Internet and networking technologies form the backbone of modern communication and IT systems, enabling devices, servers, and applications to connect seamlessly across the globe. From basic concepts like IP addresses and DNS to advanced topics such as routing protocols, firewalls, cloud networking, and cybersecurity, networking knowledge is essential for IT professionals, system administrators, cybersecurity analysts, and network engineers.
This collection of 100 Internet and Networking questions is designed to help students, freshers, and experienced professionals strengthen their technical understanding and prepare for interviews, certification exams, and practical networking scenarios.
The questions cover a wide range of topics including TCP/IP, LAN, WAN, VPN, routers, switches, network security, wireless technologies, troubleshooting, and internet protocols.
1. 1 Kilobyte is equal to
A) 100 bytes
B) 512 bytes
C) 1024 bytes
D) 2048 bytes
Correct Answer – C
2. LCD stands for
A) Light Control Diode
B) Liquid Crystal Display
C) Low Contrast Display
D) Light Crystal Device
Correct Answer – B
3. A UPS
A) Converts AC voltage into DC
B) Converts DC voltage into AC voltage
C) Only stores power
D) Is used only for internet connectivity
Correct Answer – B
4. The word ZIP stands for
A) Zigzag Inline Pin
B) Zicxac Inline Pin
C) Zone Improvement Plan (for postal codes)
D) Zero Input Processing
Correct Answer – C
5. The PAL switch is used to
A) Increase or decrease computer processing speed
B) Change display resolution
C) Change TV display formats (Phase Alternating Line)
D) Increase audio volume
Correct Answer – C
6. MICR stands for
A) Magnetic Input Control Reader
B) Magnetic Ink Code Register
C) Magnetic Ink Character Reader
D) Magnetic Information Character Router
Correct Answer – C
7. SWIFT networks are used
A) Between schools
B) Between banks for international financial communication
C) For home networking
D) For email communication
Correct Answer – B
8. Panda is
A) A hardware device
B) An antivirus program
C) A computer virus (PANDA virus family)
D) A software utility
Correct Answer – C
9. A boot sector is
A) Hardware
B) Software area of a disk used to start the computer (not hardware)
C) A type of network
D) A BIOS chip
Correct Answer – B
10. Debug is used to
A) Delete software
B) Search for faults or errors in software code
C) Increase memory
D) Format a drive
Correct Answer – B
11. OCR stands for
A) Optical Command Reader
B) Output Character Register
C) Optical Character Recognition
D) Optical Code Router
Correct Answer – C
12. The total printout of a program is called a
A) Backup
B) Listing
C) Hardcopy
D) Report
Correct Answer – B
13. With the help of ZIP, we can
A) Increase program size
B) Delete programs
C) Decrease the size of files/programs (compression)
D) Format programs
Correct Answer – C
14. A hard disk can be formatted using
A) Booting
B) Format command during or after booting
C) Shutdown process
D) Print command
Correct Answer – B
15. CANNED software refers to
A) Custom-designed software
B) Readymade software (pre-packaged)
C) Hardware drivers
D) Temporary software
Correct Answer – B
16. The process of creating a third file by mixing two files (data + document) is called
A) File copying
B) File linking
C) Mail merging
D) Formatting
Correct Answer – C
17. Figures, images, shapes, and lines made by a computer are called
A) Icons
B) Graphics
C) Templates
D) Charts
Correct Answer – B
18. In WordStar, each line can contain
A) 40 characters
B) 50 characters
C) 65 characters
D) 80 characters
Correct Answer – C
19. Nokia-7500 is
A) An example of a microprocessor
B) A mobile phone (NOT a microprocessor)
C) A motherboard
D) A chipset
Correct Answer – B
20. The first name of the digital computer was
A) UNIVAC
B) ENIAC
C) Univake
D) UNIVAC
Correct Answer – D
21. The modern electronic computer was invented in
A) 1936
B) 1946 (ENIAC)
C) 1951
D) 1960
Correct Answer – B
22. The full form of DOS is
A) Data Operating System
B) Disk Oriented Software
C) Disk Operating System
D) Digital Output System
Correct Answer – C
23. The expanded form of FORTRAN is
A) Formula Transmitter
B) Formal Translation
C) Formula Translation
D) Foreign Transaction
Correct Answer – C
24. A major revolution in the computer sector occurred around
A) 1930
B) 1946
C) 1960
D) 1980
Correct Answer – C
25. Magnetic tape is
A) An input device
B) A storage device
C) An output device
D) A processor
Correct Answer – B
26. The first mechanical computer designed by Charles Babbage was known as the
A) Punch card machine
B) Analytical Engine (or Difference Engine)
C) Tabulator
D) ENIAC
Correct Answer – B
27. The IC chip used in computers is generally made from
A) Plastic
B) Copper
C) Silicon
D) Nickel
Correct Answer – C
28. Telephone broadcasting is an example of
A) Duplex transmission
B) Half-duplex transmission
C) Full-duplex transmission
D) Simplex transmission (one-way)
Correct Answer – D
29. Types of mouse include
A) Mechanical and Optical mouse
B) Wireless and Wired only
C) LCD and LED
D) Roller and Slider
Correct Answer – A
30. The Control Panel in Windows can be used to
A) Install CPUs
B) Increase or decrease mouse cursor speed
C) Change processor frequency
D) Add new hardware manually
Correct Answer – B
31. The capacity of modern mainframe digital computers is
A) 10⁶ Mbps
B) 10⁹ Mbps
C) 10¹² Mbps (incorrect scientifically)
D) Modern mainframes support very high throughput
Correct Answer – D
32. With the help of Windows Explorer, you can
A) Edit videos
B) Know about usage and availability of disk space in the computer
C) Format the CPU
D) Increase RAM size
Correct Answer – B
33. We can use MS Word and PageMaker for
A) Writing code
B) Database management
C) Making resumes and documents
D) Playing media
Correct Answer – C
34. The earliest computers that could work with FORTRAN belonged to the
A) First generation
B) Second generation
C) Third generation
D) Fourth generation
Correct Answer – B
35. Backups in a database are maintained
A) To increase speed
B) To restore lost or corrupted data
C) To reduce file size
D) To update passwords
Correct Answer – B
36. IDEA (International Data Encryption Algorithm) is
A) A compression method
B) An encryption technique
C) A sorting technique
D) A search method
Correct Answer – B
37. DBRM (Database Request Module) takes care of
A) Security passwords
B) Storage of data in a database (Incorrect)
C) Optimizing SQL queries
D) Precompiled SQL requests for DB2 databases
Correct Answer – D
38. One job of a DBMS is to
A) Increase redundancy
B) Hide redundancy
C) Decrease redundancy in data storage and management
D) Make copies of hardware
Correct Answer – C
39. Digital signatures use
A) Compression only
B) Encryption for authentication and integrity verification
C) Audio signals
D) Physical keys
Correct Answer – B
40. The Operating System (OS) acts as
A) A virus scanner
B) A text editor
C) An intermediary between user and hardware
D) A database engine
Correct Answer – C
41. Plotters provide
A) Low-quality output
B) Medium-quality output
C) The highest quality output, especially for graphics and drawings
D) No graphical output
Correct Answer – C
42. ROM is
A) External storage
B) Built-in memory in a computer (non-volatile)
C) Temporary memory
D) Magnetic storage
Correct Answer – B
43. FLASH is
A) A type of RAM
B) A type of non-volatile storage
C) A type of optical memory
D) A type of cache
Correct Answer – B
44. PRAM is
A) A type of RAM
B) Not a RAM (Parameter RAM/Programmable RAM, different from main memory)
C) A hard disk technology
D) A CPU register
Correct Answer – B
45. Flash devices are commonly used in
A) Televisions
B) Cell phones (smartphones) for storage
C) Radio sets
D) Scanners
Correct Answer – B
46. Internal storage is the same as
A) Secondary storage
B) Primary storage (RAM)
C) Optical storage
D) Cloud storage
Correct Answer – B
47. iMac is
A) A database
B) A programming language
C) The name of a machine/computer series by Apple
D) A network device
Correct Answer – C
48. First-generation computers could perform
A) Real-time processing
B) Multiprogramming
C) Batch processing only (slow, vacuum-tube based)
D) Cloud computing
Correct Answer – C
49. The Analytical Engine was created by
A) Alan Turing
B) John Napier
C) Charles Babbage
D) Gottfried Leibniz
Correct Answer – C
50. In GSM services, voicemail
A) Stores text messages
B) Acts as a personal security code
C) Uses a personal PIN/security code for subscriber mailbox access
D) Is a type of hardware
Correct Answer – C
51. In an organization, the senior manager decides about
A) Network cable selection
B) Division of work with respect to IT security
C) Printer configuration
D) Keyboard layout
Correct Answer – B
52. The Encrypting File System (EFS) in Windows XP Professional
A) Protects only system files
B) Protects user data even on shared computers
C) Works only on FAT file systems
D) Allows all users to access encrypted data
Correct Answer – B
53. The .mpeg extension refers to
A) Image files
B) Text documents
C) Movie/video files
D) Audio-only files
Correct Answer – C
54. Controlling (like compiling or interpreting) is
A) Required before executing high-level language programs
B) Controlling/compiling is required.
C) Done only by hardware
D) Optional in C language
Correct Answer – B
55. A plotter is
A) An input device
B) A storage device
C) An output device used for high-quality graphics
D) A processing device
Correct Answer – C
56. 80286 refers to
A) A software package
B) A database function
C) A hardware part of the microprocessor family (Intel)
D) An antivirus system
Correct Answer – C
57. The Top–Bottom approach
A) Measures network traffic
B) Cannot be used to measure network traffic (True statement)
C) Is used for encryption
D) Measures CPU speed
Correct Answer – B
58. A switching mode power supply (SMPS) is used for
A) Displaying graphics
B) Converting raw input AC to regulated DC power for the computer
C) Storing data
D) Cooling hardware
Correct Answer – B
59. A spooler
A) Formats the disk
B) Manages the entire printing process in an operating system
C) Runs the antivirus
D) Controls the mouse pointer
Correct Answer – B
60. Validity routines used in data entry
A) Erase incorrect records
B) Control the user interface
C) Ensure completeness and correctness of data input
D) Compress the database
Correct Answer – C
61. “Less expensive than leased line networks” is
A) A key characteristic of Virtual Private Networks (VPNs)
B) VPNs ARE less expensive than leased lines
C) A feature of local servers
D) A feature of fiber connections
Correct Answer – B
62. A Program Policy Framework
A) Controls hardware
B) Provides strategic direction to an organization
C) Is used for debugging
D) Manages printers
Correct Answer – B
63. In switching technology, crossbar switches
A) Do not have control
B) Have distributed control
C) Have common control
D) Use no control signals
Correct Answer – C
64. Row-level security in databases
A) Is not important
B) Is rarely used
C) Is the most basic part of database security (True statement)
D) Is used only in spreadsheets
Correct Answer – C
65. Voice recognition software
A) Converts text to voice
B) Converts voice to text
C) Converts printed images
D) Checks grammar
Correct Answer – B
66. A user account on a network
A) Can be created by any user
B) Is created only by authorized network administrators (True)
C) Can be created by the printer
D) Is automatically generated
Correct Answer – B
67. IBM-700 series belongs to
A) First generation computers (vacuum tubes)
B) Second generation
C) Third generation
D) Fourth generation
Correct Answer – A
68. Allocating adequate bandwidth
A) Slows down data transfer
B) Has no effect on speed
C) Helps in speeding up data transfer over the internet
D) Removes viruses
Correct Answer – C
69. BCD stands for
A) Binary Code Division
B) Bitwise Common Data
C) Binary Coded Decimal
D) Block Control Data
Correct Answer – C
70. Extended System Configuration Data (ESCD) is
A) ESCD and BIOS are related but not the same.
B) A printer configuration file
C) A RAM chip
D) A backup utility
Correct Answer – A
71. Digitizer is an
A) Output device
B) Storage device
C) Input device
D) Display device
Correct Answer – C
72. Caramel is
A) The latest Intel Centrino platform
B) Intel Centrino platforms include Banias, Dothan, Napa, Santa Rosa, etc.
C) A programming language
D) A chipset used in gaming PCs
Correct Answer – B
73. RISC is known as
A) A storage device
B) A CPU architecture
C) A mouse technology
D) A BIOS type
Correct Answer – B
74. NORTON is
A) A word processor
B) An anti-virus program
C) A compiler
D) A photo editor
Correct Answer – B
75. The system file of an operating system is
A) .TXT
B) .EXE
C) .COM (One of the system files used in DOS)
D) .PDF
Correct Answer – C
76. ATMs of banks dispense
A) Fake currency
B) Digital-only tokens
C) Real currency (cash)
D) Cheques
Correct Answer – C
77. A program that converts high-level language to machine language is
A) Editor
B) Linker
C) Assembler
D) Compiler
Correct Answer – D
78. .txt files can be created in
A) Notepad
B) MS Word (Save as .txt)
C) DOS Editor
D) All of the above
Correct Answer – D
79. A “.zip” file is
A) An audio file
B) A compressed file format used for reducing file size
C) A virus
D) A system log file
Correct Answer – B
80. The Internet is
A) A LAN
B) A PAN
C) A WAN (Wide Area Network)
D) A MAN
Correct Answer – C
81. MP3 technology compresses a sound sequence to
A) Half of its original size
B) One-fourth of its original size
C) One-twelfth of its original size
D) Double its original size
Correct Answer – C
82. At a time, only one operating system can be active on a computer
A) True (normally one OS runs at a time on a PC)
B) False
C) Only on servers
D) Only on laptops
Correct Answer – A
83. If multiple programs can be executed at the same time, it is a
A) Batch operating system
B) Distributed operating system
C) Multiprogramming / Multitasking operating system
D) Real-time operating system
Correct Answer – C
84. An operating system that provides quick and immediate attention is
A) Multiprogramming OS
B) Real-time operating system (RTOS)
C) Batch OS
D) Time-sharing OS
Correct Answer – B
85. A Distributed Operating System uses
A) No communication
B) Only local storage
C) Network facilities to coordinate multiple computers
D) A single processor
Correct Answer – C
86. In MS-DOS, the FORMAT command is used for
A) Renaming files
B) Recreating disk information by preparing the disk for use (formatting)
C) Copying files
D) Backing up data
Correct Answer – B
87. The COPY command in MS-DOS is used to
A) Copy files from one disk drive to another
B) Copy files from one directory to another
C) Copy one or more files at a time
D) All of the above
Correct Answer – D
88. The REN (rename) command in MS-DOS is
A) An external command
B) An internal command (built into COMMAND.COM)
C) A hardware instruction
D) A compiler directive
Correct Answer – B
89. The concept of the World Wide Web (WWW) was propounded by
A) Bill Gates
B) Steve Jobs
C) Tim Berners-Lee
D) Linus Torvalds
Correct Answer – C
90. The memory address sent from the CPU to the main memory travels through the
A) Data bus
B) Control bus
C) Address bus
D) Power bus
Correct Answer – C
91. A MODEM is an electronic device required for
A) Printing documents
B) Connecting the computer to the Internet
C) Increasing processor speed
D) Formatting the hard disk
Correct Answer – B
92. A source program is a program that
A) Is written in machine language
B) Is to be translated (compiled/assembled) into machine language
C) Is a virus program
D) Runs only on DOS
Correct Answer – B
93. A computer virus relates to
A) Hardware
B) A program designed to damage or disrupt computer operations
C) A type of RAM
D) A security password
Correct Answer – B
94. A floppy disk is
A) Not a storage medium
B) A storage medium used in older computer hardware
C) A printer component
D) A modem accessory
Correct Answer – B
95. A DOS floppy disk
A) Does not have a boot record
B) Contains a boot record if it is a bootable floppy
C) Always has multiple boot sectors
D) Has no file system
Correct Answer – B
96. The CPU of a computer is made up of
A) Only memory
B) Arithmetic & Logic Unit and Control Unit (ALU + CU)
C) Store (memory), ALU, and Control Unit (conceptually)
D) ALU and Control Unit only (Correct architecture)
Correct Answer – D
97. In a computer parlor, a mouse is
A) A screen saver
B) An input device used to control the pointer on screen
C) A storage device
D) A memory chip
Correct Answer – B
98. UNIVAC is the name of the computer
A) Used for playing music
B) First used for general-purpose computing and commercial data processing
C) Built only for games
D) Invented by Steve Jobs
Correct Answer – B
99. IC chips in computers are made from
A) Plastic
B) Copper
C) Silicon
D) Aluminum
Correct Answer – C
100. In database management systems, tables are made of
A) Records (rows) and fields (columns)
B) Only numbers
C) Only files
D) Only images
Correct Answer – A

