer:  C

168. A proxy firewall filters at the

A) Physical layer

B) Application layer

C) Data link layer

D) Network layer

 

Answer:  B

 

169. In the original ARPANET, _______ were directly connected together.

A) IMPS

B) Host Computer

C) Network

D) Routers

 

Answer: A

 

170. Switching in Internets done by using datagram approach to packet switching at the?

A) Physical layer

B) Application Layer

C) Datalink Layer

D) Network Layer

 

Answer: D

 

171. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

A) Application

B) Host-to-Host

C) Internet

D) Network Access

 

Answer: D

172. The computer jargon - WWWW, stands for:

A) World Wide Wildlife Web

B) World Wide Women's Web

C) World Wide Web Worm

D) World Wide Women's Week

Answer: C

173. Which of this is not a class of IP address?

A) Class E

B) Class C

C) Class D

D) Class G

 

Answer: D

 

174. Choose the correct HTML tag for the smallest size heading?

A) <h6>

B <h1>

C) <heading>

D) <header>

 

Answer: A

 

175. Which built-in method returns the length of the string?

A) size()

B) length()

C) index()

D) None of the above

 

Answer: B

 

176. Search Engines are able to search ________ type of information?

A) Documents

B) Audio

C) Video

D) All of the above

 

Answer: D

 

177. The term ‘Intellectual Property Rights’ covers

A) Copyrights

B) Know-how

C) Trade dress       

D) All of the above

 

Answer: D

 

178. Apart from <b> tag, what other tag makes text bold?

A) <black>

B) <strong>

C) <bold>

D) None of the above

 

Answer: B

 

 

179. The facilities available in the internet are :

(i) electronic mail

(ii) remote login

(iii) file transfer

(iv) word processing

(A) (i), (ii)

(B) (i), (ii) and (iv)

(C) (i), (ii) and (iii)

(D) (ii), (iii) and (iv)

Answer: C

 

180. A firewall may be implemented in :

(A) bridges used in an intranet

(B) routers which connect intranet to internet

(C) expensive modem

(D) user’s application programs

Answer: B  

Sourrce: O level Old Paper