Top 350+ Solved Informatics MCQ Questions Answer
Q. A ……………..connects computers within a single geographical location, such as one office building, office suite, or home.
a. lan
b. ict
c. cyberethics
d. drm
Q. .………………….is a standard switching technique, designed to unify telecommunication and computer networks.
a. asynchronous transfer mode
b. digital split
c. cyberethics
d. drm
Q. ………………… uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells.
a. asynchronous transfer mode
b. ict
c. arpanet
d. open source
Q. …………….provides data link layer services that run over a wide range of OSI physical Layer links.
a. cyberethics
b. digital split
c. asynchronous transfer mode
d. arpanet
Q. ………………..has functional similarity with both circuit switched networking and small packet switched networking.
a. asynchronous transfer mode
b. ict
c. drm
d. digital split
Q. ……………………was designed for a network that must handle both traditional high-throughput data traffic (e.g., file transfers), and realtime, low-latency content such as voice and video.
a. asynchronous transfer mode
b. digital split
c. cyberethics
d. open source
Q. …………………is a core protocol used over the SONET/SDH backbone of the public switched telephone network (PSTN) and IntegratedServices Digital Network (ISDN), but its use is declining in favour of All IP.
a. asynchronous transfer mode
b. digital split
c. ict
d. ipr
Q. ……………is a social issue referring to the differing amount of information between those who have access to the Internet (especially broadband access) and those who do not have access.
a. cyberethics
b. digital divide
c. ipr
d. drm
Q. ………………..is the study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society.
a. open source
b. drm
c. cyberethics
d. digital divide
Q. A generalized definition of ……………may be “unlawful acts whereinthe computer is either a tool or target or both”
a. cyber crime
b. open source
c. word processing
d. digital divide
Q. ………….. in his work “The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’.
a. hart
b. george b.selden
c. todd anderson
d. larry augustin
Q. ……………..is a malicious software program written intentionally to enter a computer without the user's permission or knowledge.
a. veronica
b. microsoft windows
c. computer virus
d. cyber crime
Q. An ………………..is a set of software that manages computer hardware resources and provides common services for computer programs.
a. operating system
b. microsoft windows
c. open source
d. word processing
Q. The main function of ………………….is to coordinate the user and outside devices used in computer system.
a. disk operating system
b. microsoft windows
c. word processing
d. veronica