MCQ on Latest Trends in IECT and e-Governance | NIELIT ECC

Advertisement

Q81. What is “Digital Signature” in the context of ITA 2000?
a) A form of handwritten signature
b) A method for encrypting paper documents
c) A cryptographic technique to verify the identity of the signer
d) A legal document for identity verification

Show Answer

Correct Answer: c) A cryptographic technique to verify the identity of the signer
Explanation: Under ITA 2000, a Digital Signature is a cryptographic technique used to verify the identity of the signer and ensure the integrity of electronic documents.

Q82. In the context of Cloud Computing, what does “Resource Pooling” entail?
a) Exclusive use of physical resources by a single organization
b) Allocation of physical resources to multiple users
c) Limiting access to specific network resources
d) Restricting physical access to data centers

Show Answer

Correct Answer: b) Allocation of physical resources to multiple users
Explanation: Resource Pooling involves the allocation of physical resources to multiple users, optimizing usage and reducing costs by sharing infrastructure.

Q83. What is the main benefit of using “Software as a Service” (SaaS)?
a) Direct control over hardware
b) Subscription-based access to applications
c) Increased need for local software installation
d) Higher upfront costs

Show Answer

Correct Answer: b) Subscription-based access to applications
Explanation: SaaS offers subscription-based access to software applications over the internet, reducing the need for local installation and providing easy scalability.

Q84. Which term describes a cloud service model that provides virtualized computing resources over the internet?
a) IaaS
b) PaaS
c) SaaS
d) DaaS

Show Answer

Correct Answer: a) IaaS
Explanation: IaaS (Infrastructure as a Service) provides virtualized computing resources, such as servers and storage, over the internet, allowing users to rent infrastructure rather than owning it.

Q85. What is “Digital Inclusion” in the context of e-Governance?
a) Restricting access to digital services
b) Ensuring equitable access to digital technologies for all citizens
c) Increasing government expenditures
d) Developing new technology products

Show Answer

Correct Answer: b) Ensuring equitable access to digital technologies for all citizens
Explanation: Digital Inclusion aims to ensure that all citizens, regardless of their socio-economic status, have equitable access to digital technologies and services, promoting fairness and accessibility.

Q86. What does the “Broad Network Access” characteristic of Cloud Computing entail?
a) Limiting access to specific networks
b) Access to cloud services from any network
c) Restricting network access to internal users
d) Providing physical access to network hardware

Show Answer

Correct Answer: b) Access to cloud services from any network
Explanation: Broad Network Access allows users to access cloud services from any network, including mobile and broadband networks, providing greater flexibility and accessibility.

Q87. Which of the following is NOT a component of mobile computing?
a) Mobile devices
b) Wireless communication technologies
c) Cloud storage
d) Fixed network cables

Show Answer

Correct Answer: d) Fixed network cables
Explanation: Mobile computing relies on wireless communication technologies and mobile devices, whereas fixed network cables are not a component of mobile computing.

Q88. In the context of e-Governance, what does “Change Management” involve?
a) Developing new government regulations
b) Managing changes in IT systems and processes
c) Increasing government budgets
d) Creating new IT infrastructure

Show Answer

Correct Answer: b) Managing changes in IT systems and processes
Explanation: Change Management in e-Governance involves managing and implementing changes in IT systems and processes to improve efficiency and adapt to new technologies.

Q89. What is the primary function of “Digital Certificates” in digital communication?
a) To create physical copies of digital documents
b) To verify the authenticity of the sender’s public key
c) To store user passwords securely
d) To encrypt email communications

Show Answer

Correct Answer: b) To verify the authenticity of the sender’s public key
Explanation: Digital Certificates are used to verify the authenticity of the sender’s public key, ensuring secure and trusted electronic communications.

Q90. Which of the following best describes “Mobile Computing”?
a) Using physical cables for connectivity
b) Accessing and managing data through wireless technology
c) Restricting access to physical networks
d) Developing traditional desktop applications

Show Answer

Correct Answer: b) Accessing and managing data through wireless technology
Explanation: Mobile Computing involves accessing and managing data using wireless technology, enabling connectivity and interaction from various locations.

Advertisement
error: Content is protected !!
Scroll to Top