MCQOPTIONS
Saved Bookmarks
This section includes 321 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor Multimedia Communication (B.M.M.C.) knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Repositories are also known as |
| A. | library |
| B. | stories |
| C. | files |
| D. | none of these |
| Answer» B. stories | |
| 102. |
………………is a popular desktop and server distribution derived from Debian, maintained by Canonical Ltd. |
| A. | debian |
| B. | ubuntu |
| C. | fedora |
| D. | none of the above |
| Answer» C. fedora | |
| 103. |
Unix is an…………… |
| A. | operating system |
| B. | application software |
| C. | database program |
| D. | none of the above |
| Answer» B. application software | |
| 104. |
In Open Office.org. “Calc†is a |
| A. | word processor |
| B. | spreadsheets |
| C. | database |
| D. | none of these |
| Answer» C. database | |
| 105. |
This is a storage location from which software packages may be retrieved and installed on a computer. |
| A. | software distribution |
| B. | software repository |
| C. | operating system |
| D. | none of the above |
| Answer» C. operating system | |
| 106. |
AbiWord is a : |
| A. | word processor |
| B. | spreadsheet |
| C. | database |
| D. | none of these |
| Answer» B. spreadsheet | |
| 107. |
OpenSUSE a community distribution mainly sponsored by |
| A. | redhat |
| B. | novell |
| C. | oracle |
| D. | none of the above |
| Answer» C. oracle | |
| 108. |
Fedora, a community distribution sponsored by |
| A. | redhat |
| B. | novell |
| C. | oracle |
| D. | none of the above |
| Answer» B. novell | |
| 109. |
This is a software that is distributed under a licensing arrangement and which allows the computer code to be shared, viewed and modified by other users and organisations. |
| A. | free software |
| B. | open source software |
| C. | gnu |
| D. | none of the above |
| Answer» C. gnu | |
| 110. |
Linux is a ………… |
| A. | database program |
| B. | application program |
| C. | operating system |
| D. | none of the above |
| Answer» D. none of the above | |
| 111. |
……………….can be defined as electronic equipments or products which have become obsolete due to advancement in technology, changes in fashion, style and status and nearing the end of their useful life. |
| A. | e-waste |
| B. | toxic waste |
| C. | computer waste |
| D. | none of the above. |
| Answer» B. toxic waste | |
| 112. |
Which chapter of the IT Act deals with computer related unlawful acts? |
| A. | chapter x |
| B. | chapter xi |
| C. | chapter ix |
| D. | chapter viii |
| Answer» C. chapter ix | |
| 113. |
……………………is a situation where an individual is given too much information and as a result he is confused and cannot make optimal decisions. |
| A. | information overload |
| B. | cyber addiction |
| C. | internet addiction |
| D. | none of the above |
| Answer» B. cyber addiction | |
| 114. |
……………………….refers to the compulsive Internet use which interferes with daily life, work and relationships. |
| A. | cyber addictions |
| B. | alcohol addiction |
| C. | drug addiction |
| D. | none of the above |
| Answer» B. alcohol addiction | |
| 115. |
…………….are event dependent programs. |
| A. | logic bombs |
| B. | trojan bombs |
| C. | salami attacks |
| D. | none of these |
| Answer» B. trojan bombs | |
| 116. |
……………………..is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of the data being transmitted. |
| A. | encryption |
| B. | firewalls |
| C. | antivirus program |
| D. | none of the above |
| Answer» B. firewalls | |
| 117. |
In ……………… the hacker gains access and control over the web site of another. |
| A. | web jacking |
| B. | time theft |
| C. | logic bomb |
| D. | none of the above |
| Answer» B. time theft | |
| 118. |
…………….. are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. |
| A. | virus |
| B. | logic bomb |
| C. | web jacking |
| D. | none of these |
| Answer» B. logic bomb | |
| 119. |
………………refers to sending large number of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. |
| A. | email bombing |
| B. | logic bomb |
| C. | virus |
| D. | none of the above |
| Answer» B. logic bomb | |
| 120. |
………………… refers to unlawful acts wherein the computer is either a tool or target or both. |
| A. | cyber crime |
| B. | cyber ethics |
| C. | cyber law |
| D. | none of the above |
| Answer» B. cyber ethics | |
| 121. |
………………refers to a code of safe and responsible behavior for the Internet Community |
| A. | cyber ethics |
| B. | social issues |
| C. | cyber crime |
| D. | none of the above |
| Answer» B. social issues | |
| 122. |
…………………..software is a matter of Liberty not Price. |
| A. | free |
| B. | proprietary |
| C. | application |
| D. | none of these |
| Answer» B. proprietary | |
| 123. |
…………………is the Universal character encoding standard, used for representation of text for Computer processing. |
| A. | unicode |
| B. | sap |
| C. | java |
| D. | none of the above |
| Answer» B. sap | |
| 124. |
IT Act in India was amended in |
| A. | 2000 |
| B. | 2004 |
| C. | 2008 |
| D. | none of these |
| Answer» D. none of these | |
| 125. |
This kind of crime is normally common in the financial institutions or for the purpose of committing financial crimes. |
| A. | data diddling |
| B. | salami attacks |
| C. | virus attack |
| D. | none of the above |
| Answer» C. virus attack | |
| 126. |
This refers to environmentally sustaining computing or IT. |
| A. | cloud computing |
| B. | green computing |
| C. | electronic computing |
| D. | none of the above |
| Answer» C. electronic computing | |
| 127. |
This kind of attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. |
| A. | data diddling |
| B. | salami attacks |
| C. | virus attack |
| D. | none of the above |
| Answer» B. salami attacks | |
| 128. |
Who started Free Software foundation? |
| A. | linus torvald |
| B. | richard m stallman |
| C. | gnu |
| D. | none of the above |
| Answer» C. gnu | |
| 129. |
It is based on the differences in the quality of using information technology. |
| A. | access |
| B. | usage |
| C. | usage quality |
| D. | none of these |
| Answer» D. none of these | |
| 130. |
This refers to the gap between people who possess regular access to information technology and those who do not have this access. |
| A. | digital divide |
| B. | discrimination |
| C. | computer divide |
| D. | none of these |
| Answer» B. discrimination | |
| 131. |
This is based on individuals who know how to use these technologies and those who do not. |
| A. | access |
| B. | usage |
| C. | usage quality |
| D. | none of the above |
| Answer» C. usage quality | |
| 132. |
This type of digital divide is based on the difference between individuals with access and those without access. |
| A. | access |
| B. | usage |
| C. | usage quality |
| D. | none of the above |
| Answer» B. usage | |
| 133. |
Which of the following is not harmful for your computer |
| A. | malware |
| B. | spyware |
| C. | virus |
| D. | cookies |
| Answer» E. | |
| 134. |
Flash drives have replaced floppy disks as the preferred method of portable storage because: |
| A. | they hold much more data than floppy disks |
| B. | data is not magnetic so less subject to errors |
| C. | they have quicker access time than a floppy drive |
| D. | all of the above |
| Answer» E. | |
| 135. |
Viruses that travel from computer to computer on their own(independent of host) are called |
| A. | worms |
| B. | stealth viruses |
| C. | logic bombs |
| D. | macro viruses |
| Answer» B. stealth viruses | |
| 136. |
Which is a benefit of a firewall? |
| A. | they make it harder for a hacker to locate specific computer on a network |
| B. | they repeatedly change the ip address of the router |
| C. | they open unused logical ports to increase throughput |
| D. | they filter out unwanted wireless signals |
| Answer» B. they repeatedly change the ip address of the router | |
| 137. |
Cell phones use which category of operating systems |
| A. | single user, single task |
| B. | multi user, multi task |
| C. | single user, multitask |
| D. | real-time |
| Answer» B. multi user, multi task | |
| 138. |
When hacker use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a |
| A. | zero-day attack |
| B. | trojan horse attack |
| C. | distributed denial of service attack |
| D. | boot sector virus attack |
| Answer» C. distributed denial of service attack | |
| 139. |
Which of the following is annoying, but really doesn’t render any harm to your computer? |
| A. | adware |
| B. | spyware |
| C. | sneakware |
| D. | malware |
| Answer» B. spyware | |
| 140. |
……………….. is a computer language developed by Seymour Paper and his colleagues at MIT,so that children could program computers. |
| A. | logo |
| B. | pogo |
| C. | gigo |
| D. | none of the above |
| Answer» B. pogo | |
| 141. |
When shopping online which of the following does NOT indicate that you have a secure connection displays? |
| A. | a closed padlock icon in the status bar |
| B. | the url begins with https |
| C. | the word “secure†in the title bar |
| D. | the verisign seal on the web page. |
| Answer» D. the verisign seal on the web page. | |
| 142. |
…………………..developed a computer language called LOGO, so that children could program computers. |
| A. | seymorpapert |
| B. | jean piaget |
| C. | microsoft |
| D. | none of the above |
| Answer» B. jean piaget | |
| 143. |
Indiancopyright act came into existence in the year |
| A. | 1950 |
| B. | 1955 |
| C. | 1957 |
| D. | none of these |
| Answer» D. none of these | |
| 144. |
Intellectual Property Rights does not cover the following area |
| A. | copyright |
| B. | patents |
| C. | trademark |
| D. | none of these |
| Answer» E. | |
| 145. |
Which of the following operators cannot be applied to search? |
| A. | or |
| B. | not |
| C. | and |
| D. | bool |
| Answer» E. | |
| 146. |
IPR stands for……………… |
| A. | intellectual property rights |
| B. | individual property rights |
| C. | inter person rights |
| D. | none of these |
| Answer» B. individual property rights | |
| 147. |
TRIPS means…………….. |
| A. | trade related aspects of intellectual property rights |
| B. | trade related activities and information providing rights |
| C. | round trip to europe |
| D. | none of these |
| Answer» B. trade related activities and information providing rights | |
| 148. |
CBT stands for: |
| A. | computer based training |
| B. | computer based tooling |
| C. | computer based technology |
| D. | none of these |
| Answer» B. computer based tooling | |
| 149. |
The patent system in India is governed by the ……………….. |
| A. | patents act, 1970 |
| B. | patents act, 1911 |
| C. | patents act, 1972 |
| D. | none of these |
| Answer» B. patents act, 1911 | |
| 150. |
Which of the following is a processed thing? |
| A. | data |
| B. | information |
| C. | database |
| D. | none of these |
| Answer» C. database | |