You are on page 1of 4

Q. Free of cost repair of software bug available at Internet is called ?.

A. Version
B. Ad-on
C. Tutorial
Patch

Q. The Internet was originally a project of which agency?


ARPA
B. NSF
C. NSA
D. None of these

Q. Which of the following is a correct format of Email address?


A.name@website@info
B.name@website.info
C. www.nameofebsite.com
D. name.website.com

Q. HTML is used to create


A.machine language program
B.high level program
web page
D.web server

Q. The computer jargon - WWWW, stands for :


World Wide Web Worm
B. World Wide Wildlife Web
C. World Wide Women's Web
D. World Wide Women's Week

Q. The process of transferring files from a computer on the Internet to your computer is
called
A. Uploading
B. Forwarding
C. FTP
Downloading

Q. In internet terminology IP means


A. Internet Provider
Internet Protocol
C. Internet Procedure
D. Internet Processor

Q. A Web site's front page /main page is called


A. Browser Page
B. Search Page
Home Page
D. Bookmark

Q. Which one of the following is not a search engine?


A. Bing
B. Google
C. Yahoo
Windows

Q. Verification of a login name and password is known as:


A. configuration
B. accessibility
authentication
D. logging in

Q. Internet explorer falls under :


A. Operating System
B. Compiler
Browser
D. IP address

Q. What is the full form of WWW in web address?


World Wide Web
B. World Wide Word
C. World Wide Wood
D. None of these

Q. Full form of HTML is:


Hyper Text Markup Language
B. Hyper Text Manipulation Language
C. Hyper Text Managing Links
D. Hyper Text Manipulating Links

Q. Moving from one website to another is called :


A. Downloading
Browsing
C. Uploading
D. Attachment

Q. A computer on internet are identified by :


A. e-mail address
B. street address
IP address
D. None of the above
1. An intrusion detection system does not perform which of the following?
A. Tries to identify attempts to hack into a computer system.

B. May monitor packets passing over the network.

May transmit message packets to the correct destination.

D. Set up deception systems that attempt to trap hackers.

2. Features of XML include which of the following?


A. The tags are used to describe the appearance of the content.

B. Addresses the structuring and manipulation of the data involved.

C. Governs the display of information in a Web browser.

D. All of the above.


3. What is Hypertext Transfer Protocol (HTTP)?
A. The protocol to copy files between computers

The transfer protocol to transfer Web pages to a browser

C. The database access protocol for SQL statements

D. The hardware/software protocol that limits access to company data

4. Which of the following is true concerning Web services standards?


A. Led by only one group.

B. Helped by cooperation between companies.

C. Not necessary at this time.

Important so that the web can flourish.


5. Common Gateway Interface (CGI) is which of the following?
A. An interface that accepts and returns data that may be written in SQL.

An interface that accepts and returns data that may be written in any language that produces an executable file.

C. A small program that executes within another application and is stored on the server.

D. A small program that executes within another application and is stored on the client.
6. A server-side extension is needed to do what?
A. Allow a request from a client to access the database.

B. Allow a request from a client to access a HTML-formatted page.

C. Allow a request from a client to access Web pages.

D. All of the above.

7. Which of the following is true about Cold Fusion Markup Language (CFML)?
A. It is stored in .asp files.

B. It is executed on the client.

C. It does not use tags.

D. It allows for coding of custom tags in an HTML file.


8. XML is which of the following?
A. A scripting language that states the rules for tagging elements.

B. A programming language that states the rules for tagging elements.

C. A programming language that allows the creation of customized tags.

D. A scripting language that allows the creation of customized tags.


9. An intranet provides which of the following?
A. Connectivity to all customers

B. Connectivity to selected customers

C. Connectivity to no customers

D. Connectivity to all of the above


10. Client-side extensions:
A. add functionality to the server.

B. add functionality to the browser.

C. add functionality to the firewall.

D. add functionality to the network.


11. Which of the following is true about Microsoft Active Server Pages (ASP)?
A. It is stored in .cfm files.

B. It is executed on the client.

C. It does not use tags.

D. It allows for coding of custom tags in an HTML file.

12. Websites without a database attached to them have which of the following characteristics?
A. The ability to generate data via SQL.

B. The inability to use a browser to display Web pages.

C. Static information using HTML or JavaScript.

D. The need to use TCP/IP as the network protocol.

13. Web servers should be configured in which of the following ways?


A. unauthorized access is restricted.

B. unauthorized access is unrestricted.

C. unauthorized access is impossible.

D. unauthorized access is possible.

14. A proxy server is used for which of the following?


A. To provide security against unauthorized users

B. To process client requests for Web pages

C. To process client requests for database access

D. To provide TCP/IP

15. Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the
Internet?
A. Both TCP and IP are needed.

B. TCP is needed but IP is not needed.

C. TCP is not needed but IP is needed.

D. Neither TCP and IP are needed.