

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration (BBA) , Bachelor of Science in Computer Science (BSc CS) , Bachelor of Commerce (B Com) .
451. |
Which factor ensures the IT systems are functioning correctly and providing accurate information? |
A. | Availability |
B. | Accessibility |
C. | Reliability |
D. | Scalability |
Answer» C. Reliability |
452. |
Which factor represents how well your system can adapt to increased demands? |
A. | Availability |
B. | Accessibility |
C. | Reliability |
D. | Scalability |
Answer» D. Scalability |
453. |
Which factor represents a systems ability to change quickly? |
A. | Flexibility |
B. | Performance |
C. | Capacity planning |
D. | Benchmark |
Answer» A. Flexibility |
454. |
What is a set of conditions used to measure how well a product or system functions? |
A. | Flexibility |
B. | Performance |
C. | Capacity planning |
D. | Benchmark |
Answer» D. Benchmark |
455. |
What determines the future IT infrastructure requirements for new equipment and additional network capacity? |
A. | Flexibility |
B. | Performance |
C. | Capacity planning |
D. | Benchmark |
Answer» C. Capacity planning |
456. |
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? |
A. | Workflow |
B. | EIP |
C. | Workflow system |
D. | SLA |
Answer» A. Workflow |
457. |
Which will not harm computer resources? |
A. | firewall |
B. | Virus |
C. | Trojan horse |
D. | None of the above |
Answer» A. firewall |
458. |
Which of the following is the primary characteristic of an intranet? |
A. | People outside the organisation can access it |
B. | People inside the organisation cant access it |
C. | People outside the organisation cant access it |
D. | None of the above |
Answer» C. People outside the organisation cant access it |
459. |
Which concept suggests that different applications and computer systems should be able to communicate with one another? |
A. | Integration |
B. | Web services |
C. | Scalability |
D. | Interoperability |
Answer» D. Interoperability |
460. |
Which service encompasses all technologies used to transmit and process information on an across a network? |
A. | Interoperability |
B. | Scalability |
C. | Benchmarking |
D. | Web services |
Answer» D. Web services |
461. |
Which process can prevent data from losing due to computer problems or human errors? |
A. | backup |
B. | recovery |
C. | benchmarking |
D. | data cleansing |
Answer» A. backup |
462. |
Which process is used to reinstall data from a copy when the original data has been lost? |
A. | backup |
B. | recovery |
C. | benchmarking |
D. | data cleansing |
Answer» B. recovery |
463. |
Who breaks into other peoples computer systems and steals and destroys information? |
A. | Hackers |
B. | softwares |
C. | Hacktivists |
D. | Script kiddies |
Answer» A. Hackers |
464. |
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about? |
A. | Web log |
B. | Clickstream |
C. | Anonymous Web browsing service |
D. | None of the above |
Answer» D. None of the above |
465. |
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic? |
A. | Computer virus |
B. | Worm |
C. | Denial-of-service attack |
D. | None of the above |
Answer» B. Worm |
466. |
What floods a Web site with so many requests for service that it slows down or crashes? |
A. | Computer virus |
B. | Worm |
C. | Denial-of-service attack |
D. | None of the above |
Answer» C. Denial-of-service attack |
467. |
What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets? |
A. | Risk management |
B. | Risk assessment |
C. | Security |
D. | None of the above |
Answer» A. Risk management |
468. |
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as: |
A. | Business to Business (B2B). |
B. | Consumer to Business (C2B). |
C. | Business to Consumer (B2C). |
D. | Consumer to Consumer (C2C). |
Answer» B. Consumer to Business (C2B). |
469. |
By electronic commerce we mean: |
A. | Commerce of electronic goods |
B. | Commerce which depends on electronics |
C. | Commerce which is based on the use of internet |
D. | None of the above |
Answer» D. None of the above |
470. |
E-commerce is |
A. | B2C |
B. | B2B |
C. | C2B |
D. | All the above |
Answer» A. B2C |
471. |
Advantages of e-commerce are |
A. | Low cost |
B. | Economical |
C. | Productivity gains |
D. | All the above |
Answer» D. All the above |
472. |
B2B2C is a model of |
A. | E-commerce |
B. | E-business |
C. | Data mining |
D. | None of the above |
Answer» C. Data mining |
473. |
Mobile commerce is same as |
A. | E-commerce |
B. | E-business |
C. | Data mining |
D. | None of the above |
Answer» B. E-business |
474. |
The types of Business to Business e-commerce are ................ |
A. | Direct selling and support to Business |
B. | Industry portals |
C. | Information sites about a industry |
D. | All the above |
Answer» D. All the above |
475. |
Which of the following is not the example of business to consumer (B to C) e-commerce? |
A. | Amazon.com |
B. | e-bay.com |
C. | dell.com |
D. | lastminute.com |
Answer» B. e-bay.com |
476. |
Which driver promote E-commerce |
A. | Digital Convergence |
B. | 24/7 availability |
C. | Profit margins |
D. | None of the above |
Answer» A. Digital Convergence |
477. |
Advantage of e-com is |
A. | Lower cost |
B. | Economy |
C. | Higher margins |
D. | All of the above |
Answer» A. Lower cost |
478. |
Which model of e commerce deals with virtual auction? |
A. | Aggregator Model |
B. | Info-mediary model |
C. | Community Model |
D. | Brokerage Model |
Answer» D. Brokerage Model |
479. |
When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts? |
A. | E-commerce is broadly equivalent to e-business |
B. | E-commerce has some overlap with e-business |
C. | E-commerce is a subset of e-business |
D. | E-business is a subset of e-commerce |
Answer» C. E-commerce is a subset of e-business |
480. |
Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category? |
A. | Portal, publisher or media sites |
B. | Brand-building sites |
C. | Transactional e-commerce sites |
D. | Services-orientated relationship-building websites |
Answer» A. Portal, publisher or media sites |
481. |
A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as: |
A. | Value chain and marketplace positioning |
B. | Value proposition |
C. | Online business model |
D. | Revenue model and cost base |
Answer» C. Online business model |
482. |
While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds? |
A. | Directory |
B. | Publisher site |
C. | Blog |
D. | Access portal |
Answer» C. Blog |
483. |
What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome examples of? |
A. | Web servers |
B. | Web browsers |
C. | Web application servers |
D. | All of the above |
Answer» B. Web browsers |
484. |
A hardened firewall host on an Intranet is |
A. | a software which runs in any of the computers in the intranet |
B. | a software which runs on a special reserved computer on the intranet |
C. | a stripped-down computer connected to the intranet |
D. | a mainframe connected to the intranet to ensure security |
Answer» B. a software which runs on a special reserved computer on the intranet |
485. |
Advantages of B2C commerce are
|
A. | i and ii |
B. | ii and iii |
C. | i and iii |
D. | iii and iv |
Answer» C. i and iii |
486. |
Disadvantages of e-Commerce in India are
|
A. | i and ii |
B. | ii and iii |
C. | i, ii, iii |
D. | i, ii, iii, iv |
Answer» C. i, ii, iii |
487. |
Most common uses of the Internet and the Web include communicating, shopping, |
A. | searching, entertainment, and education |
B. | e-commerce, e-mail, and searching |
C. | e-mail, entertainment, and education |
D. | e -commerce, e-mail, and education |
Answer» A. searching, entertainment, and education |
488. |
The __________ is the multimedia interface to resources available on the Internet. |
A. | Web |
B. | ISP |
C. | browser |
D. | URL |
Answer» A. Web |
489. |
The multimedia interface to the resources available on the Net is called the |
A. | World Wide Web |
B. | Internet |
C. | GUI interface |
D. | Server |
Answer» A. World Wide Web |
490. |
Rules for exchanging data between computers are called |
A. | programs |
B. | procedures |
C. | protocols |
D. | hyperlinks |
Answer» C. protocols |
491. |
Moving from one Web site to another is called |
A. | jumping |
B. | moving |
C. | surfing |
D. | applying |
Answer» C. surfing |
492. |
____________ are networks that connect people within a company to each other and to the company network. |
A. | Internets |
B. | Intranets |
C. | Extranets |
D. | Components |
Answer» B. Intranets |
493. |
E-money is a ……………. medium for making payments |
A. | Digital |
B. | Electronic |
C. | Both (a) and (b) |
D. | None of the above |
Answer» A. Digital |
494. |
Acid testis a set of properties of money transfer that include |
A. | Atomicity and isolation |
B. | Consistency and durability |
C. | Both (a) and (b) |
D. | None of the above |
Answer» C. Both (a) and (b) |
495. |
In…………………., each transaction must be independent |
A. | Consistency |
B. | Isolation |
C. | Durability |
D. | None of the above |
Answer» B. Isolation |
496. |
In ICES test, C means |
A. | Consistency |
B. | Complexity |
C. | Conservation |
D. | None of the above |
Answer» A. Consistency |
497. |
Electronic payment is a financial transaction made …………. the use of paper documents |
A. | With |
B. | Without |
C. | Both (a) and (b) |
D. | None of the above |
Answer» B. Without |
498. |
Electronic payment media can be grouped into |
A. | Trusted third party type |
B. | Notational fund transfers related type |
C. | Authentication type |
D. | All the above |
Answer» D. All the above |
499. |
………………is a type of EPS |
A. | Credit card |
B. | Debit card |
C. | Smart card |
D. | All the above |
Answer» D. All the above |
500. |
Smart card is same as……. |
A. | Credit card |
B. | Debit card |
C. | Both (a) and (b) |
D. | None of the above |
Answer» C. Both (a) and (b) |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.