Synonym of Internet is (1) Gopher (2) Intranet (3) Cyber Space (4) World Wide Web (WWW)

1 Answer

Answer :

 Cyber Space

Related questions

Description : When we opens an Internet site we see www. What is the full form of www? 1) world wide woord 2) world wide web 3) word widing works 4) words wide spiderman web

Last Answer : 2) world wide web

Description : The collection of links throughout the Internet creates an interconnected network called the - 1) WWW 2) Web 3) World Wide Web 4) All of the above

Last Answer : 4) All of the above

Description : The collection of links throughout the Internet creates an interconnected network called the - 1 WWW 2 Web 3 World Wide Web 4 All of the above

Last Answer : 4 All of the above

Description : In the field of internet, www stands for (1) world wide wrestling (2) world wide web (3) world wide wordstar (4) world without wrestling

Last Answer : world wide web

Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : A programme used to view World Wide Web (WWW) pages, such as Google, Yahoo and Internet Explorer, is called: A. Messenger B. Internet C. Operating System D. Browser

Last Answer : ANSWER: D

Description : A programme used to view World Wide Web (WWW) pages, such as Google, Yahoo and Internet Explorer, is called: A. Messenger B. Internet C. Operating System D. Browser

Last Answer : ANSWER: D

Description : A programme used to view World Wide Web (WWW) pages, such as Google, Yahoo and Internet Explorer, is called: A. Messenger B. Internet C. Operating System D. Browser

Last Answer : ANSWER: D

Description : A programme used to view World Wide Web (WWW) pages, such as Google, Yahoo and Internet Explorer, is called: A. Messenger B. Internet C. Operating System D. Browser

Last Answer : ANSWER: D

Description : 'www' stands for _____ 1) World Word Web 2) World Wide Web 3) World White Web 4) World Work Web 5) None of these

Last Answer : Answer :2

Description : Full form of WWW: a) World Wire Web b) World Wide Web c) World Width Web d) None of These

Last Answer : b) World Wide Web

Description : Acronym www in www.bankexamstoday.com , stands for: a) World Word in Wonder b) World Web is Widening c) Wonderful World Web d) World Wide Web e) None of The Above

Last Answer : d) World Wide Web

Description : Who among the following developed World Wide Web (WWW), which gave a new type of information exhibition ? (1) Bob Cohen (2) Tim Berners-Lee (3) Robert Morris Jr. (4) Michel Derstuses

Last Answer : Tim Berners-Lee

Description : How can the Word-Wide-Web be applied in an Intranet and Extranet?

Last Answer : The Word-Wide-Web can not be applied in an "Intranet" as that islocal to an organisation and not world wide. However the standardsthat are used to build the Word-Wide-Web can be used in anIntranet.

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : Who is considered as the inventor of the World Wide Web (WWW) ? -General Knowledge

Last Answer : The answer is 'Tim Berners-Lee'

Description : Who is considered as the inventor of the World Wide Web (WWW) ? -General Knowledge

Last Answer : answer:

Description : www represents: (A) who what and where (B) weird wide web (C) word wide web (D) world wide web

Last Answer : (D) world wide web

Description : It is a program to cruise the internet, It can eliminate the needs of separate internet programs, it make the internet available for everyone. All these are characteristics of: a) Gopher b) Mosaic c) WAIS d) None of These

Last Answer : b) Mosaic

Description : What do you need to put your web pages on the www: a) A connection to the internet b) A web browser c) A web server d) All of The Above e) None of The Above

Last Answer : d) All of The Above

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : ) IoT stands for:- a) Internet of Technology b) Intranet of Things c) Internet of Things d) Information of Things

Last Answer : c) Internet of Things

Description : W3C stands for World Wide Web Consortium which is an international consortium ofcompanies involved with the internet and the web. The W3C was founded in _______by Tim Berners - Lee , the original architect of the World Wide Web: a) 1994 b) 1995 c) 1997 d) None of These

Last Answer : a) 1994

Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : GIGO stands for______ (A) Garbage In Garbage Out (B) Gateway In Gateway Out (C) Gopher In Gopher Out (D) Geographic In Geographic Out

Last Answer : (A) Garbage In Garbage Out

Description : Another name for Usenet is A) Gopher B) Newsgroups C) Browser D) CERN

Last Answer : B) Newsgroups

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : What do you need to put your web pages on the www? (A) a connection to internet (B) a web browser (C) a web server (D) all of the above

Last Answer : (D) all of the above

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider

Description : is a branch of Science which deals with the helping machine find solutions to complex problems in a more human like fashion a. Artificial Intelligence b. Internet Od Things c. Embedded system d. cyber Security

Last Answer : a. Artificial Intelligence

Description : is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security

Last Answer : (a) Artificial intelligence

Description : Which of the following can be identified as cloud? a) Web Applicationsb) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : Which of the following can be identified as cloud? a) Web Applications b) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : What exactly is cloud computing? a) A way to organize desktop computers b) Lightweight software that takes up little space on a hardware c) Computing resources that can be accessed on demand, like electricity from a utility d) The World Wide Web

Last Answer : Computing resources that can be accessed on demand, like electricity from a utility

Description : Differentiate between the terms Internet and Intranet. -Technology

Last Answer : InternetAccess by any individual with dial-up access. Information on Internet could be general, public and advertisement.IntranetAccess by only authorised employees. Information on Intranet could be specific, corporate and proprietary.

Description : What is the difference between internet and intranet ? Want an explanation ?

Last Answer : : The Internet is a set of networks around the world . References: Wikipedia.

Description : What is different between Internet, intranet, and extranet?

Last Answer : Apologize for any grammar mistakes. Internet is a term used for global information network as a whole and is not really relevant to other two terms. To speak about specifics we have intranet ... one local network,. This is often connected by VPN and would include satellite offices and teleworkers.

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : IAHC stands for…………………………………… A. International Ad Hoc Committee B. Internet Ad Hoc Committee C. Intranet Ad Hoc Council D. Intranet Ad Hoc Committee

Last Answer : A. International Ad Hoc Committee

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services

Last Answer : b. to allow intranet users to securely use specified internet services 

Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce

Last Answer : c. filters packets travelling from and to the intranet from the internet 

Description : A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user’s application programs

Last Answer : a. routers which connect intranet to internet 

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access