On This Page

This set of General Informatics Multiple Choice Questions & Answers (MCQs) focuses on General Informatics Set 8

Q1 | CBT stands for:
  • computer based training
  • computer based tooling
  • computer based technology
  • none of these
Q2 | TRIPS means……………..
  • trade related aspects of intellectual property rights
  • trade related activities and information providing rights
  • round trip to europe
  • none of these
Q3 | Which of the following is a processed thing?
  • data
  • information
  • database
  • none of these
Q4 | Which of the following operators cannot be applied to search?
  • or
  • not
  • and
  • bool
Q5 | Intellectual Property Rights does not cover the following area
  • copyright
  • patents
  • trademark
  • none of these
Q6 | Indiancopyright act came into existence in the year
  • 1950
  • 1955
  • 1957
  • none of these
Q7 | …………………..developed a computer language called LOGO, so that children could programcomputers.
  • seymorpapert
  • jean piaget
  • microsoft
  • none of the above
Q8 | ……………….. is a computer language developed by Seymour Paper and his colleagues atMIT,so that children could program computers.
  • logo
  • pogo
  • gigo
  • none of the above
Q9 | When shopping online which of the following does NOT indicate that you have a secureconnection displays?
  • a closed padlock icon in the status bar
  • the url begins with https
  • the word “secure” in the title bar
  • the verisign seal on the web page.
Q10 | Which of the following is annoying, but really doesn’t render any harm to your computer?
  • adware
  • spyware
  • sneakware
  • malware
Q11 | One scam that lures internet users into revealing personal information is
  • malware
  • phishing
  • spam
  • internet hoax
Q12 | Cell phones use which category of operating systems
  • single user, single task
  • multi user, multi task
  • single user, multitask
  • real-time
Q13 | When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a
  • zero-day attack
  • trojan horse attack
  • distributed denial of service attack
  • boot sector virus attack
Q14 | Which is a benefit of a firewall?
  • they make it harder for a hacker to locate specific computer on a network
  • they repeatedly change the ip address of the router
  • they open unused logical ports to increase throughput
  • they filter out unwanted wireless signals
Q15 | Viruses that travel from computer to computer on their own(independent of host) are called
  • worms
  • stealth viruses
  • logic bombs
  • macro viruses
Q16 | Flash drives have replaced floppy disks as the preferred method of portable storagebecause:
  • they hold much more data than floppy disks
  • data is not magnetic so less subject to errors
  • they have quicker access time than a floppy drive
  • all of the above
Q17 | Which of the following is not harmful for your computer
  • malware
  • spyware
  • virus
  • cookies
Q18 | This is based on individuals who know how to use these technologies and those who do not.
  • access
  • usage
  • usage quality
  • none of the above
Q19 | This refers to the gap between people who possess regular access to informationtechnology and those who do not have this access.
  • digital divide
  • discrimination
  • computer divide
  • none of these
Q20 | This type of digital divide is based on the difference between individuals with access andthose without access.
  • access
  • usage
  • usage quality
  • none of the above
Q21 | It is based on the differences in the quality of using information technology.
  • access
  • usage
  • usage quality
  • none of these
Q22 | Who started Free Software foundation?
  • linus torvald
  • richard m stallman
  • gnu
  • none of the above
Q23 | This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed.
  • data diddling
  • salami attacks
  • virus attack
  • none of the above
Q24 | This kind of crime is normally common in the financial institutions or for the purpose ofcommitting financial crimes.
  • data diddling
  • salami attacks
  • virus attack
  • none of the above
Q25 | IT Act in India was amended in
  • 2000
  • 2004
  • 2008
  • none of these