For ROBC/BRF/CIPHER Computer
(a) National service providers (b) Regional
Internet & E-Mail service providers
1. The Internet was launched in 1969 and was
(c) Centralized service providers (d)
originally called
Decentralized service providers
(a) AARPNET (b) CERNET
12. In a client/server network the user’s computer is
(c) CERN (d) ARPANET
considered the
2. The actual physical network made up of wires
(a) Server (b) Client
cables and satellites that connects computers and
(c) Web site (d) Library
resources throughout the world is the
13. For a browser to connect to other resources the
(a) Web (b) Internet
location or address of the resources must be
(c) E-commerce (d) Spiders
specified) These addresses are called
3. The most popular Internet activity is
(a) URLs (b) Packets
(a) Going Shopping (b) Conducting
(c) E-mail forms (d) MSN
Research
14. The two basic parts of URLs are
(c) Playing games reading listening to music
(a) TCP/IP and ISP (b) Destination and
(d) Communicating with others
device
4. The fastest-growing application for the Internet is
(c) The protocol and the domain name (d)
(a) Going Shopping (b) Conducting
TCP and IP
Research
15. Rules for exchanging data between computers are
(c) Playing games reading listening to music
called
(d) Communicating with others
(a) Programs (b) Procedures
5. Most common uses of the Internet and the Web
(c) Protocols (d) Hyperlinks
include communicating shopping
16. The most widely used Web protocol is
(a) Searching entertainment and education
(a) http:// (b) URL
(b) E-commerce e-mail and searching
(c) HTML (d) ISP
(c) E-mail entertainment and education
17. Moving from one Web site to another is called
(d) E-commerce e-mail and education
(a) Jumping (b) Moving
6. The __________ is the multimedia interface to
(c) Surfing (d) Applying
resources available on the Internet.
18. The extensions .go .edu .mil and .net are called
(a) Web (b) ISP
(a) DNSs (b) E-mail targets
(c) Browser (d) URL
(c) Domain codes (d) Mail to
7. The multimedia interface to the resources
addresses
available on the Net is called the
19. In the e-mail address "
[email protected]"
(a) World Wide Web (b) Internet
what is the domain name?
(c) GUI interface (d) Server
(a) The whole address is called the domain name.
8. The most common method for gaining access to
(b) .org
the Internet is through a __________.
(c) usource.org
(a) Dumb terminal (b) Virtual provider
(d) Justin case
or computer
20. URL is an acronym for __________.
(c) Point-to-point computer (d)Provider or
(a) Uniform Resource Locator (b) Uniform
host computer
Resource Link
9. The term ISP refers to
(c) Universal Reference Locator (d)
(a) Internal software protocol (b)
Unlimited Real-time Language
International shareware pool
21. When surfing the Web the browser interprets the
(c) Internet service provider (d) interface
HTML command found in a document file and
standard protocol
displays it as a)n)
10. A __________ program provides access to Web
(a) Applet page (b) Java page
resources.
(c) Web page (d) Domain page
(a) Web (b) ISP
22. HTML is an acronym for __________.
(c) Browser (d) URL
(a) Hyperlink Markup Language
11. These types of commercial Internet service
(b) Hypertext Markup Language
providers are the most widely used
(c) Hypertext Markup Link
Special for LDCE & Open Exams:- BSF, CISF, CRPF, ITBP & SSB
Download: -TotalExam Plus App Call/WhatsApp 8882755563
For ROBC/BRF/CIPHER Computer
(d) Hypertext Modern Language 35. These search engines receive the results eliminate
23. Connections to other documents or to other duplicates order the hits and then provide the
locations within a Web site are edited list to you
(a) Filters (b) Hyperlinks (a) Megasearch engines (b) Metasearch
(c) Plug-ins (d) Bots engines
24. Hyperlinks in a Web document typically appear as (c) keyword search engines (d) Directory search
(a) Bolded and underlined (b) Italicized and engines
underlined 36. Buying and selling goods over the Internet is called
(c) Underlined and colored (d) Bolded and __________
italicized (a) Hyper-marketing (b) Cyber-selling
25. __________ are widely used to add interest and (c) E-commerce (d) Euro-conversion
activity to a Web site by presenting animation 37. This type of electronic commerce involves the sale
displaying graphics providing interactive games and of a product or service to the general public)
more. (a) B2C (b) B2P
(a) Applets (b) Bots (c) C2C (d) B2B
(c) Plug-ins (d) Spiders 38. This type of e-commerce often takes the form of an
26. Applets are typically written in a programming electronic version of the classified ads or an
language called auction.
(a) XML (b) Basic (a) B2C (b) C2C
(c) Pascal (d) Java (c) G2C (d) B2B
27. Which of the following are not required in order to 39. Virtual stores for B2C electronic commerce are also
send and receive e-mail? known as
(a) E-mail account (b) Web page (a) Auctions (b) Houses
(c) Access to the Internet (d) E-mail program (c) Web storefronts (d) Internet buyers
28. Which of the following is not one of the basic 40. Another name for electronic cash or e-cash the
elements of an e-mail message? Internet equivalent to traditional cash is
(a) Header (b) Footer (a) Cybercash and analog cash (b) Digital
(c) Message (d) Signature cash and cybercom
29. A one-line description used to present the topic of (c) Carders and cybercom (d) Cybercash and
an e-mail message is referred to as the digital cash
(a) Header (b) Address 41. __________ are specialized utility programs that
(c) Subject (d) Signature make using the Internet and the Web easier and
30. Unwanted and unsolicited e-mails are called safer.
(a) Spam (b) Junk (a) Telecom (b) Web utilities
(c) Flame (d) lurk (c) Norton Utilities (d) Web firewalls
31. Newsgroups use a special network of computers 42. An Internet standard that allows you to connect to
called the another computer )host) on the Internet and to log
(a) UseNet (b) MailNet on to that computer as if you were on a terminal in
(c) AddressNet (d) ChannelNet the next room is
32. A popular chat service is called (a) FTP (b) AOL
(a) IM-Chat (b) UseNet Chat (c) Listerv (d) Telnet
(c) Internet Protocol Chat (d) Internet Relay 43. Programs that are automatically loaded and
Chat operate as a part of your browser are referred to as
33. Before you submit a contribution to a discussion __________.
group you should first (a) FTP (b) Plug-ins
(a) lurk (b) Signal (c) Add-ons (d) Telnet
(c) Queue (d) Ping 44. An Internet standard for transferring files is known
34. Specialized programs that assist you in locating as
information on the Web and the Internet are called (a) IRC (b) Telnet
(a) Browsers (b) Gophers (c) FTP (d) WAIS
(c) Search engines (d) Applets 45. A)An) __________ can be used to block access to
specific sites.
Special for LDCE & Open Exams:- BSF, CISF, CRPF, ITBP & SSB
Download: -TotalExam Plus App Call/WhatsApp 8882755563
For ROBC/BRF/CIPHER Computer
(a) Filter (b) Hardware block 13. In webmail unread messages should be shown
(c) Censor (d) Rubicon in_____color
(a) Red (b) Red or Black
(c) Black (d) Bolded black or
Red
14. In CRPF Webmail blocked mail should be available in
Web Mail ___folder
1. Software used to establish webmail in CRPF (a) Blocked (b) Draft
is_______ (c) Junk (d) Sent
(a) Lotus Notes (b) Lotus iNotes 15. ________________is used to direct mails in a
(c) Outlook (d) Gmail particular folder
2. Protocol used in CRPF VPN is _________ (a) Forward (b) Send
(a) PPTP (b) L2TP (c) Rules (d) Direct mail
(c) PPP (d) RSA 16. Which one of the following is not a VPN protocol
3. Authentication method used in CRPF VPN (a) L2TP (b) IP sec
(a) RSA (b) AD (c) PPTP (d) FTP
(c) Both (d) None 17. To prevent copy which option is used in web mail
4. How many modes are available in webmail? (a) Keep private (b) Prevent Copy
(a) 3 (b) 2 (c) Block mails (d) Read only
(c) 1 (d) 4 18. Recommended browser for web mail is
5. Maximum size of attachment used in webmail __________________
(a) 254 KB (b) 25 MB (a) Internet Explorer (b) Google
(c) 1024 KB (d) 512 KB Chrome
6. Which mode is used to sending /receiving (c) Safari (d) Opera
attachment in CRPF VPN 19. Backbone of VPN is__________________
(a) Ultra light mode (b) User Mode (a) SELO (b) Intranet
(c) Lite Mode (d) Full mode (c) Internet (d) Extranet
7. DMS means ______ 20. IN wen mail delete Mail resides in
(a) Document management system (a) Recycle bin (b) Junk folder
(b) Dak Management System (c) Trash (d) Created folder
(c) Digital mail System
(d) None of these
8. Web address used to connect Webmail in CRPF from
a SELO location is __________
(a) WEB-CGO-DEL.SELO (b) WEB-
MAILDEL.SELO.LOCAL
(c) MSG-CGO-DEL.SELO.LOCAL (d) MSG-
CGO-DEL.SELO
9. Time interval required to change RSA token
authentication password is______
(a) 30 s (b) 1 Minute
(c) 20 s (d) 3 Minute
10. In Webmail Rule option will be available _____ menu
(a) Mail (b) Tools
(c) Folder (d) Achieve
11. If there is sufficient space in your mail box then mail
status bar color will be_____
(a) Green (b) Red
(c) Blue (d) Yellow
12. The colour of mail status bar while crossing the
threshold quota limit is_____
(a) Green (b) Red
(c) Blue (d) Yellow
Special for LDCE & Open Exams:- BSF, CISF, CRPF, ITBP & SSB
Download: -TotalExam Plus App Call/WhatsApp 8882755563