This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 124401. |
Select the proper option from the options given below and rewrite the completed sentence: The transactions under ________ are between business firms and consumers Options C to C B to C B to B |
|
Answer» The transactions under B to C are between business firms and consumers. Explanation: B to C, i.e., business to consumer, refers to commercial transactions between business firms and consumers. Other types of transactions include, C to C, i.e., consumer to consumer, which refers to commercial transactions that take place between consumers. B to B, i.e., business to business, refers to business transactions that take place between two business firms. |
|
| 124402. |
………………. Is known as the “Father of scientific management“ (a) Henri Fayol (b) Henry Mintzberg (c) Frederick W. Taylor (d) Max Weber |
|
Answer» Correct option is (b) Henry Mintzberg |
|
| 124403. |
(A) Select the correct option and rewrite the sentencei. ……………… was regarded as Father of Scientific Management. (a) Henry Fayol (b) F. W. Taylor (c) Philip Kotlerii. Principle of …………… is based on ‘A place for everything and everything in its place’. (a) Discipline (b) Order (c) Equityiii. Member of organization should receive orders from …………… (a) many superior (b) one superior (c) all superiorsiv. Scalar chain means the hierarchy of …………….. from the top level to the lower level for the purpose of communication.(a) discipline (b) unity (c) authorityv. Taylor recommended total ……………… foremen to control the various aspects of production. (a) eight (b) three (c) two |
|
Answer» i. (b) F. W. Taylor ii. (b) Order iii. (b) one superior iv. (c) authority v. (a) eight |
|
| 124404. |
The father of scientific management is ..... |
|
Answer» The father of scientific management is F.W. Tayor. |
|
| 124405. |
What is Globalization. |
|
Answer» It is the process of connecting one country’s economy with the world economy. |
|
| 124406. |
Which of the following software is/are used for design and manufacturing? (a) CAD (b) C.DA and CAM (c) CAM (d) Both (a) and (c) |
|
Answer» (d) CAD and CAM are the two important software used in designing and manufacturing. Using CAD, designers can developed more detailed design and the final design can be combined with CAM. |
|
| 124407. |
An extended synonym for Information Technology is ICT. So, how ICT differs from IT? |
||||||
|
Answer» Differences between IT and ICT are as follows:
|
|||||||
| 124408. |
Mention any three elements off security of e-busincss. |
|
Answer» The three elements off security of e-business are:- 1. Encryption: Encryption means converting the message into a code so that unauthorised persons may- not understand it. Only the sender and the receiver of the message know the coding and decoding rules. 2. Digital Signatures: Under digital signature method, coded digital certificate is issued for each message by a certification authority. 3. Cyber Crime Cells: The government may set up special cyber crime cells to look into the cases of hacking and to take necessary action against the hackers. |
|
| 124409. |
Liberalization means A. Reducing number of reserved industries from 17 to 8 B. Liberating the industry, trade and economy from unwanted restrictions C. Opening up of economy to the world by attaining international competitiveness D. Free determination of interest rates |
|
Answer» Correct Answer is: B. Liberating the industry, trade and economy from unwanted restrictions |
|
| 124410. |
Explain the measures taken to protect the security and safety of e-transactions. |
|
Answer» Following measures are taken to protect security and safety of e-transactions: 1. Cryptography: According to Pete Loshin, “It means use of such measures so as to keep the information out of the hand of anyone but its intended recipient. “Even if the message is intercepted the meaning shall not be apparent unless the interceptor is able to decode. This technique makes use of of codes and cyphers. 2. Password: The parties to an e-commerce transaction must use the password. Password is a code fed in computer by the user. It can be in alphabets or numeric or alpha-numeric characters. Unless a person feeds in the password, system shall neither respond nor give effect to the transactions. Therefore, one must keep a password. . 3. Cookies: Cookies are very similar to creating ID in telephones that provide telecallers with such relevant information as the customer’s name, address and previous purchase payment record. 4. Creating Keys: Key is a secret algorithm. Only the person who has the key can read the data. |
|
| 124411. |
Relaxing the restrictions and controls imposed on Business and industry means A. Liberalisation B. Privatization C. Globalisation D. None of the above |
|
Answer» Correct Answer is: A. Liberalisation |
|
| 124412. |
When a company taken over another one and clearly becomes the new owner, the action is called. A. Merger B. Acquisition C. Strategic Alliance D. None of the above |
|
Answer» Correct Answer is: B. Acquisition |
|
| 124413. |
Which among the following is not opened for private sector participation A. Power sector B. Telecommunication sectorC. Education sector D. Railways |
|
Answer» Correct Answer is: A. Power sector |
|
| 124414. |
is an economic system based on the principle of free enterprise. A. Capitalism B. Socialism C. Mixed Economy D. Marxism |
|
Answer» Correct Answer is: D. Marxism |
|
| 124415. |
List the various forms of software piracy. |
|
Answer» Software piracy means copying of data or computer software without the owner’s permission. However, most peoples are aware about piracy and know that it is illegal, yet the piracy is uncontrollable. This is simply the violation of intellectual property rights and right to privacy. The following are forms of software piracy: 1. Software counterfeiting In this type of software piracy, a copyrighted software pied and sold. 2. Softlifting Purchasing only one licensed copy of a software and distributing and loading it onto multiple systems is called softlifting. 3. Renting Selling of a software illegally for temporary use as on rent basis is called renting. 4. Hard disk loading Installing an illegal copy of software on the hard disk of a personal computer is called hard disk loading. 5. Uploading and downloading Creating duplicate copies of the licensed software or uploading and downloading it from the Internet. In order to stop software piracy, three types of laws are formulated as follows: 1. Copyright is an exclussive right of the developer or author, to protect their works which is granted by law. 2. Patent is the special power of monopoly granted by the law. The work cannot be used or reproduced without obtaining a license from patent holder. 3. Trademark is the registered word or text/logo depicting the identity of a product, work or company. |
|
| 124416. |
Company images and brand equity is a factor affecting business A. Externally B. Internally C. Government Policy D. None of these |
|
Answer» Correct Answer is: C. Government Policy |
|
| 124417. |
A Call Centre handles a. Only in-bound voice based business b. Only out-bound voice based business c. Both voice based and non-voice based business d. Both customer facing and back-end business |
|
Answer» Correct Answer is: a. Only in-bound voice based business |
|
| 124418. |
State any three differences between e-business and traditional business. |
||||||||||||
|
Answer» Difference between Traditional and e-Business
|
|||||||||||||
| 124419. |
“Virtual schools are better than traditional schools.” Write reasons to support this statement. |
|
Answer» A virtual school is a learning environment offered entirely on the Internet. All student services and courses are conducted through Internet technology. The virtual school differs from the traditional school through the physical medium that links administrators, teachers, and students. It refers to an institution that is not “brick and mortar” bound. Advantages The advantages of virtual schools are as follows: 1. Individualised instruction for all students. 2. Lessons can be taught in a way that benefits students with various learning abilities. 3. More time can be spent on lessons that are more difficult for students. 4. Flexibility for the students to learn whenever and wherever they want. 5. Students are self-directed and mature quicker as they manage their studies. 6. Students can access learning 24 hours a day and learn at their own pace. Disadvantages The disadvantages of virtual schools are as follows: 1. Undisciplined students will not succeed in the online environment. 2. Puts more stress on the parents to provide guidance and tutoring. 3. Parents need to monitor the student all day long as opposed to dropping the student at the school where the student is monitored by teachers and staff. 4. Students are more isolated and might not develop properly socially. 5. Students would not receive personal one-on-one time with teachers. |
|
| 124420. |
What is the use of Enter and Esc key in a Slide Show? |
|
Answer» Press Enter to move to the next slide and Esc to close the Slide Show. |
|
| 124421. |
It is not an application of e-business a. Online bidding b. Online procurement c. Online trading d. Contract R&D |
|
Answer» Correct Answer is: d. Contract R&D |
|
| 124422. |
It is not an application of e-business: (a) Online Bidding (b) Online procurement (c) Online trading (d) Contract RandD |
|
Answer» (d) Contract RandD |
|
| 124423. |
Explain an advantage of grouping objects in PowerPoint. |
|
Answer» The grouped objects can move, transform, resize and also can change the properties of all the objects in a group together. |
|
| 124424. |
Select the proper option from the options given below and rewrite the completed sentence: In bigger shops situated in shopping malls or branded stores, there is a ________ terminal Options SSL POS HTTP |
|
Answer» Shops in shopping malls and branded stores usually have POS terminals. Explanation: A point of sale (POS) terminal is an electronic device used to record a sales transaction. It scans the bar code printed on the product and records important details regarding the product on the computer, for example, the product code and the product price. Thus, it helps in maintaining a systematic record of the sales made. |
|
| 124425. |
Set new timing, while rehearsing ……………… key is press. (a) Ctrl+T (b) T (c) M (d) O |
|
Answer» (b) T key is used to set new timing while rehearsing. |
|
| 124426. |
Which of the following is not an application of e-business? (a) E-procurement (b) e-bidding (c) e-delivery (d) All of the above |
| Answer» (d) All of the above | |
| 124427. |
Microsoft Office button contains options for frequently used tasks, such as opening, saving and printing. |
|
Answer» True Open, Save, Save As, Print are frequently used tasks that are available on Microsoft Office button menu. |
|
| 124428. |
Kirti wants to add sound to slide transition. Which feature of Animations tab is useful for this purpose? |
|
Answer» On the Animations tab in the Transition to This Slide group, click the arrow next to ‘Transition Sound’ to add sound to slide transition. |
|
| 124429. |
Select the proper option from the options given below and rewrite the completed sentence: Credit or debit cards are popularly known as ________ money. Options paper plastic polymer |
|
Answer» Credit or debit cards are popularly known as plastic money. Explanation: Credit or debit cards are known as plastic money because of the following reasons: 1) They are made up of plastic. 2) They act as money; i.e., they can be used to make payments. |
|
| 124430. |
How are Header and Footer useful? |
|
Answer» Header and Footer are very useful for displaying the similar useful information on each slide. One can change the Header and Footer details at any time in the presentation. |
|
| 124431. |
Which of the following can be used only for e-business? (a) Cheques (b) Credit Card (c) Debit Card (d) E-cash |
|
Answer» The following can be used only for e-business.(d) E-cash |
|
| 124432. |
New Slide button for inserting a new slide can be found on ………………. |
|
Answer» New Slide button for inserting a new slide can be found on Home. |
|
| 124433. |
To select slides at discrete order in the Slides Pane you need hold the ………………. on the keyboard while selecting the slides. |
|
Answer» To select slides at discrete order in the Slides Pane you need hold the Ctrl key on the keyboard while selecting the slides. |
|
| 124434. |
Give one word answer1. Another name for junk mails.2. It is doing business online.3. It is the crime committed using computers and Internet.4. The programmer that breaks into secure systems with non-malicious intentions.5. Type of malware that is installed on user’s computer and collects information about user without his consent. |
|
Answer» 1. Spam 2. E-Business/E-Commerce 3. Cybercrime 4. Hacker 5. Spyware |
|
| 124435. |
Rehearse Timings command is present on ………………. tab. (a) Animations (b) Review (c) Slide Show (d) View |
|
Answer» c) Rehearse Timings command is present on Slide Show tab. |
|
| 124436. |
Write three functions that can be performed in Slide Sorter view of a presentation. |
|
Answer» The three functions that can be performed in Slide Sorter view are as follows: 1. We can see the entire presentation. 2. We can move slide from one place to another using click-drag method. Also, we can rearrange the order of slides. 3. We can insert, rename and delete slides. |
|
| 124437. |
Credit or Debit cards are popularly known as ‘_____ Money.(A) paper(B) plastic(C) polymer |
|
Answer» Credit or Debit cards are popularly known as ‘plastic Money. hgv |
|
| 124438. |
You can transmit sensitive information, such as that relating to your credit card, by using(a) PCI(b) SET(c) SSL(d) Firewall |
|
Answer» (c) SSL allows sensitive information such as credit card numbers to be transmitted securely. |
|
| 124439. |
A is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs without malicious intent with a wish to learn and improve security.(a) hacker(b) cracker(c) worm(d) malware |
|
Answer» (a) A hacker is a person who enjoys learning programming languages and about computer systems and their working. |
|
| 124440. |
How many views of a slide PowerPoint provided? |
|
Answer» There are six views of a PowerPoint presentation: 1. Normal view 2. Outline view 3. Notes Page view 4. Slide Show 5. Slide Sorter view 6. Master view |
|
| 124441. |
State three functions of the Slides Pane. |
|
Answer» Three functions of the Slides Pane are as follows: 1. New slides may be added to the presentation. 2. Allows marking a slide as hidden for not showing it during a slide show. 3. Deleting a slide from the presentation in case it is no longer neede |
|
| 124442. |
The Custom Animation command is present on ………………. tab. |
|
Answer» The Custom Animation command is present on Animations tab. |
|
| 124443. |
It is an electronic messaging system used by various commercial organisations to send bulk messages to a large number of E-mail addresses. What is it?1. E-mail2. Spam3. SMS4. Adware |
|
Answer» 2. Spam an electronic messaging system used by various commercial organizations to send bulk messages to a large number of E-mail addresses. |
|
| 124444. |
____ is a form of electronic currency that exists only in cyberspace.(A) Digital cash (B) Credit cards (C) Net banking |
|
Answer» Digital cash is a form of electronic currency that exists only in cyberspace. |
|
| 124445. |
A digital document issued to a Website by a certification authority on the Internet is called(a) digital signature(b) encryption(c) digital certificate(d) firewall |
|
Answer» (c) A digital certificate is an electronic file that is issued by a certification authority to Websites. |
|
| 124446. |
To avoid problems while working on the Internet, you should follow these precautions.(a) Install antivirus on your computer(b) Take the backup of your files regularly(c) Do not click on unknown links(d) All of the above |
|
Answer» (d) All of the above |
|
| 124447. |
Mohan has downloaded few attachments in his mail to his system from Internet. When he opened those attachments there were multiple copies of the same file opened. After sometime his system got rebooted automatically. He is unable to find out why his system is not responding properly. Can you tell what happened to his system and give him some solutions? |
|
Answer» There is a virus (most likely worm) in Mohan’s computer, that has caused damage to data and files on his system. He should install antivirus software, such as Kaspersky, Quick Heal, McAfee etc., as the main defense against online problems. He should take backup of his files regularly. |
|
| 124448. |
Amit installed an antivirus software to remove all the viruses from his computer.1. What is antivirus software?2. Name two actions performed by an antivirus software. |
|
Answer» 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them. 2. Two actions performed by an antivirus software are as follows: (a) Scanning E-mail messages and their attachments. (b) Scanning and monitoring files and folders on your computer to ensure that they are not infected. |
|
| 124449. |
Explain the various views of a slide available in PowerPoint 2007. |
|
Answer» In Microsoft Office PowerPoint 2007, different views of a slide are used to edit, print and deliver a presentation. PowerPoint slide views can be found in two places as follows: 1. On the View tab, in the Presentation Views group, where all views are available. 2. On an easy-accessible bar, at the bottom of the PowerPoint window, where the main views (Normal, Slide Sorter and Slide Show) are available. Different types of views available in PowerPoint 2007 are explained below: 1. Normal View: This is the main editing view, where you write and design your presentations, i.e. actual screen which is displayed. The view is also known as Slide view. A Normal view is the default view size for the screen. 2. Slide Sorter View: It provides a view of slides in thumbnail form. This view makes it easy to sort and organize the sequence of the slides at the time of creating presentation and also, at the time of preparing presentation for printing. 3. Notes Page View: In the Notes Page view, the notes pane is located just below the slide pane. Here, notes that apply to the current slide can be typed. Later, these notes can be printed and referred while giving actual presentation. Notes can also be printed to handout to the audience or included in a presentation that is delivered to the audience or posted on a Web page. 4. Slide Show View: This is used to deliver a presentation to the audience. Slide Show view takes up the full computer screen, like an actual presentation. In this view, you can see your presentation, the way audience wants. This view enables you to see how graphics, timings, movies, animated effects and transition effects will look during the actual presentation.To exit Slide Show view, press Esc key from the keyboard. 5. Master View: The Master views include Slide view, Handout view and Notes view. They are the main slides that store information about the presentation, including background color, fonts effects, placeholder sizes and positions. The key benefit to working in a Master view is that on the Slide Master, Notes Master, or Handout Master, you can make universal style changes to every slide, notes page, or handout associated with the presentation. |
|
| 124450. |
List some commonly available antivirus programs. |
|
Answer» Some of the commonly available antivirus programs in the market are as follows: 1. Symantec Norton antivirus 2. AVG antivirus 3. McAfee scan 4. Quick Heal |
|