Top 150+ Solved Informatics and Philosophy MCQ Questions Answer
Q. ------- can be referred as the use or application of computational devices in the field ofbiological sciences and research.
a. bio-computing
b. virtual computing
c. artificial intelligent
d. dna
Q. This unlawful acts wherein the computer is either a tool or target or both
a. cyber ethics
b. cyber crime
c. cyber abuse
d. cyber literacy
Q. Which of the following is annoying, but really doesn’t render any harm to our computer?
a. shareware
b. malware
c. spyware
d. adware
Q. Why do you not want too much personal data about you on the Internet?
a. it might reveal embarrassing facts about you
b. it might be used by an identity thief to impersonate you
c. it might be used by a potential employer to find out more about you
d. there is no reason to worry about personal information on the internet
Q. What is the top rule for avoiding Internet fraud?
a. if it seems too good to be true, it probably is
b. never use your bank account numbers
c. only work with people who have verifiable e-mail address
d. do not invest in foreign deals
Q. One scam that lures internet users into revealing personal information is
a. malware
b. spam
c. phishing
d. internet hoax
Q. When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n)
a. zero-day attack
b. trojan horse attack
c. distributed denial of service attack
d. boot sector virus attack
Q. Virus that travel from computer to computer on their own (i.e. independent of hostileactivity) are called
a. worms
b. stealth viruses
c. logic bombs
d. macro viruses
Q. How could hacker use information about you found through Internet searches?
a. to guess passwords if your passwords are linked to personal
b. to guess passwords if your passwords are linked to your interests or hobbies
c. in social engineering, to ascertain more information about you or your computer system
d. all of the above
Q. What is the first step in protecting yourself from identity theft?
a. never provide any personal data about yourself unless absolutely necessary
b. routinely check your records for signs of identity theft.
c. never use your real name on the internet
d. routinely check for spyware on your computer.
Q. A backup is a ...................... against data loss
a. threat
b. security
c. countermeasure
d. abuse
Q. What is malware?
a. software that has some malicious purpose
b. software that is not functioning properly
c. software that damages your system
d. software that is not properly configured for your system
Q. Which of the following is a step that all computer users should take to protect against virusattacks?
a. purchase and configure a firewall
b. shut down all incoming ports
c. use non-standard e-mail clients
d. install and use antivirus software
Q. -------- uses the principles and tools of computer science to model or algorithmicallyspecify complexes biological information system and computational systems with life-like capabilities.
a. virtual computing
b. artificial intelligent
c. bio-computing
d. cookies