Philosophy Of Informatics Set 12
On This Page
This set of Philosophy of Informatics Multiple Choice Questions & Answers (MCQs) focuses on Philosophy Of Informatics Set 12
Q1 | Which among the following is not applicable to internet use
- Do not use email to strangers
- Do not give out your email address to people you doesn’t know
- Do not open email attachments from people you don’t know
- Pretend to be someone else when you are online.
Q2 | Which among the following is applicable to internet use
- Do not sent Spam, Worms and Viruses into cyberspace
- Do not be rude or use bad language while you use email
- Do not disclose your personal information such as your bank a/c number, passwords etc
- All of these
Q3 | Which among the following is unethical use of cell phone
- Do not accept call while driving
- Switch off cell phone inside an aircraft
- Do capture the images of others without permission of that person
- Keep silent tone in meetings
Q4 | A repetitive strain injury (RSI) in computer users caused by
- Improperly positioned key-boards
- a/c room
- Proper lighting
- Adjustable chair
Q5 | Which of the following is not true of ethical computing guidelines
- Not to use computer to promote lies
- Use computers with consideration and respect for others
- Avoid causing harm to othrs when using computer
- Snoop in other people’s computer files.
Q6 | The following metric is a measure of the journal quality
- Impact factor
- Prize
- Article size
- None of the above
Q7 | The main advantage(s) of online education is (are)
- Personalized education
- Better flexibility
- Better accessibility
- All of the above
Q8 | Pick the odd one out
- Spam
- Spyware
- Antivirus
- Hoax
Q9 | A ............. is a small text file which is placed on your computer on the request made by theweb server to your browser.
- Spam
- Cookie
- Web bugs
- Worms
Q10 | The commission of illegal acts through the use of computer or against a computer system.
- Computer Crime
- Computer Abuse
- White hacking
- Cyber Addition
Q11 | ----- is an example of software being created independent of any money- making incentive orany property rights
- Spyware
- Adware
- Freeware
- Malware
Q12 | A computer user, who copies an application onto more than one computer, if the licenseagreement does not permit this, is participating in:
- Software piracy
- Personal privacy
- Computer theft
- Identity theft
Q13 | Experts who are performing a needed service for society by helping companies realize thevulerabilities that exist in their systems by break into system just for the challenge.
- Black-hat hackers
- White-hat hackers
- Both Black-hat hackers and White-hat hackers
- Neither Black-hat hackers nor White-hat hackers
Q14 | If the antivirus software detects a virus signature or suspicious activity, it stops the executionof the file and virus and notifies you that it has dtected virus is known as:
- Quarantining
- Searching
- Phishing
- All of these
Q15 | The discrepancy between the “haves” and “have-notes” with regards to computer technologyis commonly referred as:
- Social Justice
- Intellectual Property Right
- Digital Divide
- Accountability
Q16 | An online archive of multidiscipline journal articles in the most significant professionaljournals.
- ICPR
- Jstor
- Orkut
Q17 | Which among the following is true
- Internet is a democratic technology
- Internet protects personal privacy
- Internet facilitate the spread of right information
- None of the above
Q18 | Which among the following skills need for locating appropriate information on the Internet
- the ability to use Internet tools such as search engines
- having knowledge of search techniques and ability to execute the search.
- One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
- All of these