MCQ on Latest Trends in IECT and e-Governance | NIELIT CCC Plus

Advertisement

Q41. In cloud computing, which term describes the pay-as-you-go pricing model where users are billed based on their usage of resources?
a) Subscription-based
b) Fixed-rate
c) Measured service
d) Unlimited access

Show Answer

Correct Answer: c) Measured service
Explanation: Measured service in cloud computing refers to the pay-as-you-go pricing model where users are billed based on their actual usage of resources, such as storage, processing power, or data transfer.

Q42. What is the primary goal of e-Governance initiatives in India?
a) To automate government processes
b) To digitize all government records
c) To improve citizen access to government services
d) To reduce government expenditure

Show Answer

Correct Answer: c) To improve citizen access to government services
Explanation: The primary goal of e-Governance initiatives in India is to improve citizen access to government services by making them more accessible, efficient, and transparent through the use of digital technologies.

Q43. What is the role of the National Informatics Centre (NIC) in the context of e-Governance?
a) Providing internet services to citizens
b) Developing e-Governance applications and infrastructure
c) Regulating digital signatures
d) Monitoring social media activity

Show Answer

Correct Answer: b) Developing e-Governance applications and infrastructure
Explanation: The National Informatics Centre (NIC) plays a key role in developing e-Governance applications and infrastructure, providing technical support and solutions to various government departments for implementing e-Governance initiatives.

Q44. Which of the following cloud computing deployment models is most suitable for organizations that require strict data security and compliance controls?
a) Public cloud
b) Private cloud
c) Hybrid cloud
d) Community cloud

Show Answer

Correct Answer: b) Private cloud
Explanation: Private cloud deployment models are most suitable for organizations that require strict data security and compliance controls as they offer dedicated resources exclusively for one organization, ensuring greater control and security.

Q45. What is the primary function of a Digital Certificate in electronic communication?
a) To secure emails from spam
b) To authenticate the identity of a sender or receiver
c) To compress electronic files
d) To encrypt all internet traffic

Show Answer

Correct Answer: b) To authenticate the identity of a sender or receiver
Explanation: A Digital Certificate functions primarily to authenticate the identity of the sender or receiver in electronic communication, providing a way to ensure that the parties involved are who they claim to be.

Q46. Which e-Governance Mission Mode Project is designed to provide a comprehensive health record for every citizen?
a) e-Health
b) e-Panchayat
c) e-Kranti
d) e-Courts

Show Answer

Correct Answer: a) e-Health
Explanation: The e-Health Mission Mode Project is designed to create and manage a comprehensive digital health record for every citizen, enabling better healthcare services and easier access to medical information.

Q47. Which concept of cloud computing involves delivering computing resources over the internet without the need for on-premise hardware?
a) Virtualization
b) Outsourcing
c) Cloud services
d) Remote access

Show Answer

Correct Answer: c) Cloud services
Explanation: Cloud services refer to the delivery of computing resources such as storage, processing power, and software applications over the internet, eliminating the need for on-premise hardware.

Q48. What is the significance of the term “broad network access” in cloud computing?
a) Cloud resources can only be accessed via high-speed internet
b) Cloud services are available across various devices and platforms
c) Cloud resources are limited to specific geographic regions
d) Cloud services require specialized hardware to access

Show Answer

Correct Answer: b) Cloud services are available across various devices and platforms
Explanation: “Broad network access” signifies that cloud services can be accessed across various devices and platforms, including mobile phones, tablets, laptops, and desktops, using standard internet protocols.

Q49. What role does the Public Key Infrastructure (PKI) play in the implementation of digital signatures?
a) It stores encrypted data
b) It manages public and private keys for secure transactions
c) It creates and manages digital certificates
d) It monitors the internet for digital signature misuse

Show Answer

Correct Answer: b) It manages public and private keys for secure transactions
Explanation: Public Key Infrastructure (PKI) plays a critical role in managing public and private keys that are used to create and verify digital signatures, ensuring secure and authenticated electronic transactions.

Q50. Which of the following is a characteristic feature of mobile computing?
a) Limited connectivity
b) Static communication
c) Ubiquitous access to data and applications
d) Requirement for wired connections

Show Answer

Correct Answer: c) Ubiquitous access to data and applications
Explanation: Mobile computing is characterized by ubiquitous access to data and applications, allowing users to connect and work from virtually anywhere, typically through wireless connections.

Advertisement
« Prev1 ... 34 5 67 ... 10» Next
error: Content is protected !!
Scroll to Top