Explore topic-wise MCQs in Current Affairs.

This section includes 3246 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

801.

provide security and privacy for the use of the web page content

A. HTTP
B. html
C. FTP
D. none of these
Answer» B. html
802.

is an application layer protocol for distributed, collaborative, hypermediainformation systems.

A. html
B. HTTP
C. Bothe of these
D. None of these
Answer» B. HTTP
803.

Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer» E.
804.

refers to a kind of e-commerce which refers to a company selling or buying from othercompany

A. B2G
B. B2E
C. B2B
D. P2P
Answer» D. P2P
805.

always operate on intranet

A. E--commerce
B. E-Business
C. EDI
D. None of these
Answer» C. EDI
806.

……………..is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation.

A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer» C. credit card
807.

attacks are difficult and are only successful if the attacker knows somethingabout the shopper

A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Answer» E.
808.

Companies use networks to automate employee related corporate processes.

A. B2G
B. B2E
C. B2B
D. P2P
Answer» C. B2B
809.

A presents information from diverse sources in a unified way in a web site.

A. Web portal
B. Link page
C. Both of these
D. none of these
Answer» D. none of these
810.

are general interest portals covering a wide range of topics and features

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» C. both of these
811.

e-commerce involves the electronic facilitation of transaction betweencustomers through some third party.

A. B2G
B. B2E
C. B2B
D. C2C
Answer» E.
812.

is automated methods of recognizing a person based on a physiological orbehavioral characteristic.

A. Biometric
B. PIN
C. both of these
D. none of these
Answer» B. PIN
813.

Information sent over the Internet commonly uses the set of rules called………………………..

A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer» B. FTP
814.

Which among the following is an example for vertical portal ?

A. i-village
B. Yahoo
C. Google
D. Net scape
Answer» B. Yahoo
815.

The verification of credit card is done by using… with a communications link to themerchants acquiring bank

A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer» D. none of these
816.

In Biometrics,… ID system is designed to prevent more than one person fromusing a single identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» B. Negative ID system
817.

is a global web in which millions of users are communicating with each other withthe help of computers.

A. Internet
B. WWW
C. both of these
D. None of these
Answer» B. WWW
818.

A provides a way to associate the message with the sender and is theequivalent of an ordinary signature.

A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer» C. SSL
819.

is a commercial process that includes production, distribution, sales or deliveryof goods and services through electronic means

A. E-commerce
B. SCM
C. EDI
D. None of these
Answer» B. SCM
820.

A company that manufacturers bicycles may use the internet to purchase tyres fromtheir suppliers. This is an example of transaction.

A. B2G
B. B2E
C. B2B
D. P2P
Answer» D. P2P
821.

To accept a credit card for payment, we have to open a account with our bank

A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer» D. any of these
822.

Search Engines databases are selected and built by computer robotprograms called………………………

A. spider
B. Search Engines
C. robots
D. none of these
Answer» B. Search Engines
823.

The information Technology Act [IT ACT] came into effect on

A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these
Answer» D. none of these
824.

Advertisements take the form of a website copy are called…………………………

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» B. pop-up ads
825.

Gain entry into the user’s system and scan your file system for personal informationis known as……………….

A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer» C. Sniffing
826.

Which among the following is not an example for computer virus ?

A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer» E.
827.

Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
828.

is the first page of a web site.

A. Web page
B. home page
C. domain
D. none of these
Answer» C. domain
829.

are animated full screen ads placed at the entry of a site before a user reachesthe intended content.

A. Intromercial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» B. pop-up ads
830.

are special type of software meant for limiting the risks of being hit bycomputer viruses

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» C. both of these
831.

…………………is basically a concept of online marketing and distributing of products andservices over the internet

A. B2G
B. B2E
C. B2B
D. B2C
Answer» E.
832.

is an unsolicited e-mail sent to every e-mail address that a business can find

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. none of these
Answer» D. none of these
833.

acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
834.

In Biometrics,… ID system is designed to prevent one person from usingmore than one identity

A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer» C. both of these
835.

is the most common way for purchasing an online advertising

A. CPM
B. CPC
C. Any of these
D. none of these
Answer» D. none of these
836.

ads take up the entire screen and are more powerful than banner ads.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» C. interstitials
837.

A portal is a specialized entry point to a specific market place or industry niche.

A. Vertical portal
B. horizontal portal
C. both of these
D. none of these
Answer» B. horizontal portal
838.

………………site is created to fraudulently acquire sensitive information such as pass wordsand credit card details, by masquerading as a trustworthy person or business.

A. Dynamic website
B. (Static Website
C. phish site
D. none of these
Answer» D. none of these
839.

Which one of the following is not a principle of e-commerce ?

A. privacy
B. integrity
C. authentication
D. none of these
Answer» E.
840.

is an online auctioning site that facilitates the trade of privately owned itemsbetween individuals.

A. e-Bay
B. Amazon.com
C. Rentalic.com
D. all of these
Answer» B. Amazon.com
841.

facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties.

A. Metamediary
B. Intermediary
C. middlemen
D. all of these
Answer» B. Intermediary
842.

The user reaches this page when they specify the address of a website

A. Home page
B. Web page
C. Summary page
D. None of these
Answer» B. Web page
843.

is a person who breaks in or trespasses a computer system

A. Hacker
B. Snooper
C. operator
D. spoofer
Answer» B. Snooper
844.

Peer to Peer [P2P] is also used to describe………………………….

A. C2C
B. B2E
C. B2B
D. B2C
Answer» B. B2E
845.

is a class of advertising methods which are considered unethical and may evenbe illegal

A. Advertorial
B. pop-up ads
C. Spam e-mail
D. malware
Answer» E.
846.

is basically a secure gate between our organization data and internet.

A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer» B. Antivirus
847.

ads appears as rectangular graphics near the top of the page

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» B. floating ads
848.

is a form of advertisement on the web that appears between web pagesthat the user requests.

A. Banner ad
B. floating ads
C. interstitials
D. Unicast ads
Answer» D. Unicast ads
849.

”Google” is one of the most popular………………..

A. Portal
B. Browser
C. Search Engine
D. none of these
Answer» D. none of these
850.

Which among the following is not an example for Search engine ?

A. Google
B. MSN
C. Alta vista
D. none of these
Answer» E.