Top 250+ Solved General Informatics MCQ Questions Answer

From 211 to 225 of 229

Q. In ……………… the hacker gains access and control over the web site of another.

a. web jacking

b. time theft

c. logic bomb

d. none of the above

  • a. web jacking

Q. …………….are event dependent programs.

a. logic bombs

b. trojan bombs

c. salami attacks

d. none of these

  • a. logic bombs

Q. ……………………….refers to the compulsive Internet use which interferes with daily life, workand relationships.

a. cyber addictions

b. alcohol addiction

c. drug addiction

d. none of the above

  • a. cyber addictions

Q. ……………………is a situation where an individual is given too much information and as aresult he is confused and cannot make optimal decisions.

a. information overload

b. cyber addiction

c. internet addiction

d. none of the above

  • a. information overload

Q. Which chapter of the IT Act deals with computer related unlawful acts?

a. chapter x

b. chapter xi

c. chapter ix

d. chapter viii

  • b. chapter xi

Q. Linux is a …………

a. database program

b. application program

c. operating system

d. none of the above

  • c. operating system

Q. Fedora, a community distribution sponsored by

a. redhat

b. novell

c. oracle

d. none of the above

  • a. redhat

Q. OpenSUSE a community distribution mainly sponsored by

a. redhat

b. novell

c. oracle

d. none of the above

  • b. novell

Q. This is a storage location from which software packages may be retrieved and installed on acomputer.

a. software distribution

b. software repository

c. operating system

d. none of the above

  • b. software repository

Q. AbiWord is a :

a. word processor

b. spreadsheet

c. database

d. none of these

  • a. word processor

Q. In Open Office.org. “Calc” is a

a. word processor

b. spreadsheets

c. database

d. none of these

  • b. spreadsheets
Subscribe Now

Get All Updates & News