1.
When a hackers penetrates a network this is which type of network issue ?
2.
For secure electronic data interchnage transmission on internet
3.
The server on the internet is also known as a ?
4.
Which one of the following error will be handled by the operating system ?
5.
A program that seaches the Internet for a web page that contains what you’re looking for ?
6.
EDI(Electronic Data Interchange over internet uses) ?
7.
INTERNET EXPLORER FALLS UNDER COMPILER
9.
Internet enables email message to reach its destination in near-real-time manner.
10.
What is Not required to download M-Adhaar ?
11.
Which of the following protocols is recommended to be turned off because it transmit usernames and password is plaintext ?
12.
What type of risk is of paramount importance for mobile devices
13.
A LARGE NO OF DEVICES CONNECTED THROUGH IOT COMMUNICATE AUTOMATICALLY,NOT THROUGH HUMANS ,WHAT IS THIS CALLED ?
14.
Internet browsers don’t provide several navigation facilities to help users save time while Internet surfing.
15.
What is the easiest way to share files and resources directly ?
16.
Which was the first search engine in the internet ?
17.
What is the full form of WAIS ?
18.
We can send email without using internet connections .
19.
Firewall as part of a router program
20.
Knowbots are bots that search the internet to gather and store user-specified information
22.
A computer on internet are identify by ?
23.
High speed internet works on
24.
The process of transferring files from your computer to the internet is called ?
25.
IN WHICH YEAR WAS THE VERY FIRST INTERNET ONLY BANK FOUNDED ?
26.
Seeds of internet were planted in 1969?
27.
What is free software bug repair available on the internet called ?
28.
THE NUMBERS OF USERS ON A NETWORK HAS THE GREATEST IMPACT ON NETWORKS
29.
Token ring topology is used for which network architecture
30.
In internet, computers are connected to smaller networks, which in turn are connected through gateways to the Internet backone