Philosophy Of Informatics Set 7
On This Page
This set of Philosophy of Informatics Multiple Choice Questions & Answers (MCQs) focuses on Philosophy Of Informatics Set 7
Q1 | The policy of ----------------- has allowed a range of exceptions to the copyright provision.
- limited use
- ipr
- specific use
- fair use
Q2 | ------------------ is based on the belief that the public is entitled to freely use portions ofcopyrighted materials for certain purpose.
- limited use
- ipr
- specific use
- fair use
Q3 | WebCT is :
- an virtual classroom package
- a chat group
- an e-learning tool
- social network
Q4 | ------------- is the training, which delivers educational content through a web browser overthe public or private interest.
- ics
- wbt
- virtual classroom
- cbt
Q5 | -------------------- is the where a computer program provides motivation and feedback inplace of a live instructor.
- ics
- wbt
- virtual classroom
- cbt
Q6 | --------------- is the technology which captivate the student’s interest.
- wbt
- virtual classroom
- cbt
- ict
Q7 | -------------------- is meant for e-governance applications.
- brnet
- inflibnet
- vast
- nicnet
Q8 | Spam means:
- unwanted e-mail
- virus
- software
- search engine
Q9 | ----------------------- are small text files that some web sites automatically store on yourcomputer hard drive when you visit the site.
- spam
- cookies
- adware
- malware
Q10 | Phishing is related to:
- copy right
- virus
- e-learning
- identity theft
Q11 | ------------------- contain information that is untrue.
- cookies
- virus
- internet hoaxes
- spam
Q12 | A ---------------- defined as anyone who breaks into a computer system unlawfully.
- hacker
- virus
- spam
- internet hoaxes
Q13 | A ---------------------- is a program that appears to be something useful or desirable, but atthe same time does something malicious in the background without our knowledge.
- hacker
- virus
- trojan horse
- cookies
Q14 | -------------------- is a computer program that attaches itself to another computer programand attempts to spread it to other computers when files are exchanged.
- hacker
- virus
- trojan horse
- cookies
Q15 | What is logic bomb?
- hacker
- virus
- trojan horse
- cookies
Q16 | ---------------- are viruses that are triggered by the passage of time or on certain date.
- trojan horses
- worms
- logic bombs
- time bombs
Q17 | --------------------- slightly different from virus.
- trojan horses
- worms
- logic bombs
- cookies
Q18 | A computer user copies an application onto more than one computer, if the licenseagreement does not permit this, is participating:
- phishing
- hacking
- identity theft
- software piracy
Q19 | ----------------- is an agreement between the user and the software developer.
- copy right
- software license
- ipr
- none of these
Q20 | The Computer Ethics Institute of United States developed:
- guide lines for fair use
- free software program
- anti-virus program
- ten
Q21 | ------------------------- is treated as the bench mark for ethical computing.
- copyright law
- ipr law
- ten commandments of computer ethics
- six commandments of computer ethics
Q22 | ------------ is the right to be left alone to do as one pleases.
- ipr
- privacy
- copy right
- freedom
Q23 | Which state among the following is claimed Privacy is a basic human right?
- united states of america
- britain
- india
- netherland
Q24 | In India Cyber laws have been defined under the:
- cyber law act, 2000
- ethical computing law, 2005
- it act, 2000
- cyber act 2003
Q25 | ----------------- comprise of a set of legal provisions to regulate the activities of cyber spaceor internet.
- cyber ethics
- cyber laws
- it act 2000
- internet laws