McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor Multimedia Communication (BMMC) .
151. |
The device best suited for a sales person who has to demonstrate processor-intensive multimedia to clients is a |
A. | smartphone with internet capabilities |
B. | pda with an external monitor |
C. | tablet pc |
D. | notebook computer |
Answer» D. notebook computer |
152. |
GPS chips are |
A. | installed in all newly manufactured automobiles |
B. | installed in all newly manufactured cell phones |
C. | reliable only when installed in tablet pcs |
D. | available only for pdas and smart phones |
Answer» B. installed in all newly manufactured cell phones |
153. |
For internet access you should obtain |
A. | a tablet pc |
B. | a smartphone |
C. | a pda |
D. | all of the above can have internet capabilities |
Answer» D. all of the above can have internet capabilities |
154. |
Portable devices that can be synchronized with your home computer are |
A. | pdas and gps units |
B. | ipods pdas and cell phones |
C. | pagers and gps units |
D. | any device with bluetooth. |
Answer» D. any device with bluetooth. |
155. |
What is an information? |
A. | raw data |
B. | processed data |
C. | collection of data |
D. | none of these |
Answer» B. processed data |
156. |
What is the full form of SMS? |
A. | switched mode system |
B. | short message service |
C. | short mail service |
D. | none of these |
Answer» B. short message service |
157. |
What is the full form of MMS? |
A. | mobile mode system |
B. | mobile message service |
C. | multimedia messaging service |
D. | none of these |
Answer» C. multimedia messaging service |
158. |
The concept of line of sight means |
A. | alignment of sending and receiving devices |
B. | alignment of only hand devices |
C. | alignment of only receiving devices |
D. | none of these |
Answer» A. alignment of sending and receiving devices |
159. |
What is the full form of EDI? |
A. | electronic data interchange |
B. | electronic data information |
C. | electric data interchange |
D. | none of these |
Answer» A. electronic data interchange |
160. |
Which of the following support is not available on MMS? |
A. | text |
B. | video |
C. | graphics |
D. | none of these |
Answer» D. none of these |
161. |
Computer to computer exchange of business is done through |
A. | e-banking |
B. | e-commerce |
C. | edi |
D. | internet banking |
Answer» C. edi |
162. |
The height at which the GPS satellite is above the earth’s surface is |
A. | 12000 miles |
B. | 1000km |
C. | 1000miles |
D. | none of these |
Answer» A. 12000 miles |
163. |
The knowledge that can be spoken in language and transmitted among individuals. |
A. | general knowledge |
B. | explicit knowledge |
C. | tacit knowledge |
D. | none of the above |
Answer» B. explicit knowledge |
164. |
This is the exclusive right granted by statute to the author of the works to reproduce dramatic, artistic, literary or musical work or to authorize its reproduction by others. |
A. | patent |
B. | copy right |
C. | trade mark |
D. | none of the above |
Answer» B. copy right |
165. |
This is a legal monopoly granted for a limited time to the owner of an invention. |
A. | patent |
B. | copy right |
C. | trade mark |
D. | none of the above |
Answer» A. patent |
166. |
Any symbol, logo, or name used to enable the public to identify the supplier of goods. |
A. | patent |
B. | copy right |
C. | trade mark |
D. | none of the above |
Answer» C. trade mark |
167. |
The Indian Patent Act finally amended in |
A. | 1970 |
B. | 1996 |
C. | 2005 |
D. | none of the above |
Answer» C. 2005 |
168. |
CAIstands for: |
A. | computer aided training |
B. | computer assisted instruction |
C. | computer aided technology |
D. | none of these |
Answer» B. computer assisted instruction |
169. |
This network is an autonomous Inter-University Centre of the University Grants Commission. |
A. | inflibnet |
B. | nicenet |
C. | brnet |
D. | none of these |
Answer» A. inflibnet |
170. |
………………knowledge are also known as informal knowledge. |
A. | tacit knowledge |
B. | explicit knowledge |
C. | information |
D. | none of these |
Answer» A. tacit knowledge |
171. |
IPR stands for……………… |
A. | intellectual property rights |
B. | individual property rights |
C. | inter person rights |
D. | none of these |
Answer» A. intellectual property rights |
172. |
………………knowledge are also known as formal knowledge. |
A. | explicit knowledge |
B. | tacit knowledge |
C. | information |
D. | none of these |
Answer» A. explicit knowledge |
173. |
……………………….is one of many web-based learning management systems(LMS) through
|
A. | nicenet |
B. | inflibnet |
C. | brnet |
D. | none of these |
Answer» A. nicenet |
174. |
………………….is a prototype portal site for biological information and bio-resource information. |
A. | brnet |
B. | inflibnet |
C. | nicenet |
D. | none of these |
Answer» A. brnet |
175. |
The patent system in India is governed by the ……………….. |
A. | patents act, 1970 |
B. | patents act, 1911 |
C. | patents act, 1972 |
D. | none of these |
Answer» A. patents act, 1970 |
176. |
CBT stands for: |
A. | computer based training |
B. | computer based tooling |
C. | computer based technology |
D. | none of these |
Answer» A. computer based training |
177. |
TRIPS means…………….. |
A. | trade related aspects of intellectual property rights |
B. | trade related activities and information providing rights |
C. | round trip to europe |
D. | none of these |
Answer» A. trade related aspects of intellectual property rights |
178. |
Which of the following is a processed thing? |
A. | data |
B. | information |
C. | database |
D. | none of these |
Answer» B. information |
179. |
Which of the following operators cannot be applied to search? |
A. | or |
B. | not |
C. | and |
D. | bool |
Answer» D. bool |
180. |
Intellectual Property Rights does not cover the following area |
A. | copyright |
B. | patents |
C. | trademark |
D. | none of these |
Answer» D. none of these |
181. |
Indiancopyright act came into existence in the year |
A. | 1950 |
B. | 1955 |
C. | 1957 |
D. | none of these |
Answer» C. 1957 |
182. |
…………………..developed a computer language called LOGO, so that children could program computers. |
A. | seymorpapert |
B. | jean piaget |
C. | microsoft |
D. | none of the above |
Answer» A. seymorpapert |
183. |
……………….. is a computer language developed by Seymour Paper and his colleagues at MIT,so that children could program computers. |
A. | logo |
B. | pogo |
C. | gigo |
D. | none of the above |
Answer» A. logo |
184. |
When shopping online which of the following does NOT indicate that you have a secure connection displays? |
A. | a closed padlock icon in the status bar |
B. | the url begins with https |
C. | the word “secure” in the title bar |
D. | the verisign seal on the web page. |
Answer» C. the word “secure” in the title bar |
185. |
Which of the following is annoying, but really doesn’t render any harm to your computer? |
A. | adware |
B. | spyware |
C. | sneakware |
D. | malware |
Answer» A. adware |
186. |
One scam that lures internet users into revealing personal information is |
A. | malware |
B. | phishing |
C. | spam |
D. | internet hoax |
Answer» B. phishing |
187. |
Cell phones use which category of operating systems |
A. | single user, single task |
B. | multi user, multi task |
C. | single user, multitask |
D. | real-time |
Answer» A. single user, single task |
188. |
When hacker use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a |
A. | zero-day attack |
B. | trojan horse attack |
C. | distributed denial of service attack |
D. | boot sector virus attack |
Answer» B. trojan horse attack |
189. |
Which is a benefit of a firewall? |
A. | they make it harder for a hacker to locate specific computer on a network |
B. | they repeatedly change the ip address of the router |
C. | they open unused logical ports to increase throughput |
D. | they filter out unwanted wireless signals |
Answer» A. they make it harder for a hacker to locate specific computer on a network |
190. |
Viruses that travel from computer to computer on their own(independent of host) are called |
A. | worms |
B. | stealth viruses |
C. | logic bombs |
D. | macro viruses |
Answer» A. worms |
191. |
Flash drives have replaced floppy disks as the preferred method of portable storage because: |
A. | they hold much more data than floppy disks |
B. | data is not magnetic so less subject to errors |
C. | they have quicker access time than a floppy drive |
D. | all of the above |
Answer» D. all of the above |
192. |
Which of the following is not harmful for your computer |
A. | malware |
B. | spyware |
C. | virus |
D. | cookies |
Answer» D. cookies |
193. |
This is based on individuals who know how to use these technologies and those who do not. |
A. | access |
B. | usage |
C. | usage quality |
D. | none of the above |
Answer» B. usage |
194. |
This refers to the gap between people who possess regular access to information technology and those who do not have this access. |
A. | digital divide |
B. | discrimination |
C. | computer divide |
D. | none of these |
Answer» A. digital divide |
195. |
This type of digital divide is based on the difference between individuals with access and those without access. |
A. | access |
B. | usage |
C. | usage quality |
D. | none of the above |
Answer» A. access |
196. |
It is based on the differences in the quality of using information technology. |
A. | access |
B. | usage |
C. | usage quality |
D. | none of these |
Answer» C. usage quality |
197. |
Who started Free Software foundation? |
A. | linus torvald |
B. | richard m stallman |
C. | gnu |
D. | none of the above |
Answer» B. richard m stallman |
198. |
This kind of attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. |
A. | data diddling |
B. | salami attacks |
C. | virus attack |
D. | none of the above |
Answer» A. data diddling |
199. |
This kind of crime is normally common in the financial institutions or for the purpose of committing financial crimes. |
A. | data diddling |
B. | salami attacks |
C. | virus attack |
D. | none of the above |
Answer» B. salami attacks |
200. |
IT Act in India was amended in |
A. | 2000 |
B. | 2004 |
C. | 2008 |
D. | none of these |
Answer» C. 2008 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.