15 Questions MCQ Test SSC CGL Tier 2 - Study Material, Online Tests, Previous Year - Test: Internet- 2
Test: Internet- 2 for SSC CGL 2023 is part of SSC CGL Tier 2 - Study Material, Online Tests, Previous Year preparation. The Test: Internet- 2 questions and answers have been
prepared according to the SSC CGL exam syllabus.The Test: Internet- 2 MCQs are made for SSC CGL 2023 Exam. Find important
definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Internet- 2 below.
Solutions of Test: Internet- 2 questions in English are available as part of our SSC CGL Tier 2 - Study Material, Online Tests, Previous Year for SSC CGL & Test: Internet- 2 solutions in
Hindi for SSC CGL Tier 2 - Study Material, Online Tests, Previous Year course. Download more important topics, notes, lectures and mock
test series for SSC CGL Exam by signing up for free. Attempt Test: Internet- 2 | 15 questions in 30 minutes | Mock test for SSC CGL preparation | Free important questions MCQ to study SSC CGL Tier 2 - Study Material, Online Tests, Previous Year for SSC CGL Exam | Download free PDF with solutions
Detailed Solution for Test: Internet- 2 - Question 2
Search Engine: - A search engine is a software program that enables users to search for information on the internet by entering keywords or phrases. - It retrieves and displays a list of relevant websites, documents, or other resources based on the search query. Options: A:
- Macromedia Flash is a multimedia software program used for creating and delivering interactive content on the web, such as animations and games. - It is not a search engine. B:
- Google is a search engine and is one of the most popular and widely used search engines worldwide. - It allows users to search for information, images, videos, news, and more. - Google uses complex algorithms to index and rank web pages, providing users with relevant search results. C:
- Netscape is a web browser that was popular in the early days of the internet. - It is not a search engine. D:
Librarians’ Index to the Internet
- Librarians' Index to the Internet is a directory of websites selected and evaluated by librarians. - While it helps users find reliable and quality websites, it is not a search engine. Conclusion: - Among the given options, only Google is a search engine. - Macromedia Flash, Netscape, and Librarians' Index to the Internet are not search engines but serve different purposes.
The facilities available on the internet are
(i) Electronic mail
(ii) Remote login
(iii) File transfer
(iv) Word processing
Detailed Solution for Test: Internet- 2 - Question 3
The facilities available on the internet are: Electronic mail: - Electronic mail, or email, is a widely used facility on the internet. - It allows users to send and receive messages electronically. - Email can be used for communication purposes, both personal and professional. Remote login: - Remote login allows users to access another computer or network remotely. - It enables users to connect to a remote computer and access its resources. - Remote login is commonly used for remote troubleshooting, accessing files, and managing servers. File transfer: - File transfer is another facility available on the internet. - It allows users to transfer files from one computer to another. - File transfer can be done using protocols such as FTP (File Transfer Protocol) or through cloud storage services. Word processing: - Word processing is a facility that allows users to create, edit, and format documents. - There are various online word processing tools available on the internet. - Users can create and collaborate on documents in real-time using these tools. Answer: Option B: i, ii, iii.
Detailed Solution for Test: Internet- 2 - Question 4
Each computer connected to the internet must have a unique IP address.
Here is a detailed explanation:
1. What is an IP address?
An IP (Internet Protocol) address is a unique numerical identifier assigned to each device connected to a computer network.
It serves as a way to identify and communicate with devices over the internet.
IP addresses are divided into two types: IPv4 (32-bit) and IPv6 (128-bit).
2. Importance of unique IP address:
Each computer on the internet must have a unique IP address to establish a connection and communicate with other devices.
Without a unique IP address, there would be conflicts and confusion in routing data between devices.
IP addresses allow for the proper delivery of data packets across the internet.
3. Obtaining a unique IP address:
Internet Service Providers (ISPs) assign IP addresses to their customers.
Dynamic IP addresses are assigned temporarily and can change over time.
Static IP addresses are permanent and do not change.
Devices can also use Network Address Translation (NAT) to share a single IP address among multiple devices within a local network.
4. IP address format:
IPv4 addresses are written as four sets of numbers separated by periods (e.g., 192.168.0.1).
IPv6 addresses are written as eight groups of four hexadecimal digits separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
5. Role of routers:
Routers play a crucial role in connecting devices to the internet.
They assign unique IP addresses to devices within a local network and handle the routing of data packets to the appropriate destinations.
In conclusion, each computer connected to the internet requires a unique IP address to establish proper communication and data transfer. This unique identifier ensures that data packets are correctly routed between devices and allows for efficient connectivity across the internet.
Detailed Solution for Test: Internet- 2 - Question 5
Explanation: IP addresses are converted to a hierarchy of domain names: - An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. - IP addresses are converted to a hierarchy of domain names through a process called DNS (Domain Name System). - DNS translates human-friendly domain names (such as www.example.com) into IP addresses (such as 192.168.0.1) that computers can understand. How DNS converts IP addresses to a hierarchy of domain names: 1. DNS servers maintain a distributed database that maps domain names to IP addresses. 2. When a user enters a domain name in a web browser, the browser sends a request to a DNS server. 3. The DNS server looks up the IP address associated with the domain name in its database. 4. If the IP address is not found in the server's database, it queries other DNS servers until it finds the IP address. 5. Once the IP address is obtained, it is returned to the browser, which then establishes a connection to the corresponding device using the IP address. Advantages of converting IP addresses to a hierarchy of domain names: - Domain names are easier for humans to remember and use than IP addresses. - Domain names can be more descriptive and meaningful than IP addresses. - Domain names can be easily changed or updated without affecting the underlying IP address. Conclusion: IP addresses are converted to a hierarchy of domain names through the DNS system, which allows users to access websites and services using easy-to-remember domain names instead of numerical IP addresses.
Detailed Solution for Test: Internet- 2 - Question 6
Internet uses: - Packet switching: This is a method of transmitting data over a network by breaking it into small packets and sending them individually to their destination. The packets are then reassembled at the receiving end. This is the primary method used in the internet for data transmission. - Circuit switching: This is a method of establishing a dedicated communication path between two parties before any data transmission takes place. It is commonly used in traditional telephone networks, where a circuit is established for the duration of the call. However, it is not commonly used in the internet. - Telephone switching: This refers to the process of connecting telephone calls between different telephone lines. It involves the use of switches to route calls from the originating telephone line to the destination line. While the internet can support voice communication, it does not rely on traditional telephone switching methods. - Telex switching: Telex was a telegraphy network used for sending text-based messages between telex machines. It utilized circuit switching to establish a dedicated connection between two machines. However, telex networks have largely been replaced by more modern and efficient communication methods, including the internet. In conclusion, the primary method used in the internet for data transmission is packet switching, while circuit switching, telephone switching, and telex switching are used in other communication networks but are not commonly used in the internet.
Internet packet data structure consists of
(i) Source address
(ii) Destination address
(iii) Serial number of packets
(iv) Message bytes
(v) Control bits for error checking
(vi) Path identification bits
Detailed Solution for Test: Internet- 2 - Question 7
Explanation: The internet packet data structure consists of several components that are necessary for the successful transmission of data packets between source and destination addresses. These components include: 1. Source address: The IP address of the sender or source device. 2. Destination address: The IP address of the receiver or destination device. 3. Serial number of packets: Each packet is assigned a unique serial number to ensure proper sequencing during transmission. 4. Message bytes: The actual data or message being transmitted in the packet. 5. Control bits for error checking: These bits are used for error detection and correction during transmission. 6. Path identification bits: These bits help to identify the specific path or route that the packet should follow to reach its destination. Based on the given options, the correct answer is option C, which includes all the mentioned components (i, ii, iii, iv, and v) in the internet packet data structure. Option D includes an additional component (vi) of path identification bits, but it is not mentioned in the provided information. Therefore, the correct answer is option C.
Detailed Solution for Test: Internet- 2 - Question 8
Answer: The time taken by internet packets can vary depending on various factors. Let's explore these factors in detail: 1. Network Congestion: - Internet traffic and congestion can affect the time taken by packets to reach their destination. - During peak hours or in heavily congested networks, packets may experience delays. 2. Packet Size: - The size of the packet can also impact the time taken. - Larger packets may take longer to transmit compared to smaller packets. 3. Routing: - The route the packets take from the source to the destination can also affect the time taken. - Different routing paths may have varying latencies, causing differences in packet delivery time. 4. Network Quality: - The quality and stability of the network infrastructure can impact packet delivery time. - Unstable or unreliable networks may result in packet loss or increased latency. 5. Packet Priority: - Certain packets, such as real-time audio or video packets, may be given higher priority and transmitted faster. - However, this does not mean that the time taken by packets is irrelevant for audio packets. In conclusion, the time taken by internet packets can vary based on network congestion, packet size, routing, network quality, and packet priority. Therefore, option B is the correct answer, while option C is incorrect as the time taken is relevant for all types of packets, including audio packets.
Detailed Solution for Test: Internet- 2 - Question 9
Definition of an Extranet: An extranet is a private computer network that allows authorized users from different organizations to access shared information, collaborate, and communicate securely over the internet. Explanation: The correct answer is B: The intranets of two co-operating organizations interconnected via a secure leased line. - An extranet is an extension of an organization's intranet, which is a private network accessible only to employees or members of the organization. - It is used to provide controlled access to external parties such as suppliers, partners, or customers. - The extranet allows these external parties to connect to the organization's intranet and access specific resources or information based on their authorization level. - The connection between the two intranets is established via a secure leased line, ensuring the confidentiality and integrity of the data transmitted. - The extranet provides a secure and collaborative environment for organizations to share data, documents, and applications with their trusted partners, suppliers, or customers. - It enables efficient communication, streamlined business processes, and improved collaboration between organizations. Key Points: - An extranet is a private computer network. - It allows authorized users from different organizations to access shared information. - It enables collaboration and communication securely over the internet. - It is an extension of an organization's intranet. - It connects the intranets of two cooperating organizations. - The connection is established via a secure leased line.
Detailed Solution for Test: Internet- 2 - Question 10
Web Page Location The location of a web page is determined using a Uniform Resource Locator (URL). Let's break down the answer into headings and HTML bullet points to provide a detailed explanation: 1. Understanding URLs: - A URL is a string of characters that provides the address of a web resource, such as a web page, image, or document, on the internet. - It serves as a unique identifier for the location of the resource. 2. Components of a URL: A URL consists of several components, including: a. Protocol: - The protocol indicates the communication rules that the web browser and server should follow. - Common protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure). b. Domain Name: - The domain name is the address of the website or server. - It typically consists of a combination of words separated by periods, such as "example.com". c. Path: - The path specifies the specific location or file within the website. - It can include directories, subdirectories, and filenames. d. Query Parameters: - Query parameters are optional and are used to pass information to the web server. - They are typically added after the path and are indicated by a question mark followed by key-value pairs. 3. Example URL: Let's consider an example URL to better understand how it works:
- Protocol: https - Domain Name: www.example.com - Path: /products/item - Query Parameter: id=12345 In this example, the URL points to a web page located at the path "/products/item" on the domain "www.example.com". The query parameter "id=12345" might be used to retrieve specific information about a product. 4. Conclusion: In conclusion, a web page's location is determined using a Uniform Resource Locator (URL), which consists of various components, including the protocol, domain name, path, and optional query parameters. The URL serves as a unique identifier for the web resource's location on the internet.
Detailed Solution for Test: Internet- 2 - Question 11
Protocol Used to Report Error Messages The protocol used to report error messages is ICMP (Internet Control Message Protocol). ICMP is a network layer protocol that is responsible for reporting errors and providing diagnostic information in IP networks. It is an integral part of the Internet Protocol Suite and is used by network devices to communicate error messages and control information. ICMP provides the following functions: - Error Reporting: ICMP is primarily used to report errors that occur during the transmission of IP packets. When a network device encounters an error, such as a destination unreachable or a time exceeded, it will generate an ICMP message to inform the sender of the error. - Network Testing and Troubleshooting: ICMP also includes tools that can be used for network testing and troubleshooting purposes. For example, the "ping" command uses ICMP echo request and echo reply messages to test the reachability and round-trip time of a network host. - Path MTU Discovery: ICMP is used for Path Maximum Transmission Unit (PMTU) discovery. It allows network devices to determine the maximum size of a packet that can be transmitted without fragmentation along a given path. - Router Discovery: ICMP Router Discovery messages are used by hosts to discover neighboring routers on an IP network. In conclusion, ICMP is the protocol used to report error messages in IP networks. It plays a crucial role in error reporting, network testing, troubleshooting, and other network management tasks.
Detailed Solution for Test: Internet- 2 - Question 12
The false statement is: C: TFTP rely on TCP. Explanation: - Telnet is used for remote login: Telnet is a network protocol that allows remote login to a computer or server over a network. It provides a command line interface to access and control the remote system. - FTP can transfer files between two hosts: FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a client and a server on a computer network. It allows users to upload, download, and manage files on a remote server. - TFTP rely on TCP: This statement is false. TFTP (Trivial File Transfer Protocol) is a simplified version of FTP that does not rely on TCP (Transmission Control Protocol). Instead, it uses UDP (User Datagram Protocol) for its data transfer. - SMTP used to send mail message: SMTP (Simple Mail Transfer Protocol) is an internet standard protocol used for sending email messages between servers. It is responsible for the transmission and delivery of email messages. In summary, the false statement is that TFTP relies on TCP. TFTP actually uses UDP for its data transfer.
Which is not the server side programming language?
Detailed Solution for Test: Internet- 2 - Question 13
Detailed Solution for Test: Internet- 2 - Question 14
HTTPS: HTTPS stands for Hypertext Transfer Protocol Secure. It is the secure version of HTTP, which is the protocol used for transmitting data over the internet. What does the 'S' in HTTPS stand for? The 'S' in HTTPS stands for: - Secured: The 'S' in HTTPS stands for 'Secured'. It indicates that the communication between the web browser and the web server is encrypted and secure. How does HTTPS work? HTTPS works by using SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols to encrypt the data transmitted between the web browser and the web server. Here is a brief overview of how HTTPS works: 1. Handshake: The web browser sends a request to the web server to establish a secure connection. 2. Server authentication: The web server sends its SSL/TLS certificate to the web browser to prove its identity. 3. Encryption: The web browser and the web server negotiate an encryption algorithm and exchange encryption keys. 4. Data transmission: The web browser and the web server encrypt and decrypt the data using the shared encryption keys, ensuring that the data cannot be intercepted or tampered with during transmission. Why is HTTPS important? HTTPS is important for several reasons: - Data security: HTTPS ensures that the data transmitted between the web browser and the web server is encrypted and secure, protecting it from unauthorized access. - Authentication: HTTPS verifies the identity of the web server, ensuring that the user is connecting to the intended website and not a malicious imposter. - Trust and credibility: Websites that use HTTPS are often seen as more trustworthy and credible by users, as they prioritize data security. Conclusion: In summary, the 'S' in HTTPS stands for 'Secured'. HTTPS is crucial for ensuring the security and integrity of data transmitted over the internet, providing encryption, authentication, and trustworthiness.
Detailed Solution for Test: Internet- 2 - Question 15
Hypertext Transfer Protocol (HTTP) Whenever you visit a page on the web, your computer uses the Hypertext Transfer Protocol (HTTP) to download that page from another computer somewhere on the Internet.
In this test you can find the Exam questions for Test: Internet- 2 solved & explained in the simplest way possible.
Besides giving Questions and answers for Test: Internet- 2, EduRev gives you an ample number of Online tests for practice
Find all the important questions for Internet- 2 at EduRev.Get fully prepared for Internet- 2 with EduRev's comprehensive question bank and test resources.
Our platform offers a diverse range of question papers covering various topics within the Internet- 2 syllabus.
Whether you need to review specific subjects or assess your overall readiness, EduRev has you covered.
The questions are designed to challenge you and help you gain confidence in tackling the actual exam.
Maximize your chances of success by utilizing EduRev's extensive collection of Internet- 2 resources.
Internet- 2 MCQs with Answers
Prepare for the Internet- 2 within the SSC CGL exam with comprehensive MCQs and answers at EduRev.
Our platform offers a wide range of practice papers, question papers, and mock tests to familiarize you with the exam pattern and syllabus.
Access the best books, study materials, and notes curated by toppers to enhance your preparation.
Stay updated with the exam date and receive expert preparation tips and paper analysis.
Visit EduRev's official website today and access a wealth of videos and coaching resources to excel in your exam.
Online Tests for Internet- 2 SSC CGL Tier 2 - Study Material, Online Tests, Previous Year
Practice with a wide array of question papers that follow the exam pattern and syllabus.
Our platform offers a user-friendly interface, allowing you to track your progress and identify areas for improvement.
Access detailed solutions and explanations for each test to enhance your understanding of concepts.
With EduRev's Online Tests, you can build confidence, boost your performance, and ace Internet- 2 with ease.
Join thousands of successful students who have benefited from our trusted online resources.