On This Page

This set of Philosophy of Informatics Multiple Choice Questions & Answers (MCQs) focuses on Philosophy Of Informatics Set 7

Q1 | The policy of ----------------- has allowed a range of exceptions to the copyright provision.
  • limited use
  • ipr
  • specific use
  • fair use
Q2 | ------------------ is based on the belief that the public is entitled to freely use portions ofcopyrighted materials for certain purpose.
  • limited use
  • ipr
  • specific use
  • fair use
Q3 | WebCT is :
  • an virtual classroom package
  • a chat group
  • an e-learning tool
  • social network
Q4 | ------------- is the training, which delivers educational content through a web browser overthe public or private interest.
  • ics
  • wbt
  • virtual classroom
  • cbt
Q5 | -------------------- is the where a computer program provides motivation and feedback inplace of a live instructor.
  • ics
  • wbt
  • virtual classroom
  • cbt
Q6 | --------------- is the technology which captivate the student’s interest.
  • wbt
  • virtual classroom
  • cbt
  • ict
Q7 | -------------------- is meant for e-governance applications.
  • brnet
  • inflibnet
  • vast
  • nicnet
Q8 | Spam means:
  • unwanted e-mail
  • virus
  • software
  • search engine
Q9 | ----------------------- are small text files that some web sites automatically store on yourcomputer hard drive when you visit the site.
  • spam
  • cookies
  • adware
  • malware
Q10 | Phishing is related to:
  • copy right
  • virus
  • e-learning
  • identity theft
Q11 | ------------------- contain information that is untrue.
  • cookies
  • virus
  • internet hoaxes
  • spam
Q12 | A ---------------- defined as anyone who breaks into a computer system unlawfully.
  • hacker
  • virus
  • spam
  • internet hoaxes
Q13 | A ---------------------- is a program that appears to be something useful or desirable, but atthe same time does something malicious in the background without our knowledge.
  • hacker
  • virus
  • trojan horse
  • cookies
Q14 | -------------------- is a computer program that attaches itself to another computer programand attempts to spread it to other computers when files are exchanged.
  • hacker
  • virus
  • trojan horse
  • cookies
Q15 | What is logic bomb?
  • hacker
  • virus
  • trojan horse
  • cookies
Q16 | ---------------- are viruses that are triggered by the passage of time or on certain date.
  • trojan horses
  • worms
  • logic bombs
  • time bombs
Q17 | --------------------- slightly different from virus.
  • trojan horses
  • worms
  • logic bombs
  • cookies
Q18 | A computer user copies an application onto more than one computer, if the licenseagreement does not permit this, is participating:
  • phishing
  • hacking
  • identity theft
  • software piracy
Q19 | ----------------- is an agreement between the user and the software developer.
  • copy right
  • software license
  • ipr
  • none of these
Q20 | The Computer Ethics Institute of United States developed:
  • guide lines for fair use
  • free software program
  • anti-virus program
  • ten
Q21 | ------------------------- is treated as the bench mark for ethical computing.
  • copyright law
  • ipr law
  • ten commandments of computer ethics
  • six commandments of computer ethics
Q22 | ------------ is the right to be left alone to do as one pleases.
  • ipr
  • privacy
  • copy right
  • freedom
Q23 | Which state among the following is claimed Privacy is a basic human right?
  • united states of america
  • britain
  • india
  • netherland
Q24 | In India Cyber laws have been defined under the:
  • cyber law act, 2000
  • ethical computing law, 2005
  • it act, 2000
  • cyber act 2003
Q25 | ----------------- comprise of a set of legal provisions to regulate the activities of cyber spaceor internet.
  • cyber ethics
  • cyber laws
  • it act 2000
  • internet laws