Basic Computer Internet (Basic Computer Awareness ) MCQ's




Question 31 :
A word in a web page that, when clicked, opens another document is called ?


  1. hyperlink
  2. anchor
  3. reference
  4. URL
  

Question 32 :
When we run a program in HTML coding, _ is used as backend and __works as frontend.


  1. Notepad - Msn-messenger
  2. Notepad-1 nternet Ex-plorer
  3. MS-word - Internet -Explorer
  4. Both (1) and (2)
  

Question 33 :
HTML stands for


  1. Hyper Text Markup Lan - guage
  2. Hyper Text Making Links
  3. Higher Textual Marking of Links
  4. Hyper Text Mixer of Links
  

Question 34 :
XSL definition is used along with XML definition to specify


  1. The data types of the contents of XML document
  2. The links with other documents
  3. The presentation of XML document
  4. The juncture of XML document
  

Question 35 :
What is the most common way to get a virus in your computer's hard disk ?


  1. By installing games from their CDROMS
  2. By uploading pictures from mobile phones to the computer
  3. By sending e-mails
  4. By opening e-mails
  

Question 36 :
The difference between people with access to computers and the Internet and those without this access is known as the:


  1. Internet divide.
  2. digital divide.
  3. Web divide.
  4. broadband divide.
  

Question 37 :
DTD definition is used along with XML to specify


  1. The presentation of XML document
  2. The links with other documents
  3. The structure of XML document
  4. The data types of the con-
  

Question 38 :
A Web site address is a unique name that identifies a specific _ on the Web.


  1. Web browser
  2. PDA
  3. Link
  4. Web site
  

Question 39 :
IP addresses are converted to


  1. a binary string
  2. a hierarchy of domain names
  3. alphanumeric string
  4. a hexadecimal string
  

Question 40 :
If you receive an e-mail from someone you don't know, what should you do?


  1. Delete it without opening it
  2. Forward it to the police immediately
  3. Open it and respond to them saying you don't know them
  4. Reply and ask them for their personal information
  

Question 41 :
Internet uses


  1. Telex switching
  2. Circuit switching
  3. Telephone switching
  4. Packet switching
  

Question 42 :
All of the following are examples of real security and privacy risks EXCEPT:


  1. hackers.
  2. identity theft.
  3. viruses.
  4. spam.
  

Question 43 :
Choose the web-browser among the following:


  1. MSN messenger
  2. Yahoo messenger
  3. Rediffbal. net
  4. Netscape Navigator
  

Question 44 :
When sending an e-mail, the _ line describes the contents of the message.


  1. to
  2. None of these
  3. contents
  4. subject
  

Question 45 :
The Internet allows you to ?


  1. send electronic mail
  2. view Web pages
  3. connect to servers 'all around the world
  4. All of the above
  

Question 46 :
Internet is


  1. a local computer network
  2. a world wide network of computers
  3. a world wide interconnected network of computers
  4. an interconnected network of computers
  

Question 47 :
The advantages of XML over HTML are (i). It allows processing of data slored in web pages (ii) It uses meaningful tags which aids in understanding the nature of a document (iii) Is simpler than HTML (iv) It separates presentation and structure of document


  1. (i),(ii)and(iy)
  2. (i),(ii),(iii)
  3. (ii).(iii) and (iv)
  4. (i).(iii) and (iv)
  

Question 48 :
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_


  1. version
  2. tutorial
  3. patch
  4. FAQ
  

Question 49 :
A world wide web contains web pages


  1. presiding in many computers
  2. created using HTML
  3. residing in many computers linked together using HTML
  4. with links to other web pages
  

Question 50 :
A commonly used graphic format for the web is


  1. Imp
  2. bmp
  3. text
  4. GIF
  

Question 51 :
One advantage of dial-up Internet access is


  1. it utilizes broadband technology
  2. None of these
  3. it uses a router for security
  4. it utilizes existing telephone service
  

Question 52 :
A search engine is a program to search


  1. for information
  2. web pages
  3. web pages for Information using specified search terms
  4. web pages for specified in-dex terms
  

Question 53 :
XLL definition is used along with XML to specify


  1. The data types of the contents of XML document.
  2. The links with other documents
  3. The presentation of XML document
  4. The structure of XML document
  

Question 54 :
Among services available on the World Wide Web are (i) Encryption (ii) HTTP (iii) HTML (iv) Firewalls


  1. ii and iii
  2. I and ii
  3. iii and iv
  4. I and iv
  

Question 55 :
HTML tags define


  1. The data types of elements of document
  2. The contents of the document
  3. Presentation of specified elements of a document
  4. The structure of the document
  

Question 56 :
In order to interpret XML documents one should


  1. Use standardized tags
  2. Specify tag filename
  3. Define the tags separately
  4. Have a document type definition which defines the tags
  

Question 57 :
When the pointer is positioned on a ??, it is shaped like a hand.


  1. hyperlink
  2. grammar error
  3. screen tip
  4. spelling error
  

Question 58 :
Tunk e-mail is also called?


  1. spoof
  2. spam
  3. sniffer script
  4. spool
  

Question 59 :
Desirable properties of a website are (i) a meaningful address (ii) Help and search facilities (iii) Links to related sites (iv) Features to allow users to give feedback (v) Hosting on a mainframe


  1. i, ii, iii
  2. i, ii, iii, iv, v
  3. i, ii, iii, iv
  4. i, ii, iii, v
  

Question 60 :
By an intranet we mean


  1. a network connecting al! computers of an organi-ation and using the internet protocol
  2. a Wide Area Network connecting all branches of an organization
  3. a corporate computer net work
  4. a LAN of an organization
  
Pages