

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration (BBA) , Bachelor of Science in Computer Science (BSc CS) , Bachelor of Commerce (B Com) .
151. |
E-mail which contains useless material is termed as…………… |
A. | spam |
B. | useless mail |
C. | trunk mail |
D. | junk mail |
Answer» D. junk mail |
152. |
India has enacted the first IT Act in the year…………………… |
A. | 2001 |
B. | 2002 |
C. | 2009 |
D. | 2000 |
Answer» D. 2000 |
153. |
Which of the following crimes were not covered under IT (Amendment) Act, 2008 ? |
A. | cyber terrorism |
B. | child pornography |
C. | video voyeurism |
D. | none of these |
Answer» D. none of these |
154. |
Trade mark, copyright, patent law etc comes under the purview of…………………… |
A. | data protection |
B. | telecommunication laws |
C. | intellectual property laws |
D. | none |
Answer» C. intellectual property laws |
155. |
Which one of the following is not a principle of e-commerce ? |
A. | privacy |
B. | integrity |
C. | authentication |
D. | none of these |
Answer» D. none of these |
156. |
………………is basically a secure gate between our organization data and internet. |
A. | network firewall |
B. | antivirus |
C. | both of these |
D. | none of these |
Answer» A. network firewall |
157. |
………………is automated methods of recognizing a person based on a physiological or behavioral characteristic. |
A. | biometrics |
B. | pin |
C. | both of these |
D. | none of these |
Answer» A. biometrics |
158. |
……………….is a financial institution that establishes an account with a merchant and processes payment card authorization and payments. |
A. | customer |
B. | issuer |
C. | merchant |
D. | acquirer |
Answer» D. acquirer |
159. |
In …………………..type of payment system customer is allowed to spend only up to the amount that have pre deposited into account. |
A. | prepaid |
B. | post paid |
C. | both of these |
D. | none of these |
Answer» A. prepaid |
160. |
.……………….is the exchange of goods or items or commodities and services or applications used for money and deals the money matters |
A. | e-commerce |
B. | commerce |
C. | both of these |
D. | none |
Answer» B. commerce |
161. |
……………….always operate on intranet |
A. | e--commerce |
B. | e-business |
C. | edi |
D. | none of these |
Answer» B. e-business |
162. |
Which among the following is not an example for E-commerce |
A. | amazon.com |
B. | baazar.com |
C. | e-trade.com |
D. | none of these |
Answer» C. e-trade.com |
163. |
………………were the first to establish prominent E-commerce Brands |
A. | baazar.com |
B. | e-bay and amazon |
C. | e-trade.com |
D. | none of these |
Answer» B. e-bay and amazon |
164. |
…………….is a form of supply chain where a series of assembly operations are carried out to obtain the final product |
A. | converging supply chain |
B. | diverging supply chain |
C. | any of these |
D. | none |
Answer» A. converging supply chain |
165. |
.…………………is a form of supply chain where a wide variety of finished goods are produced with limited number of raw material or components. |
A. | converging structure |
B. | diverging structure |
C. | any of these |
D. | none |
Answer» B. diverging structure |
166. |
……………………is the exchange of services, information or product from one business to a government agency |
A. | b2g |
B. | b2e |
C. | b2b |
D. | p2p |
Answer» A. b2g |
167. |
………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files |
A. | b2c |
B. | b2e |
C. | b2b |
D. | p2p |
Answer» D. p2p |
168. |
”Google” is one of the most popular……………….. |
A. | portal |
B. | browser |
C. | search engine |
D. | none of these |
Answer» C. search engine |
169. |
A ………………….. Presents information from diverse sources in a unified way in a web site. |
A. | web portal |
B. | link page |
C. | both of these |
D. | none of these |
Answer» C. both of these |
170. |
……………………….is a person who breaks in or trespasses a computer system |
A. | hacker |
B. | snooper |
C. | operator |
D. | spoofer |
Answer» A. hacker |
171. |
Peer to Peer [P2P] is also used to describe ……………………… |
A. | c2c |
B. | b2e |
C. | b2b |
D. | b2c |
Answer» A. c2c |
172. |
……………..allows the person to type ion just the main word or words and the site will come in |
A. | web page |
B. | home page |
C. | domain |
D. | none of these |
Answer» C. domain |
173. |
A ………………….. presents information from diverse sources in a unified way in a web site |
A. | web portal |
B. | link page |
C. | both of these |
D. | none of these |
Answer» C. both of these |
174. |
In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity |
A. | positive id system |
B. | negative id system |
C. | both of these |
D. | none of these |
Answer» B. negative id system |
175. |
…………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it. |
A. | network firewall |
B. | computer virus |
C. | both of these |
D. | none of these |
Answer» B. computer virus |
176. |
he dimension of e-commerce that enables commerce across national boundaries is called ______________. |
A. | interactivity |
B. | global reach |
C. | richness |
D. | ubiquity |
Answer» B. global reach |
177. |
The primary source of financing during the early years of e-commerce was ______________. |
A. | bank loans |
B. | large retail firms |
C. | venture capital funds |
D. | initial public offerings |
Answer» C. venture capital funds |
178. |
The source of revenue in a subscription revenue model is ______________. |
A. | fees from advertisers in exchange for advertisements |
B. | fees for business referrals |
C. | fees from subscribers in exchange for access to content or services |
D. | fees for enabling or execution a transaction |
Answer» C. fees from subscribers in exchange for access to content or services |
179. |
Industry structure is defined as ______________. |
A. | the nature of the players in an industry and their relative bargaining power |
B. | a set of plans for achieving long term returns on the capital invested in a business firm |
C. | set of planned activities designed to result in a profit in a marketplace |
D. | how a company\s product or service fulfills the needs of customers |
Answer» A. the nature of the players in an industry and their relative bargaining power |
180. |
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ______________. |
A. | tcp |
B. | ip |
C. | the network layer |
D. | the application layer |
Answer» B. ip |
181. |
Which of the following is not a limitation of the current Internet? |
A. | insufficient capacity throughout the backbone |
B. | network architecture limitations |
C. | insufficient reach |
D. | best-efforts qos |
Answer» C. insufficient reach |
182. |
Internet users account for about ______________ of the world's population. |
A. | 7% |
B. | 17% |
C. | 27% |
D. | 47% |
Answer» B. 17% |
183. |
The most common type of Internet crime according to the IC3 is ______________. |
A. | credit card fraud |
B. | check fraud |
C. | non-delivery |
D. | auction fraud |
Answer» D. auction fraud |
184. |
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________. |
A. | phishing |
B. | pharming |
C. | a denial of service (dos) attack |
D. | spoofing |
Answer» C. a denial of service (dos) attack |
185. |
______________ influence the behavior of others through their personality, skills, or other factors. |
A. | opinion leaders |
B. | direct reference groups |
C. | indirect reference groups |
D. | lifestyle groups |
Answer» A. opinion leaders |
186. |
A(n) ______________ represents data as two-dimensional tables with records organized in rows and attributes in columns. |
A. | database management system |
B. | data warehouse |
C. | sql query |
D. | relational database |
Answer» D. relational database |
187. |
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________. |
A. | versioning |
B. | bundling. |
C. | transactive content |
D. | price discrimination |
Answer» A. versioning |
188. |
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year? |
A. | loyalty |
B. | reach |
C. | recency |
D. | unique visitors |
Answer» A. loyalty |
189. |
Which of the following statements about privacy is true? |
A. | it is a moral right to be left alone |
B. | only corporations and government need to be concerned about it |
C. | it has only just recently become a concern |
D. | it is most easily obtained on the internet |
Answer» A. it is a moral right to be left alone |
190. |
The redirection of traffic from a legitimate site to an infringing site is called ______________. |
A. | cybersquatting |
B. | cyber piracy |
C. | met tagging |
D. | key wording |
Answer» B. cyber piracy |
191. |
A security plan begins with a(n) is ______________. |
A. | security policy |
B. | risk assessment |
C. | implementation plan |
D. | security organization |
Answer» B. risk assessment |
192. |
______________ influence the behavior of others through their personality, skills, or other factors. |
A. | opinion leaders |
B. | direct reference groups |
C. | indirect reference groups |
D. | lifestyle groups |
Answer» A. opinion leaders |
193. |
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________. |
A. | versioning |
B. | bundling. |
C. | transitive content |
D. | price discrimination |
Answer» A. versioning |
194. |
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year? |
A. | loyalty |
B. | reach |
C. | regency |
D. | unique visitors |
Answer» A. loyalty |
195. |
______________ are networks that connect people within a company to each other and to the company network. |
A. | bitstreams |
B. | extranets |
C. | internets |
D. | intranets |
Answer» D. intranets |
196. |
A website offering content created by third party transparently to customers is an example of ______________. |
A. | reinter mediation |
B. | syndication |
C. | virtual manufacturing |
D. | build-to-order |
Answer» B. syndication |
197. |
E-commerce technologies have improved upon traditional commerce technologies in ______________. |
A. | richness |
B. | reach |
C. | both richness and reach |
D. | neither richness nor reach |
Answer» C. both richness and reach |
198. |
All of the following are technologies used to gather information about you online except ______________. |
A. | spy ware |
B. | cookies |
C. | gmail |
D. | anonymizers |
Answer» D. anonymizers |
199. |
______________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server. |
A. | ping |
B. | telnet |
C. | tracert |
D. | ssl |
Answer» A. ping |
200. |
Which of the following is a new and disruptive Web feature or service? |
A. | xml |
B. | diffserv |
C. | blogs |
D. | cdma |
Answer» C. blogs |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.