Explore topic-wise MCQs in Bachelor Multimedia Communication (B.M.M.C.).

This section includes 321 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor Multimedia Communication (B.M.M.C.) knowledge and support exam preparation. Choose a topic below to get started.

101.

Repositories are also known as

A. library
B. stories
C. files
D. none of these
Answer» B. stories
102.

………………is a popular desktop and server distribution derived from Debian, maintained by Canonical Ltd.

A. debian
B. ubuntu
C. fedora
D. none of the above
Answer» C. fedora
103.

Unix is an……………

A. operating system
B. application software
C. database program
D. none of the above
Answer» B. application software
104.

In Open Office.org. “Calc” is a

A. word processor
B. spreadsheets
C. database
D. none of these
Answer» C. database
105.

This is a storage location from which software packages may be retrieved and installed on a computer.

A. software distribution
B. software repository
C. operating system
D. none of the above
Answer» C. operating system
106.

AbiWord is a :

A. word processor
B. spreadsheet
C. database
D. none of these
Answer» B. spreadsheet
107.

OpenSUSE a community distribution mainly sponsored by

A. redhat
B. novell
C. oracle
D. none of the above
Answer» C. oracle
108.

Fedora, a community distribution sponsored by

A. redhat
B. novell
C. oracle
D. none of the above
Answer» B. novell
109.

This is a software that is distributed under a licensing arrangement and which allows the computer code to be shared, viewed and modified by other users and organisations.

A. free software
B. open source software
C. gnu
D. none of the above
Answer» C. gnu
110.

Linux is a …………

A. database program
B. application program
C. operating system
D. none of the above
Answer» D. none of the above
111.

……………….can be defined as electronic equipments or products which have become obsolete due to advancement in technology, changes in fashion, style and status and nearing the end of their useful life.

A. e-waste
B. toxic waste
C. computer waste
D. none of the above.
Answer» B. toxic waste
112.

Which chapter of the IT Act deals with computer related unlawful acts?

A. chapter x
B. chapter xi
C. chapter ix
D. chapter viii
Answer» C. chapter ix
113.

……………………is a situation where an individual is given too much information and as a result he is confused and cannot make optimal decisions.

A. information overload
B. cyber addiction
C. internet addiction
D. none of the above
Answer» B. cyber addiction
114.

……………………….refers to the compulsive Internet use which interferes with daily life, work and relationships.

A. cyber addictions
B. alcohol addiction
C. drug addiction
D. none of the above
Answer» B. alcohol addiction
115.

…………….are event dependent programs.

A. logic bombs
B. trojan bombs
C. salami attacks
D. none of these
Answer» B. trojan bombs
116.

……………………..is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of the data being transmitted.

A. encryption
B. firewalls
C. antivirus program
D. none of the above
Answer» B. firewalls
117.

In ……………… the hacker gains access and control over the web site of another.

A. web jacking
B. time theft
C. logic bomb
D. none of the above
Answer» B. time theft
118.

…………….. are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.

A. virus
B. logic bomb
C. web jacking
D. none of these
Answer» B. logic bomb
119.

………………refers to sending large number of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.

A. email bombing
B. logic bomb
C. virus
D. none of the above
Answer» B. logic bomb
120.

………………… refers to unlawful acts wherein the computer is either a tool or target or both.

A. cyber crime
B. cyber ethics
C. cyber law
D. none of the above
Answer» B. cyber ethics
121.

………………refers to a code of safe and responsible behavior for the Internet Community

A. cyber ethics
B. social issues
C. cyber crime
D. none of the above
Answer» B. social issues
122.

…………………..software is a matter of Liberty not Price.

A. free
B. proprietary
C. application
D. none of these
Answer» B. proprietary
123.

…………………is the Universal character encoding standard, used for representation of text for Computer processing.

A. unicode
B. sap
C. java
D. none of the above
Answer» B. sap
124.

IT Act in India was amended in

A. 2000
B. 2004
C. 2008
D. none of these
Answer» D. none of these
125.

This kind of crime is normally common in the financial institutions or for the purpose of committing financial crimes.

A. data diddling
B. salami attacks
C. virus attack
D. none of the above
Answer» C. virus attack
126.

This refers to environmentally sustaining computing or IT.

A. cloud computing
B. green computing
C. electronic computing
D. none of the above
Answer» C. electronic computing
127.

This kind of attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed.

A. data diddling
B. salami attacks
C. virus attack
D. none of the above
Answer» B. salami attacks
128.

Who started Free Software foundation?

A. linus torvald
B. richard m stallman
C. gnu
D. none of the above
Answer» C. gnu
129.

It is based on the differences in the quality of using information technology.

A. access
B. usage
C. usage quality
D. none of these
Answer» D. none of these
130.

This refers to the gap between people who possess regular access to information technology and those who do not have this access.

A. digital divide
B. discrimination
C. computer divide
D. none of these
Answer» B. discrimination
131.

This is based on individuals who know how to use these technologies and those who do not.

A. access
B. usage
C. usage quality
D. none of the above
Answer» C. usage quality
132.

This type of digital divide is based on the difference between individuals with access and those without access.

A. access
B. usage
C. usage quality
D. none of the above
Answer» B. usage
133.

Which of the following is not harmful for your computer

A. malware
B. spyware
C. virus
D. cookies
Answer» E.
134.

Flash drives have replaced floppy disks as the preferred method of portable storage because:

A. they hold much more data than floppy disks
B. data is not magnetic so less subject to errors
C. they have quicker access time than a floppy drive
D. all of the above
Answer» E.
135.

Viruses that travel from computer to computer on their own(independent of host) are called

A. worms
B. stealth viruses
C. logic bombs
D. macro viruses
Answer» B. stealth viruses
136.

Which is a benefit of a firewall?

A. they make it harder for a hacker to locate specific computer on a network
B. they repeatedly change the ip address of the router
C. they open unused logical ports to increase throughput
D. they filter out unwanted wireless signals
Answer» B. they repeatedly change the ip address of the router
137.

Cell phones use which category of operating systems

A. single user, single task
B. multi user, multi task
C. single user, multitask
D. real-time
Answer» B. multi user, multi task
138.

When hacker use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a

A. zero-day attack
B. trojan horse attack
C. distributed denial of service attack
D. boot sector virus attack
Answer» C. distributed denial of service attack
139.

Which of the following is annoying, but really doesn’t render any harm to your computer?

A. adware
B. spyware
C. sneakware
D. malware
Answer» B. spyware
140.

……………….. is a computer language developed by Seymour Paper and his colleagues at MIT,so that children could program computers.

A. logo
B. pogo
C. gigo
D. none of the above
Answer» B. pogo
141.

When shopping online which of the following does NOT indicate that you have a secure connection displays?

A. a closed padlock icon in the status bar
B. the url begins with https
C. the word “secure” in the title bar
D. the verisign seal on the web page.
Answer» D. the verisign seal on the web page.
142.

…………………..developed a computer language called LOGO, so that children could program computers.

A. seymorpapert
B. jean piaget
C. microsoft
D. none of the above
Answer» B. jean piaget
143.

Indiancopyright act came into existence in the year

A. 1950
B. 1955
C. 1957
D. none of these
Answer» D. none of these
144.

Intellectual Property Rights does not cover the following area

A. copyright
B. patents
C. trademark
D. none of these
Answer» E.
145.

Which of the following operators cannot be applied to search?

A. or
B. not
C. and
D. bool
Answer» E.
146.

IPR stands for………………

A. intellectual property rights
B. individual property rights
C. inter person rights
D. none of these
Answer» B. individual property rights
147.

TRIPS means……………..

A. trade related aspects of intellectual property rights
B. trade related activities and information providing rights
C. round trip to europe
D. none of these
Answer» B. trade related activities and information providing rights
148.

CBT stands for:

A. computer based training
B. computer based tooling
C. computer based technology
D. none of these
Answer» B. computer based tooling
149.

The patent system in India is governed by the ………………..

A. patents act, 1970
B. patents act, 1911
C. patents act, 1972
D. none of these
Answer» B. patents act, 1911
150.

Which of the following is a processed thing?

A. data
B. information
C. database
D. none of these
Answer» C. database