You are on page 1of 4

Topic-7.

Computer networks & Web Terminology part-1


1. Browser is a..(2013 MAY SBI PO)
a. Line that delineates the edge of a program window
b. Software program designed to
view
web page on internet
b. Tool for resizing window
c. Device used for modifying
a window e. All of these
2. Java is.(28-06-2014 SBI PO )
a. High level language
b. complex language c. hardware device d. low level language
d. middle level language
3. ------ is most important and powerfu8l computer in network (28-04-2013 SBI PO)
a. desktop
b. network client c. network server d. network station e. network switch
4. a appearing on a web page opens another document when clicked (28-04-2013 SBI PO)
a. anchor b. URL c. hyperlink d. reference e. heading
5.is written description of a program (28-06-2014 SBI PO)
a. explanatory instructions b. graphical user interface c. plug and play d. README files
e. documentation
6. Standard protocol of internet (07-03-2010 SBI PO)
a. TCP/IP b.java c. html d. flash e. None of these
7. An online discussion group that allows direct live communication is (07-08-2011 SBI PO)
a. web crawler b. chat group c. regional service provider d. Hyperlink e. e-mail
8. a connection or link to other document or web pages that contain related information is
(07-08-2011 SBI PO)
a. dial-up b. electronic commerce c. hyper link d. e-cash e. domain name
9. Computer and communication technology that communication links to internet that provide help to
understand end users (07-08-2011 SBI PO)
a. presentation file b. information technology c. program d. work sheet files e.FTP
10. Microsofts messenger allows user (07-08-2011 SBI PO)
a. bypass browser to surf the web b. create a blog c. communicate via live communication
d. identifies and eliminates spam e. make graphical presentation
11. A is a computer connected to two network's. (18-04-2010-SBI PO)
1) Link 2) server 3) gateway
4) bridge way 5) None of these
12. What is an intranet? (18-04-2010-SBI PO)
a. Internal internet used to transfer information internally b. internal internet used to transfer,
information to the Outside Company. c. Internal network designed to serve the internal
Informational needs of a single organization d. internal network designed to transfer the
information between two organizations e. None of these
13. An applet __________ (IBPS SO 2011)
(a) is an interpreted program that runs on the client (b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client (d) collects data from visitors to a Website
(e) None of these
14. The total set of interlinked hypertext documents worldwide is-(IBPS SO 2011)
(a) HTTP (b) Browser (c) WWW (d) B2B (e) None of these
15. Every computer connected to an intranet or extranet must have a distinct_____ (IBPS SO 2011)
(a) Firewall (b) proxy server
(c) IP address (d) domain name
(e) None of these
16. The ___.converts digital signals to analog signals for the purpose of transmitting data over
telephone lines. (IBPS SO 2011)
(a) Modem (b) Router
(c) Gateway
(d) Bridge
(e) All of these
17. Firewalls are used to protect against___. (IBPS SO 2011)
(a) Unauthorized Attacks (b) Virus Attacks (c) Data Driven Attacks(d) Fire Attacks(e) All of these
18. Data are ________ in client/server computing. (IBPS SO 2011)
(a) Never sent to the client machine (b) sent in very large sections to save processing time (c)
sent only upon the clients request (d) sent in complete copies for the client to filter and sort (e)
sent from the client to the server for processing
19. If you wish to extend the length of the network without having the signal degrades, you would use
a (IBPS PO RRB 2012)
(A) resonance
(B) router
(C) gateway
(D) switch
(E) repeater
20. URL stands for
(A) Universal Research List (B) Universal Resource List (C) Uniform Research List

(D) Uniform Research Locator


(E) Uniform Resource Locator
21. The Internet is (IBPS PO RRB 2012)
(A) A large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some
states of India (E) a communication system for some cities of India
22. What is the storage area for e-mail messages called? (IBPS PO RRB 2012)
(A) A folder (B) A mailbox (C) A directory (D) The hard disks
(E) None of these
23. One advantage of dial-up Internet access is? (IBPS PO RRB 2012)
(A) It utilizes broadband technology (B) it is Indian (C) it uses a router for security
(D) Modem speeds are very fast
(E) it utilizes existing telephone service
24. Most mail programs automatically complete the following two parts in an e-mail ?
(IBPS PO RRB 2012)
(A) From: and Body:
(B) From: and Date:
(C) From: and To:
(D) From: and
Subject:
(E) None of these
25. The first page of a Website is called the ? (IBPS PO RRB 2012)
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark (E) Intro Page
21. The software that allows users to surf the Internet is called a/an ? (IBPS PO RRB 2012)
(A) Search Engine (B) Internet Service Provider (ISP)
(C) Multimedia Application (D)
Browser (E) Internet Surfing Provider
23. A term related to sending data to a satellite is ? (IBPS PO RRB 2012)
(A) Downlink
(B) modulate (C) demodulate (D) uplink
(E) interrelate
24. Online documents containing underlined phrases or icons that a user can click in order to move
immediately to related parts of the current document or to other documents with related
information is called? (IBPS PO RRB 2012)
(A) Hypermedia
(B) hypertext
(C) HTML
(D) URL
(E) FTP
25. Physical security is concerned with protecting computer hardware from human tampering and
natural disasters and security is concerned with protecting software from
unauthorized tampering or damage. ? (IBPS PO RRB 2012)
(A) Data
(B) cyber
(C) Internet
(D) metaphysical
(E) publicity
26. Hackers ? (IBPS PO RRB 2012)
(A) All have the same motive
(B) are people who maintain computers (C) may legally
break into computers as long as they do not do any damage (D) are people who are allergic to
computers (E) break into other people's computers? (IBPS PO RRB 2012)
27. Unauthorized copying of software to be used for personal gain instead of for personal backups is
called
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
(E) Data looting
28. Junk e-mail is also called ? (IBPS PO RRB 2012)
(A) Spam (B) spoof
(C) cookie crumbs
(D) sniffer script
(E) spill
29. a central computer that holds collections of data and programs for many PCs, workstations, and
other computers is a (n)-(IBPS PO 2012)
(A) Supercomputer
(B) minicomputer
(C) laptop
(D) server (E) None of
these
30. The _____ folder retains copies of messages that you have started but are not yet ready to send.
(IBPS PO 2012)
(A) Drafts (B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
31. The network interface card of LAN is related to following layer of OSI model (2011 SBI PO)
(a) Transport (b) Network (c) Data Link (d) Physical (e) All of these
32. The ________ converts digital signals to analog signals for the purpose of transmitting data over
telephone lines. (2011 SBI PO)
(a) Modem (b) Router (c) Gateway (d) Bridge (e) All of these
32. This is a group of servers that share work and may be able to back each other up if one server
fails. (2011 SBI PO)
(a) Channel bank (b) Cluster
(c) Tiger team (d) Server less backup (e) Logical unit
33. What is the advantage of using basic HTML to create a document? (IBPS clerks 2011)
a) HTML is very easy to use. b) The document can be displayed by all word processors.
c) The document can be displayed by all programs. d) The document can be displayed by all
browsers. e) None of these
34. Which of the following will be used if the (sender of an e- mail wants to bold, italicize etc the text
message? (IBPS clerks 2011)
a) Rich Signature b) Reach Text c) Reach Format d) Plain Format e) Plain Text
35. Which of the following terms is not related to Internet? (IBPS clerks 2011)
a) Link b) Function key c) Browser d) Search e)none

Topic-7. Computer networks & Web Terminology part-2


1. What is included in an e-mail address? (IBPS clerks 2011)
a) Domain name followed by user's name b) User's name followed by domain name
c) User's name followed by postal address d) User's name followed by street address
e) None of these
2. In a ring topology, the computer in possession of the ------can transmit data (sbi clerks 2012)
(a) Packet
(b) data (c) access method (d) token (e) None of these
3. Computer connected to a LAN (Local Area Network) can. (SBI CLERKS 2012)
a. run faster b. goes on line c. share information and /or share peripheral equipment d. E-mail
e. None
4. Which of the following is NOT a type of broadband Internet connection? (sbi clerks 2012)
(a) Cable (b) DSL (c) Dial-up (d) Satellite (e) None of these
5. A __typically connects personal computers within a very limited geographical area, usually within a
single building. (sbi clerks 2012)
A.LAN B.BAN
C.TAN
D.NAN
E. None of these
6. An email address typically consists of a user ID followed by the ____ sign and the name of the email
server that c
manages the users electronic post office box? (sbi clerks 2012)
A. @
B. #
C. &
D.*
E. None of these
7. A web ____ consists of one or more web pages located on a Web server? (sbi clerks 2012)
A. Hub
B. Site
C. Story
D. Template
E. None of these
8. Which of the following is a valid unit of measurement of Bandwidth?
a) Data Per second b) Information Per second c) Bits per second d) All the above
e) None of these
9. Which of the following is true about Intranet?
a) It is a Private Network b) It is a Public Network c) It is a Network which can access illegally. d)
Only 1 and 3 e) None of the above
10......... Is a technique that is used to send more than one call over a single line?
a) Digitizing b) Duplexing c) Infrared Transmission d) Streaming e) Multiplexing
11. ...... is a device that forwards data packets between computer networks, creating an overlay
internetwork.
a) Multiplexer b) Duplexer c) Router d) WWW e) None of these
12. An organization that provides access to the internet is called:
a) Internet Service Provider b) Internet Access Provider c) Internet Access Providing System
(IAPS) d) 1 and 3 e) None of these
13. The method of internet access that requires a phone line, but offers faster access speeds than
dial-up is ...... connection.
1) Fiber-optic service 2) Satellite Access 3) Digital Subscriber line 4) Cable Access
5) None of these
14. Which of the following cannot be a part of an email address?
1) Underscore 2) At sign 3) Period 4) Space 5) None of these
15. VOIP is the acronym for:
1) Voice Oriented Internet Protocol 2) Virtual Object Internet Protocol 3) Voice over Internet
Protocol 4) Virtual Object Intranet Protocol 5) None of these
16. 'Graymail' usually refers to:
1) Unwanted emails 2) Forwarded mails 3) emails in trash 4) Star / Priority emails 5) Junk mails
17.Servers are computers that provide resources to other computers connected to a
1) Network 2) Super Computer 3) Micro Computer 4) Client 5) None of these
18. A program for viewing WebPages is called:
1) Word Processor 2) Spread sheet 3) Protocol 4) Browser 5) Database
16. The internet allows you to:
1) Send electronic mail 2) View web pages 3) Connect to servers all around the world 4) All the
above 5) none of these

17. YouTube, which provides a service of streaming videos online is provided by ....
1) Google 2) Microsoft 3) IBM 4) Apple 5) Sony
18. ...... is known as unauthorized access to others system.
1) Hacking 2) Encryption 3) Decryption 4) Trafficking 5) None of these
19. A connection from one HTML document to another HTML document is called:
1) Hyper Link 2) Connecting Link 3) Icon 4) All of these 5) None of these
20. Which of the following is not a social networking site?
1) WAYN 2) Hi 5 3) Orkut 4) Yahoo 5) Face book
21. In the URL https://twitter.com, what doess represent in 'https'?
1) Safe 2) System 3) Start-up 4) Semantic 5) Secured
22. The process of transforming information using an algorithm to make it unreadable by anyone is
usually referred to as:
1) Decryption 2) Encryption 3) Alphabet Coding 4) Encrography 5) Deptography
23. Which one of following helps a user in locating information over internet?
a) URL b) Search engine c) Domain d) Network e) None of these
24. The ___.converts digital signals to analog signals for the purpose of transmitting data over
telephone lines.
(a) Modem (b) Router (c) Gateway (d) Bridge (e) All of these
25. Pickup wrong definition
(a) Off line - is a system peripheral equipment not controlled by CPU
(b) Online - is system in which peripheral equipment is in direct contact with CPU
(c) Peripherals - are hardware under the control of CPU, like punched card readers, tapes,
drums,disk, output devices
(d) PL/I is the acronym Peripheral Listing /Index
(e) Program or routine is a set sequence of instructions given to computer for problem solving
26. Application layer provides basis for
A. Email services B.Directory services. C.File transfer, access, and management. D.Network
virtual terminal. E. Cabling
27. Layer that are used to deal with mechanical and electrical specifications are
A. Physical Layer B. Data Link Layer C. Network Layer D. Transport Layer E. Session layer
28. Network layer is responsible for the
A. Node to node communication B. Source to destination C. Hop to hop communication
D. both b and c E. access control

29. Communication between a computer and a keyboard involves


______transmission
a) Automatic b) Half-duplex c) Full-duplex d) Simplex e)none
30) The first Network
a) CNNET b) NSFNET c) ASAPNET d) ARPANET e) SONET
31. Bluetooth is an example of
a) personal area network b) local area network
c) virtual private network
d)Metropolitan area network e) none of the mentioned
32) In this topology there is a central controller or hub
a) Star b) Mesh
c) Ring d) Bus e)Tree
33)Which transmission media has the highest transmission speed in a network?
a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable e)none
34)WiMAX stands for
a) wireless maximum communication b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access d)Wireless maximum access
e) none of the mentioned
35) Which multiplexing technique transmits digital signals?
a) FDM b) TDM c) WDM d) None of the mentioned e) a&b

You might also like