Sei sulla pagina 1di 2

The vast network of computers that connects million of people all over the world is called

(a) LAN
(b) Web
(c) Hypertext
(d*) Internet (e) None of these
29.

Coded entries which are used to gain access to a computer system are called ..
(a) Entry codes (b*) Passwords
(c) Security codes
(d) Codewords (e) None

30.

The home page of a website is


(a*) The largest page
(b) The last page
(d) The most colorful page
(e) None of these

(c) The first page

31.

The internet is a system of ..


(a) Software bundles (b) Web page (c) Website (d*) Interconnected networks (e) None

32.

The . Also called the web, contains billions of documents


(a*) World wide web (b) HTTP
(c) web postal (d)Domain

(e) None of these

33.

What is an e-mail attachment?


(a) A respect sent by the recipient
(b*) A separate document from another program sent along with an e-mail message
(c) A malicious parasite that feeds off your messages an destroys the contents
(d) A list of CC or BCC recipients (e) None of these

34.

Which of the following are all considered advantages of e-mail?


(a*) Convenience, speed of delivery generally and reliability
(b) Printable, global and exposing (c) Global, convenience and Microsoft word
(e) Slow delivery, reliable global and in expansive (e) None of these

35.

A .. is a software program used to view Web pages


(a) Site
(b) host
(c) link
(d*) browser (e) None of these

36.

allows voice conversations to travel over the internet.


(a*) Internet telephony (b) Instant messaging (c) E-mail
(d) E-commerce (e) None

37.

Which of the following is not true concerning user IDs and passwords?
(a) When you enter your user ID and password, the computer known it is you
(b) If your computer asks for a user ID and password, you can create your own
(c) Sometimes you are assigned a user ID and password with at least one other person
(d*) you should share your user ID and password with at least one other person
(e) None of these

38.

What is a modem connected to?


(a) processor (b) mother board

(c) Printer

(d*) Phone line

(e) None

39.

An e-mail address typically consists of a user ID followed by the .. sign and the
name of the e-mail server that manages the users electronic post office box.
(a*) @
(b) #
(c) &
(d) *
(e) None of these

40.

A web . Consists of one or more web pages located on a web server


(a) hub
(b*) site
(c) story
(d) template (e) None of these

41.

A computer.is set of program instructions that can attach itself to a file, reproduce
itself, and spread to other files.
(a) worm
(b*) Virus
(c) Trojan horse (d) phishing scan (d) None of these

Potrebbero piacerti anche