MCQOPTIONS
Saved Bookmarks
This section includes 142 Mcqs, each offering curated multiple-choice questions to sharpen your Education and Teaching knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which section of IT Act deals with Child pornography |
| A. | Section 67A |
| B. | Section 67B |
| C. | Section 67C |
| D. | Section 67D |
| Answer» C. Section 67C | |
| 52. |
Which section of IT Act deals with Hacking of computer systems and its penalties? |
| A. | Section 61 |
| B. | Section 63 |
| C. | Section 66 |
| D. | Section 68 |
| Answer» D. Section 68 | |
| 53. |
GIF stands for |
| A. | Graphics Interchange File |
| B. | Global Information Format |
| C. | Graphics Information Format |
| D. | Graphics Interchange Format |
| Answer» E. | |
| 54. |
The accounting software 'Tally' was developed by: |
| A. | TCS |
| B. | HCL |
| C. | Wipro |
| D. | Infosys |
| Answer» B. HCL | |
| 55. |
HTML is used to create |
| A. | web page |
| B. | web server |
| C. | high level program |
| D. | machine language program |
| Answer» B. web server | |
| 56. |
A Personal Computer uses a number of chips mounted on a circuit board called |
| A. | Mother Board |
| B. | System Board |
| C. | Daughter Board |
| D. | Microprocessor |
| Answer» B. System Board | |
| 57. |
What is the punishment for identity theft in IT Act |
| A. | Two year imprisonment or 1 lakh rupees penalty or both |
| B. | Three year imprisonment or 1 lakh rupees penalty or both |
| C. | Three year imprisonment or 2 lakh rupees penalty or both |
| D. | None of the above |
| Answer» C. Three year imprisonment or 2 lakh rupees penalty or both | |
| 58. |
An E-mail address is composed of: |
| A. | one part |
| B. | two parts |
| C. | three parts |
| D. | four parts |
| Answer» C. three parts | |
| 59. |
In the hypermedia database, information bits are stored in the form of: |
| A. | cubes |
| B. | nodes |
| C. | signals |
| D. | symbols |
| Answer» C. signals | |
| 60. |
Digital Empowerment means |
| A. | Universal digit literacy |
| B. | Collaborative digital platform for participative governance. |
| C. | Probability of all entitlements for individuals through cloud. |
| D. | All of the above |
| Answer» E. | |
| 61. |
WYSIWYG - describes the display of a document on screen as it will actually print: |
| A. | What you see is what you get |
| B. | What you save is what you get |
| C. | What you state is what you get |
| D. | What you suggest is what you get |
| Answer» B. What you save is what you get | |
| 62. |
An unsolicited e-mail message sent to many recipient at once is a |
| A. | Virus |
| B. | Worm |
| C. | Spam |
| D. | Threat |
| Answer» D. Threat | |
| 63. |
The octal number system consists of the following symbols : |
| A. | 0 - 7 |
| B. | 0 - 9 |
| C. | 0 - 9, A - F |
| D. | None of the above |
| Answer» B. 0 - 9 | |
| 64. |
Commercial messages on the net are identified as |
| A. | Net ads |
| B. | Webmercials |
| C. | Viral advertisements |
| D. | Internet commercials |
| Answer» C. Viral advertisements | |
| 65. |
What is the punishment for hacking of computers |
| A. | Life Imprisonment |
| B. | Three year imprisonment or 2 lakh rupees penalty or both |
| C. | Three year imprisonment or 5 lakh rupees penalty or both |
| D. | Three year imprisonment or 10 lakh rupees penalty or both |
| Answer» D. Three year imprisonment or 10 lakh rupees penalty or both | |
| 66. |
When IT Act 2000 came into effect? |
| A. | 2000 October 17 |
| B. | 2000 November 11 |
| C. | 2001 October 17 |
| D. | 2001 November 11 |
| Answer» B. 2000 November 11 | |
| 67. |
"On the keyboard of computer each character has an ""ASCII"" value which stands for:" |
| A. | Adaptable Standard Code for Information Change |
| B. | American Stock Code for Information Interchange |
| C. | African Standard Code for Information Interchange |
| D. | American Standard Code for Information Interchange |
| Answer» E. | |
| 68. |
Video transmission over the Internet that looks like delayed livecasting is called: |
| A. | video shift |
| B. | virtual video |
| C. | real-time video |
| D. | direct broadcast |
| Answer» D. direct broadcast | |
| 69. |
Encoding or scrambling data for transmission across a network is known as |
| A. | Detection |
| B. | Protection |
| C. | Decryption |
| D. | Encryption |
| Answer» E. | |
| 70. |
Use of an ordinary telephone as an Internet applicance is called: |
| A. | voice net |
| B. | voice line |
| C. | voice portal |
| D. | voice telephone |
| Answer» C. voice portal | |
| 71. |
Which is the appeal court on the orders issued by Cyber appellate tribunal? |
| A. | High Court |
| B. | District Court |
| C. | Supreme Court |
| D. | Munsiff Court |
| Answer» B. District Court | |
| 72. |
In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for |
| A. | Hyper Text Transfer Protocol |
| B. | Hyper Text Translation Protocol |
| C. | High TeraByte Transfer Protocol |
| D. | Hypervisor Test Translation Protocol |
| Answer» B. Hyper Text Translation Protocol | |
| 73. |
Which of the following is the appropriate definition of a computer? |
| A. | Computer is a machine that can process information. |
| B. | Computer is an electronic device that can store, retrieve and quickly process only quantitative data. |
| C. | Computer is a machine that can store, retrieve and process quickly and accurately only qualitative information. |
| D. | Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately. |
| Answer» E. | |
| 74. |
Each character on the keyboard of computer has an ASCII value which stands for |
| A. | Adaptable Standard Code for Information Change |
| B. | American Stock Code for Information Interchange |
| C. | African Standard Code for Information Interchange |
| D. | American Standard Code for Information Interchange |
| Answer» E. | |
| 75. |
The term DNS stands for |
| A. | Domain Name System |
| B. | Dependent Name Server |
| C. | Defense Nuclear System |
| D. | Downloadable New Software |
| Answer» B. Dependent Name Server | |
| 76. |
The following punishment is mentioned in which section of IT Act 2000 '3 years of imprisonment and/or 5 lakh repees penalty for first conviction & 5 years of imprisonment and/or 10 lakh rupees penalt |
| A. | Section 65 |
| B. | Section 66 |
| C. | Section 67 |
| D. | Section 68 |
| Answer» D. Section 68 | |
| 77. |
Which one of the following is not a/an image/graphic file format? |
| A. | GIF |
| B. | BMP |
| C. | GUI |
| D. | PNG |
| Answer» D. PNG | |
| 78. |
LAN stands for: |
| A. | Live Area Network |
| B. | Local And National |
| C. | Local Area Network |
| D. | Large Area Network |
| Answer» D. Large Area Network | |
| 79. |
Which of the following is not open source software |
| A. | Open office |
| B. | Fedora Linux |
| C. | Internet Explorer |
| D. | Apache HTTP server |
| Answer» D. Apache HTTP server | |
| 80. |
HTML is basically used to design: |
| A. | Web-site |
| B. | Graphics |
| C. | Web-page |
| D. | Tables and Frames |
| Answer» D. Tables and Frames | |
| 81. |
The process of copying files to a CD-ROM is known as |
| A. | Zipping |
| B. | Ripping |
| C. | Burning |
| D. | Digitizing |
| Answer» D. Digitizing | |
| 82. |
gif, jpg, bmp, png are used as extensions for files which store |
| A. | Text data |
| B. | Audio data |
| C. | Video data |
| D. | Image data |
| Answer» E. | |
| 83. |
A hard disk is divided into tracks which is further subdivided into |
| A. | Heads |
| B. | Sectors |
| C. | Vectors |
| D. | Clusters |
| Answer» C. Vectors | |
| 84. |
The set of computer programs that manage the hardware/software of a computer is called |
| A. | Operating system |
| B. | Operation system |
| C. | Compiler system |
| D. | None of these |
| Answer» B. Operation system | |
| 85. |
CD ROM stands for: |
| A. | Compact Disk Read Only Memory |
| B. | Compact Disk Read Over Memory |
| C. | Computer Disk Read Only Memory |
| D. | Computer Disk Read Over Memory |
| Answer» B. Compact Disk Read Over Memory | |
| 86. |
Which one of the following is not an Operating System? |
| A. | Linux |
| B. | Firefox |
| C. | IBM AIX |
| D. | Sun Solaris |
| Answer» C. IBM AIX | |
| 87. |
Data can be saved on backing storage medium known as : |
| A. | Compact Disk Rewritable |
| B. | Computer Disk Rewritable |
| C. | Compact Disk Recordable |
| D. | Computer Data Rewritable |
| Answer» B. Computer Disk Rewritable | |
| 88. |
What is the proposed punishment for Cyber Terrorism in IT Act |
| A. | Life Imprisonment |
| B. | 6 year imprisonment |
| C. | 10 year imprisonment |
| D. | 1 crore rupees penalty |
| Answer» B. 6 year imprisonment | |
| 89. |
The statement 'the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware' refers to |
| A. | Artificial Intelligence (AI) |
| B. | Information Technology (IT) |
| C. | Information and Data Technology (IDT) |
| D. | Information and Collaborative Technology (ICT) |
| Answer» C. Information and Data Technology (IDT) | |
| 90. |
A key-board has at least: |
| A. | 101 Keys |
| B. | 201 Keys |
| C. | 301 Keys |
| D. | 401 Keys |
| Answer» B. 201 Keys | |
| 91. |
Which one of the following is not an Internet Service Provider (ISP)? |
| A. | BSNL |
| B. | MTNL |
| C. | ERNET India |
| D. | Infotech India Ltd. |
| Answer» E. | |
| 92. |
www represents: |
| A. | word wide web |
| B. | world wide web |
| C. | weird wide web |
| D. | who what and where |
| Answer» C. weird wide web | |
| 93. |
S/MIME in Internet technology stands for |
| A. | Simple Multimedia Internet Mail Extension |
| B. | Secure Multimedia Internet Mail Extension |
| C. | Simple Multipurpose Internet Mail Extension |
| D. | Secure Multipurpose Internet Mail Extension |
| Answer» E. | |
| 94. |
Manuel Castelle was the first to use the term |
| A. | Internet society |
| B. | Network society |
| C. | Telematic society |
| D. | Electronic society |
| Answer» C. Telematic society | |
| 95. |
Information, a combination of graphics, text, sound, video and animation is called: |
| A. | Multifacet |
| B. | Multimedia |
| C. | Multiprocess |
| D. | Multiprogramme |
| Answer» C. Multiprocess | |
| 96. |
Which of the following is type of LAN ? |
| A. | FDDI |
| B. | Ethernet |
| C. | Token Ring |
| D. | All of the above |
| Answer» C. Token Ring | |
| 97. |
The Internet ethical protocol is called |
| A. | netiquette |
| B. | net ethics |
| C. | net protocol |
| D. | net morality |
| Answer» B. net ethics | |
| 98. |
The section deals with legal recognition of digital signature |
| A. | Section 1 |
| B. | Section 5 |
| C. | Section 7 |
| D. | Section 9 |
| Answer» C. Section 7 | |
| 99. |
The 'brain' of a computer which keeps peripherals under its control is called: |
| A. | Central Power Unit |
| B. | Common Power Unit |
| C. | Central Processing Unit |
| D. | Common Processing Unit |
| Answer» D. Common Processing Unit | |
| 100. |
With regard to e-mail, what does Bcc : mean ? |
| A. | Blind Carbon Copy : - The users specified in the Bcc : field will get the e-mail and see the addresses in the to : and cc : fields. |
| B. | Blind Carbon Copy : The users specified in the Bcc : field will get the e-mail but will not see the addresses in the to : and cc : fields. |
| C. | Blind Computer Communication : - The users specified in the Bcc : field will get the e-mail and see the addresses in the to : and cc : fields. |
| D. | Blind Computer Communication :- The users specified in the Bcc : field will get the e-mail but it will be an audio file because this is how blind peop |
| Answer» B. Blind Carbon Copy : The users specified in the Bcc : field will get the e-mail but will not see the addresses in the to : and cc : fields. | |