Basics of Internet MCQ Quiz - Objective Question with Answer for Basics of Internet - Download Free PDF
Last updated on Jun 5, 2025
Latest Basics of Internet MCQ Objective Questions
Basics of Internet Question 1:
In the context of artificial intelligence (AI) and machine learning, how are the concepts of explicit and implicit memory best represented?
Answer (Detailed Solution Below)
Basics of Internet Question 1 Detailed Solution
The best representation of explicit and implicit memory in AI and machine learning is:
B) Explicit memory is represented as algorithms used in AI programming, while implicit memory is represented in the form of machine learning weights.
Key Points
- Explicit memory in AI refers to factual knowledge that can be consciously accessed and retrieved. This encompasses the programmed rules, knowledge structures, and reasoning mechanisms built into an AI system. These elements are directly accessible and interpretable by humans. Algorithms representing search algorithms, planning rules, or symbolic logic knowledge bases fall under this category.
- Implicit memory in AI, on the other hand, refers to knowledge that is acquired through learning and is encoded within the internal state of the system, often in a way that is opaque to human understanding. This knowledge is reflected in the parameters (weights) learned by machine learning models. Adjusting these weights changes the model's behavior, but the specific meaning or interpretation of individual weights might be difficult to grasp directly.
The other options are less accurate:
- A): While databases can store some forms of explicit memory, they don't capture the procedural or algorithmic aspects of knowledge typically associated with AI programming.
- C): Code comments can store some explicit information, but they wouldn't fully encompass the entirety of explicit memory, which can also include data structures and other program elements.
- D): Hardware architecture and machine instructions are more fundamental components of computer systems, not directly representing memory concepts in AI.
Therefore, option B best aligns with the distinction between explicit and implicit memory in the context of AI and machine learning.
Basics of Internet Question 2:
Which organization owns the popular online e-commerce platform 'BigBasket' ?
Answer (Detailed Solution Below)
Basics of Internet Question 2 Detailed Solution
The correct answer is Tata Group
Key Points
- Tata Group: ✅ In 2021, Tata Digital, a subsidiary of Tata Group, acquired a majority stake in BigBasket, making it the official owner of the popular online grocery delivery platform.
- Alibaba: ❌ Previously held a minority stake in BigBasket, but does not own the company anymore after Tata Group’s acquisition.
- Microsoft: ❌ Microsoft is a major technology company but has no stake or ownership in BigBasket.
- Reliance Jio: ❌ Although Reliance has its own e-commerce ventures like JioMart, it does not own BigBasket.
Additional Information
- BigBasket was founded in 2011 and has become one of India’s largest online grocery platforms.
- With Tata Group’s acquisition, BigBasket is now part of Tata’s broader digital services portfolio, including other platforms like Tata Neu.
Hence, the correct answer is: option 3) Tata Group
Basics of Internet Question 3:
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ______.
Answer (Detailed Solution Below)
Basics of Internet Question 3 Detailed Solution
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as Consumer to Business (C2B).
Key Points
Consumer to Business:
- Consumer to Business is a business model which involves customers and business.
- This model involves customers creating ideas and businesses using up the created idea.
- In the C2B model, a reverse auction or demand collection model enables buyers to name or demand their own price, which is often binding, for a specific good or service.
- Inside of a consumer-to-business market, the roles involved in the transaction must be established and the consumer must offer something of value to the business.
Basics of Internet Question 4:
Connection to the internet using a phone line and a modem is called _______ connection.
Answer (Detailed Solution Below)
Basics of Internet Question 4 Detailed Solution
The correct answer is dial up
Key Points
- Dial-up: ✅ Dial-up connection uses a standard telephone line and a modem to connect to the internet. It is one of the earliest methods of accessing the internet and is relatively slow compared to modern technologies.
- Digital: ❌ The term "digital" refers to data in binary form, not a specific internet connection type.
- Fiber optic: ❌ Fiber optic connections are modern, high-speed internet connections using light signals through fiber cables, not phone lines.
- Dish: ❌ Dish refers to satellite internet, which uses satellite dishes for connectivity, not telephone lines.
Additional Information
- Speed: Dial-up speeds usually max out at 56 kbps, much slower than broadband or fiber internet.
- Usage: Dial-up is rarely used today except in extremely remote areas with no broadband access.
Hence, the correct answer is: option 2) dial up
Basics of Internet Question 5:
When data is transmitted from device A to device B, the header from A layer 5 is read by B's _____ layer.
Answer (Detailed Solution Below)
Basics of Internet Question 5 Detailed Solution
The correct answer is: option 3: Session
Key Points
In the OSI (Open Systems Interconnection) model, data is transmitted from the topmost layer (Layer 7 – Application) to the lowest (Layer 1 – Physical) on the sender’s side and then travels back up from Layer 1 to Layer 7 on the receiver’s side.
Layer 5 is the Session Layer.
So, when data is transmitted from device A to device B, the header added by Layer 5 on device A (Session Layer) is read and processed by Layer 5 on device B.
Explanation of options:
- Option 1 – Presentation: ❌ Layer 6, handles data format and encryption/decryption.
- Option 2 – Transport: ❌ Layer 4, responsible for reliable transmission (TCP/UDP).
- Option 3 – Session: ✅ Correct. It's Layer 5, which manages sessions and its header is read by the peer Session Layer.
- Option 4 – Physical: ❌ Layer 1, deals with transmission of raw bits.
Hence, the correct answer is: option 3: Session
Top Basics of Internet MCQ Objective Questions
What is the email attachment size limit in Gmail?
Answer (Detailed Solution Below)
Basics of Internet Question 6 Detailed Solution
Download Solution PDFElectronic mail, or email, is the transmission of text-based messages among networked computers. Email is one of the earliest and most basic messaging resources on the Internet and in many ways it still acts as the lowest common denominator for computer communications. Types of email services:
- Free Web-based Email Services: These are the commonly used email accounts accessible through a web browser (such as Internet Explorer, Firefox etc.). They generally use HTTP Protocol for accessing mail. Example: Yahoo Mail, Hotmail, Gmail (whose attachment size limit is 25 MB) offer free web-based email services. These services are run on financial profit from advertisements. Advertisers pay service providers to expose email account holders to advertisement.
- Priced Web-based Email Services: There are also priced web-based email service providers. Many of the free web-based email service providers such as Yahoo! And Hotmail do offer premium account on payment basis. Advantage of utilising such services include more secured transaction of communication; personalised email address; better spam filtration as well as increased storage space. Priced email services are most useful in business-related message exchanges.
- Private Email Services: Most of the institutions/organisations have their own dedicated mail server and offer mail account for free to their staff and other members of the institution. These accounts exist only till one is member of that institution. For example: [email protected]; [email protected] etc.
Hence, we conclude that email attachment size limit in Gmail is 25 MB.
When sender and receiver of an e-mail are on same system, we need only two _____.
Answer (Detailed Solution Below)
Basics of Internet Question 7 Detailed Solution
Download Solution PDFThe correct answer is Users.
Key Points
- User - someone who uses a product, machine, or service .
- IP( Internet Protocol )-
- An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. e.g - Format of IP address is 168.212.226.204 represents the 32- bit binary number.
Additional Information
Some important points to remember about IP address are:
- IP address stands for Internet Protocol address.
- IP address is a 32 bit number which is sub divided into four bytes.
- It is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
- There are two version of IP address: IPv4 (32 bits) and IPv6 (128 bits).
The Ethernet is
Answer (Detailed Solution Below)
Basics of Internet Question 8 Detailed Solution
Download Solution PDFEthernet is a type of computer networking technology that is commonly used for transmitting data through cable in local area networks (LANs).
Key Points
- Ethernet is a form of communication protocol used to connect various numbers of computers with each other to transmit data.
- it is invented by Robert Metcalfe.
- An Ethernet is also known as Alto Aloha Network and it is a commonly used LAN and WAN protocol.
- It is wired connections are used for faster maximum data transfer rates and are more secure & less susceptible to interference than wireless networks.
Different types of ethernet are following:
Types of ethernet | Features |
Fast Ethernet |
|
Gigabit Ethernet |
|
10-Gigabit Ethernet |
|
Switch Ethernet |
|
Therefore, Ethernet is a system that connects a number of computers or devices together to form a LAN
e-Mail stands for:
Answer (Detailed Solution Below)
Basics of Internet Question 9 Detailed Solution
Download Solution PDFThe correct answer is Electronic mail.
Key Points
- e-Mail stands for Electronic mail.
- Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.
- The email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.
- Ray Tomlinson is credited as the inventor of email in 1971.
Additional Information
Some important abbreviations used in Computer:
- BIOS - Basic Input Output System
- CAD - Computer-Aided Design
- EDVAC - Electronic Discrete Variable Automatic Calculator
- EPROM - Erasable Programmable Read-Only Memory.
- FORTRAN - FORmula TRANslation.
- GPRS - General Packet Radio Service.
What is Phishing?
Answer (Detailed Solution Below)
Basics of Internet Question 10 Detailed Solution
Download Solution PDFEmail is the most used method of communication.
Key Points
- Phishing assaults occur when a person sends a fake message that appears to come from a trusted source.
- Phishing is a frequent sort of cyberattack.
- Phishing begins with a phony email or another kind of communication intended to entice a victim
- Phishing Emails look lucrative and eye-catching or attention-grabbing are intended to grab people's attention right away.
- The message is designed to appear as if it came from a known sender.
Therefore, Phishing is someone sends legitimate-looking emails to users.
Additional Information
- Malware is a file or program that infects, investigates, steals, or performs nearly any action that an attacker desires.
- Malware is often supplied over a network.
The first highway of information is
Answer (Detailed Solution Below)
Basics of Internet Question 11 Detailed Solution
Download Solution PDFThe telegraph is considered to be the first highway of information.
Key Points
- The telegraph was invented in the early 19th century, and it was the first way to transmit information over long distances in a matter of seconds.
- The telegraph allowed people to communicate with each other quickly and easily, and it revolutionized the way that information was disseminated.
- Before the telegraph, information was slow to travel.
- It could take weeks or even months for news to travel from one place to another.
- The telegraph made it possible for news to travel instantly, and it had a profound impact on the way that people thought about the world.
- The telegraph was also used to transmit commercial and financial information, and it helped to facilitate the growth of the global economy.
- The telegraph was a truly revolutionary invention, and it paved the way for the development of the modern information highway.
Therefore, the answer is Telegraph.
In which year the Information Technology Act was enacted in India?
Answer (Detailed Solution Below)
Basics of Internet Question 12 Detailed Solution
Download Solution PDFKey Points
Information Technology Act was enacted in the year 2000 in India.
- Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data or information. IT is typically used within the context of business operations as opposed to personal or entertainment technologies. IT is considered to be a subset of information and communications technology (ICT).
- The IT Act of 2000 passed in a budget session of parliament and signed by President K.R. Narayanan in 2000. It underwent further finalization by India's Minister of Information Technology, Pramod Mahajan.
- The original act addressed electronic documents, e-signatures, and authentication of those records. It also enacted penalties for security breach offenses including damaging computer systems or committing cyber terrorism. Regulating authorities received power to monitor these situations and draft rules as situations arose.
- The IT Act underwent changes as Internet technology grew. In 2008, additions expanded the definition of "communication device" to include mobile devices and placed owners of given IP addresses responsible for distributed and accessed content.
- Privacy was addressed in 2011 when stringent requirements for collecting personal information came into effect.
- The most controversial change in this act involves section 66A. It makes "offensive messages" illegal and holds the owners of servers responsible for the content.
Thus, option 3 is the correct answer.
Answer (Detailed Solution Below)
Basics of Internet Question 13 Detailed Solution
Download Solution PDFThe correct answer is a programming language.
- Python is an interpretable, high-level and general-purpose programming language.
- It created by Guido van Rossum and first published in 1991, Python's design philosophy stresses the readability of code with its impressive use of substantial white space.
- The goal of its language constructs and object-oriented approach is to help programmers write simple, logical code for small and large projects. Python is dynamically typed and dust-collected.
- It supports multiple programming paradigms, including structured (especially procedural), object-oriented, and functional programming.
- Due to its extensive standard library, Python is also defined as a "batteries included" language.
Important Points
- Python 2.0, launched in 2000, added features like list comprehensions and a waste management system with comparison numbering.
- Python 3.0, released in 2008, was a big language upgrade that wasn't entirely backwards-compatible, and a lot of Python 2 code didn't run unmodified on Python 3.
- The Python 2 language was formally retired in 2020 (first set for 2015) and Python 2.7.18 is the final Python 2.7 version and hence the last Python 2 release.
A combination of hardware and software which links two parts of the same LAN or two compatible LANs by directing messages to the correct node is called
Answer (Detailed Solution Below)
Basics of Internet Question 14 Detailed Solution
Download Solution PDFLocal Area Networks (LAN) is widely used to share resources and exchange information by connecting personal computers and workstations in the company offices and factories. A LAN is a network that is limited to an area such as a building or school. In a LAN, computers, and hardware such as printers can be connected by cable (copper wiring), fiber optic cabling (glass fibers), or using a wireless (radio waves) connection.
Embedded System
- It is a microprocessor-based computer hardware system with software that is designed to perform a dedicated function, either as an independent system or as a part of a large system.
- At the core is an integrated circuit designed to carry out computation for real-time operations.
Router
- It is the piece of network hardware that allows communication between your local home network—like your personal computers and other connected devices—and the internet.
- The router used in home and small networks is more accurately called a residential gateway.
- It is a combination of hardware and software which links two parts of the same LAN by directing messages to the correct node.
A hybrid computer
- It is a computing system that combines both digital and analog components.
- Traditionally, the analog components of the computer handle complex mathematical computations.
- The digital components take care of logical and numerical operations, in addition to serving as the controller for the system.
A microprocessor
- It is an integrated circuit (IC) that incorporates core functions of a computer’s central processing unit (CPU).
- It is a programmable multipurpose silicon chip, clock-driven, register-based, accepts binary data as input, and provides output after processing it as per the instructions stored in the memory.
Hence, it is clear from the above points that a combination of hardware and software which links two parts of the same LAN or two compatible LANs by directing messages to the correct node is called Router.
Flipkart, Alibaba, Amazon are examples of
Answer (Detailed Solution Below)
Basics of Internet Question 15 Detailed Solution
Download Solution PDFThe correct answer is Option 3 and Option 4 as per official answer key.
Key Points
- Flipkart, Alibaba, and Amazon are all examples of business-to-consumer (B2C) e-commerce businesses. Hence, Option 3 is correct.
- In B2C, consumers can browse products, read reviews, and place orders on a company's website. The company then ships the goods directly to the consumer.
- Alibaba is a company that provides B2C, business-to-business (B2B), and consumer-to-consumer (C2C) sales services. Alibaba was founded in 1999 and offers services such as logistics, cloud computing, and digital media and entertainment.
Important Points
B2B e-commerce
- It is one of the fastest-growing sales models.
- B2B e-commerce, or business-to-business electronic commerce, is the sale of goods or services through online transactions between businesses. Manufacturing materials, clothing, car parts and semiconductors are B2B examples.
Additional Information
The Most Common Types of Ecommerce Business Models are:
- B2C (Business-to-consumer).
- B2B2C (Business-to-business-to-consumer).
- B2G (Business-to-government).
- C2B (Consumer-to-business).
- D2C (Direct-to-consumer).
- C2C (Consumer-to-consumer).