Internet refers to:
a) A large Network of Networks
b) A communication system for different states of India
c) A communication system provided for large number of computer users.
d) None of These

1 Answer

Answer :

a) A large Network of Networks

Related questions

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : Internet is ................. A) Network of Networks B) Networks of Communication C) Networks of Data D) Group of LAN

Last Answer : A) Network of Networks

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Social media refers to the means of communication in virtual communities and networks.  A. True  B. False

Last Answer : A. True

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : What is internet?  a single network  a vast collection of different networks  interconnection of local area networks  None of the Above

Last Answer :  a vast collection of different network

Description : An internet protocol address (IP address) is: a) a numerical label assigned to each device (e.g. computer, printer) participating in a computer network b) It working for the communication c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An internet protocol address (IP address) is: a) a numerical label assigned to each device (e.g. computer, printer) participating in a computer network b) It working for the communication c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : __________ is a content distribution protocol enables efficient software distribution and peer-to-peer sharing of very large files by enabling users to serve as network redistribution points. A. Freeware B. BitTorrent C. CorelDraw D. None of the above.

Last Answer : B. BitTorrent

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... whenthe assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client.

Description : A communication network which is used by large organizations over regional, national or global area is called (1) LAN (2) WAN (3) MAN (4) VAN

Last Answer : WAN

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Virus can spread from one computer to another via use of: a) Infected Floppy Disk b) Computer Networks c) Internet d) All of Above e) None of These

Last Answer : d) All of Above

Description : What are the different types of computer networks and network topologies?

Last Answer : Star network,ring network,tree network,bus network

Description : They normally interact with the system via user interface provided by the application software. a) Programmers b) Developers c) Users d) Testers

Last Answer : Answer: c Explanation: Users interact with the system via user interface that is given by the application software. An application software is a set of instructions designed to serve a particular purpose This set of Computer Fundamentals online test focuses on “Machine Languages”

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : An internet is a __________ a) Collection of WANS b) Network of networks c) Collection of LANS d) Collection of identical LANS and WANS

Last Answer : b) Network of networks

Description : ______________ refers to hardware, software (computer programs), and computer networks.

Last Answer : Fill in the Blank: _____________ refers to hardware, software (computer programs), and computer networks.

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : The most famous Recurrent Neural Network is _______ (A) Perceptrons (B) Radial Basis Networks (C) Hopfield net (D) None of the Above

Last Answer : (C) Hopfield net

Description : _________ is a computational model based on the structure of biological neural networks? (A) Artificial Neural Network (ANN) (B) Biological Network (C) Both(A) & (B) (D) None of the Above

Last Answer : (A) Artificial Neural Network (ANN)

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1) Transport 2) Network 3) Presentation 4) Session

Last Answer : 2) Network

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session

Last Answer : 2 Network

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network

Last Answer : c. Security Administrator Tool for Analysis Networks

Description : A ____ is a high-speed network that connect local networks in a city or town. (1) LAN (2) MAN (3) WAN (4) TAN

Last Answer : MAN

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : You want to lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain, you will press: a) Window + M b) Window + L c) Window + Q d) None of These

Last Answer : b) Window + L

Description : Enlist different types of computer networks on the basis of their geography. 

Last Answer : Classification of networks based on geography LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network CAN - Campus Area Network PAN - Personal Area Network

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences