On This Page
This set of General Informatics Multiple Choice Questions & Answers (MCQs) focuses on General Informatics Set 8
Q1 | CBT stands for:
- computer based training
- computer based tooling
- computer based technology
- none of these
Q2 | TRIPS means……………..
- trade related aspects of intellectual property rights
- trade related activities and information providing rights
- round trip to europe
- none of these
Q3 | Which of the following is a processed thing?
- data
- information
- database
- none of these
Q4 | Which of the following operators cannot be applied to search?
- or
- not
- and
- bool
Q5 | Intellectual Property Rights does not cover the following area
- copyright
- patents
- trademark
- none of these
Q6 | Indiancopyright act came into existence in the year
- 1950
- 1955
- 1957
- none of these
Q7 | …………………..developed a computer language called LOGO, so that children could programcomputers.
- seymorpapert
- jean piaget
- microsoft
- none of the above
Q8 | ……………….. is a computer language developed by Seymour Paper and his colleagues atMIT,so that children could program computers.
- logo
- pogo
- gigo
- none of the above
Q9 | When shopping online which of the following does NOT indicate that you have a secureconnection displays?
- a closed padlock icon in the status bar
- the url begins with https
- the word “secure” in the title bar
- the verisign seal on the web page.
Q10 | Which of the following is annoying, but really doesn’t render any harm to your computer?
- adware
- spyware
- sneakware
- malware
Q11 | One scam that lures internet users into revealing personal information is
- malware
- phishing
- spam
- internet hoax
Q12 | Cell phones use which category of operating systems
- single user, single task
- multi user, multi task
- single user, multitask
- real-time
Q13 | When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a
- zero-day attack
- trojan horse attack
- distributed denial of service attack
- boot sector virus attack
Q14 | Which is a benefit of a firewall?
- they make it harder for a hacker to locate specific computer on a network
- they repeatedly change the ip address of the router
- they open unused logical ports to increase throughput
- they filter out unwanted wireless signals
Q15 | Viruses that travel from computer to computer on their own(independent of host) are called
- worms
- stealth viruses
- logic bombs
- macro viruses
Q16 | Flash drives have replaced floppy disks as the preferred method of portable storagebecause:
- they hold much more data than floppy disks
- data is not magnetic so less subject to errors
- they have quicker access time than a floppy drive
- all of the above
Q17 | Which of the following is not harmful for your computer
- malware
- spyware
- virus
- cookies
Q18 | This is based on individuals who know how to use these technologies and those who do not.
- access
- usage
- usage quality
- none of the above
Q19 | This refers to the gap between people who possess regular access to informationtechnology and those who do not have this access.
- digital divide
- discrimination
- computer divide
- none of these
Q20 | This type of digital divide is based on the difference between individuals with access andthose without access.
- access
- usage
- usage quality
- none of the above
Q21 | It is based on the differences in the quality of using information technology.
- access
- usage
- usage quality
- none of these
Q22 | Who started Free Software foundation?
- linus torvald
- richard m stallman
- gnu
- none of the above
Q23 | This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed.
- data diddling
- salami attacks
- virus attack
- none of the above
Q24 | This kind of crime is normally common in the financial institutions or for the purpose ofcommitting financial crimes.
- data diddling
- salami attacks
- virus attack
- none of the above
Q25 | IT Act in India was amended in
- 2000
- 2004
- 2008
- none of these