On This Page

This set of Philosophy of Informatics Multiple Choice Questions & Answers (MCQs) focuses on Philosophy Of Informatics Set 11

Q1 | Broadband connections includes
  • cable
  • satellite
  • DSL
  • all of these
Q2 | ICQ is related with
  • Weblogs
  • Instant messaging
  • Search engines
  • Podcasts
Q3 | CCTV is
  • Closed circuit television
  • Crime detection Software
  • Communication software
  • All the above
Q4 | Britannica is a
  • Free online educational software
  • Class room aid
  • Edutainment
  • None of these
Q5 | INFLIBNET is
  • Sharing of library and information resources
  • Free online education software
  • Software for sharing information
  • Online bio-resource in centre
Q6 | Google earth is --------
  • Entertainment software
  • Educational software
  • Anti- virus software
  • Hardware
Q7 | Which among shows IT for national integration
  • Permanent Account Number (PAN)
  • Electors Photo Identity Card (EPIC)
  • Sakshat and INFLIBNET
  • All of these.
Q8 | ------- is a non-profit corporation formed to educate about and advocate for the benefits ofopen source and to build bridges among different constituencies in the open source community.
  • Free Software programme
  • Free Software development
  • Free Software Foundation
  • The open Source Initiative.
Q9 | ------- can be referred as the use or application of computational devices in the field ofbiological sciences and research.
  • Bio-computing
  • Virtual Computing
  • Artificial Intelligent
  • DNA
Q10 | This unlawful acts wherein the computer is either a tool or target or both
  • Cyber ethics
  • Cyber crime
  • Cyber abuse
  • Cyber literacy
Q11 | Which of the following is annoying, but really doesn’t render any harm to our computer?
  • Shareware
  • Malware
  • Spyware
  • Adware
Q12 | Why do you not want too much personal data about you on the Internet?
  • It might reveal embarrassing facts about you
  • It might be used by an identity thief to impersonate you
  • It might be used by a potential employer to find out more about you
  • There is no reason to worry about personal information on the Internet
Q13 | What is the top rule for avoiding Internet fraud?
  • If it seems too good to be true, it probably is
  • Never use your bank account numbers
  • Only work with people who have verifiable e-mail address
  • Do not invest in foreign deals
Q14 | One scam that lures internet users into revealing personal information is
  • Malware
  • Spam
  • Phishing
  • Internet hoax
Q15 | When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n)
  • Zero-day Attack
  • Trojan Horse Attack
  • Distributed Denial of Service Attack
  • Boot Sector Virus Attack
Q16 | Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
  • Worms
  • Stealth Viruses
  • Logic bombs
  • Macro viruses
Q17 | How could hacker use information about you found through Internet searches?
  • To guess passwords if your passwords are linked to personal
  • To guess passwords if your passwords are linked to your interests or hobbies
  • In social engineering, to ascertain more information about you or your computer system
  • All of the above
Q18 | What is the first step in protecting yourself from identity theft?
  • Never provide any personal data about yourself unless absolutely necessary
  • Routinely check your records for signs of identity theft.
  • Never use your real name on the Internet
  • Routinely check for spyware on your computer.
Q19 | A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse111. What is malware?
  • Software that has some malicious purpose
  • Software that is not functioning properly
  • Software that damages your system
  • Software that is not properly configured for your system
Q20 | Which of the following is a step that all computer users should take to protect against virusattacks?
  • Purchase and configure a firewall
  • Shut down all incoming ports
  • Use non-standard e-mail clients
  • Install and use antivirus software
Q21 | -------- uses the principles and tools of computer science to model or algorithmicallyspecify complexes biological information system and computational systems with life-like capabilities.
  • Virtual Computing
  • Artificial Intelligent
  • Bio-computing
  • Cookies
Q22 | ------ uses software to allow people to interact with three-dimensional simulatedenvironment.
  • Virtual Computing
  • Artificial Intelligent
  • Bio-computing
  • Cookies
Q23 | The science and engineering of making intelligent machines, especially intelligent computer programs.
  • Artificial Intelligence
  • Stress Management
  • Anti-Virus
  • Intellectual Property Right
Q24 | Computers are programmed to make decisions in real-life situations are known as
  • Virtual reality
  • Robotics
  • Neural Networks
  • Expert System
Q25 | Computing systems, which imitate human brain through a network of highly interconnectedprocessing elements.
  • Virtual reality
  • Robotics
  • Neural Networks
  • Expert System