Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these
Answer» B. html
2.

is an application layer protocol for distributed, collaborative, hypermediainformation systems.

A. html
B. HTTP
C. Bothe of these
D. None of these
Answer» B. HTTP
3.

Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer» E.
4.

refers to a kind of e-commerce which refers to a company selling or buying from othercompany

A. B2G
B. B2E
C. B2B
D. P2P
Answer» D. P2P
5.

always operate on intranet

A. E--commerce
B. E-Business
C. EDI
D. None of these
Answer» C. EDI
6.

……………..is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» C. credit card
7.

attacks are difficult and are only successful if the attacker knows somethingabout the shopper

A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Answer» E.
8.

Companies use networks to automate employee related corporate processes.

A. B2G
B. B2E
C. B2B
D. P2P
Answer» C. B2B
9.

A presents information from diverse sources in a unified way in a web site.

A. Web portal
B. Link page
C. Both of these
D. none of these
Answer» D. none of these
10.

are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» C. both of these
11.

e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. B2G
B. B2E
C. B2B
D. C2C
Answer» E.
12.

is automated methods of recognizing a person based on a physiological orbehavioral characteristic.

A. Biometric
B. PIN
C. both of these
D. none of these
Answer» B. PIN
13.

Information sent over the Internet commonly uses the set of rules called………………………..

A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer» B. FTP
14.

Which among the following is an example for vertical portal ?

A. i-village
B. Yahoo
C. Google
D. Net scape
Answer» B. Yahoo
15.

The verification of credit card is done by using… with a communications link to themerchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer» D. none of these
16.

In Biometrics,… ID system is designed to prevent more than one person fromusing a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» B. Negative ID system
17.

is a global web in which millions of users are communicating with each other withthe help of computers.

A. Internet
B. WWW
C. both of these
D. None of these
Answer» B. WWW
18.

A provides a way to associate the message with the sender and is theequivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer» C. SSL
19.

is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means

A. E-commerce
B. SCM
C. EDI
D. None of these
Answer» B. SCM
20.

A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of transaction.

A. B2G
B. B2E
C. B2B
D. P2P
Answer» D. P2P
21.

To accept a credit card for payment, we have to open a account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer» D. any of these
22.

Search Engines databases are selected and built by computer robotprograms called………………………

A. spider
B. Search Engines
C. robots
D. none of these
Answer» B. Search Engines
23.

The information Technology Act [IT ACT] came into effect on

A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these
Answer» D. none of these
24.

Advertisements take the form of a website copy are called…………………………

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» B. pop-up ads
25.

Gain entry into the user’s system and scan your file system for personal informationis known as……………….

A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» C. Sniffing
26.

Which among the following is not an example for computer virus ?

A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer» E.
27.

Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
28.

is the first page of a web site.

A. Web page
B. home page
C. domain
D. none of these
Answer» C. domain
29.

are animated full screen ads placed at the entry of a site before a user reachesthe intended content.

A. Intromercial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» B. pop-up ads
30.

are special type of software meant for limiting the risks of being hit bycomputer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» C. both of these
31.

…………………is basically a concept of online marketing and distributing of products andservices over the internet

A. B2G
B. B2E
C. B2B
D. B2C
Answer» E.
32.

is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» D. none of these
33.

acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
34.

In Biometrics,… ID system is designed to prevent one person from usingmore than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» C. both of these
35.

is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these
Answer» D. none of these
36.

ads take up the entire screen and are more powerful than banner ads.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» C. interstitials
37.

A portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» B. horizontal portal
38.

………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer» D. none of these
39.

Which one of the following is not a principle of e-commerce ?

A. privacy
B. integrity
C. authentication
D. none of these
Answer» E.
40.

is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer» B. Amazon.com
41.

facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties.

A. Metamediary
B. Intermediary
C. middlemen
D. all of these
Answer» B. Intermediary
42.

The user reaches this page when they specify the address of a website

A. Home page
B. Web page
C. Summary page
D. None of these
Answer» B. Web page
43.

is a person who breaks in or trespasses a computer system

A. Hacker
B. Snooper
C. operator
D. spoofer
Answer» B. Snooper
44.

Peer to Peer [P2P] is also used to describe………………………….

A. C2C
B. B2E
C. B2B
D. B2C
Answer» B. B2E
45.

is a class of advertising methods which are considered unethical and may evenbe illegal

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» E.
46.

is basically a secure gate between our organization data and internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
47.

ads appears as rectangular graphics near the top of the page

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» B. floating ads
48.

is a form of advertisement on the web that appears between web pagesthat the user requests.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» D. Unicast ads
49.

”Google” is one of the most popular………………..

A. Portal
B. Browser
C. Search Engine
D. none of these
Answer» D. none of these
50.

Which among the following is not an example for Search engine ?

A. Google
B. MSN
C. Alta vista
D. none of these
Answer» E.