31. Which among the following are the barriers in the implementation of e-Governance?
1. Unequal access to the computes technology
2. High initial cost for setting up the e-government solutions.
3. Digital security issues
4. Resistance to change
Choose the correct answer
1. Unequal access to the computes technology
2. High initial cost for setting up the e-government solutions.
3. Digital security issues
4. Resistance to change
Choose the correct answer
32. Information technology had helped women in which following ways?
33. Example of many to many communication is
34. Which of the following statement is correct?
1. Social media is included in the methods of communication.
2. Social media has highlighted the government's accountability in the present time.
1. Social media is included in the methods of communication.
2. Social media has highlighted the government's accountability in the present time.
35. Which of the following statements is correct?
1. The biggest cause of digital divide is socio-ecomic inequality.
2. Broad level of education promotes digital divide.
1. The biggest cause of digital divide is socio-ecomic inequality.
2. Broad level of education promotes digital divide.
36. Which one of the following is not done by cybercriminals?
37. Which of the following is/are the advantages of internet communities?
1. Instant information exchange
2. Provide recreational pleasure
3. Time saving
4. Establish direct contact between consumer and manufactures.
Choose the correct options
1. Instant information exchange
2. Provide recreational pleasure
3. Time saving
4. Establish direct contact between consumer and manufactures.
Choose the correct options
38. Who has written the book "The Wealth of Networks from 2006"?
39. Match List-I with List-II and select the correct answer:
List I
List II
a. G2C
1. Government to Government
b. G2B
2. Government to Employee
c. G2G
3. Government to Citizen
d. G2E
4. Government to Business
List I | List II |
a. G2C | 1. Government to Government |
b. G2B | 2. Government to Employee |
c. G2G | 3. Government to Citizen |
d. G2E | 4. Government to Business |
40. Match the following in the term of Cybercrimes and Meaning.
List I (Cybercrimes)
List II (Meaning)
a. Social engineering
1. Hackers sending malicious email attachments
b. Cyberstalking
2. Criminals making direct contact
c. Phishing
3. Online harassment
d. DDoS Attacks
4. Make an online service unavailable and take the network down.
List I (Cybercrimes) | List II (Meaning) |
a. Social engineering | 1. Hackers sending malicious email attachments |
b. Cyberstalking | 2. Criminals making direct contact |
c. Phishing | 3. Online harassment |
d. DDoS Attacks | 4. Make an online service unavailable and take the network down. |