MCQ on Latest Trends in IECT and e-Governance | NIELIT ECC

Advertisement

Q31. What is a key advantage of using PaaS for application development?
a) Direct control over physical servers
b) Simplified application deployment and management
c) Exclusive access to hardware resources
d) Free software upgrades

Show Answer

Correct Answer: b) Simplified application deployment and management
Explanation: PaaS (Platform as a Service) provides a simplified environment for application development, deployment, and management, allowing developers to focus on creating applications without managing underlying infrastructure.

Q32. What does “Infrastructure as a Service” (IaaS) typically include?
a) Web-based applications
b) Virtualized computing resources such as servers and storage
c) Software development tools
d) Data encryption services

Show Answer

Correct Answer: b) Virtualized computing resources such as servers and storage
Explanation: IaaS provides virtualized computing resources, including servers, storage, and networking, over the internet, allowing users to rent infrastructure rather than investing in physical hardware.

Q33. In the context of mobile computing, which component is essential for enabling wireless communication?
a) CPU
b) Battery
c) Wireless Network Interface
d) Display Screen

Show Answer

Correct Answer: c) Wireless Network Interface
Explanation: The Wireless Network Interface is essential for enabling wireless communication in mobile computing, allowing devices to connect to networks and communicate without physical cables.

Q34. What is the role of a digital signature in the authentication process?
a) To create encrypted files
b) To provide a unique verification code for transactions
c) To verify the identity of the sender and ensure the document’s integrity
d) To store user credentials securely

Show Answer

Correct Answer: c) To verify the identity of the sender and ensure the document’s integrity
Explanation: Digital signatures are used to verify the identity of the sender and ensure that the document has not been tampered with, providing authenticity and integrity to electronic communications.

Q35. Which of the following best describes the “Hybrid Cloud” model?
a) A cloud model that only uses public cloud services
b) A cloud model that only uses private cloud resources
c) A combination of public and private cloud resources
d) A traditional on-premises IT infrastructure

Show Answer

Correct Answer: c) A combination of public and private cloud resources
Explanation: The Hybrid Cloud model combines both public and private cloud resources, providing flexibility and allowing businesses to optimize their IT infrastructure according to their needs.

Q36. What is a common use case for SaaS applications?
a) Developing and managing web applications
b) Hosting physical servers
c) Providing online productivity tools like email and office suites
d) Managing network infrastructure

Show Answer

Correct Answer: c) Providing online productivity tools like email and office suites
Explanation: SaaS (Software as a Service) applications are commonly used for providing online productivity tools such as email, office suites, and collaboration platforms, which can be accessed over the internet.

Q37. Which technology helps in verifying the authenticity of a digital signature?
a) Symmetric encryption
b) Public key infrastructure (PKI)
c) Firewalls
d) Antivirus software

Show Answer

Correct Answer: b) Public key infrastructure (PKI)
Explanation: Public Key Infrastructure (PKI) helps in verifying the authenticity of digital signatures by using a pair of cryptographic keys—public and private keys—to ensure secure and verifiable transactions.

Q38. What is the purpose of “Digital Inclusion” in e-Governance?
a) To increase government spending
b) To ensure all citizens have access to digital services
c) To create new government departments
d) To limit access to digital resources

Show Answer

Correct Answer: b) To ensure all citizens have access to digital services
Explanation: Digital Inclusion aims to ensure that all citizens, regardless of their socio-economic status, have access to digital services and information, promoting equal opportunities in e-Governance.

Q39. Which of the following is an example of a legal framework for digital signatures in India?
a) Digital Signature Act, 2005
b) Information Technology Act, 2000
c) Cybersecurity Act, 2010
d) Electronic Transactions Act, 1998

Show Answer

Correct Answer: b) Information Technology Act, 2000
Explanation: The Information Technology Act, 2000, provides the legal framework for digital signatures in India, establishing their validity and outlining their use in electronic transactions.

Q40. What is a primary characteristic of Cloud Computing’s “On-demand Self-service” feature?
a) Users can request computing resources without human intervention
b) Users must manually configure all hardware settings
c) Users have limited access to resources
d) Users are charged based on physical server usage

Show Answer

Correct Answer: a) Users can request computing resources without human intervention
Explanation: The On-demand Self-service feature of Cloud Computing allows users to provision and manage computing resources without requiring direct human interaction with the service provider.

Advertisement
error: Content is protected !!
Scroll to Top