The rules with regards to conduct for Internet users is known as
Mosaic
Netiquette
Protocol
Internet Protocol
Answer : B
Explain: Netiquette is a made-up word from the words net and etiquette. Netiquette is termed referred as how the user behave on internet.
A Spider is
A virus
A Browser
A program that catalogs websites
A hacker community
Answer : B
Explain: Spider also known as 'bot' or 'web crawler', is an internet bot that automatically seraches and indexing the webistes.
FTP don't use ?
two transfer mode
Control connection to remote computer before file can be transferred
User Datagram Protocol
Authorization of a user through login and password verification
Answer : C
Explain: FTP(File Transfer Protocol) uses the TCP (Transmission Control Protocol).
Web pages are uniquely defined using
IP addresses
URL
Domain
Filename
Answer : B
Explain: A URL (Uniform Resource Locator) is used to locate/find a resource on the Internet. It is also referred to as a web address.
TCP stands for
Transmission Control Protocol
Transport Control Protocol
Transmission Center Protocol
None of above
Answer : A
Explain: TCP meaning Transmission Control Protocol, is a communications standard for delivering data and messages through networks
Cookies store data in
Server
On Server PC
Google Drive
Browser
Answer : D
Explain: Cookies are usually small text files, given ID tags that are stored on user computer's browser directory or program data subfolders.
Which of following is not use on server side ?
Css
PHP
Pyhton
Nodejs
Answer : A
Explain: PHP, Python, Ruby, nodejs are some of the programming languages used on server-side.
Javascript is _________ language.
programming
application
script
Tags
Answer : C
Explain: avaScript (JS) is a cross-platform, object-oriented programming language used by developers to make web pages interactive.
Verification of a login name and password is known as___________.
configuration
accessibility
authentication
Log in
Answer : C
Explain: Authentication is the process of validating the identity of a registered user or process before enabling access to protected networks and systems.
Which of the following statements is false regarding Cookies?
Cookies are programs which run in the background of the web-client
Cookies have the potential of being used to violate the privacy of users
Cookies are very helpful in keeping track of users in developing online shopping
Cookies cannot contain more than 4 kb of data.
Answer : A
Explain: Cookies (often known as internet cookies) are text files with small pieces of data. It is not a program.
SGML stands for :
Standalone generalized markkup language
Standalone global markup language
Standard Generalized markup language
Standalone Graphical markkup language
Answer : C
Explain: The Standard Generalized Markup Language is a standard for defining generalized markup languages for documents.
An online information retrieval tool that uses the data of a web search engine to produce its own results :
Search Engine
Meta Search Engine
Mega Search Engine
None of above
Answer : B
Explain: A metasearch engine (or search aggregator) is an online information retrieval tool that uses the data of a web search engine to produce its own results.
File protocol is used for
deciding the design and structure of the file
transfer of computer files from hard disk to main memory
deciding the srorage space of files
transfer of computer files from a server to a client
Answer : D
Explain: File transfer protocol (FTP) is a way to download, upload, and transfer files from one location to another on the Internet and between computer systems.