Top 250+ Solved General Informatics MCQ Questions Answer

From 181 to 195 of 229

Q. TRIPS means……………..

a. trade related aspects of intellectual property rights

b. trade related activities and information providing rights

c. round trip to europe

d. none of these

  • a. trade related aspects of intellectual property rights

Q. Which of the following is a processed thing?

a. data

b. information

c. database

d. none of these

  • b. information

Q. Which of the following operators cannot be applied to search?

a. or

b. not

c. and

d. bool

  • d. bool

Q. Intellectual Property Rights does not cover the following area

a. copyright

b. patents

c. trademark

d. none of these

  • d. none of these

Q. Indiancopyright act came into existence in the year

a. 1950

b. 1955

c. 1957

d. none of these

  • c. 1957

Q. …………………..developed a computer language called LOGO, so that children could programcomputers.

a. seymorpapert

b. jean piaget

c. microsoft

d. none of the above

  • a. seymorpapert

Q. When shopping online which of the following does NOT indicate that you have a secureconnection displays?

a. a closed padlock icon in the status bar

b. the url begins with https

c. the word “secure” in the title bar

d. the verisign seal on the web page.

  • c. the word “secure” in the title bar

Q. Which of the following is annoying, but really doesn’t render any harm to your computer?

a. adware

b. spyware

c. sneakware

d. malware

  • a. adware

Q. One scam that lures internet users into revealing personal information is

a. malware

b. phishing

c. spam

d. internet hoax

  • b. phishing

Q. Cell phones use which category of operating systems

a. single user, single task

b. multi user, multi task

c. single user, multitask

d. real-time

  • a. single user, single task

Q. When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a

a. zero-day attack

b. trojan horse attack

c. distributed denial of service attack

d. boot sector virus attack

  • b. trojan horse attack

Q. Which is a benefit of a firewall?

a. they make it harder for a hacker to locate specific computer on a network

b. they repeatedly change the ip address of the router

c. they open unused logical ports to increase throughput

d. they filter out unwanted wireless signals

  • a. they make it harder for a hacker to locate specific computer on a network

Q. Viruses that travel from computer to computer on their own(independent of host) are called

a. worms

b. stealth viruses

c. logic bombs

d. macro viruses

  • a. worms

Q. Flash drives have replaced floppy disks as the preferred method of portable storagebecause:

a. they hold much more data than floppy disks

b. data is not magnetic so less subject to errors

c. they have quicker access time than a floppy drive

d. all of the above

  • d. all of the above
Subscribe Now

Get All Updates & News