

MCQOPTIONS
Saved Bookmarks
This section includes 3246 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
801. |
provide security and privacy for the use of the web page content |
A. | HTTP |
B. | html |
C. | FTP |
D. | none of these |
Answer» B. html | |
802. |
is an application layer protocol for distributed, collaborative, hypermediainformation systems. |
A. | html |
B. | HTTP |
C. | Bothe of these |
D. | None of these |
Answer» B. HTTP | |
803. |
Which of the following crimes were not covered under IT (Amendment) Act, 2008 ? |
A. | Cyber terrorism |
B. | Child pornography |
C. | Video voyeurism |
D. | None of these |
Answer» E. | |
804. |
refers to a kind of e-commerce which refers to a company selling or buying from othercompany |
A. | B2G |
B. | B2E |
C. | B2B |
D. | P2P |
Answer» D. P2P | |
805. |
always operate on intranet |
A. | E--commerce |
B. | E-Business |
C. | EDI |
D. | None of these |
Answer» C. EDI | |
806. |
……………..is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation. |
A. | Debit Card |
B. | Electronic purse |
C. | credit card |
D. | any of these |
Answer» C. credit card | |
807. |
attacks are difficult and are only successful if the attacker knows somethingabout the shopper |
A. | Spoofing |
B. | Snooping |
C. | Sniffing |
D. | Guessing passwords |
Answer» E. | |
808. |
Companies use networks to automate employee related corporate processes. |
A. | B2G |
B. | B2E |
C. | B2B |
D. | P2P |
Answer» C. B2B | |
809. |
A presents information from diverse sources in a unified way in a web site. |
A. | Web portal |
B. | Link page |
C. | Both of these |
D. | none of these |
Answer» D. none of these | |
810. |
are general interest portals covering a wide range of topics and features |
A. | Vertical portal |
B. | horizontal portal |
C. | both of these |
D. | none of these |
Answer» C. both of these | |
811. |
e-commerce involves the electronic facilitation of transaction betweencustomers through some third party. |
A. | B2G |
B. | B2E |
C. | B2B |
D. | C2C |
Answer» E. | |
812. |
is automated methods of recognizing a person based on a physiological orbehavioral characteristic. |
A. | Biometric |
B. | PIN |
C. | both of these |
D. | none of these |
Answer» B. PIN | |
813. |
Information sent over the Internet commonly uses the set of rules called……………………….. |
A. | TCP/IP |
B. | FTP |
C. | HTTP |
D. | gopher |
Answer» B. FTP | |
814. |
Which among the following is an example for vertical portal ? |
A. | i-village |
B. | Yahoo |
C. | |
D. | Net scape |
Answer» B. Yahoo | |
815. |
The verification of credit card is done by using… with a communications link to themerchants acquiring bank |
A. | Credit card payment terminal |
B. | Point of Sale |
C. | All of these |
D. | none of these |
Answer» D. none of these | |
816. |
In Biometrics,… ID system is designed to prevent more than one person fromusing a single identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» B. Negative ID system | |
817. |
is a global web in which millions of users are communicating with each other withthe help of computers. |
A. | Internet |
B. | WWW |
C. | both of these |
D. | None of these |
Answer» B. WWW | |
818. |
A provides a way to associate the message with the sender and is theequivalent of an ordinary signature. |
A. | cyber signature |
B. | Digital signature |
C. | SSL |
D. | none of these |
Answer» C. SSL | |
819. |
is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means |
A. | E-commerce |
B. | SCM |
C. | EDI |
D. | None of these |
Answer» B. SCM | |
820. |
A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of transaction. |
A. | B2G |
B. | B2E |
C. | B2B |
D. | P2P |
Answer» D. P2P | |
821. |
To accept a credit card for payment, we have to open a account with our bank |
A. | Savings Bank |
B. | Current account |
C. | Merchant account |
D. | any of these |
Answer» D. any of these | |
822. |
Search Engines databases are selected and built by computer robotprograms called……………………… |
A. | spider |
B. | Search Engines |
C. | robots |
D. | none of these |
Answer» B. Search Engines | |
823. |
The information Technology Act [IT ACT] came into effect on |
A. | 16th November 2000 |
B. | 15th December 2000 |
C. | 17th October 2000 |
D. | none of these |
Answer» D. none of these | |
824. |
Advertisements take the form of a website copy are called………………………… |
A. | Advertorial |
B. | pop-up ads |
C. | Spam e-mail |
D. | none of these |
Answer» B. pop-up ads | |
825. |
Gain entry into the user’s system and scan your file system for personal informationis known as………………. |
A. | Spoofing |
B. | Snooping |
C. | Sniffing |
D. | None of these |
Answer» C. Sniffing | |
826. |
Which among the following is not an example for computer virus ? |
A. | Chernobyl |
B. | Melissa |
C. | I Love You |
D. | None of these |
Answer» E. | |
827. |
Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet. |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» B. Antivirus | |
828. |
is the first page of a web site. |
A. | Web page |
B. | home page |
C. | domain |
D. | none of these |
Answer» C. domain | |
829. |
are animated full screen ads placed at the entry of a site before a user reachesthe intended content. |
A. | Intromercial |
B. | pop-up ads |
C. | Spam e-mail |
D. | malware |
Answer» B. pop-up ads | |
830. |
are special type of software meant for limiting the risks of being hit bycomputer viruses |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» C. both of these | |
831. |
…………………is basically a concept of online marketing and distributing of products andservices over the internet |
A. | B2G |
B. | B2E |
C. | B2B |
D. | B2C |
Answer» E. | |
832. |
is an unsolicited e-mail sent to every e-mail address that a business can find |
A. | Advertorial |
B. | pop-up ads |
C. | Spam e-mail |
D. | none of these |
Answer» D. none of these | |
833. |
acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks. |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» B. Antivirus | |
834. |
In Biometrics,… ID system is designed to prevent one person from usingmore than one identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» C. both of these | |
835. |
is the most common way for purchasing an online advertising |
A. | CPM |
B. | CPC |
C. | Any of these |
D. | none of these |
Answer» D. none of these | |
836. |
ads take up the entire screen and are more powerful than banner ads. |
A. | Banner ad |
B. | floating ads |
C. | interstitials |
D. | Unicast ads |
Answer» C. interstitials | |
837. |
A portal is a specialized entry point to a specific market place or industry niche. |
A. | Vertical portal |
B. | horizontal portal |
C. | both of these |
D. | none of these |
Answer» B. horizontal portal | |
838. |
………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business. |
A. | Dynamic website |
B. | (Static Website |
C. | phish site |
D. | none of these |
Answer» D. none of these | |
839. |
Which one of the following is not a principle of e-commerce ? |
A. | privacy |
B. | integrity |
C. | authentication |
D. | none of these |
Answer» E. | |
840. |
is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals. |
A. | e-Bay |
B. | Amazon.com |
C. | Rentalic.com |
D. | all of these |
Answer» B. Amazon.com | |
841. |
facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties. |
A. | Metamediary |
B. | Intermediary |
C. | middlemen |
D. | all of these |
Answer» B. Intermediary | |
842. |
The user reaches this page when they specify the address of a website |
A. | Home page |
B. | Web page |
C. | Summary page |
D. | None of these |
Answer» B. Web page | |
843. |
is a person who breaks in or trespasses a computer system |
A. | Hacker |
B. | Snooper |
C. | operator |
D. | spoofer |
Answer» B. Snooper | |
844. |
Peer to Peer [P2P] is also used to describe…………………………. |
A. | C2C |
B. | B2E |
C. | B2B |
D. | B2C |
Answer» B. B2E | |
845. |
is a class of advertising methods which are considered unethical and may evenbe illegal |
A. | Advertorial |
B. | pop-up ads |
C. | Spam e-mail |
D. | malware |
Answer» E. | |
846. |
is basically a secure gate between our organization data and internet. |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» B. Antivirus | |
847. |
ads appears as rectangular graphics near the top of the page |
A. | Banner ad |
B. | floating ads |
C. | interstitials |
D. | Unicast ads |
Answer» B. floating ads | |
848. |
is a form of advertisement on the web that appears between web pagesthat the user requests. |
A. | Banner ad |
B. | floating ads |
C. | interstitials |
D. | Unicast ads |
Answer» D. Unicast ads | |
849. |
”Google” is one of the most popular……………….. |
A. | Portal |
B. | Browser |
C. | Search Engine |
D. | none of these |
Answer» D. none of these | |
850. |
Which among the following is not an example for Search engine ? |
A. | |
B. | MSN |
C. | Alta vista |
D. | none of these |
Answer» E. | |