1. ………………………integrates communications, data management, and security services to
allow business applications within different organizations to automatically interchange
information.
Correct : A. e-commerce
2. Nanotechnology is the science of things on the order of
Correct : C. nanometers
3. Computer systems can NOT be trained to understand
Correct : C. a good joke
4. The most wired country in the world is
Correct : D. south korea
5. The device that tracks movement is a
Correct : A. gps
6. Which of the following is not a good reason to learn more about computers?
Correct : C. to learn how to hack into an organisation’s main computer
7. Infrared scanners cannot
Correct : D. be used by shipping companies to track packages as they move around the world
8. Computer forensics
Correct : D. all of the above
9. Robotic surgery devices help physicians because
Correct : A. they make more accurate incisions
10. Artificial Intelligence is concerned with making computers behave like
Correct : A. humans
11. In Turing test the number of participants are:
Correct : B. three
12. Knowledge based systems have been developed for fields such as:
Correct : D. all of these
13. ) emoticon stands for
Correct : A. happy
14. Individuals who are not involved in expert system
Correct : B. end user
15. Which of the following are artificial intelligence languages?
Correct : D. both (a) and (b)
16. News stories on Information Technology may be on topics such as
Correct : D. all of the above
17. Information Technology can
Correct : D. all of the above.
18. The five steps, input, processing, output, storage and retrieval, and distribution and
communication are all part of
Correct : C. the information processing cycle
19. Computer data can include
Correct : D. all of the above
20. Typical operating systems include
Correct : D. neither a nor b
21. Computers are used in business to
Correct : D. all of the above
22. GPS is used to
Correct : A. determine location
23. The smallest computer (in size) is most likely called a
Correct : C. handheld, palm-top, or personal digital assistant
24. The most powerful computer is most likely called a
Correct : D. supercomputer
25. A computer advertised as a server might also be called a
Correct : D. any of the above
26. A personal computer can
Correct : D. all of the above
27. In this type e-governance is created between the government and citizen?
Correct : B. g2c
28. CAD stands for:
Correct : B. computer aided development
29. Computer to computer exchange of business information is done through:
Correct : D. edi
30. This refers to the use of small and portable computing devices in wireless enabled
networks that provide wireless connections to a central main server.
Correct : B. mobile computing
31. This is a mechanism of delivery of short messages over the mobile networks.
Correct : B. sms
32. Which of the following is not a wireless communication device?
Correct : D. none of these
33. This is a satellite-based navigation system made up of a network of 24 satellite placed
into orbit by the US Department of Defence.
Correct : B. gps
34. This is a plastic card embedded with a computer chip that stores and transacts data
between users:
Correct : B. smart card
35. These computers made of genes building blocks
Correct : C. dna computers
36. GPS satellites circle the earth ………………times a day:
Correct : B. two times
37. …………………..is typically a medication ordering and fulfillment system
Correct : A. cpoe
38. ……………………provides physicians and nurses with real-time diagnostic and treatment
recommendations.
Correct : A. cdss
39. ERP means…………………..
Correct : A. enterprise resource planning
40. Computer to computer exchange of business documents is called………….
Correct : A. edi
41. ICT stands for…………………….
Correct : A. information and communication technology
42. G2G e-governance means……………………….
Correct : A. government to government
43. G2C e-governance means……………………….
Correct : B. government to citizens
44. G2E e-governance means……………………….
Correct : C. government to employees
45. G2B e-governance means……………………….
Correct : A. government to business
46. E H R means………………………
Correct : A. electronic health record
47. …………………… is a communication technology that allows users to exchange multimedia
communication between capable mobile phones and other devices.
Correct : A. bluetooth
48. Mobile computing is used for only in professions that
Correct : D. none of the above
49. ………….. is a computer based tool for mapping and analyzing things that exist and events
that happen on earth.
Correct : A. gis
50. GPS is a………………….. owned utility.
Correct : A. us
51. The device best suited for a sales person who has to demonstrate processor-intensive
multimedia to clients is a
Correct : D. notebook computer
52. GPS chips are
Correct : B. installed in all newly manufactured cell phones
53. For internet access you should obtain
Correct : D. all of the above can have internet capabilities
54. Portable devices that can be synchronized with your home computer are
Correct : D. any device with bluetooth.
55. What is an information?
Correct : B. processed data
56. What is the full form of SMS?
Correct : B. short message service
57. What is the full form of MMS?
Correct : C. multimedia messaging service
58. The concept of line of sight means
Correct : A. alignment of sending and receiving devices
59. What is the full form of EDI?
Correct : A. electronic data interchange
60. Which of the following support is not available on MMS?
Correct : D. none of these
61. Computer to computer exchange of business is done through
Correct : C. edi
62. The height at which the GPS satellite is above the earth’s surface is
Correct : A. 12000 miles
63. The knowledge that can be spoken in language and transmitted among individuals.
Correct : B. explicit knowledge
64. This is the exclusive right granted by statute to the author of the works to reproduce
dramatic, artistic, literary or musical work or to authorize its reproduction by others.
Correct : B. copy right
65. This is a legal monopoly granted for a limited time to the owner of an invention.
Correct : A. patent
66. Any symbol, logo, or name used to enable the public to identify the supplier of goods.
Correct : C. trade mark
67. The Indian Patent Act finally amended in
Correct : C. 2005
68. CAIstands for:
Correct : B. computer assisted instruction
69. This network is an autonomous Inter-University Centre of the University Grants
Commission.
Correct : A. inflibnet
70. ………………knowledge are also known as informal knowledge.
Correct : A. tacit knowledge
71. IPR stands for………………
Correct : A. intellectual property rights
72. ………………knowledge are also known as formal knowledge.
Correct : A. explicit knowledge
73. ……………………….is one of many web-based learning management systems(LMS) through
which teachers can work with students, whether in distance mode or as a supplement to
face-to-face teaching.
Correct : A. nicenet
74. ………………….is a prototype portal site for biological information and bio-resource
information.
Correct : A. brnet
75. The patent system in India is governed by the ………………..
Correct : A. patents act, 1970
76. CBT stands for:
Correct : A. computer based training
77. TRIPS means……………..
Correct : A. trade related aspects of intellectual property rights
78. Which of the following is a processed thing?
Correct : B. information
79. Which of the following operators cannot be applied to search?
Correct : D. bool
80. Intellectual Property Rights does not cover the following area
Correct : D. none of these
81. Indiancopyright act came into existence in the year
Correct : C. 1957
82. …………………..developed a computer language called LOGO, so that children could program
computers.
Correct : A. seymorpapert
83. ……………….. is a computer language developed by Seymour Paper and his colleagues at
MIT,so that children could program computers.
Correct : A. logo
84. When shopping online which of the following does NOT indicate that you have a secure
connection displays?
Correct : C. the word “secure” in the title bar
85. Which of the following is annoying, but really doesn’t render any harm to your computer?
Correct : A. adware
86. One scam that lures internet users into revealing personal information is
Correct : B. phishing
87. Cell phones use which category of operating systems
Correct : A. single user, single task
88. When hacker use a program that pretends to be useful to a user while actually allowing the
hacker to gain control of the user’s computer, this is called a
Correct : B. trojan horse attack
89. Which is a benefit of a firewall?
Correct : A. they make it harder for a hacker to locate specific computer on a network
90. Viruses that travel from computer to computer on their own(independent of host) are called
Correct : A. worms
91. Flash drives have replaced floppy disks as the preferred method of portable storage
because:
Correct : D. all of the above
92. Which of the following is not harmful for your computer
Correct : D. cookies
93. This is based on individuals who know how to use these technologies and those who do not.
Correct : B. usage
94. This refers to the gap between people who possess regular access to information
technology and those who do not have this access.
Correct : A. digital divide
95. This type of digital divide is based on the difference between individuals with access and
those without access.
Correct : A. access
96. It is based on the differences in the quality of using information technology.
Correct : C. usage quality
97. Who started Free Software foundation?
Correct : B. richard m stallman
98. This kind of attack involves altering raw data just before a computer processes it and then
changing it back after the processing is completed.
Correct : A. data diddling
99. This kind of crime is normally common in the financial institutions or for the purpose of
committing financial crimes.