1. What is the first step in protecting yourself from identity theft?
Correct : A. never provide any personal data about yourself unless absolutely necessary
2. A backup is a ...................... against data loss
Correct : B. security
3. What is malware?
Correct : A. software that has some malicious purpose
4. Which of the following is a step that all computer users should take to protect against virus
attacks?
Correct : D. install and use antivirus software
5. -------- uses the principles and tools of computer science to model or algorithmically
specify complexes biological information system and computational systems with life-like capabilities.
Correct : C. bio-computing
6. ------ uses software to allow people to interact with three-dimensional simulated environment.
Correct : A. virtual computing
7. The science and engineering of making intelligent machines, especially intelligent
computer programs.
Correct : A. artificial intelligence
8. Computers are programmed to make decisions in real-life situations are known as
Correct : D. expert system
9. Computing systems, which imitate human brain through a network of highly
interconnected processing elements.
Correct : C. neural networks
10. Which among the following is not applicable to internet use
Correct : D. pretend to be someone else when you are online.
11. Which among the following is applicable to internet use
Correct : D. all of these
12. Which among the following is unethical use of cell phone
Correct : C. do capture the images of others without permission of that person
13. A repetitive strain injury (RSI) in computer users caused by
Correct : A. improperly positioned key-boards
14. The difficulty a person can have in understanding an issue and making decisions that
can be caused by the presence of too much information
Correct : B. information overload
15. Which among the following is not an indication of cyber addition
Correct : D. don’t feel guilty or defensive about your internet use
16. Which of the following is not true of ethical computing guidelines
Correct : D. snoop in other people’s computer files.
17. The following metric is a measure of the journal quality
Correct : A. impact factor
18. The main advantage(s) of online education is (are)
Correct : D. all of the above
19. Pick the odd one out
Correct : C. antivirus
20. A ............. is a small text file which is placed on your computer on the request made by the
web server to your browser.
Correct : B. cookie
21. Established by the Ministry of Education, Government of India as an autonomous
organization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research
Correct : C. indian council of philosophical research (icpr)
22. The commission of illegal acts through the use of computer or against a computer system.
Correct : A. computer crime
23. ----- is an example of software being created independent of any money-making incentive or
any property rights
Correct : C. freeware
24. A computer user, who copies an application onto more than one computer, if the license
agreement does not permit this, is participating in:
Correct : A. software piracy
25. Experts who are performing a needed service for society by helping companies realize the
vulerabilities that exist in their systems by break into system just for the challenge.
Correct : B. white-hat hackers
26. If the antivirus software detects a virus signature or suspicious activity, it stops the execution
of the file and virus and notifies you that it has dtected virus is known as:
Correct : A. quarantining
27. The discrepancy between the “haves” and “have-notes” with regards to computer technology
is commonly referred as:
Correct : C. digital divide
28. Which among the following is true
Correct : D. none of the above
29. Which among the following skills need for locating appropriate information on the Internet