0% found this document useful (0 votes)
43 views61 pages

Computer Eng Ocr

Uploaded by

iloggaque
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views61 pages

Computer Eng Ocr

Uploaded by

iloggaque
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

pe q ; —_ ae

‘ al Scate whether the following statements are


au (1) E-commerce focuses on the excha n Z
services through personal interactions.
Ans. False | iy ereutae® < ae
(2) In E-commerce delivery of goods or servie
Ans. False
(3) E-commerce has enabled rural areas to ace
and products, which are otherwise not a
them |
Ans. True
(4) The setup of the hardware and the software,
cost of employees, the constant mai
ntenan
upkeep are all quite cheap in case of
E-Cor
compared to in person sale.
Ans. False
(5) Execution Phase consists of in
Ans. voice and paym«
False
|
day 16)...
| In .C2C model, busi
intermediate |
ness Sells it’s
prod
buyer who then sells the
final customer. p
Ans, False 5
5
a ;
£¢ihe
.
5 ;
-
¢ th
ae
envices — cnable |
variety of public:
False xittaes
G2G proulded cata ‘ae
between domestic or foreign
True
E- Commerce provides — to face
False rie
Traditional commerce has a globe scope”
False
E-Commerce reduces paper work.
True
Intermediaries are allowed in E-Commerce. —

In B2C model, the business sells its productsto —


intermediate buyer. The buyer then sells the prods ct
the final customer.
False “hl

Invoice means the customer receives a bill for their


purchased product.
True ; .
Settlement means that the customer can issue a —
complaint about their product’s performance and get
maintenance service from the supplier vs
False aS:
E-Wallet is a type of posit paid account.
False Pies,
Social commerce is a type of e-commerce whiere there s :
online media that supports social interaction. .
True meage
EDI is a paperless exchange of electronic information.
True .
Trading partners are business entities condactaay
business electronically.
True
Mostly purchase orders and invoices are exc
EDI. : Fai
Ans. False merce delivery of goods or s
(26) In E-comm i
Ans. False we bled rural areas to a
merce has enaod! (i)
(27) Ts ducts, which are seen ice

i them AS
Ans. True | e
| (28) The setup of the hardware and the SoMwanty,
| cost of employees, the constant mainte
\, upkeep are all quite cheap in case of E-Co:
i compared to in person sale. a
\| Ans. False ‘ i : . i ee.
up (29) Execution phase consists of invoice and payme |
Ans. False ; i
(30) In C2C model, business sells it’s produc
intermediate buyer who then sells the produc
final customer.
Ans. False aI
(31) The success of a _ social commerce camp
measured by the degree to which consumers
with the company’s marketing through retwee
and shares. yo
Ans. True Pa
(32) The Government-to-employee refers to the gov
Services which enable citizens to get access
variety of public Services.
Ans. False

ee “cu Provides safe .and .. secure Mae el


bas Ailes Tease een domestic or foreign government.
(34) E. commerce on Provides ea
pane fas
face to face interaction.
(35) Traditi
Ne Ans. False ‘onal commerce Sh has a global scope _oz os
(39) In .
purchased product. :
Ans. True
(40) Settlement means that
complaint about their ‘peel 1
maintenance service from the su
Ans. False
(41) E-Wallet is a type of post paid account.
Ans. False r.
(42) Social commerce is a type of e-commerce wher
online media that supports social interaction. —
3

Ans. True
(43) EDI is a paperless exchange of electronic inf) . .
Ans. True
(44) Trading partners are business entities conduc tin
business electronically. a
- a ae a4,a

Ans. True
. ote EAY Oey gee), :

(45) Mostly purchase orders and invoices are exchanged |


EDI.
Ans. True ‘ie
(46) E-Governance delivers SMART governance.
Ans. True |
(47) The G2E is an internal part of G2G sector.
Ans. False ela
(48) Encryption converts coded form of data into plain 1 text.
Ans. False

Fill in the following blanks:


(1) Commerce is nothing but _ and
Ans. Buying, selling
(2) E-commerce is also referred as a exch
business information using EDI, E-mail, aed
Ans. Paperless or Online ae
(3) E-commerce provides the sellers witha ___
Ans. Global
ts ns:
store een for any future cuties
-wallet ae
E-w enables shoppers to get advic :
and services and tl
individuals, find goods
them.
=
Social commerce
is the electronic interchange |.
information using a standardized format.
« "Ae

Business entities conducting business elect iro


EDI

called ,
Trading partners -
Governance also focuses on geogrz
barriers.
G2G
is the relationship between
government
ey smeara ET

institutions and their —


G2E
ae

Encryption is widely used on the


=
ee i Saree

internet |
being sent between a browser anda
user information or data
.
Soe

Encryption converts
Sain

noeae

- Plain Text, Cipher into


Text
© phases of trade cycle include _,
umes

- Prre
NEes saal
FT lee.
, cus on, se ttle
ment.
Bank transfers are examples of
3 ae A dtattake slqnatin
document.
Ans. authenticity
(25) PKI stands for
Ans. public key infrastructure ;
(26) Commerce is nothing but __ and _
Ans. Buying, selling pale
(27) E-commerce is also referred as a
business information using EDI, E-mai |
Ans. Paperless or Online
(28) E-commerce provides the sellers with a
Ans. Global ia
(29) Electronic commerce also allows the custor
business to be in touch directly, without a
Ans. Intermediaries
(30) commerce has limited business noua
Ans. Traditional we ,
(34) Tn model, business selis its prodnen
customer
Ans. B2C
(32) In e commerce precess, Pre-sale consists.
like and : iret
Ans. Search,
-h, Negotiate
(33) In period , customer will ete
services for free or at minimus —-
Ans. warranty oi
(34) is a type of pre-paid account in
store money for any future online t
Ans. E-wallet
being sent between a bt
user information or data
Encryption converts into
Plain Text, Cipher Text
The phases of trade cycle inchales:

Presale, execution, settlement.


NEFF and IMPS are examples of
Bank transfers
A is an electronic “password”.
person, organization to exchange data
Internet.
. Digital Certificate
The __ phase of trade cycle constitutes w a
After- sales ,

The execution phase of trade cycle i

order and delivery


transfer includes sending money
another.
Bank
Decryption converts _into__-
Ans. cipher text, plain text
(49) .A signature guarantees the
> Ans. ete
(a) World Wide Web Communication Peas
(b) World Wide Web Cyber } 7 eS
(c) World Wide Web Consortium
:
(d) World Web Wide Consortium
Ans. (c) World Wide Web Consortium
x
RE) Rs sae eee that contains billions of documents in the
;
form of webpages, is one of the most popular services ee
on the internet.
;
(a) Web : (b) Web intemet rt
(c) Telnet | (d) FTP kei:
Ans. (a) Web #
(18) To access a webpage, an URL is required. What is the
full form of URL?
(a) Uniform Resource Locator (b) Universal Resource Locator
(c) Universal Resource Line (d) Uniform Resource Line
. (a) Uniform Resource Locator
A world wide web contains billions of webpages
(a) residing in several computers
(b) created using HTML
(c) residing in many computer systems linked together using HTML
(d) Both b and c
Ans. (d) Both b andc
(20) An interconnected network exclusively used within
organizations such as banking, business firms, etc that
uses web technologies for sharing data or information
internally is called ;
(a) Protocol (b) Intranet
(c) Internet (d) hypertext
. (b) Intranet
A computer network that is used to controlled access
from outside of an organization’s intranet is called
(a) Intranet (b) Frame
(c) Extranet (d) ISP
. (c) Extranet
A software program that is used to view web pages is |
called |
(a) site (b) host
(c) link (d) browser
(d) browser |
Ans.
(23) Every computer machine host on the internet network ©
has
(a) similar IP address (b) unique 15-digit number
(c) unique IP address (d) the same IP address
syster
(d) Allofthese
(d) All of these _ |

Skwords for aye


(a) Website
(c) Backup file | *

(d) Data base


Servers are computers.
computers connected to a
(a) Client
(c) Supercomputer
(d) Network
A program that is used to view v
(a) Browser ‘b
(c) Spreadsheet
(a) Browser ‘4
Which of the following is not
internet connection? —
(a) Satellite 3
(c) Dial up
(c) Dial up sige
A typical modern lat oo eisai i
(a) Valves
(c) Vacuum tubes
(b) LSI chips
What is the term for unsolicited E
(a) Spam
(c) Usenet
(a) Spam
(39) What is a backup? —
(a) Restoring the informs
(50) Worn was made
{a) one program
(c) three programs -
Ans. (b) two programs 4
(51) The ability to recover an

enforcement specialty called :


(a) robotics
(c) computer forensics
(c) computer forensics
Firewails are used to protect aaat ;
(a) unauthorized Attacks
(c) Data Driven Attacks
» (a) unauthorized Attacks
dunk e-mail is also called
(a) spam
(c) sniffer script
(a) spam

(a) Social networking sites - ‘(b) Mobile F


(c) E-mail (d) Cyberc
(b) Mobile Phones. .
Back up of the data files will es to
(a) loss of confidentiality
(c) virus infection
(d) loss of data
What is backup? Zoe
~ (a) Adding more components
“(b) Protecting data by cops
different destination ae
. (c) Siven's fe ears
. differe| aye oe
(57) ss Cam be used to minimize the
breaches or viruses. — ive
(a) Firewall (b) Backups _
(c) Encryption (d) Digital sonnel
Ans. (a) Firewall
(58) Software, such as viruses, worms and Trojan
that has a malicious intent is known as: .
. (a) spyware (b) adware a
(c) spam (d) malware |:
Ans. (d) malware : |
CSI} FA ncccnses sometimes called a boot sector virus, executes _
when a computer boots up because it resides in the
boot sector of a floppy disk or the master boot record of
a hard disk.
(a) system virus (b) Trojan horse virus
(c) file virus (d) None of these
Ans. (a) systern virus
(60) ieee cae are often delivered to a PC through an email
attachment and are often designed to do harm.
(a) Viruses (b) Spam
(c) Portals (d) Email messages
Ans. (a) Viruses
(61) A result of a computer virus can not lead to ......
(a) Disk Crash (b) Mother Board Crash
(c) Corruption of programs (a) Deletion of files
Ans. (b) Mother Board Crash
(62) hie a is science that attempts to produce machines
that display the same type of intelligence that humans
do.
(a) Nanoscience (b) Nanotechnology
(c) Simulation (d) Artificial intelligence
Ans. (d) Artificial intelligence
(63) If you receive an e-mail from someone you don’t know,
what should you do ?
(a) Forward it to the police immediately
(b) Delete it without opening it
(c) Open it and respond to them saying you don’t know them
(d) Reply and ask them for their personal information
Ans. (b) Delete it without opening it
(64) Secret key is used in
(a) Public key cryptography —_ (b) Symmetric cryptography
—— |4
ie () Petoeste Wea capaneole ;
(65) ......... is a specialized form of of
(a) Spoofing Ore
(c) Eavesdropping —
Ans. (d) Phishing
“QOG)L . cderesesiee involves some one macrotis -
else.
(a) Spoofing (b) Usiauthorizeed action
(c) Eavesdropping (d) Phishing
Ans. (a) Spoofing
(67) When information about transactions is tradeaniilall in
transparent way hackers can catch the transmissions to — aq
obtain customers sensitive information. This is known

(a) Spoofing (b) Unauthorized disclosure


(c) Eavesdropping (d) Phishing
Ans. (b) Unauthorized disclosure
(68) A competitor or an unhappy customer can alter a
website so that it refuses services to potential clients.
This is known as ........
(a) Unauthorized action (b) Unauthorized disclosure
(c) Eavesdropping (d) Phishing
Ans. (a) Unauthorized action
| Seat can catch the transmissions to obtain custanmane
sensitive information.
(a) Firewall (b) Antivirus
(c) Hackers (d) None
Ans. (c) Hackers
CPO). cincickcante is online identity theft.
(a) Eavesdropping (b) Phishing
(c) Spoofing (d) None of these
Ans. (c) Spoofing
(71) Which of the following is not a risk in internet based
transaction
(a) eavesdropping (b) spoofing
(c) encryption (d) unauthorized action
Ans. (c) encryption
(72) A security tool to verify the authenticity of the message
and claimed identity of the sender and to verify the
message integrity is .
=

(a) encryption (b) firewalls =


(c) digital certificates (d) digital signature —
ee All of these
Ans. (a) Books
(27) Which of the following is not a party of SSCM? ps
{a) Suppliers aed, (b) Manufacturers Me:
(c) Distributors (d) Customers — Seiad,be
Ans. (c) Distributors es ae
(2B een as. is a function of E commerce. es. Bs
(a) Marketing (b) Supply Chain :-
(c) Finance ion (d) All of the abate oY
Ans. (d) w of the above — :
WOR thie Face: mainly deals with buying | andl
- especially on a large scale. i ae
(a) Shopping (6) Commerce “yee
(c) Retailing (d) Distribution ae:
Ans. (b} Commerce
(26) E-commerce has .......... scope than E-Busi
Digital Business.
(a) Higher | (b) Narrower
(c) Wicer (d) More
Ans. (b) Narrower |
(BE) censtinstere is «a system of interconnected
components or circuits. ‘Ta
(a) Electronic Network (b) Malietoineda | alam
(c) Electronic Markets ~ (d) Metamarkets
Ans. (a) Electronic Network gel
(32) All electronically mediated information exc!
referred to as ........... . ‘s
(a) E-Business
_(c) E-Commerce
Ans. (c) E-Commerce
(a)B2G ©
(c) B2B
Ans. (b) B2C |
(42) Which of thie following is wok”
commerce? —
(a) Distributors -
(c) Publishers
} Ans. (d) None of the above ;
[$438) ct lla allows transactions among | {
j
i ion
dealers through supplying complete ‘akafo:
i ancillary services, without being concerned z
| . actual exchange of products and offerings ama
parties.
(a) Middlemen (b) Metarnediary
(c) Intermediary (d) All of the following
Ans. (b) Metamediary
(44) Which of the following is NOT a B2B E-cominenia |
(a) Sending and receiving orders
(b) Invoice and shopping (c) All of the above
\| (d) None of the above
Hi Ans. (d) None of the above |
} (AD). inci feta. lets in a commercial enterprise utility at
ie computer of one organization to speak immediately
ih | the commercial enterprise utility at the computer o
Hl other company
(a} EDI (b) Business applications
(c) Standards (cd) Protocols
Ans. (a) EDI
(46) What is ‘EQQ’ in Inventory control?
(a) Economic Occuring Quantity(b) Economic Order x lal
(c) Economic Over Quantity —_ (d) Economic of Quantity _
Ans. (ob) Economic Order Quantity a
(47) The digital signature is:
(a) A form of security for electronic records
) (b) Copy
(c) Task (d) Area
Ans. (a) A form of security for electronic records
(29) poste instruments are defi
(a) Section 52 of the Banking regulation
25 of the Reserve bank of I
(b) Section
(c) Section 13 of the Negotiable instrume
(d) Section 14 of the companies act, 1956. _
_ Ans. (c) Section 13 of the.Negotiable instruments act,
(30) Who is primarily liable on a promissory 1
(a) Holder. . (b) Maker.
(c) Drawee. (d) Endorser.
(b) Maker.
A Cheque is glvaus PRES Sy.on wah ssteeacan ne d
(a) demand. ; (b) a specifiedfi
(c) the last day of the grace.
(d) the will of the paying banker.
(a) demand. a as
A promissory yin uae : By
(a) can be drawn in sets (b) cannot be dr ;
- (c) indemnity bond is also necessary. f
(d) indemnity bond is not necessary.
Ne cannot be drawn in sets
@ promissory no
(a) necessary chet merce ae
(b) not caine: to insert
(c) not
(c) Drawer. :
. (c) Drawer . : 3
A bill of exchange: fa dy
eeheeeeseen &

(a) 90 days. a ee
(c) 180 days. / (djs
(c) 180 days. ar:
Expansion of HDFC ........... soscocsqe oi) 34 tame
(a) Housing Development Finance (¢ Wee),
(b) Housing Development Finance Gavcenaa =. e
(c) Housing Development Finance Co-operative—
(d) Housing Development Finance Community
Ans. (a) Housing Development Finance Corporation
(38) Negotiable gives to the transferee ............... -
(a) the same title (b) no title
(c) no better title | (d) better title
Ans. (d) better title e =
CAO scsi is a dead cheque. mci
(a) Post dated cheque (b) Stale cheque. ak 2
{c) Ante dated cheque. (d) Pre dated cheque
Ans. (b) Stale cheque.
(40) RBI refers to .............. a.
(a) Reserve Bank of india. (b) Revenue Bank of ret pie
(c) Rupee Bank of India (d) Regional Bank of India
Ans. (a) Reserve Bank of India ‘ra
(41) Name the person to whom the amount of the cheq
payable?
(a) Drawer. _ (b) Payee.
(c) Drawee. (d) Acceptor
Ans. (c) Drawee.
(42) Which is a private bank? |
(a) SBI.
(c) JOB.
| (b)(d) Indian
Ais babies
bank.
a
Ans. (b) Axis bank . . pee
(43) The best suited deposit for trading communi
(a) Savings deposit (b) Current depos:
2 ya ide holder in due course. ae
- (46) The law of limitation < iE + ve = 13 fs

account from the date of sssrseese =


~ (a) opening it.
(c) demanding it.
Ans. (a) opening it.
- (47) The “et liquid asset is .............

ceenem x Be eee,
(c) Sean
Ans. (d) cash.
(48) According to IBA the maximum period
deposits can be obtained is ...........0 |
(a) no limit | (b)5 years
(c) 7 years wie (d) oo wih
Ans. (c) 7 years isi ;
(49) The right of set - off iis nothing but a ...
(a) right to sell. | (b) right to r
(c) right to combine (d) aie toz aD)
Ans. (c) right to combine

(a) clean advance (b) pre


(c) neither clean advance nor dectal 3 dva in
(d) unsecured advance ;
Ans. (c) neither clean advance nor Scnaie
(51) Expansion of SWIFT 18 i ssecistieee:
(a) meee Bank-level planning’:
(b) only Bank-level planning, c : ;
(c) bank-level planning, control fu
(d) only services to the branches
Ans. (c) bank-level planning, control functions
(63) Core banking is Rue. vee branch
model. a
(a) Geceninled:
(c) unified |
Ans. (a) decentralized He
(64) The objective of compiierizaiian in India
(a) replace men with machines ee
(b) make the work-life more meaningful ees 2
(c) control the manpower _(d) control the e
Ans. (a) replace men with machines | is
(65) ATMs are gress: used for performing
_ functions. i
(a) infrastructure (b) computer-based
(c)banking = = ss) i
Ans. (c) banking _ te
(66) .In the early 1990s, which ‘Loge of ATI
appearance in India?
(a) Multi-user ATM. — Ne
(c) Branch ATM » afd) Ste
. Ans. (d) Stand-alone ATMs
4 eeeeee

(a) Electronic Clearing system (b). Elec


(c) Electronic cross Rae (d) Elec}

as fo Katonah =
| -(@) IRDA by

Ans. (()RBL
(69) How many public sector banks deat
available?
(a) 27 © (b) 32 —
(c) 28 (30 a i
Ans. (a) 27 Be
(70) How many scheduled” anmlancel ‘watts have
facility available? ee ela
(a) 35 (b) 45 sie
(c) 55 (d) 65
Ans. (c) 55
(71) How many centers have EFT facility available?
(a) 15 centers (b) 14 centers.
(c) 13 centers. (d) 12 centers
Ans. (a) 15 centers
(72) Any EFT limit on the amount of individual transaction?
(a) No limit. (b) Rs. 5,00,000. —
(c) Rs. 50,00,000. (d) Rs. 25,00,000.
Ans. (a) No limit.
(73) is a technology that allows you to access your
bank account from a mobile device.
(a) Home banking (b) Mobile banking
(c) Internet banking. (d) Television banking
Ans. (b) Mobile banking
(74) Which has been made possible by the application of
information technology?
(a) Date mining. (b) Date warehousing .
(c) Databases. (d) Support systems.
Ans. (b) Date warehousing
(75) eiucdesereneenee is a technique to reveal the strategic
information hidden in the data warehouses.
(a) Data mining. (b) Data warehousing
(c) Data bases (d) Support systems
Ans. (a) Data mining 3
(76) sdpekedeeattusaes is the demographic information about
customers to help banks focus on particular segments
(a) Date mining | (b) Date warehousing
(c) Data analysis (d) Support systems
Ans. (c) Data analysis <
(77) spdicedeeoitesiads is to analyze the performance of a set of
securities and fundamental data of the companies that
issue the securities.
(a) Date mining (b) Date warehousing
(c) Data analysis.
has. 7 EDIFACT sad :
(80) Communication technology ......-----++++ e
(a) facilitates the processing of data.
_(b) helps in transmission of data
(c) enables decision support system.
(d) is a tool for data mining.
Ans. (b) helps in transmission of data ‘<0 ae
(81) Which of the following is the gateway in
services worldwide?
(a) Satyam online (b) BSNL.
(c) MTNL (d) VSNL.
Ans. (d) VSNL
(82) When SHIFT network was came to India? —
(a) December 2, 1991.
(c) December 3, 1991.
Ans. (a) December 2, 1991
(83) How many standard message categories in §
(a) 10 types (b) 9 types
(c) 8 types. _.. (d) 7 types.
Ans. (b) 9 types ra
(84) The banking operations are carried thr
banking office is ......... mae
(a) branch banking
— (c) commercial npokding:
Ans. (b) unit banking _
~ tb) cash reserve raile :
During 1969, how many ba ks
ja) 150 (b
(c) 16
(a) 15
(a) 7
(c) 5
. (b) 6
The _
(a) SBI
(c) IOB
(b) ICICI
Which commitiee recommended
private sector banks in India? _
(a) Dr. Rangarajan committee. (b) } :
(c) Rajendran committee. (d) G
. (a) Dr. Rangarajan committee
RBI was set up in the year .......... .
(a) 1935.
(c) 1933
(a) 1935 c a
sessseseeeeeseee has been cons
having perpen successic
+e
cour, kno Bide;
crs RBI order.
Ans. (a) garnishee order : ey
(98) A Garnishee order is an order issued byt‘ew
(a) Income tax officer (b) official lquicais
(c) court. (d) RBI Fs
~ Ans. (c) court
(99) The deposit with the bank for a fixed partaae
- een at the time of making the deposit is’

(a) said deposit (b) current deposit


(c) bank deposit (d) fixed deposit
Ans. (d) fixed deposit .
(100) The minimum period for which a commercial bank |
accept term deposit is ................
(a) 7 days (b) 15 date
(c) 30 days - (d) 60 days. a
Ans. (a) 7 days
(101) Interest on fixed deposits is compounded
.............. —
(a) monthly
a

(b) quarterly.
=

ss
(c) half yearly d) yearly basi ae
Se
ite

Ans. (b) quarterly


8
=

— ag
+

(102)A banker should not stop


operation of the z
=

customer
(a) dies. his busines sao! becomes =
(chines ni a.
Pee
(c) Narrower _
Ans. (c) Narrower aia
(124)... is a system
components or circuits.
(a) Marketplaces
{c) Electronic Markets
Ans. (d) Electronic Network

known 4s ........... .
(a) E-Business
(c) Digital Business
Ans. (b) E-Commerce _
C126) sis ..... are markets connectaea
communications networks and powe:
computers. ;
(a) Marketplaces (b) Metan
(c) Electronic Markets | (d) Elec
Ans. (c) Electronic Markets |
(127)............ is NOT an example of
(a) Amazon Pantry ~
(c) Flipkart Plus ee
Ans. (b) Reliance SMART
(128)..............-. refers to i
via social media.
fa) Sees
$ Network
Pe eee

aes fol Sot Entbeaitas” ales


eee ee ark also knot
ee elie (a) Social Enterprise — -(b) Si
a (c) Collaboration Commerce —4ak
~ Ans. (b) Social Collaboration
(132) Collaboration word is derived from tate yor
(a) Collabrica (b) Collaberance — gd
i (c) Collaboratio (d) Collaboraze
i Ans. (c) Collaboratio . a
i (133) EC in EC Business models stands for .....0.- 0
i (a) E-Connected (b) Electronic Commerce —
i (c) Essential Commerce (d) Electric Commerce
q Ans. (b) Electronic Commerce
i (9S4) ooo. 0ies is part of the four main types for e-commerce.
i (a) B2B (b) P2P
h (c) C2A (d) All of the above
Ans. (d) All of the above
(135) Companies like Flipkart, Shopclues and Myntra belo
1 ia to the ......... Ecommerce (EC) segment.
ih (a) B2B (b) P2P
1 it (c) B2C (d) C2B
Ans. (c) B2C car
(136) OLX is an example of ............. E-commerce coaaal a
(a) B2B (b) B2C =
(c) C2B (d) C2C ———
Ans. (d) C2C a
=
pay a fixed amount, eae
(137)Customers
quarterly or annually, to get some type of : és :
known as .......... E-Commerce Business Model.
(a) Licensing (b) Transaction 15
(c) Affiliate (d) Subscription
Ans. (d) Subscription
(138) This E-Commerce business model main
ly ;
selling products or services online.
a
(a) Indirect Marketing _
(c) Online Direct Marketing pe Beck & Mortar “§
Ans. (c) Online Direct Marketing .
(1389) 2424 is related to software —
commerce applications. _
Ans. te) Droseniiclaes a a
(141)............ type of E-Comm
dealings between busine 2S
(a) Business To Customer _
(c) Business To Business
Ans. (c) Business To Business —
E-Commerce _

(a) Affiliate
(c) Transaction
Ans. (b) Advertising
FDI permitted B2B E-com !
marketplace model of e-commerce. _
(a) 100% — (b) 50%
(c) 65% a3 (d) 30%
Ans. (a) 100%

(a) OLX
(b) Tata communications network provider oe a mn
(c) Amazon (d) Blog Paes e
Ans. (c) Amazon
(145)In this model, consumers have pre du
value that can be consumed by bus
(a) B2C pie oe CoC”
(c) C2B —(@)B
Ans. (c) C2B .
(146) Which of the following is not a
Commerce?
(a) Credit card
aii: (c) Bank transfer
(150) E-commerce was originated in:
1950 (b) 1970
a 1980 | (d) 1990
Ans. (b) 1970 ie
(151)Communication is the — Ces,” _ s

(c) Process _ (d) None of the above

(1) In which of these a person is continually ; chi


followed by another person or a group of var
people?
(a) Identity theft (b) Stalking
(c) Bullying (d) Phishing 7’
Ans. (b) Stalking oe
(2) Which of these is an antivirus program type? : te @
(a) Kaspersky (b) Quick heal re bE.
. (c) Mcafee (d) Allofthe above “fl
Ans. (d) All of the above i ae
en can be a hardware device or a soft
program that filters all the packets of data hat c
through a network, the internet, etc.
a
fs Mabon (b) Antivirus
Ans. (a) Firewall be -
. + + 3a
See
(4) Which of these would refer
to the expl ' ation
ethical behaviours that are related
to the
a (a) “ amtervoar, . ri Pari
(c) Angry IP Scanner |
Ans. (c) Angry IP Scanner | (ae
(7) Which of these is NOT a scar i
(a) Null Scan b
(c) SYN Stealth
Ans. (d) Cloud Scan *
(8) The Code Red is a sort of B veeeeeseeeeesees
(a) Video Editing Software
(c) Photo Editing Software
1 Ans. (b) Computer Virus sie
(9) Which of these is also malicious conuaers
(a) Badware (b) Malicious. Wiel ae
~ (c) Malware (d) leo bisa es
' Ans. (c) Malware inka
i (10) We use the transit time and the response —
measure a network’s ............... BS
(a) Reliability ; (b) Performan st
(c) Longevity (d) Security =
.
Ans. (b) Performance
(11) Which of these is the world’s very first
program? ,
(a) Tinkered (b) Creeper hi
(c) Ray Tomlinson (d) Reaper - rea
Ans. (d) Reaper 2353 i Bi
(12) The Hacker who did break the SIPRNET + sy

(a) Kevin Poulsen


(c) Kevin Mitnick
Ans. (a) Kevin Poulsen

would be transformed?
(a) Plain text
(c) Complex text
(a) Plain text 1
Ans.
Bs jaf) Which of the following malware t
replicate itself — fection
(a) Viruses ~ (b)
ee (¢) Trojans
e
@ All a the. shavve
Ans. (a) having to remember «
(24) The new favouriteset
title of Web page. _
- (a) field ©
(c) short cut
Ans. (c) short cut
(25)

(a) WP-Link
(c) Field
Ans. (b) Bookmark
(26) What is the name of the list that pret
web pages and links visited in the past few ¢
(a) Link list (b) Page list =
(c) History list (d) Lish: 3°5 eine
Ans. (c) History list
(27) What is a web site? . ae aye
(a) A place from where we can get
and files
(b) A site that is owned by any oe company
(c) A location on the World Wide Web
(d) A piace from where we can access internet —
Ans. (c) A location on the World Wide Web.
(28) In 1960 E-mail was known as : : ott
(a) CNBS. (bo) CBMS.- ee:
(c) B.N.CS. ()CSMB
Ans. (b) C.B.M.S.
(29) Which of these describes an ongoing
individual/group?
(a) Stalking
(c) Phishing
Ans. (a) Stalking
] (30) Which one of the following is |
of computer threats? ; Ves
(a) Soliciting (b) De
(c) Phishing (d)|
Ans. (b) DoS attack
_ (31) Which of the following t ype
online activity the victim en
ges in the backareues: -
iA | ai ong |

(a) Null Scan :


(c) SYN Stealth
. (d) Cloud Scan ra
_ The Code Red is sin
(a) Photo Editing Software
(c) Video Editing Software —
(d) Computer Virus
Which of these was the
created?
(a) Reaper
(c) Creeper
(a) Reaper
What kind of malware does n
through infection?
(a) Rootkits
(c) Viruses
(d) Trojans

(a) Hex
(c) URL
. (c) URL

(a) Crackingee
(c) Information gathering
(a) Cracking passwords ea
Which of the following desk ribes
scanning? |
(a) Client, Server, and network pent

(c) Port, network, and ranicna: ‘itis


(d) None ofthe above =
Ans. (b) Network, vulnerability, and px
(48) Determine the attack type
ee (a) Scalar test — oF
(c) Complex test
Ans. (b) Plain test ei
(59) What does CHAP st
(a) Circuit Handshake Au t
(b) Challenge Handshake Auther
(c) Circuit Hardware Authenticat
(d) Challenge Hardware Authenticati:
(b) Challenge Handshake hither icat
Which of the followin is — |
encryption? — >
(a) WPA |
(c) WEP
(c) WEP
Which. of the items listed bel
security protocol? hy ae
(a) SFTP |
(c) SMTP
Ans. (c) SMTP | F
(62) What is used for ensvasion data at t!
(a) IPSec _(b) S/MIME
(c) SMTP
Ans. (a) [IPSec
cad What does PCT stand for?
(a) Private Connecting Technology
(b) Private Communication Technique —
(c) Personal Communication Tec a
(d) Private Communication Technolo”
Ans. (d) Private Communion NaatTes chnology _
To hide information i
used?
(a) Rootkits
(c) Steganography
(c) Steganography eo
Which phase of hacking performs
network or system?
(a) Reconnaissance
(c) Scanning
- (d) Gaining Access gent
Attempting to gain access toa noida I
employee’s credentials is calles the. gs
of ethical hacking.
(a) Local networking en
(c) Physical entry _ (d) Remote ni
Ans. (a) Local networking
(79) Which of the following is not a typical ¢
an ethical hacker?
(a) Excellent knowledge of Winds
two
(b) Understands the sabi: of exploiting n1etu |
vulnerabilities. ‘he,
(c) Patience, persistence od passevanee
(d) Has the highest level of security for the
Ans. (d) Has the highest level of security for the
What is the proper command to perfo1
(80)
XMAS scan every 15seconds? —
(a) nmap -sX sneaky
(c) nmap «Ss oe
. Ans. (a) nmap -sX «
| (d) aliasing acest concerns Sw
use of a system. ; i
Ans. (b) Additional unused fextiwed on com!

| (84) ie Aisi phase of hacking aa TT qn ome


he
of which foundation of security?
(a) Availability (b) Confidenisalll
!
B27. ~ fe} integrity. (d) Authentication —
Ans. (b) Confidentiality om
(85) How is IP address spoofing detected?
(a) Installing and configuring a IDS that can read bs
(b) Comparing the TTL values of the actual ands
addresses A tf
(c) Implementing a firewall to the network
(d) Identify all TCP sessions that are initiated bata
complete successfully |
Ans. (b) Comparing the TTL values of the actuallo
_ eaannes

“(@)To dent Wve systems —_{b) To locate live y


-,_ Ans. (©) To identify open ports
(a) To identify live systems
(d) To locate fires I
(87) Which of the following will allow{
(Ping without detection?
a
:
Digital Awareness : Cyber Sec
(89) What is the most important activityin system
(a) Information gatheririg (b) Cracking passwords
(c) Escalating privileges (d) ali tracks |
Ans. (b) Cracking passwords .
(90) A packet with no flags set is which type of scan? eae
(a) TCP : (b) XMAS . i
(c) IDLE (d) NULL i eu oe
Ans. (d) NULL
(91) Sniffing is used to perform ........ biaielivia omental
(a) Passive stack (b) Active stack
(c) Passive banner grabbing (d) Scanned
. (a) Passive stack
Phishing is a form of ................... fe
(a) Spamming (b) rele Theft he :
(c) Impersonation (d) Scanning
Ans. (c) Impersonation
(93) Why would HTTP Tunneling be used? .
(a) To identify proxy servers _(b) Web activity is not scanned
(c) To bypass a firewall
(d) HTTP is a easy protocol to work with
Ans. (c) To bypass a firewall
(94) Which Nmap scan is does not completely open a TCP
connection? 5
(a) SYN stealth scan (b) TCP connect
(c) XMAS tree scan (d) ACK scan
Ans. (a)-SYN stealth scan
What protocol is the Active Directoey database based
on?
(a) LDAP (b) TCP
(c) SQL (d) HTTP
. (a) LDAP
Services running on a system are deterssisil by «ude ;
(a) The system’s IP address. __ (b) The Active Directory —
(c) The system’s network name (d) The port assigned
_ Ans. (d) The port assigned
(97) What are the types of scanning?
(a) Port, network, and services
(b) Network, vulnerability, and port
(c) Passive, active, and interactive
(d) Server, client, and network
Ans. (b) Network, vulnerability, and port
(98) Enumeration is part of what phase of ethical hacking?
(a) Reconnaissance (b) Maintaining Access —
(c) Gaining Access (d) Scanning »
Ans. (c) Gaining Access |
found in dictonary: ;
(b) An attempt to crack feet sae
dictionary word with numbers and symbo
(c) An attempt to crack passwords using a
characters, numbers, and symbols.
(d) An attempt to crack passwords by re
numbers and symbols.
Ans. (b) An attempt to crack passwords by aE
dictionary word with numbers and symbols.
(101) What is the best statement for taking advantage 0
weakness in the security of an IT system? = :
(a) Threat (b) Attack
(c) Exploit (d) Vulnerability
Ans. (c) Exploit
(102) Which of the following statements best describes a
white-hat hacker? j
{a) Security professional (b) Former black hat ie
(c) Former grey hat (d) Malicious hacker
Ans. (a) Security professional me:
(103) A security audit performed on the internal network of
an organization by the network administration is alse
TSAO WHE CG 2 nass cesses deine 2
(a) Grey-box testing (b) Black-box testing
(c) White-box testing (d) Active testing
(e) Passive testing
Ans. (c) White-box testing
(104) What is the first phase of hacking?
(a) Attack (b) Maintaining access
(c) Gaining access (d) Reconnaissance
(e) Scanning ' ny
Ans. (d) Reconnaissance aan ga
(105) What type of ethical hack tests access to the | h
infrastructure?
| (a) Internal network (b) Remote nebwote
(c) External network _ (d) Physicol agate
Ans. (d) Physical access _ Pa
(106) The security, functionality, ann ease oft
illustrates which concept?
(a) As security increases, functionality ar
| (b) As security decreases, functionaiie sas
(108) Hacking |
(a) Active ha
(c) Activism —
Ans. (b) Hacktivism |
(109) When a hacker atte upt:
: Internet it is known . i
(a) Remote attack —
(c) Local access —
Ans. (a) Remote attack
(110) Which of the following is a tool
footprinting undetected?
(a) Whois search
(c) Ping sweep
Ans. (a) Whois search

footprinting?
(a) Scanning
(c) System hacking.
Ans. (a) Scanning
(112) What is footprinting? : eas
(a) Measuring the shoe size of an ethical}
(b) Accumulation of data by gathering
(c) Scanning a target network to detect o
(4) Mapping the physical layout of a targe
Ans. (b) Accumulation of data by gathering infec
(113) Nslookup can be used to gather infc >
which of the following? |
(a) Host names and IP addresses (b) Who
(c) DNS server locations ae
(d) Name server types and operating ;
Ans. (a) Host names and IP addresses
(114) Which of the following is a t
(a) Shoulder surfing “sh
(c) System on pistes 7:
Ans. (a) Shoulder surfing =
5) Which is an :
ct re
(a) ies% ‘(ae oat

CG; ; i
(2) Which state has salt t
to curb fake news on social
(a) Kamataka ee
(c) Tamil Nadu Serer)
Ans. (a) Kamataka ©) lu) Cui 4
(3) Which social a platform hi
viewing the posts to fix data s
(a) Facebook
(c) Instagram
. (b) Twitter |
‘Blue subscriber service’ is a premium s
social media —— ¢] kt
(a) Facebook sf al ‘Bwitter, at
« sina .
(c) Whatsapp (d) Instagram. ods
Ans. (b) Twitter aS Ped ee
(5) With reference to the Information
(Intermediary Guidelines and ‘Digital © I
Code) Rules 2021, consider the following
(a) A significant social media intermedia
media platform with more. than 50 Lakh
in India
(b) The rules make compulsory “for ‘
intermediaries to appoint Grievance Red:
(GRO) who should be a resident in India —
Which of the above is / are correct stat 2 a aa
(a) Only (a)1 is correct ~ ‘(b) Only (b) is con : 4 ce
(c) Both (a) & (b) are correct (d) Neither ), poe )
Ans. (c) Both (a) & (b) are correct wee
(6) Which Union Ministry has announced 1 > sel
‘Grievance Appellate Committees’ ta, solv
media users’ grievances? ;
(a) Ministry of Electronics and infostrentins ie
(b) Ministry of Science and Techies |
*
; (c) Ministry of Communication ~ivepdcesl
(d) Ministry of Home Affairs ty “i 33
(a) Ministry of Electronics and Inf
Which social media ei >
Post Payments Bank in Septemt
Ans
se oenehal inclusion in repens citi
Ans. (a) LinkedIn ea
(10) What is the ideal character -timit a
efapdZO! eeicel aes nue phe on c
(c) 160
Ans. (b) 140. sion
(11) What is the maximum » Hength of av
Reels?
(a) 30 seconds
(c) 90 seconds
Ans. (b) 60 seconds
(12) Which social edie nintioeaid is ‘know! tor its
video content?
(a) Facebook (b) Twitter
(c) TikTok (d) Instagram
Ans. (c) TikTok
(13) What is the recommended image size for

(a) 600 x 315 pixels (b) 940 x 788 pixels


(c) 1200 x 630 pixels (d) 1600 x 900 pixels _
Ans. {c) 1200 x 630 pixeis |
(14) Which social media platform is best for visual ;
(a) Facebook (b) Twitter ‘lie
(c) Instagram — (d) LinkedIn 5
Ans. (c) Instagram at
(15) What is the maximum length of a LinkedIn. he
a) a eibiraeiors (b) 70 characters —
Cc characters — d) 10 characters —
Ans. (b) 70 characters i a
(16) What is the recommended aspect ratio.
aye peg

{a)fe) 4:31:1 | (b) 16:9 = = 28


“a rie ; fe PES sie
Ans. (a) 1:1

aia’ Beeb mort olmedia platform is |


® 2
Hess
c) Toit
ee iitan: “(

) P i n e a l es
An s. (d
W h a tis th e m a ximum
(2) ters
(a) 140 charac |
500 characters .
-_(c)
characters
- Ans. “(d): 1000
What is the adiclisiaal ler
(33) description?
(a) 100 characters
(c) 300 characters
- Ans. (c) 300 characters Sar ery
(34) Which social media plaiteetl is best for
marketing? —
(a) Facebook ~
(c) Twitter
Ans. (b) Instagram ~ nad
(35) What is the maximum Leila of a.
| eee ;
a ‘characters 7

. (c) 1500 characters ie

G0. hich oh mma a platform ‘is best


ch oe media
BAO Eee
. 2

Ans. (a) Fenebdek | ee


(51) What is the maximum fenath rie
page update headline? gt ae
{a) 70 characters
(c) 130 characters
Ans. (b) 100 characters
(52) Which social media platform is best for
. traffic? Ag
(a) Facebook (b) Instagram eae
(c) Twitter (d) LinkedIn
Ans. {a) Facebook ae.
(53) What is the maximum length of a Twitter ha
(a) 20 characters (b) 25 characters —
(c) 30 characters (d) 35 characters” F
Ans. (c) 30 characters ane
(54) Which social media platform is best
storytelling? |
(a) Facebook (b) Instagram
(c) Twitter . {(d) LinkedIn
Ans. (b) Instagram

in-stream ni see aor!


(a) 15 seconds (b) 30 seoneuae sa!
(c) 45 seconds ; (d) 60 seconds ae
(b) 30 seconds 3
Which social media — is best
advocacy? =
(a) Facebook
_(c) Twitter
_(d) Linkedin
Which social media platform
_ awareness?

You might also like