Top 250+ Solved Philosophy of Informatics MCQ Questions Answer

From 76 to 90 of 293

Q. Which among the following is not applicable to internet use

a. Do not use email to strangers

b. Do not give out your email address to people you doesn’t know

c. Do not open email attachments from people you don’t know

d. Pretend to be someone else when you are online.

  • d. Pretend to be someone else when you are online.

Q. Which among the following is applicable to internet use

a. Do not sent Spam, Worms and Viruses into cyberspace

b. Do not be rude or use bad language while you use email

c. Do not disclose your personal information such as your bank a/c number, passwords etc

d. All of these

  • d. All of these

Q. Which among the following is unethical use of cell phone

a. Do not accept call while driving

b. Switch off cell phone inside an aircraft

c. Do capture the images of others without permission of that person

d. Keep silent tone in meetings

  • c. Do capture the images of others without permission of that person

Q. A repetitive strain injury (RSI) in computer users caused by

a. Improperly positioned key-boards

b. a/c room

c. Proper lighting

d. Adjustable chair

  • a. Improperly positioned key-boards

Q. Which of the following is not true of ethical computing guidelines

a. Not to use computer to promote lies

b. Use computers with consideration and respect for others

c. Avoid causing harm to othrs when using computer

d. Snoop in other people’s computer files.

  • d. Snoop in other people’s computer files.

Q. The following metric is a measure of the journal quality

a. Impact factor

b. Prize

c. Article size

d. None of the above

  • a. Impact factor

Q. The main advantage(s) of online education is (are)

a. Personalized education

b. Better flexibility

c. Better accessibility

d. All of the above

  • d. All of the above

Q. Pick the odd one out

a. Spam

b. Spyware

c. Antivirus

d. Hoax

  • c. Antivirus

Q. The commission of illegal acts through the use of computer or against a computer system.

a. Computer Crime

b. Computer Abuse

c. White hacking

d. Cyber Addition

  • a. Computer Crime

Q. A computer user, who copies an application onto more than one computer, if the licenseagreement does not permit this, is participating in:

a. Software piracy

b. Personal privacy

c. Computer theft

d. Identity theft

  • a. Software piracy

Q. Experts who are performing a needed service for society by helping companies realize thevulerabilities that exist in their systems by break into system just for the challenge.

a. Black-hat hackers

b. White-hat hackers

c. Both Black-hat hackers and White-hat hackers

d. Neither Black-hat hackers nor White-hat hackers

  • b. White-hat hackers

Q. The discrepancy between the “haves” and “have-notes” with regards to computer technologyis commonly referred as:

a. Social Justice

b. Intellectual Property Right

c. Digital Divide

d. Accountability

  • c. Digital Divide
Subscribe Now

Get All Updates & News