question_answer 1)
E-mail is an advantageous mode of communication because of __________.
A)
Simple mail management-composing, sending and receiving e-mails is very easy done
clear
B)
Quick and easy communication and confirmation medium for online shopping, travel booking, event management, auctions and connectivity with other businesses and friends done
clear
C)
Advancement of offline activities done
clear
D)
Both [A] and [B] done
clear
View Solution play_arrow
question_answer 2)
Web 1.0 is characterized mainly by ___________.
A)
Static web pages done
clear
B)
Interactive websites done
clear
C)
Blogs and Social networking done
clear
D)
Mobile sites done
clear
View Solution play_arrow
question_answer 3)
Web 3.0 is also called ______.
A)
The Semantic Web done
clear
B)
The Interwebs done
clear
C)
Wimax done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 4)
______is the extent to which a search engine indexes pages within a website.
A)
Crawl depth done
clear
B)
Search depth done
clear
C)
Crawl index done
clear
D)
Depth search done
clear
View Solution play_arrow
question_answer 5)
Social networking can be harmful or confusing if _______.
A)
You accidentally post sensitive information that will be seen by many different people done
clear
B)
You need to set numerous options to protect your privacy done
clear
C)
It becomes addictive and you tend to spend more than required time on social networks and make them an alternative for "real-life" communication done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 6)
Which of the following protocols is a standard for managing devices on IP networks such as routers, switches, servers, printers, etc?
A)
SMTP done
clear
B)
FTP done
clear
C)
SNMP done
clear
D)
IMAP done
clear
View Solution play_arrow
question_answer 7)
Which of the following is a type of blog?
A)
Video blogs or vlogs done
clear
B)
Photoblogs done
clear
C)
Microblogs done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 8)
The process of buying and selling of goods and services through wireless handheld devices is called ______.
A)
M-Commerce done
clear
B)
H-Commerce done
clear
C)
Short-commerce done
clear
D)
Metro-commerce done
clear
View Solution play_arrow
question_answer 9)
________ is a client software or a web application which combines the syndicated web content such as online newspapers, blogs, etc. in one location.
A)
News aggregator done
clear
B)
Web combiner done
clear
C)
Bulletin board systems done
clear
D)
Search engine done
clear
View Solution play_arrow
question_answer 10)
How does HTTP differ from HTML?
A)
HTTP describes what's on a web page while HTML allows sites to interact with each other. done
clear
B)
HTML describes what is on a webpage whereas HTTP allows sites to interact with each other. done
clear
C)
HTTP is a language and HTML is the syntax for that language. done
clear
D)
There is no difference between HTML and HTTP. done
clear
View Solution play_arrow
question_answer 11)
It is possible to communicate online with friends using ________.
A)
Free e-mail services like Outlook, Yahoo, etc done
clear
B)
Social networking sites like Facebook, MySpace, etc done
clear
C)
Instant Messaging softwares like WhatsApp, Skype, etc done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 12)
Which of the following terms is used for an unskilled hacker who breaks into computer system by using automated tools written by others?
A)
Script kiddie done
clear
B)
Elite cracker done
clear
C)
Grey hat done
clear
D)
Phenophyte Diddlr done
clear
View Solution play_arrow
question_answer 13)
To erase cookies, you should delete the ______ on your PC.
A)
Temporary Internet Files done
clear
B)
Web Activity folder. done
clear
C)
Drivers folder done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 14)
A ________ is a person who breaks into computer through a network without authorization with a mischievous intent.
A)
Crasher done
clear
B)
Gopher done
clear
C)
Cracker done
clear
D)
Shareware done
clear
View Solution play_arrow
question_answer 15)
Select the odd one out.
A)
Yahoo done
clear
B)
Bing done
clear
C)
Google done
clear
D)
Opera Mini done
clear
View Solution play_arrow
question_answer 16)
Identify the type of virus from the given symptoms: - It attempts to attack both the boot sector and the executable or program files at the same time. - This virus may also take different actions on an infected computer. - This type of virus spreads in multiple ways. - It may also depend on the existence of certain files on the PC.
A)
Multipartite virus done
clear
B)
Sabotage virus done
clear
C)
Web scripting virus done
clear
D)
Direct action virus done
clear
View Solution play_arrow
question_answer 17)
What is Flaming?
A)
An act of posting and sending offensive messages over the Internet. done
clear
B)
A program that contacts a remote server for instructions and then steals files or captures screen shots of the infected computer system. done
clear
C)
A program that secretly and maliciously integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 18)
Which of the following is a use of telnet service?
A)
For using computing power of a remote computer. done
clear
B)
For accessing information from a database or archive on a remote computer. done
clear
C)
For logging into one's own computer from another computer. done
clear
D)
All of these done
clear
View Solution play_arrow
question_answer 19)
To use an e-mail system, you should first ___________.
A)
Navigate and get to know e-mail window done
clear
B)
Sign up for an e-mail account with a unique user name and password done
clear
C)
Perform the tasks of composing, responding to and managing e-mail done
clear
D)
Type the recipient's email-ID in 'To' field box done
clear
View Solution play_arrow
question_answer 20)
_________is considered to be the first computer virus for MS-DOS. It was a boot-sector virus.
A)
Creeper done
clear
B)
Brain done
clear
C)
Ghostball done
clear
D)
Cascade done
clear
View Solution play_arrow