Q.1 A computer
communication technology that provides a way to interconnect multiple computer
across short distance is
(A) LAN
(B) MAN
(C) WAN
(D) Wireless network
Ans: A LAN
Q.2 Telnet is a
service that runs
(A) Television on net
(B) Remote program
(C) Cable TV network
(D) Telenext
Ans: B Remote program
Q.3. A device that
forwards data packet from one network to another is called a
(A) Bridge
(B) Switch
(C) Hub
(D) Gateway
Ans: B Switch
Q.4 Which of the
following is the fastest media of data transfer
(A) Co-axial Cable
(B) Untwisted Wire
(C) Telephone Lines
(D) Fibre Optic
Ans: D Fiber Optic.
Q.5 Tool that is used
to transfer data/files among computers on the Internet
(A) FTP
(B) Archie
(C) TCP
(D) Gopher
Ans: C TCP
Q.6 HTML is a
(A) Programming Language
(B) Scripting Language
(C) Web Browser
(D) Network Protocol
Ans: B Scripting Language
Q.7 Secret-key
encryption is also known as
(A) Asymmetric encryption
(B) Symmetric encryption
(C) Secret-encryption
(D) Private encryption
Ans: D Private encryption
Q.8 The concept of
electronic cash is to execute payment by
(A) Credit Card
(B) ATM Card
(C) Using computers over network
(D) Cheque
Ans: C Using computers over network.
Q.9 SMTP is a
(A) Networking Protocol
(B) Protocol used for transferring message between end user & Mail Server
(C) Protocol used for smart card message interchange
(D) Encryption Standard
Ans: B Protocol used for transferring message between end user & Mail Server.
Q.10 Digital
Signature is
(A)Scanned Signature on Computer
(B) Code number of the sender.
(C)Public Key Encryption.
(D)Software to recognize signature.
Ans: D Software to recognize signature
Q.11 Telnet is a
(A) Network of Telephones
(B) Television Network
(C) Remote Login
(D) Remote Login.
Ans: C Remote Login.
Q.12 The internet is
(A) Network of networks
(B) Web site.
(C) Host
(D) Server
Ans: A Network of networks
Q.13 An e-business
that allows consumer to name their own price for products and services is
following which e-business model?
(A) B2B
(B) B2G
(C) C2C
(D) C2B
Ans: D C2B
Q.14 Kerberos is an
encryption-based system that uses
(A) Secret key encryption
(B) Public key encryption
(C) Private key encryption
(D) Data key encryption
Ans: A Secret key encryption.
Q.15 The method(s) of
payment for online consumers are
(A) Electronic cash
(B) Credit/debit
(C) Electronic checks
(D) All of the above
Ans: D All of the Above.
Q.16 DNS is
(A) The distributed hierarchical naming system
(B) The vertical naming system
(C) The horizontal naming system
(D) The client server system
Ans: C The horizontal naming system.
Q.17 A firewall is
(A) An established network performance reference point.
(B) Software or hardware used to isolate a private network from a public network.
(C) A virus that infects macros.
(D) A predefined encryption key used to encrypt and decrypt data transmissions.
Ans: B Software or hardware used to isolate a private network from a public network.
Q.18 A router
(A) Screens incoming information.
(B) Distributes information between networks
(C) Clears all viruses from a computer system
(D) Is a work virus.
Ans: B Distributes information between networks
Q.19 LDAP stands for
(A) Light weight Data Access Protocol.
(B) Light weight Directory Access Protocol.
(C) Large Data Access Protocol.
(D) Large Directory Access Protocol.
Ans: B -> Light weight Directory Access Protocol.
Q.20 E-Commerce is
not suitable for
(A) Sale/Purchase of expensive jewellery and antiques.
(B) Sale/Purchase of mobile phones.
(C) Sale/Purchase of branded clothes.
(D) Online job searching.
Ans: D Online job searching
Q.21 Amazon.com comes
under the following model
(A) B2B
(B) B2C
(C) C2C
(D) C2B
Ans: B B2C
Q.22 Hubs are present
in the network
(A) to diagnose line failures, measure and manage traffic flow and simplify re configuring of LANs.
(B) to interconnect the LAN with WANs.
(C) to interconnect the WANs with WANs.
(D) to interconnect the WANs with LANs.
Ans: B to interconnect the LAN with WANs.
Q.23 Firewalls
operate by
(A)The pre-purchase phase.
(B) isolating Intranet from Extranet.
(C)Screening packets to/from the Network and provide controllable filtering of network traffic.
(D)None of the above.
Ans: C Screening packets to/from the Network and provide controllable filtering of network traffic.
Q.24 The mercantile
process model consists of the following pahase(s):
(A) The pre-purchase phase.
(B) Purchase consummation phase.
(C) Post-purchase Interaction phase.
(D) All of the above.
Ans: D All of the Above.
25. To access a
mainframe or supercomputer, users often use a __________.
A) terminal
B) node
C) desktop
D) handheld
Answers: A Terminal
No comments:
Post a Comment