Internet & Web Technologies (WWW, HTTP, HTTPS, Cloud Computing, etc.)

Here is a detailed summary on “Internet & Web Technologies” covering key topics such as the World Wide Web (WWW), HTTP, HTTPS, Cloud Computing, and more:


Chapter Summary: Internet & Web Technologies

The internet is a vast network that connects millions of computers worldwide, enabling communication and access to information. The term “Web Technologies” refers to the various technologies and protocols that facilitate the functioning of the World Wide Web (WWW) and cloud computing platforms. This chapter will explore essential concepts such as the WWW, HTTP, HTTPS, cloud computing, web servers, browsers, HTML, CSS, JavaScript, and more, providing a comprehensive understanding of modern web technologies.


1. The World Wide Web (WWW)

The World Wide Web (WWW) is a system of interlinked hypertext documents that are accessed through the internet. It allows users to view websites, interact with multimedia content, and use various online applications. The web is built on the foundation of protocols, services, and technologies, which include:

  • Web Browsers: Software applications used to access and navigate the web. Examples include Google Chrome, Mozilla Firefox, Safari, and Microsoft Edge.
  • Web Servers: Systems that store and deliver content to users’ web browsers upon request. Popular web servers include Apache HTTP Server, Nginx, and Microsoft IIS.
  • Web Pages: Documents that are viewed on the web. These can be static (HTML-based) or dynamic (generated by server-side scripting).

The World Wide Web was invented by Tim Berners-Lee in 1989, revolutionizing the way information is shared and accessed.


2. Hypertext Transfer Protocol (HTTP)

HTTP (Hypertext Transfer Protocol) is the foundational protocol used for transferring hypertext (web pages) over the internet. HTTP defines the rules for communication between a client (web browser) and a server. It operates as a request-response protocol:

  • Request: The client (browser) sends an HTTP request to the server to access a particular resource (e.g., a web page).
  • Response: The server processes the request and sends an HTTP response back to the client, which typically includes the requested resource (such as HTML, images, or data).

Key Components of HTTP:

  • Request Methods: Common HTTP request methods include GET (retrieve data), POST (submit data), PUT (update data), and DELETE (remove data).
  • Status Codes: These are numerical codes sent by the server to indicate the status of a request. For example, a 200 status code means “OK,” and a 404 status code means “Not Found.”

HTTP operates over a stateless protocol, meaning each request is independent and doesn’t retain memory of previous requests.


3. Hypertext Transfer Protocol Secure (HTTPS)

HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP that adds a layer of security by encrypting the communication between the client and the server using SSL/TLS (Secure Sockets Layer/Transport Layer Security). HTTPS ensures:

  • Confidentiality: Data transmitted between the browser and the server is encrypted, making it unreadable to third parties.
  • Integrity: The data cannot be tampered with during transmission.
  • Authentication: Verifies the identity of the server using SSL/TLS certificates, reducing the risk of man-in-the-middle attacks.

HTTPS is commonly used for online transactions, email, and any websites where user data, such as passwords or personal information, is exchanged.


4. Web Servers

Web servers are responsible for hosting websites and responding to requests made by clients (typically browsers). They handle HTTP or HTTPS requests and return resources such as HTML documents, images, CSS files, JavaScript, etc.

Popular Web Servers:

  • Apache HTTP Server: One of the most widely used open-source web servers.
  • Nginx: Known for its performance and scalability, it is used as both a web server and a reverse proxy server.
  • LiteSpeed: A commercial web server known for its speed and efficiency.

A web server works by listening for requests on a specific port (usually port 80 for HTTP and port 443 for HTTPS) and sending back the requested resources.


5. Cloud Computing

Cloud Computing refers to the delivery of computing services (such as storage, processing, networking, and software) over the internet. Rather than maintaining physical infrastructure, businesses and individuals can use cloud services on-demand, paying only for what they use. Cloud computing has revolutionized how IT resources are managed, reducing the need for expensive hardware and improving scalability and flexibility.

Types of Cloud Computing:

  1. Infrastructure as a Service (IaaS): Provides virtualized computing resources over the internet, such as virtual machines, storage, and networks. Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud.
  2. Platform as a Service (PaaS): Provides a platform that allows customers to develop, run, and manage applications without managing infrastructure. Examples: Google App Engine, Heroku.
  3. Software as a Service (SaaS): Delivers software applications over the internet, which users can access through a web browser. Examples: Google Workspace, Microsoft 365, Dropbox.

Advantages of Cloud Computing:

  • Scalability: Cloud services can easily scale up or down based on user needs.
  • Cost Efficiency: Users only pay for the resources they use, reducing upfront infrastructure costs.
  • Reliability: Cloud providers offer high availability with redundancy and backup systems.
  • Security: Cloud services often come with robust security features like data encryption, identity management, and compliance with industry standards.

6. Web Development Technologies

Web development involves the creation of websites and web applications. Several technologies and programming languages are used in web development, including:

Front-End Technologies:

  • HTML (HyperText Markup Language): The standard markup language for creating web pages. It defines the structure and content of a webpage.
  • CSS (Cascading Style Sheets): Used to style and layout web pages, controlling elements like colors, fonts, and positioning.
  • JavaScript: A programming language that enables interactivity on websites. JavaScript allows for dynamic content such as animations, form validation, and real-time updates.

Back-End Technologies:

  • Server-Side Scripting: Languages like PHP, Python, Ruby, Node.js, and Java serve to process requests and generate dynamic web content.
  • Databases: Websites often require databases (e.g., MySQL, PostgreSQL, MongoDB) to store and retrieve data.
  • Web Frameworks: Frameworks like Django (Python), Ruby on Rails (Ruby), and Laravel (PHP) provide pre-built components to speed up development.

7. Web Protocols and Technologies

In addition to HTTP and HTTPS, other protocols and technologies are essential for the web to function effectively:

  • DNS (Domain Name System): The DNS translates human-readable domain names (e.g., www.example.com) into IP addresses that computers can understand.
  • FTP (File Transfer Protocol): Used for transferring files between a client and a server. Secure FTP (SFTP) provides encrypted data transfer.
  • SMTP (Simple Mail Transfer Protocol): The protocol used for sending emails.
  • WebSockets: A protocol that enables two-way communication between a client and server, often used for real-time applications like chat services and online gaming.

8. Web Security

As web usage increases, security becomes more critical. Some key aspects of web security include:

  • SSL/TLS Certificates: Secure the communication between clients and servers.
  • Cross-Site Scripting (XSS): A vulnerability where attackers inject malicious scripts into web pages viewed by users.
  • Cross-Site Request Forgery (CSRF): A type of attack where an attacker tricks a user into performing an action they didn’t intend to.
  • SQL Injection: A vulnerability where attackers can manipulate SQL queries to gain unauthorized access to a database.

Here are the Top 50 Objective MCQs on Internet & Web Technologies (WWW, HTTP, HTTPS, Cloud Computing, etc.), each with 4 options and the correct answer marked:


Internet & Web Technologies – MCQs

  1. Which of the following is used to access the World Wide Web?
    A) Compiler
    B) Browser
    C) Server
    D) Protocol
    Answer: B) Browser
  2. What does HTTP stand for?
    A) Hyper Type Transfer Protocol
    B) High Transfer Text Protocol
    C) HyperText Transfer Protocol
    D) HyperTool Transfer Protocol
    Answer: C) HyperText Transfer Protocol
  3. What is the port number for HTTPS?
    A) 21
    B) 443
    C) 80
    D) 110
    Answer: B) 443
  4. Which of the following is a web server?
    A) MySQL
    B) Apache
    C) Google Chrome
    D) Oracle
    Answer: B) Apache
  5. What does URL stand for?
    A) Uniform Resource Locator
    B) Universal Reference Link
    C) Uniform Read Locator
    D) Universal Resource Login
    Answer: A) Uniform Resource Locator
  6. What is the function of a DNS?
    A) Encrypt Data
    B) Translate domain names to IP addresses
    C) Provide security
    D) Build websites
    Answer: B) Translate domain names to IP addresses
  7. HTTPS ensures communication is:
    A) Faster
    B) Encrypted
    C) Broken
    D) Unreliable
    Answer: B) Encrypted
  8. Cloud Computing offers:
    A) Only storage
    B) Services via the Internet
    C) Only software
    D) Local network access
    Answer: B) Services via the Internet
  9. Which protocol is used to send emails?
    A) FTP
    B) SMTP
    C) HTTP
    D) SNMP
    Answer: B) SMTP
  10. Which is NOT a web browser?
    A) Chrome
    B) Firefox
    C) Safari
    D) Linux
    Answer: D) Linux
  11. Which of the following is NOT a cloud model?
    A) IaaS
    B) SaaS
    C) PaaS
    D) Naas
    Answer: D) Naas
  12. What does HTML stand for?
    A) HighText Markup Language
    B) HyperText Markdown Language
    C) HyperText Markup Language
    D) None of the above
    Answer: C) HyperText Markup Language
  13. Which one is a search engine?
    A) Windows
    B) Linux
    C) Yahoo
    D) Oracle
    Answer: C) Yahoo
  14. What type of file is usually a website’s homepage?
    A) .exe
    B) .docx
    C) .html
    D) .txt
    Answer: C) .html
  15. Which company provides AWS cloud services?
    A) Microsoft
    B) IBM
    C) Amazon
    D) Google
    Answer: C) Amazon
  16. FTP is used for:
    A) Secure browsing
    B) File Transfer
    C) Email
    D) Searching
    Answer: B) File Transfer
  17. Which is not a type of cloud deployment?
    A) Public
    B) Private
    C) Hybrid
    D) Static
    Answer: D) Static
  18. Which of the following is a front-end web technology?
    A) PHP
    B) SQL
    C) HTML
    D) Python
    Answer: C) HTML
  19. Which protocol is used to fetch web pages from the server?
    A) FTP
    B) SMTP
    C) HTTP
    D) POP
    Answer: C) HTTP
  20. SSL stands for:
    A) Secure Server Login
    B) Security Sockets Layer
    C) Secure Sockets Layer
    D) Safe Secure Layer
    Answer: C) Secure Sockets Layer
  21. Which one is not an HTTP method?
    A) GET
    B) POST
    C) FETCH
    D) DELETE
    Answer: C) FETCH
  22. The first page of a website is called:
    A) Master page
    B) First page
    C) Landing page
    D) Home page
    Answer: D) Home page
  23. Who invented the World Wide Web?
    A) Bill Gates
    B) Tim Berners-Lee
    C) Steve Jobs
    D) Charles Babbage
    Answer: B) Tim Berners-Lee
  24. Which language is used for server-side scripting?
    A) HTML
    B) CSS
    C) JavaScript
    D) PHP
    Answer: D) PHP
  25. Google Drive is an example of:
    A) IaaS
    B) SaaS
    C) PaaS
    D) DaaS
    Answer: B) SaaS

  1. Which protocol is used for secure file transfers?
    A) HTTP
    B) FTP
    C) SFTP
    D) POP3
    Answer: C) SFTP
  2. Cloud computing is based on which model?
    A) Centralized
    B) Client-server
    C) Pay-per-use
    D) Static
    Answer: C) Pay-per-use
  3. What does ISP stand for?
    A) Internet Server Page
    B) Internal Service Provider
    C) Internet Service Provider
    D) Interconnected Server Protocol
    Answer: C) Internet Service Provider
  4. Which one is an example of IaaS?
    A) Microsoft Word
    B) Google Docs
    C) Amazon EC2
    D) Gmail
    Answer: C) Amazon EC2
  5. What is the main advantage of HTTPS over HTTP?
    A) Faster Speed
    B) Encryption and Security
    C) Cheaper Hosting
    D) No DNS needed
    Answer: B) Encryption and Security
  6. Which one is not a component of cloud computing?
    A) Service
    B) Deployment
    C) Execution
    D) Security
    Answer: C) Execution
  7. Which of the following is a programming language for the web?
    A) MySQL
    B) CSS
    C) JavaScript
    D) XML
    Answer: C) JavaScript
  8. Which browser was first developed by Netscape?
    A) Chrome
    B) Firefox
    C) Navigator
    D) Opera
    Answer: C) Navigator
  9. Which organization oversees domain name system?
    A) ICANN
    B) NASA
    C) ISO
    D) WHO
    Answer: A) ICANN
  10. A static website is:
    A) Always changing
    B) User interactive
    C) Unchanging content
    D) Database driven
    Answer: C) Unchanging content
  11. Which layer in cloud manages services like SaaS, IaaS, and PaaS?
    A) Software Layer
    B) Management Layer
    C) Service Layer
    D) Application Layer
    Answer: C) Service Layer
  12. The full form of TCP/IP is:
    A) Transfer Control Protocol / Internal Protocol
    B) Transmission Control Protocol / Internet Protocol
    C) Transport Contact Point / Internet Process
    D) None of the above
    Answer: B) Transmission Control Protocol / Internet Protocol
  13. Which one is not a cloud provider?
    A) AWS
    B) Azure
    C) Google Cloud
    D) Firefox
    Answer: D) Firefox
  14. Which of these stores web pages?
    A) Browser
    B) Web server
    C) Switch
    D) Hub
    Answer: B) Web server
  15. Which protocol is used to receive emails?
    A) SMTP
    B) POP3
    C) FTP
    D) HTTP
    Answer: B) POP3
  16. Google Chrome is an example of a:
    A) Search Engine
    B) Web Server
    C) Web Browser
    D) Cloud Provider
    Answer: C) Web Browser
  17. Which HTML tag is used to create a link?
    A) <link>
    B) <a>
    C) <href>
    D) <url>
    Answer: B) <a>
  18. Which is not a feature of cloud computing?
    A) On-demand service
    B) Scalability
    C) Manual updates
    D) Resource pooling
    Answer: C) Manual updates
  19. Which of the following is used for cloud data storage?
    A) CloudDrive
    B) Google Drive
    C) CloudByte
    D) CloudSpace
    Answer: B) Google Drive
  20. The ‘lock’ icon in browser address bar means:
    A) Website is fake
    B) No connection
    C) Secure connection
    D) Dangerous
    Answer: C) Secure connection
  21. Which protocol helps real-time communication in browsers?
    A) HTTP
    B) WebSockets
    C) FTP
    D) DNS
    Answer: B) WebSockets
  22. Which device connects your local network to the Internet?
    A) Switch
    B) Router
    C) Hub
    D) Modem
    Answer: B) Router
  23. Which language adds styling to web pages?
    A) HTML
    B) PHP
    C) Java
    D) CSS
    Answer: D) CSS
  24. A web page that adjusts to different screen sizes is called:
    A) Responsive
    B) Static
    C) Dynamic
    D) Adaptive
    Answer: A) Responsive
  25. Which of the following is NOT a benefit of cloud computing?
    A) Scalability
    B) Flexibility
    C) High upfront cost
    D) Pay-as-you-go
    Answer: C) High upfront cost


Internet & Web Technologies – MCQs (51–100)

  1. Which of the following is a dynamic website development language?
    A) HTML
    B) CSS
    C) JavaScript
    D) JPEG
    Answer: C) JavaScript
  2. Which of the following is a cloud storage platform by Microsoft?
    A) OneDrive
    B) Dropbox
    C) iCloud
    D) DriveHQ
    Answer: A) OneDrive
  3. Which one of the following is not a feature of HTTP?
    A) Stateless
    B) Connectionless
    C) Secure
    D) Media Independent
    Answer: C) Secure
  4. In cloud computing, PaaS provides:
    A) Physical hardware
    B) Development platforms
    C) Software only
    D) Security software
    Answer: B) Development platforms
  5. Which of these is used to uniquely identify a website on the internet?
    A) ISP
    B) IP Address
    C) DNS
    D) MAC Address
    Answer: B) IP Address
  6. Cloud computing reduces the need for:
    A) Internet access
    B) IT infrastructure
    C) Security
    D) Databases
    Answer: B) IT infrastructure
  7. Which of these is not a type of internet connection?
    A) Dial-up
    B) Broadband
    C) Fiber
    D) Thermal
    Answer: D) Thermal
  8. Which of the following is a markup language?
    A) Java
    B) Python
    C) HTML
    D) PHP
    Answer: C) HTML
  9. What is the default port of HTTP?
    A) 22
    B) 25
    C) 80
    D) 443
    Answer: C) 80
  10. Which protocol is used to securely transfer files over the internet?
    A) FTP
    B) HTTP
    C) SFTP
    D) POP
    Answer: C) SFTP

  1. Which device assigns IP addresses to devices in a network?
    A) Router
    B) Switch
    C) Hub
    D) Repeater
    Answer: A) Router
  2. Which of the following is not a cloud service provider?
    A) Amazon Web Services
    B) Microsoft Azure
    C) Oracle Cloud
    D) Mozilla Firefox
    Answer: D) Mozilla Firefox
  3. Which organization developed the HTTP protocol?
    A) Microsoft
    B) CERN
    C) W3C
    D) Google
    Answer: C) W3C
  4. Which of these stores website data locally for faster loading?
    A) Cookies
    B) Cache
    C) DNS
    D) IP
    Answer: B) Cache
  5. Which cloud service provides hardware as a service?
    A) SaaS
    B) PaaS
    C) IaaS
    D) DaaS
    Answer: C) IaaS
  6. Which company developed the Chrome browser?
    A) Mozilla
    B) Microsoft
    C) Google
    D) Apple
    Answer: C) Google
  7. A user-friendly address like www.google.com is known as:
    A) IP
    B) MAC
    C) Domain name
    D) URL
    Answer: C) Domain name
  8. HTML files are saved with which extension?
    A) .txt
    B) .doc
    C) .html
    D) .htm
    Answer: C) .html
  9. Which is a benefit of using cloud computing?
    A) Manual updates
    B) Limited access
    C) Elasticity
    D) No internet required
    Answer: C) Elasticity
  10. A hybrid cloud is a combination of:
    A) Public and Virtual
    B) Public and Private
    C) LAN and WAN
    D) Hardware and Software
    Answer: B) Public and Private

  1. Which of the following tags is used in HTML to add an image?
    A) <img>
    B) <src>
    C) <image>
    D) <picture>
    Answer: A) <img>
  2. Which of the following is NOT an IaaS provider?
    A) Amazon EC2
    B) Google Compute Engine
    C) Microsoft Azure
    D) Dropbox
    Answer: D) Dropbox
  3. What is the main use of JavaScript in websites?
    A) Design
    B) Layout
    C) Styling
    D) Interactivity
    Answer: D) Interactivity
  4. Which device provides internet connectivity via a SIM card?
    A) Modem
    B) Router
    C) Dongle
    D) Switch
    Answer: C) Dongle
  5. Which web protocol provides maximum security?
    A) HTTP
    B) HTTPS
    C) FTP
    D) Telnet
    Answer: B) HTTPS
  6. Cloud computing is typically accessed via:
    A) Intranet
    B) LAN
    C) Internet
    D) USB
    Answer: C) Internet
  7. Which of the following is a cloud-based email service?
    A) Outlook
    B) Notepad
    C) Excel
    D) Word
    Answer: A) Outlook
  8. Which of the following stores information about web pages for faster access?
    A) IP
    B) DNS
    C) Browser Cache
    D) Firewall
    Answer: C) Browser Cache
  9. Which of the following is not an HTTP status code?
    A) 200
    B) 404
    C) 503
    D) 888
    Answer: D) 888
  10. The IP address 127.0.0.1 refers to:
    A) DNS server
    B) Default gateway
    C) Localhost
    D) Google DNS
    Answer: C) Localhost

  1. The full form of URL is:
    A) Unique Reference Link
    B) Uniform Resource Locator
    C) Universal Registration List
    D) Uniform Relay Locator
    Answer: B) Uniform Resource Locator
  2. Which cloud model provides everything needed to run applications?
    A) SaaS
    B) IaaS
    C) PaaS
    D) DaaS
    Answer: A) SaaS
  3. Which protocol is used for viewing web pages?
    A) SMTP
    B) FTP
    C) HTTP
    D) TCP
    Answer: C) HTTP
  4. The web page format is written using:
    A) XML
    B) CSS
    C) HTML
    D) SQL
    Answer: C) HTML
  5. Which device is used to connect multiple networks?
    A) Hub
    B) Switch
    C) Router
    D) Bridge
    Answer: C) Router
  6. What does “WWW” stand for?
    A) World Web Wide
    B) Wide World Web
    C) World Wide Web
    D) Web Wide World
    Answer: C) World Wide Web
  7. Which is not a valid HTML tag?
    A) <p>
    B) <b>
    C) <i>
    D) <break>
    Answer: D) <break>
  8. Which HTTP status code means “Not Found”?
    A) 200
    B) 301
    C) 404
    D) 500
    Answer: C) 404
  9. Cloud computing is best known for:
    A) High upfront costs
    B) Unlimited local storage
    C) On-demand resource availability
    D) Fixed plans
    Answer: C) On-demand resource availability
  10. Which tag is used to insert a hyperlink in HTML?
    A) <link>
    B) <url>
    C) <href>
    D) <a>
    Answer: D) <a>

  1. Which company offers Google Cloud Platform?
    A) Amazon
    B) Microsoft
    C) Google
    D) IBM
    Answer: C) Google
  2. Which port number is used for FTP?
    A) 20/21
    B) 25
    C) 53
    D) 110
    Answer: A) 20/21
  3. HTML and CSS are used for:
    A) Backend development
    B) Data processing
    C) Frontend development
    D) Hardware communication
    Answer: C) Frontend development
  4. Which one of the following is a valid domain extension?
    A) .web
    B) .net
    C) .doc
    D) .img
    Answer: B) .net
  5. Which one is a top-level domain (TLD)?
    A) www
    B) com
    C) google
    D) html
    Answer: B) com
  6. Which part of the URL specifies the protocol?
    A) Domain
    B) Path
    C) http://
    D) Extension
    Answer: C) http://
  7. Cloud computing allows data access from:
    A) Local computer only
    B) One device
    C) Multiple devices via Internet
    D) USB only
    Answer: C) Multiple devices via Internet
  8. Which of the following is NOT a programming language?
    A) Python
    B) C++
    C) Java
    D) HTML
    Answer: D) HTML
  9. What does the browser use to locate websites?
    A) URL
    B) MAC Address
    C) Port
    D) ISP
    Answer: A) URL
  10. Which of the following protocols is not secure?
    A) HTTPS
    B) SFTP
    C) HTTP
    D) SSL
    Answer: C) HTTP


Internet & Web Technologies – MCQs (101–150)


101. What does SSL stand for?
A) Secure Sockets Layer
B) Security System Layer
C) Software Secure Layer
D) Safe Server Login
Answer: A) Secure Sockets Layer

102. Which of the following is not a valid browser?
A) Chrome
B) Firefox
C) Windows
D) Safari
Answer: C) Windows

103. Which is a private IP address?
A) 192.168.0.1
B) 8.8.8.8
C) 172.217.14.206
D) 45.33.32.156
Answer: A) 192.168.0.1

104. Which protocol helps in sending emails?
A) HTTP
B) FTP
C) SMTP
D) TCP
Answer: C) SMTP

105. The part of a domain name that identifies the type of organization is called:
A) Domain extension
B) Subdomain
C) IP address
D) Path
Answer: A) Domain extension

106. The website layout and visual design is primarily handled by:
A) JavaScript
B) CSS
C) HTML
D) PHP
Answer: B) CSS

107. A firewall is used to:
A) Protect from viruses
B) Create websites
C) Block unauthorized access
D) Optimize speed
Answer: C) Block unauthorized access

108. The ability of cloud computing to grow or shrink IT resources as needed is called:
A) Flexibility
B) Elasticity
C) Availability
D) Scalability
Answer: B) Elasticity

109. What does ISP stand for?
A) Internet Service Provider
B) Internal Software Program
C) International Server Protocol
D) Integrated Server Point
Answer: A) Internet Service Provider

110. What does DNS stand for?
A) Domain Naming Source
B) Domain Name System
C) Digital Network System
D) Data Network Server
Answer: B) Domain Name System


111. Which of the following is a valid email protocol?
A) FTP
B) SMTP
C) HTTP
D) SNMP
Answer: B) SMTP

112. What is the full form of IP?
A) Internal Protocol
B) Internet Provider
C) Internet Protocol
D) Intranet Protocol
Answer: C) Internet Protocol

113. A website’s homepage is also known as:
A) Main Page
B) Index Page
C) Start Page
D) Title Page
Answer: B) Index Page

114. Which protocol ensures secure communication over the web?
A) FTP
B) SMTP
C) HTTPS
D) Telnet
Answer: C) HTTPS

115. Which company created the Safari browser?
A) Microsoft
B) Apple
C) Google
D) Mozilla
Answer: B) Apple

116. Cloud computing services are mainly divided into how many models?
A) 2
B) 3
C) 4
D) 5
Answer: B) 3 (IaaS, PaaS, SaaS)

117. What is the purpose of an HTML form?
A) Display content
B) Play videos
C) Collect user input
D) Send emails
Answer: C) Collect user input

118. Which is a text-based web browser?
A) Internet Explorer
B) Google Chrome
C) Lynx
D) Safari
Answer: C) Lynx

119. What is the role of <head> tag in HTML?
A) Contains visible text
B) Contains scripts and metadata
C) Contains links
D) Displays forms
Answer: B) Contains scripts and metadata

120. Which is the most widely used DNS server IP?
A) 8.8.8.8
B) 127.0.0.1
C) 255.255.255.0
D) 0.0.0.0
Answer: A) 8.8.8.8


121. SaaS stands for:
A) Software as a Service
B) System as a Service
C) Security as a Service
D) Storage as a Service
Answer: A) Software as a Service

122. Who invented the World Wide Web?
A) Steve Jobs
B) Bill Gates
C) Tim Berners-Lee
D) Larry Page
Answer: C) Tim Berners-Lee

123. The HTTP response code 500 means:
A) OK
B) Not Found
C) Internal Server Error
D) Forbidden
Answer: C) Internal Server Error

124. Which one is not a front-end technology?
A) JavaScript
B) CSS
C) PHP
D) HTML
Answer: C) PHP

125. Which of the following is not a benefit of cloud computing?
A) Reduced cost
B) Unlimited local storage
C) High availability
D) Scalability
Answer: B) Unlimited local storage

126. What is the use of <a> tag in HTML?
A) Adding an image
B) Making text bold
C) Adding a link
D) Inserting a table
Answer: C) Adding a link

127. HTTPS uses which port number by default?
A) 443
B) 80
C) 21
D) 25
Answer: A) 443

128. The .com in a website URL indicates:
A) Country
B) Organization type
C) Server type
D) File type
Answer: B) Organization type

129. In cloud models, IaaS offers:
A) Software
B) Infrastructure
C) Platform
D) Operating system
Answer: B) Infrastructure

130. Which of the following protocols is used for remote login?
A) HTTP
B) FTP
C) Telnet
D) SMTP
Answer: C) Telnet


131. The term “responsive web design” means:
A) Fast loading
B) Mobile-friendly layout
C) Secure content
D) Scrollable content
Answer: B) Mobile-friendly layout

132. Which protocol transfers email messages between servers?
A) POP3
B) SMTP
C) IMAP
D) TCP
Answer: B) SMTP

133. Which tag is used to create an ordered list in HTML?
A) <ul>
B) <ol>
C) <li>
D) <list>
Answer: B) <ol>

134. Which one is used to ensure data security in cloud?
A) Firewall
B) Antivirus
C) Encryption
D) Router
Answer: C) Encryption

135. Which of the following is a file transfer protocol?
A) SMTP
B) FTP
C) HTTP
D) IMAP
Answer: B) FTP

136. What does Google use to index web pages?
A) Crawler
B) Finder
C) Searchbot
D) DNS
Answer: A) Crawler

137. Which protocol retrieves emails from a mail server?
A) SMTP
B) FTP
C) POP3
D) HTTP
Answer: C) POP3

138. What is the function of the <br> tag?
A) Add space
B) Line break
C) Bold text
D) Insert table
Answer: B) Line break

139. A VPN is used to:
A) Speed up Internet
B) Secure remote access
C) Host websites
D) Manage servers
Answer: B) Secure remote access

140. Which of the following is not a cloud provider?
A) Amazon AWS
B) IBM Cloud
C) Linux OS
D) Google Cloud
Answer: C) Linux OS


141. What is the purpose of JavaScript on websites?
A) Speed
B) Storage
C) Interactivity
D) Domain Management
Answer: C) Interactivity

142. Which HTML tag creates a table row?
A) <td>
B) <tr>
C) <table>
D) <th>
Answer: B) <tr>

143. Which HTTP method is used to send data to a server?
A) GET
B) SEND
C) PUSH
D) POST
Answer: D) POST

144. What is the main function of DNS?
A) Secure connection
B) Manage files
C) Convert domain names to IP
D) Encrypt data
Answer: C) Convert domain names to IP

145. What is an SSL certificate used for?
A) Bandwidth control
B) Network routing
C) Securing website connection
D) Creating content
Answer: C) Securing website connection

146. What is the function of <title> tag in HTML?
A) Page URL
B) Meta data
C) Page title in browser
D) Heading inside body
Answer: C) Page title in browser

147. What is HTTP status code 301?
A) Not Found
B) OK
C) Permanent Redirect
D) Temporary Redirect
Answer: C) Permanent Redirect

148. Who assigns IP addresses on the Internet?
A) IETF
B) IANA
C) ICANN
D) DNS
Answer: C) ICANN

149. Which cloud model gives access to the complete application?
A) IaaS
B) SaaS
C) PaaS
D) DaaS
Answer: B) SaaS

150. The <meta> tag is used in HTML for:
A) Paragraphs
B) Scripts
C) Metadata
D) Tables
Answer: C) Metadata



Internet & Web Technologies – Advanced MCQs (151–200)


151. Which of the following HTTP methods is idempotent?
A) POST
B) PUT
C) PATCH
D) CONNECT
Answer: B) PUT

152. Which component of a URL specifies the protocol used?
A) Domain
B) Path
C) Scheme
D) Query string
Answer: C) Scheme

153. In cloud computing, multi-tenancy means:
A) Multiple users sharing the same physical resources
B) One user per virtual machine
C) Isolated hosting for each user
D) Local data storage only
Answer: A) Multiple users sharing the same physical resources

154. The main function of a Content Delivery Network (CDN) is to:
A) Increase server capacity
B) Speed up content delivery
C) Create new websites
D) Store cookies
Answer: B) Speed up content delivery

155. Which tool is used to inspect HTTP requests/responses in browsers?
A) FTP client
B) DNS checker
C) Developer Tools (F12)
D) Task Manager
Answer: C) Developer Tools (F12)

156. SAML in web security stands for:
A) Secure Access Management Layer
B) Security Assertion Markup Language
C) System Authentication Message Link
D) Standard Access Messaging Language
Answer: B) Security Assertion Markup Language

157. Which HTTP status code indicates “Method Not Allowed”?
A) 403
B) 405
C) 500
D) 409
Answer: B) 405

158. OAuth 2.0 is primarily used for:
A) Encryption
B) Authorization
C) Authentication only
D) Database transactions
Answer: B) Authorization

159. Which of the following is a cloud orchestration tool?
A) Docker
B) Kubernetes
C) VirtualBox
D) Anaconda
Answer: B) Kubernetes

160. The TTL value in DNS records is responsible for:
A) Encryption
B) Server load
C) Record expiration time
D) File size limit
Answer: C) Record expiration time


161. The main security protocol used in VPNs is:
A) SSL
B) TLS
C) IPsec
D) FTP
Answer: C) IPsec

162. Which of the following tools is used for web application penetration testing?
A) Wireshark
B) Nmap
C) Burp Suite
D) Visual Studio
Answer: C) Burp Suite

163. The process of mapping a domain name to an IP address is called:
A) Hosting
B) Forwarding
C) DNS Resolution
D) Domain Allocation
Answer: C) DNS Resolution

164. What does the <noscript> tag in HTML handle?
A) CSS fallback
B) Browser redirection
C) Content for users without JavaScript
D) Script styling
Answer: C) Content for users without JavaScript

165. Which HTTP method is used to partially update a resource?
A) PUT
B) POST
C) PATCH
D) OPTIONS
Answer: C) PATCH

166. The Referrer Policy in HTTP headers is used to control:
A) Cookie access
B) Referer information leakage
C) User authentication
D) Redirect behavior
Answer: B) Referer information leakage

167. The robots.txt file is used to:
A) Speed up website loading
B) Prevent browsers from loading images
C) Give instructions to web crawlers
D) Define page titles
Answer: C) Give instructions to web crawlers

168. What does the SameSite attribute in cookies help prevent?
A) SQL injection
B) Cross-Site Request Forgery (CSRF)
C) DNS Spoofing
D) Session timeout
Answer: B) Cross-Site Request Forgery (CSRF)

169. What is latency in networking?
A) Data loss
B) Time taken to respond
C) Download speed
D) Bandwidth
Answer: B) Time taken to respond

170. Which HTTP header is used to prevent clickjacking?
A) X-Frame-Options
B) Content-Security-Policy
C) X-XSS-Protection
D) Server
Answer: A) X-Frame-Options


171. Which of the following is a web socket port?
A) 443
B) 8080
C) 8888
D) 80
Answer: B) 8080

172. In IPv6, the address space is:
A) 32-bit
B) 64-bit
C) 128-bit
D) 256-bit
Answer: C) 128-bit

173. Load balancing in web servers is used to:
A) Add security
B) Increase memory
C) Distribute traffic evenly
D) Backup data
Answer: C) Distribute traffic evenly

174. Which of the following is NOT a valid cloud service provider?
A) Microsoft Azure
B) Amazon EC2
C) Apple iWork
D) Google Cloud
Answer: C) Apple iWork

175. A man-in-the-middle attack is prevented using:
A) DNS
B) HTTP
C) SSL/TLS
D) FTP
Answer: C) SSL/TLS

176. The Viewport meta tag in HTML is used for:
A) SEO
B) Responsive layout
C) Page redirection
D) Hiding content
Answer: B) Responsive layout

177. Which of the following is not a valid REST constraint?
A) Stateless
B) Layered System
C) Code on demand
D) Stateful
Answer: D) Stateful

178. A 404 HTTP response means:
A) Server Error
B) Unauthorized
C) Page Not Found
D) Forbidden
Answer: C) Page Not Found

179. What is the default port for DNS?
A) 80
B) 25
C) 53
D) 110
Answer: C) 53

180. Which encryption algorithm is commonly used in HTTPS?
A) DES
B) MD5
C) RSA
D) SHA1
Answer: C) RSA


181. The SOAP protocol is based on:
A) XML
B) JSON
C) YAML
D) HTML
Answer: A) XML

182. Cloud bursting refers to:
A) Storing backups offline
B) Transferring data to users
C) Shifting workloads to public cloud
D) Erasing cloud data
Answer: C) Shifting workloads to public cloud

183. What is the main protocol for real-time chat over the web?
A) HTTP
B) SMTP
C) WebSocket
D) FTP
Answer: C) WebSocket

184. Which of the following is a two-factor authentication method?
A) Email login
B) Password and OTP
C) Username only
D) Captcha only
Answer: B) Password and OTP

185. Which HTML5 element is used for self-contained content?
A) <div>
B) <aside>
C) <article>
D) <footer>
Answer: C) <article>

186. The XSS attack exploits vulnerabilities in:
A) CSS
B) JavaScript
C) SQL
D) TLS
Answer: B) JavaScript

187. What is serverless computing?
A) Cloud without a server
B) Running code without managing servers
C) Local network hosting
D) Bare metal hosting
Answer: B) Running code without managing servers

188. Which header prevents MIME-sniffing?
A) Content-Type
B) X-Content-Type-Options
C) X-Frame-Options
D) Accept-Encoding
Answer: B) X-Content-Type-Options

189. In IPv4, how many bits are there?
A) 16
B) 32
C) 64
D) 128
Answer: B) 32

190. In cloud computing, vertical scaling means:
A) Adding more servers
B) Increasing server capacity
C) Decreasing network speed
D) Migrating to private cloud
Answer: B) Increasing server capacity


191. What does the <canvas> element in HTML5 do?
A) Display tables
B) Create drawings and graphics
C) Write forms
D) Optimize pages
Answer: B) Create drawings and graphics

192. Which DNS record type is used to map a domain to an IP address?
A) MX
B) CNAME
C) TXT
D) A
Answer: D) A

193. What is a wildcard SSL certificate used for?
A) All domains
B) Subdomains
C) Local servers
D) API only
Answer: B) Subdomains

194. The subnet mask is used to:
A) Encrypt IP
B) Divide network and host portions
C) Increase RAM
D) Block websites
Answer: B) Divide network and host portions

195. CAPTCHA is mainly used for:
A) Styling forms
B) Avoiding duplicate login
C) Preventing bots
D) Blocking popups
Answer: C) Preventing bots

196. Which is not an HTTP verb?
A) PUT
B) GET
C) DROP
D) POST
Answer: C) DROP

197. ICANN is responsible for:
A) Internet censorship
B) Cybersecurity
C) Domain name management
D) Cloud hosting
Answer: C) Domain name management

198. Which type of DNS record handles mail routing?
A) A
B) MX
C) PTR
D) NS
Answer: B) MX

199. What is the primary purpose of TLS?
A) UI design
B) Database access
C) Secure communication
D) Increase bandwidth
Answer: C) Secure communication

200. Which part of a URL contains parameters passed to the server?
A) Scheme
B) Path
C) Fragment
D) Query string
Answer: D) Query string


SSC / Banking Exam Computer Topics Action
General Awareness (Common) Basic Computer Fundamentals
History & Evolution of Computers
Types of Computers
Computer Hardware & Software
Operating Systems
Memory & Storage Devices
MS Office
Computer Networking
Cyber Security
Programming Basics
Database Management System
Internet & Web Technologies
E-Governance & Digital India
SSC CGL Tier 2 Computer Knowledge Module (Paper 1)
SSC CHSL Computer Awareness Section
SSC Stenographer/MTS Basic Computer Awareness

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
Verified by MonsterInsights