100% found this document useful (2 votes)
1K views

Information Technology Objectives: Multiple Choice Questions

This document contains 75 multiple choice questions related to information technology objectives such as e-commerce, e-banking, cyber security threats, and Microsoft Office applications. The questions cover topics like e-commerce definitions and applications, networking concepts, cybercrime types, antivirus software, Microsoft Office functions, and financial calculations in Excel.

Uploaded by

Anonymous Hacker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views

Information Technology Objectives: Multiple Choice Questions

This document contains 75 multiple choice questions related to information technology objectives such as e-commerce, e-banking, cyber security threats, and Microsoft Office applications. The questions cover topics like e-commerce definitions and applications, networking concepts, cybercrime types, antivirus software, Microsoft Office functions, and financial calculations in Excel.

Uploaded by

Anonymous Hacker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

INFORMATION TECHNOLOGY OBJECTIVES

Multiple Choice Questions.


1)______ refers to online banking and selling a good.
(a) EDI
(b) E-commerce
(c )E- payment
2) ______ is transaction with trading partners.
(a) EDI
(b) E- commerce
(c ) E- payment
3) ______ is information super highway
(a) ISH
(b) I-Way
(c ) In- Way
4) A key hardware platform for I-Way access will be_____.
(a) Set-top-boxes
(b) Routers
(c ) Hubs
(d) Telephone
5) E-commerce is an exchange of business information through_____.
(a) Paper
(b) Network
(c ) Sales
(d) Shopping
6) ______ is melding of consumer electronics, television, publishing telecommunications and
computer for the purpose of facilitating new forms of information based commerce.
(a) E-commerce
(b) Convergence
(c ) communication
7) ______ convergence applies to the conversion of text, voice, data, image ,graphics and full
motion video into digital content.
(a) Content
(b) Multimedia
(c ) Cross Media
8)Media content on smartphone is an example of of________ convergence.
(a) Content
(b) Multimedia
(c) Technology
9) convergence of communication equipment that provides the pipelines to to transmit
________.
(a)Voice
(b)Data
(c ) Image & Video
(d) All the above
10) E-commerce application constitutes_____.
(a) Multimedia content
(b) Convergence
(c )CRM
11) Multimedia content includes_____.
(a) Devices
(b)Graph
(c ) stories
12) The E-Commerce has minimum _______architecture.
(a)One-Tire
(b)Two-Tier
(C )Three-Tier
13)_______ servers are an important link between the content providers and transport providers.
(a) Audio
(b)Video
(c ) Graph
14) _____is the wireless mode of data transmission
(a) Radio based transmission
(b)Cable transmission
(c ) Broadband
15) E-Commerce transaction between two business entities is_____.
(a)B2B
(b)B2C
(c )C2B
(d)C2C
16) E-Commerce transaction between two consumers is_____.
(a)B2B
(b)B2C
(c )C2B
(d)C2C
17) consumer oriented application includes______.
(a) Personal Finance
(b) E-mail
(c ) Chatting
18)_______is an electronic fund transfer mode.
(a)NEFT
(b)RTFT
(c )NERT
19)JIT is _____.
(a)Joule in Time
(b) Just in Time
(c ) Jack of Time
20)______ network is the network for the people in the same organisation.
(a) Intranet
(b)Extranet
(c ) Internet
21)_______ network is the network for the people in the same organisation as well as partially to
some outsiders.
(a) Intranet
(b)Extranet
(c ) Internet
22) _____ network are accessible from any point of the globe.
(a)LAN
(b) Intranet
(c ) Satellite
23)______ acts as an gate between two networks.
(a) Routers
(b) Gateways
(c )Hubs
24. E- commerce architecture includes _________.
a) Upper
b) Lower
c) Interface Support Layer
25. ________ is used for securing data during transmission.
a) Encryption
b) Decryption
c) Filtering
26. Which of the following can be used to navigate documents________.
a) Frames
b) Hyperlinks
c) Web toolbar
d) All of the above
27. E-banking premium tier includes ________ services.
a) Inquiry
b) Fund Transfer
c) Online Trading
28. IVR stands for ________.
a) Interactive Voice Response
b) Interactive Volume Response
c) Intermediate Voice Response
29. MICR stands for _______.
a) Magnetic Ink Character Recognition
b) My Income Character Recognition
c) Magnetic Income Character Recognition
30. _______ stores your credit card numbers on your hard drive in an encrypted form.
a) Electronic Cheque
b) Electronic Cash
c) Electronic Wallet
31. _______ is one of the products of internet banking.
a) Information Only
b) Electronic Only
c) Internet
32. EFT stands for _______.
a) Effective Fund Transfer
b) Electronic Fund Transfer
c) Effective File Transfer
33. ______ governs the E-banking in India.
a) RBI
b) BOI
c) BOB
34. The legal framework for banking in India is provided by a set of enactments , viz. the
Banking Regulations Act, 1949 the _________ and the Foreign Exchange Management Act,
1999.
a) Reserve Bank of India Act, 1934
b) Sales Act, 1934
c) Contract Act, 1934
35. _______ Act provides legal recognition to online transactions or transaction carried out
through electronic data interchange.
a) IT Act, 2000
b) Sales Act
c) Contract Act
36. PIN stands for _______.
a) Personal Ink No.
b) Personal Identification No.
c) People Identification No.
37. _______ to secure and authenticate the user through a secure browser.
a) HTTPS
b) Secure Socket Layer
c) URL
38. ______ is small plastic card with a unique number attached with an account.
a) Credit Card
b) Play Card
c) E-card
39. ______ attack makes computer resources unavailable to its intended users.
a) Virus
b) Worms
c) DDOS
40. _______ is one of the encryption schemes.
a) Digital Signature
b) Cryptography
c) Rail fence
41) In which view Headers and footers are visible _____.
(a) Normal View.
(b) Page Layout View.
(c) Print Layout View.
(d) Draft View.
42) To apply Center alignment to a paragraph we can press_____.
(a) Ctrl +S.
(b) Ctrl +C.
(c) Ctrl +C+A.
(d) Ctrl +E.
43) The space left between the margin and the start of a paragraph is called _____.
(a) Spacing.
(b) Gutter.
(c) Indentation.
(d) Alignment.
44) _____ is used to create organization chart.
(a) Smart Art.
(b) Tool Art.
(c) Mail Art.
45) A _____ identities a location or a selection of text that you name and identify for future re
reference.
(a) Hallmark.
(b) Bookmark.
(c) Realmark.
46) Hyperlink is available in _____ tab.
(a) File.
(b) Home.
(c) Insert.
47) What enables you to move directly to specific location in a document _____.
(a) Subdocuments.
(b) Bookmarks.
(c) Cross-references.
(d) Outlines.
48) Which enables us to send the same letter to different persons _____.
(a) Macros.
(b) Template.
(c) Mail merge.
(d) None.
49) _____ function gives you the sum of range.
(a) Sum.
(b) Count.
(c) Max.
(d) Round.
50) _____ function rounds up the number upto the specified number of decimal places.
(a) Sum.
(b) Count.
(c) Max.
(d) Round.
51) _____ function rounds the number up away from zero.
(a) Sum.
(b) Round up.
(c) Round down.
(d) Round.
52) _____ is a logical function.
(a) Sum.
(b) IF.
(c) Max.
(d) Round.
53) _____ function converts the string into title case.
(a) Upper.
(b) Lower.
(c) Proper.
54) _____ is to join two or more strings to make it one.
(a) Concatenate.
(b) Countif.
(c) Sumif.
55) _____ function returns the number of days between two dates.
(a) Day.
(b) Month.
(c) Year.
(d) Days 360.
56) _____ function returns the present value of an investment based on an interest rate.
(a) PV.
(b) FV.
(c) IRR.
(d) Rate.
57) _____ is used for analyzing your data with all perspective view.
(a) Sorting.
(b) Subtotal.
(c) Pivot Table.
58) _____ is a vertical search functions.
(a) HLookup.
(b) VLookup.
(c) PMT.
(d) IRR.
59. MCA fee is an example of _______.
a) Photo Editing Software
b) Quick Heal
c) Virus
d) Antivirus
60. To protect a computer from virus, you should install _______ in your computer.
a) Backup Wizard
b) Disk Clean up
c) Antivirus
d) Disk defragmenter
61. Which of the following is / are threats for electronic payment systems ________.
a) Computer worms
b) Computer virus
c) Trojans horse
d) All of the above
62. Key logger is a ______.
a) Firmware
b) Antivirus
c) Spyware
d) All of the above
63. To protect yourself from computer hacker, you should turn on a _______.
a) Script
b) Firewall
c) VLC
d) Antivirus
64. Firewalls are used to protect against _______.
a) Data driven attacks
b) Fire attacks
c) Virus attacks
d) Unauthorised access
65. ______ is a cybercrime.
a) E-mail hacking
b) Physical beating
c) Eve teasing
66. ______ is modifying raw data.
a) Salami Attack
b) E-mail Bombing
c) Data diddling
67. DOS stands for _______.
a) Distribution of Service
b) Denial of Service
c) Data of Service
68. Which of the following describes programs that can run independently travel from system to
system and disrupt computer communication _______.
a) Viruses
b) Trojans
c) Droppers
d) Worm
69. A ________ is a computer program that can replicate itself of user on and spread from one
computer to another.
a) Antivirus
b) Pen Drive
c) Mouse
d) Computer Virus
70. Authentication is _________.
a) Modification
b) Insertion
c) Hard to assure identify of user on a remote system
d) None of the above
71._______ are often delivered to a PC through an email attachment and are often designed to do
harm.
a) Spam
b) Email
c) Portals
d) Virus
72. When a logic bomb is activated by a time related event , it is known as ______.
a) Virus
b) Trojan horse
c) Time related bomb sequence
d) Time bomb
73. _______ refers to the crime of using the internet, email, or other types of electronic
communications to stalk, harass, or threaten another person.
a) Cyber talking
b) Cyber stalking
c) DoS
74. A ________ is a software program designed to secretly monitor and log all the key strokes.
a) Pay logger
b) Key logger
c) Mail logger

75) _____ refers to techniques for ensuring that data stored in a computer cannot be read or
compromised by any individuals without authorization.
(a) Data Security.
(b) Computer Security.
(c) Physical Security.
76) _____ is ensuring that information is not unauthorized persons.
(a) Confidentiality.
(b) Integrity.
(c) Authentication.
77) _____ is ensuring that information is not altered by unauthorized persons in a way that is not
detectable by authorized users.
(a) Confidentiality.
(b) Integrity.
(c) Authentication.
78) _____ is ensuring that the originators of messages cannot deny that they in fact sent the
messages.
(a) Confidentiality.
(b) Integrity.
(c) Non-repudiation.
79) _____ is ensuring that a system is operational and functional at a given moment.
(a) Confidentiality.
(b) Availability.
(c) Non-repudiation.
80) What is the name of the Act that governs Internet usage in India _____.
(a) IT Act 2000.
(b) IT Act 1999.
(c) Cyber Law Act 2001.
(d) Information Act 2000.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy