Quiznetik

Informatics and Philosophy | Set 2

1. What is the first step in protecting yourself from identity theft?

Correct : A. never provide any personal data about yourself unless absolutely necessary

2. A backup is a ...................... against data loss

Correct : B. security

3. What is malware?

Correct : A. software that has some malicious purpose

4. Which of the following is a step that all computer users should take to protect against virus attacks?

Correct : D. install and use antivirus software

5. -------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

Correct : C. bio-computing

6. ------ uses software to allow people to interact with three-dimensional simulated environment.

Correct : A. virtual computing

7. The science and engineering of making intelligent machines, especially intelligent computer programs.

Correct : A. artificial intelligence

8. Computers are programmed to make decisions in real-life situations are known as

Correct : D. expert system

9. Computing systems, which imitate human brain through a network of highly interconnected processing elements.

Correct : C. neural networks

10. Which among the following is not applicable to internet use

Correct : D. pretend to be someone else when you are online.

11. Which among the following is applicable to internet use

Correct : D. all of these

12. Which among the following is unethical use of cell phone

Correct : C. do capture the images of others without permission of that person

13. A repetitive strain injury (RSI) in computer users caused by

Correct : A. improperly positioned key-boards

14. The difficulty a person can have in understanding an issue and making decisions that can be caused by the presence of too much information

Correct : B. information overload

15. Which among the following is not an indication of cyber addition

Correct : D. don’t feel guilty or defensive about your internet use

16. Which of the following is not true of ethical computing guidelines

Correct : D. snoop in other people’s computer files.

17. The following metric is a measure of the journal quality

Correct : A. impact factor

18. The main advantage(s) of online education is (are)

Correct : D. all of the above

19. Pick the odd one out

Correct : C. antivirus

20. A ............. is a small text file which is placed on your computer on the request made by the web server to your browser.

Correct : B. cookie

21. Established by the Ministry of Education, Government of India as an autonomous organization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research

Correct : C. indian council of philosophical research (icpr)

22. The commission of illegal acts through the use of computer or against a computer system.

Correct : A. computer crime

23. ----- is an example of software being created independent of any money-making incentive or any property rights

Correct : C. freeware

24. A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

Correct : A. software piracy

25. Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

Correct : B. white-hat hackers

26. If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

Correct : A. quarantining

27. The discrepancy between the “haves” and “have-notes” with regards to computer technology is commonly referred as:

Correct : C. digital divide

28. Which among the following is true

Correct : D. none of the above

29. Which among the following skills need for locating appropriate information on the Internet

Correct : D. all of these