

MCQOPTIONS
Saved Bookmarks
This section includes 144 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
1. |
The IT act came into effect on |
A. | 17 may 2000 |
B. | 17th december 2000 |
C. | 17 oct 2000 |
D. | 17 june 2000 |
Answer» D. 17 june 2000 | |
2. |
An enterprise portal is also called as |
A. | vertical portal s |
B. | corporate portal |
C. | b2b portals |
D. | none |
Answer» C. b2b portals | |
3. |
Which are the important concepts in the development of web site |
A. | information presentation |
B. | good navigation & usability |
C. | feed back |
D. | all the above |
Answer» E. | |
4. |
Internet browsing also called |
A. | net surfing |
B. | net hunting |
C. | net chatting |
D. | none |
Answer» B. net hunting | |
5. |
Creating illegitimate site that appear to published by established organizationsare by this name |
A. | spoofing |
B. | snooping |
C. | sniffing |
D. | none |
Answer» B. snooping | |
6. |
Which refers to the automatic identification (or) identity verification of livingpersons using their enduring physical or behavioral characteristics |
A. | biometrics |
B. | cryptography |
C. | encryption |
D. | none |
Answer» B. cryptography | |
7. |
The purpose of this page is to provide links to other pages |
A. | home page |
B. | web page |
C. | summary page |
D. | none |
Answer» D. none | |
8. |
The advt which float over the page for 5 to 30 sec is |
A. | banner advt |
B. | interstitials |
C. | floating advt |
D. | none |
Answer» D. none | |
9. |
Today the largest electronic commerce is |
A. | b2b |
B. | b2e |
C. | p2p |
D. | all the above |
Answer» B. b2e | |
10. |
A popular example of E wallet is |
A. | micro soft wallet |
B. | mega soft wallet |
C. | penta soft wallet |
D. | none |
Answer» B. mega soft wallet | |
11. |
VOIP services convert our voice into ……………. Signal |
A. | electronic |
B. | wireless |
C. | digital |
D. | none |
Answer» D. none | |
12. |
Which system provides a service that is paid for prior to usage |
A. | post paid payment system |
B. | prepaid payment system |
C. | spot cash system |
D. | none |
Answer» C. spot cash system | |
13. |
TV Viewer can interact with what is happening on screens using their mobilephone is |
A. | cable tv |
B. | interactive |
C. | set off box |
D. | none |
Answer» C. set off box | |
14. |
This is a protocol which allows file to be transferred from one computer toanother computer |
A. | tcp/ip |
B. | ftp |
C. | http |
D. | none |
Answer» C. http | |
15. |
Which are made for small payment on the web |
A. | mega payments |
B. | micro payments |
C. | spot payment |
D. | all the above |
Answer» C. spot payment | |
16. |
Which is a web- roaming program used to find documents pertaining to yoursearch |
A. | spider |
B. | meta search engine |
C. | metatags |
D. | indexers |
Answer» B. meta search engine | |
17. |
Both buyers and sellers actively participate and exchange products services in |
A. | scm |
B. | edi |
C. | e-commerce |
D. | traditional commerce |
Answer» E. | |
18. |
Bargaining is possible only in ………… business model |
A. | traditional commerce |
B. | e commerce |
C. | m commerce |
D. | name of these |
Answer» B. e commerce | |
19. |
E – commerce firms ……………………..large inventory |
A. | need not stock |
B. | need stock |
C. | need to stock |
D. | non of these |
Answer» B. need stock | |
20. |
This type of network does not allow an external user to access the companydata |
A. | interanet |
B. | internet |
C. | extranet |
D. | none |
Answer» B. internet | |
21. |
…………………. Encrypts payment card transaction data and verifies that bothparties in the transaction are genuine. |
A. | ssl |
B. | set |
C. | secret key |
D. | none |
Answer» C. secret key | |
22. |
This acts like a gate keeper that examines each users identification beforeallowing them to enter to the organization internal networks |
A. | antivirus program |
B. | biometrics |
C. | fire wall |
D. | none |
Answer» C. fire wall | |
23. |
This is a financial instrument which can be used more than once to borrowmoney or products or credit |
A. | credit card |
B. | debit card |
C. | e- cash |
D. | non e |
Answer» B. debit card | |
24. |
Secret key is used in |
A. | public key cryptography |
B. | symmetric cryptography |
C. | asymmetric cryptography |
D. | none |
Answer» C. asymmetric cryptography | |
25. |
This is an internet based interactive search device that enables a user to searchfor information on the internet. |
A. | portal |
B. | browser |
C. | search engine |
D. | none |
Answer» C. search engine | |
26. |
Which of the following is C2C ecommerce |
A. | financial service |
B. | product distribution |
C. | online auction |
D. | none |
Answer» D. none | |
27. |
……………………is a card with a microchip that can be used instead of cashand coins for every thing. |
A. | electronics cash |
B. | fast cash |
C. | electronic purse |
D. | none |
Answer» D. none | |
28. |
There are two main concerns for using digital coins: anonymity of theconsumer and :- |
A. | prepaid system |
B. | post paid system |
C. | electronic tokens |
D. | online verification |
Answer» E. | |
29. |
…………. Is a digital analogue of various forms of payment backed by a bank |
A. | electronics cash |
B. | electronic purse |
C. | electronic tokens |
D. | non e |
Answer» D. non e | |
30. |
Privacy laws of their host Coventry effect |
A. | domestic companies |
B. | overseas companies |
C. | neighboring companies |
D. | none |
Answer» C. neighboring companies | |
31. |
A digital signature performs a similar functions to a |
A. | thump impression |
B. | written signature |
C. | scanning |
D. | none |
Answer» C. scanning | |
32. |
Which of following is the reasons for the failure of E-commerce |
A. | poor management |
B. | high cost |
C. | poor planning |
D. | all the above |
Answer» E. | |
33. |
B2B E commerce has been conducted between |
A. | business to customer |
B. | business to bank |
C. | business to business |
D. | none |
Answer» D. none | |
34. |
The sale of products (or) service from a business to general public is ………….. |
A. | b2c |
B. | b2b |
C. | b2g |
D. | b2e |
Answer» B. b2b | |
35. |
Service providers offer service ……………….. |
A. | offline |
B. | direct |
C. | indirect |
D. | online |
Answer» E. | |
36. |
…………………. Is the process of coding and scrambling of messages toprevent un authorized access to under standing of data being transmitted |
A. | cryptography |
B. | encryption |
C. | security key |
D. | none |
Answer» C. security key | |
37. |
Interoperable systems are essential to mass adoption of |
A. | mobile commerce |
B. | e commerce |
C. | traditional commerce |
D. | none |
Answer» B. e commerce | |
38. |
Customers are concerned about |
A. | privacy and security of information |
B. | how things are managed |
C. | business practices |
D. | none |
Answer» B. how things are managed | |
39. |
GET method, HEAD method , the post methods are the methods of |
A. | http methods |
B. | hptp method |
C. | current standard |
D. | none |
Answer» B. hptp method | |
40. |
B2C sells |
A. | products or service directly to consumers |
B. | products or services directly to companies |
C. | products or services directly to govt |
D. | none |
Answer» B. products or services directly to companies | |
41. |
The user reaches this page when they specify the address of a web site. |
A. | home page |
B. | web page |
C. | summary page |
D. | none |
Answer» B. web page | |
42. |
Which is much helpful to do business beyond cultural and national boundaries |
A. | e-commerce |
B. | traditional commerce |
C. | mobile commerce |
D. | retailing |
Answer» B. traditional commerce | |
43. |
……………… is a representation language used to create hypertext documentscontaining text list boxes and graphic |
A. | html |
B. | http |
C. | java |
D. | none |
Answer» B. http | |
44. |
ASCX12 standards were established is |
A. | 1986 |
B. | 1984 |
C. | 1982 |
D. | 1987 |
Answer» C. 1982 | |
45. |
Which among these is a cheap alternative method to traditional printedcatalogues |
A. | paper catalogue |
B. | floppy |
C. | cd–rom s |
D. | none |
Answer» D. none | |
46. |
The IP was originally designed for |
A. | data net working |
B. | data processing |
C. | data execution |
D. | none |
Answer» B. data processing | |
47. |
The attacker monitors the data between the shoppers computer and the server |
A. | spoofing |
B. | snoofing |
C. | sniffing |
D. | none |
Answer» D. none | |
48. |
………….. were considered as the “gateways” to the internet |
A. | portal |
B. | e tailer |
C. | content provider |
D. | narrow market |
Answer» B. e tailer | |
49. |
……………………………. Refers to companies for which internet is one ofseveral channels to customers and perhaps not even the primary one |
A. | traditional commerce |
B. | e- commerce |
C. | edi |
D. | none of these |
Answer» C. edi | |
50. |
The cost of participating in a public exchange is significantly …………….. thanimplementing out own SCM systems |
A. | higher |
B. | lower |
C. | medium |
D. | non |
Answer» C. medium | |