81
74.9k

120+ Informatics and Philosophy Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Arts in Philosophy (BA Philosophy) .

51.

Weblogs or blogs are

A. a written message that is sent and received over electronic communication systems
B. audio or video content over the internet
C. personal logs or journal entries that are posted on the web.
D. all of these
Answer» C. personal logs or journal entries that are posted on the web.
52.

Which of the following is a blog site that devotes itself to discussing techno gadgets?

A. www.rottentomatoes.com
B. www.gizmodo.com
C. www.tech. com
D. www.itec.com
Answer» B. www.gizmodo.com
53.

A written message that is sent and received over electronic communication systems is called

A. e .mail
B. weblogs
C. podcast
D. none of these
Answer» A. e .mail
54.

-------------------------is the broadcast of audio or video content over the Internet.

A. a. podcast
B. a webcast
C. weblogs
D. e .mail
Answer» B. a webcast
55.

Name of the educational initiative backed by government of India for information technology is called

A. sakshat
B. rakshat
C. prathyashat
D. none of these
Answer» A. sakshat
56.

E.-books and e-journals are

A. a written message
B. audio or video content
C. the content of open access publishing
D. a subject directory
Answer» C. the content of open access publishing
57.

Claiming another person’s words as your own- this action is known as

A. copyright
B. plagiarism
C. patent
D. none of these
Answer» B. plagiarism
58.

WebCT and Enspire are the tools for

A. e .mail
B. electronic messaging
C. e-learning
D. instant messaging
Answer» C. e-learning
59.

Through ----------------------students can get online education from remote places.

A. virtual classrooms
B. subject directory
C. nicnet
D. inflibnet
Answer» A. virtual classrooms
60.

-------------------------------is a virtual network of libraries

A. nicnet
B. inflibnet
C. brnet
D. none of these
Answer» B. inflibnet
61.

Name the networking infrastructure built by NIC for the e-governance applications.

A. nicnet
B. inflibnet
C. brnet
D. none of these
Answer» A. nicnet
62.

BRNET is related with

A. library information resources
B. geological information resources
C. biological information resources
D. all of these
Answer» C. biological information resources
63.

WBT is an example for

A. a library information resources
B. a geological information resources
C. a biological information resources
D. a computer-based training
Answer» D. a computer-based training
64.

Which of the following is true?

A. podcast content includes radio shows
B. podcast content includes audio books
C. podcast content includes magazines
D. all of these
Answer» D. all of these
65.

Which of the following statement is not true to e-mail

A. it is not the most secure form of transmission
B. it is not a safe way to send personal or sensitive information
C. it is not a popular means of communication
D. none of these
Answer» C. it is not a popular means of communication
66.

Broadband connections includes

A. cable
B. satellite
C. dsl
D. all of these
Answer» D. all of these
67.

ICQ is related with

A. weblogs
B. instant messaging
C. search engines
D. podcasts
Answer» B. instant messaging
68.

----- refers to the gap between people who possess regular access to Information technology and those who do not have this access.

A. cyber crime
B. digital divide
C. hacker
D. virus attack
Answer» B. digital divide
69.

Who started Free software foundation

A. linus torvald
B. richard m stallman
C. gnu
D. none of the above
Answer» B. richard m stallman
70.

Linux is a.

A. database programs
B. application programme
C. operating system
D. none of the above
Answer» C. operating system
71.

This unlawful acts wherein the computer is either a tool or target or both

A. cyber ethics
B. cyber crime
C. cyber literacy
D. cyber abuse
Answer» B. cyber crime
72.

Editing software

A. edusat
B. style writer
C. gliffy
D. cryosat
Answer» B. style writer
73.

A path-breaking effort in the concept of tele-education is

A. satallite
B. cryosat
C. edusat
D. none of these
Answer» C. edusat
74.

Telemedicine is launched by

A. isro
B. nrcs
C. iisc
D. ugc
Answer» A. isro
75.

CCTV is

A. closed circuit television
B. crime detection software
C. communication software
D. all the above
Answer» A. closed circuit television
76.

Academic website end with

A. .ac
B. .ca
C. .org
D. .com
Answer» A. .ac
77.

Britannica is a

A. free online educational software
B. class room aid
C. edutainment
D. none of these
Answer» A. free online educational software
78.

INFLIBNET is

A. sharing of library and information resources
B. free online education software
C. software for sharing information
D. online bio-resource in centre
Answer» A. sharing of library and information resources
79.

An autonomous Inter university Centre of UGC is

A. inflibnet
B. lms
C. arpanet
D. brnet
Answer» A. inflibnet
80.

Google earth is --------

A. entertainment software
B. educational software
C. anti- virus software
D. hardware
Answer» B. educational software
81.

----- is free online software for creating flowcharts, floor plans or other similar diagrams.

A. google earth
B. ktouch
C. inflibnet
D. gliffy
Answer» D. gliffy
82.

Wireless mobile computing is

A. bluetooth
B. wi-fi
C. firewire
D. all of these
Answer» D. all of these
83.

The system involves a concealed transmitter in the chassis of an automobile, which may facilitate the vehicle’s recovery if stolen.

A. cookies
B. firewire
C. lojack
D. google earth
Answer» C. lojack
84.

Which among shows IT for national integration

A. permanent account number (pan)
B. electors photo identity card (epic)
C. sakshat and inflibnet
D. all of these.
Answer» D. all of these.
85.

In order to be considered “OSI Certified” a product which criteria among the following is not applicable?

A. the author or holder of the license of the source code can collect royalties on the distribution of the program.
B. the author must allow modifications and derivations of the work under the program’s original name.
C. no person, group or field of endeavour can be denied access to the program.
D. the rights attached to the program must not depend on the program’s being part of a particular software distribution.
Answer» A. the author or holder of the license of the source code can collect royalties on the distribution of the program.
86.

------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A. free software programme
B. free software development
C. free software foundation
D. the open source initiative.
Answer» D. the open source initiative.
87.

Which among is not to help bridge the digital divide:

A. community organisations such as libraries and recreation centres are providing free internet access to the public.
B. increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate,
C. making linux based open source software widely available so that the computing devices cost less and become more affordable.
D. decrease local and global internet and computer access.
Answer» D. decrease local and global internet and computer access.
88.

Which is the wrong meaning of Digital divide?

A. the discrepancy between the “haves” and "have-notes” with regards to computer technology
B. the gap between people with effective access to digital and information technology and those with very limited or no access at all.
C. exploit the power of the internet for criminal or terrorist purposes.
D. imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen.
Answer» C. exploit the power of the internet for criminal or terrorist purposes.
89.

Software piracy comes under

A. individual’s privacy
B. intellectual property right
C. accountability
D. security of data
Answer» B. intellectual property right
90.

Theft of software comes under ......

A. software piracy
B. intellectual property right
C. individual privacy
D. it stress
Answer» A. software piracy
91.

..... is social networking site

A. orkut
B. facebook
C. myspace
D. all of these
Answer» D. all of these
92.

------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A. bio-computing
B. virtual computing
C. artificial intelligent
D. dna
Answer» A. bio-computing
93.

This unlawful acts wherein the computer is either a tool or target or both

A. cyber ethics
B. cyber crime
C. cyber abuse
D. cyber literacy
Answer» B. cyber crime
94.

Which of the following is annoying, but really doesn’t render any harm to our computer?

A. shareware
B. malware
C. spyware
D. adware
Answer» D. adware
95.

Why do you not want too much personal data about you on the Internet?

A. it might reveal embarrassing facts about you
B. it might be used by an identity thief to impersonate you
C. it might be used by a potential employer to find out more about you
D. there is no reason to worry about personal information on the internet
Answer» B. it might be used by an identity thief to impersonate you
96.

What is the top rule for avoiding Internet fraud?

A. if it seems too good to be true, it probably is
B. never use your bank account numbers
C. only work with people who have verifiable e-mail address
D. do not invest in foreign deals
Answer» C. only work with people who have verifiable e-mail address
97.

One scam that lures internet users into revealing personal information is

A. malware
B. spam
C. phishing
D. internet hoax
Answer» C. phishing
98.

When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n)

A. zero-day attack
B. trojan horse attack
C. distributed denial of service attack
D. boot sector virus attack
Answer» B. trojan horse attack
99.

Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A. worms
B. stealth viruses
C. logic bombs
D. macro viruses
Answer» A. worms
100.

How could hacker use information about you found through Internet searches?

A. to guess passwords if your passwords are linked to personal
B. to guess passwords if your passwords are linked to your interests or hobbies
C. in social engineering, to ascertain more information about you or your computer system
D. all of the above
Answer» D. all of the above

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.