Explore topic-wise MCQs in Bachelor Multimedia Communication (B.M.M.C.).

This section includes 321 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor Multimedia Communication (B.M.M.C.) knowledge and support exam preparation. Choose a topic below to get started.

1.

DTP stands for…..

A. desk top printing
B. desk top publishing
C. desk top page
D. none of these
Answer» C. desk top page
2.

PDF stands for ……..

A. portable document format
B. portable document file
C. pre defined format
D. pixel dots format
Answer» B. portable document file
3.

In Open Office.org. Impress is ……………….program

A. presentation tool
B. word processor
C. spreadsheets
D. none of these
Answer» B. word processor
4.

………………is a popular desktop and server distribution derived from Debian, maintained byCanonical Ltd.

A. debian
B. ubuntu
C. fedora
D. none of the above
Answer» C. fedora
5.

Unix is an……………

A. operating system
B. application software
C. database program
D. none of the above
Answer» B. application software
6.

This is a storage location from which software packages may be retrieved and installed on acomputer.

A. software distribution
B. software repository
C. operating system
D. none of the above
Answer» C. operating system
7.

In Open Office.org. “Calc” is a

A. word processor
B. spreadsheets
C. database
D. none of these
Answer» C. database
8.

This is a software that is distributed under a licensing arrangement and which allows thecomputer code to be shared, viewed and modified by other users and organisations.

A. free software
B. open source software
C. gnu
D. none of the above
Answer» C. gnu
9.

Linux is a …………

A. database program
B. application program
C. operating system
D. none of the above
Answer» D. none of the above
10.

……………….can be defined as electronic equipments or products which have becomeobsolete due to advancement in technology, changes in fashion, style and status andnearing the end of their useful life.

A. e-waste
B. toxic waste
C. computer waste
D. none of the above.
Answer» B. toxic waste
11.

……………………is a situation where an individual is given too much information and as aresult he is confused and cannot make optimal decisions.

A. information overload
B. cyber addiction
C. internet addiction
D. none of the above
Answer» B. cyber addiction
12.

……………………….refers to the compulsive Internet use which interferes with daily life, workand relationships.

A. cyber addictions
B. alcohol addiction
C. drug addiction
D. none of the above
Answer» B. alcohol addiction
13.

…………….are event dependent programs.

A. logic bombs
B. trojan bombs
C. salami attacks
D. none of these
Answer» B. trojan bombs
14.

……………………..is the process of coding and scrambling of messages to prevent unauthorizedaccess to or understanding of the data being transmitted.

A. encryption
B. firewalls
C. antivirus program
D. none of the above
Answer» B. firewalls
15.

In ……………… the hacker gains access and control over the web site of another.

A. web jacking
B. time theft
C. logic bomb
D. none of the above
Answer» B. time theft
16.

…………….. are programs that attach themselves to a computer or a file and then circulatethemselves to other files and to other computers on a network.

A. virus
B. logic bomb
C. web jacking
D. none of these
Answer» B. logic bomb
17.

………………refers to sending large number of mail to the victim, which may be an individualor a company or even mail servers there by ultimately resulting into crashing.

A. email bombing
B. logic bomb
C. virus
D. none of the above
Answer» B. logic bomb
18.

………………… refers to unlawful acts wherein the computer is either a tool or target or both.

A. cyber crime
B. cyber ethics
C. cyber law
D. none of the above
Answer» B. cyber ethics
19.

………………refers to a code of safe and responsible behavior for the Internet Community

A. cyber ethics
B. social issues
C. cyber crime
D. none of the above
Answer» B. social issues
20.

…………………..software is a matter of Liberty not Price.

A. free
B. proprietary
C. application
D. none of these
Answer» B. proprietary
21.

…………………is the Universal character encoding standard, used for representation of text forComputer processing.

A. unicode
B. sap
C. java
D. none of the above
Answer» B. sap
22.

This kind of crime is normally common in the financial institutions or for the purpose ofcommitting financial crimes.

A. data diddling
B. salami attacks
C. virus attack
D. none of the above
Answer» C. virus attack
23.

This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed.

A. data diddling
B. salami attacks
C. virus attack
D. none of the above
Answer» B. salami attacks
24.

This type of digital divide is based on the difference between individuals with access andthose without access.

A. access
B. usage
C. usage quality
D. none of the above
Answer» B. usage
25.

This refers to the gap between people who possess regular access to informationtechnology and those who do not have this access.

A. digital divide
B. discrimination
C. computer divide
D. none of these
Answer» B. discrimination
26.

Flash drives have replaced floppy disks as the preferred method of portable storagebecause:

A. they hold much more data than floppy disks
B. data is not magnetic so less subject to errors
C. they have quicker access time than a floppy drive
D. all of the above
Answer» E.
27.

When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a

A. zero-day attack
B. trojan horse attack
C. distributed denial of service attack
D. boot sector virus attack
Answer» C. distributed denial of service attack
28.

One scam that lures internet users into revealing personal information is

A. malware
B. phishing
C. spam
D. internet hoax
Answer» C. spam
29.

Which of the following is annoying, but really doesn’t render any harm to your computer?

A. adware
B. spyware
C. sneakware
D. malware
Answer» B. spyware
30.

When shopping online which of the following does NOT indicate that you have a secureconnection displays?

A. a closed padlock icon in the status bar
B. the url begins with https
C. the word “secure” in the title bar
D. the verisign seal on the web page.
Answer» D. the verisign seal on the web page.
31.

……………….. is a computer language developed by Seymour Paper and his colleagues atMIT,so that children could program computers.

A. logo
B. pogo
C. gigo
D. none of the above
Answer» B. pogo
32.

…………………..developed a computer language called LOGO, so that children could programcomputers.

A. seymorpapert
B. jean piaget
C. microsoft
D. none of the above
Answer» B. jean piaget
33.

TRIPS means……………..

A. trade related aspects of intellectual property rights
B. trade related activities and information providing rights
C. round trip to europe
D. none of these
Answer» B. trade related activities and information providing rights
34.

The patent system in India is governed by the ………………..

A. patents act, 1970
B. patents act, 1911
C. patents act, 1972
D. none of these
Answer» B. patents act, 1911
35.

………………….is a prototype portal site for biological information and bio-resourceinformation.

A. brnet
B. inflibnet
C. nicenet
D. none of these
Answer» B. inflibnet
36.

……………………….is one of many web-based learning management systems(LMS) throughwhich teachers can work with students, whether in distance mode or as a supplement toface-to-face teaching.

A. nicenet
B. inflibnet
C. brnet
D. none of these
Answer» B. inflibnet
37.

………………knowledge are also known as formal knowledge.

A. explicit knowledge
B. tacit knowledge
C. information
D. none of these
Answer» B. tacit knowledge
38.

IPR stands for………………

A. intellectual property rights
B. individual property rights
C. inter person rights
D. none of these
Answer» B. individual property rights
39.

………………knowledge are also known as informal knowledge.

A. tacit knowledge
B. explicit knowledge
C. information
D. none of these
Answer» B. explicit knowledge
40.

This network is an autonomous Inter-University Centre of the University GrantsCommission.

A. inflibnet
B. nicenet
C. brnet
D. none of these
Answer» B. nicenet
41.

This is the exclusive right granted by statute to the author of the works to reproducedramatic, artistic, literary or musical work or to authorize its reproduction by others.

A. patent
B. copy right
C. trade mark
D. none of the above
Answer» C. trade mark
42.

The height at which the GPS satellite is above the earth’s surface is

A. 12000 miles
B. 1000km
C. 1000miles
D. none of these
Answer» B. 1000km
43.

The device best suited for a sales person who has to demonstrate processor-intensivemultimedia to clients is a

A. smartphone with internet capabilities
B. pda with an external monitor
C. tablet pc
D. notebook computer
Answer» E.
44.

GPS is a………………….. owned utility.

A. us
B. japan
C. russian
D. uk
Answer» B. japan
45.

………….. is a computer based tool for mapping and analyzing things that exist and eventsthat happen on earth.

A. gis
B. gps
C. bis
D. none of the above
Answer» B. gps
46.

E H R means………………………

A. electronic health record
B. electronic health care
C. election hour report
D. none of these
Answer» B. electronic health care
47.

…………………… is a communication technology that allows users to exchange multimediacommunication between capable mobile phones and other devices.

A. bluetooth
B. blue eyes
C. blue devices
D. none of these
Answer» B. blue eyes
48.

G2B e-governance means……………………….

A. government to business
B. government to citizens
C. government to employees
D. none of these
Answer» B. government to citizens
49.

G2E e-governance means……………………….

A. government to government
B. government to citizens
C. government to employees
D. none of these
Answer» D. none of these
50.

G2C e-governance means……………………….

A. government to government
B. government to citizens
C. government to employees
D. none of these
Answer» C. government to employees