McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Arts in Philosophy (BA Philosophy) .
| 151. |
The policy of ----------------- has allowed a range of exceptions to the copyright provision. |
| A. | limited use |
| B. | ipr |
| C. | specific use |
| D. | fair use |
| Answer» D. fair use | |
| 152. |
------------------ is based on the belief that the public is entitled to freely use portions of copyrighted materials for certain purpose. |
| A. | limited use |
| B. | ipr |
| C. | specific use |
| D. | fair use |
| Answer» D. fair use | |
| 153. |
WebCT is : |
| A. | an virtual classroom package |
| B. | a chat group |
| C. | an e-learning tool |
| D. | social network |
| Answer» C. an e-learning tool | |
| 154. |
------------- is the training, which delivers educational content through a web browser over the public or private interest. |
| A. | ics |
| B. | wbt |
| C. | virtual classroom |
| D. | cbt |
| Answer» B. wbt | |
| 155. |
-------------------- is the where a computer program provides motivation and feedback in place of a live instructor. |
| A. | ics |
| B. | wbt |
| C. | virtual classroom |
| D. | cbt |
| Answer» D. cbt | |
| 156. |
--------------- is the technology which captivate the student’s interest. |
| A. | wbt |
| B. | virtual classroom |
| C. | cbt |
| D. | ict |
| Answer» B. virtual classroom | |
| 157. |
-------------------- is meant for e-governance applications. |
| A. | brnet |
| B. | inflibnet |
| C. | vast |
| D. | nicnet |
| Answer» D. nicnet | |
| 158. |
Spam means: |
| A. | unwanted e-mail |
| B. | virus |
| C. | software |
| D. | search engine |
| Answer» A. unwanted e-mail | |
| 159. |
----------------------- are small text files that some web sites automatically store on your computer hard drive when you visit the site. |
| A. | spam |
| B. | cookies |
| C. | adware |
| D. | malware |
| Answer» B. cookies | |
| 160. |
Phishing is related to: |
| A. | copy right |
| B. | virus |
| C. | e-learning |
| D. | identity theft |
| Answer» D. identity theft | |
| 161. |
------------------- contain information that is untrue. |
| A. | cookies |
| B. | virus |
| C. | internet hoaxes |
| D. | spam |
| Answer» C. internet hoaxes | |
| 162. |
A ---------------- defined as anyone who breaks into a computer system unlawfully. |
| A. | hacker |
| B. | virus |
| C. | spam |
| D. | internet hoaxes |
| Answer» A. hacker | |
| 163. |
A ---------------------- is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without our knowledge. |
| A. | hacker |
| B. | virus |
| C. | trojan horse |
| D. | cookies |
| Answer» C. trojan horse | |
| 164. |
-------------------- is a computer program that attaches itself to another computer program and attempts to spread it to other computers when files are exchanged. |
| A. | hacker |
| B. | virus |
| C. | trojan horse |
| D. | cookies |
| Answer» B. virus | |
| 165. |
What is logic bomb? |
| A. | hacker |
| B. | virus |
| C. | trojan horse |
| D. | cookies |
| Answer» B. virus | |
| 166. |
---------------- are viruses that are triggered by the passage of time or on certain date. |
| A. | trojan horses |
| B. | worms |
| C. | logic bombs |
| D. | time bombs |
| Answer» D. time bombs | |
| 167. |
--------------------- slightly different from virus. |
| A. | trojan horses |
| B. | worms |
| C. | logic bombs |
| D. | cookies |
| Answer» B. worms | |
| 168. |
A computer user copies an application onto more than one computer, if the license agreement does not permit this, is participating: |
| A. | phishing |
| B. | hacking |
| C. | identity theft |
| D. | software piracy |
| Answer» D. software piracy | |
| 169. |
----------------- is an agreement between the user and the software developer. |
| A. | copy right |
| B. | software license |
| C. | ipr |
| D. | none of these |
| Answer» B. software license | |
| 170. |
The Computer Ethics Institute of United States developed: |
| A. | guide lines for fair use |
| B. | free software program |
| C. | anti-virus program |
| D. | ten |
| Answer» D. ten | |
| 171. |
------------------------- is treated as the bench mark for ethical computing. |
| A. | copyright law |
| B. | ipr law |
| C. | ten commandments of computer ethics |
| D. | six commandments of computer ethics |
| Answer» C. ten commandments of computer ethics | |
| 172. |
------------ is the right to be left alone to do as one pleases. |
| A. | ipr |
| B. | privacy |
| C. | copy right |
| D. | freedom |
| Answer» B. privacy | |
| 173. |
Which state among the following is claimed Privacy is a basic human right? |
| A. | united states of america |
| B. | britain |
| C. | india |
| D. | netherland |
| Answer» A. united states of america | |
| 174. |
In India Cyber laws have been defined under the: |
| A. | cyber law act, 2000 |
| B. | ethical computing law, 2005 |
| C. | it act, 2000 |
| D. | cyber act 2003 |
| Answer» C. it act, 2000 | |
| 175. |
----------------- comprise of a set of legal provisions to regulate the activities of cyber space or internet. |
| A. | cyber ethics |
| B. | cyber laws |
| C. | it act 2000 |
| D. | internet laws |
| Answer» B. cyber laws | |
| 176. |
The state in which the too much use of the computer and internet, affecting the routine life of an individual is called: |
| A. | internet addiction |
| B. | cyber divide |
| C. | software addiction |
| D. | cyber addiction |
| Answer» D. cyber addiction | |
| 177. |
An individual who becomes too much dependent on computer and internet is called: |
| A. | computer addict |
| B. | internet addict |
| C. | cyber addict |
| D. | technocrat |
| Answer» C. cyber addict | |
| 178. |
Net gamming related to: |
| A. | cyber addiction |
| B. | cyber law |
| C. | copy right |
| D. | cyber ethics |
| Answer» A. cyber addiction | |
| 179. |
------------ refers the addiction toward unlimited information available on the internet. |
| A. | cyber addiction |
| B. | internet addiction |
| C. | information overloaded |
| D. | knowledge |
| Answer» C. information overloaded | |
| 180. |
------------------ is a study involving efficient usage of computer resources. |
| A. | eco computing |
| B. | green computing |
| C. | sustainable computing |
| D. | natural computing |
| Answer» B. green computing | |
| 181. |
Efficient algorithm is related to: |
| A. | software development |
| B. | free software movement |
| C. | digital divide |
| D. | green computing |
| Answer» D. green computing | |
| 182. |
Which among the following is considered as a key approach of Green computing. |
| A. | virtualization of computer system |
| B. | net computing |
| C. | resource computing |
| Answer» A. virtualization of computer system | |
| 183. |
-------------- is a specific feature of a computer |
| A. | Mechanical |
| B. | Accuracy |
| C. | Compactness |
| D. | None of these |
| Answer» B. Accuracy | |
| 184. |
Which one is called a storage device? |
| A. | Monitor |
| B. | CPU |
| C. | Mother Board |
| D. | CD-ROM |
| Answer» D. CD-ROM | |
| 185. |
An -------------------enables you to enter data and instructions into the computer |
| A. | Input device |
| B. | Output device |
| C. | Printer |
| D. | CD-ROM |
| Answer» A. Input device | |
| 186. |
Which of the following is the leading keyboard? |
| A. | Cursor control keyboard |
| B. | QWERTY key board |
| C. | Dvorak Keyboard |
| D. | Gaming key board |
| Answer» C. Dvorak Keyboard | |
| 187. |
There are two primary categories of printers, which are they? |
| A. | Impact and Nonimpact |
| B. | laser and Inkjet |
| C. | Colour and black |
| D. | None of these |
| Answer» A. Impact and Nonimpact | |
| 188. |
LCD monitors using ---------------------------technology |
| A. | Cathode-ray tube |
| B. | digital |
| C. | crystal |
| D. | liquid crystal display |
| Answer» D. liquid crystal display | |
| 189. |
Which of the following is the most common example of a locally administered network? |
| A. | Server network |
| B. | peer - to- peer network |
| C. | central network |
| D. | none of these |
| Answer» B. peer - to- peer network | |
| 190. |
The term network architecture means. |
| A. | the design of a network |
| B. | peer - to- peer network |
| C. | locally administered network |
| D. | net work group |
| Answer» A. the design of a network | |
| 191. |
The first Web domain was hosted on the Web on |
| A. | September 1990, |
| B. | November 1990, |
| C. | December 1990, |
| D. | December 1991, |
| Answer» C. December 1990, | |
| 192. |
---------------------------------------, are generally acknowledge as the “fathers” of the Internet. |
| A. | Babbage and Cerf |
| B. | Vinton Cerf and Robert Kahn |
| C. | Robert Kahn and Michel |
| D. | Vinton Cerf and Michel |
| Answer» B. Vinton Cerf and Robert Kahn | |
| 193. |
LAN means |
| A. | Long area networks |
| B. | Listed area networks |
| C. | Local area networks |
| D. | Land area networks |
| Answer» C. Local area networks | |
| 194. |
WAN means |
| A. | Wild area networks |
| B. | Western area networks |
| C. | Wide area networks |
| D. | None of these |
| Answer» C. Wide area networks | |
| 195. |
---------------------technology provides a cost-effective means for electronic communication |
| A. | ATM |
| B. | Mobile |
| C. | Wireless |
| D. | None of these |
| Answer» C. Wireless | |
| 196. |
The largest and fastest pathway is the main artery of the Internet is called |
| A. | Internet backbone, |
| B. | Internet artery |
| C. | Internet Nerve |
| D. | None of these |
| Answer» A. Internet backbone, | |
| 197. |
LSN means |
| A. | Local space networking, |
| B. | Large size networking |
| C. | Long scale networking |
| D. | Large Scale Networking |
| Answer» D. Large Scale Networking | |
| 198. |
--------------------------networks are true multi-service networks with the potential to offer broadband services |
| A. | ATM |
| B. | LSN |
| C. | WAN |
| D. | None of these |
| Answer» A. ATM | |
| 199. |
---------------------------are a result of the combination of features of various portable devices |
| A. | Portable media players |
| B. | Smart phones |
| C. | Personal digital assistants |
| D. | Cellular phones |
| Answer» B. Smart phones | |
| 200. |
Which is considered as an expensive and powerful tool for carrying electronic information? |
| A. | Notebook computers |
| B. | Smart phones |
| C. | Cellular phones |
| D. | Portable media players |
| Answer» A. Notebook computers | |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.