41. Saving a file from internet to computer is known as :
(A) Downloading
(B) Uploading
(C) Storing
(D) Weblinking
Show Answer
Hide Answer
42. A Uniform Resource Locator (URL) is a reference to a,
(A) Computer Resource
(B) Web Resource that specifies its location on a computer network and a mechanism for retrieving it
(C) Printer on the network
(D) Storage server on the network
Show Answer
Hide Answer
43. Which phase comes after execution in electronic market trade cycle ?
(A) Pre-sale
(B) After-sale
(C) Settlement
(D) Negotiate
Show Answer
Hide Answer
44. Which is not an example of G2C services ?
(A) e-visa
(B) e-transportation
(C) Digital police portal
(D) e-bay.com
Show Answer
Hide Answer
45. EFT stands for ___
(A) Easy For Taxes
(B) Easy Fund Transfer
(C) Electronic Fund Transfer
(D) Electronic Financial Transaction
Show Answer
Hide Answer
46. A malicious program that does not replicate automatically is,
(A) Trojan horse
(B) Worm
(C) Zombie
(D) Virus
Show Answer
Hide Answer
47. XLL definition is used along with XML to specify
(A) The data types of the contents of XML document
(B) The structure of XML document
(C) The presentation of XML document
(D) The links with other documents
Show Answer
Hide Answer
48. Which of the following is not a search engine ?
(A) Yahoo
(B) Bingo
(C) Google
(D) Windows
Show Answer
Hide Answer
49. Search engine which takes input from a user and simultaneously send out queries to third party search engines for results, is :
(A) Advance Search Engine
(B) Meta Search Engine
(C) Search tool
(D) Boolean Search Engine
Show Answer
Hide Answer
50. The search results are generally presented in a line of results often referred as :
(A) Tag List
(B) Search Engine Result Pages
(C) Search Engine Pages
(D) Category List
Show Answer
Hide Answer
51. Which of the following is not a recovery technique ?
(A) Deferred update
(B) Immediate update
(C) Two-phase commit
(D) Recovery management
Show Answer
Hide Answer
52. A statement that is executed automatically by the system as a side effect of a
modification to the database is known as :
(A) Assertion
(B) Triggers
(C) Referential constraints
(D) Insertion
Show Answer
Hide Answer
53. An integral part of database that can restore database to previous state before failure is called :
(A) Recovery Scheme
(B) Backup Scheme
(C) Restoring Scheme
(D) Transaction Scheme
Show Answer
Hide Answer
54. Drawing, photographs. movies and simulation comes under the category of :
(A) Animation
(B) Image
(C) Graphics
(D) Text
Show Answer
Hide Answer
55. Vector and ____ are the two types of computer graphics.
(A) Scalar
(B) Sector
(C) Rector
(D) Raster
Show Answer
Hide Answer
56 The ratio of vertical points to horizontal points and vice-versa is called
(A) Bitmap ratio
(B) Aspect ratio
(C) Pointer ratio
(D) Resolution ratio
Show Answer
Hide Answer
57. _______ is a technology that allows brick and mortar retail stores to send messages
directly to the smart phones of their customers by.
(A) Beacons
(B) Bitcoin
(C) Business CRM
(D) Big Data
Show Answer
Hide Answer
58. The ______ facility allows customers to purchase the items they want online, and pick them up from their physical store, merging the convenience of e-commerce with the benefits of physical retail outlets.
(A) Click and Send
(B) Click and Purchase
(C) Click and Reserve
(D) Click and Collect
Show Answer
Hide Answer
59. Use of internet to connect a wide variety of devices, machines and sensors for empowering brick and mortar stores by giving them the same access to data that online sto .. es have is a facility falls under which of the following technologies ?
(A) Artificial Intelligence
(B) Deep Learning
(C) Machine Learning
(D) Internet of Thing
Show Answer
Hide Answer
60. Which of the following is not a Java Code editor ?
(A) MS Word
(B) Netbeans
(C) Edit+
(D) Notepad
Show Answer
Hide Answer
Leave a Reply