You are on page 1of 5

Assignment on Computer Applications (What is Internet)

Submitted by

Sazzadul Alom Munna

ID 111 192 056

1. What is the Internet? -

There is a central control that is deciding how packets are routed or where pieces of the network
are built.

 True
 False

Correct answer is False

Who co-created the internet?

a) Grideon Sundback
b) Vint Cerf
c) Bill Gates
d) Bob Kahn

Correct answer is (b)

2. The Internet: Wires, Cables & Wifi -

Information is made of BITS.

 True
 False

Correct answer is TRUE


How does a picture, text message, or email gets sent from one place to another?

a) By using decimal information


b) By using bit rates
c) By using ethernet
d) By using binary information

Correct answer is (d)

3. The Internet: IP Addresses & DNS –

There is no way one DNS server can handle all the request from all devices.

 True
 False

Correct answer is True

The most important protocols used in internet communication simply called?

a) DNS
b) FTP
c) IP
d) ISP

Correct answer is (c)

4.The Internet: Packets, Routing & Reliability –

Routers act like traffic managers to keep the packets moving through the networks smoothly.

 True
 False

Correct answer is (True)


What’s true about TCP (Transmission Control Protocol) below?

a) TCP manages the sending and receiving of all the data as packets.
b) If TCP finds some packets are missing then it doesn’t sign.
c) TCP is scalable.
d) All of these.

Correct answer is (d)

5. The Internet: HTTP & HTML –

HTTP and DNS manage the sending and receiving of HTML, media files, or anything on the
web.

 True
 False

Correct answer is True

In a millisecond a computer asked the server for website and the server talk back to the computer
on a language called-

a) Gets request
b) HTTP
c) HTTP post request
d) HTTPS

Correct answer is (b)

6. The Internet: Encryption & Public Keys –

Date of any kind can be kept secret through a process known as free key.

 True
 False

Correct answer is False (It’s known as Encryption)


What type of key is not shared and computers cannot decrypt a message without it?

a) Free key
b) Public Key
c) Private Key
d) Personal Key

Correct answer is (c)

7. The Internet: Cybersecurity & Crime –

Once a virus is on the computer it can steal or delete any of the files of that computer.

 True
 False

Correct answer is True

A phishing scam email is one which-

a) Requests a payment for goods you have not received


b) Encourages you to click on a link to a fraudulent website
c) Contains abusive and threatening language
d) None of these

Correct answer is (b)

8. The Internet: How Search Works –

The internet is a web of pages connected to each other by hyperlinks.

 True
 False

Correct answer is (Ture)


What is searched using a search engine?

a) For information
b) For webpages
c) Web pages for information using specified search terms
d) All of these

Correct answer is option (c)

You might also like