2.
What type of risk is of paramount importance for mobile devices
3.
Token ring topology is used for which network architecture
4.
THE NUMBERS OF USERS ON A NETWORK HAS THE GREATEST IMPACT ON NETWORKS
5.
Which of the following protocols is recommended to be turned off because it transmit usernames and password is plaintext ?
6.
The process of transferring files from your computer to the internet is called ?
7.
Seeds of internet were planted in 1969?
8.
Which one of the following error will be handled by the operating system ?
9.
High speed internet works on
10.
IN WHICH YEAR WAS THE VERY FIRST INTERNET ONLY BANK FOUNDED ?
11.
What is Not required to download M-Adhaar ?
12.
A computer on internet are identify by ?
14.
The server on the internet is also known as a ?
15.
A LARGE NO OF DEVICES CONNECTED THROUGH IOT COMMUNICATE AUTOMATICALLY,NOT THROUGH HUMANS ,WHAT IS THIS CALLED ?
16.
Knowbots are bots that search the internet to gather and store user-specified information
17.
For secure electronic data interchnage transmission on internet
18.
Internet enables email message to reach its destination in near-real-time manner.
19.
We can send email without using internet connections .
20.
What is free software bug repair available on the internet called ?
21.
What is the easiest way to share files and resources directly ?
22.
In internet, computers are connected to smaller networks, which in turn are connected through gateways to the Internet backone
23.
What is the full form of WAIS ?
24.
EDI(Electronic Data Interchange over internet uses) ?
25.
Which was the first search engine in the internet ?
26.
When a hackers penetrates a network this is which type of network issue ?
27.
INTERNET EXPLORER FALLS UNDER COMPILER
28.
Internet browsers don’t provide several navigation facilities to help users save time while Internet surfing.
29.
A program that seaches the Internet for a web page that contains what you’re looking for ?
30.
Firewall as part of a router program