1. ––––– was the network that became the basis of the Internet.
2. Which of the following options correctly defines a firewall (in the context of computing)?
3. Who among the following invented the world wide web in 1989 ?
4. The transfer of data from one application to another in a computer system is known as
5. What does 'P' stand for in HTTPS, an expression commonly found in web addresses?
6. Which of the following is a free encyclopedia, written collaboratively by the people who use it?
7. What is the full form of 'MAN' in computer terminology?
8. Which country has the largest internet users?
9. Who among the following is the co-founder of Twitter?
11. --------is a global system of interconnected governmental, academic, corporate, public, and private computer networks.
12. In the context of India's banking sector, what is the full form of IMPS ?
14. A computer on the Internet that uses HTTP protocol is known as :
15. In computer parlance, what does R stand for in URL?
16. A ............. is a computer, appliance, or router that sits between the trusted and untrusted systems.
17. Which of the following is a browser?
18. A board inserted inside a computer that provides a physical connection to a network is called:
19. ……….perform Internet Protocol blocking to protect networks from unauthorized access.
20. Which of the following protocols is used by email clients to send email to a mail server?
21. Money transfer through mobile is called..........
22. In the following list of devices which device is used in network layer?
24. What does HTTPS stand for?
25. ………..is a telecommunications network or computer network that extends over a large geographical distance.
26. In computing, .......is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
27. Sending a frame to a group of stations is
28. The world wide web was invented in the year...
29. How many bits does an IP address contain?
30. In the context of the internet, what is the full form of MAN?
31. In the context of cloud computing, what is the English full form of 'Pass'?
32. In the acronym LAN, a system of computer networking, the letter 'L' stands for:
33. ASP in computer science stands for?
34. Data in database at a particular point of time is called as?
35. What do you call an event where a computer becomes unresponsive due to either a program or the system itself becoming unresponsive and no longer taking input?
36. The tag line “Do No Evil” is owned by
37. Two versions of the Internet Protocol (IP) are in use-
38. _____ is an attempt to obtain sensitive information such as username, password and credit card details, etc. for malicious reasons, by posing as a trustworthy source in email :
39. Which of the following statements about firewall (in the context of computing) is incorrect?
40. One of the common forms of representing remote sensing data as information is in the form of
41. ..............is a type of computing that performs computation, storage and even applications as a service across a network.
42. What are unwanted and unsolicited messages sent on the internet called?
43. How many layers are there in the OSI networking model?
44. How many bits does an IP address consist of?
45. World Wide Web was invented by……….
46. Which of these is not a Database Management System (DBMS)?
47. Which algorithm is used to decide the path to transfer the packets from source to destination?
48. Who is the creator of WWW or the world Wide Web?
49. The delivery of computing services such as data storage, servers and databases over the internet is known as:
50. In networks, a small message used to pass between one station to another is known as ………