On This Page

This set of Philosophy of Informatics Multiple Choice Questions & Answers (MCQs) focuses on Philosophy Of Informatics Set 12

Q1 | Which among the following is not applicable to internet use
  • Do not use email to strangers
  • Do not give out your email address to people you doesn’t know
  • Do not open email attachments from people you don’t know
  • Pretend to be someone else when you are online.
Q2 | Which among the following is applicable to internet use
  • Do not sent Spam, Worms and Viruses into cyberspace
  • Do not be rude or use bad language while you use email
  • Do not disclose your personal information such as your bank a/c number, passwords etc
  • All of these
Q3 | Which among the following is unethical use of cell phone
  • Do not accept call while driving
  • Switch off cell phone inside an aircraft
  • Do capture the images of others without permission of that person
  • Keep silent tone in meetings
Q4 | A repetitive strain injury (RSI) in computer users caused by
  • Improperly positioned key-boards
  • a/c room
  • Proper lighting
  • Adjustable chair
Q5 | Which of the following is not true of ethical computing guidelines
  • Not to use computer to promote lies
  • Use computers with consideration and respect for others
  • Avoid causing harm to othrs when using computer
  • Snoop in other people’s computer files.
Q6 | The following metric is a measure of the journal quality
  • Impact factor
  • Prize
  • Article size
  • None of the above
Q7 | The main advantage(s) of online education is (are)
  • Personalized education
  • Better flexibility
  • Better accessibility
  • All of the above
Q8 | Pick the odd one out
  • Spam
  • Spyware
  • Antivirus
  • Hoax
Q9 | A ............. is a small text file which is placed on your computer on the request made by theweb server to your browser.
  • Spam
  • Cookie
  • Web bugs
  • Worms
Q10 | The commission of illegal acts through the use of computer or against a computer system.
  • Computer Crime
  • Computer Abuse
  • White hacking
  • Cyber Addition
Q11 | ----- is an example of software being created independent of any money- making incentive orany property rights
  • Spyware
  • Adware
  • Freeware
  • Malware
Q12 | A computer user, who copies an application onto more than one computer, if the licenseagreement does not permit this, is participating in:
  • Software piracy
  • Personal privacy
  • Computer theft
  • Identity theft
Q13 | Experts who are performing a needed service for society by helping companies realize thevulerabilities that exist in their systems by break into system just for the challenge.
  • Black-hat hackers
  • White-hat hackers
  • Both Black-hat hackers and White-hat hackers
  • Neither Black-hat hackers nor White-hat hackers
Q14 | If the antivirus software detects a virus signature or suspicious activity, it stops the executionof the file and virus and notifies you that it has dtected virus is known as:
  • Quarantining
  • Searching
  • Phishing
  • All of these
Q15 | The discrepancy between the “haves” and “have-notes” with regards to computer technologyis commonly referred as:
  • Social Justice
  • Intellectual Property Right
  • Digital Divide
  • Accountability
Q16 | An online archive of multidiscipline journal articles in the most significant professionaljournals.
  • ICPR
  • Jstor
  • Orkut
  • Facebook
Q17 | Which among the following is true
  • Internet is a democratic technology
  • Internet protects personal privacy
  • Internet facilitate the spread of right information
  • None of the above
Q18 | Which among the following skills need for locating appropriate information on the Internet
  • the ability to use Internet tools such as search engines
  • having knowledge of search techniques and ability to execute the search.
  • One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
  • All of these