Informatics And Philosophy Set 4
On This Page
This set of Informatics and Philosophy Multiple Choice Questions & Answers (MCQs) focuses on Informatics And Philosophy Set 4
Q1 | Academic website end with
- .ac
- .ca
- .org
- .com
Q2 | Britannica is a
- free online educational software
- class room aid
- edutainment
- none of these
Q3 | INFLIBNET is
- sharing of library and information resources
- free online education software
- software for sharing information
- online bio-resource in centre
Q4 | An autonomous Inter university Centre of UGC is
- inflibnet
- lms
- arpanet
- brnet
Q5 | Google earth is --------
- entertainment software
- educational software
- anti- virus software
- hardware
Q6 | ----- is free online software for creating flowcharts, floor plans or other similar diagrams.
- google earth
- ktouch
- inflibnet
- gliffy
Q7 | Wireless mobile computing is
- bluetooth
- wi-fi
- firewire
- all of these
Q8 | The system involves a concealed transmitter in the chassis of an automobile, which mayfacilitate the vehicle’s recovery if stolen.
- cookies
- firewire
- lojack
- google earth
Q9 | Which among shows IT for national integration
- permanent account number (pan)
- electors photo identity card (epic)
- sakshat and inflibnet
- all of these.
Q10 | In order to be considered “OSI Certified” a product which criteria among the following is notapplicable?
- the author or holder of the license of the source code can collect royalties on the distribution of the program.
- the author must allow modifications and derivations of the work under the program’s original name.
- no person, group or field of endeavour can be denied access to the program.
- the rights attached to the program must not depend on the program’s being part of a particular software distribution.
Q11 | ------- is a non-profit corporation formed to educate about and advocate for the benefits ofopen source and to build bridges among different constituencies in the open source community.
- free software programme
- free software development
- free software foundation
- the open source initiative.
Q12 | Which among is not to help bridge the digital divide:
- community organisations such as libraries and recreation centres are providing free internet access to the public.
- increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate,
- making linux based open source software widely available so that the computing devices cost less and become more affordable.
- decrease local and global internet and computer access.
Q13 | Which is the wrong meaning of Digital divide?
- the discrepancy between the “haves” and "have-notes” with regards to computer technology
- the gap between people with effective access to digital and information technology and those with very limited or no access at all.
- exploit the power of the internet for criminal or terrorist purposes.
- imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen.
Q14 | Software piracy comes under
- individual’s privacy
- intellectual property right
- accountability
- security of data
Q15 | Theft of software comes under ......
- software piracy
- intellectual property right
- individual privacy
- it stress
Q16 | ..... is social networking site
- orkut
- myspace
- all of these
Q17 | ------- can be referred as the use or application of computational devices in the field ofbiological sciences and research.
- bio-computing
- virtual computing
- artificial intelligent
- dna
Q18 | This unlawful acts wherein the computer is either a tool or target or both
- cyber ethics
- cyber crime
- cyber abuse
- cyber literacy
Q19 | Which of the following is annoying, but really doesn’t render any harm to our computer?
- shareware
- malware
- spyware
- adware
Q20 | Why do you not want too much personal data about you on the Internet?
- it might reveal embarrassing facts about you
- it might be used by an identity thief to impersonate you
- it might be used by a potential employer to find out more about you
- there is no reason to worry about personal information on the internet
Q21 | What is the top rule for avoiding Internet fraud?
- if it seems too good to be true, it probably is
- never use your bank account numbers
- only work with people who have verifiable e-mail address
- do not invest in foreign deals
Q22 | One scam that lures internet users into revealing personal information is
- malware
- spam
- phishing
- internet hoax
Q23 | When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n)
- zero-day attack
- trojan horse attack
- distributed denial of service attack
- boot sector virus attack
Q24 | Virus that travel from computer to computer on their own (i.e. independent of hostileactivity) are called
- worms
- stealth viruses
- logic bombs
- macro viruses
Q25 | How could hacker use information about you found through Internet searches?
- to guess passwords if your passwords are linked to personal
- to guess passwords if your passwords are linked to your interests or hobbies
- in social engineering, to ascertain more information about you or your computer system
- all of the above