

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Commerce (B Com) .
201. |
In the mda.edu, the component .edu signifies that_____________________. |
A. | mda is an educational institute. |
B. | mda is a commercial organization. |
C. | mda is a non profit organization. |
D. | mda is a government organization. |
Answer» A. mda is an educational institute. |
202. |
Internet can be used for____________. |
A. | uploading. |
B. | downloading. |
C. | chatting. |
D. | all of these. |
Answer» D. all of these. |
203. |
In an e-mail address @ is used. It represents________________. |
A. | domain name. |
B. | senders name. |
C. | recipients name. |
D. | network name |
Answer» A. domain name. |
204. |
Real time textual talk is called___________. |
A. | chatting. |
B. | browsing. |
C. | surfing. |
D. | www. |
Answer» A. chatting. |
205. |
Which of the following is a requirement for e-commerce? |
A. | paper. |
B. | internet connectivity. |
C. | usb. |
D. | digital signature. |
Answer» B. internet connectivity. |
206. |
The segment in which business directly sells to the end consumer is called____________. |
A. | c2c. |
B. | p2p. |
C. | b2c. |
D. | g2g. |
Answer» C. b2c. |
207. |
The payment on Internet is generally made through_________________. |
A. | cash card. |
B. | debit card. |
C. | credit ca |
Answer» C. credit ca |
208. |
_____________ governs cyber practices in India. |
A. | uncitral 1996. |
B. | it act 2000. |
C. | transfer of property law. |
D. | microsoft corporation. |
Answer» B. it act 2000. |
209. |
___________ monitors all the traffic that flows between the two networks but block certain traffic completely which may be intruder. |
A. | firewall. |
B. | anti-virus. |
C. | software. |
D. | hardware. |
Answer» A. firewall. |
210. |
WAN stands for________. |
A. | wire and network. |
B. | wire accessible network. |
C. | widely accessible network. |
D. | wide area network |
Answer» D. wide area network |
211. |
In which network the ends are not connected? |
A. | bus. |
B. | star. |
C. | ring. |
D. | token ring. |
Answer» A. bus. |
212. |
Using any host computer on the internet as if you were directly connected is called__________. |
A. | ftp. |
B. | telnet. |
C. | e mail. |
D. | ppp. |
Answer» A. ftp. |
213. |
GPRS refers to ___________. |
A. | global packet radio service |
B. | global potential radio service |
C. | global powerful radio service |
D. | global physical radio service |
Answer» A. global packet radio service |
214. |
HTTP refers to________. |
A. | hyper text transfer protocols |
B. | hyper text transfer procedure. |
C. | home text translating process. |
D. | hyper text translating process. |
Answer» A. hyper text transfer protocols |
215. |
The internet means__________. |
A. | network of computer. |
B. | network through links. |
C. | network of electronic devices. |
D. | network of electrical devices. |
Answer» A. network of computer. |
216. |
In internet terminologies, “IP” stands for_________. |
A. | intranet protocol. |
B. | internet protocol |
C. | individual protocol. |
D. | industrial protocol. |
Answer» B. internet protocol |
217. |
The web page means___________. |
A. | plain page. |
B. | hyperlink. |
C. | designed page. |
D. | pictures. |
Answer» C. designed page. |
218. |
The HTML programming uses__________. |
A. | tags. |
B. | numbers. |
C. | pictures. |
D. | tables. |
Answer» A. tags. |
219. |
The Hyperlink means_________________. |
A. | text connected to page. |
B. | plain text. |
C. | graphic text. |
D. | none of these. |
Answer» A. text connected to page. |
220. |
The use of integrated services digital network is____________. |
A. | more faster |
B. | slower. |
C. | free service. |
D. | constant access. |
Answer» C. free service. |
221. |
E-commerce means________________. |
A. | business through internet. |
B. | commercial activities through electronic media. |
C. | electrical commerce. |
D. | commercial transaction. |
Answer» B. commercial activities through electronic media. |
222. |
______ provides the continuous access to the wireless network services and the flexible communication between the people. |
A. | network. |
B. | laptop. |
C. | mobile computing. |
D. | personal computing. |
Answer» C. mobile computing. |
223. |
_______ refers to using the small portable and hand held computing devices such as PDA laptops mobile phones MP3 players digital cameras tablet PC and Palmtops in a wireless enabled network. |
A. | personal computing |
B. | digital computing. |
C. | network computing. |
D. | mobile computing. |
Answer» D. mobile computing. |
224. |
A___________ identifies a user’s personal preferences and settings and allows the web site's server to retrieve your information from its database. |
A. | cookie. |
B. | view history. |
C. | prototype. |
D. | profile. |
Answer» A. cookie. |
225. |
The area that contains the URL or web address of the active web page is called the___________ bar. |
A. | address |
B. | menu. |
C. | link. |
D. | browser. |
Answer» A. address |
226. |
A_________ engine is a software program used by a search site to retrieve web pages from a search database that match certain criteria. |
A. | multimedia. |
B. | virtual. |
C. | serf. |
D. | search. |
Answer» D. search. |
227. |
_________ is a software program that secretly collects information and monitors your actions without your knowledge. |
A. | ad ware. |
B. | freeware. |
C. | spy ware. |
D. | hidden ware |
Answer» C. spy ware. |
228. |
Electronic mail cannot be used for______________. |
A. | scanning pictures. |
B. | sending documents. |
C. | sending attachments. |
D. | sending messages |
Answer» A. scanning pictures. |
229. |
___________ is a type of Internet connection in which the PC must connect to a service provider using standard telephone lines. |
A. | http. |
B. | wireless. |
C. | dsl. |
D. | dial-up. |
Answer» D. dial-up. |
230. |
The Internet began as an experimental network called as_______________. |
A. | extranet |
B. | arpanet. |
C. | milnet. |
D. | infranet. |
Answer» B. arpanet. |
231. |
A_____ room or online forum allows users to communicate through typed messages which are displayed almost instantly. |
A. | mail. |
B. | buddy. |
C. | chat. |
D. | message. |
Answer» C. chat. |
232. |
A_________ is a software program used for viewing various kinds of Internet resources found on the World Wide Web. |
A. | bookmark. |
B. | intranet. |
C. | domain. |
D. | browser. |
Answer» D. browser. |
233. |
. Where is the Internets central hub and control centre located? |
A. | near washington d.c. |
B. | near the microsoft campus in redmond washington. |
C. | in a top-secret location. |
D. | in silicon valley. |
Answer» B. near the microsoft campus in redmond washington. |
234. |
Which of these domains is restricted to qualified organizations? |
A. | .com |
B. | .org |
C. | .net |
D. | .edu |
Answer» C. .net |
235. |
Which of these services would you probably not be able to get from a typical Internet service provider (ISP)? |
A. | an email address. |
B. | access to a web server. |
C. | a connection to the internet. |
D. | technical help. |
Answer» D. technical help. |
236. |
The first Web pages were____________. |
A. | strictly hypertext with no multimedia content. |
B. | designed to simulate printed pages using html table tools. |
C. | the first true multimedia documents to be published on the internet. |
D. | viewable only with proprietary microsoft software. |
Answer» B. designed to simulate printed pages using html table tools. |
237. |
What do you call software that prevents certain Web pages from being displayed? |
A. | child safe software. |
B. | dutch dike software. |
C. | filtering software. |
D. | spam blockers. |
Answer» D. spam blockers. |
238. |
____________ ensures the privacy and confidentiality in electronic messages. |
A. | client server security. |
B. | data and transaction security. |
C. | software security holes. |
D. | physical security holes. |
Answer» B. data and transaction security. |
239. |
One major threat to data security is unauthorized network monitoring is also called as_____________. |
A. | packet sniffing. |
B. | message security. |
C. | message confidentiality. |
D. | system integrity. |
Answer» A. packet sniffing. |
240. |
DES stands for____________. |
A. | data encryption standard. |
B. | data encryption system. |
C. | data enabling system. |
D. | data enabled system. |
Answer» A. data encryption standard. |
241. |
DSA stands for______________. |
A. | digital signature algorithm. |
B. | digital system architecture. |
C. | digital system analysis. |
D. | digital signature |
Answer» A. digital signature algorithm. |
242. |
MAN stands for............... |
A. | metropolitan area network |
B. | mass area network |
C. | middle area network |
D. | maximum area network |
Answer» A. metropolitan area network |
243. |
Trojan Horse is a--------------- |
A. | accounting software |
B. | search engine |
C. | portal |
D. | none of these |
Answer» D. none of these |
244. |
ISDN stands for ____. |
A. | integrated standard digital network. |
B. | integrated service digital networking |
C. | integrated service digital network. |
D. | independent standard digital |
Answer» C. integrated service digital network. |
245. |
ATM is a service that can run over____. |
A. | sonet. |
B. | sdh. |
C. | b-isdn. |
D. | isdn |
Answer» C. b-isdn. |
246. |
If a computer on the network shares resources for others to use, it is called ____. |
A. | server. |
B. | client. |
C. | mainframe. |
D. | super. |
Answer» A. server. |
247. |
Who is the father of internet? |
A. | charles babbage |
B. | tim burners lee |
C. | winton serf |
D. | simur cray |
Answer» C. winton serf |
248. |
............. is a word processing application from Microsoft |
A. | Ms Office |
B. | Ms Access |
C. | Ms Excel |
D. | None of the above |
Answer» D. None of the above |
249. |
A ____________ is a small program that helps to automate a frequently used series of commands in most productivity software tools. |
A. | Macro |
B. | Utility |
C. | Template |
D. | Wizard |
Answer» A. Macro |
250. |
Which of the following button will allow you to add, delete, or change records in your Data Source? |
A. | ‘Edit’ button |
B. | ‘Data editing’ button |
C. | ‘Data Source’ button |
D. | ‘Edit Data Source’ button |
Answer» D. ‘Edit Data Source’ button |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.