43. SMTP is a
43. SMTP is a
55. Which protocol assigns IP address to the client connected in the internet?
55. Which protocol assigns IP address to the client connected in the internet?
54. Which one of the following is not used in media access control?
54. Which one of the following is not used in media access control?
53.Servers are computers that provide resources to other computers connected to a
53.Servers are computers that provide resources to other computers connected to a
52. A program that is used to view websites is called a
52. A program that is used to view websites is called a
51. Which of the following is not a type of broadband internet connection?
51. Which of the following is not a type of broadband internet connection?
50. A typical modern computer uses
50. A typical modern computer uses
49. Sending an E-mail is similar to
49. Sending an E-mail is similar to
48. ARPANET stands for
48. ARPANET stands for
47. Internet is
47. Internet is
46. The process of connecting to the internet account is
46. The process of connecting to the internet account is
45. Smart card is
45. Smart card is
44. A proxy server is used for which of the following?
44. A proxy server is used for which of the following?
56. Which one of the following is not an application layer protocol used in internet?
56. Which one of the following is not an application layer protocol used in internet?
42. Rules for exchanging data between computers are called
42. Rules for exchanging data between computers are called
41. ___ performs simple mathematics for the CPU.
41. ___ performs simple mathematics for the CPU.
40. Barcodes store information using
40. Barcodes store information using
39. Personal logs or journal entries posted on the web are known as
39. Personal logs or journal entries posted on the web are known as
38. The ____ project allows access to the universe of online information using two simple user interface operations.
38. The ____ project allows access to the universe of online information using two simple user interface operations.
37. A ____ is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.
37. A ____ is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.
36. Which of the following would you find on linked in?
36. Which of the following would you find on linked in?
35. In a computer internet, standard IP address is composed of a total of
35. In a computer internet, standard IP address is composed of a total of
34. Internet protocol includes
34. Internet protocol includes
33. Computer can be linked to the internet through the
33. Computer can be linked to the internet through the
32. System in a computer which translates an IP address into an easier name is called
32. System in a computer which translates an IP address into an easier name is called
68. ____________ cookies are temporary and are deleted when the browser is closed.
68. ____________ cookies are temporary and are deleted when the browser is closed.
80. _____________ is a software extension that adds extra features to a program
80. _____________ is a software extension that adds extra features to a program
79. There are three commonly used types of chat. They are IM(instant messaging), ICQ("I seek you"), and ___________.
79. There are three commonly used types of chat. They are IM(instant messaging), ICQ("I seek you"), and ___________.
78. ___________is basically a telephone connection over the Internet.
78. ___________is basically a telephone connection over the Internet.
77. Find out the primary domain name from the example given below: www.geeksforgeeks.org
77. Find out the primary domain name from the example given below: www.geeksforgeeks.org
76. Expand URL.
76. Expand URL.
75. ____________are messages that web servers pass to your web browser when you visit Internet sites.
75. ____________are messages that web servers pass to your web browser when you visit Internet sites.
74. A _____________is a unique name that identifies a website.
74. A _____________is a unique name that identifies a website.
73. Find generic TLDs from the following:
73. Find generic TLDs from the following:
72. Expand WWW.
72. Expand WWW.
71. ____________ is called the heart of the OSI layer.
71. ____________ is called the heart of the OSI layer.
70. What are the typical switching techniques available for digital traffic?
70. What are the typical switching techniques available for digital traffic?
69. The concept of WWW was designed in _____.
69. The concept of WWW was designed in _____.
81. In 1969, the US govt formed an agency named _______________ to connect computers at various universities and defense agencies.
81. In 1969, the US govt formed an agency named _______________ to connect computers at various universities and defense agencies.
67. A ______________ consists of many web pages linked together in a coherent fashion.
67. A ______________ consists of many web pages linked together in a coherent fashion.
66. __________is the technique by which nodes control or switch data to transmit it between specific points on a network.
66. __________is the technique by which nodes control or switch data to transmit it between specific points on a network.
65. Internet was formed in the year ______________
65. Internet was formed in the year ______________
64. In the 1980s, _____________________ was started to make a high-capacity network to be strictly for academic and engineering research.
64. In the 1980s, _____________________ was started to make a high-capacity network to be strictly for academic and engineering research.
63. What is internet?
63. What is internet?
62. To join the internet, the computer has to be connected to a _________
62. To join the internet, the computer has to be connected to a _________
61. Internet access by transmitting digital data over the wires of a local telephone network is provided by _______
61. Internet access by transmitting digital data over the wires of a local telephone network is provided by _______
60. ISP exchanges internet traffic between their networks by __________
60. ISP exchanges internet traffic between their networks by __________
59. Which of the following protocols is used in the internet?
59. Which of the following protocols is used in the internet?
58. The size of an IP address in IPv6 is _________
58. The size of an IP address in IPv6 is _________
57. Internet works on ______
57. Internet works on ______