MCQOPTIONS
 Saved Bookmarks
				This section includes 321 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor Multimedia Communication (B.M.M.C.) knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    DTP stands for….. | 
                            
| A. | desk top printing | 
| B. | desk top publishing | 
| C. | desk top page | 
| D. | none of these | 
| Answer» C. desk top page | |
| 2. | 
                                    PDF stands for …….. | 
                            
| A. | portable document format | 
| B. | portable document file | 
| C. | pre defined format | 
| D. | pixel dots format | 
| Answer» B. portable document file | |
| 3. | 
                                    In Open Office.org. Impress is ……………….program | 
                            
| A. | presentation tool | 
| B. | word processor | 
| C. | spreadsheets | 
| D. | none of these | 
| Answer» B. word processor | |
| 4. | 
                                    ………………is a popular desktop and server distribution derived from Debian, maintained byCanonical Ltd. | 
                            
| A. | debian | 
| B. | ubuntu | 
| C. | fedora | 
| D. | none of the above | 
| Answer» C. fedora | |
| 5. | 
                                    Unix is an…………… | 
                            
| A. | operating system | 
| B. | application software | 
| C. | database program | 
| D. | none of the above | 
| Answer» B. application software | |
| 6. | 
                                    This is a storage location from which software packages may be retrieved and installed on acomputer. | 
                            
| A. | software distribution | 
| B. | software repository | 
| C. | operating system | 
| D. | none of the above | 
| Answer» C. operating system | |
| 7. | 
                                    In Open Office.org. “Calc” is a | 
                            
| A. | word processor | 
| B. | spreadsheets | 
| C. | database | 
| D. | none of these | 
| Answer» C. database | |
| 8. | 
                                    This is a software that is distributed under a licensing arrangement and which allows thecomputer code to be shared, viewed and modified by other users and organisations. | 
                            
| A. | free software | 
| B. | open source software | 
| C. | gnu | 
| D. | none of the above | 
| Answer» C. gnu | |
| 9. | 
                                    Linux is a ………… | 
                            
| A. | database program | 
| B. | application program | 
| C. | operating system | 
| D. | none of the above | 
| Answer» D. none of the above | |
| 10. | 
                                    ……………….can be defined as electronic equipments or products which have becomeobsolete due to advancement in technology, changes in fashion, style and status andnearing the end of their useful life. | 
                            
| A. | e-waste | 
| B. | toxic waste | 
| C. | computer waste | 
| D. | none of the above. | 
| Answer» B. toxic waste | |
| 11. | 
                                    ……………………is a situation where an individual is given too much information and as aresult he is confused and cannot make optimal decisions. | 
                            
| A. | information overload | 
| B. | cyber addiction | 
| C. | internet addiction | 
| D. | none of the above | 
| Answer» B. cyber addiction | |
| 12. | 
                                    ……………………….refers to the compulsive Internet use which interferes with daily life, workand relationships. | 
                            
| A. | cyber addictions | 
| B. | alcohol addiction | 
| C. | drug addiction | 
| D. | none of the above | 
| Answer» B. alcohol addiction | |
| 13. | 
                                    …………….are event dependent programs. | 
                            
| A. | logic bombs | 
| B. | trojan bombs | 
| C. | salami attacks | 
| D. | none of these | 
| Answer» B. trojan bombs | |
| 14. | 
                                    ……………………..is the process of coding and scrambling of messages to prevent unauthorizedaccess to or understanding of the data being transmitted. | 
                            
| A. | encryption | 
| B. | firewalls | 
| C. | antivirus program | 
| D. | none of the above | 
| Answer» B. firewalls | |
| 15. | 
                                    In ……………… the hacker gains access and control over the web site of another. | 
                            
| A. | web jacking | 
| B. | time theft | 
| C. | logic bomb | 
| D. | none of the above | 
| Answer» B. time theft | |
| 16. | 
                                    …………….. are programs that attach themselves to a computer or a file and then circulatethemselves to other files and to other computers on a network. | 
                            
| A. | virus | 
| B. | logic bomb | 
| C. | web jacking | 
| D. | none of these | 
| Answer» B. logic bomb | |
| 17. | 
                                    ………………refers to sending large number of mail to the victim, which may be an individualor a company or even mail servers there by ultimately resulting into crashing. | 
                            
| A. | email bombing | 
| B. | logic bomb | 
| C. | virus | 
| D. | none of the above | 
| Answer» B. logic bomb | |
| 18. | 
                                    ………………… refers to unlawful acts wherein the computer is either a tool or target or both. | 
                            
| A. | cyber crime | 
| B. | cyber ethics | 
| C. | cyber law | 
| D. | none of the above | 
| Answer» B. cyber ethics | |
| 19. | 
                                    ………………refers to a code of safe and responsible behavior for the Internet Community | 
                            
| A. | cyber ethics | 
| B. | social issues | 
| C. | cyber crime | 
| D. | none of the above | 
| Answer» B. social issues | |
| 20. | 
                                    …………………..software is a matter of Liberty not Price. | 
                            
| A. | free | 
| B. | proprietary | 
| C. | application | 
| D. | none of these | 
| Answer» B. proprietary | |
| 21. | 
                                    …………………is the Universal character encoding standard, used for representation of text forComputer processing. | 
                            
| A. | unicode | 
| B. | sap | 
| C. | java | 
| D. | none of the above | 
| Answer» B. sap | |
| 22. | 
                                    This kind of crime is normally common in the financial institutions or for the purpose ofcommitting financial crimes. | 
                            
| A. | data diddling | 
| B. | salami attacks | 
| C. | virus attack | 
| D. | none of the above | 
| Answer» C. virus attack | |
| 23. | 
                                    This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed. | 
                            
| A. | data diddling | 
| B. | salami attacks | 
| C. | virus attack | 
| D. | none of the above | 
| Answer» B. salami attacks | |
| 24. | 
                                    This type of digital divide is based on the difference between individuals with access andthose without access. | 
                            
| A. | access | 
| B. | usage | 
| C. | usage quality | 
| D. | none of the above | 
| Answer» B. usage | |
| 25. | 
                                    This refers to the gap between people who possess regular access to informationtechnology and those who do not have this access. | 
                            
| A. | digital divide | 
| B. | discrimination | 
| C. | computer divide | 
| D. | none of these | 
| Answer» B. discrimination | |
| 26. | 
                                    Flash drives have replaced floppy disks as the preferred method of portable storagebecause: | 
                            
| A. | they hold much more data than floppy disks | 
| B. | data is not magnetic so less subject to errors | 
| C. | they have quicker access time than a floppy drive | 
| D. | all of the above | 
| Answer» E. | |
| 27. | 
                                    When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a | 
                            
| A. | zero-day attack | 
| B. | trojan horse attack | 
| C. | distributed denial of service attack | 
| D. | boot sector virus attack | 
| Answer» C. distributed denial of service attack | |
| 28. | 
                                    One scam that lures internet users into revealing personal information is | 
                            
| A. | malware | 
| B. | phishing | 
| C. | spam | 
| D. | internet hoax | 
| Answer» C. spam | |
| 29. | 
                                    Which of the following is annoying, but really doesn’t render any harm to your computer? | 
                            
| A. | adware | 
| B. | spyware | 
| C. | sneakware | 
| D. | malware | 
| Answer» B. spyware | |
| 30. | 
                                    When shopping online which of the following does NOT indicate that you have a secureconnection displays? | 
                            
| A. | a closed padlock icon in the status bar | 
| B. | the url begins with https | 
| C. | the word “secure” in the title bar | 
| D. | the verisign seal on the web page. | 
| Answer» D. the verisign seal on the web page. | |
| 31. | 
                                    ……………….. is a computer language developed by Seymour Paper and his colleagues atMIT,so that children could program computers. | 
                            
| A. | logo | 
| B. | pogo | 
| C. | gigo | 
| D. | none of the above | 
| Answer» B. pogo | |
| 32. | 
                                    …………………..developed a computer language called LOGO, so that children could programcomputers. | 
                            
| A. | seymorpapert | 
| B. | jean piaget | 
| C. | microsoft | 
| D. | none of the above | 
| Answer» B. jean piaget | |
| 33. | 
                                    TRIPS means…………….. | 
                            
| A. | trade related aspects of intellectual property rights | 
| B. | trade related activities and information providing rights | 
| C. | round trip to europe | 
| D. | none of these | 
| Answer» B. trade related activities and information providing rights | |
| 34. | 
                                    The patent system in India is governed by the ……………….. | 
                            
| A. | patents act, 1970 | 
| B. | patents act, 1911 | 
| C. | patents act, 1972 | 
| D. | none of these | 
| Answer» B. patents act, 1911 | |
| 35. | 
                                    ………………….is a prototype portal site for biological information and bio-resourceinformation. | 
                            
| A. | brnet | 
| B. | inflibnet | 
| C. | nicenet | 
| D. | none of these | 
| Answer» B. inflibnet | |
| 36. | 
                                    ……………………….is one of many web-based learning management systems(LMS) throughwhich teachers can work with students, whether in distance mode or as a supplement toface-to-face teaching. | 
                            
| A. | nicenet | 
| B. | inflibnet | 
| C. | brnet | 
| D. | none of these | 
| Answer» B. inflibnet | |
| 37. | 
                                    ………………knowledge are also known as formal knowledge. | 
                            
| A. | explicit knowledge | 
| B. | tacit knowledge | 
| C. | information | 
| D. | none of these | 
| Answer» B. tacit knowledge | |
| 38. | 
                                    IPR stands for……………… | 
                            
| A. | intellectual property rights | 
| B. | individual property rights | 
| C. | inter person rights | 
| D. | none of these | 
| Answer» B. individual property rights | |
| 39. | 
                                    ………………knowledge are also known as informal knowledge. | 
                            
| A. | tacit knowledge | 
| B. | explicit knowledge | 
| C. | information | 
| D. | none of these | 
| Answer» B. explicit knowledge | |
| 40. | 
                                    This network is an autonomous Inter-University Centre of the University GrantsCommission. | 
                            
| A. | inflibnet | 
| B. | nicenet | 
| C. | brnet | 
| D. | none of these | 
| Answer» B. nicenet | |
| 41. | 
                                    This is the exclusive right granted by statute to the author of the works to reproducedramatic, artistic, literary or musical work or to authorize its reproduction by others. | 
                            
| A. | patent | 
| B. | copy right | 
| C. | trade mark | 
| D. | none of the above | 
| Answer» C. trade mark | |
| 42. | 
                                    The height at which the GPS satellite is above the earth’s surface is | 
                            
| A. | 12000 miles | 
| B. | 1000km | 
| C. | 1000miles | 
| D. | none of these | 
| Answer» B. 1000km | |
| 43. | 
                                    The device best suited for a sales person who has to demonstrate processor-intensivemultimedia to clients is a | 
                            
| A. | smartphone with internet capabilities | 
| B. | pda with an external monitor | 
| C. | tablet pc | 
| D. | notebook computer | 
| Answer» E. | |
| 44. | 
                                    GPS is a………………….. owned utility. | 
                            
| A. | us | 
| B. | japan | 
| C. | russian | 
| D. | uk | 
| Answer» B. japan | |
| 45. | 
                                    ………….. is a computer based tool for mapping and analyzing things that exist and eventsthat happen on earth. | 
                            
| A. | gis | 
| B. | gps | 
| C. | bis | 
| D. | none of the above | 
| Answer» B. gps | |
| 46. | 
                                    E H R means……………………… | 
                            
| A. | electronic health record | 
| B. | electronic health care | 
| C. | election hour report | 
| D. | none of these | 
| Answer» B. electronic health care | |
| 47. | 
                                    …………………… is a communication technology that allows users to exchange multimediacommunication between capable mobile phones and other devices. | 
                            
| A. | bluetooth | 
| B. | blue eyes | 
| C. | blue devices | 
| D. | none of these | 
| Answer» B. blue eyes | |
| 48. | 
                                    G2B e-governance means………………………. | 
                            
| A. | government to business | 
| B. | government to citizens | 
| C. | government to employees | 
| D. | none of these | 
| Answer» B. government to citizens | |
| 49. | 
                                    G2E e-governance means………………………. | 
                            
| A. | government to government | 
| B. | government to citizens | 
| C. | government to employees | 
| D. | none of these | 
| Answer» D. none of these | |
| 50. | 
                                    G2C e-governance means………………………. | 
                            
| A. | government to government | 
| B. | government to citizens | 
| C. | government to employees | 
| D. | none of these | 
| Answer» C. government to employees | |