Quiznetik

Philosophy of Informatics | Set 3

1. Which of the following is a software programs that help us to run the computer and coordinates instructions between application software and the computer’s hardware devices?

Correct : B. System software

2. ------------------------------is a group of programs that controls how your computer system functions.

Correct : D. The operating system

3. The software we use to do everyday tasks at home and at work is called

Correct : B. Application software

4. Which are called two basic types of software?

Correct : B. application software and program software

5. Which of the following is an example for system software.

Correct : C. Windows

6. Which of the following is an example for application software.

Correct : A. Microsoft Word

7. A computer cannot operate without ----------------------------------

Correct : A. operating system

8. Which of the following is an open-source operating system?

Correct : B. Linux

9. Which one of the following is an example for Spreadsheet software?

Correct : C. Microsoft Excel

10. -------------------------------enables the computer to translates your spoken words into typed text.

Correct : A. Speech-recognition software

11. Microsoft has incorporated speech recognition software into its latest operating system called

Correct : C. Windows Vista

12. Who developed Linux?

Correct : A. Linus Torvalds

13. ------------------------------- is basically a complex electronic filing system

Correct : A. Database software

14. Which of the following is a personal information manager software

Correct : D. Microsoft Outlook

15. In a computer the letter K is represented as

Correct : C. 01001011

16. In computer terms, data means

Correct : D. representation of an idea

17. The data which has been organized or presented in a meaningful fashion is called

Correct : B. information

18. A computers work exclusively with

Correct : C. numbers

19. The language which consists of just two digits is called

Correct : B. binary language

20. A binary digit contains

Correct : D. one zero and one one

21. One byte is equal to

Correct : B. 8 bits

22. In binary language, the letter K is represented as

Correct : D. 01001011.

23. Kilobytes, megabytes, and gigabytes are

Correct : B. amounts of bytes

24. A kilobyte (KB) is approximately

Correct : A. 1,000 bytes

25. A megabyte (MB) is

Correct : C. a million bytes

26. A gigabyte (GB) is equal to

Correct : A. billion bytes

27. A peta byte of data-that’s more than------------------------------bytes

Correct : D. one quadrillion

28. ---------------------------------feature helps the user to return to a specific Web page without always having to remember to type the address.

Correct : C. Bookmark

29. A Search engine has ------------parts

Correct : A. Three

30. Which of the following is not a part of search engine?

Correct : D. bookmark

31. Which of the following is a search engine?

Correct : D. all of these

32. -----------------------------------is a guide to the internet organized by topics and subtopics.

Correct : C. a subject directory

33. Among the following which one is not a subject dictionary?

Correct : C. Triton

34. What is the name of the program that enables us to communicate in real time with others who also are online?

Correct : A. Instant messaging

35. A clip of audio or video content that is broadcast over the internet using compressed files is called

Correct : D. podcast

36. Weblogs or blogs are

Correct : C. personal logs or journal entries that are posted on the web.

37. Which of the following is a blog site that devotes itself to discussing techno gadgets?

Correct : B. www.gizmodo.com

38. A written message that is sent and received over electronic communication systems is called

Correct : A. E .mail

39. -------------------------is the broadcast of audio or video content over the Internet. a.

Correct : B. a webcast

40. Name of the educational initiative backed by government of India for information technology is called

Correct : A. Sakshat

41. E.-books and e-journals are

Correct : C. the content of open access publishing

42. Claiming another person’s words as your own- this action is known as

Correct : B. plagiarism

43. WebCT and Enspire are the tools for

Correct : C. E-learning

44. Through ----------------------students can get online education from remote places.

Correct : A. virtual classrooms

45. -------------------------------is a virtual network of libraries

Correct : B. INFLIBNET

46. Name the networking infrastructure built by NIC for the e-governance applications.

Correct : A. NICNET

47. BRNET is related with

Correct : C. biological information resources

48. WBT is an example for

Correct : D. a computer-based training

49. Which of the following is true?

Correct : D. all of these

50. Which of the following statement is not true to e-mail

Correct : C. it is not a popular means of communication

51. Broadband connections includes

Correct : D. all of these

52. ICQ is related with

Correct : B. Instant messaging

53. CCTV is

Correct : A. Closed circuit television

54. Britannica is a

Correct : A. Free online educational software

55. INFLIBNET is

Correct : A. Sharing of library and information resources

56. Google earth is --------

Correct : B. Educational software

57. Which among shows IT for national integration

Correct : D. All of these.

58. ------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

Correct : D. The open Source Initiative.

59. ------- can be referred as the use or application of computational devices in the field of biological sciences and research.

Correct : A. Bio-computing

60. This unlawful acts wherein the computer is either a tool or target or both

Correct : B. Cyber crime

61. Which of the following is annoying, but really doesn’t render any harm to our computer?

Correct : D. Adware

62. Why do you not want too much personal data about you on the Internet?

Correct : B. It might be used by an identity thief to impersonate you

63. What is the top rule for avoiding Internet fraud?

Correct : C. Only work with people who have verifiable e-mail address

64. One scam that lures internet users into revealing personal information is

Correct : C. Phishing

65. When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n)

Correct : B. Trojan Horse Attack

66. Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

Correct : A. Worms

67. How could hacker use information about you found through Internet searches?

Correct : D. All of the above

68. What is the first step in protecting yourself from identity theft?

Correct : A. Never provide any personal data about yourself unless absolutely necessary

69. A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?

Correct : B. Software that is not functioning properly

70. Which of the following is a step that all computer users should take to protect against virus attacks?

Correct : D. Install and use antivirus software

71. -------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

Correct : C. Bio-computing

72. ------ uses software to allow people to interact with three-dimensional simulated environment.

Correct : A. Virtual Computing

73. The science and engineering of making intelligent machines, especially intelligent computer programs.

Correct : A. Artificial Intelligence

74. Computers are programmed to make decisions in real-life situations are known as

Correct : D. Expert System

75. Computing systems, which imitate human brain through a network of highly interconnected processing elements.

Correct : C. Neural Networks

76. Which among the following is not applicable to internet use

Correct : D. Pretend to be someone else when you are online.

77. Which among the following is applicable to internet use

Correct : D. All of these

78. Which among the following is unethical use of cell phone

Correct : C. Do capture the images of others without permission of that person

79. A repetitive strain injury (RSI) in computer users caused by

Correct : A. Improperly positioned key-boards

80. Which of the following is not true of ethical computing guidelines

Correct : D. Snoop in other people’s computer files.

81. The following metric is a measure of the journal quality

Correct : A. Impact factor

82. The main advantage(s) of online education is (are)

Correct : D. All of the above

83. Pick the odd one out

Correct : C. Antivirus

84. A ............. is a small text file which is placed on your computer on the request made by the web server to your browser.

Correct : B. Cookie

85. The commission of illegal acts through the use of computer or against a computer system.

Correct : A. Computer Crime

86. ----- is an example of software being created independent of any money- making incentive or any property rights

Correct : C. Freeware

87. A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

Correct : A. Software piracy

88. Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

Correct : B. White-hat hackers

89. If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

Correct : A. Quarantining

90. The discrepancy between the “haves” and “have-notes” with regards to computer technology is commonly referred as:

Correct : C. Digital Divide

91. An online archive of multidiscipline journal articles in the most significant professional journals.

Correct : B. Jstor

92. Which among the following is true

Correct : D. None of the above

93. Which among the following skills need for locating appropriate information on the Internet

Correct : D. All of these