1.
Token ring topology is used for which network architecture
2.
When a hackers penetrates a network this is which type of network issue ?
5.
Internet enables email message to reach its destination in near-real-time manner.
6.
High speed internet works on
7.
What is the easiest way to share files and resources directly ?
8.
What is free software bug repair available on the internet called ?
9.
A LARGE NO OF DEVICES CONNECTED THROUGH IOT COMMUNICATE AUTOMATICALLY,NOT THROUGH HUMANS ,WHAT IS THIS CALLED ?
10.
Seeds of internet were planted in 1969?
11.
In internet, computers are connected to smaller networks, which in turn are connected through gateways to the Internet backone
12.
Which of the following protocols is recommended to be turned off because it transmit usernames and password is plaintext ?
13.
INTERNET EXPLORER FALLS UNDER COMPILER
14.
Knowbots are bots that search the internet to gather and store user-specified information
15.
We can send email without using internet connections .
16.
The process of transferring files from your computer to the internet is called ?
17.
The server on the internet is also known as a ?
18.
A computer on internet are identify by ?
19.
IN WHICH YEAR WAS THE VERY FIRST INTERNET ONLY BANK FOUNDED ?
20.
A program that seaches the Internet for a web page that contains what you’re looking for ?
21.
THE NUMBERS OF USERS ON A NETWORK HAS THE GREATEST IMPACT ON NETWORKS
22.
Which one of the following error will be handled by the operating system ?
23.
What is the full form of WAIS ?
24.
Internet browsers don’t provide several navigation facilities to help users save time while Internet surfing.
25.
Firewall as part of a router program
26.
What type of risk is of paramount importance for mobile devices
27.
For secure electronic data interchnage transmission on internet
28.
EDI(Electronic Data Interchange over internet uses) ?
29.
Which was the first search engine in the internet ?
30.
What is Not required to download M-Adhaar ?