Networking and Internet - Marketing aptitude questions
Q1. ________________ is not a web browser.
1. FOXPRO
2. Mozilla
3. Netscape navigator
4. Internet explorer
View Answer / Hide AnswerQ2. Which one of the following is similar to sending an email?
1. Creating a drawing
2. Picturing an event
3. Narrating a story
4. Writing a letter
View Answer / Hide AnswerQ3. It is the one which provides the facility of exchanging information between computing devices and is a combination of hardware and software.
1. Digital device
2. Network
3. Peripheral
4. Expansion board
View Answer / Hide AnswerQ4. The resources to all the computers in network are provided by the server which is a computer and they are connected by
1. Client
2. Mainframe
3. Network
4. Supercomputers
View Answer / Hide Answer Q5. What is the use of video conferencing?
1. It is used for communication purpose
2. It is used for live conferencing
3. It is used to talk to each other
4. All of the above
View Answer / Hide AnswerANSWER: It is used for live conferencing
Q6. Which one of the following is the most important or powerful computer in a network?
1. Network station
2. Network client
3. Network Server
4. Desktop
View Answer / Hide AnswerQ7. The connection of network which can only be attached to is
1. Intranet
2. Internet
3. Extranet
4. Virtual private network
View Answer / Hide AnswerQ8. What is the term used for talking on net with the help of typed text?
1. New group
2. E-mail
3. Chatting
4. None of the above
View Answer / Hide AnswerQ9. The internal network of a company is very large and would like to subnet into smaller parts. From the options given below, the device that will not be used to separate LAN and still protect critical resources is
1. The modem between computers
2. A router between subnet
3. An internal firewall
4. A switch between departments
View Answer / Hide AnswerANSWER: The modem between computers
Q10. A small single site network is nothing but a
1. RAM
2. MAN
3. DSL
4. LAN
View Answer / Hide AnswerQ11. Connectivity is similar to
1. Power cord
2. Internet
3. Floppy disk
4. Data
View Answer / Hide AnswerQ12. Which topology is used in Ethernet?
1. Ring
2. Mesh
3. Bus
4. Line
View Answer / Hide AnswerQ13. These are the components of an Ethernet LAN except
1. Fibre
2. Access point
3. Coax
4. STP
View Answer / Hide AnswerQ14. What is the full form of URL?
1. Unicode research locator
2. Uniform read locator
3. United research locator
4. Uniform resource locator
View Answer / Hide AnswerANSWER: Uniform resource locator
Q15. When computers are connected in LAN then
1. Computers can share information and share peripheral equipment
2. Computers can run faster
3. Computers can go on line
4. All of the above
View Answer / Hide AnswerANSWER: Computers can share information and share peripheral equipment
Q16. What are the requirements of wide area networks?
1. Same type
2. High bandwidth communication source link
3. High speed processor
4. All of the above
View Answer / Hide AnswerQ17. _____________ is a search engine
1. Flash
2. Google
3. Internet explorer
4. Fire Fox
View Answer / Hide AnswerQ18. Based on the packet’s address, the device that has been designed to forward packets to specific ports is
1. Specialty hub
2. Filtering hub
3. Port hub
4. Switching hub
View Answer / Hide AnswerQ19. ____________ topology is not of broadcast type.
1. Ring
2. Bus
3. Star
4. Mesh
View Answer / Hide AnswerQ20. Which one of the following devices is needed to communicate with computers using telephone lines?
1. VDU
2. Modem
3. Disk
4. CPU
View Answer / Hide AnswerQ21. If and email is received by an unknown person then
1. One should open it and respond asking their personal information
2. One should open it and respond saying you don’t know them
3. It should be deleted without opening it
4. It should be forwarded to police
View Answer / Hide AnswerANSWER: It should be deleted without opening it
Q22. What does PROTOCOL consists of?
1. TCP/IT
2. TCD/IP
3. TCD/IT
4. TCP/IP
View Answer / Hide AnswerQ23. To subnet LAN directly on the network server and to protect the resources of company that receives internet access through a network or gateway resources, the device which is best suited is
1. A router which will also act as a bridge.
2. VLAN
3. A multi-homed firewall
4. DSL modem
View Answer / Hide AnswerANSWER: A multi-homed firewall
Q24. For a company’s business the term that involves the use of electronic platforms like intranets, extranets and internet is
1. E-business
2. E-marketing
3. E-commerce
4. E-procurement
View Answer / Hide Answer Q25. Before buying which package can be downloaded through internet for testing purpose?
1. Backup copy
2. Beta software
3. Pirated software
4. Shareware
View Answer / Hide AnswerQ26. What term is used if a search engine returns a web page if a match is found?
1. Link
2. Hit
3. Blog
4. Success.
View Answer / Hide AnswerQ27. Which one of the following is not the feature of internet?
1. News group
2. Designing
3. E-mail
4. Chat
View Answer / Hide AnswerQ28. The benefit of using a firewall for LAN is
1. It provides greater security to LAN
2. It provide stricter access control to critical resources
3. Both 1 and 2
4. Neither 1 nor 2
View Answer / Hide AnswerQ29. What do you mean by WWW in communication?
1. World wide web
2. With wide web
3. World with web
4. With wide web
View Answer / Hide AnswerQ30. URL must contain
1. Protocol identifier
2. The unique registered domain name
3. WWW and the unique registered domain name
4. WWW
View Answer / Hide AnswerQ31. Which one of the following requires phone line but offers faster access speed than the dial up connection?
1. Digital subscefer line (DSL)
2. Cable access
3. Fibre optic serving
4. Modem
View Answer / Hide AnswerANSWER: Digital subscefer line (DSL)
Q32. What is the term for the set of rules and regulations while working on internet?
1. Internet
2. Intranet
3. Protocol
4. WWW
View Answer / Hide AnswerQ33. The statement that holds true regarding firewall is
1. It can either be hardware or software device.
2. It filters network traffic
3. It follows a set of rules
4. All of the above
View Answer / Hide AnswerQ34. In a network, if a computer shares the resources to be used by others then that computer is called
1. Peer
2. Server
3. Mainframe
4. Client
View Answer / Hide Answer Q35. Which one of the following statement is correct for the term URL?
1. It is a type of programming object
2. It is a computer software program
3. It is the address of page on World Wide Web
4. It is an acronym for unlimited resource for learning
View Answer / Hide AnswerANSWER: It is the address of page on World Wide Web
Q36. In a ring topology, the data can be transmitted only if the computer possess
1. Token
2. Packet
3. Data
4. Access method
View Answer / Hide AnswerQ37. What is the name of the topology in which if the cable of a computer network is broken then the whole network goes down?
1. Mesh
2. Ring
3. Bus
4. Star
View Answer / Hide AnswerQ38. When static packet filter is used on the router then the statement which is not correct for firewall protection is
1. Static packet filtering is less secure than stateful filtering
2. Static packet filtering is more secure than dynamic packet filtering
3. Static packet filtering is less secure than dynamic proxy filtering
4. All of the above
View Answer / Hide AnswerANSWER: Static packet filtering is more secure than dynamic packet filtering
Q39. The term used for transferring a file from another computer to your computer is
1. Upgrading a document
2. Uploading a document
3. Accessing a document
4. Downloading a document
View Answer / Hide AnswerANSWER: Downloading a document
Q40. From the options given which one acts as a doorway to the rest of the website pages?
1. Home page
2. URL
3. Search engine
4. Browser
View Answer / Hide AnswerQ41. Which topology is used for large networks?
1. Bus
2. Line
3. Ring
4. Star
View Answer / Hide AnswerQ42. In which OSI layers a packet filtering firewall operates?
1. At the network
2. At the gateway layer
3. At the transport layer
4. All of the above
View Answer / Hide AnswerANSWER: At the transport layer
Q43. It is not used as a means for personal communications in internet.
1. Instanoles
2. Chat
3. Electronic mail
4. Instant messaging
View Answer / Hide AnswerQ44. What is the advantage of LAN?
1. Back up of data
2. Save data
3. Access the web
4. Share peripherals
View Answer / Hide AnswerANSWER: Share peripherals
Q45. What term is often used for an email account that includes a storage area?
1. IP address
2. Hyperlink
3. Mailbox
4. Attachment
View Answer / Hide AnswerQ46. Which one of the following statement is not the benefit of firewall?
1. It limits security exposure
2. It is used for logging internet activity
3. It enforces the organizations security policy
4. It protects against virus
View Answer / Hide AnswerANSWER: It protects against virus
Q47. In a LAN network which one of the following allows users to share computer programs and data?
1. File server
2. Print server
3. Communication server
4. All of the above
View Answer / Hide AnswerQ48. The term which is used to see web pages is called
1. Spreadsheet
2. Protocol
3. Word processor
4. A browser
View Answer / Hide AnswerQ49. The Rate of transfer of data in LAN is
1. Tera bits per second
2. Kilo bits per second
3. Mega bits per second
4. Bits per second
View Answer / Hide AnswerANSWER: Kilo bits per second
Q50. In email address, the symbol that is used to separate the user name with the ISP address is
1. #
2. &
3. @
4. %
View Answer / Hide AnswerQ51. The statement which does not hold true for modems is
1. The fastest transfer rate is 56kbps
2. It stands for modulator and demodulator
3. It uses the telephone lines
4. All of the above
View Answer / Hide AnswerANSWER: The fastest transfer rate is 56kbps
Q52. One can access email from anywhere with the help of
1. Message board
2. Weblog
3. Webmail interface
4. Forum
View Answer / Hide AnswerANSWER: Webmail interface
Q53. It is not a part of email address
1. Underscore (_)
2. At sign (@)
3. Period (.)
4. Space ( )
View Answer / Hide AnswerQ54. Modem is nothing but
1. Mainframe operating device manager
2. A type of secondary memory
3. Modulator demodulator
4. Micro operating device manager
View Answer / Hide AnswerANSWER: Modulator demodulator
Q55. Modems are configured in such a manner that any incoming calls are automatically answered. Manufacturer provides inbuilt modems in many user computers. In this case the greatest security risk when dealing with the modems is
1. Server access without the knowledge of network administrator
2. Remote access without the knowledge of network administrator
3. Local access without the knowledge of network administrator
4. Client access without the knowledge of network administrator
View Answer / Hide AnswerANSWER: Remote access without the knowledge of network administrator
Q56. IP address in computing stands for
1. Internet provider
2. International pin
3. Invalid pin
4. Internet protocol
View Answer / Hide AnswerANSWER: Internet protocol
Q57. Which one of the following describes the contents of the message when sending an email?
1. To
2. Subject
3. CC
4. BCC
View Answer / Hide AnswerQ58. To which company does Gmail belong?
1. Rediff
2. Great mail
3. Yahoo
4. Google
View Answer / Hide AnswerQ59. What do you mean by RAS?
1. Remote access service
2. Remote access security
3. Random access service
4. Random access security
View Answer / Hide AnswerANSWER: Remote access service
Q60. Which service is used for sending or receiving main on the internet?
1. FTP
2. Gopher
3. Email
4. All of the above
View Answer / Hide AnswerQ61. What do you mean by the term Wi-Fi in computer hardware?
1. Wireless network
2. Wire-fire
3. With wire network
4. With fiction
View Answer / Hide AnswerQ62. What do you mean by the term FTP?
1. File transmission program
2. File transfer protocol
3. Fast text processing
4. Fast transmission processor
View Answer / Hide AnswerANSWER: File transfer protocol
Q63. Other than the dial-up connection, the network connection applicable to RAS is
1. VPN
2. ISDN
3. DSL
4. All of the above
View Answer / Hide Answer Q64. What do you mean by chat?
1. It is a transmission of messages and files through computer network
2. It is an online area in which users discuss a particular subject in writing
3. It is a type of conversation that takes place on a computer.
4. It is an internet standard that allows users to upload and download files.
View Answer / Hide AnswerANSWER: It is a type of conversation that takes place on a computer.
Q65. To browse and search for information on the internet ______________ is used
1. Netscape
2. Telnet
3. FTP
4. Eudora
View Answer / Hide AnswerQ66. The tem electric meeting is known as
1. Tele-shopping
2. Tele-officing
3. Tele-conferencing
4. Tele-banking
View Answer / Hide AnswerANSWER: Tele-conferencing
Q67. Which computer program is used to run the websites?
1. FOXPRO
2. Mozilla
3. MS-Word
4. Unix
View Answer / Hide Answer