1.
A computer on internet are identify by ?
2.
In internet, computers are connected to smaller networks, which in turn are connected through gateways to the Internet backone
3.
Token ring topology is used for which network architecture
4.
What is Not required to download M-Adhaar ?
5.
EDI(Electronic Data Interchange over internet uses) ?
6.
Firewall as part of a router program
7.
Which one of the following error will be handled by the operating system ?
8.
When a hackers penetrates a network this is which type of network issue ?
9.
The process of transferring files from your computer to the internet is called ?
10.
Seeds of internet were planted in 1969?
11.
Knowbots are bots that search the internet to gather and store user-specified information
12.
THE NUMBERS OF USERS ON A NETWORK HAS THE GREATEST IMPACT ON NETWORKS
14.
A LARGE NO OF DEVICES CONNECTED THROUGH IOT COMMUNICATE AUTOMATICALLY,NOT THROUGH HUMANS ,WHAT IS THIS CALLED ?
15.
Which of the following protocols is recommended to be turned off because it transmit usernames and password is plaintext ?
16.
A program that seaches the Internet for a web page that contains what you’re looking for ?
17.
Internet browsers don’t provide several navigation facilities to help users save time while Internet surfing.
18.
We can send email without using internet connections .
19.
INTERNET EXPLORER FALLS UNDER COMPILER
20.
The server on the internet is also known as a ?
21.
IN WHICH YEAR WAS THE VERY FIRST INTERNET ONLY BANK FOUNDED ?
22.
For secure electronic data interchnage transmission on internet
23.
Internet enables email message to reach its destination in near-real-time manner.
24.
What is free software bug repair available on the internet called ?
25.
What is the easiest way to share files and resources directly ?
26.
High speed internet works on
27.
What type of risk is of paramount importance for mobile devices
29.
What is the full form of WAIS ?
30.
Which was the first search engine in the internet ?