On This Page

This set of Informatics and Philosophy Multiple Choice Questions & Answers (MCQs) focuses on Informatics And Philosophy Set 4

Q1 | Academic website end with
  • .ac
  • .ca
  • .org
  • .com
Q2 | Britannica is a
  • free online educational software
  • class room aid
  • edutainment
  • none of these
Q3 | INFLIBNET is
  • sharing of library and information resources
  • free online education software
  • software for sharing information
  • online bio-resource in centre
Q4 | An autonomous Inter university Centre of UGC is
  • inflibnet
  • lms
  • arpanet
  • brnet
Q5 | Google earth is --------
  • entertainment software
  • educational software
  • anti- virus software
  • hardware
Q6 | ----- is free online software for creating flowcharts, floor plans or other similar diagrams.
  • google earth
  • ktouch
  • inflibnet
  • gliffy
Q7 | Wireless mobile computing is
  • bluetooth
  • wi-fi
  • firewire
  • all of these
Q8 | The system involves a concealed transmitter in the chassis of an automobile, which mayfacilitate the vehicle’s recovery if stolen.
  • cookies
  • firewire
  • lojack
  • google earth
Q9 | Which among shows IT for national integration
  • permanent account number (pan)
  • electors photo identity card (epic)
  • sakshat and inflibnet
  • all of these.
Q10 | In order to be considered “OSI Certified” a product which criteria among the following is notapplicable?
  • the author or holder of the license of the source code can collect royalties on the distribution of the program.
  • the author must allow modifications and derivations of the work under the program’s original name.
  • no person, group or field of endeavour can be denied access to the program.
  • the rights attached to the program must not depend on the program’s being part of a particular software distribution.
Q11 | ------- is a non-profit corporation formed to educate about and advocate for the benefits ofopen source and to build bridges among different constituencies in the open source community.
  • free software programme
  • free software development
  • free software foundation
  • the open source initiative.
Q12 | Which among is not to help bridge the digital divide:
  • community organisations such as libraries and recreation centres are providing free internet access to the public.
  • increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate,
  • making linux based open source software widely available so that the computing devices cost less and become more affordable.
  • decrease local and global internet and computer access.
Q13 | Which is the wrong meaning of Digital divide?
  • the discrepancy between the “haves” and "have-notes” with regards to computer technology
  • the gap between people with effective access to digital and information technology and those with very limited or no access at all.
  • exploit the power of the internet for criminal or terrorist purposes.
  • imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen.
Q14 | Software piracy comes under
  • individual’s privacy
  • intellectual property right
  • accountability
  • security of data
Q15 | Theft of software comes under ......
  • software piracy
  • intellectual property right
  • individual privacy
  • it stress
Q16 | ..... is social networking site
  • orkut
  • facebook
  • myspace
  • all of these
Q17 | ------- can be referred as the use or application of computational devices in the field ofbiological sciences and research.
  • bio-computing
  • virtual computing
  • artificial intelligent
  • dna
Q18 | This unlawful acts wherein the computer is either a tool or target or both
  • cyber ethics
  • cyber crime
  • cyber abuse
  • cyber literacy
Q19 | Which of the following is annoying, but really doesn’t render any harm to our computer?
  • shareware
  • malware
  • spyware
  • adware
Q20 | Why do you not want too much personal data about you on the Internet?
  • it might reveal embarrassing facts about you
  • it might be used by an identity thief to impersonate you
  • it might be used by a potential employer to find out more about you
  • there is no reason to worry about personal information on the internet
Q21 | What is the top rule for avoiding Internet fraud?
  • if it seems too good to be true, it probably is
  • never use your bank account numbers
  • only work with people who have verifiable e-mail address
  • do not invest in foreign deals
Q22 | One scam that lures internet users into revealing personal information is
  • malware
  • spam
  • phishing
  • internet hoax
Q23 | When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n)
  • zero-day attack
  • trojan horse attack
  • distributed denial of service attack
  • boot sector virus attack
Q24 | Virus that travel from computer to computer on their own (i.e. independent of hostileactivity) are called
  • worms
  • stealth viruses
  • logic bombs
  • macro viruses
Q25 | How could hacker use information about you found through Internet searches?
  • to guess passwords if your passwords are linked to personal
  • to guess passwords if your passwords are linked to your interests or hobbies
  • in social engineering, to ascertain more information about you or your computer system
  • all of the above