MCQOPTIONS
Saved Bookmarks
This section includes 144 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The IT act came into effect on |
| A. | 17 may 2000 |
| B. | 17th december 2000 |
| C. | 17 oct 2000 |
| D. | 17 june 2000 |
| Answer» D. 17 june 2000 | |
| 2. |
An enterprise portal is also called as |
| A. | vertical portal s |
| B. | corporate portal |
| C. | b2b portals |
| D. | none |
| Answer» C. b2b portals | |
| 3. |
Which are the important concepts in the development of web site |
| A. | information presentation |
| B. | good navigation & usability |
| C. | feed back |
| D. | all the above |
| Answer» E. | |
| 4. |
Internet browsing also called |
| A. | net surfing |
| B. | net hunting |
| C. | net chatting |
| D. | none |
| Answer» B. net hunting | |
| 5. |
Creating illegitimate site that appear to published by established organizationsare by this name |
| A. | spoofing |
| B. | snooping |
| C. | sniffing |
| D. | none |
| Answer» B. snooping | |
| 6. |
Which refers to the automatic identification (or) identity verification of livingpersons using their enduring physical or behavioral characteristics |
| A. | biometrics |
| B. | cryptography |
| C. | encryption |
| D. | none |
| Answer» B. cryptography | |
| 7. |
The purpose of this page is to provide links to other pages |
| A. | home page |
| B. | web page |
| C. | summary page |
| D. | none |
| Answer» D. none | |
| 8. |
The advt which float over the page for 5 to 30 sec is |
| A. | banner advt |
| B. | interstitials |
| C. | floating advt |
| D. | none |
| Answer» D. none | |
| 9. |
Today the largest electronic commerce is |
| A. | b2b |
| B. | b2e |
| C. | p2p |
| D. | all the above |
| Answer» B. b2e | |
| 10. |
A popular example of E wallet is |
| A. | micro soft wallet |
| B. | mega soft wallet |
| C. | penta soft wallet |
| D. | none |
| Answer» B. mega soft wallet | |
| 11. |
VOIP services convert our voice into ……………. Signal |
| A. | electronic |
| B. | wireless |
| C. | digital |
| D. | none |
| Answer» D. none | |
| 12. |
Which system provides a service that is paid for prior to usage |
| A. | post paid payment system |
| B. | prepaid payment system |
| C. | spot cash system |
| D. | none |
| Answer» C. spot cash system | |
| 13. |
TV Viewer can interact with what is happening on screens using their mobilephone is |
| A. | cable tv |
| B. | interactive |
| C. | set off box |
| D. | none |
| Answer» C. set off box | |
| 14. |
This is a protocol which allows file to be transferred from one computer toanother computer |
| A. | tcp/ip |
| B. | ftp |
| C. | http |
| D. | none |
| Answer» C. http | |
| 15. |
Which are made for small payment on the web |
| A. | mega payments |
| B. | micro payments |
| C. | spot payment |
| D. | all the above |
| Answer» C. spot payment | |
| 16. |
Which is a web- roaming program used to find documents pertaining to yoursearch |
| A. | spider |
| B. | meta search engine |
| C. | metatags |
| D. | indexers |
| Answer» B. meta search engine | |
| 17. |
Both buyers and sellers actively participate and exchange products services in |
| A. | scm |
| B. | edi |
| C. | e-commerce |
| D. | traditional commerce |
| Answer» E. | |
| 18. |
Bargaining is possible only in ………… business model |
| A. | traditional commerce |
| B. | e commerce |
| C. | m commerce |
| D. | name of these |
| Answer» B. e commerce | |
| 19. |
E – commerce firms ……………………..large inventory |
| A. | need not stock |
| B. | need stock |
| C. | need to stock |
| D. | non of these |
| Answer» B. need stock | |
| 20. |
This type of network does not allow an external user to access the companydata |
| A. | interanet |
| B. | internet |
| C. | extranet |
| D. | none |
| Answer» B. internet | |
| 21. |
…………………. Encrypts payment card transaction data and verifies that bothparties in the transaction are genuine. |
| A. | ssl |
| B. | set |
| C. | secret key |
| D. | none |
| Answer» C. secret key | |
| 22. |
This acts like a gate keeper that examines each users identification beforeallowing them to enter to the organization internal networks |
| A. | antivirus program |
| B. | biometrics |
| C. | fire wall |
| D. | none |
| Answer» C. fire wall | |
| 23. |
This is a financial instrument which can be used more than once to borrowmoney or products or credit |
| A. | credit card |
| B. | debit card |
| C. | e- cash |
| D. | non e |
| Answer» B. debit card | |
| 24. |
Secret key is used in |
| A. | public key cryptography |
| B. | symmetric cryptography |
| C. | asymmetric cryptography |
| D. | none |
| Answer» C. asymmetric cryptography | |
| 25. |
This is an internet based interactive search device that enables a user to searchfor information on the internet. |
| A. | portal |
| B. | browser |
| C. | search engine |
| D. | none |
| Answer» C. search engine | |
| 26. |
Which of the following is C2C ecommerce |
| A. | financial service |
| B. | product distribution |
| C. | online auction |
| D. | none |
| Answer» D. none | |
| 27. |
……………………is a card with a microchip that can be used instead of cashand coins for every thing. |
| A. | electronics cash |
| B. | fast cash |
| C. | electronic purse |
| D. | none |
| Answer» D. none | |
| 28. |
There are two main concerns for using digital coins: anonymity of theconsumer and :- |
| A. | prepaid system |
| B. | post paid system |
| C. | electronic tokens |
| D. | online verification |
| Answer» E. | |
| 29. |
…………. Is a digital analogue of various forms of payment backed by a bank |
| A. | electronics cash |
| B. | electronic purse |
| C. | electronic tokens |
| D. | non e |
| Answer» D. non e | |
| 30. |
Privacy laws of their host Coventry effect |
| A. | domestic companies |
| B. | overseas companies |
| C. | neighboring companies |
| D. | none |
| Answer» C. neighboring companies | |
| 31. |
A digital signature performs a similar functions to a |
| A. | thump impression |
| B. | written signature |
| C. | scanning |
| D. | none |
| Answer» C. scanning | |
| 32. |
Which of following is the reasons for the failure of E-commerce |
| A. | poor management |
| B. | high cost |
| C. | poor planning |
| D. | all the above |
| Answer» E. | |
| 33. |
B2B E commerce has been conducted between |
| A. | business to customer |
| B. | business to bank |
| C. | business to business |
| D. | none |
| Answer» D. none | |
| 34. |
The sale of products (or) service from a business to general public is ………….. |
| A. | b2c |
| B. | b2b |
| C. | b2g |
| D. | b2e |
| Answer» B. b2b | |
| 35. |
Service providers offer service ……………….. |
| A. | offline |
| B. | direct |
| C. | indirect |
| D. | online |
| Answer» E. | |
| 36. |
…………………. Is the process of coding and scrambling of messages toprevent un authorized access to under standing of data being transmitted |
| A. | cryptography |
| B. | encryption |
| C. | security key |
| D. | none |
| Answer» C. security key | |
| 37. |
Interoperable systems are essential to mass adoption of |
| A. | mobile commerce |
| B. | e commerce |
| C. | traditional commerce |
| D. | none |
| Answer» B. e commerce | |
| 38. |
Customers are concerned about |
| A. | privacy and security of information |
| B. | how things are managed |
| C. | business practices |
| D. | none |
| Answer» B. how things are managed | |
| 39. |
GET method, HEAD method , the post methods are the methods of |
| A. | http methods |
| B. | hptp method |
| C. | current standard |
| D. | none |
| Answer» B. hptp method | |
| 40. |
B2C sells |
| A. | products or service directly to consumers |
| B. | products or services directly to companies |
| C. | products or services directly to govt |
| D. | none |
| Answer» B. products or services directly to companies | |
| 41. |
The user reaches this page when they specify the address of a web site. |
| A. | home page |
| B. | web page |
| C. | summary page |
| D. | none |
| Answer» B. web page | |
| 42. |
Which is much helpful to do business beyond cultural and national boundaries |
| A. | e-commerce |
| B. | traditional commerce |
| C. | mobile commerce |
| D. | retailing |
| Answer» B. traditional commerce | |
| 43. |
……………… is a representation language used to create hypertext documentscontaining text list boxes and graphic |
| A. | html |
| B. | http |
| C. | java |
| D. | none |
| Answer» B. http | |
| 44. |
ASCX12 standards were established is |
| A. | 1986 |
| B. | 1984 |
| C. | 1982 |
| D. | 1987 |
| Answer» C. 1982 | |
| 45. |
Which among these is a cheap alternative method to traditional printedcatalogues |
| A. | paper catalogue |
| B. | floppy |
| C. | cd–rom s |
| D. | none |
| Answer» D. none | |
| 46. |
The IP was originally designed for |
| A. | data net working |
| B. | data processing |
| C. | data execution |
| D. | none |
| Answer» B. data processing | |
| 47. |
The attacker monitors the data between the shoppers computer and the server |
| A. | spoofing |
| B. | snoofing |
| C. | sniffing |
| D. | none |
| Answer» D. none | |
| 48. |
………….. were considered as the “gateways” to the internet |
| A. | portal |
| B. | e tailer |
| C. | content provider |
| D. | narrow market |
| Answer» B. e tailer | |
| 49. |
……………………………. Refers to companies for which internet is one ofseveral channels to customers and perhaps not even the primary one |
| A. | traditional commerce |
| B. | e- commerce |
| C. | edi |
| D. | none of these |
| Answer» C. edi | |
| 50. |
The cost of participating in a public exchange is significantly …………….. thanimplementing out own SCM systems |
| A. | higher |
| B. | lower |
| C. | medium |
| D. | non |
| Answer» C. medium | |