12.     HTTPS protocol encrypts the information or data using the ........................
a. Transfer Layer Security     b. Layer Security Transport     c. Layer Transport Security     d. None of these

13.     Which one of these is an extension of information domain ..................
a. . net     b. . info     c. . ins     d. . int

14.     Full form of FTP is .....................
a. Fast Transfer Protocol     b. File Transfer Protocol     c. Full Transfer Protocol     d. File Transit Protocol

15.HTML uses ..................... tags
a. Predefined     b. User defined     c. Both a and b     d. All of these

16.     A software used to open web pages on the Internet is called a ......................
a. Surfer     b. Portal     c. Browser     d. Provide

B. Fill in the Blanks:

1.   A ........................ of computers can consist of two or more computers that can connect and share information.

2.  WWW is an acronym for .............................. .

3.   The web uses the ......................... protocol for the transfer the transfer of the web pages over the Internet.

4.  A person who uses the Internet uses a software known as a ................... ti request for a document or a web page located on the web.

5.  A ..................... is a program that runs on a machine and is meant to provide services to the machines (clients) connected to it.

6.  A ............... is a computer system which uses a network to access a remote services from the server.

7.  A .............. is type of server which is responsible for providing web content.

8.  The ................ has designed a system to provide a unique address to each computer in the form of numbers or characters.

9.  ..................... have all the elements of your website which may include images, documents, templates, and HTML files.

10.  The rules, which determine how the data should be transferred over the networks, compressed, and presented on the screen, etc., are called ....................... .

11.  .................... protocol is widely used for secure communication on the Internet.

12.  ..................... protocol determines how different programs exchange data over the Internet.

13.  Usenet stands for ........................ .

14.  A ................... is an online discussion forum where remotely connected users share and discuss a particular topic.

page no:28
         
Home