All Exams  >   Bank Exams  >   Computer Awareness for Competitive Exams  >   All Questions

All questions of Internet for Bank Exams Exam

The idea for the invention of the internet was derived from _________.
  • a)
    IBM
  • b)
    Microsoft
  • c)
    ARPANET
  • d)
    INTRANET
  • e)
    Web
Correct answer is option 'C'. Can you explain this answer?

Sameer Yadav answered
The Invention of the Internet: Derived from ARPANET

The idea for the invention of the internet was derived from ARPANET. ARPANET, which stands for Advanced Research Projects Agency Network, was a pioneering packet-switching network and the first network to implement the TCP/IP protocol suite.

ARPANET: The Precursor to the Internet

- ARPANET was developed by the United States Department of Defense's Advanced Research Projects Agency (ARPA) in the late 1960s. It was initially created to connect computers at various research institutions and universities.
- The aim of ARPANET was to provide a decentralized network that could withstand a nuclear attack, making it a robust and reliable means of communication even in the event of a disaster.
- ARPANET used packet switching, a method of dividing data into small packets and routing them independently across a network. This was a significant departure from traditional circuit-switching networks, which required a dedicated connection for the duration of a communication.
- The development of ARPANET was a collaborative effort involving multiple research institutions, including universities such as UCLA, Stanford, and MIT.
- The first ARPANET connection was established in 1969 between UCLA and the Stanford Research Institute (SRI).
- Over time, ARPANET expanded to include more nodes and institutions, creating a network that spanned multiple geographic locations.

The Birth of the Internet

- The invention of the internet can be traced back to the development and evolution of ARPANET.
- In the early 1970s, the TCP/IP protocol suite was developed by a team led by Vinton Cerf and Robert Kahn. TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, provided a standardized way for different computer networks to communicate with each other.
- The integration of TCP/IP into ARPANET laid the foundation for the modern internet. It allowed different networks, including ARPANET, to interconnect and exchange data seamlessly.
- As more networks adopted TCP/IP, the internet grew in size and popularity. The internet eventually expanded beyond its military and academic origins to become a global network accessible to the general public.

Conclusion

In conclusion, the idea for the invention of the internet was derived from ARPANET. ARPANET served as a precursor to the internet, providing the foundation for the development of the TCP/IP protocol suite and the interconnection of various computer networks. The integration of TCP/IP into ARPANET enabled the creation of a global network that revolutionized communication and information exchange. The internet has since become an indispensable tool for individuals, businesses, and governments worldwide.
1 Crore+ students have signed up on EduRev. Have you? Download the App

What is a cookie?
  • a)
    An internet information file
  • b)
    An intranet file
  • c)
    An image file
  • d)
    A sound driver file
  • e)
    A graphic card
Correct answer is option 'A'. Can you explain this answer?

What is a cookie?

A cookie is a small piece of data that is sent from a website and stored on the user's computer or device by the user's web browser. It is used to remember information about the user or their preferences, and can be accessed by the website or other websites that recognize the cookie.

Explanation:

Cookies were introduced to provide a way for websites to remember information about the user and enhance their browsing experience. They are primarily used to:

1. Store user preferences: Cookies can remember specific settings or preferences chosen by the user, such as language preference, theme, or font size. This allows the website to customize the user's experience based on their preferences.

2. Maintain user sessions: When a user logs into a website, a cookie can be set to maintain their session and keep them logged in across different pages or visits. This eliminates the need for the user to log in again on each page.

3. Track user behavior: Cookies can be used to collect information about how users interact with a website, such as the pages they visit, the links they click, or the time spent on each page. This data can be used for analytics purposes to improve the website's performance and user experience.

4. Targeted advertising: Cookies can be used to track user behavior and display personalized advertisements based on their interests and browsing history. This allows advertisers to deliver more relevant ads to the user.

Types of cookies:

There are different types of cookies that serve different purposes:

- Session cookies: These cookies are temporary and are only stored during a user's browsing session. They are deleted when the browser is closed.

- Persistent cookies: These cookies are stored on the user's device for a specific period of time, even after the browser is closed. They are used to remember user preferences and settings.

- Third-party cookies: These cookies are set by third-party websites or advertisers and are used to track user behavior across different websites. They are often used for targeted advertising.

- Secure cookies: These cookies are only sent over encrypted connections (HTTPS) to ensure that the data stored in them is secure and cannot be accessed by unauthorized parties.

In conclusion, a cookie is an internet information file that is stored on the user's computer or device by the web browser. It is used to remember user preferences, maintain sessions, track user behavior, and enable targeted advertising.

A computer connected to a LAN (Local Area Network) can
  • a)
    run faster
  • b)
    go online
  • c)
    share information and/or share peripheral equipment
  • d)
    send e-mail
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Explanation:

A Local Area Network (LAN) is a network that connects computers and devices within a limited area, such as a home, office, or school. It allows connected devices to share information, resources, and peripheral equipment. Here is a detailed explanation of why option 'C' is the correct answer:

Sharing Information:
One of the main purposes of a LAN is to enable devices to share information. When computers are connected to a LAN, they can easily transfer files, documents, and data between each other. This allows for better collaboration and efficient communication within the network.

Sharing Peripheral Equipment:
Another benefit of a LAN is the ability to share peripheral equipment. Peripheral devices such as printers, scanners, and storage devices can be connected to a central server or a designated computer on the network. All other devices on the LAN can then access and use these peripherals, eliminating the need for individual devices for each computer.

Running Faster:
While being connected to a LAN does not directly make a computer run faster, it can enhance network performance. LANs typically have higher data transfer speeds compared to external internet connections. This means that data transfers between devices within the LAN can happen at faster rates, improving overall network performance.

Sending Email:
Being connected to a LAN enables computers to send and receive emails. LANs can be set up with email servers that handle incoming and outgoing email traffic. This allows users on the network to send emails to each other and to external email addresses.

Going Online:
While being connected to a LAN provides access to shared resources and devices within the network, it does not necessarily provide direct access to the internet. Additional network configurations, such as a router or gateway, are required to connect the LAN to the internet. Therefore, option 'B' is not correct in this case.

In conclusion, a computer connected to a LAN can share information and peripheral equipment, making option 'C' the correct answer.

DSL is an example of which connection _____.
  • a)
    Network
  • b)
    Wireless
  • c)
    LAN
  • d)
    Broadband
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

Aisha Gupta answered
DSL (Digital Subscriber Line) is an example of a broadband connection for high-speed internet connection. Broadband connections provide high-speed data and lower installation costs that replaced the Dial-up connections. The other forms of broadband internet access are fiber-optic, cable, and satellite.

Which of the following is an example of a top-level domain (TLD)?
  • a)
    .com
  • b)
    www
  • c)
    http
  • d)
    ftp
  • e)
    .net
Correct answer is option 'A'. Can you explain this answer?

Top-Level Domain (TLD)

A top-level domain (TLD) is the last segment of a domain name, located to the right of the dot. It represents the highest level in the hierarchical domain name system (DNS) structure. TLDs are used to categorize and group websites based on their purpose, location, or organization.

Example of a TLD:

a).com

Explanation:

The correct answer is option 'A' - .com.

- The TLD ".com" stands for "commercial" and is the most popular and widely recognized TLD. It is primarily used for commercial and for-profit websites.
- The TLD ".com" is often associated with businesses and is commonly used by companies worldwide to establish their online presence.
- Many well-known websites and brands, such as Google, Facebook, and Amazon, have domain names that end with ".com".

Other TLDs:

b).net

- The TLD ".net" stands for "network" and was initially intended for network infrastructure and internet service providers.
- However, it is now used by a wide range of websites and organizations, including businesses, non-profit organizations, and personal websites.

c).www

- "www" is not a TLD but a subdomain prefix commonly used to indicate the World Wide Web. It is not a part of the TLD but rather a convention to specify the web server.

d).http

- "http" is not a TLD but a protocol prefix (Hypertext Transfer Protocol) used to communicate between a web browser and a web server.

e).ftp

- "ftp" is not a TLD but a protocol prefix (File Transfer Protocol) used for transferring files between a client and a server.

In summary, the example of a TLD among the given options is ".com". TLDs play a crucial role in identifying the purpose and nature of a website's domain name.

Which of the following utilities is used to monitor and restrict the file transfer between two networks?
  • a)
    Web server
  • b)
    Web bionic
  • c)
    Firewall
  • d)
    Chrome 09
  • e)
    Firefox
Correct answer is option 'C'. Can you explain this answer?

Anu Bose answered
Firewall
Firewall is the utility used to monitor and restrict the file transfer between two networks. It acts as a barrier between an internal network and external networks, such as the internet, and controls incoming and outgoing network traffic based on predetermined security rules.

Monitoring and Restricting File Transfer
- Firewall software can monitor the data packets passing through it and determine whether they meet the security criteria set by the network administrator.
- It can restrict file transfers by blocking certain types of traffic or specific ports that are commonly used for file transfers.
- Firewalls can also detect and prevent unauthorized access attempts and data breaches, thus protecting the network from potential security threats.

Types of Firewalls
- There are several types of firewalls, including network layer firewalls, application layer firewalls, and proxy firewalls, each with its own set of features and capabilities.
- Network layer firewalls filter traffic based on IP addresses and ports, while application layer firewalls inspect the content of data packets to make decisions.
- Proxy firewalls act as intermediaries between internal and external networks, providing an additional layer of security by hiding the internal network's IP addresses.

Importance of Firewalls
- Firewalls are essential for maintaining network security and preventing unauthorized access to sensitive data.
- They help organizations comply with regulatory requirements and protect their assets from cyber threats.
- By monitoring and restricting file transfers, firewalls play a crucial role in safeguarding the integrity and confidentiality of data transmitted over networks.

Which of the following is a valid IP address?
  • a)
    192.168.111.1111
  • b)
    192.168.1.1
  • c)
    192.168.900.1
  • d)
    192.900.168.1
  • e)
    None of these
Correct answer is option 'B'. Can you explain this answer?

Raj Mehta answered
Valid IP Address: 192.168.1.1

Explanation:
An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It is made up of four sets of numbers separated by periods, ranging from 0 to 255.

To determine whether an IP address is valid or not, we need to consider the following rules:

1. Each set of numbers in the IP address must be between 0 and 255.
2. Each set of numbers should not contain leading zeros (except for the number zero itself).
3. There should be exactly four sets of numbers separated by periods.

Let's analyze each option:

a) 192.168.111.1111
This IP address has an extra digit in the last set of numbers. The maximum value for each set is 255, so 1111 is not a valid number. Therefore, option a) is not a valid IP address.

b) 192.168.1.1
This IP address meets all the rules. Each set of numbers is between 0 and 255, there are no leading zeros, and there are four sets of numbers separated by periods. Therefore, option b) is a valid IP address.

c) 192.168.900.1
This IP address has a number (900) in the third set that is greater than 255. According to the rules, each set must be between 0 and 255. Therefore, option c) is not a valid IP address.

d) 192.900.168.1
This IP address has a number (900) in the second set that is greater than 255. According to the rules, each set must be between 0 and 255. Therefore, option d) is not a valid IP address.

e) None of these
This option indicates that none of the given options is a valid IP address, except for option b) which is a valid IP address.

In conclusion, the valid IP address among the given options is option b) 192.168.1.1.

Which of the following terms identifies a specific computer on the web and the main page of the entire site?
  • a)
    URL
  • b)
    Website address
  • c)
    Hyperlink
  • d)
    Domain name
  • e)
    None of these
Correct answer is option 'A'. Can you explain this answer?

Parth Joshi answered
URL:
A URL (Uniform Resource Locator) identifies a specific computer on the web and the main page of the entire site.

Explanation:
- A URL is the address used to access a specific webpage on the internet.
- It consists of several components, including the protocol (such as http or https), the domain name (such as google.com), and the specific page or resource being accessed.
- The main page of a website is often represented by a URL that ends with a slash (/) or does not contain any additional page-specific information.

Example:
- For example, the URL "
https://www.edurev.in/
" refers to the main page of the EduRev website.
- In this URL, "https://" is the protocol, "www.edurev.in" is the domain name, and the slash at the end indicates the main page of the site.

Importance:
- Understanding and using URLs correctly is essential for navigating the web and accessing specific web pages.
- Knowing the URL of a website's main page can help users easily access the desired content without having to navigate through multiple pages or links.

Which organization is responsible for the allocation and assignment of IP addresses globally?
  • a)
    IETF
  • b)
    ISP
  • c)
    ICANN
  • d)
    IANA
  • e)
    IEEE
Correct answer is option 'C'. Can you explain this answer?

Aditya Ghoshal answered
ICANN (Internet Corporation for Assigned Names and Numbers)
ICANN is responsible for the allocation and assignment of IP addresses globally. Here is how it carries out this crucial task:

IP Address Allocation
- ICANN oversees the allocation of IP addresses to Regional Internet Registries (RIRs) such as ARIN, RIPE NCC, and APNIC.
- RIRs then allocate IP addresses to Internet Service Providers (ISPs) and other organizations within their respective regions.

Global Coordination
- ICANN ensures that the IP address allocation process is coordinated globally to prevent duplication and ensure efficient use of IP address space.
- It also works with RIRs to develop policies and procedures for IP address management.

IANA (Internet Assigned Numbers Authority)
- While ICANN is responsible for policy development and oversight, IANA is the entity that actually allocates and assigns IP address blocks to RIRs.
- IANA works closely with ICANN to ensure that IP address allocations are made according to established policies and guidelines.
In conclusion, ICANN plays a crucial role in the global allocation and assignment of IP addresses, working in coordination with RIRs and IANA to ensure the smooth functioning of the Internet.

Which one of the following is not a broadband communication medium?
  • a)
    Microwave
  • b)
    Fibre optic cable
  • c)
    Twisted pair
  • d)
    Coaxial cable
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Maya Kaur answered
Explanation:
Broadband communication refers to high-speed transmission of data over a wide range of frequencies. It allows for the simultaneous transmission of multiple signals and enables faster and more efficient communication. There are several mediums used for broadband communication, but one of them is not considered a broadband communication medium. Let's analyze each option to determine which one is not a broadband communication medium.

Microwave:
Microwave communication involves the use of high-frequency radio waves to transmit data. It is commonly used for point-to-point communication over short to medium distances. Microwaves can transmit large amounts of data and are often used for wireless broadband connections.

Fibre optic cable:
Fibre optic cable is a medium that uses thin strands of glass or plastic to transmit data using light signals. It offers high data transfer rates, low latency, and is capable of transmitting large amounts of data over long distances. Fibre optic cable is widely used for broadband internet connections.

Twisted pair:
Twisted pair refers to a type of cable that consists of two insulated copper wires twisted together. It is commonly used for telephone and Ethernet connections. While twisted pair cables can transmit data, they are not typically used for broadband communication due to their lower data transfer rates and limited bandwidth.

Coaxial cable:
Coaxial cable consists of a central conductor surrounded by an insulating layer, a metallic shield, and an outer insulating layer. It is commonly used for cable television and broadband internet connections. Coaxial cables offer high bandwidth and can transmit large amounts of data over long distances.

Conclusion:
Based on the analysis of the options, it can be concluded that twisted pair cable is not a broadband communication medium. While it can transmit data, it is not typically used for broadband communication due to its lower data transfer rates and limited bandwidth.

What are empty elements and is it valid?
  • a)
    No, there is no such terms as Empty Element
  • b)
    Empty elements are element with no data
  • c)
    No, it is not valid to use Empty Element
  • d)
    All of the above
  • e)
    None of these
Correct answer is option 'B'. Can you explain this answer?

Empty Elements in HTML

Empty elements, also known as self-closing tags or void elements, are HTML elements that do not require a closing tag. They are used to insert content into a webpage without any additional information or data. In other words, empty elements are elements that do not have any content or nested elements.

Examples of Empty Elements

Here are some common examples of empty elements in HTML:

1. img: The element is used to display an image on a webpage. It does not have a closing tag and is self-closing. The source of the image is specified by the src attribute.

2. br: The
element is used to insert a line break or a new line in the content. It is also self-closing and does not require a closing tag.

3. input: The element is used to create a variety of form controls such as text fields, checkboxes, radio buttons, etc. It is an empty element and does not have a closing tag.

4. hr: The
element is used to create a horizontal line or a divider between sections of content. It is self-closing and does not require a closing tag.

5. meta: The element is used to provide metadata about an HTML document. It is commonly used to specify the character encoding, viewport settings, and other information. It is an empty element and does not have a closing tag.

Validity of Empty Elements

Empty elements are valid and widely used in HTML. They serve specific purposes and provide a way to insert content or define settings without any additional information. The HTML specification allows for the use of empty elements, and web browsers are designed to handle them correctly.

It's important to note that empty elements should be used in the appropriate context and according to their intended purpose. Each empty element has specific attributes and properties that can be used to customize their behavior and appearance.

In conclusion, empty elements are valid HTML elements that do not require a closing tag. They are used to insert content or define settings without any additional information. Examples of empty elements include ,
, ,
, and .

To take information from one source and bring it to your computer is referred to as_____.
  • a)
    Upload
  • b)
    Download
  • c)
    Transfer
  • d)
    De-link
  • e)
    None of the above
Correct answer is option 'B'. Can you explain this answer?

Tarun Khanna answered
Download is the correct answer.

Explanation:
When we want to transfer information from one source to our computer, the process is known as downloading. It involves the retrieval of data from a remote server or another computer and saving it onto our local device.

Process of Downloading:
1. Request: We initiate the download process by sending a request to the server or source from which we want to obtain the data.

2. Transfer: The server then transfers the requested data to our computer over a network connection. This data can include various types of files such as documents, images, videos, software, etc.

3. Saving: Once the data is received, our computer stores it in a specified location, usually in a folder or directory of our choice. This allows us to access and use the downloaded files whenever needed.

Comparison with Other Options:
- Upload: Uploading refers to sending data or files from our computer to a remote server or another computer. It is the opposite of downloading.
- Transfer: While transfer can be a general term for moving data between devices, in the context of the given question, it specifically refers to the act of downloading information from one source to our computer.
- De-link: De-linking does not involve the process of transferring or retrieving data. It refers to removing a link or connection between two entities, such as unlinking a webpage from a website.

Hence, the correct term for taking information from one source and bringing it to our computer is downloading.

Internet is
  • a)
    Complex system
  • b)
    Decentralized system
  • c)
    Dynamic system
  • d)
    All of these
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

Internet is a complex, decentralized, and dynamic system. Let's understand each of these characteristics in detail:

Complex System:
- The internet is a complex system because it is made up of a large number of interconnected elements such as computers, servers, routers, and data centers.
- It consists of various protocols, standards, and technologies that work together to ensure the smooth functioning of the network.
- The complexity of the internet arises from the vast amount of data being transmitted, the diverse range of devices connected, and the constant evolution of technologies and applications.

Decentralized System:
- The internet is a decentralized system as it does not have a central governing authority or a single point of control.
- It is composed of a network of interconnected devices, each with its own unique IP address, which allows for peer-to-peer communication.
- Decentralization ensures that the internet remains resilient and resistant to failures or attacks since there is no single point of failure.
- It also promotes freedom of expression and innovation, as users can freely access and share information without censorship or control from a central authority.

Dynamic System:
- The internet is a dynamic system because it is constantly evolving and adapting to new technologies, applications, and user needs.
- New protocols and standards are developed, existing technologies are upgraded, and new services and applications are introduced regularly.
- The internet's infrastructure, such as routers and switches, can dynamically route traffic based on network conditions to ensure efficient data transmission.
- The dynamic nature of the internet allows for scalability, flexibility, and the ability to accommodate the growing demands of users and applications.

All of These:
- Considering the above explanations, it is clear that the internet possesses all of these characteristics: complexity, decentralization, and dynamism.
- These characteristics collectively define the nature and functioning of the internet as we know it today.

In conclusion, the internet is a complex, decentralized, and dynamic system that enables global connectivity, information sharing, and communication. Its complexity arises from the vast network of interconnected devices and technologies. Its decentralization ensures resilience and promotes freedom of expression. Its dynamic nature allows for continuous growth, innovation, and adaptation to changing needs.

What does the term "DDoS" stand for in the context of cybersecurity?
  • a)
    Distributed Data Storage
  • b)
    Dual Detection of Security
  • c)
    Dynamic Domain System
  • d)
    Distributed Denial of Service
  • e)
    Data Defragmentation and Sorting
Correct answer is option 'D'. Can you explain this answer?

Rahul Mehta answered
DDoS (Distributed Denial of Service) is a type of cyber attack where multiple compromised computers, known as a botnet, are used to flood a target website or network with excessive traffic, rendering it inaccessible to legitimate users.

What is the purpose of a search engine?
  • a)
    To protect against viruses and malware
  • b)
    To provide website hosting services
  • c)
    To transmit data over the Internet
  • d)
    To index and retrieve information from the web
  • e)
    To manage network infrastructure
Correct answer is option 'D'. Can you explain this answer?

Rhea Reddy answered
Search engines are online tools that index and organize vast amounts of web content, allowing users to search for specific information. They use algorithms to retrieve relevant web pages based on keywords or queries entered by users.

What is the full form of ADSL?
  • a)
    Asymmetric Digital Subscriber Line
  • b)
    Accelerated Digital Subscriber Line
  • c)
    Accelerated Digitized Subscriber Line
  • d)
    Analogous Digital Service Line
  • e)
    Asynchronous Data Subscriber Line
Correct answer is option 'A'. Can you explain this answer?

Tanishq Shah answered
ADSL stands for Asymmetric Digital Subscriber Line.

ADSL is a type of digital subscriber line (DSL) technology that enables high-speed internet access over traditional copper telephone lines. It is called "asymmetric" because it provides different upload and download speeds.

Explanation:

ADSL technology allows data to be transmitted over existing copper telephone lines, which are widely available and already installed in most homes and businesses. It uses a frequency division multiplexing (FDM) technique to separate voice and data signals on the same line.

Key Features of ADSL:

1. Asymmetric: ADSL provides different upload and download speeds. The download speed is typically faster than the upload speed. This is because most internet users require faster download speeds for activities like streaming, browsing, and downloading files, while upload speeds are typically used for activities like sending emails and uploading files.

2. Digital: ADSL converts analog signals into digital signals, allowing for faster and more efficient data transmission over the telephone lines.

3. Subscriber Line: ADSL is a technology that enables high-speed internet access for individual subscribers over their existing telephone lines. It is designed to be compatible with the existing telephone infrastructure.

Benefits of ADSL:

1. High-Speed Internet Access: ADSL provides fast internet access speeds, allowing users to stream videos, download files, and browse the web quickly.

2. Wide Availability: Since ADSL uses existing telephone lines, it is widely available in many areas, especially in urban and suburban locations.

3. Cost-Effective: ADSL is a cost-effective solution for high-speed internet access, as it eliminates the need for laying dedicated cables or fiber optic lines.

4. Easy Installation: ADSL can be easily installed by service providers without the need for significant infrastructure changes.

5. Simultaneous Voice and Data: ADSL allows for simultaneous voice and data transmission over the same line, providing both internet access and telephone service.

In conclusion, ADSL (Asymmetric Digital Subscriber Line) is a technology that enables high-speed internet access over traditional copper telephone lines. It provides different upload and download speeds, making it suitable for various internet activities. ADSL is cost-effective, widely available, and easy to install, making it a popular choice for high-speed internet access.

If a computer on the network shares resources for others to use, it is called _____.
  • a)
    Server
  • b)
    Client
  • c)
    Peer
  • d)
    Mainframe
  • e)
    None of these
Correct answer is option 'A'. Can you explain this answer?

Sakshi Bose answered
Answer:

Server

A computer on a network that shares resources for others to use is called a server. A server is a device or computer program that provides services to other computers or clients on the network. It acts as a central hub that manages network resources and enables communication between clients.

Types of Servers:
- File Server: A file server is a computer that stores files and allows other computers on the network to access and retrieve those files. It provides shared storage space for documents, images, videos, and other files.
- Print Server: A print server manages printers on the network and allows users to send print jobs from their computers to the printer. It controls the printing process and ensures efficient utilization of printer resources.
- Web Server: A web server hosts websites and web applications. It delivers web content to clients who request it through a web browser. Web servers handle requests for web pages, process server-side scripts, and transmit the requested data back to the client.
- Database Server: A database server stores and manages databases. It provides access to the database for clients and handles queries and transactions. Database servers ensure data integrity and security.
- Mail Server: A mail server manages email communication within a network. It handles the sending, receiving, and storage of emails. Mail servers use protocols such as SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol) to facilitate email exchange.

Server Characteristics:
- Reliability: Servers are designed to be highly reliable and available. They often have redundant components, such as power supplies and hard drives, to prevent downtime.
- Scalability: Servers can handle a large number of client requests and can be scaled up or down depending on the network's needs.
- Security: Servers have built-in security measures to protect against unauthorized access and data breaches.
- Performance: Servers are optimized for performance and can handle resource-intensive tasks efficiently.

In conclusion, a computer on a network that shares resources for others to use is called a server. Servers play a crucial role in managing and providing various services on a network, such as file sharing, printing, web hosting, database management, and email communication.

Which of the following protocols is used for secure communication over the Internet?
  • a)
    HTTP
  • b)
    FTP
  • c)
    HTTPS
  • d)
    TCP/IP
  • e)
    SMTP
Correct answer is option 'C'. Can you explain this answer?

HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over the Internet. It adds an extra layer of security by encrypting the data exchanged between a web browser and a website, ensuring privacy and protection against eavesdropping and tampering.

Which of the following is TRUE only for XML but NOT HTML?
  • a)
    It is derived from SGML
  • b)
    It describes content and layout
  • c)
    It allows user defined tags
  • d)
    It is restricted only to be used with web browsers
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

User defined tags are only allowed in XML, not in HTML. SGML stands for Standard Generalized Markup Language and it was extended to HTML and XML. Both XML and HTML are used to describe the content and layout of webpages and are used with web browsers.
Hence, the correct option is that it allows user defined tags.

Computer and communication technology, such as communication links to the internet, that provide help and understanding to the end user is known as _____.
  • a)
    Presentation file
  • b)
    Information Technology
  • c)
    Program
  • d)
    Worksheet file
  • e)
    FTP
Correct answer is option 'B'. Can you explain this answer?

Aisha Gupta answered
Information Technology is the study that deals with systems and how to use them. In Information Technology, we learn how to send, receive and store data in systems. Systems are mainly computers and other telecommunication devices. We can say that all the understanding related to computers and communication technology comes under IT.
Also, all the hardware and software components of computer networks come under Information Technology that helps establish the connection between the user and the world of the Internet.
Hence, Information Technology is the correct answer.

Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an _____.
  • a)
    Internet service provider
  • b)
    Internet access provider
  • c)
     Application service provider
  • d)
    Application access provider
  • e)
    Outsource agency
Correct answer is option 'D'. Can you explain this answer?

Mainak Ghosh answered
Answer:

An Application Access Provider is a company that hosts and runs an application for another company over the Internet. They provide access to the application, allowing users to use the application remotely. In this scenario, the company contracted to host and run the application for your business over the Internet is an Application Access Provider.

Explanation:

When a business wants to use an application but does not want to go through the hassle of hosting and maintaining the application themselves, they can contract with an Application Access Provider. This allows the business to access and use the application remotely, without the need to install or manage the application on their own servers.

Benefits of using an Application Access Provider:

- Cost savings: By outsourcing the hosting and management of the application to an external provider, the business can save on infrastructure costs, such as servers and network equipment, as well as the operational costs of maintaining the application.

- Scalability: An Application Access Provider typically has the resources and infrastructure to scale the application as needed. This means that as the business grows or experiences peak usage, the provider can easily accommodate the increased demand.

- Expertise: Application Access Providers specialize in hosting and managing applications. They have the expertise and experience to ensure the application is secure, reliable, and performs optimally.

- Flexibility: Using an Application Access Provider allows the business to access the application from anywhere with an internet connection. This provides flexibility for employees who may need to work remotely or access the application while on the go.

- Focus on core business: By outsourcing the hosting and management of the application, the business can focus on its core competencies and leave the technical aspects to the provider.

In conclusion, an Application Access Provider is a company that hosts and runs an application for another company over the Internet. They provide access to the application, allowing users to use the application remotely. This arrangement offers various benefits, including cost savings, scalability, expertise, flexibility, and the ability to focus on core business activities.

An http request contains _____ parts.
  • a)
    2
  • b)
    5
  • c)
    3
  • d)
    4
  • e)
    1
Correct answer is option 'C'. Can you explain this answer?

Rhea Reddy answered
An HTTP request consists of three parts.
The first part is the message description in the start line. Also called the request line, this line begins with a method token, followed by the Request-URI and the protocol version ending with CRLF. 
Also known as header fields, the next part attributes in a block of headers. The request-header area allows the client to pass some additional information regarding the request and about the client itself to the server. Such fields act as request modifiers.
Finally, we have an optional part called the message body with the data contained in it.
Hence, 3 Is the correct answer.

What is the purpose of a CAPTCHA?
  • a)
    To protect against spam emails
  • b)
    To verify the identity of a user
  • c)
    To block access to certain websites
  • d)
    To prevent unauthorized access to a network
  • e)
    To enhance internet speed
Correct answer is option 'B'. Can you explain this answer?

Krish Iyer answered
Verification of User Identity
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. Its primary purpose is to verify that the user trying to access a website or service is actually a human and not a bot. Here's why CAPTCHAs are used for verifying user identity:

Preventing Automated Attacks
CAPTCHAs are designed to prevent automated software, or bots, from carrying out malicious activities on websites. By presenting a challenge that is easy for a human to solve but difficult for a bot, CAPTCHAs help ensure that only legitimate users can access the website.

Protecting Against Credential Stuffing
CAPTCHAs are also used to protect against credential stuffing attacks, where attackers use automated tools to try large numbers of username and password combinations to gain unauthorized access to user accounts. By requiring users to solve a CAPTCHA before logging in, websites can prevent these types of attacks.

Enhancing Security
In addition to verifying user identity, CAPTCHAs can also enhance the overall security of a website or service. By adding an extra layer of protection, CAPTCHAs make it more difficult for attackers to exploit vulnerabilities and carry out malicious activities.

Conclusion
In conclusion, the primary purpose of a CAPTCHA is to verify the identity of a user and prevent automated bots from carrying out malicious activities. By presenting a challenge that is difficult for bots to solve, CAPTCHAs help enhance security and protect against various types of attacks.

A network communication between applications is established and maintained according to the ___________ standard.
  • a)
    IP address
  • b)
    HTTP
  • c)
    Web
  • d)
    TCP
  • e)
    URL
Correct answer is option 'D'. Can you explain this answer?

Akanksha Patel answered
Network Communication and Application Standards

Network communication between applications is established and maintained according to certain standards that define the protocols and rules for data transmission. One of the most important standards is the Transmission Control Protocol (TCP).

TCP - Transmission Control Protocol

TCP is a widely used transport layer protocol that provides reliable communication over an IP network. It ensures that data packets are delivered in the correct order and without errors. TCP establishes a connection-oriented communication between applications, meaning that a connection is established before data is transmitted.

Establishing a Connection

When two applications want to communicate with each other over a network, TCP follows a three-way handshake process to establish a connection:

1. SYN: The client sends a SYN (synchronize) packet to the server, indicating its desire to establish a connection.
2. SYN-ACK: The server responds with a SYN-ACK packet, acknowledging the request and indicating its willingness to establish a connection.
3. ACK: The client sends an ACK (acknowledge) packet back to the server, confirming the connection establishment.

Maintaining the Connection

Once the connection is established, TCP ensures the reliable transmission of data by implementing various mechanisms:

1. Segmentation: TCP breaks the data into smaller segments and assigns a sequence number to each segment. This allows the receiver to reassemble the segments in the correct order.
2. Acknowledgment: After receiving each segment, the receiver sends an acknowledgment (ACK) back to the sender. If the sender does not receive an ACK within a certain time, it retransmits the segment.
3. Flow control: TCP monitors the receiver's buffer capacity and adjusts the transmission rate accordingly to prevent overflow or underflow of data.
4. Congestion control: TCP detects network congestion by monitoring the round-trip time of packets and the number of unacknowledged packets. It reduces the transmission rate to alleviate congestion and prevent network collapse.

Conclusion

In summary, the establishment and maintenance of network communication between applications follow the TCP standard. TCP ensures reliable data transmission by establishing a connection through a three-way handshake process and implementing mechanisms such as segmentation, acknowledgment, flow control, and congestion control.

Which protocol is used for sending and receiving email messages?
  • a)
    HTTP
  • b)
    FTP
  • c)
    SMTP
  • d)
    POP3
  • e)
    TCP/IP
Correct answer is option 'C'. Can you explain this answer?

Rhea Reddy answered
SMTP (Simple Mail Transfer Protocol) is the standard protocol used for sending and receiving email messages over the Internet. It is responsible for the transmission of email between mail servers. POP3 (Post Office Protocol version 3) is used for retrieving emails from a mail server.

What is the purpose of a URL shortening service?
  • a)
    To increase website loading speed
  • b)
    To compress files for faster downloads
  • c)
    To simplify and share long website addresses
  • d)
    To encrypt sensitive data during transmission
  • e)
    To prevent unauthorized access to websites
Correct answer is option 'C'. Can you explain this answer?

Rahul Mehta answered
URL shortening services are used to convert long and complex website addresses into shorter, more manageable URLs. This simplifies the sharing of links, particularly on social media platforms, where character limits exist.

'WiFi' stands for
  • a)
    Wireless Form of Internet
  • b)
    Worldwide Featured Internet
  • c)
    Wireless Fidelity
  • d)
    Wired Internet
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Kabir Verma answered
WiFi (Wireless Fidelity) is a mechanism that allows users to exchange data wirelessly over a computer network. It is an underlying technology of wireless local area network (WLAN).

DSL is an example of __________ connection.
  • a)
    network
  • b)
    wireless
  • c)
    slow
  • d)
    broadband
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

Kavya Saxena answered
DSL is an example of broadband connection. Broadband is wide bandwidth data transmission which transports multiple signals and traffic types. The medium can be coaxial cable, optical fibre, radio or twisted pair. In the context of internet access, broadband is used to mean any high-speed internet access that is always on and faster than dial-up access over traditional analog or ISDN PSTN services.

Junk e-mail is also called
  • a)
    spam
  • b)
    spoof
  • c)
    cookie
  • d)
    spill
  • e)
    None of these
Correct answer is option 'A'. Can you explain this answer?

Junk e-mail is also called spam. It is often considered to be a junk mail or junk news group posting. Sending irrelevant messages or the same message to a large number of users over the internet for the purpose of advertisement or malicious intent is called spamming, and that content is called spam or junk.

What is the correct HTML for making a hyperlink?
  • a)
    <a url="http://www.company.com">company.com </a>
  • b)
    <a> http: //www.company.com</a>
  • c)
    <a href= "http://www.company.com">company</a>
  • d)
    <a name = "http://www.company.com"> company.com<(a)w>
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

<a href= "http://www.company.com">company</a>
is the correct HTML for making a hyperlink because, to make a hyperlink in an HTML page, use the <a> and </a> tags, which are the tags used to define the links. Hence, the correct option is
<a href= "http://www.company.com">company</a>.

What does the term "phishing" refer to in the context of cybersecurity?
  • a)
    A type of computer virus
  • b)
    A social engineering attack to steal sensitive information
  • c)
    A form of website encryption
  • d)
    A technique to block unwanted advertisements
  • e)
    A method to test network security
Correct answer is option 'B'. Can you explain this answer?

Rahul Mehta answered
Phishing is a cyber attack where attackers attempt to deceive individuals into revealing sensitive information such as usernames, passwords, or financial details. This is typically done through deceptive emails, fake websites, or other means to trick the victims into providing their confidential information.

Which protocol is used for retrieving emails from a mail server?
  • a)
    HTTP
  • b)
    FTP
  • c)
    SMTP
  • d)
    POP3
  • e)
    IMAP
Correct answer is option 'D'. Can you explain this answer?

POP3 (Post Office Protocol version 3) is a protocol used for retrieving email messages from a mail server. It allows users to download emails from the server to their local device, and by default, it removes the emails from the server once downloaded.

What is the purpose of a cookie in web browsing?
  • a)
    To store website passwords securely
  • b)
    To block unwanted advertisements
  • c)
    To enhance website design and layout
  • d)
    To remember user preferences and improve browsing experience
  • e)
    To prevent unauthorized access to websites
Correct answer is option 'D'. Can you explain this answer?

Rahul Mehta answered
Cookies are small text files stored on a user's computer by websites they visit. They are used to remember user preferences, such as login information, language preferences, and customized settings, improving the browsing experience by providing a personalized touch.

Which of the following has the fastest speed?
  • a)
    LAN
  • b)
    Token Bus
  • c)
    Ring
  • d)
    FDDI Ring
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

Aisha Gupta answered
The FDDI ring has the fastest speed of 100mbps. Fibre distributed data interface (FDDI), an optical data communication standard used for long-distance networks, provides communication with fibre optic lines up to, 200 Kilometres at a speed of 100
100 Megabits per second (Mbps). FDDI has dual primary and secondary communication rings.FDDI uses two rounds that are independent of each other and transmit data in opposite directions.
Hence, FDDI is the correct answer.

Which of the following is meant for viewing web pages?
  • a)
    Interpreter
  • b)
    OS
  • c)
    Browser
  • d)
    Website
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Aisha Gupta answered
Web browser
  • A browser is a software application used to enable computers users to locate and access web pages
  • The browser translates the basic HTML code that allows us to see images, text video, and listen to audio on the website, along with hyperlinks that let us travel to different web pages
  • The Web utilizes browsers, such as Internet Explorer or Firefox, to access web documents called web pages that are linked to each other via hyperlinks
Some commonly used web browsers are:
  • Internet Explorer: Internet Explorer (IE) is a web browser from Microsoft
  • Firefox: Firefox is a free, open-source web browser from Mozilla
  • Google Chrome: Google Chrome is a free, open-source web browser developed by Google
  • Opera: Opera is a free, fast, small and standard-compliant web browser developed by the Opera Software company
  • Netscape: Netscape was the first commercial web browser

A hybrid computer uses a _________ to convert digital signals from a computer into analog signals.
  • a)
    Modulator
  • b)
    Demodulator
  • c)
    Modem
  • d)
    Decoder
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Rahul Mehta answered
Modem: The full form of modem is modulator/demodulator. It is a tangible device. The main job of the modem is to help the computer to send and receive data by using a telephonic wire. A hybrid computer uses a modem to convert digital signals from a computer into analogue signals.
 
Thus the correct answer is Modem.

Which of the following used to identify individual mobile Phone?
  • a)
    MCC
  • b)
    IMSI
  • c)
    IMEI
  • d)
    MNC
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Rhea Reddy answered
IMEI (International Mobile Equipment Identity) is a 15-17-digit code assigned to every mobile phone.
  • This number is used by service providers to uniquely identify valid devices.
  • It is usually found printed on the inside of the phone's battery compartment but can be displayed on-screen on most phones by entering *#06# MMI Supplementary Service Code on the dialpad, or along with other system information in the Settings menu on the smartphone operating system. 

Which of the following is a secure method for website authentication?
  • a)
    FTP
  • b)
    SNMP
  • c)
    Telnet
  • d)
    SSH
  • e)
    RDP
Correct answer is option 'D'. Can you explain this answer?

Rahul Mehta answered
SSH (Secure Shell) is a network protocol that provides secure communication and authentication over an unsecured network. It is commonly used for secure remote administration of systems and secure file transfers.

What is the purpose of a VPN (Virtual Private Network)?
  • a)
    To increase internet speed
  • b)
    To encrypt data during transmission
  • c)
    To prevent unauthorized access to a network
  • d)
    To block access to certain websites
  • e)
    To enhance Wi-Fi connectivity
Correct answer is option 'B'. Can you explain this answer?

A VPN (Virtual Private Network) is a technology that establishes a secure and encrypted connection over the Internet, allowing users to access private networks remotely. It encrypts the data transmitted between the user's device and the VPN server, ensuring privacy and security.

What does the term "IoT" stand for?
  • a)
    Internet of Technology
  • b)
    Internet of Telecommunication
  • c)
    Internet of Things
  • d)
    Internet on Target
  • e)
    Internet over Time
Correct answer is option 'C'. Can you explain this answer?

Aisha Gupta answered
IoT (Internet of Things) refers to a network of interconnected physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity. These devices can exchange data and interact with each other, often without human intervention.

___maps domain names to their IP addresses.
  • a)
    Wi-Fi
  • b)
    DNS
  • c)
    HTML
  • d)
    XML
  • e)
    Java
Correct answer is option 'B'. Can you explain this answer?

Rhea Reddy answered
Domain Name System maps domain names to their IP addresses.
The Domain Name System is like a dictionary for the Internet. It employs a decentralized hierarchical naming system for IP addresses.
It bridges the gap between humans and web browsers. Since humans understand logical names for websites while the web browser deals with their IP addresses, it is important to map or translate them through a naming system.
For a web browser, a DNS lookup occurs, requiring no interaction from the user’s computer apart from the initial search request.
HTML and XML are markup languages for the web, while Java is a programming language used for writing logic. Wi-fi is wireless technology under IEEE standards for connecting devices.
Hence, DNS is the correct answer.

What is the purpose of a cookie in web browsing?
  • a)
    To store website passwords securely
  • b)
    To block unwanted advertisements
  • c)
    To enhance website design and layout
  • d)
    To remember user preferences and improve browsing experience
  • e)
    To prevent unauthorized access to websites
Correct answer is option 'D'. Can you explain this answer?

Rhea Reddy answered
Cookies are small text files stored on a user's computer by websites they visit. They are used to remember user preferences, such as login information, language preferences, and shopping cart contents. Cookies help personalize the browsing experience and improve website functionality.

The Internet Protocol (IP) is responsible for
  • a)
    bit ordering
  • b)
    fragmentation
  • c)
    routing
  • d)
    All of the above
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Nikita Singh answered
As a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the internet. Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. So, routing which is the process of moving data from one network to another by forwarding packets via gateways, is the correct answer.

Chapter doubts & questions for Internet - Computer Awareness for Competitive Exams 2024 is part of Bank Exams exam preparation. The chapters have been prepared according to the Bank Exams exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Bank Exams 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Internet - Computer Awareness for Competitive Exams in English & Hindi are available as part of Bank Exams exam. Download more important topics, notes, lectures and mock test series for Bank Exams Exam by signing up for free.

Top Courses Bank Exams

Signup to see your scores go up within 7 days!

Study with 1000+ FREE Docs, Videos & Tests
10M+ students study on EduRev