Philosophy Of Informatics Set 11
On This Page
This set of Philosophy of Informatics Multiple Choice Questions & Answers (MCQs) focuses on Philosophy Of Informatics Set 11
Q1 | Broadband connections includes
- cable
- satellite
- DSL
- all of these
Q2 | ICQ is related with
- Weblogs
- Instant messaging
- Search engines
- Podcasts
Q3 | CCTV is
- Closed circuit television
- Crime detection Software
- Communication software
- All the above
Q4 | Britannica is a
- Free online educational software
- Class room aid
- Edutainment
- None of these
Q5 | INFLIBNET is
- Sharing of library and information resources
- Free online education software
- Software for sharing information
- Online bio-resource in centre
Q6 | Google earth is --------
- Entertainment software
- Educational software
- Anti- virus software
- Hardware
Q7 | Which among shows IT for national integration
- Permanent Account Number (PAN)
- Electors Photo Identity Card (EPIC)
- Sakshat and INFLIBNET
- All of these.
Q8 | ------- is a non-profit corporation formed to educate about and advocate for the benefits ofopen source and to build bridges among different constituencies in the open source community.
- Free Software programme
- Free Software development
- Free Software Foundation
- The open Source Initiative.
Q9 | ------- can be referred as the use or application of computational devices in the field ofbiological sciences and research.
- Bio-computing
- Virtual Computing
- Artificial Intelligent
- DNA
Q10 | This unlawful acts wherein the computer is either a tool or target or both
- Cyber ethics
- Cyber crime
- Cyber abuse
- Cyber literacy
Q11 | Which of the following is annoying, but really doesn’t render any harm to our computer?
- Shareware
- Malware
- Spyware
- Adware
Q12 | Why do you not want too much personal data about you on the Internet?
- It might reveal embarrassing facts about you
- It might be used by an identity thief to impersonate you
- It might be used by a potential employer to find out more about you
- There is no reason to worry about personal information on the Internet
Q13 | What is the top rule for avoiding Internet fraud?
- If it seems too good to be true, it probably is
- Never use your bank account numbers
- Only work with people who have verifiable e-mail address
- Do not invest in foreign deals
Q14 | One scam that lures internet users into revealing personal information is
- Malware
- Spam
- Phishing
- Internet hoax
Q15 | When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n)
- Zero-day Attack
- Trojan Horse Attack
- Distributed Denial of Service Attack
- Boot Sector Virus Attack
Q16 | Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
- Worms
- Stealth Viruses
- Logic bombs
- Macro viruses
Q17 | How could hacker use information about you found through Internet searches?
- To guess passwords if your passwords are linked to personal
- To guess passwords if your passwords are linked to your interests or hobbies
- In social engineering, to ascertain more information about you or your computer system
- All of the above
Q18 | What is the first step in protecting yourself from identity theft?
- Never provide any personal data about yourself unless absolutely necessary
- Routinely check your records for signs of identity theft.
- Never use your real name on the Internet
- Routinely check for spyware on your computer.
Q19 | A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse111. What is malware?
- Software that has some malicious purpose
- Software that is not functioning properly
- Software that damages your system
- Software that is not properly configured for your system
Q20 | Which of the following is a step that all computer users should take to protect against virusattacks?
- Purchase and configure a firewall
- Shut down all incoming ports
- Use non-standard e-mail clients
- Install and use antivirus software
Q21 | -------- uses the principles and tools of computer science to model or algorithmicallyspecify complexes biological information system and computational systems with life-like capabilities.
- Virtual Computing
- Artificial Intelligent
- Bio-computing
- Cookies
Q22 | ------ uses software to allow people to interact with three-dimensional simulatedenvironment.
- Virtual Computing
- Artificial Intelligent
- Bio-computing
- Cookies
Q23 | The science and engineering of making intelligent machines, especially intelligent computer programs.
- Artificial Intelligence
- Stress Management
- Anti-Virus
- Intellectual Property Right
Q24 | Computers are programmed to make decisions in real-life situations are known as
- Virtual reality
- Robotics
- Neural Networks
- Expert System
Q25 | Computing systems, which imitate human brain through a network of highly interconnectedprocessing elements.
- Virtual reality
- Robotics
- Neural Networks
- Expert System