

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration (BBA) , Bachelor of Science in Computer Science (BSc CS) , Bachelor of Commerce (B Com) .
351. |
………………is automated methods of recognizing a person based on a physiological or behavioral characteristic. |
A. | Biometrics |
B. | PIN |
C. | both of these |
D. | none of these |
Answer» A. Biometrics |
352. |
In Biometrics,…………………………ID system is designed to prevent more than one person from using a single identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» A. Positive ID system |
353. |
In Biometrics,…………………………ID system is designed to prevent one person from using more than one identity |
A. | Positive ID system |
B. | Negative ID system |
C. | both of these |
D. | none of these |
Answer» B. Negative ID system |
354. |
…………………..are program developed by some dishonest people to destroy the computer system and the valuable information in it. |
A. | Network firewall |
B. | computer virus |
C. | both of these |
D. | none of these |
Answer» B. computer virus |
355. |
Which among the following is not an example for computer virus ? |
A. | Chernobyl |
B. | Melissa |
C. | I Love You |
D. | None of these |
Answer» D. None of these |
356. |
……………………are special type of software meant for limiting the risks of being hit by computer viruses |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» B. Antivirus |
357. |
A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure. |
A. | Hacker |
B. | spoofer |
C. | operator |
D. | none of these |
Answer» A. Hacker |
358. |
……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks. |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» A. Network firewall |
359. |
…………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet. |
A. | Network firewall |
B. | Antivirus |
C. | both of these |
D. | none of these |
Answer» A. Network firewall |
360. |
SET means ……………………………. |
A. | Standard Electronic Technology |
B. | Standard Electronic Transfer |
C. | Secure Electronic Transaction |
D. | None of these |
Answer» C. Secure Electronic Transaction |
361. |
The verification of credit card is done by using…………….. with a communications link to the merchants acquiring bank |
A. | Credit card payment terminal |
B. | Point of Sale |
C. | All of these |
D. | none of these |
Answer» C. All of these |
362. |
Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as…………………………. |
A. | Spoofing |
B. | Snooping |
C. | Sniffing |
D. | None of these |
Answer» A. Spoofing |
363. |
Gain entry into the user’s system and scan your file system for personal information is known as………………. |
A. | Spoofing |
B. | Snooping |
C. | Sniffing |
D. | None of these |
Answer» B. Snooping |
364. |
………………attacks are difficult and are only successful if the attacker knows something about the shopper |
A. | Spoofing |
B. | Snooping |
C. | Sniffing |
D. | Guessing passwords |
Answer» D. Guessing passwords |
365. |
…………………is the process of making information unintelligible to the unauthorized user. |
A. | Spoofing |
B. | Snooping |
C. | Sniffing |
D. | Cryptography |
Answer» D. Cryptography |
366. |
………………….is the reverse process of encryption, to make the information readable once again |
A. | Spoofing |
B. | Decryption |
C. | Sniffing |
D. | Cryptography |
Answer» B. Decryption |
367. |
A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature. |
A. | cyber signature |
B. | Digital signature |
C. | SSL |
D. | none of these |
Answer» B. Digital signature |
368. |
A ………………is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications |
A. | Digital signature |
B. | Digital certificates |
C. | SSL |
D. | none of these |
Answer» B. Digital certificates |
369. |
The information Technology Act [IT ACT] came into effect on |
A. | 16th November 2000 |
B. | 15th December 2000 |
C. | 17th October 2000 |
D. | none of these |
Answer» C. 17th October 2000 |
370. |
Information sent over the Internet commonly uses the set of rules called……………………….. |
A. | TCP/IP |
B. | FTP |
C. | HTTP |
D. | gopher |
Answer» A. TCP/IP |
371. |
E-mail which contain useless material is termed as……………………… |
A. | Spam |
B. | useless mail |
C. | trunk mail |
D. | Junk mail |
Answer» D. Junk mail |
372. |
India has enacted the first IT Act in the year…………………………………… |
A. | 2001 |
B. | 2002 |
C. | 2009 |
D. | 2000 |
Answer» D. 2000 |
373. |
Which of the following crimes were not covered under IT (Amendment) Act, 2008 ? |
A. | Cyber terrorism |
B. | Child pornography |
C. | Video voyeurism |
D. | None of these |
Answer» D. None of these |
374. |
Trade mark, copyright, patent law etc comes under the purview of…………………… |
A. | Data protection |
B. | Telecommunication laws |
C. | Intellectual property laws |
D. | None |
Answer» C. Intellectual property laws |
375. |
……………….is a programme designed o replicate and spread generally with the victim being oblivious to its existence |
A. | hacker |
B. | software |
C. | Computer virus |
D. | none of these |
Answer» C. Computer virus |
376. |
Which one of the following is not a principle of e-commerce ? |
A. | privacy |
B. | integrity |
C. | authentication |
D. | none of these |
Answer» D. none of these |
377. |
Which of the below is/are goals of E-Commerce? |
A. | 24×7 |
B. | reach out to larger audience |
C. | time saving |
D. | all of the above |
Answer» D. all of the above |
378. |
In which one of the following type of E-Commerce, consumer sells to consumer directly? |
A. | C2B |
B. | B2C |
C. | B2B |
D. | C2C |
Answer» D. C2C |
379. |
................ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format |
A. | Encapsulation |
B. | EDI |
C. | ERP |
D. | Transaction processing |
Answer» B. EDI |
380. |
What does EDI stand for? |
A. | Electronic Data Interface |
B. | E-Commerce Data Interface |
C. | Electronic Data Interaction |
D. | Electronic Data Interchange |
Answer» D. Electronic Data Interchange |
381. |
When a company buys some raw material from some other company, then it will come under: |
A. | B2B |
B. | B2C |
C. | C2B |
D. | C2C |
Answer» A. B2B |
382. |
In traditional commerce, people buy goods and services : |
A. | over the internet |
B. | physical visit |
C. | Both online & offline |
D. | None of the mentioned |
Answer» B. physical visit |
383. |
Promotion of products in e-commerce can be done by |
A. | Social media |
B. | Online Ads |
C. | Blog |
D. | All of the mentioned |
Answer» D. All of the mentioned |
384. |
Which of the following is not a dimension of e- commerce security provided by encryption ? |
A. | availability |
B. | integrity |
C. | non-repudiation |
D. | confidentiality |
Answer» A. availability |
385. |
Conversion of Plain text to Cipher Text is called……………… |
A. | Encryption |
B. | Decryption |
C. | Cryptography |
D. | none of these |
Answer» A. Encryption |
386. |
In Porter's Five Forces, the 'threat of new entrants' relates to: |
A. | Barriers to entry |
B. | Substitutes |
C. | Switching costs |
D. | Buyer power |
Answer» A. Barriers to entry |
387. |
Which of the following is true for supply chain management? |
A. | The physical material moves in the direction |
B. | Flow of cash backwards through the chain |
C. | Exchange of information moves in both the |
D. | All of the above |
Answer» D. All of the above |
388. |
Logistics is the part of a supply chain involved with the forward and reverse flow of |
A. | goods |
B. | services |
C. | cash |
D. | All of the above |
Answer» D. All of the above |
389. |
BPM is about: |
A. | Aligning business processes to organisational |
B. | Maintaining a process view of the organisation rather than a functional |
C. | Establishing and maintaining an environment of continuous |
D. | All of the above |
Answer» D. All of the above |
390. |
CRM is : |
A. | Customer Relationship |
B. | Customer Relationship |
C. | Customer Recovery |
D. | Consumer Relation |
Answer» A. Customer Relationship |
391. |
The best products to sell in B2C e-commerce are: |
A. | Small Products |
B. | Digital Products |
C. | Special Products |
D. | Fresh Products |
Answer» B. Digital Products |
392. |
Which of the following is a useful security mechanism when considering business strategy and IT? |
A. | encryption |
B. | decryption |
C. | firewall |
D. | All of the mentioned |
Answer» D. All of the mentioned |
393. |
Which type of products is lesser purchased using e- commerce? |
A. | automobiles |
B. | books |
C. | groceries |
D. | None of the mentioned |
Answer» A. automobiles |
394. |
Which is not the application area of e-commerce? |
A. | E-Learning |
B. | E-Banking |
C. | E-Auction |
D. | None of the mentioned |
Answer» D. None of the mentioned |
395. |
In which year the IT Act was introduced? |
A. | 2000 |
B. | 2020 |
C. | 2001 |
D. | 2010 |
Answer» A. 2000 |
396. |
is an early form of E-Commerce. |
A. | SCM |
B. | EDI |
C. | Both SCM & EDI |
D. | None of the mentioned |
Answer» B. EDI |
397. |
Which of the following is not related to security mechanism? |
A. | encryption |
B. | decryption |
C. | e-cash |
D. | All of the mentioned |
Answer» C. e-cash |
398. |
Digital Products are best suited for B2C e-commerce because they: |
A. | Are commodity like products |
B. | Can be mass- customized and |
C. | Can be delivered at the time of |
D. | All of the mentioned |
Answer» D. All of the mentioned |
399. |
Which of the following is part of the four main types of e-commerce? |
A. | B2B |
B. | B2C |
C. | C2B |
D. | All of the mentioned |
Answer» D. All of the mentioned |
400. |
The dimension of E-Commerce that enables commerce across the boundaries is called |
A. | interactivity |
B. | global reach |
C. | richness |
D. | ubiquity |
Answer» B. global reach |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.