Top 250+ Solved Philosophy of Informatics MCQ Questions Answer
Q. Which among the following is not applicable to internet use
a. Do not use email to strangers
b. Do not give out your email address to people you doesn’t know
c. Do not open email attachments from people you don’t know
d. Pretend to be someone else when you are online.
Q. Which among the following is applicable to internet use
a. Do not sent Spam, Worms and Viruses into cyberspace
b. Do not be rude or use bad language while you use email
c. Do not disclose your personal information such as your bank a/c number, passwords etc
d. All of these
Q. Which among the following is unethical use of cell phone
a. Do not accept call while driving
b. Switch off cell phone inside an aircraft
c. Do capture the images of others without permission of that person
d. Keep silent tone in meetings
Q. A repetitive strain injury (RSI) in computer users caused by
a. Improperly positioned key-boards
b. a/c room
c. Proper lighting
d. Adjustable chair
Q. Which of the following is not true of ethical computing guidelines
a. Not to use computer to promote lies
b. Use computers with consideration and respect for others
c. Avoid causing harm to othrs when using computer
d. Snoop in other people’s computer files.
Q. The following metric is a measure of the journal quality
a. Impact factor
b. Prize
c. Article size
d. None of the above
Q. The main advantage(s) of online education is (are)
a. Personalized education
b. Better flexibility
c. Better accessibility
d. All of the above
Q. A ............. is a small text file which is placed on your computer on the request made by theweb server to your browser.
a. Spam
b. Cookie
c. Web bugs
d. Worms
Q. The commission of illegal acts through the use of computer or against a computer system.
a. Computer Crime
b. Computer Abuse
c. White hacking
d. Cyber Addition
Q. ----- is an example of software being created independent of any money- making incentive orany property rights
a. Spyware
b. Adware
c. Freeware
d. Malware
Q. A computer user, who copies an application onto more than one computer, if the licenseagreement does not permit this, is participating in:
a. Software piracy
b. Personal privacy
c. Computer theft
d. Identity theft
Q. Experts who are performing a needed service for society by helping companies realize thevulerabilities that exist in their systems by break into system just for the challenge.
a. Black-hat hackers
b. White-hat hackers
c. Both Black-hat hackers and White-hat hackers
d. Neither Black-hat hackers nor White-hat hackers
Q. If the antivirus software detects a virus signature or suspicious activity, it stops the executionof the file and virus and notifies you that it has dtected virus is known as:
a. Quarantining
b. Searching
c. Phishing
d. All of these
Q. The discrepancy between the “haves” and “have-notes” with regards to computer technologyis commonly referred as:
a. Social Justice
b. Intellectual Property Right
c. Digital Divide
d. Accountability