MCQOPTIONS
Saved Bookmarks
This section includes 3246 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 801. |
provide security and privacy for the use of the web page content |
| A. | HTTP |
| B. | html |
| C. | FTP |
| D. | none of these |
| Answer» B. html | |
| 802. |
is an application layer protocol for distributed, collaborative, hypermediainformation systems. |
| A. | html |
| B. | HTTP |
| C. | Bothe of these |
| D. | None of these |
| Answer» B. HTTP | |
| 803. |
Which of the following crimes were not covered under IT (Amendment) Act, 2008 ? |
| A. | Cyber terrorism |
| B. | Child pornography |
| C. | Video voyeurism |
| D. | None of these |
| Answer» E. | |
| 804. |
refers to a kind of e-commerce which refers to a company selling or buying from othercompany |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | P2P |
| Answer» D. P2P | |
| 805. |
always operate on intranet |
| A. | E--commerce |
| B. | E-Business |
| C. | EDI |
| D. | None of these |
| Answer» C. EDI | |
| 806. |
……………..is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation. |
| A. | Debit Card |
| B. | Electronic purse |
| C. | credit card |
| D. | any of these |
| Answer» C. credit card | |
| 807. |
attacks are difficult and are only successful if the attacker knows somethingabout the shopper |
| A. | Spoofing |
| B. | Snooping |
| C. | Sniffing |
| D. | Guessing passwords |
| Answer» E. | |
| 808. |
Companies use networks to automate employee related corporate processes. |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | P2P |
| Answer» C. B2B | |
| 809. |
A presents information from diverse sources in a unified way in a web site. |
| A. | Web portal |
| B. | Link page |
| C. | Both of these |
| D. | none of these |
| Answer» D. none of these | |
| 810. |
are general interest portals covering a wide range of topics and features |
| A. | Vertical portal |
| B. | horizontal portal |
| C. | both of these |
| D. | none of these |
| Answer» C. both of these | |
| 811. |
e-commerce involves the electronic facilitation of transaction betweencustomers through some third party. |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | C2C |
| Answer» E. | |
| 812. |
is automated methods of recognizing a person based on a physiological orbehavioral characteristic. |
| A. | Biometric |
| B. | PIN |
| C. | both of these |
| D. | none of these |
| Answer» B. PIN | |
| 813. |
Information sent over the Internet commonly uses the set of rules called……………………….. |
| A. | TCP/IP |
| B. | FTP |
| C. | HTTP |
| D. | gopher |
| Answer» B. FTP | |
| 814. |
Which among the following is an example for vertical portal ? |
| A. | i-village |
| B. | Yahoo |
| C. | |
| D. | Net scape |
| Answer» B. Yahoo | |
| 815. |
The verification of credit card is done by using… with a communications link to themerchants acquiring bank |
| A. | Credit card payment terminal |
| B. | Point of Sale |
| C. | All of these |
| D. | none of these |
| Answer» D. none of these | |
| 816. |
In Biometrics,… ID system is designed to prevent more than one person fromusing a single identity |
| A. | Positive ID system |
| B. | Negative ID system |
| C. | both of these |
| D. | none of these |
| Answer» B. Negative ID system | |
| 817. |
is a global web in which millions of users are communicating with each other withthe help of computers. |
| A. | Internet |
| B. | WWW |
| C. | both of these |
| D. | None of these |
| Answer» B. WWW | |
| 818. |
A provides a way to associate the message with the sender and is theequivalent of an ordinary signature. |
| A. | cyber signature |
| B. | Digital signature |
| C. | SSL |
| D. | none of these |
| Answer» C. SSL | |
| 819. |
is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means |
| A. | E-commerce |
| B. | SCM |
| C. | EDI |
| D. | None of these |
| Answer» B. SCM | |
| 820. |
A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of transaction. |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | P2P |
| Answer» D. P2P | |
| 821. |
To accept a credit card for payment, we have to open a account with our bank |
| A. | Savings Bank |
| B. | Current account |
| C. | Merchant account |
| D. | any of these |
| Answer» D. any of these | |
| 822. |
Search Engines databases are selected and built by computer robotprograms called……………………… |
| A. | spider |
| B. | Search Engines |
| C. | robots |
| D. | none of these |
| Answer» B. Search Engines | |
| 823. |
The information Technology Act [IT ACT] came into effect on |
| A. | 16th November 2000 |
| B. | 15th December 2000 |
| C. | 17th October 2000 |
| D. | none of these |
| Answer» D. none of these | |
| 824. |
Advertisements take the form of a website copy are called………………………… |
| A. | Advertorial |
| B. | pop-up ads |
| C. | Spam e-mail |
| D. | none of these |
| Answer» B. pop-up ads | |
| 825. |
Gain entry into the user’s system and scan your file system for personal informationis known as………………. |
| A. | Spoofing |
| B. | Snooping |
| C. | Sniffing |
| D. | None of these |
| Answer» C. Sniffing | |
| 826. |
Which among the following is not an example for computer virus ? |
| A. | Chernobyl |
| B. | Melissa |
| C. | I Love You |
| D. | None of these |
| Answer» E. | |
| 827. |
Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet. |
| A. | Network firewall |
| B. | Antivirus |
| C. | both of these |
| D. | none of these |
| Answer» B. Antivirus | |
| 828. |
is the first page of a web site. |
| A. | Web page |
| B. | home page |
| C. | domain |
| D. | none of these |
| Answer» C. domain | |
| 829. |
are animated full screen ads placed at the entry of a site before a user reachesthe intended content. |
| A. | Intromercial |
| B. | pop-up ads |
| C. | Spam e-mail |
| D. | malware |
| Answer» B. pop-up ads | |
| 830. |
are special type of software meant for limiting the risks of being hit bycomputer viruses |
| A. | Network firewall |
| B. | Antivirus |
| C. | both of these |
| D. | none of these |
| Answer» C. both of these | |
| 831. |
…………………is basically a concept of online marketing and distributing of products andservices over the internet |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | B2C |
| Answer» E. | |
| 832. |
is an unsolicited e-mail sent to every e-mail address that a business can find |
| A. | Advertorial |
| B. | pop-up ads |
| C. | Spam e-mail |
| D. | none of these |
| Answer» D. none of these | |
| 833. |
acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks. |
| A. | Network firewall |
| B. | Antivirus |
| C. | both of these |
| D. | none of these |
| Answer» B. Antivirus | |
| 834. |
In Biometrics,… ID system is designed to prevent one person from usingmore than one identity |
| A. | Positive ID system |
| B. | Negative ID system |
| C. | both of these |
| D. | none of these |
| Answer» C. both of these | |
| 835. |
is the most common way for purchasing an online advertising |
| A. | CPM |
| B. | CPC |
| C. | Any of these |
| D. | none of these |
| Answer» D. none of these | |
| 836. |
ads take up the entire screen and are more powerful than banner ads. |
| A. | Banner ad |
| B. | floating ads |
| C. | interstitials |
| D. | Unicast ads |
| Answer» C. interstitials | |
| 837. |
A portal is a specialized entry point to a specific market place or industry niche. |
| A. | Vertical portal |
| B. | horizontal portal |
| C. | both of these |
| D. | none of these |
| Answer» B. horizontal portal | |
| 838. |
………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business. |
| A. | Dynamic website |
| B. | (Static Website |
| C. | phish site |
| D. | none of these |
| Answer» D. none of these | |
| 839. |
Which one of the following is not a principle of e-commerce ? |
| A. | privacy |
| B. | integrity |
| C. | authentication |
| D. | none of these |
| Answer» E. | |
| 840. |
is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals. |
| A. | e-Bay |
| B. | Amazon.com |
| C. | Rentalic.com |
| D. | all of these |
| Answer» B. Amazon.com | |
| 841. |
facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties. |
| A. | Metamediary |
| B. | Intermediary |
| C. | middlemen |
| D. | all of these |
| Answer» B. Intermediary | |
| 842. |
The user reaches this page when they specify the address of a website |
| A. | Home page |
| B. | Web page |
| C. | Summary page |
| D. | None of these |
| Answer» B. Web page | |
| 843. |
is a person who breaks in or trespasses a computer system |
| A. | Hacker |
| B. | Snooper |
| C. | operator |
| D. | spoofer |
| Answer» B. Snooper | |
| 844. |
Peer to Peer [P2P] is also used to describe…………………………. |
| A. | C2C |
| B. | B2E |
| C. | B2B |
| D. | B2C |
| Answer» B. B2E | |
| 845. |
is a class of advertising methods which are considered unethical and may evenbe illegal |
| A. | Advertorial |
| B. | pop-up ads |
| C. | Spam e-mail |
| D. | malware |
| Answer» E. | |
| 846. |
is basically a secure gate between our organization data and internet. |
| A. | Network firewall |
| B. | Antivirus |
| C. | both of these |
| D. | none of these |
| Answer» B. Antivirus | |
| 847. |
ads appears as rectangular graphics near the top of the page |
| A. | Banner ad |
| B. | floating ads |
| C. | interstitials |
| D. | Unicast ads |
| Answer» B. floating ads | |
| 848. |
is a form of advertisement on the web that appears between web pagesthat the user requests. |
| A. | Banner ad |
| B. | floating ads |
| C. | interstitials |
| D. | Unicast ads |
| Answer» D. Unicast ads | |
| 849. |
”Google” is one of the most popular……………….. |
| A. | Portal |
| B. | Browser |
| C. | Search Engine |
| D. | none of these |
| Answer» D. none of these | |
| 850. |
Which among the following is not an example for Search engine ? |
| A. | |
| B. | MSN |
| C. | Alta vista |
| D. | none of these |
| Answer» E. | |