McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Arts in Philosophy (BA Philosophy) .
| 251. |
Broadband connections includes |
| A. | cable |
| B. | satellite |
| C. | DSL |
| D. | all of these |
| Answer» D. all of these | |
| 252. |
ICQ is related with |
| A. | Weblogs |
| B. | Instant messaging |
| C. | Search engines |
| D. | Podcasts |
| Answer» B. Instant messaging | |
| 253. |
CCTV is |
| A. | Closed circuit television |
| B. | Crime detection Software |
| C. | Communication software |
| D. | All the above |
| Answer» A. Closed circuit television | |
| 254. |
Britannica is a |
| A. | Free online educational software |
| B. | Class room aid |
| C. | Edutainment |
| D. | None of these |
| Answer» A. Free online educational software | |
| 255. |
INFLIBNET is |
| A. | Sharing of library and information resources |
| B. | Free online education software |
| C. | Software for sharing information |
| D. | Online bio-resource in centre |
| Answer» A. Sharing of library and information resources | |
| 256. |
Google earth is -------- |
| A. | Entertainment software |
| B. | Educational software |
| C. | Anti- virus software |
| D. | Hardware |
| Answer» B. Educational software | |
| 257. |
Which among shows IT for national integration |
| A. | Permanent Account Number (PAN) |
| B. | Electors Photo Identity Card (EPIC) |
| C. | Sakshat and INFLIBNET |
| D. | All of these. |
| Answer» D. All of these. | |
| 258. |
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community. |
| A. | Free Software programme |
| B. | Free Software development |
| C. | Free Software Foundation |
| D. | The open Source Initiative. |
| Answer» D. The open Source Initiative. | |
| 259. |
------- can be referred as the use or application of computational devices in the field of biological sciences and research. |
| A. | Bio-computing |
| B. | Virtual Computing |
| C. | Artificial Intelligent |
| D. | DNA |
| Answer» A. Bio-computing | |
| 260. |
This unlawful acts wherein the computer is either a tool or target or both |
| A. | Cyber ethics |
| B. | Cyber crime |
| C. | Cyber abuse |
| D. | Cyber literacy |
| Answer» B. Cyber crime | |
| 261. |
Which of the following is annoying, but really doesn’t render any harm to our computer? |
| A. | Shareware |
| B. | Malware |
| C. | Spyware |
| D. | Adware |
| Answer» D. Adware | |
| 262. |
Why do you not want too much personal data about you on the Internet? |
| A. | It might reveal embarrassing facts about you |
| B. | It might be used by an identity thief to impersonate you |
| C. | It might be used by a potential employer to find out more about you |
| D. | There is no reason to worry about personal information on the Internet |
| Answer» B. It might be used by an identity thief to impersonate you | |
| 263. |
What is the top rule for avoiding Internet fraud? |
| A. | If it seems too good to be true, it probably is |
| B. | Never use your bank account numbers |
| C. | Only work with people who have verifiable e-mail address |
| D. | Do not invest in foreign deals |
| Answer» C. Only work with people who have verifiable e-mail address | |
| 264. |
One scam that lures internet users into revealing personal information is |
| A. | Malware |
| B. | Spam |
| C. | Phishing |
| D. | Internet hoax |
| Answer» C. Phishing | |
| 265. |
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n) |
| A. | Zero-day Attack |
| B. | Trojan Horse Attack |
| C. | Distributed Denial of Service Attack |
| D. | Boot Sector Virus Attack |
| Answer» B. Trojan Horse Attack | |
| 266. |
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called |
| A. | Worms |
| B. | Stealth Viruses |
| C. | Logic bombs |
| D. | Macro viruses |
| Answer» A. Worms | |
| 267. |
How could hacker use information about you found through Internet searches? |
| A. | To guess passwords if your passwords are linked to personal |
| B. | To guess passwords if your passwords are linked to your interests or hobbies |
| C. | In social engineering, to ascertain more information about you or your computer system |
| D. | All of the above |
| Answer» D. All of the above | |
| 268. |
What is the first step in protecting yourself from identity theft? |
| A. | Never provide any personal data about yourself unless absolutely necessary |
| B. | Routinely check your records for signs of identity theft. |
| C. | Never use your real name on the Internet |
| D. | Routinely check for spyware on your computer. |
| Answer» A. Never provide any personal data about yourself unless absolutely necessary | |
| 269. |
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware? |
| A. | Software that has some malicious purpose |
| B. | Software that is not functioning properly |
| C. | Software that damages your system |
| D. | Software that is not properly configured for your system |
| Answer» B. Software that is not functioning properly | |
| 270. |
Which of the following is a step that all computer users should take to protect against virus attacks? |
| A. | Purchase and configure a firewall |
| B. | Shut down all incoming ports |
| C. | Use non-standard e-mail clients |
| D. | Install and use antivirus software |
| Answer» D. Install and use antivirus software | |
| 271. |
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities. |
| A. | Virtual Computing |
| B. | Artificial Intelligent |
| C. | Bio-computing |
| D. | Cookies |
| Answer» C. Bio-computing | |
| 272. |
------ uses software to allow people to interact with three-dimensional simulated environment. |
| A. | Virtual Computing |
| B. | Artificial Intelligent |
| C. | Bio-computing |
| D. | Cookies |
| Answer» A. Virtual Computing | |
| 273. |
The science and engineering of making intelligent machines, especially intelligent computer programs. |
| A. | Artificial Intelligence |
| B. | Stress Management |
| C. | Anti-Virus |
| D. | Intellectual Property Right |
| Answer» A. Artificial Intelligence | |
| 274. |
Computers are programmed to make decisions in real-life situations are known as |
| A. | Virtual reality |
| B. | Robotics |
| C. | Neural Networks |
| D. | Expert System |
| Answer» D. Expert System | |
| 275. |
Computing systems, which imitate human brain through a network of highly interconnected processing elements. |
| A. | Virtual reality |
| B. | Robotics |
| C. | Neural Networks |
| D. | Expert System |
| Answer» C. Neural Networks | |
| 276. |
Which among the following is not applicable to internet use |
| A. | Do not use email to strangers |
| B. | Do not give out your email address to people you doesn’t know |
| C. | Do not open email attachments from people you don’t know |
| D. | Pretend to be someone else when you are online. |
| Answer» D. Pretend to be someone else when you are online. | |
| 277. |
Which among the following is applicable to internet use |
| A. | Do not sent Spam, Worms and Viruses into cyberspace |
| B. | Do not be rude or use bad language while you use email |
| C. | Do not disclose your personal information such as your bank a/c number, passwords etc |
| D. | All of these |
| Answer» D. All of these | |
| 278. |
Which among the following is unethical use of cell phone |
| A. | Do not accept call while driving |
| B. | Switch off cell phone inside an aircraft |
| C. | Do capture the images of others without permission of that person |
| D. | Keep silent tone in meetings |
| Answer» C. Do capture the images of others without permission of that person | |
| 279. |
A repetitive strain injury (RSI) in computer users caused by |
| A. | Improperly positioned key-boards |
| B. | a/c room |
| C. | Proper lighting |
| D. | Adjustable chair |
| Answer» A. Improperly positioned key-boards | |
| 280. |
Which of the following is not true of ethical computing guidelines |
| A. | Not to use computer to promote lies |
| B. | Use computers with consideration and respect for others |
| C. | Avoid causing harm to othrs when using computer |
| D. | Snoop in other people’s computer files. |
| Answer» D. Snoop in other people’s computer files. | |
| 281. |
The following metric is a measure of the journal quality |
| A. | Impact factor |
| B. | Prize |
| C. | Article size |
| D. | None of the above |
| Answer» A. Impact factor | |
| 282. |
The main advantage(s) of online education is (are) |
| A. | Personalized education |
| B. | Better flexibility |
| C. | Better accessibility |
| D. | All of the above |
| Answer» D. All of the above | |
| 283. |
Pick the odd one out |
| A. | Spam |
| B. | Spyware |
| C. | Antivirus |
| D. | Hoax |
| Answer» C. Antivirus | |
| 284. |
A ............. is a small text file which is placed on your computer on the request made by the web server to your browser. |
| A. | Spam |
| B. | Cookie |
| C. | Web bugs |
| D. | Worms |
| Answer» B. Cookie | |
| 285. |
The commission of illegal acts through the use of computer or against a computer system. |
| A. | Computer Crime |
| B. | Computer Abuse |
| C. | White hacking |
| D. | Cyber Addition |
| Answer» A. Computer Crime | |
| 286. |
----- is an example of software being created independent of any money- making incentive or any property rights |
| A. | Spyware |
| B. | Adware |
| C. | Freeware |
| D. | Malware |
| Answer» C. Freeware | |
| 287. |
A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in: |
| A. | Software piracy |
| B. | Personal privacy |
| C. | Computer theft |
| D. | Identity theft |
| Answer» A. Software piracy | |
| 288. |
Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge. |
| A. | Black-hat hackers |
| B. | White-hat hackers |
| C. | Both Black-hat hackers and White-hat hackers |
| D. | Neither Black-hat hackers nor White-hat hackers |
| Answer» B. White-hat hackers | |
| 289. |
If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as: |
| A. | Quarantining |
| B. | Searching |
| C. | Phishing |
| D. | All of these |
| Answer» A. Quarantining | |
| 290. |
The discrepancy between the “haves” and “have-notes” with regards to computer technology is commonly referred as: |
| A. | Social Justice |
| B. | Intellectual Property Right |
| C. | Digital Divide |
| D. | Accountability |
| Answer» C. Digital Divide | |
| 291. |
An online archive of multidiscipline journal articles in the most significant professional journals. |
| A. | ICPR |
| B. | Jstor |
| C. | Orkut |
| D. | |
| Answer» B. Jstor | |
| 292. |
Which among the following is true |
| A. | Internet is a democratic technology |
| B. | Internet protects personal privacy |
| C. | Internet facilitate the spread of right information |
| D. | None of the above |
| Answer» D. None of the above | |
| 293. |
Which among the following skills need for locating appropriate information on the Internet |
| A. | the ability to use Internet tools such as search engines |
| B. | having knowledge of search techniques and ability to execute the search. |
| C. | One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search. |
| D. | All of these |
| Answer» D. All of these | |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.