147
103.7k

290+ Philosophy of Informatics Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Arts in Philosophy (BA Philosophy) .

151.

The policy of ----------------- has allowed a range of exceptions to the copyright provision.

A. limited use
B. ipr
C. specific use
D. fair use
Answer» D. fair use
152.

------------------ is based on the belief that the public is entitled to freely use portions of copyrighted materials for certain purpose.

A. limited use
B. ipr
C. specific use
D. fair use
Answer» D. fair use
153.

WebCT is :

A. an virtual classroom package
B. a chat group
C. an e-learning tool
D. social network
Answer» C. an e-learning tool
154.

------------- is the training, which delivers educational content through a web browser over the public or private interest.

A. ics
B. wbt
C. virtual classroom
D. cbt
Answer» B. wbt
155.

-------------------- is the where a computer program provides motivation and feedback in place of a live instructor.

A. ics
B. wbt
C. virtual classroom
D. cbt
Answer» D. cbt
156.

--------------- is the technology which captivate the student’s interest.

A. wbt
B. virtual classroom
C. cbt
D. ict
Answer» B. virtual classroom
157.

-------------------- is meant for e-governance applications.

A. brnet
B. inflibnet
C. vast
D. nicnet
Answer» D. nicnet
158.

Spam means:

A. unwanted e-mail
B. virus
C. software
D. search engine
Answer» A. unwanted e-mail
159.

----------------------- are small text files that some web sites automatically store on your computer hard drive when you visit the site.

A. spam
B. cookies
C. adware
D. malware
Answer» B. cookies
160.

Phishing is related to:

A. copy right
B. virus
C. e-learning
D. identity theft
Answer» D. identity theft
161.

------------------- contain information that is untrue.

A. cookies
B. virus
C. internet hoaxes
D. spam
Answer» C. internet hoaxes
162.

A ---------------- defined as anyone who breaks into a computer system unlawfully.

A. hacker
B. virus
C. spam
D. internet hoaxes
Answer» A. hacker
163.

A ---------------------- is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without our knowledge.

A. hacker
B. virus
C. trojan horse
D. cookies
Answer» C. trojan horse
164.

-------------------- is a computer program that attaches itself to another computer program and attempts to spread it to other computers when files are exchanged.

A. hacker
B. virus
C. trojan horse
D. cookies
Answer» B. virus
165.

What is logic bomb?

A. hacker
B. virus
C. trojan horse
D. cookies
Answer» B. virus
166.

---------------- are viruses that are triggered by the passage of time or on certain date.

A. trojan horses
B. worms
C. logic bombs
D. time bombs
Answer» D. time bombs
167.

--------------------- slightly different from virus.

A. trojan horses
B. worms
C. logic bombs
D. cookies
Answer» B. worms
168.

A computer user copies an application onto more than one computer, if the license agreement does not permit this, is participating:

A. phishing
B. hacking
C. identity theft
D. software piracy
Answer» D. software piracy
169.

----------------- is an agreement between the user and the software developer.

A. copy right
B. software license
C. ipr
D. none of these
Answer» B. software license
170.

The Computer Ethics Institute of United States developed:

A. guide lines for fair use
B. free software program
C. anti-virus program
D. ten
Answer» D. ten
171.

------------------------- is treated as the bench mark for ethical computing.

A. copyright law
B. ipr law
C. ten commandments of computer ethics
D. six commandments of computer ethics
Answer» C. ten commandments of computer ethics
172.

------------ is the right to be left alone to do as one pleases.

A. ipr
B. privacy
C. copy right
D. freedom
Answer» B. privacy
173.

Which state among the following is claimed Privacy is a basic human right?

A. united states of america
B. britain
C. india
D. netherland
Answer» A. united states of america
174.

In India Cyber laws have been defined under the:

A. cyber law act, 2000
B. ethical computing law, 2005
C. it act, 2000
D. cyber act 2003
Answer» C. it act, 2000
175.

----------------- comprise of a set of legal provisions to regulate the activities of cyber space or internet.

A. cyber ethics
B. cyber laws
C. it act 2000
D. internet laws
Answer» B. cyber laws
176.

The state in which the too much use of the computer and internet, affecting the routine life of an individual is called:

A. internet addiction
B. cyber divide
C. software addiction
D. cyber addiction
Answer» D. cyber addiction
177.

An individual who becomes too much dependent on computer and internet is called:

A. computer addict
B. internet addict
C. cyber addict
D. technocrat
Answer» C. cyber addict
178.

Net gamming related to:

A. cyber addiction
B. cyber law
C. copy right
D. cyber ethics
Answer» A. cyber addiction
179.

------------ refers the addiction toward unlimited information available on the internet.

A. cyber addiction
B. internet addiction
C. information overloaded
D. knowledge
Answer» C. information overloaded
180.

------------------ is a study involving efficient usage of computer resources.

A. eco computing
B. green computing
C. sustainable computing
D. natural computing
Answer» B. green computing
181.

Efficient algorithm is related to:

A. software development
B. free software movement
C. digital divide
D. green computing
Answer» D. green computing
182.

Which among the following is considered as a key approach of Green computing.

A. virtualization of computer system
B. net computing
C. resource computing
Answer» A. virtualization of computer system
183.

-------------- is a specific feature of a computer

A. Mechanical
B. Accuracy
C. Compactness
D. None of these
Answer» B. Accuracy
184.

Which one is called a storage device?

A. Monitor
B. CPU
C. Mother Board
D. CD-ROM
Answer» D. CD-ROM
185.

An -------------------enables you to enter data and instructions into the computer

A. Input device
B. Output device
C. Printer
D. CD-ROM
Answer» A. Input device
186.

Which of the following is the leading keyboard?

A. Cursor control keyboard
B. QWERTY key board
C. Dvorak Keyboard
D. Gaming key board
Answer» C. Dvorak Keyboard
187.

There are two primary categories of printers, which are they?

A. Impact and Nonimpact
B. laser and Inkjet
C. Colour and black
D. None of these
Answer» A. Impact and Nonimpact
188.

LCD monitors using ---------------------------technology

A. Cathode-ray tube
B. digital
C. crystal
D. liquid crystal display
Answer» D. liquid crystal display
189.

Which of the following is the most common example of a locally administered network?

A. Server network
B. peer - to- peer network
C. central network
D. none of these
Answer» B. peer - to- peer network
190.

The term network architecture means.

A. the design of a network
B. peer - to- peer network
C. locally administered network
D. net work group
Answer» A. the design of a network
191.

The first Web domain was hosted on the Web on

A. September 1990,
B. November 1990,
C. December 1990,
D. December 1991,
Answer» C. December 1990,
192.

---------------------------------------, are generally acknowledge as the “fathers” of the Internet.

A. Babbage and Cerf
B. Vinton Cerf and Robert Kahn
C. Robert Kahn and Michel
D. Vinton Cerf and Michel
Answer» B. Vinton Cerf and Robert Kahn
193.

LAN means

A. Long area networks
B. Listed area networks
C. Local area networks
D. Land area networks
Answer» C. Local area networks
194.

WAN means

A. Wild area networks
B. Western area networks
C. Wide area networks
D. None of these
Answer» C. Wide area networks
195.

---------------------technology provides a cost-effective means for electronic communication

A. ATM
B. Mobile
C. Wireless
D. None of these
Answer» C. Wireless
196.

The largest and fastest pathway is the main artery of the Internet is called

A. Internet backbone,
B. Internet artery
C. Internet Nerve
D. None of these
Answer» A. Internet backbone,
197.

LSN means

A. Local space networking,
B. Large size networking
C. Long scale networking
D. Large Scale Networking
Answer» D. Large Scale Networking
198.

--------------------------networks are true multi-service networks with the potential to offer broadband services

A. ATM
B. LSN
C. WAN
D. None of these
Answer» A. ATM
199.

---------------------------are a result of the combination of features of various portable devices

A. Portable media players
B. Smart phones
C. Personal digital assistants
D. Cellular phones
Answer» B. Smart phones
200.

Which is considered as an expensive and powerful tool for carrying electronic information?

A. Notebook computers
B. Smart phones
C. Cellular phones
D. Portable media players
Answer» A. Notebook computers

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.