MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor Multimedia Communication (BMMC) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
.is a prototype portal site for biological information and bio-resource information. |
| A. | brnet |
| B. | inflibnet |
| C. | nicenet |
| D. | none of these |
| Answer» B. inflibnet | |
| 2. |
is a communication technology that allows users to exchange multimedia communication between capable mobile phones and other devices. |
| A. | bluetooth |
| B. | blue eyes |
| C. | blue devices |
| D. | none of these |
| Answer» B. blue eyes | |
| 3. |
.. are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. |
| A. | virus |
| B. | logic bomb |
| C. | web jacking |
| D. | none of these |
| Answer» B. logic bomb | |
| 4. |
provides physicians and nurses with real-time diagnostic and treatment recommendations. |
| A. | cdss |
| B. | cpoe |
| C. | e h r |
| D. | pacs |
| Answer» B. cpoe | |
| 5. |
.. is a computer based tool for mapping and analyzing things that exist and events that happen on earth. |
| A. | gis |
| B. | gps |
| C. | bis |
| D. | none of the above |
| Answer» B. gps | |
| 6. |
integrates communications, data management, and security services toallow business applications within different organizations to automatically interchangeinformation. |
| A. | e-commerce |
| B. | e-governance |
| C. | e-banking |
| D. | none of the above |
| Answer» B. e-governance | |
| 7. |
designed Remington Rand became one of the first commercially available computers. |
| A. | univac-i |
| B. | enicac |
| C. | mark i |
| D. | none of the above |
| Answer» B. enicac | |
| 8. |
Any two computers connected through a telephone line should be connected with a .on both sides. |
| A. | printer |
| B. | scanner |
| C. | hard disk |
| D. | modem |
| Answer» E. | |
| 9. |
A uses pictures(icons) and menus displayed on the screen to send commands to the computer system. |
| A. | command-based user interface |
| B. | gui |
| C. | system utility |
| D. | none of these |
| Answer» C. system utility | |
| 10. |
is a situation where an individual is given too much information and as a result he is confused and cannot make optimal decisions. |
| A. | information overload |
| B. | cyber addiction |
| C. | internet addiction |
| D. | none of the above |
| Answer» B. cyber addiction | |
| 11. |
refers to sending large number of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. |
| A. | email bombing |
| B. | logic bomb |
| C. | virus |
| D. | none of the above |
| Answer» B. logic bomb | |
| 12. |
..is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of the data being transmitted. |
| A. | encryption |
| B. | firewalls |
| C. | antivirus program |
| D. | none of the above |
| Answer» B. firewalls | |
| 13. |
is the Universal character encoding standard, used for representation of text for Computer processing. |
| A. | unicode |
| B. | sap |
| C. | java |
| D. | none of the above |
| Answer» B. sap | |
| 14. |
--------------cards are an integrated circuit that generates an audio signal and sends it to a computer s speakers: |
| A. | video card |
| B. | sound cards |
| C. | web cam |
| D. | none of these |
| Answer» C. web cam | |
| 15. |
.. is a computer language developed by Seymour Paper and his colleagues at MIT,so that children could program computers. |
| A. | logo |
| B. | pogo |
| C. | gigo |
| D. | none of the above |
| Answer» B. pogo | |
| 16. |
.can be defined as electronic equipments or products which have becomeobsolete due to advancement in technology, changes in fashion, style and status andnearing the end of their useful life. |
| A. | e-waste |
| B. | toxic waste |
| C. | computer waste |
| D. | none of the above. |
| Answer» B. toxic waste | |
| 17. |
When hacker use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user s computer, this is called a |
| A. | zero-day attack |
| B. | trojan horse attack |
| C. | distributed denial of service attack |
| D. | boot sector virus attack |
| Answer» C. distributed denial of service attack | |
| 18. |
is a popular desktop and server distribution derived from Debian, maintained by Canonical Ltd. |
| A. | debian |
| B. | ubuntu |
| C. | fedora |
| D. | none of the above |
| Answer» C. fedora | |
| 19. |
..developed a computer language called LOGO, so that children could program computers. |
| A. | seymorpapert |
| B. | jean piaget |
| C. | microsoft |
| D. | none of the above |
| Answer» B. jean piaget | |
| 20. |
.refers to the compulsive Internet use which interferes with daily life, work and relationships. |
| A. | cyber addictions |
| B. | alcohol addiction |
| C. | drug addiction |
| D. | none of the above |
| Answer» B. alcohol addiction | |
| 21. |
.is one of many web-based learning management systems(LMS) throughwhich teachers can work with students, whether in distance mode or as a supplement toface-to-face teaching. |
| A. | nicenet |
| B. | inflibnet |
| C. | brnet |
| D. | none of these |
| Answer» B. inflibnet | |