1 Internet Domain Names sometimes use a county level domain or country code to identify the geographical region in which a Internet organization or address is based. Which of the following demonstrate the proper syntax a country level domain?
a) max.sales.com
b) british.org
c) bonjour.framce.com
d) london.co.uk
Ans: d
2. For which of the following Internet Services can a web browser act as a client?
a) E-mail
b) Newsgroup
c) FTP
d) Telnet
Ans: c
3. A URL is a internet /Intranet Address that
a) locates an Internet resource using a search engine
b) Identifies the search string used to locate an Internet Resouce
c) Locates an web page using a web browser
d) Identifies the protocol by which an Internet Resource is accessed
Ans: d
4. Which of the following is a valid URL for accessing a web Page
a) http://www.cambridge.org/hello.html
b) ftp.www.funny.net
c) news:cambridge.com/hello
d) html://www.cambridge.com
Ans: a
5. What is the valid URL for accessing an FTP Site?
a) http:// ftp.sanskrit.org
b) ftp://ftp.sans.com
c) http://sans.ftp
d) ftp://www.sanskrit.com
Ans: b
6. Which of the following group of elements can be specified by a Uniform Resource Locator
a) Folder name, File name and File Size
b) Domain Name, File name and Keywords
c) Domain Name ,Folder name and File Name
d) Access protocol, folder name and File author
Ans: c
7. Which of the following choices demonstrate the correct syntax for a URL that opens an E-Mail Client from a browser?
a) http://email.boss@xyz.com
b) mailto:boss@xyz.com
c) http://mailto:boss@xyz.com
d) email://boss@xyz.com
Ans: b
8. Which of the following statements best describes the difference between Intranets and Extranets?
a) Intranets are used by Industry professional and extranets by casual web users.
b) Intranets are used with in corporations by employees and extranets by corporation for public customer support
c) Intranets are used with in corporations by employees and extranets by corporation for non- public customer support
d) Intranets are used with in same geographical area and extranets to connect between continents
Ans: c
9. Which of the following is a problem associated with using the legacy application?
a) Older browser do not support HTML
b) Older browser do not support common features such as tables
c) Older browser do not render web pages properly
d) Older browser do not support currently common features such as frames
Ans: d
10. In regards to Internet data transfer, which of the following statements best describes pull Technology?
a) A Multimedia application that delivers information directly to a user's desktop
b) A computer program that sends data to the client without a request
c) A Mailing list that sends messages to users to notify them of additions to a web site
d) A computer or program that request information from another computer or program
Ans: d
11. For which of the following actions does the FTP client program use the "get" command?
a) To download a file
b) To upload a file
c) To move a file to a new location
d) To search for a file
Ans: a
12. A web browser allows you to
a) edit web pages
b) navigate web sites
c) post newsgroup messages
d) create HTML documents
Ans: b
13. If you click a hyperlink, you browser will
a) Increase the speed of Modem connection
b) Display a web page source code
c) open a window in which you can edit a web page's text
d) display a new web page
Ans: d
14. Some web sites may download a cookie to your computer when you visit. What type of information can a cookie pas from your computer back to the site that planted he cookie
a) Type and version of operating system
b) Files from your hard drive
c) Your preference regarding other web sites you have visited
d) Copies of your E-Mail correspondence
Ans: a
15. Which protocol allows a mail client to send e-mail from its e-mail program to another computer on the Internet
a) File Transfer Protocol
b) Simple Mail Transfer Protocol
c) Network News Transfer Protocol
d) Telnet
Ans: b
16. Which of the following is a security feature that you can configure to your own preferences?
a) Automatic encryption can be enabled for all contents transfering to and from your browser
b) The "lock" icon displays to indicate that you are using a secure connection
c) Security levels can allow, reject or ask you to accept active content such as applets before downloading
d) the anti- virus software can automatically search for computer virus each time you log on
Ans: c
17. Some LAN use an Intermediatory between the LAN and the Internet.What is that intermediatory called?
a) Browser Cache
b) Firewall
c) Proxy Server
d) Web server
Ans: c
18. Standards of polite behavior on the Internet, emphasizing common sense and Co-operation are called
a) Hacking
b) Flaming
c) Netiquette
d) Spaming
Ans: c
19. Why are Full-text index searches not used in Internet Widely?
a) They would require massive amount of storage
b) They will have poor rate of accuracy
c) Potential errors are great
d) process of creating is complex
Ans: a
20. Which of the following choice best defines "Electronic Commerce"?
a) The exchange of goods and services for money conducted via Internet
b) Integration of payment mechanism,products and delivery capabilities that allows organisations to conduct the sales of goods and services
c) The Integrtion of communication, data management and security capabilities that allows organisations to exchange information relates to the sale of goods and services
d) Commerce conducted via any electronic medium
Ans: c
21. Scenario: looking for hotels or car rentals in Ipoh, Malaysia.
a) (Ipoh AND Malaysia) AND (hotels or "car rentals")
b) Ipoh AND Malaysia AND hotels or car rentals
c) Ipoh + Malaysia AND hotels or "car rentals"
d) (Ipoh AND Malaysia) + hotels or "car rentals"
Ans: c
22. One client has a unique address. Which type of address is unique to TCP/IP?
a) LAN
b) IP
c) TCP
d) DNS
Ans: b
23. What class is the IP address 215.125.45.5?
a) Class A
b) Class C
c) Class B
d) Class D
Ans: b
24 Bob has set up a new workstation with the IP address of 129.25.36.5 What is the appropriate subnet mask for this IP
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
Ans: b
25 Jane has programmed the Following HTML code, however when she runs it, she sees nothing on the browser. Look at the code below determine the error. a)
b) / missing from
Ans: d
30. Which of the following IP addresses is valid?
a) 10.1.1.256
b) 127.0.0.1
c) 162.34.0.0
d) 100.54.100.90
Ans: d
31. Which layer of the OSI/RM model does IP belong to?
a) Session layer
b) Transport layer
c) Data Link layer
d) Network