1. In the context of the internet, what is the full form of MAN?
2. How many bits does an IP address contain?
3. In the following list of devices which device is used in network layer?
4. Sending a frame to a group of stations is
6. ………..is a telecommunications network or computer network that extends over a large geographical distance.
8. Who is the creator of WWW or the world Wide Web?
9. Which of the following options correctly defines a firewall (in the context of computing)?
10. In computing, .......is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
11. What are unwanted and unsolicited messages sent on the internet called?
12. What does 'P' stand for in HTTPS, an expression commonly found in web addresses?
13. Two versions of the Internet Protocol (IP) are in use-
14. Which of the following statements about firewall (in the context of computing) is incorrect?
15. Which country has the largest internet users?
16. Which of the following is a free encyclopedia, written collaboratively by the people who use it?
17. Which of the following protocols is used by email clients to send email to a mail server?
18. Which algorithm is used to decide the path to transfer the packets from source to destination?
19. Data in database at a particular point of time is called as?
20. What does HTTPS stand for?
21. Which of these is not a Database Management System (DBMS)?
23. Who among the following is the co-founder of Twitter?
24. Who among the following invented the world wide web in 1989 ?
25. ASP in computer science stands for?
26. ..............is a type of computing that performs computation, storage and even applications as a service across a network.
27. _____ is an attempt to obtain sensitive information such as username, password and credit card details, etc. for malicious reasons, by posing as a trustworthy source in email :
28. What do you call an event where a computer becomes unresponsive due to either a program or the system itself becoming unresponsive and no longer taking input?
29. In the context of India's banking sector, what is the full form of IMPS ?
30. World Wide Web was invented by……….
31. ––––– was the network that became the basis of the Internet.
32. In the context of cloud computing, what is the English full form of 'Pass'?
33. Money transfer through mobile is called..........
34. ……….perform Internet Protocol blocking to protect networks from unauthorized access.
35. What is the full form of 'MAN' in computer terminology?
36. A board inserted inside a computer that provides a physical connection to a network is called:
37. How many layers are there in the OSI networking model?
38. A ............. is a computer, appliance, or router that sits between the trusted and untrusted systems.
39. In computer parlance, what does R stand for in URL?
40. The transfer of data from one application to another in a computer system is known as
41. One of the common forms of representing remote sensing data as information is in the form of
42. The tag line “Do No Evil” is owned by
43. A computer on the Internet that uses HTTP protocol is known as :
44. --------is a global system of interconnected governmental, academic, corporate, public, and private computer networks.
45. Which of the following is a browser?
46. In the acronym LAN, a system of computer networking, the letter 'L' stands for:
47. The world wide web was invented in the year...
48. The delivery of computing services such as data storage, servers and databases over the internet is known as:
49. How many bits does an IP address consist of?
50. In networks, a small message used to pass between one station to another is known as ………