0% found this document useful (0 votes)
21 views

Ec Imp Questions

The document discusses key aspects of e-commerce including client-server models, electronic markets, supply chain management, and the pillars of e-commerce. It provides definitions and examples of various e-commerce terms and applications. The document is made up of multiple choice questions and answers related to e-commerce topics.

Uploaded by

vishnu vardhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Ec Imp Questions

The document discusses key aspects of e-commerce including client-server models, electronic markets, supply chain management, and the pillars of e-commerce. It provides definitions and examples of various e-commerce terms and applications. The document is made up of multiple choice questions and answers related to e-commerce topics.

Uploaded by

vishnu vardhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 102

1 Clients are devices plus software that request information from servers or interact known as

1.All
2.message ordering
3. message passing
4.generating message
5.
Answer = 1 marks = 2

2 The consumer oriented application Coursera fits into _________


1.Entertainment
2.Financial services
3.Essential Services
4.None
5.
Answer = 4 marks = 2

3 Which of the following factors drive customers towards e commerce applications?


1.How much customers are willing to spend?
2.Will it excite the customer?
3.All of the above
4.How much customers are willing to spend? & Will it excite the customer?
5.Giving Freebies to section of people
Answer = 3 marks = 2

4 The client server model, allows client to interact with server through
1.None
2.request only
3.send and receive messages
4.request-reply sequence
5.
Answer = 4 marks = 2

5 Multimedia Storage Servers & E-Commerce Applications


1.All
2.Video Servers & E-Commerce
3.Internal Processes of Multimedia Servers
4.Client-Server Architecture in Electronic Commerce
5.
Answer = 1 marks = 2

6 Components of Multimedia
1.Hologram
2.Animation
3.Numerical Data
4.All
5.
Answer = 4 marks = 2

7 Easy and inexpensive connection of various organizational segments to form a internetwork is


called as_____________
1.Anatomy model
2.Work Group Collaboration
3.Mercantile model
4.Framework group
5.
Answer = 2 marks = 2

8 Full form of QDPMM


1.Quick & Dirty Personal Money Management
2.Quick & Dirty Personal Memory Management
3.Quick & Distributional Personal Money Management
4.Query& Dirty Personal Money Management
5.
Answer = 1 marks = 2

9 The Accessing of multimedia content depends on the ___________ capabilities of the


customer.
1.hardware
2.software
3.both
4.none
5.
Answer = 1 marks = 2

10 Which management is responsible for disseminating information about changing operational


conditions ( product,technical) to trading partners?
1.Channel Management
2.Distribution Management
3.Sales Force Productivity
4.Supplier Management
5.
Answer = 1 marks = 2
11 Consumer Oriented Applications list include ________
1.Essential Services
2.Both
3.Entertainment
4.Transport routers
5.
Answer = 2 marks = 1

12 Components of multimedia include________


1.Hologram
2.Animation
3.All
4.Numerical Data
5.
Answer = 3 marks = 1

13 Personal digital assistant is form of ____________


1.Video Server
2.Transport provider
3.Video Encoder
4.Consumer Access Device
5.
Answer = 4 marks = 1

14 E-Commerce application will be built on the existing technology infrastructure


1.A myriad of computers
2.All
3.Communication software
4.Communication networks
5.
Answer = 2 marks = 1

15 The Pillars Of E-Commerce


1.Both
2.None
3.Technical standards
4.Public policy legal and privacy issues
5.
Answer = 1 marks = 1
16 The word 'e-commerce' is best explained as
1.All
2.Sales of goods
3.Doing business
4.Doing business electronically
5.
Answer = 4 marks = 1

17 _______were first to bear the burnt of cost cutting


1.Inventory Management
2.Retailers
3.Whole salers
4.None
5.
Answer = 2 marks = 1

18 _______ e-commerce applications follow the client-server model


1.few
2.All
3.none
4.many
5.
Answer = 2 marks = 1

19 _______dictate the nature of information publishing


1.Public policy
2.I-Way
3.Technical standards
4.Multimedia
5.
Answer = 3 marks = 1

20 Ram wanted to buy a laptop online and compared the price in Amazon,Flipkart and came to a
conclusion to buy from Flipkart. What type of buyer is Ram?
1.Impulsive buyer
2.Active buyer
3.Analytical buyer
4.Patient buyer
5.
Answer = 4 marks = 1
21 Elimination of all waste is clearly depicted in _________ for retail industry
1.Quick Response System
2.Just-In-Time
3.All
4.Supply Chain Management
5.
Answer = 2 marks = 2

22 Which of the following is used in B2B to pay for purchases?


1.E- Cash
2.Electronic data Interchange
3.Smart Card
4.Electronic checks
5.
Answer = 2 marks = 2

23 The conversion of text, voice, data, image, graphics, and full-motion video into digital content
is called

1.Multimedia convergence
2.Supply Chain Management
3.Cross-media convergence
4.Just In time
5.
Answer = 1 marks = 2

24 Full form of OMC


1.Odd Memory Cycle
2.Order Manager Cycle
3.Order Mangement Chrnoicle
4.Order Management Cycle
5.
Answer = 4 marks = 2

25 The integration of various industries entertainment, publication and communication media


based on multimedia content refers to
1.Supply chain Management
2.Multimedia convergence
3.Cross-media convergence
4.Just In time
5.
Answer = 3 marks = 2
26 Customer on entering the store makes the purchase due to the influence of promotion
reminding of a need. This kind of purchase is called ________
1.Reminder purchases
2.Entirely unplanned purchases
3.Specifically planned purchases
4.Generally planned purchases
5.
Answer = 1 marks = 2

27 __________is basically a concept of online marketing and distributing of products and


services over the internet.
1.B2G
2.B2C
3.C2B
4.C2C
5.
Answer = 2 marks = 1

28 It is use to advertise & make sales of wide range of goods & services.
1. Electronic Data Interchange (EDI)
2. Electronic Markets
3.Internet Commerce
4.none
5.
Answer = 3 marks = 1

29 Uses Of Electronic Market


1.Irregular transaction trade
2.Increases the efficiency of the market
3.All
4.Reduces the search cost for the buyer
5.
Answer = 3 marks = 1

30 Television-Based Shopping is launched in _______ by the Home Shopping Network (HSN).


1.1966
2.1976
3.1967
4.1977
5.
Answer = 4 marks = 1

31 ____provides the highway system along which all e-commerce must travel
1.Multimedia
2.I-Way
3.Distribution infrastructure
4.Remote banking
5.
Answer = 2 marks = 1

32 _______focuses On the market responsiveness while maintaining low levels of stocks


1.Sales productivity
2.Just In time
3.Supply Chain Management
4.Quick Response Retailing
5.
Answer = 4 marks = 1

33 Order scheduling phase the prioritized orders get slotted into an ________________
1.both
2.Either
3.actual production
4.operational sequence
5.
Answer = 2 marks = 2

34 Critical mass of Buyers and sellers is a desirable characteristic of __________


1.Internal process of video server
2.Supply Chain Management
3.Electronic Marketplace
4.All
5.
Answer = 3 marks = 2

35 The pre purchase preparation phase include search and discovery for a set of products to meet
1.customer requirements
2.dealer satisfaction
3.retailer requirement
4.manufacturer requirement
5.
Answer = 1 marks = 2
36 The buyers who do substantial research before making the decision to purchase products or
services are called

1.Impulsive buyers
2.Patient buyers
3.Analytical buyers
4.None
5.
Answer = 3 marks = 2

37 Customer inquiry and order planning generation are


1.presale interaction
2.product service production and delivery
3.none
4.postsale interaction
5.
Answer = 3 marks = 2

38 The OMC has _____number of distinct activities


1.2
2.7
3.5
4.8
5.
Answer = 4 marks = 1

39 Home Shopping ?
1.none
2.Television-Based Shopping
3.both
4.) Catalog-Based Shopping
5.
Answer = 3 marks = 1

40 It is irregular transaction trade


1.all of the above
2.Electronic Markets
3.Internet e-commerce
4. Electronic Data Interchange (EDI)
5.
Answer = 2 marks = 1

41 The consumer's perspective consists of seven activities that can be grouped into _____phases
1.1
2.3
3.2
4.4
5.
Answer = 2 marks = 2

42 The Consumer Oriented Applications among these are


1.Personal finance management
2.None
3.Micro transactions of information.
4.Both
5.
Answer = 4 marks = 2

43 an integrated management system consisting of a number of different management practices


dependent on the characteristics of specific plants is
1.Quick Response system
2.Just In Time manufacturing
3.quality control
4.productive maintenance
5.
Answer = 2 marks = 2

44 _______________ is one part of the overall sphere of e-commerce.


1.none
2. Electronic Data Interchange (EDI)
3.Internet e-commerce
4. Electronic Markets
5.
Answer = 3 marks = 1

45 When HSN started in Florida in 1977, it mainly sold _________


1.both
2.discontinued items
3.factory overruns
4.none
5.
Answer = 1 marks = 1

46 The pillars of e-commerce framework are _______


1.Multimedia content
2.Technical Standards
3.All
4.Information Superhighway
5.
Answer = 2 marks = 1

47 The wide range of applications envisioned for the consumer marketplace can be broadly
classified into
1.2
2.4
3.1
4.3
5.
Answer = 2 marks = 1

48 The management practice kanban is part of _____


1. Total quality control
2.Just-In-Time
3.Quick Response System
4.Mercantile process
5.
Answer = 2 marks = 1

49 Mercantile processes define interaction models between______________


1.dealers and merchants
2.manufacturers and dealers
3.consumers and merchants
4.suppliers and merchants
5.
Answer = 3 marks = 1

50 Steps involved in the mercantile process model from Customer's Perspective are _________
1.Authorization of payment
2.Order receipt and entry
3.Post sales service
4.Order fulfillment
5.
Answer = 1 marks = 2

51 Order billing and account/ payment management


1.product service production and delivery
2.presale interaction
3.postsale interaction
4.none
5.
Answer = 3 marks = 2

52 The interaction models between consumers and merchants for on-line commerce is called
1.Cross-media
2.Post purchase interaction
3.Multimedia
4.Mercantile processes
5.
Answer = 4 marks = 1

53 Steps involved in the mercantile process model from Merchant's Perspective are _________
1.Order selection and priorization
2.All
3.Cost estimation and pricing
4.Post sales service
5.
Answer = 2 marks = 1

54 One Of the Multimedia Storage Servers


1.Communication networks
2.Client-Server Architecture
3.Network protocols
4.Common Business Services
5.
Answer = 2 marks = 1

55 _____are an important link between the content providers and transport providers
1.Hologram
2.JIT
3.Storage Servers
4.Video Servers
5.
Answer = 4 marks = 2
56 Number Of generic trade cycles
1.1
2.2
3.4
4.3
5.
Answer = 4 marks = 1

57 The phase which includes search and discovery for a set of products in the larger information
is

1.Purchase consummation
2.Postpurchase Phase
3.None
4.Prepurchase preparation phase
5.
Answer = 4 marks = 2

58 On-line bill payment is considered as__________ of Home Banking management


1.Advanced services
2.Basic services
3.Intermediate services
4.All
5.
Answer = 3 marks = 2

59 ______is a hardware and software combination that converts raw data into usable
information and then "dishes out" this information where and when users need it.
1.Information Superhighway
2.Multimedia server
3.All
4.Client-Server
5.
Answer = 2 marks = 1
1 ANSI X.12 is a standard developed by
1.United Nations Economic Commission for Europe
2.European Common Market
3.International Standard Institute
4.American National Standard Institute
5.
Answer = 4 marks = 2

2 EDIFACT is a standard
1.for e-mail transaction for e-Commerce
2.protocol used in e-Commerce
3.for ftp in e-Commerce
4.for representing business forms used in e-Commerce
5.
Answer = 4 marks = 2

3 For secure EDI transmission on internet


1.S/MIME is used
2.TCP/IP is used
3.PGP is used
4.MIME is used
5.
Answer = 1 marks = 2

4 Transaction set is made up


1.Quantity on order
2.Data segments
3.Purchase order line
4.Unit Price
5.
Answer = 2 marks = 2

5 Double spending would not be a major problem if the need for ______ were relaxed.
1.renown
2.fame
3.notoriety
4.anonymity
5.
Answer = 4 marks = 2

6 A digital signature is?


1.an authentication of an electronic record by tying it uniquely to a key only a sender
knows
2.a bit string giving identity of a correspondent
3.an encrypted signature of a sender
4.a unique identification of a sender
5.
Answer = 1 marks = 2

7 Which of the follwing is not a feature of these automatic records


1.Payment system database
2.Accessibility
3.Traceability
4.Temporary Storage
5.
Answer = 4 marks = 2

8 Customer services can be improved by “track & trace” programs,this can be done through
1.EID
2.JIT
3.ACH
4.Digital signatures
5.
Answer = 1 marks = 2

9 The bank signs it: (XR power E) power D = (RX)power D (mod PQ). What are R,D,E?
1.Public Key,Private Key,Blinding Factor,
2.Public Key,Blinding Factor, Private Key
3.Blinding Factor, Public Key,Private Key
4.Blinding Factor, Private Key,Public Key
5.
Answer = 4 marks = 2

10 EDI messages, however, share a common structure:


1.Transaction Set, Data sets, Data Segments
2.Transaction set, Data Segments, Data Elements.
3.Transaction elements, Data sets, Data elements
4.Transaction Set, Data sets, Data elements
5.
Answer = 2 marks = 2

11 EFT can be segmented into broad categories


1.3
2.2
3.None
4.1
5.
Answer = 1 marks = 1

12 Which one of the following is not the propertyof E-cash


1.Interporatability
2.Avilability
3.Retrievability
4.Security
5.
Answer = 2 marks = 1

13 In the MIME specifications , Two optional header fields serve to label and identify the data in
the message?
1. a Content-key and a content Name
2.a content- header - lD and a content-description header
3.None
4.a content-lD and a content-description header
5.
Answer = 4 marks = 1

14 Electronic tokens are of types


1.2
2.3
3.1
4.None
5.
Answer = 2 marks = 1

15 EFT is divided into ______ categories


1.2
2.4
3.3
4.5
5.
Answer = 3 marks = 1

16 VSR is abbreviated as
1.vendor stock replenishment
2.value stock replace
3.None
4.vendor stock replace
5.
Answer = 1 marks = 1

17 The most prevalent online payment method is


1.checks
2.credit card
3.debit
4.Paypal
5.
Answer = 2 marks = 1

18 Full form of TDCC


1.Transperse Data Coordination Committie
2.None
3.Transportation Data Coordination Committee
4.Textual Data Coordination Committie
5.
Answer = 3 marks = 1

19 Which one of the following is not the variation of mail transport protocol
1.UUCP
2.DES
3.SMTP
4.X.400
5.
Answer = 2 marks = 1

20 What is Double Bagging?


1.X.435, inserts a special field in an X.435 envelope to identify an EDI message
2.method wraps the X.400 header around an EDI header and EDI data.
3.method wraps the X.435 header around an EDI header and EDI data.
4.X.435, inserts a special field in an X.400 envelope to identify an EDI message
5.
Answer = 2 marks = 1

21 In Electronic cash payment


1.a credit card payment system is used
2.a customer buys several electronic coins which are digitally signed by coin issuing bank
3.RSA cryptography is used in the transactions
4.a debit card payment system is used
5.
Answer = 2 marks = 2

22 ___uses the fewer components which facilitates the updating and expanding a system
1.ACH
2.X.12
3.JIT
4.EDIFACT
5.
Answer = 4 marks = 2

23 Electronic Data Interchange is necessary in


1.B2C e-Commerce
2.Commerce using internet
3.C2C e-Commerce
4.B2B e-Commerce
5.
Answer = 4 marks = 2

24 Internet and value-added networks are present in ____layer


1.Semantic layer
2.Physical layer
3.Standard layer
4.Transport layer
5.
Answer = 4 marks = 2

25 It is a communications network that typically exchanges EDI messages among trading


partners
1.ASC
2.MAN
3.VAN
4.WAN
5.
Answer = 3 marks = 2

26 By symmetric key encryption we mean


1.one private key is used for both encryption and decryption
2.only public keys are used for encryption
3.private and public key used are symmetric
4.only symmetric key is used for encryption
5.
Answer = 1 marks = 2

27 What is EDI?
1.All
2.Electronic Database Interchange
3.Electronic Data Interchange
4.Electronic Digital Interchange
5.
Answer = 3 marks = 2

28 ____focuses in the reduction of lead times using event-driven EDI


1.EFT
2.QR
3.EFC
4.JIT
5.
Answer = 2 marks = 1

29 To implement open EDI, the ISO has developed an open EDI reference model, which consists
of two distinct views:
1.Base operational view (BOV),Functional security view (FSV)
2.Business operational view (BOV),Functional service view (FSV)
3.Business oppurtunity view (BOV),Financial service view (FSV)
4.Broker operational view (BOV),Financial service view (FSV)
5.
Answer = 2 marks = 1

30 The layer which describes the business application that is driving EDI is
1.Network infrastructure layer.
2.Semantic layer
3.Standards translation layer
4.Packing layer
5.
Answer = 2 marks = 1

31 When a transaction is processed online,how can the merchant verify the customer's identity
1.use secure socket
2.use financial
3.use secure electronic transactions
4.use electronic data interchange
5.
Answer = 3 marks = 1

32 Hubs are also called as


1.Just in Time
2.Quick Retailing
3.Sponsors
4.None
5.
Answer = 3 marks = 1

33 The payment server that verifies the customer's account number for the vendor and checks
for sufficient funds is
1.URL
2.EDS
3.OTPP
4.NPC
5.
Answer = 3 marks = 1

34 ____is a communication network that typically exchanges EDI messages among trading
partners
1.E-cash
2.None
3.ECR
4.VAN
5.
Answer = 4 marks = 2

35 EDI over internet uses


1.HTTP to send business forms
2.FTP to send business forms
3.MIME to attach EDI forms to e-mail messages
4.SGML to send business forms
5.
Answer = 3 marks = 2

36 The EDI _______ layer describes the business application that is driving EDI.
1.Physical
2.Transport
3.Standard
4.Semantic
5.
Answer = 4 marks = 2

37 Fee for each log-on to VAN network usage is called


1.session fee
2. volume fee
3.transaction fee
4.envelope fee
5.
Answer = 1 marks = 2

38 _____interposes the communication of business information in the standardized electronic


form
1.E-check
2.EFT
3.EDI
4.E-cash
5.
Answer = 3 marks = 2

39 E-cash is based on messages encoded with one numeric key can only be decoded with the
other numeric key and none other. The encoding key is kept ______and the decoding key is kept
_______.
1.Private,Private
2.Public,Public
3.Private,Public
4.Public ,Private
5.
Answer = 3 marks = 1

40 Example for retail payments


1.Automated teller machines
2.Bank to Bank transfer
3.Bill payments
4.All
5.
Answer = 1 marks = 1
41 In 1958 , The mass mailing of credit cards has been executed from?
1.Fresno,CA
2.Sacramento,CA
3.Sandiego,CA
4.Bakersfield,CA
5.
Answer = 1 marks = 1

42 The management used for both inbound and outbound documents in EDI gateways is
1.translation
2.security
3.compliance
4.queue
5.
Answer = 4 marks = 2

43 The properties of Electronic cash are


1.Security
2.Interoperability
3.Monetary value
4.All
5.
Answer = 4 marks = 2

44 Electronic tokens are of ______ types


1.4
2.3
3.5
4.1
5.
Answer = 2 marks = 2

45 EDI architecture is of _____layers


1.4
2.5
3.3
4.2
5.
Answer = 1 marks = 1
46 Which of the following is not an Retailing Payment?
1.Smart cards
2.American Express
3.MasterCard
4.J.C. Penney Card
5.
Answer = 1 marks = 1

47 Transfer of funds initiated through an electronic terminal, telephonic or computer to order,


instruct, or authorize a financial institution is called
1.EFC
2.None
3.EFT
4.EDI
5.
Answer = 3 marks = 1

48 EDI requires
1.special hardware at co-operating Business premises
2.special value added networks
3.representation of common business documents in computer readable forms
4.data entry operators by receivers
5.
Answer = 3 marks = 2

49 Expand GATT and NAFTA ?


1.General Agreement on Tariffs and Trade ; Free Trade Agreement among the United
States, Canada
2.Geneva Agreement on Tariffs and Trade ; Free Trade Agreement among the United
States, Canada
3.Geneva Agreement on Tariffs and Trade ; Free Trade Agreement among the United
States, Canada, and Mexico.
4.General Agreement on Tariffs and Trade ; Free Trade Agreement among the United
States, Canada, and Mexico.
5.
Answer = 4 marks = 2

50 ____ is a time-stamped or digitally notarized to establish dates & times


1.Digital cash
2.Digital signatures
3.Digital checks
4.Electronic fund transfer
5.
Answer = 2 marks = 2

51 Encryption can be done


1.on any bit string
2.only on textual data
3.only on mnemonic data
4.only on ASCII coded data
5.
Answer = 1 marks = 1

52 Electronic cash is based on cryptographic systems called


1.digital signatures
2.PGP
3.All
4.PEM
5.
Answer = 1 marks = 1

53 A __________specifies the encoding used to get the message through a given message
transport system, such as the Internet in the MIME specifications.
1.content-transfer-encoding header field
2.content-lD
3.content-description header
4.content- header - lD
5.
Answer = 1 marks = 1

54 The only payment system that is instantly convertible without intermediation is


1.stored value
2.credit card
3.cash
4.debit card
5.
Answer = 3 marks = 1

55 Traditional EDI covers two basic business areas.What are they?


1.Transaction data interchange , Electronic funds interchange
2.Trade data interchange, Electronic Funds transfer
3.Transaction data Interchange, Electronic Funds Transfer
4.Trade data interchange, E cash Interchange
5.
Answer = 2 marks = 1

56 Which is not a type of Financial EDI?


1.Bank Cheques
2.ACH Transfers
3.Cash
4.Interbank EFT
5.
Answer = 3 marks = 2

57 The standards layer specifies the


1.Exchange of documets
2.Business form structure
3.Sending e-mail messages
4.Business application
5.
Answer = 2 marks = 1

58 An electronic check is one form of what


1.e-cash
2.online banking
3.charge
4.check
5.
Answer = 2 marks = 1

59 ACH has___number of transfers


1.1
2.2
3.4
4.3
5.
Answer = 2 marks = 2

60 ____transfers are used to process high volumes of relatively small-dollar payments for
settlement
1.None
2.EFT
3.EDI
4.ACH
5.
Answer = 4 marks = 1

1 The technology used in disk arrays is _______

1.JPEG

2.VHS

3.RAID

4.Indeo

5.

Answer = 3 marks = 2

2 Identify 3 correct specifications to receive video using CU-SeeMe on Mac

1.Video digitizer, RT SCSI Port digitizer, Video Spigot Hardware

2.None

3.Quick Time Installed, Video Spigot Hardware, Camera with NTSC output

4.Mac Platform with a 68020 processor or higher, Apples Quick Time, Mac TCP

5.

Answer = 4 marks = 2

3 The CD-ROM spiral surface contains shallow depressions called____

1.pots

2.holes
3.Pits

4.lands

5.

Answer = 3 marks = 2

4 for video compression and decompression,the ISDN network uses____

1.H.264

2.H.262

3.H.261

4.H.263

5.

Answer = 3 marks = 2

5 Circuit Switched ISDN for broadband Networking is

1.Unscalable and Inefficient

2.Efficient and Scalable

3.Efficient and Reliable

4.None of the above

5.

Answer = 1 marks = 2
6 __________ incorporates a compression algorithm that processes video at full resolution even
at low data transmission rates

1.MPEG-2

2.MPEG-1

3.JPEG

4.Cinepak

5.

Answer = 1 marks = 2

7 In the early 1980s the cost of video conferencing equipment is nearly

1.$800,000

2.$200,000

3.$300,000

4.$500,000

5.

Answer = 4 marks = 2

8 Multimedia server supports

1.Real Time Clients

2.Both

3.None

4.Non-Real Time Clients

5.
Answer = 2 marks = 2

9 Transferring a 1mb file across a telephone line will take about ____ secs.

1.90

2.180

3.125

4.60

5.

Answer = 3 marks = 2

10 In a real-time video conference,data from the server to the client sites is

1.Unicast

2.Multicast

3.None

4.Broadcast

5.

Answer = 2 marks = 2

11 Synchronized sound track is present in______

1.CD-ROM

2.desktop

3.CD
4.Digital Video

5.

Answer = 4 marks = 1

12 Moving Picture Experts Group(MPEG- 1), was designed for a

1.DVD

2.PC

3.Floppy

4.CD

5.

Answer = 4 marks = 1

13 Digital video is binary data that represents a sequence of

1.Slots

2.Signals

3.Frames

4.Packets

5.

Answer = 3 marks = 1

14 The range of compression in multimedia .

1.2:1 to 200:1
2.1:4 to 1: 400

3.1:2 to 1:200

4.4:1 to 400:1

5.

Answer = 1 marks = 1

15 The algorithm for still -image compression is

1.MPEG-1

2.MPEG-2

3.Cinepak

4.JPEG

5.

Answer = 4 marks = 1

16 If the frames are displayed on the screen fast enough,we get an impression of

1.Signals

2.Motions

3.Packets

4.Bits

5.

Answer = 2 marks = 1
17 MPEG belongs to the group of ____________

1.ISO & CCITT

2.CCITT

3.ISO

4.OSI

5.

Answer = 1 marks = 1

18 In which compression produces compressed ouput that is exactly same as the input?

1.block

2.text

3.Lossy

4.loseless

5.

Answer = 4 marks = 1

19 In Audio and Video compression,each frame is divided into small grids called picture
elements or

1.JPEG

2.Pixels

3.Packets

4.Megapixels

5.
Answer = 2 marks = 1

20 Range provided for small arrays is

1.5-8 GB

2.5-10 GB

3.None

4.3-4 GB

5.

Answer = 2 marks = 1

21 In real time interactive Audio Video conferencing requires two way communication between

1.Pixels to Packets

2.Packets to Frames

3.Frames to Pixels

4.Receivers and Senders

5.

Answer = 4 marks = 2

22 Vital Component of B-ISDN in North America is called

1.SONET

2.SDHNET

3.MANET
4.ARPANET

5.

Answer = 1 marks = 2

23 Which of the following connections are mostly used by wide area networks

1.T2

2.T1

3.T4

4.T3

5.

Answer = 2 marks = 2

24 A compression ratio yeilding 10 Mbytes/min would require _____ Mbps dedicated link to
deliver continuous video.

1.2

2.1.3

3.1

4.2.6

5.

Answer = 2 marks = 2

25 The codecs that uses a combination of dedicated processors and software is called
1.Software-based

2.Digital

3.Software-based & Hybrid

4.Hybrid

5.

Answer = 4 marks = 2

26 Which video compression technology to bandwidth in Video conferencing with ISDN

1.H.261

2.H.133

3.H.241

4.H.256

5.

Answer = 1 marks = 1

27 The multiprocessing with treats al the processors equally is

1.desktop

2.Asymmteric

3.server

4.Summetric

5.

Answer = 4 marks = 1
28 Requirements to send video on MAC

i) Quick time must be installed

ii) Video Spigot Hardware with AV-Macs

1.I is Correct and II is Incorrect

2.only I is Correct

3.Both I and II Statements are false.

4.None

5.

Answer = 1 marks = 1

29 In multimedia ______ works by eliminating redundancy

1.storage

2.Graphics

3.Data compression

4.Back -up

5.

Answer = 3 marks = 1

30 Among the following which format is more suitable for motion videos?

1.codec

2.Desktop

3.CD-ROM
4.Cinepak

5.

Answer = 4 marks = 1

31 The routing software developed for UNIX workstations to act as mutlicast routers
is________

1.crouted

2.brouted

3.trouted

4.mrouted

5.

Answer = 4 marks = 2

32 Identify 3 correct Consumer Market Digital Video Applications

1.Professional Video editing, Video Editing Services, Direct Broadcast satellite

2.Desktop video conferencing, Digital television receivers, Video games

3.Video Editing Services, Digital Movie Players, Professional Video editing

4.Digital Movie Players, Video game playback, High-color image editors

5.

Answer = 2 marks = 2

33 One of the disadvantages of multimedia is


1.relativity

2. usability

3.adaptability

4.cost

5.

Answer = 4 marks = 2

34 For Video compression and decompression,the ISDN network uses what type of video
compression technology

1.H.261

2.H.162

3.All

4.HH.261

5.

Answer = 1 marks = 2

35 The first phase of JPEG is

1.None

2.DCT transformation

3.Data compression

4.Quantization

5.

Answer = 2 marks = 2
36 A compressed audio/video file can be downloaded as a

1.Text File

2.Video

3.Image

4.Frame

5.

Answer = 1 marks = 2

37 Any type of application or presentation that involves more than one type of media, such as

text, graphics, video, animation, and sound refers to

1.Desktop publishing

2. Hypertext

3. executable file

4.Multimedia

5.

Answer = 4 marks = 1

38 A one minute 16-bit Stereo track sampled at 44 kHz requires how much MB of disk space

1.16Mb

2.4mb

3.11Mb
4.9Mb

5.

Answer = 3 marks = 1

39 Most sophisticated codecs use

1.Both

2.lossless compression

3.None

4.lossy compression

5.

Answer = 4 marks = 1

40 The form other than plain text which includes graphics,animation,sound and video is _______

1.Digital video

2.Multicast

3.Compressed Data

4.Multimedia

5.

Answer = 4 marks = 1

41 The first software available for the Macintosh and Windows platforms to to support real-time

multiparty video conferencing on the Internet


1.POTs

2.MBONE

3.CU-SeeMe

4.None

5.

Answer = 3 marks = 2

42 The first software avalibale for the Macintosh and Windows platforms to support real-time
multiparty video conferencing on the internet is

1.ISDN

2.POTS

3.MBONE

4.CU-SeeMe

5.

Answer = 4 marks = 2

43 A double speed CD-ROM drive is probably rated at only _______kbps

1.450

2.700

3.500

4.300

5.

Answer = 4 marks = 2
44 MPEG-2 decoder chips to be providing hardware support for ________ cable networks.

1.500 Channels

2.800 Channels

3.1200 Channels

4.300 Channels

5.

Answer = 1 marks = 2

45 The Virtual network originated for multicast audio and video is

1.CU-SeeMe

2.ISDN

3.POTS

4.MBONE

5.

Answer = 4 marks = 1

46 Which compression method compress the file before they are downloaded.

1.All

2.Sector-Oriented disk compression.

3.Graphic and Video Oriented Compression

4.Backup or Archive Oriented Compression


5.

Answer = 4 marks = 1

47 The ability to support the concurrent execution of several tasks on multiple processors is

1.All

2.Multiprocessing

3.Multithreaded

4.Multitasking

5.

Answer = 2 marks = 1

48 Joint Photographic Expert Group(JPEG) is used to compress

1.Images

2.Frames

3.Music

4.Pictures

5.

Answer = 1 marks = 1

49 ______ generates compressed frames that are based on only the difference between two
frames.

1.Keyframe
2.Videoframe

3.Intraframe

4.Interframe

5.

Answer = 4 marks = 2

50 ________ was first widely avaliable desktop video technology to treat video as a standard
data type

1.DVI

2.QuickTime

3.Microsoft Video

4.AVI

5.

Answer = 2 marks = 2

51 The premiere desktop storage technology for e-commerce applications is

1.RAID

2.Disk array

3.CD-ROM

4.Add-in-cards

5.

Answer = 3 marks = 1
52 Moving Picture Experts Group(MPEG) is used to compress

1.Audio

2.Video

3.Frames

4.Images

5.

Answer = 2 marks = 1

53 What is the full form of VATP.

1.Virtual Adaptive Transform Programming

2.Vendor Adaptive Translation Processing

3.Vector Adaptive Transform processing

4.None

5.

Answer = 3 marks = 1

54 In the lowest resolution a color frame is made of

1.1024 X 768 pixels

2.1280 X 1080 pixels

3.800 X 600 pixels

4.1152 X 768 pixels

5.
Answer = 1 marks = 2

55 The sophisticated form of multitasking and refers to the ability to support separate paths of
execution within a single address space is

1.Symmteric processing

2.ASMP

3.Multithreading

4.File system

5.

Answer = 3 marks = 2

56 Which one of the following is the characteristic of a multimedia system

1.high storage

2.None

3.both high storage and high data rates

4.high data rates

5.

Answer = 3 marks = 1

57 What is the necessary for IP multicasting to be fully integrated into Internet routers and
gateways

1.All

2.Firewall
3.Virtual Network

4.Loop back address

5.

Answer = 3 marks = 2

58 In Symmetric Multiprocessing

i) any processor can do the work of any other processor

ii) manually assigns to any processor.

1.None

2.i is Correct and ii is Incorrect.

3.Both i and ii Statements are false.

4.only i is Correct

5.

Answer = 4 marks = 1

59 MBONE Virtual network came into existence in the year

1.1981

2.1992

3.1996

4.1987

5.

Answer = 2 marks = 1
60 Which technique used for compression in Multimedia.

1.Lossy

2.Both

3.None

4.Lossless

5.

Answer = 1 marks = 1

1 _______________is an increasingly important enabler for online multimedia ecommerce


1.Authentication Service Provider (ASP)
2.Service Provider (SP)
3.Security Assertion Markup Language (SAML)
4.Single Sign-On (SSO)
5.
Answer = 4 marks = 2

2 The catalogue displays different categories of products with___________


1.Images
2.Both
3.None
4.Videos
5.
Answer = 2 marks = 2

3 All of the following are factors in optimizing Web site performance except______________
1.Page content
2.Page retrieval
3.Page delivery
4.Page generation
5.
Answer = 2 marks = 2
4 All the available processors are given equal preferences that is the task assigned to one
processor can be completed by another processor is called________________
1.Multitasking
2.Multithreading
3.Symmetric multiprocessing
4.Asymmetric multiprocessing
5.
Answer = 3 marks = 2

5 What are the factors that made desktop conferencing a viable solution for business and
personnel communication.
1.Compression
2.Price/Cost
3.All
4.Standards
5.
Answer = 3 marks = 2

6 Which of the following statements is true?


1.MPEG stands for motion photographic expert group
2.MPEG is used only way in digital image world
3.MPEG stands for moving picture expert group
4.MPEG is the standard for lossless compression technique
5.
Answer = 3 marks = 2

7 Probabilistic information retrieval (PIR) models are based on


1.Probability density principle
2.Probability distribution principle
3.Probability ranking principle
4.Probability random principle
5.
Answer = 3 marks = 2

8 Multicasting is a method of transferring the same request by a______________


1.DUA
2.DSA to two or more DSAs
3.DSA
4.DIT
5.
Answer = 2 marks = 2
9 State which among the following statement is true?
1.Mercantile transaction is the exchange of information between the buyer and seller
followed by necessary payment.
2.Mercantile transaction is the exchange of payment between the buyer and seller.
3.Mercantile transaction is the exchange of information between the buyer and seller
without any payment.
4.Mercantile transaction is the exchange of information between the producer and seller
followed by necessary payment.
5.
Answer = 1 marks = 2

10 The purpose of ______is to minimize the amount of data required for multipoint audio /
video-conferencing
1.ISDN
2.POTS
3.Internet
4.MBONE
5.
Answer = 4 marks = 2

11 Information Organization and browsing is accomplished using_______


1.Catalogues
2.Directories
3.WAIS
4.Directories & Catalogues
5.
Answer = 4 marks = 1

12 Filtering systems primarily deals with______.


1.Video
2.Audio
3.None
4.Textual information
5.
Answer = 4 marks = 1

13 Which of the following is not an indexing package?


1.Main frame based indexing package
2.Parallel processing indexing package
3.Serial processing indexing package
4.Client/Server indexing package
5.
Answer = 3 marks = 1

14 By using reflectors Cu-SeeMe allows


1.Point to point conference
2.One-many conference
3.Several-to-several conference
4.One-many conference & Several-to-several conference
5.
Answer = 4 marks = 1

15 Which of the following systems are especially attractive for Point-to-Point video
conferencing?
1.MBONE
2.Internet
3.POTS
4.ISDN
5.
Answer = 3 marks = 1

16 CD-ROM spiral surface contains shallow depressions called _____


1.lands
2.light
3.pits
4.beams
5.
Answer = 3 marks = 1

17 _____________ phase includes customer service and support to address customer complaints,
product returns and product defects.
1.Post sale interaction
2.Post purchase interaction
3.Pre purchase interaction
4.Purchase consummation
5.
Answer = 1 marks = 1

18 One of the earliest attempts to standardize a white pages schema for electronic mail use was
in ______
1.X.720 and X.721
2.X.522 and X.523
3.X.620 and X.621
4.X.520 and X.521
5.
Answer = 4 marks = 1

19 A video consists of a sequence of ______


1.Slots
2.Packets
3.signals
4.Frames
5.
Answer = 4 marks = 1

20 In real time interactive audio video conferencing requires two way communications between
1.Pixels to packets
2.Receivers and senders
3.Fames to pixels
4.Packet to Frames
5.
Answer = 2 marks = 1

21 Consumer Search provides______________________________


1.the user with the heterogeneous access to the database irrespective of their original
location
2.the user with a detailed information about the product/service instantly.
3.All
4.downloading the data and organize it according to their convenience
5.
Answer = 3 marks = 2

22 Broadband is generally considered to be any communication technology allowing streaming


audio and video at or above
1.10Kbps
2.100Kbps
3.56.6 Kbps
4.30kbps
5.
Answer = 2 marks = 2
23 _____________ retrieval systems can either retrieve bibliographic items, or the exact text that
matches a user’s search criteria from a stored database of full texts of documents.
1.Modern information
2.Conventional text
3.Database
4.Conventional
5.
Answer = 1 marks = 2

24 Which of the following is the desktop video conferencing system?


1.All
2.MBONE
3.POTS
4.Cu-SeeMe
5.
Answer = 1 marks = 2

25 H.261 was originally designed for transmission over ISDN lines on which data rates are
multiples of
1.None
2.64 kbps
3.56kbps
4.48kbps
5.
Answer = 2 marks = 2

26 Which of the following was the first commercial web browser?


1.Internet Explorer.
2.Mosaic
3.Netscape Navigator
4.Mozilla
5.
Answer = 3 marks = 1

27 A/ An ______________is needed to connect three or more participants in the same


conference.
1.MP3
2.AAC
3.MCU
4.MPEG
5.
Answer = 3 marks = 1
28 _____________is the term used when a search engine returns a Web page that matches the
search criteria
1.Hit
2.Link
3.Block
4.View
5.
Answer = 1 marks = 1

29 Vector Adaptive Transform Processing (VATP) is a____


1.codec
2.mrouter
3.None
4.modem
5.
Answer = 1 marks = 1

30 Now-a-days many business websites provide their product_________online over Internet


1.catalogue
2.Videos
3.None
4.Images
5.
Answer = 1 marks = 1

31 Which among the following is not an issue of the post purchase interaction phase?
1.Database access and compatibility issues
2.Purchase issues
3.Customer service issues
4.Inventory issues
5.
Answer = 2 marks = 2

32 In which activity under product service/ delivery, the customer service representatives are
responsible for choosing which orders to accept and which orders to decline?
1.Order fulfilness and distribution
2.Order scheduling
3.Order receipt and entry
4.Order selection and prioritisation
5.
Answer = 4 marks = 2

33 Which of the following is not the desktop video conferencing system?


1.MBONE
2.Cu-SeeMe
3.Reflector
4.POTS
5.
Answer = 3 marks = 2

34 Suppose if we want to buy the car in limited budget, then its information can be got from
directories of _____________
1.Blog feed pages
2.Blog pages
3.Yellow pages
4.White pages
5.
Answer = 3 marks = 2

35 Which of the following are advantages of CD-ROM as a storage media?


1.All of the other options
2.CD-ROMs are less expensive way to store large amount of data and information
3.CD-ROM disks retrieve data and information more quickly than magnetic disks do
4.CD-ROMs make less errors than magnetic media
5.
Answer = 1 marks = 2

36 ______is any combination of text, graphic art, sound, animation, and video delivered to you
by computer or other electronic devices.
1.Visual Media
2.Multimedia
3.Network
4.Hyper media
5.
Answer = 2 marks = 1

37 Which of the following systems are especially attractive for real time multi-party video
conferencing over internet?
1.None
2.POTS
3.Cu-SeeMe
4.ISDN
5.
Answer = 3 marks = 1

38 _____________ certificates play a key underlying role in securing multimedia e-commerce.


1.display
2.data
3.static
4.digital
5.
Answer = 4 marks = 1

39 The importance of agent based resource discovery is increased when__________


1.Number of products purchased
2.Number of sellers decrease
3.Number of sellers increase
4.None
5.
Answer = 3 marks = 1

40 Which media have the ability to have data/information stored (Written) on them by users
more than once?
1.CD-R disks
2.CD-RW disks
3.OptiDisks
4.All
5.
Answer = 2 marks = 1

41 Which of the following is an increasingly important enabler for online multimedia


ecommerce?
1.Single Sign-On
2.MPEG
3.Advanced Audio Coding
4.Digital certificates
5.
Answer = 1 marks = 2

42 ______________ are the programs that browse several pages in world wide web
automatically
1.Spiders
2.All
3.Web Robots
4.Wanderers
5.
Answer = 2 marks = 2

43 Which of the below statements is true?


1.JPEG compression is very low and but it can capture full-screen, full-rate video.
2.JPEG is used only way in digital video world
3.JPEG was designed for compressing either full-color or gray-scale Digital images of
real world scenes.
4.JPEG standard has been not widely adopted for video sequences.
5.
Answer = 3 marks = 2

44 A single CD-ROM is premiere desktop stop storage contains _____ size for video CD.
1.3.7 GB
2.4.8 GB
3.4.7 GB
4.3.8 GB
5.
Answer = 3 marks = 2

45 The dimension of e-commerce that enables commerce across national boundaries is


called________________
1.Interactivity
2.Global reach
3.Richness
4.Ubiquity
5.
Answer = 2 marks = 1

46 WAIS stands for___________________________


1.None
2.Wechsler Adult Intelligence Scale
3.Wide Area Internet Service
4.Wide Area Information Service
5.
Answer = 4 marks = 1
47 _____________ needs to examine how particular aspects of the buyers’ situation and the
shopping experience that is being sought affects the search process
1.Knowledge search
2.Consumer search
3.Organisational search
4.Information search
5.
Answer = 2 marks = 1

48 An operating system that can do multitasking means that____________________


1.Multiple people can use the computer concurrently
2.The OS can divide up work between serial CPUs
3.None
4.Several programs can be operated concurrently
5.
Answer = 4 marks = 1

49 __________________are used for processing incoming stream of data to a PC


1.Intelligent filters
2.Software filters
3.Remote filters
4.Local filters
5.
Answer = 4 marks = 2

50 ______________ can be defined as the use of video conferencing software on a personal


computer.
1.Image processing
2.Audio conferencing
3.Speech recognition
4.Desktop video conferencing
5.
Answer = 4 marks = 2

51 Internet using the multicast backbone facility where several distributed parties can actively
participate and monitor product related activities is called_________________
1.Video processing
2.Video monitoring
3.Video capturing
4.Video conferencing
5.
Answer = 4 marks = 2
52 A ________ pages schema is a data model, specifically a logical schema, for organising the
data contained in entries in a directory service, database, or application, such as an address book.
1.black
2.green
3.white
4.yellow
5.
Answer = 3 marks = 1

53 Technology behind disk array is _____


1.ROID
2.RCID
3.RAID
4.REID
5.
Answer = 3 marks = 1

54 The Boolean model is based on the _____________principle and is the standard for most
popular information retrieval systems
1.Internal Match
2.Exact Match
3.External Match
4.All
5.
Answer = 2 marks = 1

55 _____________ filters are responsible for searching and retrieving information from large
databases for finding the exact match for user’s query.
1.Remote filters
2.Software filters
3.Local filters
4.Intelligent filters
5.
Answer = 1 marks = 2

56 Which of the following is not a type of indexing method?


1.Directory level indexing
2.None
3.Word level indexing
4.File level indexing
5.
Answer = 1 marks = 2

57 What does OMC stand for?


1.Order Maintenance Cycle
2.Old Management Cycle
3.Order Management Cycle
4.Overall Management Circumstances
5.
Answer = 3 marks = 1

58 Which among the following is not a protocol of Merchantile’s process using digital cash?
1.Buyer contacts the seller to purchase or buy a product
2.Vendor states the price
3.Buyer sends the e-cash to the seller
4.Seller states the price
5.
Answer = 2 marks = 1

1 The technology used in disk arrays is _______

1.JPEG

2.VHS

3.RAID

4.Indeo

5.

Answer = 3 marks = 2

2 Identify 3 correct specifications to receive video using CU-SeeMe on Mac

1.Video digitizer, RT SCSI Port digitizer, Video Spigot Hardware

2.None
3.Quick Time Installed, Video Spigot Hardware, Camera with NTSC output

4.Mac Platform with a 68020 processor or higher, Apples Quick Time, Mac TCP

5.

Answer = 4 marks = 2

3 The CD-ROM spiral surface contains shallow depressions called____

1.pots

2.holes

3.Pits

4.lands

5.

Answer = 3 marks = 2

4 for video compression and decompression,the ISDN network uses____

1.H.264

2.H.262

3.H.261

4.H.263

5.

Answer = 3 marks = 2

5 Circuit Switched ISDN for broadband Networking is


1.Unscalable and Inefficient

2.Efficient and Scalable

3.Efficient and Reliable

4.None of the above

5.

Answer = 1 marks = 2

6 __________ incorporates a compression algorithm that processes video at full resolution even
at low data transmission rates

1.MPEG-2

2.MPEG-1

3.JPEG

4.Cinepak

5.

Answer = 1 marks = 2

7 In the early 1980s the cost of video conferencing equipment is nearly

1.$800,000

2.$200,000

3.$300,000

4.$500,000

5.

Answer = 4 marks = 2
8 Multimedia server supports

1.Real Time Clients

2.Both

3.None

4.Non-Real Time Clients

5.

Answer = 2 marks = 2

9 Transferring a 1mb file across a telephone line will take about ____ secs.

1.90

2.180

3.125

4.60

5.

Answer = 3 marks = 2

10 In a real-time video conference,data from the server to the client sites is

1.Unicast

2.Multicast

3.None

4.Broadcast
5.

Answer = 2 marks = 2

11 Synchronized sound track is present in______

1.CD-ROM

2.desktop

3.CD

4.Digital Video

5.

Answer = 4 marks = 1

12 Moving Picture Experts Group(MPEG- 1), was designed for a

1.DVD

2.PC

3.Floppy

4.CD

5.

Answer = 4 marks = 1

13 Digital video is binary data that represents a sequence of

1.Slots

2.Signals
3.Frames

4.Packets

5.

Answer = 3 marks = 1

14 The range of compression in multimedia .

1.2:1 to 200:1

2.1:4 to 1: 400

3.1:2 to 1:200

4.4:1 to 400:1

5.

Answer = 1 marks = 1

15 The algorithm for still -image compression is

1.MPEG-1

2.MPEG-2

3.Cinepak

4.JPEG

5.

Answer = 4 marks = 1

16 If the frames are displayed on the screen fast enough,we get an impression of
1.Signals

2.Motions

3.Packets

4.Bits

5.

Answer = 2 marks = 1

17 MPEG belongs to the group of ____________

1.ISO & CCITT

2.CCITT

3.ISO

4.OSI

5.

Answer = 1 marks = 1

18 In which compression produces compressed ouput that is exactly same as the input?

1.block

2.text

3.Lossy

4.loseless

5.

Answer = 4 marks = 1
19 In Audio and Video compression,each frame is divided into small grids called picture
elements or

1.JPEG

2.Pixels

3.Packets

4.Megapixels

5.

Answer = 2 marks = 1

20 Range provided for small arrays is

1.5-8 GB

2.5-10 GB

3.None

4.3-4 GB

5.

Answer = 2 marks = 1

21 In real time interactive Audio Video conferencing requires two way communication between

1.Pixels to Packets

2.Packets to Frames

3.Frames to Pixels

4.Receivers and Senders


5.

Answer = 4 marks = 2

22 Vital Component of B-ISDN in North America is called

1.SONET

2.SDHNET

3.MANET

4.ARPANET

5.

Answer = 1 marks = 2

23 Which of the following connections are mostly used by wide area networks

1.T2

2.T1

3.T4

4.T3

5.

Answer = 2 marks = 2

24 A compression ratio yeilding 10 Mbytes/min would require _____ Mbps dedicated link to
deliver continuous video.

1.2
2.1.3

3.1

4.2.6

5.

Answer = 2 marks = 2

25 The codecs that uses a combination of dedicated processors and software is called

1.Software-based

2.Digital

3.Software-based & Hybrid

4.Hybrid

5.

Answer = 4 marks = 2

26 Which video compression technology to bandwidth in Video conferencing with ISDN

1.H.261

2.H.133

3.H.241

4.H.256

5.

Answer = 1 marks = 1
27 The multiprocessing with treats al the processors equally is

1.desktop

2.Asymmteric

3.server

4.Summetric

5.

Answer = 4 marks = 1

28 Requirements to send video on MAC

i) Quick time must be installed

ii) Video Spigot Hardware with AV-Macs

1.I is Correct and II is Incorrect

2.only I is Correct

3.Both I and II Statements are false.

4.None

5.

Answer = 1 marks = 1

29 In multimedia ______ works by eliminating redundancy

1.storage

2.Graphics

3.Data compression

4.Back -up
5.

Answer = 3 marks = 1

30 Among the following which format is more suitable for motion videos?

1.codec

2.Desktop

3.CD-ROM

4.Cinepak

5.

Answer = 4 marks = 1

31 The routing software developed for UNIX workstations to act as mutlicast routers
is________

1.crouted

2.brouted

3.trouted

4.mrouted

5.

Answer = 4 marks = 2

32 Identify 3 correct Consumer Market Digital Video Applications

1.Professional Video editing, Video Editing Services, Direct Broadcast satellite


2.Desktop video conferencing, Digital television receivers, Video games

3.Video Editing Services, Digital Movie Players, Professional Video editing

4.Digital Movie Players, Video game playback, High-color image editors

5.

Answer = 2 marks = 2

33 One of the disadvantages of multimedia is

1.relativity

2. usability

3.adaptability

4.cost

5.

Answer = 4 marks = 2

34 For Video compression and decompression,the ISDN network uses what type of video
compression technology

1.H.261

2.H.162

3.All

4.HH.261

5.

Answer = 1 marks = 2
35 The first phase of JPEG is

1.None

2.DCT transformation

3.Data compression

4.Quantization

5.

Answer = 2 marks = 2

36 A compressed audio/video file can be downloaded as a

1.Text File

2.Video

3.Image

4.Frame

5.

Answer = 1 marks = 2

37 Any type of application or presentation that involves more than one type of media, such as

text, graphics, video, animation, and sound refers to

1.Desktop publishing

2. Hypertext

3. executable file

4.Multimedia
5.

Answer = 4 marks = 1

38 A one minute 16-bit Stereo track sampled at 44 kHz requires how much MB of disk space

1.16Mb

2.4mb

3.11Mb

4.9Mb

5.

Answer = 3 marks = 1

39 Most sophisticated codecs use

1.Both

2.lossless compression

3.None

4.lossy compression

5.

Answer = 4 marks = 1

40 The form other than plain text which includes graphics,animation,sound and video is _______

1.Digital video

2.Multicast
3.Compressed Data

4.Multimedia

5.

Answer = 4 marks = 1

41 The first software available for the Macintosh and Windows platforms to to support real-time

multiparty video conferencing on the Internet

1.POTs

2.MBONE

3.CU-SeeMe

4.None

5.

Answer = 3 marks = 2

42 The first software avalibale for the Macintosh and Windows platforms to support real-time
multiparty video conferencing on the internet is

1.ISDN

2.POTS

3.MBONE

4.CU-SeeMe

5.

Answer = 4 marks = 2
43 A double speed CD-ROM drive is probably rated at only _______kbps

1.450

2.700

3.500

4.300

5.

Answer = 4 marks = 2

44 MPEG-2 decoder chips to be providing hardware support for ________ cable networks.

1.500 Channels

2.800 Channels

3.1200 Channels

4.300 Channels

5.

Answer = 1 marks = 2

45 The Virtual network originated for multicast audio and video is

1.CU-SeeMe

2.ISDN

3.POTS

4.MBONE

5.
Answer = 4 marks = 1

46 Which compression method compress the file before they are downloaded.

1.All

2.Sector-Oriented disk compression.

3.Graphic and Video Oriented Compression

4.Backup or Archive Oriented Compression

5.

Answer = 4 marks = 1

47 The ability to support the concurrent execution of several tasks on multiple processors is

1.All

2.Multiprocessing

3.Multithreaded

4.Multitasking

5.

Answer = 2 marks = 1

48 Joint Photographic Expert Group(JPEG) is used to compress

1.Images

2.Frames

3.Music
4.Pictures

5.

Answer = 1 marks = 1

49 ______ generates compressed frames that are based on only the difference between two
frames.

1.Keyframe

2.Videoframe

3.Intraframe

4.Interframe

5.

Answer = 4 marks = 2

50 ________ was first widely avaliable desktop video technology to treat video as a standard
data type

1.DVI

2.QuickTime

3.Microsoft Video

4.AVI

5.

Answer = 2 marks = 2

51 The premiere desktop storage technology for e-commerce applications is


1.RAID

2.Disk array

3.CD-ROM

4.Add-in-cards

5.

Answer = 3 marks = 1

52 Moving Picture Experts Group(MPEG) is used to compress

1.Audio

2.Video

3.Frames

4.Images

5.

Answer = 2 marks = 1

53 What is the full form of VATP.

1.Virtual Adaptive Transform Programming

2.Vendor Adaptive Translation Processing

3.Vector Adaptive Transform processing

4.None

5.

Answer = 3 marks = 1
54 In the lowest resolution a color frame is made of

1.1024 X 768 pixels

2.1280 X 1080 pixels

3.800 X 600 pixels

4.1152 X 768 pixels

5.

Answer = 1 marks = 2

55 The sophisticated form of multitasking and refers to the ability to support separate paths of
execution within a single address space is

1.Symmteric processing

2.ASMP

3.Multithreading

4.File system

5.

Answer = 3 marks = 2

56 Which one of the following is the characteristic of a multimedia system

1.high storage

2.None

3.both high storage and high data rates

4.high data rates


5.

Answer = 3 marks = 1

57 What is the necessary for IP multicasting to be fully integrated into Internet routers and
gateways

1.All

2.Firewall

3.Virtual Network

4.Loop back address

5.

Answer = 3 marks = 2

58 In Symmetric Multiprocessing

i) any processor can do the work of any other processor

ii) manually assigns to any processor.

1.None

2.i is Correct and ii is Incorrect.

3.Both i and ii Statements are false.

4.only i is Correct

5.

Answer = 4 marks = 1
59 MBONE Virtual network came into existence in the year

1.1981

2.1992

3.1996

4.1987

5.

Answer = 2 marks = 1

60 Which technique used for compression in Multimedia.

1.Lossy

2.Both

3.None

4.Lossless

5.

Answer = 1 marks = 1
13.1 By Electronic Commerce we mean:

a. Commerce of electronic goods

b. Commerce which depends on electronics

c. Commerce which is based on the use of internet

d. Commerce which is based on transactions using computers connected by

telecommunication network

13.2 For carrying out B2B e-Commerce the following infrastructure is

essential:

(i) World Wide Web

(ii) Corporate network

(iii) Electronic Data Interchange standards

(iv) Secure Payment Services

(v)Secure electronic communication link connecting businesses

a. i, ii, iii

b. ii, iii, iv

c. ii, iii, iv, v

d. i, ii, iii, iv, v

13.3 For carrying out B2C e-Commerce the following infrastructure is essential

(i) World Wide Web

(ii) Corporate network

(iii) Electronic Data Interchange standards

(iv) Secure Payment Services

(v) Secure electronic communication link connecting businesses


a. i, iv

b. i, iii, iv

c. ii, iii

d. i, ii, iii, iv

13.4 For carrying out C2C e-Commerce the following infrastructure is essential

(i) World Wide Web

(ii) Corporate network

(iii) Electronic Data Interchange standards

(iv) Secure Payment Services

(v)Secure electronic communication link connecting businesses

a. i and ii

b. ii and iv

c. i and iii

d. i and iv

13.5 Advantages of B2C commerce are

(i) Business gets a wide reach to customers

(ii) Payment for services easy

(iii)Shop can be open 24 hours a day seven days a week

(iv)Privacy of transaction always maintained

a. i and ii

b. ii and iii

c. i and iii

d. iii and iv

13.6 B2C commerce

a. includes services such as legal advice


b. means only shopping for physical goods

c. means only customers should approach customers to sell

d. means only customers should approach business to buy

13.7 Advantages of B2C commerce to customers are

(i)wide variety of goods can be accessed and comparative prices

can be found

(ii) shopping can be done at any time

(iii)privacy of transactions can be guaranteed

(iv)security of transactions can be guaranteed

a. i and ii

b. ii and iii

c. iii and iv

d. i and iv

13.8 Disadvantages of e-Commerce in India are

(i) internet access is not universally available

(ii) Credit card payment security is not yet guaranteed

(iii) Transactions are de-personalized and human contact is missing

(iv) Cyberlaws are not in place

a. i and ii

b. ii and iii

c. i, ii, iii

d. i, ii, iii, iv

13.9 Electronic Data Interchange is necessary in

a. B2C e-Commerce

b. C2C e-Commerce
c. B2B e-Commerce

d. Commerce using internet

13.10 EDI requires

a. representation of common business documents in computer readable forms

b. data entry operators by receivers

c. special value added networks

d. special hardware at co-operating Business premises

13.11 EDI standards are

a. not universally available

b. essential for B2B commerce

c. not required for B2B commerce

d. still being evolved

13.12 EDIFACT is a standard

a. for representing business forms used in e-Commerce

b. for e-mail transaction for e-Commerce

c. for ftp in e-Commerce

d. protocol used in e-Commerce

13.13 EDIFACT standard was developed by

a. American National Standard Institute

b. International Standard Institute

c. European Common Market

d. United Nations Economic Commission for Europe

13.14 ANSI X.12 is a standard developed by

a. American National Standard Institute

b. International Standard Institute


c. European Common Market

d. United Nations Economic Commission for Europe

13.15 In B2B e-Commerce

(i) Co-operating Business should give an EDI standard to be used

(ii) Programs must be developed to translate EDI forms to a form accepted

by application program

(iii) Method of transmitting/receiving data should be mutually agreed

(iv) It is essential to use internet

a. i, ii

b. i, ii, iii

c. i, ii, iii, iv

d. ii, iii, iv

13.16 EDI use

a. requires an extranet

b. requires value added network

c. can be done on internet

d. requires a corporate intranet

13.17 EDI over internet uses

a. MIME to attach EDI forms to e-mail messages

b. FTP to send business forms

c. HTTP to send business forms

d. SGML to send business forms

13.18 For secure EDI transmission on internet

a. MIME is used

b. S/MIME is used
c. PGP is used

d. TCP/IP is used

13.19 EDI standard

a. is not easily available

b. defines several hundred transaction sets for various business forms

c. is not popular

d. defines only a transmission protocol

13.20 By security in e-Commerce we mean

(i) Protecting an organization’s data resource from unauthorized access

(ii)Preventing disasters from happening

(iii) Authenticating messages received by an organization

(iv) Protecting messages sent on the internet from being read and understood by

unauthorized persons/organizations

a. i, ii

b. ii, iii

c. iii, iv

d. i, iii, iv

13.21 A firewall is a

a. wall built to prevent fires from damaging a corporate intranet

b. security device deployed at the boundary of a company to prevent

unauthorized physical access

c. security device deployed at the boundary of a corporate intranet to protect

it from unauthorized access

d. device to prevent all accesses from the internet to the corporate intranet

13.22 A firewall may be implemented in


a. routers which connect intranet to internet

b. bridges used in an intranet

c. expensive modem

d. user’s application programs

13.23 Firewall as part of a router program

a. filters only packets coming from internet

b. filters only packets going to internet

c. filters packets travelling from and to the intranet from the internet

d. ensures rapid traffic of packets for speedy e-Commerce

13.24 Filtering of packets by firewall based on a router has facilities to

a. i, iii

b. i, ii, iii

c. i, ii, iii, iv

d. ii, iii, iv

13.25 Main function of proxy application gateway firewall is

a. to allow corporate users to use efficiently all internet services

b. to allow intranet users to securely use specified internet services

c. to allow corporate users to use all internet services

d. to prevent corporate users from using internet services

13.26 Proxy application gateway

(i) acts on behalf of all intranet users wanting to access interne securely

(ii)monitors all accesses to internet and allows access to only specified IP addresses

(iii) disallows use of certain protocols with security problems

(iv) disallows all internet users from accessing intranet

a. i, ii
b. i, ii, iii

c. i, ii, iii, iv

d. ii, iii, iv

13.27 A hardened firewall host on an intranet

(i) has a proxy application gateway program running on it

(ii)Allows specified internet users to access specified services in the intranet

(iii) Initiates all internet activities requested by clients and monitors them

(iv) prevents outsiders from accessing IP addresses within the intranet

a. i, ii

b. i, ii, iii

c. i, ii, iii, iv

d. ii, iii, iv

13.28 A hardened firewall host on an Intranet is

a. a software which runs in any of the computers in the intranet

b. a software which runs on a special reserved computer on the intranet

c. a stripped down computer connected to the intranet

d. a mainframe connected to the intranet to ensure security

13.29 By encryption of a text we mean

a. compressing it

b. expanding it

c. scrambling it to preserve its security

d. hashing it

13.30 Encryption is required to

(i) protect business information from eavesdropping when it is transmitted on internet

(ii)efficiently use the bandwidth available in PSTN


(iii) to protect information stored in companies’ databases from retrieval

(iv) to preserve secrecy of information stored in databases if an unauthorized person

retrieves it

a. i and ii

b. ii and iii

c. iii and iv

d. i and iv

13.31 Encryption can be done

a. only on textual data

b. only on ASCII coded data

c. on any bit string

d. only on mnemonic data

13.32 By applying permutation (31254) and substitution by 5 characters away

from current character (A Æ F , B Æ G etc..) the following string

ABRACADABRA becomes

a. FGWCAAADRBF

b. RABCAAADRBF

c. WFGHFFFIWGF

d. None of the above

13.33 The following ciphertext was received. The plaintext was permuted using

permutation (34152) and substitution. Substitute character by character +3

(A Æ D, etc). The plain text after decryption is: Cipher text :

PDLJDLXHVQC

a. MAIGAIUESNZ
b. IAMAGENIUSZ

c. LDPDJHPLXVZ

d. IAMAGENIUSC

13.34 By symmetric key encryption we mean

a. one private key is used for both encryption and decryption

b. private and public key used are symmetric

c. only public keys are used for encryption

d. only symmetric key is used for encryption

13.35 The acronym DES stands for

a. Digital Evaluation System

b. Digital Encryption Standard

c. Digital Encryption System

d. Double Encryption Standard

13.36 DES works by using

a. permutation and substitution on 64 bit blocks of plain text

b. only permutations on blocks of 128 bits

c. exclusive ORing key bits with 64 bit blocks

d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

13.37 DES

(i) is a symmetric key encryption method

(ii)guarantees absolute security

(iii) is implementable as hardware VLSI chip

(iv) is a public key encryption method

a. i and ii

b. ii and iii
c. i and iii

d. iii and iv

13.38 DES using 56 bit keys

a. Cannot be broken in reasonable time using presently available computers

b. Can be broken only if the algorithm is known using even slow computers.

c. Can be broken with presently available high performance computers.

d. It is impossible to break ever.

13.39 Triple DES uses

a. 168 bit keys on 64-bit blocks of plain text

b. Working on 64-bit blocks of plain text and 56 bit keys by applying DES

algorithm for three rounds.

c. Works with 144 bit blocks of plain text and applies DES algorithm once.

d. Uses 128 bit blocks of plain text and 112 bit keys and apply DES

algorithm thrice.

13.40 ripple DES

a. Cannot be broken in reasonable time using presently available computers.

b. Can be broken only if the algorithm is known using even slow computer.

c. Can be broken with presently available high performance computers.

d. It is impossible to break ever.

13.41 Triple DES

a. is a symmetric key encryption method

b. guarantees excellent security

c. is implementable as a hardware VLSI chip

d. is public key encryption method with three keys.

13.42 Public key encryption method is a system


a. which uses a set of public keys one for each participant in e-Commerce

b. in which each person who wants to communicate has two keys; a private

key known to him only and a public key which is publicized to enable

others to send message to him.

c. which uses the RSA coding system.

d. which is a standard for use in e-Commerce.

13.43 Public key system is useful because

a. it uses two keys.

b. there is no key distribution problem as public key can be kept in a

commonly accessible database.

c. private key can be kept secret.

d. it is a symmetric key system.

13.44 In public key encryption if A wants to send an encrypted message

a. A encrypts message using his private key

b. A encrypts message using B’s private key

c. A encrypts message using B’s public key

d. A encrypts message using his public key

13.45 In public key encryption system if A encrypts a message using his private

key and sends it to B

a. if B knows it is from A he can decrypt it using A’s public key

b. Even if B knows who sent the message it cannot be decrypted

c. It cannot be decrypted at all as no one knows A’s private key

d. A should send his public key with the message

13.46 Message can be sent more securely using DES by


a. encrypting plain text by a different randomly selected key for each

transmission

b. encrypting plain text by a different random key for each message

transmission and sending the key to the receiver using a public key system

c. using an algorithm to implement DES instead of using hardware

d. designing DES with high security and not publicizing algorithm used by it

13.47 DES and public key algorithm are combined

(i) to speed up encrypted message transmission

(ii)to ensure higher security by using different key for each transmission

(iii) as a combination is always better than individual system

(iv) as it is required in e-Commerce

a. i and ii

b. ii and iii

c. iii and iv

d. i and iv

13.48 A digital signature is

a. a bit string giving identity of a correspondent

b. a unique identification of a sender

c. an authentication of an electronic record by tying it uniquely to a key only

a sender knows

d. an encrypted signature of a sender

13.49 A digital signature is required

(i) to tie an electronic message to the sender’s identity

(ii)for non repudiation of communication by a sender

(iii) to prove that a message was sent by the sender in a court of law
(iv) in all e-mail transactions

a. i and ii

b. i, ii, iii

c. i, ii, iii, iv

d. ii, iii, iv

13.50 A hashing function for digital signature

(i) must give a hashed message which is shorter than the original message

(ii)must be hardware implementable

(iii) two different messages should not give the same hashed message

(iv) is not essential for implementing digital signature

a. i and ii

b. ii and iii

c. i and iii

d. iii and iv

13.51 Hashed message is signed by a sender using

a. his public key

b. his private key

c. receiver’s public key

d. receiver’s private key

13.52 While sending a signed message, a sender

a. sends message key using public key encryption using DES and hashed

message using public key encryption

b. sends message using public key encryption and hashed message using

DES

c. sends both message and hashed message using DES


d. sends both message and hashed message using public key encryption

13.53 The responsibility of a certification authority for digital signature is to

authenticate the

a. hash function used

b. private keys of subscribers

c. public keys of subscribers

d. key used in DES

13.54 Certification of Digital signature by an independent authority is needed

because

a. it is safe

b. it gives confidence to a business

c. the authority checks and assures customers that the public key indeed

belongs to the business which claims its ownership

d. private key claimed by a sender may not be actually his

13.55 The Secure Electronic Transaction protocol is used for

a. credit card payment

b. cheque payment

c. electronic cash payments

d. payment of small amounts for internet services

13.56 In SET protocol a customer encrypts credit card number using

a. his private key

b. bank’s public key

c. bank’s private key

d. merchant’s public key

13.57 In SET protocol a customer sends a purchase order


a. encrypted with his public key

b. in plain text form

c. encrypted using Bank’s public key

d. using digital Signature system

13.58 One of the problems with using SET protocol is

a. the merchant’s risk is high as he accepts encrypted credit card

b. the credit card company should check digital signature

c. the bank has to keep a database of the public keys of all customers

d. the bank has to keep a database of digital signatures of all customers

13.59 The bank has to have the public keys of all customers in SET protocol as

it has to

a. check the digital signature of customers

b. communicate with merchants

c. communicate with merchants credit card company

d. certify their keys

13.60 In electronic cheque payments developed, it is assumed that most of the

transactions will be

a. customers to customers

b. customers to business

c. business to business

d. banks to banks

13.61 In cheque payment protocol, the purchase order form is signed by

purchaser using

a. his public key

b. his private key


c. his private key using his signature hardware

d. various public keys

13.62 In the NetBill’s protocol for small payments for services available in the

internet.

(i) the customer is charged only when the information is delivered

(ii)the vendor is guaranteed payment when information is delivered

(iii) the customer must have a certified credit card

(iv) the customer must have a valid public key

a. i, ii

b. i, ii, iii

c. i, ii, iii, iv

d. i, ii, iv

13.63 In NetBill’s protocol for small payments for internet services

(i) Key to decrypt information is sent to customer by NetBill only when there is

enough amount in debit account

(ii) The vendor supplies the key to NetBill server when he receives payment

(iii) Checksum of encrypted information received by customer is attached to his

payment order

(iv) Vendor does not encrypt information purchased by customer

a. i, ii

b. i, ii, iii

c. i, ii, iii, iv

d. i, ii, iv

13.64 In Electronic cash payment

a. a debit card payment system is used


b. a customer buys several electronic coins which are digitally signed by coin

issuing bank

c. a credit card payment system is used

d. RSA cryptography is used in the transactions

13.65 In Electronic cash payment

(i) a customer withdraws “coins” in various denominations signed by the bank

(ii)the bank has a database of issued coins

(iii) the bank has a database of spent coins

(iv) the bank cannot trace a customer

a. i, ii

b. i, ii, iii

c. i, ii, iii, iv

d. ii, iii, iv

Key to Objective Questions


13.1 d

13.2 c

13.3 a

13.4 c

13.5 c

13.6 a

13.7 a

13.8 c

13.9 c

13.10 a
13.11 b

13.12 a

13.13 d

13.14a

13.15 b

13.16 c

13.17 a

13.18 b

13.19 b

13.20 d

13.21 c

13.22 a

13.23 c

13.24 b

13.25 b

13.26 b

13.27 c

13.28 b

13.29 c

13.30 d

13.31 c

13.32 c

13.33 b

13.34 a

13.35 b
13.36 a

13.37 c

13.38 c

13.39 b

13.40 a

13.41 b

13.42 b

13.43 b

13.44 c

13.45 a

13.46 b

13.47 a

13.48 c

13.49 b

13.50 c

13.51 b

13.52 a

13.53 c

13.54 c

13.55 a

13.56 b

13.57 d

13.58 c

13.59 a

13.60 c
13.61 c

13.62 d

13.63 b

13.64 b

13.65 b

You might also like