McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Arts in Philosophy (BA Philosophy) .
51. |
Weblogs or blogs are |
A. | a written message that is sent and received over electronic communication systems |
B. | audio or video content over the internet |
C. | personal logs or journal entries that are posted on the web. |
D. | all of these |
Answer» C. personal logs or journal entries that are posted on the web. |
52. |
Which of the following is a blog site that devotes itself to discussing techno gadgets? |
A. | www.rottentomatoes.com |
B. | www.gizmodo.com |
C. | www.tech. com |
D. | www.itec.com |
Answer» B. www.gizmodo.com |
53. |
A written message that is sent and received over electronic communication systems is called |
A. | e .mail |
B. | weblogs |
C. | podcast |
D. | none of these |
Answer» A. e .mail |
54. |
-------------------------is the broadcast of audio or video content over the Internet. |
A. | a. podcast |
B. | a webcast |
C. | weblogs |
D. | e .mail |
Answer» B. a webcast |
55. |
Name of the educational initiative backed by government of India for information technology is called |
A. | sakshat |
B. | rakshat |
C. | prathyashat |
D. | none of these |
Answer» A. sakshat |
56. |
E.-books and e-journals are |
A. | a written message |
B. | audio or video content |
C. | the content of open access publishing |
D. | a subject directory |
Answer» C. the content of open access publishing |
57. |
Claiming another person’s words as your own- this action is known as |
A. | copyright |
B. | plagiarism |
C. | patent |
D. | none of these |
Answer» B. plagiarism |
58. |
WebCT and Enspire are the tools for |
A. | e .mail |
B. | electronic messaging |
C. | e-learning |
D. | instant messaging |
Answer» C. e-learning |
59. |
Through ----------------------students can get online education from remote places. |
A. | virtual classrooms |
B. | subject directory |
C. | nicnet |
D. | inflibnet |
Answer» A. virtual classrooms |
60. |
-------------------------------is a virtual network of libraries |
A. | nicnet |
B. | inflibnet |
C. | brnet |
D. | none of these |
Answer» B. inflibnet |
61. |
Name the networking infrastructure built by NIC for the e-governance applications. |
A. | nicnet |
B. | inflibnet |
C. | brnet |
D. | none of these |
Answer» A. nicnet |
62. |
BRNET is related with |
A. | library information resources |
B. | geological information resources |
C. | biological information resources |
D. | all of these |
Answer» C. biological information resources |
63. |
WBT is an example for |
A. | a library information resources |
B. | a geological information resources |
C. | a biological information resources |
D. | a computer-based training |
Answer» D. a computer-based training |
64. |
Which of the following is true? |
A. | podcast content includes radio shows |
B. | podcast content includes audio books |
C. | podcast content includes magazines |
D. | all of these |
Answer» D. all of these |
65. |
Which of the following statement is not true to e-mail |
A. | it is not the most secure form of transmission |
B. | it is not a safe way to send personal or sensitive information |
C. | it is not a popular means of communication |
D. | none of these |
Answer» C. it is not a popular means of communication |
66. |
Broadband connections includes |
A. | cable |
B. | satellite |
C. | dsl |
D. | all of these |
Answer» D. all of these |
67. |
ICQ is related with |
A. | weblogs |
B. | instant messaging |
C. | search engines |
D. | podcasts |
Answer» B. instant messaging |
68. |
----- refers to the gap between people who possess regular access to Information technology and those who do not have this access. |
A. | cyber crime |
B. | digital divide |
C. | hacker |
D. | virus attack |
Answer» B. digital divide |
69. |
Who started Free software foundation |
A. | linus torvald |
B. | richard m stallman |
C. | gnu |
D. | none of the above |
Answer» B. richard m stallman |
70. |
Linux is a. |
A. | database programs |
B. | application programme |
C. | operating system |
D. | none of the above |
Answer» C. operating system |
71. |
This unlawful acts wherein the computer is either a tool or target or both |
A. | cyber ethics |
B. | cyber crime |
C. | cyber literacy |
D. | cyber abuse |
Answer» B. cyber crime |
72. |
Editing software |
A. | edusat |
B. | style writer |
C. | gliffy |
D. | cryosat |
Answer» B. style writer |
73. |
A path-breaking effort in the concept of tele-education is |
A. | satallite |
B. | cryosat |
C. | edusat |
D. | none of these |
Answer» C. edusat |
74. |
Telemedicine is launched by |
A. | isro |
B. | nrcs |
C. | iisc |
D. | ugc |
Answer» A. isro |
75. |
CCTV is |
A. | closed circuit television |
B. | crime detection software |
C. | communication software |
D. | all the above |
Answer» A. closed circuit television |
76. |
Academic website end with |
A. | .ac |
B. | .ca |
C. | .org |
D. | .com |
Answer» A. .ac |
77. |
Britannica is a |
A. | free online educational software |
B. | class room aid |
C. | edutainment |
D. | none of these |
Answer» A. free online educational software |
78. |
INFLIBNET is |
A. | sharing of library and information resources |
B. | free online education software |
C. | software for sharing information |
D. | online bio-resource in centre |
Answer» A. sharing of library and information resources |
79. |
An autonomous Inter university Centre of UGC is |
A. | inflibnet |
B. | lms |
C. | arpanet |
D. | brnet |
Answer» A. inflibnet |
80. |
Google earth is -------- |
A. | entertainment software |
B. | educational software |
C. | anti- virus software |
D. | hardware |
Answer» B. educational software |
81. |
----- is free online software for creating flowcharts, floor plans or other similar diagrams. |
A. | google earth |
B. | ktouch |
C. | inflibnet |
D. | gliffy |
Answer» D. gliffy |
82. |
Wireless mobile computing is |
A. | bluetooth |
B. | wi-fi |
C. | firewire |
D. | all of these |
Answer» D. all of these |
83. |
The system involves a concealed transmitter in the chassis of an automobile, which may facilitate the vehicle’s recovery if stolen. |
A. | cookies |
B. | firewire |
C. | lojack |
D. | google earth |
Answer» C. lojack |
84. |
Which among shows IT for national integration |
A. | permanent account number (pan) |
B. | electors photo identity card (epic) |
C. | sakshat and inflibnet |
D. | all of these. |
Answer» D. all of these. |
85. |
In order to be considered “OSI Certified” a product which criteria among the following is not applicable? |
A. | the author or holder of the license of the source code can collect royalties on the distribution of the program. |
B. | the author must allow modifications and derivations of the work under the program’s original name. |
C. | no person, group or field of endeavour can be denied access to the program. |
D. | the rights attached to the program must not depend on the program’s being part of a particular software distribution. |
Answer» A. the author or holder of the license of the source code can collect royalties on the distribution of the program. |
86. |
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community. |
A. | free software programme |
B. | free software development |
C. | free software foundation |
D. | the open source initiative. |
Answer» D. the open source initiative. |
87. |
Which among is not to help bridge the digital divide: |
A. | community organisations such as libraries and recreation centres are providing free internet access to the public. |
B. | increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate, |
C. | making linux based open source software widely available so that the computing devices cost less and become more affordable. |
D. | decrease local and global internet and computer access. |
Answer» D. decrease local and global internet and computer access. |
88. |
Which is the wrong meaning of Digital divide? |
A. | the discrepancy between the “haves” and "have-notes” with regards to computer technology |
B. | the gap between people with effective access to digital and information technology and those with very limited or no access at all. |
C. | exploit the power of the internet for criminal or terrorist purposes. |
D. | imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen. |
Answer» C. exploit the power of the internet for criminal or terrorist purposes. |
89. |
Software piracy comes under |
A. | individual’s privacy |
B. | intellectual property right |
C. | accountability |
D. | security of data |
Answer» B. intellectual property right |
90. |
Theft of software comes under ...... |
A. | software piracy |
B. | intellectual property right |
C. | individual privacy |
D. | it stress |
Answer» A. software piracy |
91. |
..... is social networking site |
A. | orkut |
B. | |
C. | myspace |
D. | all of these |
Answer» D. all of these |
92. |
------- can be referred as the use or application of computational devices in the field of biological sciences and research. |
A. | bio-computing |
B. | virtual computing |
C. | artificial intelligent |
D. | dna |
Answer» A. bio-computing |
93. |
This unlawful acts wherein the computer is either a tool or target or both |
A. | cyber ethics |
B. | cyber crime |
C. | cyber abuse |
D. | cyber literacy |
Answer» B. cyber crime |
94. |
Which of the following is annoying, but really doesn’t render any harm to our computer? |
A. | shareware |
B. | malware |
C. | spyware |
D. | adware |
Answer» D. adware |
95. |
Why do you not want too much personal data about you on the Internet? |
A. | it might reveal embarrassing facts about you |
B. | it might be used by an identity thief to impersonate you |
C. | it might be used by a potential employer to find out more about you |
D. | there is no reason to worry about personal information on the internet |
Answer» B. it might be used by an identity thief to impersonate you |
96. |
What is the top rule for avoiding Internet fraud? |
A. | if it seems too good to be true, it probably is |
B. | never use your bank account numbers |
C. | only work with people who have verifiable e-mail address |
D. | do not invest in foreign deals |
Answer» C. only work with people who have verifiable e-mail address |
97. |
One scam that lures internet users into revealing personal information is |
A. | malware |
B. | spam |
C. | phishing |
D. | internet hoax |
Answer» C. phishing |
98. |
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n) |
A. | zero-day attack |
B. | trojan horse attack |
C. | distributed denial of service attack |
D. | boot sector virus attack |
Answer» B. trojan horse attack |
99. |
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called |
A. | worms |
B. | stealth viruses |
C. | logic bombs |
D. | macro viruses |
Answer» A. worms |
100. |
How could hacker use information about you found through Internet searches? |
A. | to guess passwords if your passwords are linked to personal |
B. | to guess passwords if your passwords are linked to your interests or hobbies |
C. | in social engineering, to ascertain more information about you or your computer system |
D. | all of the above |
Answer» D. all of the above |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.