McqMate
101. |
Internet advertising is cost effective because it is/can be |
A. | relatively inexpensive |
B. | personalized for a particular audience |
C. | tracked and measured |
D. | All of the above |
Answer» D. All of the above |
102. |
The form of internet marketing wherein the advertisers pay the search engine or the publisher of the ads whenever their ads are clicked is |
A. | Cost per Click |
B. | Cost per Mille |
C. | Cost per Lead |
D. | Cost per Action |
Answer» A. Cost per Click |
103. |
Internet advertising suffers from weaknesses like |
A. | low response rate |
B. | intrusiveness |
C. | Both of the above |
D. | Neither of the above |
Answer» C. Both of the above |
104. |
Mobile commerce can categorized into |
A. | Mobile shopping |
B. | Mobile banking |
C. | Mobile payments |
D. | All of the above |
Answer» D. All of the above |
105. |
Which of the following is the most common way for purchasing an online advertising? |
A. | CPM |
B. | CPC |
C. | Any of these |
D. | None of these |
Answer» C. Any of these |
106. |
Which of the following is a software that scours the internet collecting data about every website and every webpage within it? |
A. | Spiders |
B. | Search Engines |
C. | Robots |
D. | None of these |
Answer» B. Search Engines |
107. |
Search Engines databases are selected and built by computer robot programs called: |
A. | Spiders |
B. | Search Engines |
C. | Robots |
D. | None of these |
Answer» A. Spiders |
108. |
A portal that helps to establish relations and to conduct transactions between various organizations is termed as: |
A. | B2B Portal |
B. | C2C Portal |
C. | Both of these |
D. | None of these |
Answer» A. B2B Portal |
109. |
Which among the following is not an example for Search engine? |
A. | |
B. | Alta Vista |
C. | Bing |
D. | Internet Explorer |
Answer» D. Internet Explorer |
110. |
Web pages are prepared using their language as: |
A. | HTML |
B. | HTTP |
C. | FTP |
D. | All of the above |
Answer» A. HTML |
111. |
The user reaches this page when they specify the address of a website: |
A. | Summery Page |
B. | Web Page |
C. | Home Page |
D. | Page List |
Answer» C. Home Page |
112. |
Which of the following is a correct syntax of HTML? |
A. | <!doctype HTML> |
B. | <doctype! HTML> |
C. | <HTML !doctype> |
D. | <HTML doctype!> |
Answer» A. <!doctype HTML> |
113. |
Software which allows user to view the webpage is called as __________. |
A. | Interpreter |
B. | Internet browser |
C. | Website |
D. | Operating system |
Answer» B. Internet browser |
114. |
Which of the following website is used to search other website by typing a keyword ? |
A. | Social Networks |
B. | Search Engine |
C. | Routers |
D. | None of these |
Answer» B. Search Engine |
115. |
Which of the following is valid Website Address ? |
A. | ww#.helenlowry.com |
B. | www.helenlowry.com |
C. | helenlowry@.com |
D. | www.helenlowry |
Answer» B. www.helenlowry.com |
116. |
Whenever user opens any website then main page is called as ____. |
A. | Backend page |
B. | Home page |
C. | Dead page |
D. | None of these |
Answer» B. Home page |
117. |
_________site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business |
A. | Dynamic website |
B. | Static Website |
C. | phish site |
D. | none of these |
Answer» C. phish site |
118. |
HTML stands for? |
A. | Hyper Text Markup Language |
B. | High Text Markup Language |
C. | Hyper Tabular Markup Language |
D. | None of these |
Answer» A. Hyper Text Markup Language |
119. |
HTML is a subset of |
A. | SGMT |
B. | SGML |
C. | SGMD |
D. | None of these |
Answer» A. SGMT |
120. |
A financial exchange that takes place online or offline (electronically using some electronic gadget) between buyers and sellers |
A. | Online broker |
B. | E-payment. |
C. | Traditional Market |
D. | Commerce |
Answer» B. E-payment. |
121. |
E-cash was created by |
A. | David Chaum. |
B. | Mark Zuckerberg |
C. | Jack Maa |
D. | Benjamin Young |
Answer» A. David Chaum. |
122. |
A plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments etc |
A. | Debit card |
B. | Smart Card. |
C. | E-cheque |
D. | E-Wallet |
Answer» B. Smart Card. |
123. |
The first universal credit card, which could be used at a variety of establishments, was introduced by |
A. | VISA |
B. | American Express |
C. | Diners’ Club. |
D. | SBI |
Answer» C. Diners’ Club. |
124. |
Example of Digital wallet |
A. | Paytm |
B. | Mobikwik |
C. | Ali Pay |
D. | All of the above. |
Answer» D. All of the above. |
125. |
A type of fraud that involves diverting the client Internet connection to a counterfeit website. |
A. | Phishing |
B. | Pharming. |
C. | Ddos |
D. | Virus |
Answer» B. Pharming. |
126. |
_________identifies a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computer |
A. | Physiological biometric authentication |
B. | Advance biometric authentication |
C. | Behavioral biometric authentication. |
D. | None of the above |
Answer» C. Behavioral biometric authentication. |
127. |
The grace period of a credit card normally runs from |
A. | The end of a billing cycle to the next starting date |
B. | The end of a previous due till next starting date. |
C. | The starting of a billing cycle to the next payment due date |
D. | The end of a billing cycle to the next payment due date. |
Answer» D. The end of a billing cycle to the next payment due date. |
128. |
…………………..is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet. |
A. | E-cash |
B. | Digicash |
C. | Cyber cash |
D. | any of these |
Answer» D. any of these |
129. |
………………….is a financial instrument which can be used more than once to borrow money or buy products and services on credit. |
A. | Credit card |
B. | E-Cheques |
C. | E-cash |
D. | none of these |
Answer» A. Credit card |
130. |
A……………………..is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone. |
A. | smart Cards |
B. | E-Cheques |
C. | E-cash |
D. | none of these |
Answer» A. smart Cards |
131. |
………………..is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account |
A. | Debit Card |
B. | Electronic purse |
C. | credit card |
D. | any of these |
Answer» A. Debit Card |
132. |
………………type of payment system is highly useful to those customers who would like to control overspending, |
A. | Postpaid |
B. | Prepaid |
C. | both of these |
D. | none of these |
Answer» B. Prepaid |
133. |
.……………..is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation. |
A. | Debit Card |
B. | credit card |
C. | Electronic purse |
D. | any of these |
Answer» C. Electronic purse |
134. |
……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer |
A. | customer |
B. | issuer |
C. | Merchant |
D. | Acquirer |
Answer» A. customer |
135. |
In Biometrics, …………………………ID system is designed to prevent more than one person from using a single identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» A. Positive ID system |
136. |
In Online Payment System one can transfer money through |
A. | Post |
B. | Bank |
C. | Internet |
D. | Money transfer company |
Answer» C. Internet |
137. |
One advantage of online payment system is |
A. | Overseas purchase |
B. | Privacy |
C. | Security |
D. | Service fee |
Answer» A. Overseas purchase |
138. |
Which one of them is not an online payment method? |
A. | Mobile Payment |
B. | Demand Draft |
C. | Internet Payment |
D. | Credit Card |
Answer» B. Demand Draft |
139. |
When goods are purchased without debiting money from your account what type of purchase method are you using? |
A. | Debit card Purchase |
B. | Cheque purchase |
C. | Credit card Purchase |
D. | Bank transfer purchase |
Answer» C. Credit card Purchase |
140. |
When money is debited from your account when purchasing goods, you are using |
A. | Debit Card Purchase |
B. | Credit card Purchase |
C. | Cash Purchase |
D. | Credit Promissory note purchase |
Answer» A. Debit Card Purchase |
141. |
Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called |
A. | Interception |
B. | Hacking |
C. | Snooping |
D. | Man-In-The-Middle |
Answer» D. Man-In-The-Middle |
142. |
Encryption means |
A. | Block contents |
B. | Filter contents |
C. | Password protection |
D. | Censorship |
Answer» C. Password protection |
143. |
Finger print recognition is a type of |
A. | Behavioural Biometric |
B. | Physiological Biometric |
C. | Encrypted Protection |
D. | Program Protected |
Answer» B. Physiological Biometric |
144. |
Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation? |
A. | Debit Card |
B. | Credit Card |
C. | Electronic Wallet / Electronic Purse |
D. | Any of these |
Answer» C. Electronic Wallet / Electronic Purse |
145. |
Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine? |
A. | SSl |
B. | SET |
C. | Both of these |
D. | None of these |
Answer» B. SET |
146. |
Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic? |
A. | Biometrics |
B. | PIN |
C. | Password |
D. | All of the above |
Answer» A. Biometrics |
147. |
Which among the following is not an example for computer virus? |
A. | I Love You |
B. | Jerusalem |
C. | Melissa |
D. | Network Firewall |
Answer» D. Network Firewall |
148. |
Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure? |
A. | Black Hat Hacker |
B. | Spoofer |
C. | Operator |
D. | White Hat Hacker |
Answer» A. Black Hat Hacker |
149. |
SET means: |
A. | Standard Electronic Transfer |
B. | Standard Electronic Technology |
C. | Secure Electronic Transfer |
D. | Secure Electronic Transaction |
Answer» D. Secure Electronic Transaction |
150. |
The verification of credit card is done by using: |
A. | Credit Card Payment |
B. | Point of Sale |
C. | All of the above |
D. | None of these |
Answer» C. All of the above |
151. |
The reverse process of encryption, to make the information readable once again is: |
A. | Sniffing |
B. | Decryption |
C. | Cryptography |
D. | Translation153. |
Answer» B. Decryption |
152. |
An Electronic Check is one form of what? |
A. | Ecommerce |
B. | Online Banking |
C. | E-cash |
D. | Check |
Answer» B. Online Banking |
153. |
A combination of software and information designed to provide security and information for payment is called? |
A. | Digital wallet |
B. | Pop up ads |
C. | Shoppng cart |
D. | Encryption |
Answer» A. Digital wallet |
154. |
A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications |
A. | Digital signature |
B. | Digital certificates |
C. | SSL |
D. | none of these |
Answer» B. Digital certificates |
155. |
……………………….is a person who breaks in or trespasses a computer system |
A. | Hacker |
B. | Snooper |
C. | operator |
D. | spoofer |
Answer» A. Hacker |
156. |
E-mail which contain useless material is termed as…………… |
A. | Spam |
B. | useless mail |
C. | trunk mail |
D. | Junk mail |
Answer» A. Spam |
157. |
What is Biometrics ? |
A. | It is a branch of biology |
B. | It recognizes individuals based on their inherent physical or behavioral characteristics. |
C. | a)&b). |
D. | None of these |
Answer» B. It recognizes individuals based on their inherent physical or behavioral characteristics. |
158. |
SET means ……………… |
A. | Standard Electronic Technology |
B. | Standard Electronic Transfer |
C. | Secure Electronic Transaction |
D. | None of these |
Answer» B. Standard Electronic Transfer |
159. |
Patents protects |
A. | Expression of an idea |
B. | Inventions. |
C. | Books and Articles |
D. | Company Logo |
Answer» B. Inventions. |
160. |
The minimum punishment for an infringement of copyright in India is |
A. | 3 months imprisonment and minimum of Rs 50,000 fine |
B. | 3 months imprisonment and minimum of Rs 60,000 fine |
C. | 6 months imprisonment and minimum of Rs 50,000 fine. |
D. | 6 months imprisonment and minimum of Rs 30,000 fine |
Answer» C. 6 months imprisonment and minimum of Rs 50,000 fine. |
161. |
A________ is a right, granted by the government, to exclude others from making, using, or selling your invention |
A. | Copyright |
B. | Patents. |
C. | Trademark |
D. | Trade Secret |
Answer» B. Patents. |
162. |
TheTerm of every patent in India is |
A. | 50 years |
B. | 40 years |
C. | 30 years |
D. | 20 years. |
Answer» D. 20 years. |
163. |
The Trademarks Act 1999 protects well-known trademarks from: |
A. | an action against the registration of similar marks. |
B. | an action against the misuse of someones identity |
C. | an action against copying someones lyrics |
D. | All of the above |
Answer» A. an action against the registration of similar marks. |
164. |
The penalties for infringement of Trademarked content in India |
A. | Minimum 3 months imprisonment and fine of INR 20,0000 |
B. | Minimum 4 months imprisonment and fine of INR 30,0000 |
C. | Minimum 5 months imprisonment and fine of INR 40,0000 |
D. | Minimum 6 months imprisonment and fine of INR 50,0000. |
Answer» D. Minimum 6 months imprisonment and fine of INR 50,0000. |
165. |
When did IT Act 2000 came into effect |
A. | October 17, 2000. |
B. | October 17, 2001 |
C. | November 11, 2000 |
D. | November 11, 2001 |
Answer» A. October 17, 2000. |
166. |
How many schedules are there in IT Act 2000 |
A. | 3 |
B. | 4. |
C. | 5 |
D. | 6 |
Answer» B. 4. |
167. |
Trade mark, copyright, patent law etc comes under the purview of…………………… |
A. | Data protection |
B. | Telecommunication laws |
C. | Intellectual property laws |
D. | None |
Answer» C. Intellectual property laws |
168. |
Which of the following is an example of Intellectual property ? |
A. | Patent |
B. | Trade Marks |
C. | Copyright |
D. | All of above |
Answer» D. All of above |
169. |
Copyright protection is available for |
A. | Literary work |
B. | Musical work |
C. | Artistic work |
D. | All the above |
Answer» D. All the above |
170. |
Plan of a building can be protected by |
A. | Copyright |
B. | Patent |
C. | Trade secret |
D. | Industrial Design |
Answer» A. Copyright |
171. |
Copyright protects |
A. | Idea |
B. | Expression |
C. | Both a) and b) |
D. | None of the above |
Answer» B. Expression |
172. |
Patent of addition can be filed by |
A. | Inventor |
B. | Patentee |
C. | Both a) and b) |
D. | None of the above |
Answer» C. Both a) and b) |
173. |
What is the updated version of the IT Act, 2000? |
A. | IT Act, 2007 |
B. | Advanced IT Act, 2007 |
C. | IT Act, 2008 |
D. | Advanced IT Act, 2008 |
Answer» C. IT Act, 2008 |
174. |
_______ is a recognizable insignia, phrase, word, or symbol that denotes a specific product and legally differentiates it from all other products of its kind. |
A. | Censorship |
B. | Patent |
C. | Trademark |
D. | Copyright |
Answer» C. Trademark |
175. |
An unauthorised entry into other people’s electronic device is called |
A. | Spamming |
B. | Hacking |
C. | Copyrighting |
D. | Breaching |
Answer» B. Hacking |
176. |
Gaining control of client computer through network is called |
A. | Snooping |
B. | Sniffing |
C. | Buffing |
D. | Dialling |
Answer» A. Snooping |
177. |
A copyright owner can give authority to anyone to |
A. | Duplicate intellectual property |
B. | Process intellectual property |
C. | Copy intellectual property |
D. | Sell intellectual property |
Answer» C. Copy intellectual property |
178. |
Patent right gives the sole authority to produce for |
A. | Consumers |
B. | Investors |
C. | Industry |
D. | Inventors |
Answer» D. Inventors |
179. |
Trademark uniquely differentiate products from other |
A. | Inventors |
B. | Products |
C. | Investors |
D. | Pioneers |
Answer» B. Products |
180. |
Which one of this is not used for trademarking products |
A. | Logo |
B. | Words |
C. | Feature |
D. | Symbol |
Answer» C. Feature |
181. |
When some words, pictures or videos is banned from public notice it is called |
A. | Spamming |
B. | Censorship |
C. | Authentication |
D. | Hiding |
Answer» B. Censorship |
182. |
When unwanted or unexpected email or messages is sent to an electronic device it is known as |
A. | Bulk message |
B. | Phishing |
C. | Advertising |
D. | Spamming |
Answer» D. Spamming |
183. |
The information Technology Act [IT ACT] came into effect on: |
A. | 16th November 2000 |
B. | 15th December 2000 |
C. | 17th October 2000 |
D. | 14th November 2000 |
Answer» C. 17th October 2000 |
184. |
A person who breaks in or trespasses a computer system: |
A. | Hacker |
B. | Snooper |
C. | Operator |
D. | Spoofer |
Answer» A. Hacker |
185. |
E-mail which contain useless material is termed as: |
A. | Spam Mail |
B. | Trunk Mail |
C. | Junk Mail |
D. | Inbox Mail |
Answer» C. Junk Mail |
186. |
Which of the following crimes were not covered under IT (Amendment) Act, 2008? |
A. | Cyber Terrorism |
B. | Child Pornography |
C. | Video voyeurism |
D. | None of these |
Answer» D. None of these |
187. |
Trade mark, copyright, patent law, etc. comes under the purview of: |
A. | Data Protection |
B. | Telecommunication Laws |
C. | Intellectual Property Laws |
D. | All of the above |
Answer» C. Intellectual Property Laws |
188. |
Which one of the following is not a principle of e-commerce? |
A. | Privacy |
B. | Integrity |
C. | Authentication |
D. | None of these |
Answer» D. None of these |
189. |
Which of the following is a program designed to replicate and spread generally with the victim being oblivious to its existence? |
A. | Hacker |
B. | Software |
C. | Computer Virus |
D. | Computer Anti-virus |
Answer» C. Computer Virus |
190. |
An electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications is/are: |
A. | Digital Signature |
B. | Digital Certificates |
C. | SSL |
D. | None of these |
Answer» B. Digital Certificates |
191. |
India has enacted the first IT Act in the year…… |
A. | 2001 |
B. | 2002 |
C. | 2009 |
D. | 2000 |
Answer» D. 2000 |
192. |
Trade mark, copyright, patent law etc comes under the purview of……… |
A. | Data protection |
B. | Telecommunication laws |
C. | Intellectual property laws |
D. | None |
Answer» C. Intellectual property laws |
193. |
All of the following are examples of real security and privacy risks EXCEPT: |
A. | hackers. |
B. | spam. |
C. | viruses. |
D. | identity theft |
Answer» B. spam. |
194. |
Digital Cash has following characteristic |
A. | Anonymity |
B. | Security |
C. | Confidentiality |
D. | All of Above |
Answer» D. All of Above |
195. |
Who breaks into other people’s computer system and steals and destroys information: |
A. | Hackers |
B. | Software |
C. | Hacktivists |
D. | Script Kiddies |
Answer» A. Hackers |
196. |
Which process is used to re install data from a copy when the original data has been lost |
A. | Backup |
B. | Recovery |
C. | Bench marking |
D. | Data cleansing |
Answer» B. Recovery |
197. |
Which service encompasses all technologies used to transmit and process information on an across a network? |
A. | Interoperability |
B. | Scalability |
C. | Benchmarking |
D. | Web services |
Answer» D. Web services |
198. |
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed? |
A. | hacking |
B. | cracking |
C. | dumpster diving |
D. | spoofing |
Answer» D. spoofing |
Done Reading?