Top 250+ Solved General Informatics MCQ Questions Answer
Q. Which of the following is not harmful for your computer
a. malware
b. spyware
c. virus
d. cookies
Q. This is based on individuals who know how to use these technologies and those who do not.
a. access
b. usage
c. usage quality
d. none of the above
Q. This refers to the gap between people who possess regular access to informationtechnology and those who do not have this access.
a. digital divide
b. discrimination
c. computer divide
d. none of these
Q. This type of digital divide is based on the difference between individuals with access andthose without access.
a. access
b. usage
c. usage quality
d. none of the above
Q. It is based on the differences in the quality of using information technology.
a. access
b. usage
c. usage quality
d. none of these
Q. Who started Free Software foundation?
a. linus torvald
b. richard m stallman
c. gnu
d. none of the above
Q. This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed.
a. data diddling
b. salami attacks
c. virus attack
d. none of the above
Q. This kind of crime is normally common in the financial institutions or for the purpose ofcommitting financial crimes.
a. data diddling
b. salami attacks
c. virus attack
d. none of the above
Q. This refers to environmentally sustaining computing or IT.
a. cloud computing
b. green computing
c. electronic computing
d. none of the above
Q. …………………is the Universal character encoding standard, used for representation of text forComputer processing.
a. unicode
b. sap
c. java
d. none of the above
Q. …………………..software is a matter of Liberty not Price.
a. free
b. proprietary
c. application
d. none of these
Q. ………………refers to a code of safe and responsible behavior for the Internet Community
a. cyber ethics
b. social issues
c. cyber crime
d. none of the above
Q. ………………… refers to unlawful acts wherein the computer is either a tool or target or both.
a. cyber crime
b. cyber ethics
c. cyber law
d. none of the above
Q. ………………refers to sending large number of mail to the victim, which may be an individualor a company or even mail servers there by ultimately resulting into crashing.
a. email bombing
b. logic bomb
c. virus
d. none of the above