Question 31 :
A word in a web page that, when clicked, opens another document is called ?
- hyperlink
- anchor
- reference
- URL
Question 32 :
When we run a program in HTML coding, _ is used as backend and __works as frontend.
- Notepad - Msn-messenger
- Notepad-1 nternet Ex-plorer
- MS-word - Internet -Explorer
- Both (1) and (2)
Question 33 :
HTML stands for
- Hyper Text Markup Lan - guage
- Hyper Text Making Links
- Higher Textual Marking of Links
- Hyper Text Mixer of Links
Question 34 :
XSL definition is used along with XML definition to specify
- The data types of the contents of XML document
- The links with other documents
- The presentation of XML document
- The juncture of XML document
Question 35 :
What is the most common way to get a virus in your computer's hard disk ?
- By installing games from their CDROMS
- By uploading pictures from mobile phones to the computer
- By sending e-mails
- By opening e-mails
Question 36 :
The difference between people with access to computers and the Internet and those without this access is known as the:
- Internet divide.
- digital divide.
- Web divide.
- broadband divide.
Question 37 :
DTD definition is used along with XML to specify
- The presentation of XML document
- The links with other documents
- The structure of XML document
- The data types of the con-
Question 38 :
A Web site address is a unique name that identifies a specific _ on the Web.
- Web browser
- PDA
- Link
- Web site
Question 39 :
IP addresses are converted to
- a binary string
- a hierarchy of domain names
- alphanumeric string
- a hexadecimal string
Question 40 :
If you receive an e-mail from someone you don't know, what should you do?
- Delete it without opening it
- Forward it to the police immediately
- Open it and respond to them saying you don't know them
- Reply and ask them for their personal information
Question 41 :
Internet uses
- Telex switching
- Circuit switching
- Telephone switching
- Packet switching
Question 42 :
All of the following are examples of real security and privacy risks EXCEPT:
- hackers.
- identity theft.
- viruses.
- spam.
Question 43 :
Choose the web-browser among the following:
- MSN messenger
- Yahoo messenger
- Rediffbal. net
- Netscape Navigator
Question 44 :
When sending an e-mail, the _ line describes the contents of the message.
- to
- None of these
- contents
- subject
Question 45 :
The Internet allows you to ?
- send electronic mail
- view Web pages
- connect to servers 'all around the world
- All of the above
Question 46 :
Internet is
- a local computer network
- a world wide network of computers
- a world wide interconnected network of computers
- an interconnected network of computers
Question 47 :
The advantages of XML over HTML are (i). It allows processing of data slored in web pages (ii) It uses meaningful tags which aids in understanding the nature of a document (iii) Is simpler than HTML (iv) It separates presentation and structure of document
- (i),(ii)and(iy)
- (i),(ii),(iii)
- (ii).(iii) and (iv)
- (i).(iii) and (iv)
Question 48 :
A repair for a known software bug, usually available at no charge on the internet, is called a(n)_
- version
- tutorial
- patch
- FAQ
Question 49 :
A world wide web contains web pages
- presiding in many computers
- created using HTML
- residing in many computers linked together using HTML
- with links to other web pages
Question 50 :
A commonly used graphic format for the web is
- Imp
- bmp
- text
- GIF
Question 51 :
One advantage of dial-up Internet access is
- it utilizes broadband technology
- None of these
- it uses a router for security
- it utilizes existing telephone service
Question 52 :
A search engine is a program to search
- for information
- web pages
- web pages for Information using specified search terms
- web pages for specified in-dex terms
Question 53 :
XLL definition is used along with XML to specify
- The data types of the contents of XML document.
- The links with other documents
- The presentation of XML document
- The structure of XML document
Question 54 :
Among services available on the World Wide Web are (i) Encryption (ii) HTTP (iii) HTML (iv) Firewalls
- ii and iii
- I and ii
- iii and iv
- I and iv
Question 55 :
HTML tags define
- The data types of elements of document
- The contents of the document
- Presentation of specified elements of a document
- The structure of the document
Question 56 :
In order to interpret XML documents one should
- Use standardized tags
- Specify tag filename
- Define the tags separately
- Have a document type definition which defines the tags
Question 57 :
When the pointer is positioned on a ??, it is shaped like a hand.
- hyperlink
- grammar error
- screen tip
- spelling error
Question 58 :
Tunk e-mail is also called?
- spoof
- spam
- sniffer script
- spool
Question 59 :
Desirable properties of a website are (i) a meaningful address (ii) Help and search facilities (iii) Links to related sites (iv) Features to allow users to give feedback (v) Hosting on a mainframe
- i, ii, iii
- i, ii, iii, iv, v
- i, ii, iii, iv
- i, ii, iii, v
Question 60 :
By an intranet we mean
- a network connecting al! computers of an organi-ation and using the internet protocol
- a Wide Area Network connecting all branches of an organization
- a corporate computer net work
- a LAN of an organization