1.
We can send email without using internet connections .
2.
What type of risk is of paramount importance for mobile devices
3.
Internet enables email message to reach its destination in near-real-time manner.
4.
Which was the first search engine in the internet ?
5.
Token ring topology is used for which network architecture
6.
For secure electronic data interchnage transmission on internet
7.
Which of the following protocols is recommended to be turned off because it transmit usernames and password is plaintext ?
8.
What is the full form of WAIS ?
9.
What is free software bug repair available on the internet called ?
10.
When a hackers penetrates a network this is which type of network issue ?
11.
Knowbots are bots that search the internet to gather and store user-specified information
12.
What is the easiest way to share files and resources directly ?
13.
A computer on internet are identify by ?
14.
A LARGE NO OF DEVICES CONNECTED THROUGH IOT COMMUNICATE AUTOMATICALLY,NOT THROUGH HUMANS ,WHAT IS THIS CALLED ?
15.
What is Not required to download M-Adhaar ?
16.
IN WHICH YEAR WAS THE VERY FIRST INTERNET ONLY BANK FOUNDED ?
17.
Firewall as part of a router program
18.
Seeds of internet were planted in 1969?
19.
High speed internet works on
20.
THE NUMBERS OF USERS ON A NETWORK HAS THE GREATEST IMPACT ON NETWORKS
21.
A program that seaches the Internet for a web page that contains what you’re looking for ?
22.
EDI(Electronic Data Interchange over internet uses) ?
24.
INTERNET EXPLORER FALLS UNDER COMPILER
25.
The server on the internet is also known as a ?
26.
In internet, computers are connected to smaller networks, which in turn are connected through gateways to the Internet backone
27.
Internet browsers don’t provide several navigation facilities to help users save time while Internet surfing.
28.
The process of transferring files from your computer to the internet is called ?
29.
Which one of the following error will be handled by the operating system ?