1. In 1969, seven USA universities developed a decentralized network called ARPANET under Advanced Research Project the network led to the development of the Internet Who funded Arpanet in 1969?
(a) NASA (b) US Army
(c) IBM (d) CIA
2. ARPANET was developed as an experiment in wide area network that could survive
(a) Earthquakes of highest magnitude
(b) Nuclear war
(c) Any kind of computer virus attack
(d) A hundred years
3. In October 29, 1969, ARPANET, the world’s first electronic computer network, was established between two nodes. One was at Leonard Kleinrock’s lab at University of California, Los Angeles (UCLA). Which was the other?
(a) Douglas Engelbart’s lab at Stanford Research Institute
(b) The University of California, Santa Barbara (UCSB)
(c) University of Utah
(d) Massachusetts Institute of Technology
4. What Internet service developed in 1991 at the University of Minnesota has been named after its mascot?
(a) Veronica (b) Jughead
(c) Archie (d) Gopher
5. What is also known as Infobahn?
(a) Information revolution (b) Information overload (c) Information carrier (d) Internet
6. Which search engines name means ‘view from the above’?
(a) AltaVista (b) Google
(c) Yahoo (d) Lycos
7. The popular search engine AltaVista was created in the Lab of which company?
(a) Apple Computer (b) Sun Microsystems
(c) Yahoo! (d) Digital Equipment Corporation.
8. The popular search engine Google derives its name from the word “googol”. What does the word mean?
(a) To search
(b) To index
(c) To crawl
(d) The numeral one followed by a hundred zeros
9. Ni2 is the indexer of which search engine capable of indexing one gigabyte of data per hour?
(a) AltaVista (b) Google
(c) Yahoo (d) Excite
10. Which search engine’s search robot is known as ‘Scooter’?
(a) AltaVista (b) Google
(c) Yahoo! Search (d) Ask.com.
11. Which is the first ever search engine to be developed?
(a) Archie (b) Jughead
(c) Veronica (d) Lycos
12. Which search engine uses its proprietary PageRank algorithm to list web pages according to popularity?
(a) AltaVista (b) Google
(c) Yahoo (d) Ask.com.
13. This advanced search mechanism, included in Macintosh O/S, has the ability to search multiple Internet search engines simultaneously. By what name is it known as?
(a) Sherlock (b) Holmes
(c) Agatha (d) Bond
14. In 2002, which search engine manipulator filed a lawsuit against Google alleging that its tactics to prevent spamdexing constituted unfair business practice? The judgment ultimately went in Google’s favor
(a) Search King (b) Googly.com
(c) SearchGuild.com (d) DarkBlue.com
15. What is spider food?
(a) The algorithm used by search engines or spiders
(b) Embedded key words, usually invisible, in a web page
(c) A bait for a spammer
(d) Web pages left out inadvertently by a spider in response to a search request
16. This is a practice whereby some website owners deliberately and dishonestly manipulate search engines to increase the chance of their website or page being placed close to the beginning of search engine results or to influence the category to which the page is assigned. What is this practice called?
(a) Search engine fine-tuning
(b) Search engine warming
(c) Revving the search engine
17. In a marketing tactic, a search engine is tricked into listing a site by including some frequently used keywords such as sex. These key words of course do not have any connection with the website’s actual content what is this trick called?
(a) Trick marketing (b) Bait and switch
(c) Carpet bombing (d) Carrot and stick
18. What does a ‘spider’ do on the Internet?
(a) It searches the Net for new web pages and indexes their addresses and content related information in a database, which is used by a search engine
(b) Tracks spammers and their mails
(c) Tracks encrypted communications and their sources
(d) Tracks child pornography
19. In which laboratory the original development of World Wide Web (WWW) took place in 1989?
(a) European Organization for Nuclear Research, Geneva
(b) National Centre for Super-computing Applications
(c) Palo Alto Research Centre
(d) Bell Labs
20. GOPHER is one of the many facilities available on the Net. How is it different from the WWW?
(a) GOPHER contains graphics whereas WWW does not
(b) GOPHER contains no graphics whereas WWW does
(c) Unlike WWW, it provides live conferencing facilities
(d) It helps to send voice mail
21. Name the protocol standard designed to condense WWW sites to fit into handheld, digital, wireless devices such as mobile phones and pagers
(a) WAP (b) HTTP
(c) TCP (d) FTP
22. Tim Berner Lee wanted to call World Wide Web or WWW TIM after his own name. What, according to him, did the acronym TIM stand for?
(a) Total Information Management
(b) The Internet Maze
(c) The Information Mesh
(d) Tim’s Information Management
23. The inventor of World Wide Web Tim Berners-Lee feels that the Web should be made more intelligent and intuitive so that it can serve a user’s needs better and the search engines can provide web pages that a user really wants. What does Tim call such a web?
(a) Semantic Web (b) Intelli Web
(c) Intuitive Web (d) Contextual Web
24. English is the most-used language on the World Wide Web. Which language comes second?
(a) Hindi (b) French
(c) Chinese (d) Japanese
25. The Organisation Europeenne pour la Recherche Nucleaire (CERN) in Switzerland, the birth place of WWW, is mainly involved in research in which area?
(a) Information Technology (b) Particle Physics (c) Cosmology (d) Planetary science
26. Which was the world’s first web browser and WYSIWYG HTML editor?
(a) World Wide Web (b) Mozilla
(c) Netscape (d) Opera
27. Which browser has the distinction of being the first popular graphical WWW browser?
(a) Netscape Navigator (b) Internet Explorer (c) Lynx (d) Mosaic
28. Which web browser is also known by the nickname Mozilla?
(a) Netscape Navigator (b) Internet Explorer
(c) Lynx (d) Mosaic
29. What is Apache?
(a) The first search engine on the Net
(b) The world’s second virtual newscaster
(c) A freely available Web server
(d) The world’s first online auction site
30. What is a Wiki or Wiki-Wiki?
(a) A server program that allows users to collaborate in forming or editing the content of a Web site
(b) An online collaboration software that allows the employees of a company located at remote places to collaborate on a project
(c) A new generation web browser
(d) A web visitor who browses through the web pages and sites at the maximum speed allowed by the speed of the modem
31. On his first visit to Honolulu, Ward Cunningham was directed by the airport counter agent to take the shuttle buses at the airport. The word that describes the shuttle bus service there means ‘fast’ in Hawaiian language. That was the first Hawaiian word Cunningham learned. Cunningham gave this name to a concept he created later on. Name the concept
(a) Wiki Wiki or wiki (b) Extreme Programming
(c) Webopedia (d) Awiwi
32. Part of Microsoft’s Net venture, this service proposes to provide space on the Web where users can store their personal information securely for a fee. They can decide who can use their information, for how long, and in what manner. What is the name of this service?
(a) Secure Space (b) Micro Space
(c) Net Space (d) Hail Storm
33. Established in 1996, these leading international Awards, dubbed the Oscars of the Internet by The New York Times, are presented honoring excellence in Web design, creativity, usability and functionality. Name it
(a) Wammy Awards (b) Grammy Awards
(c) Webby Awards – (d) Net Awards
34. Which body presents the Webby Awards?
(a) International Academy of Digital Arts and Sciences
(b) Internet Corporation for Assigned Names and Numbers (ICANN)
(c) Internet Assigned Numbers Authority (IANA)
(d) Association for Computing Machinery
35. What well-known term in web browsing was coined by Lou Montulli?
(a) Net surfing (b) Netizen
(c) Cookies (d) Blog
36. What is dub dub dub?
(a) A web address with three dots in between the domain names
(b) A deserted website
(c) A website which has not been updated even once
(d) Short for WWW
37. What is the main function of Internet Corporation for Assigned Names and Numbers (ICANN)?
(a) Managing the assignment of domain names and IP addresses
(b) Develop standards for communication over the Internet
(c) Oversee and safeguard user privacy issues
(d) Define Internet-related terms
38. This Internet music search application sparked heated debate over copyright and digital distribution issues when it started enabling users to search for and swap MP3 files over the Web. Name it
(a) MP3.com (b) Musiconline.com
(c) Napster (d) Web Music
39. In Internet terminology what is URL?
(a) Uniform Resource Locator
(b) Universal Random Locator
(c) Ultimate Resource Locator
(d) Universal Real Language
40. Highest subdivision of the Internet, usually by country or type of organization, such as .edu for education, or.com for commercial, is called
(a) Ethernet (b) Backbone
(c) Gateway (d) Domain
41. The identifying portion of a domain name, for example, economictimes in www.economictimes.com , is called?
(a) Primary domain name (b) Secondary domain name (c) Website name (d) Organization name
42. In the above question, ‘com’ is an example of
(a) Primary domain name (b) Generic domain name (c) Website name (d) Organization name
43. What new top-level domain name was approved by Internet Corporation for Assigned Names and Numbers (ICANN) in 2000 for use with the Websites of nonprofit cooperatives?
(a) .np (b) .non
(c) coo (d) .coop
44. Which company / organization is the original registrar of .com, .net and .org domain names on the Internet?
(a) Networks Solutions
(c) U.S. Department of Commerce
(d) Internet Corporation for Assigned Names and Numbers (ICANN)
45. From which of the following, one can get the information on whether a particular .com .net .org .info .biz domain name has been registered, and if so, then the party who has registered it?
(a) Better Whois (b) Internet Assigned Numbers Autnority
(c) Google • (d) Yahoo! Search
46. In the cyber world, who are ‘cyber squatters’?
(a) People who grab a well-known trademark and register it as domain name for ulterior purpose, such as selling the domain name back to the rightful owners for a fancy price, or making the Internet users believe that they are associated with the famous trademark
(b) People who hack a computer network
(c) People who pirate software
(d) People who spread virus over Internet
47. Some cyber squatters take advantage of an Internet user mistyping a web address into a web browser by leading the user to an alternate web address owned by them. This type of cyber squatting is called
(a) Typosquatting (b) Missquatting
(c) Address squatting (d) URL squatting
48. To track usage over time and to store information about a user, a website stores a special text file on the user’s hard disk. What are these text files called?
(a) Applets (b) Banners
(c) Cookies (d) Plug-ins
49. In the World Wide Web, what is a black hole?
(a) A web page that takes a very long time to download
(b) A hyperlink to a document that has been erased or removed
(c) A web page that pops up on the screen unsolicited
(d) A mysterious source of spam
50. What is the basic difference between browsing and surfing?
(a) Browsing for no particular reason is called surfing
(b) Surfing with no particular reason is called browsing
(c) Browsing with the help of search engines is called surfing
(d) Browsing requires registration with the website whereas surfing does not
51. What is an ‘arachniography’?
(a) A new form of spyware
(b) A new application that helps in viral marketing
(c) A bibliography of Web pages
(d) An application program that enables non-programmers to create web pages
52. Surfers who browse the web at breakneck speed over Digital Subscriber Line or DSL Internet connection are called
(a) Net squirrels (b) Bandwidth Junkie
(c) Ego surfers (d) Vanity surfers
53. When one is said to be ‘ego surfing’?
(a) When one surfs the Net for hours altogether and does not allow others to access the Net from the same system.
(b) When one surfs the Net at very high speed.
(c) When one browses the website of one’s own organization.
(d) When one searches the Net for reference to oneself.
54. What are mirror websites?
(a) Different language versions of the same website.
(b) Websites using the same URL but with different contents.
(c) A standby website while the original has been shut down for maintenance.
(d) Multiple websites with the same contents but different URLs.
55. In Internet jargon, what is a ‘sticky site’?
(a) A site where a user spends a large amount of time.
(b) A site, which provides a particular type of information.
(c) Sites with contents meant for adults only.
(d) Site visited by the most number of surfers.
56. On the Net, who or what is a zombie?
(a) An abandoned website that due to some reason has been moved to a different Web address.
(b) A website that provides information on whether a domain name has already been registered by somebody else.
(c) A company that offers domain name registration service.
(d) A sticky website to which most visitors get glued once they access it.
57. What is a “para-site’?
(a) A website that frames other websites or pages within it
(b) A website accessible only from another website
(c) A website that diverts traffic from another site to itself
(d) A website that copies layout and design from another site
58. What is an evergreen website?
(a) The website is very popular with the visitors
(b) The website deals with environmental issues
(c) The website is updated daily or frequently
(d) The website uses primarily green color in its content
74. In an online auction, what is Shill bidding?
(a) Deliberate use of secondary registrations, aliases, family members, friends, or associates to artificially drive up the bid price of an item.
(b) Bidding for the quantity of the items on sale.
(c) Winning a bid for an item but not purchasing the same subsequently.
(d) Ending up paying much more for an item than the item is actually worth.
75. Contrary to popular belief, it is difficult for users to find information located in banner ads. This phenomenon is called
(a) Banner phobia (b) Banner blindness
(c) Banner zapping (d) Banner overlooking
76. What fancy name is given to tall and narrow banner advertisements on a web page?
(a) Monuments (b) Tall boys
(c) Eiffel Towers (d) Skyscrapers
77. What term is used pejoratively for the practice of advertising using spam?
(a) Netvertize (b) Spambait
(c) Spamvertize (d) Adspamming
78. M-commerce involves access to the Net via….
(a) Cable modem
(b) Standard modem
(c) Mobile devices such as a cell phone or PDA
(d) Internet2 devices
79. The ratio between the number of times an advertisement is clicked upon and the number of times the advertisement is served to the site visitor is called
(a) Click-through rate (CTR) (b) Click stream (c) Hit (d) Qualified hit
80. What is click stream?
(a) The sequence of mouse clicks made by a user as she or he navigates a web page or the Net.
(b) The sequence of mouse clicks one has to make in order to reach a particular page in a website.
(c) The site map of a website.
(d) The sequence of mouse clicks made by a user as she or he navigates a text document.
81. In Internet jargon, what are interstitials?
(a) An advertisement diverted to one’s email box with the consent of the recipient.
(b) An advertisement that appears between web pages.
(c) An advertisement format where the contents are not static but changes every few seconds.
(d) An interactive advertisement.
82. What distinction does the book Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought by Douglas Richard Hofstadter enjoy in the world of IT?
(a) It was the first book to lay out the principles of e-commerce
(b) It was the first book to be exclusively published online
(c) It was the first eBook
(d) It was the first book sold by Amazon.com
83. Which marketing guru pioneered the concept of ‘permission marketing’ which has become more common in the Web-based businesses?
(a) Seth Godin (b) Jagdish Sheth
(c) Deepak Jain (d) Theodore Levitt
84. Atomicity, Consistency, Isolation and Durability (ACID) are four essential properties of what?
(a) Electronic transactions
(c) Ink/toner used in a computer printer.
(d) Magnetic coating on a recordable medium.
85. Which is the first temple in India to install terminals of online commodity exchanges to get commodities at market prices rather than through annual contracts involving fixed prices?
(a) Tirumala Tirupati Devasthanam
(b) Golden Temple, Amritsar
(c) Guruvayoor shrine in Kerala
(d) Jagannath Temple in Puri
86. What term is used to describe a person who spends plenty of time on line exploring the Internet?
(a) Netphile (b) Netizen
(c) Cybernaut (d) Cyberphile
87. You may also come across a term called “nethead”? What is it?
(a) A highly respected person in a Net community
(b) A person who is addicted to the Net
(c) The head of a Net community
(d) The Web Master
88. What is a person called who engages himself/herself in hacking activities with political or social agendas?
(a) Computerphile (b) Cracker
(c) Hacker (d) Hacktivist
89. When an attacker over the Net harasses a victim with threatening messages delivered through email or instant messaging or posted to a Web site or a discussion group, it is called
(a) Cyber squatting (b) Cyber terrorism
(c) Cyberwoozling (d) Cyber stalking
90. An employer would never like a cyber slacker. What does a cyber slacker do?
(a) She or he steals data from the organization’s system and sells outside.
(b) She or he hates the IT tools and does everything manually or by old equipments.
(c) She or he uses organization’s Internet connection during work hours to surf the Net, shop online, send personal emails, look for new jobs, etc.
(d) Uses company email to send anonymous messages to others.
91. Which netizen is called a ‘lurker’?
(a) A person who restricts him-self/herself to receiving and reading articles or messages in a newsgroup or any other online discussion without contributing anything to the ongoing exchange.
(b) A person who tries to dominate an online discussion.
(c) A person who surfs the Net at breakneck speed.
(d) A netizen whose opinions are often offensive to other participants in an online discussion forum.
92. For the success of the initial public offering of a dot-corm, it is recommended that Net-wise individuals should combine with finance experts. The Net-wise individuals wear unconventional clothing and are not generally finance savvy. On the other hand, the finance people wear proper formal dresses and have the ability to convince the investors about the attractiveness of the offer. What expression describes this combination?
(a) Geeks and Suits (b) Fruits and Suits
(c) Fruits and Nuts (d) Digits and Numbers
93. Who is a blatherer in the cyber world?
(a) A user who types on-and-on while posting a message or chatting online.
(b) A heavy advertiser on the Net.
(c) A political propagandist on the Net.
(d) A user who uses SMS type languages even in formal emails,
94. What is the Chinese slang for a hacker?
(a) Rekcah (b) Cracker
(b) Honker (d) Recker
95. Which of the following would best describe the job of a cyber cop?
(a) A computer-savvy policeman.
(b) A security person who guards computer installations
(c) A person who is in charge of making systems safe from hackers
(d) A person who investigates criminal acts committed online, including fraud and harassment
96. When somebody has been ‘dot-commed’, what has happened to him/ her?
(a) Trapped by the promise of high salaries by a dot.com.
(b) Lost all investments made on a dot com.
(c) Lost hishe or her job due to the downsizing or failure of a dot com.
(d) Has made a killing on hishe or her investments made on a dotcom because of its success.
97. Who is a cyber tourist?
(a) A person who visits websites of tours and travel companies
(b) A person who stays in a website for few minutes only
(c) A person who goes online only on weekends and holidays
(d) A person who visits the websites of famous tourist destinations of the world
98. When somebody has been ‘gatored’ on the Net, she or he has become a victim of what?
(a) Cyber grapevine (b) Cyber warfare
(c) Hijackware program (d) Spyware
99. In Internet terminology, who is a troll?
(a) A person who posts inflammatory messages oil the Net. such as on online discussion forums, to disrupt the discussion or to upset its participants.
(b) A person who gets overwhelmed by the amount of information available on the Net.
(c) A person who makes a living by designing web sites for others.
(d) A user who opposes the pricing of any Internet content.
100. The term “cyberspace” refers to networked digital environments, especially advanced systems that produce an illusion of reality. Who coined this term in his book Neuromancer (1984)?
(a) Thomas Watson (b) Bill Gates
(c) William Gibson (d) Steven Spielberg
101. What term is used to describe the principles of courtesy to be used in sending electronic messages and other online postings?
(c) Principles of Net Behavior
(d) Internet Best practices
102. In Internet etiquette, typing with all capital letters is considered rude. Why?
(a) It is stressful on the eyes.
(b) It looks ugly.
(c) It consumes more memory.
(d) It is the e-mail equivalent of shouting.
103. What is cyberpunk?
(a) A genre of near-future science fiction set in virtual-reality environments maintained on global computer networks.
(b) A Utopian land where everything is virtual
(c) A popular computer game
(d) Literature on computers and IT
104. Smiley and other characters used to express feelings in an e-mail communication are called
(a) Emoticons (b) Mailicons
(c) Digitrons (d) Neticons
105. What is ‘turnip effect’?
(a) Rapid spread of Iiiternet
(b) Bottlenecks caused by heavy traffic over a communication system or network
(c) Increasing misuse of Internet by some people with its increasing popularity
(d) Availability of information to all at the fingertips due to the Net
1. (a) 2. (b) 3. (a) 4 (d) 5. (d) 6. (a) 7. (d) 8. (d) 9. (a) 10. (a)
11. (a) 12. (b) 13. (a) 14. (a) 15. (b) 16. (d) 17. (b) 18. (a) 19. (a) 20. (b)
21. (a) 22. (c) 23.(a) 24.(c) 25. (b) 26. (a) 27. (d) 28. (a) 29. (c) 30. (a)
31. (a) 32. (d) 33. (c) 34. (a) 35. (c) 36. (d) 37. (a) 38. (c) 39. (a) 40.(d)
41. (b) 42. (a) 43. (d) 44. (a) 45. (a) 46. (a) 47. (a) 48. (c) 49. (b) 50. (a)
51. (c) 52. (b) 53. (d) 54. (d) 55. (a) 56. (a) 57. (a) 58. (c) 59. (c) 60. (c)
61. (a) 62. (d) 63. (d) 64. (a) 65. (c) 66. (a) 67. (c) 68. (d) 69. (b) 70. (a)
71. (c) 72. (a) 73.(b) 74. (a) 75. (b) 76. (d) 77. (c) 78. (c) 79. (a) 80. (a)
81. (b) 82. (d) 83. (a) 84. (a) 85. (a) 86. (c) 87. (b) 88. (d) 89. (d) 90. (c)
91. (a) 92. (b) 93. (a) 94. (c) 95. (d) 96. (c) 97. (c) 98. (c) 99. (a) 100. (c)
101. (b) 102. (d) 103. (a) 104. (a) 105. (b)