MCQOPTIONS
Saved Bookmarks
This section includes 321 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor Multimedia Communication (B.M.M.C.) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
DTP stands for….. |
| A. | desk top printing |
| B. | desk top publishing |
| C. | desk top page |
| D. | none of these |
| Answer» C. desk top page | |
| 2. |
PDF stands for …….. |
| A. | portable document format |
| B. | portable document file |
| C. | pre defined format |
| D. | pixel dots format |
| Answer» B. portable document file | |
| 3. |
In Open Office.org. Impress is ……………….program |
| A. | presentation tool |
| B. | word processor |
| C. | spreadsheets |
| D. | none of these |
| Answer» B. word processor | |
| 4. |
………………is a popular desktop and server distribution derived from Debian, maintained byCanonical Ltd. |
| A. | debian |
| B. | ubuntu |
| C. | fedora |
| D. | none of the above |
| Answer» C. fedora | |
| 5. |
Unix is an…………… |
| A. | operating system |
| B. | application software |
| C. | database program |
| D. | none of the above |
| Answer» B. application software | |
| 6. |
This is a storage location from which software packages may be retrieved and installed on acomputer. |
| A. | software distribution |
| B. | software repository |
| C. | operating system |
| D. | none of the above |
| Answer» C. operating system | |
| 7. |
In Open Office.org. “Calc” is a |
| A. | word processor |
| B. | spreadsheets |
| C. | database |
| D. | none of these |
| Answer» C. database | |
| 8. |
This is a software that is distributed under a licensing arrangement and which allows thecomputer code to be shared, viewed and modified by other users and organisations. |
| A. | free software |
| B. | open source software |
| C. | gnu |
| D. | none of the above |
| Answer» C. gnu | |
| 9. |
Linux is a ………… |
| A. | database program |
| B. | application program |
| C. | operating system |
| D. | none of the above |
| Answer» D. none of the above | |
| 10. |
……………….can be defined as electronic equipments or products which have becomeobsolete due to advancement in technology, changes in fashion, style and status andnearing the end of their useful life. |
| A. | e-waste |
| B. | toxic waste |
| C. | computer waste |
| D. | none of the above. |
| Answer» B. toxic waste | |
| 11. |
……………………is a situation where an individual is given too much information and as aresult he is confused and cannot make optimal decisions. |
| A. | information overload |
| B. | cyber addiction |
| C. | internet addiction |
| D. | none of the above |
| Answer» B. cyber addiction | |
| 12. |
……………………….refers to the compulsive Internet use which interferes with daily life, workand relationships. |
| A. | cyber addictions |
| B. | alcohol addiction |
| C. | drug addiction |
| D. | none of the above |
| Answer» B. alcohol addiction | |
| 13. |
…………….are event dependent programs. |
| A. | logic bombs |
| B. | trojan bombs |
| C. | salami attacks |
| D. | none of these |
| Answer» B. trojan bombs | |
| 14. |
……………………..is the process of coding and scrambling of messages to prevent unauthorizedaccess to or understanding of the data being transmitted. |
| A. | encryption |
| B. | firewalls |
| C. | antivirus program |
| D. | none of the above |
| Answer» B. firewalls | |
| 15. |
In ……………… the hacker gains access and control over the web site of another. |
| A. | web jacking |
| B. | time theft |
| C. | logic bomb |
| D. | none of the above |
| Answer» B. time theft | |
| 16. |
…………….. are programs that attach themselves to a computer or a file and then circulatethemselves to other files and to other computers on a network. |
| A. | virus |
| B. | logic bomb |
| C. | web jacking |
| D. | none of these |
| Answer» B. logic bomb | |
| 17. |
………………refers to sending large number of mail to the victim, which may be an individualor a company or even mail servers there by ultimately resulting into crashing. |
| A. | email bombing |
| B. | logic bomb |
| C. | virus |
| D. | none of the above |
| Answer» B. logic bomb | |
| 18. |
………………… refers to unlawful acts wherein the computer is either a tool or target or both. |
| A. | cyber crime |
| B. | cyber ethics |
| C. | cyber law |
| D. | none of the above |
| Answer» B. cyber ethics | |
| 19. |
………………refers to a code of safe and responsible behavior for the Internet Community |
| A. | cyber ethics |
| B. | social issues |
| C. | cyber crime |
| D. | none of the above |
| Answer» B. social issues | |
| 20. |
…………………..software is a matter of Liberty not Price. |
| A. | free |
| B. | proprietary |
| C. | application |
| D. | none of these |
| Answer» B. proprietary | |
| 21. |
…………………is the Universal character encoding standard, used for representation of text forComputer processing. |
| A. | unicode |
| B. | sap |
| C. | java |
| D. | none of the above |
| Answer» B. sap | |
| 22. |
This kind of crime is normally common in the financial institutions or for the purpose ofcommitting financial crimes. |
| A. | data diddling |
| B. | salami attacks |
| C. | virus attack |
| D. | none of the above |
| Answer» C. virus attack | |
| 23. |
This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed. |
| A. | data diddling |
| B. | salami attacks |
| C. | virus attack |
| D. | none of the above |
| Answer» B. salami attacks | |
| 24. |
This type of digital divide is based on the difference between individuals with access andthose without access. |
| A. | access |
| B. | usage |
| C. | usage quality |
| D. | none of the above |
| Answer» B. usage | |
| 25. |
This refers to the gap between people who possess regular access to informationtechnology and those who do not have this access. |
| A. | digital divide |
| B. | discrimination |
| C. | computer divide |
| D. | none of these |
| Answer» B. discrimination | |
| 26. |
Flash drives have replaced floppy disks as the preferred method of portable storagebecause: |
| A. | they hold much more data than floppy disks |
| B. | data is not magnetic so less subject to errors |
| C. | they have quicker access time than a floppy drive |
| D. | all of the above |
| Answer» E. | |
| 27. |
When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a |
| A. | zero-day attack |
| B. | trojan horse attack |
| C. | distributed denial of service attack |
| D. | boot sector virus attack |
| Answer» C. distributed denial of service attack | |
| 28. |
One scam that lures internet users into revealing personal information is |
| A. | malware |
| B. | phishing |
| C. | spam |
| D. | internet hoax |
| Answer» C. spam | |
| 29. |
Which of the following is annoying, but really doesn’t render any harm to your computer? |
| A. | adware |
| B. | spyware |
| C. | sneakware |
| D. | malware |
| Answer» B. spyware | |
| 30. |
When shopping online which of the following does NOT indicate that you have a secureconnection displays? |
| A. | a closed padlock icon in the status bar |
| B. | the url begins with https |
| C. | the word “secure” in the title bar |
| D. | the verisign seal on the web page. |
| Answer» D. the verisign seal on the web page. | |
| 31. |
……………….. is a computer language developed by Seymour Paper and his colleagues atMIT,so that children could program computers. |
| A. | logo |
| B. | pogo |
| C. | gigo |
| D. | none of the above |
| Answer» B. pogo | |
| 32. |
…………………..developed a computer language called LOGO, so that children could programcomputers. |
| A. | seymorpapert |
| B. | jean piaget |
| C. | microsoft |
| D. | none of the above |
| Answer» B. jean piaget | |
| 33. |
TRIPS means…………….. |
| A. | trade related aspects of intellectual property rights |
| B. | trade related activities and information providing rights |
| C. | round trip to europe |
| D. | none of these |
| Answer» B. trade related activities and information providing rights | |
| 34. |
The patent system in India is governed by the ……………….. |
| A. | patents act, 1970 |
| B. | patents act, 1911 |
| C. | patents act, 1972 |
| D. | none of these |
| Answer» B. patents act, 1911 | |
| 35. |
………………….is a prototype portal site for biological information and bio-resourceinformation. |
| A. | brnet |
| B. | inflibnet |
| C. | nicenet |
| D. | none of these |
| Answer» B. inflibnet | |
| 36. |
……………………….is one of many web-based learning management systems(LMS) throughwhich teachers can work with students, whether in distance mode or as a supplement toface-to-face teaching. |
| A. | nicenet |
| B. | inflibnet |
| C. | brnet |
| D. | none of these |
| Answer» B. inflibnet | |
| 37. |
………………knowledge are also known as formal knowledge. |
| A. | explicit knowledge |
| B. | tacit knowledge |
| C. | information |
| D. | none of these |
| Answer» B. tacit knowledge | |
| 38. |
IPR stands for……………… |
| A. | intellectual property rights |
| B. | individual property rights |
| C. | inter person rights |
| D. | none of these |
| Answer» B. individual property rights | |
| 39. |
………………knowledge are also known as informal knowledge. |
| A. | tacit knowledge |
| B. | explicit knowledge |
| C. | information |
| D. | none of these |
| Answer» B. explicit knowledge | |
| 40. |
This network is an autonomous Inter-University Centre of the University GrantsCommission. |
| A. | inflibnet |
| B. | nicenet |
| C. | brnet |
| D. | none of these |
| Answer» B. nicenet | |
| 41. |
This is the exclusive right granted by statute to the author of the works to reproducedramatic, artistic, literary or musical work or to authorize its reproduction by others. |
| A. | patent |
| B. | copy right |
| C. | trade mark |
| D. | none of the above |
| Answer» C. trade mark | |
| 42. |
The height at which the GPS satellite is above the earth’s surface is |
| A. | 12000 miles |
| B. | 1000km |
| C. | 1000miles |
| D. | none of these |
| Answer» B. 1000km | |
| 43. |
The device best suited for a sales person who has to demonstrate processor-intensivemultimedia to clients is a |
| A. | smartphone with internet capabilities |
| B. | pda with an external monitor |
| C. | tablet pc |
| D. | notebook computer |
| Answer» E. | |
| 44. |
GPS is a………………….. owned utility. |
| A. | us |
| B. | japan |
| C. | russian |
| D. | uk |
| Answer» B. japan | |
| 45. |
………….. is a computer based tool for mapping and analyzing things that exist and eventsthat happen on earth. |
| A. | gis |
| B. | gps |
| C. | bis |
| D. | none of the above |
| Answer» B. gps | |
| 46. |
E H R means……………………… |
| A. | electronic health record |
| B. | electronic health care |
| C. | election hour report |
| D. | none of these |
| Answer» B. electronic health care | |
| 47. |
…………………… is a communication technology that allows users to exchange multimediacommunication between capable mobile phones and other devices. |
| A. | bluetooth |
| B. | blue eyes |
| C. | blue devices |
| D. | none of these |
| Answer» B. blue eyes | |
| 48. |
G2B e-governance means………………………. |
| A. | government to business |
| B. | government to citizens |
| C. | government to employees |
| D. | none of these |
| Answer» B. government to citizens | |
| 49. |
G2E e-governance means………………………. |
| A. | government to government |
| B. | government to citizens |
| C. | government to employees |
| D. | none of these |
| Answer» D. none of these | |
| 50. |
G2C e-governance means………………………. |
| A. | government to government |
| B. | government to citizens |
| C. | government to employees |
| D. | none of these |
| Answer» C. government to employees | |