300+ TOP Philosophy of Informatics MCQs and Answers Quiz

Philosophy of Informatics Multiple Choice Questions

1. Informatics is the applied form of:
A. information technology

B. computer science

C. information statistics

D. information

Answer: D. information

2. Informatics includes disciplines of Computer science, Information systems, Information technology and —————- .
A. mathematics

B. statistics

C. physics

D. biology

Answer: B. statistics

3. The word Informatics is coined by :
A. walter f. banner

B. luciano floridi

C. karl steinbuch

D. dummett

Answer: A. walter f. banner

4. The word Informatics is coined from two terms; Information and ————– .
A. computernetic

B. automatic

C. systematic

D. arithmetic

Answer: B. automatic

5. PI means:
A. philosophy and information

B. philosophical informatics

C. philosophy of informatics

D. philosophy of information

Answer: D. philosophy of information

6. Who coined the term Philosophy of Information?
A. karl steinbuch

B. luciano floridi

C. walter f. banner

D. mccarthy

Answer: B. luciano floridi

7. Philosophy of Information is a branch of:
A. philosophy

B. computer science

C. information technology

D. artificial intelligence

Answer: A. philosophy

8. ICS means:
A. information and computer statistics

B. informational and computational statistics

C. information and computational science

D. integrated computational science

Answer: C. information and computational science

9. ICT means:
A. information and computer technology

B. information and computer technology

C. digital information and computer technology

D. digital information and communication

Answer: D. digital information and communication

10. ———— and —————– played major role in establishing PI as a mature area of philosophical investigation.
A. karl steinbuch and walter f. banner

B. mc carthy and alan evans

C. bynum and moor

D. darren george and kenneth c laudon

Answer: C. bynum and moor

11. Philosophy of Information treated ———————- as only one of the process of in which information can be involved.
A. networking

B. computation

C. information gathering

D. communication

Answer: B. computation

12. ————– is a representation of a fact or idea.
A. data

B. knowledge

C. information

D. intelligence

Answer: A. data

13. Data is a representation of:
A. quantity

B. quality

C. fact

D. information

Answer: C. fact

14. Organized data is called:
A. knowledge

B. information

C. sensation

D. none of these

Answer: B. information

15. —————– is the data processing language.
A. binary language

B. digital language

C. computational language

D. mathematical

Answer: A. binary language

16. In order to process data into information computer has particular language which is called:
A. digital language

B. computational language

C. binary language

D. arithmetical language

Answer: C. binary language

17. Binary language consists of just two digits:
A. 1 and 2

B. 1 and 0

C. 0 and 10

D. 1and 10

Answer: B. 1 and 0

18. ————- is the short for binary digit.
A. byte

B. digit

C. bite

D. bit

Answer: D. bit

19. One byte is combined by:
A. six bits

B. eight bits

C. ten bits

D. seven bits

Answer: B. eight bits

20. One Megabyte is combined by:
A. 1048576 bytes

B. 1048576 bits

C. 1048706 kilo bytes

D. 1002578 gigabyte

Answer: A. 1048576 bytes

21. The ————- is the means to we use to access information over the internet.
A. google

B. web

C. yahoo

D. hyper link

Answer: B. web

22. The unique identification number of a computer is called:
A. individual protocol address

B. internet protocol address

C. internet protection address

D. internet protection code.

Answer: B. internet protocol address

23. IP address means:
A. individual protocol address

B. internet protocol address

C. internet protection address

D. internet procedure address

Answer: B. internet protocol address

24. ————- is the largest computer network in the world.
A. yahoo messenger

B. internet

C. dignet

D. google

Answer: B. internet

25. The concept of ‘Fair use’ is related to:
A. internet protocol

B. intellectual property right

C. information gathering

D. green

Answer: B. intellectual property right

26. WBT means:
A. web built trade

B. world based trade

C. web-based trade

D. web- based training

Answer: D. web- based training

27. Which among the following is the academic service for libraries?
A. nicnet

B. brnet

C. inflibnet

D. shkshat

Answer: C. inflibnet

28. BRNET is basically meant to bring together ————— information resources scattered over different networks.
A. biological

B. business

C. medical

D. technological

Answer: A. biological

29. —————– are beneficial to students , who are unable to attend the centralized classroom.
A. smart classrooms

B. virtual classrooms

C. e- classrooms

D. internet cafes

Answer: B. virtual classrooms

30. The discrepancy between the “haves” and “have-nots” with regard computer technology is commonly referred to as the:
A. digital divide

B. digital discrimination

C. digital discrepancy

D. digital devoid

Answer: A. digital divide

31. Which among the following is a free software?
A. microsoft

B. micro word

C. mac os

D. linux

Answer: D. linux

32. Free software is also known as:
A. open software

B. open-source software

C. open data software

D. none of these

Answer: B. open-source software

33. —————— is an example for open source software.
A. microsoft operating system

B. mac os operating system

C. linux operating system

Answer: C. linux operating system

34. Open source soft wares are distributed under:
A. general public license

B. general license

C. general open license

D. open license

Answer: A. general public license

35. ——————— is an open source license.
A. general open license

B. general license

C. general public license

D. open license

Answer: C. general public license

36. GPL means:
A. goodwill public license

B. general public license

C. general popular license

Answer: B. general public license

37. Linux began in:
A. 1990

B. 1992

C. 1994

D. 1991

Answer: D. 1991

38. GNU is related to:
A. linux

B. ms office

C. microsoft

D. mysql

Answer: A. linux

39. Who created Linux operating system?
A. linus mc carthy

B. linus tormy

C. linus torvalds

D. linus james.

Answer: C. linus torvalds

40. MySQL is a/ an
A. open source software

B. system software

C. operating system

D. search engine .

Answer: A. open source software

41. What is Linux?
A. system software

B. search engine

C. office tool

D. open source operating system

Answer: D. open source operating system

42. Instead of low income ————— can be a factor for digital divide.
A. language

B. population

C. terrain

D. gender

Answer: C. terrain

43. Microsoft is an example for:
A. open software

B. system software

C. open source software

D. proprietary software

Answer: D. proprietary software

44. An attempt which helps to overcome the digital divide is called:
A. free software movement

B. free digital movement

C. universal digital movement

Answer: A. free software movement

45. ————— bringing a macroscopic change both in science and in philosophy.
A. inter net

B. free software

C. ict

D. inflinet

Answer: C. ict

46. Philosophy of Informatics is a —————- subject.
A. inter disciplinary

B. trans disciplinary

C. applied

D. meta disciplinary

Answer: B. trans disciplinary

47. Development and use of ICS and ICT is called as:
A. information explosion

B. internet turn

C. e, knowledge explosion

D. information turn

Answer: D. information turn

48. A macroscopic change which was bring by ICs and ICT is called:
A. computer revolution

B. internet revolution

C. trans revolution

D. knowledge revolution

Answer: A. computer revolution

49. ————- is the most puzzling and most characteristic feature of the mind.
A. intelligence

B. imagination

C. consciousness

D. none of these

Answer: C. consciousness

50. ————— is the awareness of yourself and your sensing and thinking when you are
awake.
A. intelligence

B. imagination

C. consciousness

D. attitude

Answer: C. consciousness

51. Consciousness is:
A. subjective

B. objective

C. relative

D. universalistic

Answer: A. subjective

52. “Human beings are immaterial minds within material bodies”. This vies is called:
A. pluralism

B. dualism

C. monism

D. parallelism

Answer: B. dualism
53. Who is the first philosophical figure of Modern European philosophy advocated Mind-body
Dualism?
A. rene descartes

B. hume

C. spinoza

D. leibniz

Answer: A. rene descartes
54. A cording to Descartes —————- is the basic feature of mind.
A. figure

B. solidity

C. extension

D. thought

Answer: D. thought
55. According to Descartes ——————– makes mind very different from body.
A. ability to extend

B. ability to develop

C. ability to think

D. ability to execute

Answer: C. ability to think

56. Descartes argues ——————– is necessary for self.
A. thinking

B. compounding

C. extension

D. evaluating

Answer: A. thinking
57. According to Descartes thinking is the ———— of self.
A. quality

B. essence

C. sign

D. result

Answer: B. essence
58. Descartes theory of mind body relation is known as:
A. psychophysical parallelism

B. occasionalism

C. interactionism

D. pre-established

Answer: C. interactionism
59. ————– considered as the one of the pioneers of the view that only material body
exists.
A. hobbes

B. descartes

C. spinoza

D. malebranche

Answer: A. hobbes
60. “We should able to explain the operations of mind in terms of the working of the body”.
Who among the following proposed this view?
A. spinoza

B. descartes

C. hobbes

D. malebranche

Answer: C. hobbes

61. “We should able to explain the operations of mind in terms of the working of the body”. This
position is called:
A. idealism

B. materialism

C. dualism

D. skepticism

Answer: B. materialism
62. “The process such as thought and life really nothing more than physical and chemical
process”. This position is called:
A. reductionism

B. inclusivenism

C. radicalism

D. none of these

Answer: A. reductionism
63. ‘States of consciousness are identical with the states of brain’. This theory is called:
A. behaviorist theory

B. reductionist theory

C. dualistic theory

D. identity

Answer: D. identity
64. Who is the prime proponent of Identity theory?
A. malebranche

B. j. j. c. smart

C. hobbes

D. putnam

Answer: B. j. j. c. smart
65. ‘There are no nonphysical entities and nonphysical laws’. Who said this?
A. malebranche

B. j. j. c. smart

C. hobbes

D. putnam

Answer: B. j. j. c. smart
66. ‘Experience is a brain process’. This view is related to:
A. behaviorist theory

B. reductionist theory

C. dualistic theory

D. identity

Answer: D. identity

67. Which among the following is an AI language?
A. ict

B. lisp

C. iflinet

D. prolet

Answer: B. lisp
68. ‘Mental phenomena like thought cannot be identical with brain phenomena’. Who asserted
this view?
A. malebranche

B. j. j. c. smart

C. norman malcolm

D. putnam

Answer: C. norman malcolm
69. Who among the following is treated as the strong opponent of Identical theory?
A. malebranche

B. norman malcolm

C. hobbes

D. putnam

Answer: B. norman malcolm
70. According to J.J. C. Smart the identity between brain state and mental state is:
A. categorical

B. conditional

C. contingent

D. contradictory

Answer: C. contingent
71. ———– began as school of psychology.
A. dualism

B. behaviorism

C. reductionism

D. identity theory

Answer: B. behaviorism
72. School of psychology that restricted the study of humans what can be observed is called:
A. reductionism

B. identity theory

C. epiphenomenalism

D. behaviorism

Answer: D. behaviorism

73. ‘’We can explain mental activities in terms of people’s behaviours’. This position is called:
A. dualism

B. behaviorism

C. reductionism

D. identity theory

Answer: B. behaviorism
74. Who among the following is a behaviorist philosopher?
A. gilbert ryle

B. g. e. moore

C. norman malcolm

D. malebranche

Answer: A. gilbert ryle
75. For the behaviorists the mind is nothing more than:
A. behavior

B. bodily behavior

C. mental behavior

D. mental dispositions

Answer: B. bodily behavior

76. Who among the following is considered as a strong critic of Behaviorism?
A. spinoza

B. gilbert ryle

C. hegel

D. hilary putnam

Answer: D. hilary putnam
77. Behaviorism says that all feelings are external behavior that others can:
A. understand

B. observe

C. predict

D. infer

Answer: B. observe
78. ————– reduces mind to behavior.
A. behaviorism

B. reductionism

C. materialism

D. functionalism

Answer: A. behaviorism
79. Who among the following is the proponent of Functionalism?
A. d. m. armstrong

B. gilbert ryle

C. hegel

D. hilary putnam

Answer: A. d. m. armstrong
80. ‘We should explain mental activities and mental states in terms of perpetual inputs and
behavioral outputs’. This view is called:
A. behaviorism

B. reductionism

C. materialism

D. functionalism

Answer: D. functionalism

81. ——————— claims that all conscious mental states has the connections between sense
inputs and behavior outputs.
A. behaviorism

B. reductionism

C. materialism

D. functionalism

Answer: D. functionalism
82. —————– agree that a person’s intention can be explained in terms of the person’s
desires and beliefs.
A. materialists

B. dualists

C. functionalists

D. behaviourists

Answer: C. functionalists
83. According to functionalists all mental states ultimately are to be explained in terms of the
role play linking our —————– to our external behavior.
A. internal stimulation

B. sensory stimulation

C. stimulation

D. none of these

Answer: B. sensory stimulation
84. Functionalism says that if two people have exactly the same inputs and give exactly the
same outputs, those two people have ——————————- .
A. exactly same inner mental state

B. different mental state

C. relative mental state

Answer: A. exactly same inner mental state
85. Critics argues that Functionalism leaves out the ————————-.
A. output state

B. input state

C. inner conscious state

D. emotional stages

Answer: C. inner conscious state

86. ‘The human brain is a kind of computer that process inputs and generate outputs’. This view
is related to:
A. behaviorism

B. reductionism

C. materialism

D. functionalism

Answer: D. functionalism
87. “Humans are sophisticated computers”. This notion is proposed by
A. behaviorism

B. functionalism

C. materialism

D. identity theory

Answer: B. functionalism
88. ‘The computer is the equivalent of the human mind’. Who proposed this view?
A. norman malcolm

B. malebranche

C. alan turing

D. gilbert ryle.

Answer: C. alan turing
89. Turing test is related to:
A. dualism

B. functionalism

C. reductionism

D. identity theory

Answer: B. functionalism
90. Who said that computer has a mind?
A. norman malcolm

B. malebranche

C. alan turing

D. gilbert ryle.

Answer: C. alan turing
91. Computer theory of human nature is popularly known as:
A. dualism

B. functionalism

C. reductionism

D. identity theory

Answer: B. functionalism

92. ————— is a one of the most opponent of functionalism.
A. alan turing

B. malebranche

C. norman malcolm

D. john searle

Answer: D. john searle
93. ‘Computer is nothing more than a machine that follows the instructions in its program’.
Who asserted this?
A. alan turing

B. malebranche

C. norman malcolm

D. john searle

Answer: D. john searle
94. ‘The Myth of the Computer is written by:
A. john searle

B. malebranche

C. norman malcolm

D. alan turing

Answer: A. john searle
95. Who advocated Chinese Room Argument?
A. john searle

B. malebranche

C. norman malcolm

D. alan turing

Answer: A. john searle
96. Chinese Room Argument is form of criticism against:
A. dualism

B. functionalism

C. reductionism

D. identity theory

Answer: B. functionalism
97. ‘There is something that human minds have that a computer following a program does not
have’. Who said this?
A. alan turing

B. malebranche

C. john searle

D. norman malcolm

Answer: C. john searle

98. According to John Searle computer lacks something which is the essential to the human
mind, what is that?
A. intelligence

B. memory

C. storage

D. consciousness

Answer: D. consciousness
99. ——————– is essentials to human mind according to Searle.
A. intelligence

B. memory

C. storage

D. consciousness

Answer: D. consciousness
100. Searle argues that mental states or activities are not reducible to:
A. consciousness

B. physical things

C. intelligence

D. psychological things

Answer: B. physical things

101. Searle argues that mental states or activities are not reducible to physical things, but a
physical thing produce them- namely,
A. our body

B. our heart

C. our nervous

D. our brain

Answer: D. our brain
102. Searle explains that biological, physical and chemical process produces all our:
A. mental states

B. physical states only

C. character

D. none of these

Answer: B. physical states only
103. Who claimed humans are purely physical creature?
A. malebranche

B. descartes

C. john searle

D. putnam

Answer: C. john searle
104. ‘Only matter exists, so nonmaterial minds cannot exist’. This view is called:
A. materialism

B. eliminative materialism

C. physicalism

D. eliminative idealism

Answer: B. eliminative materialism
105. ‘Eliminative Materialism and the Philosophical Attitudes’ is written by:
A. john searle

B. paul churchland

C. alan turig

D. gilbert ryle

Answer: B. paul churchland

106. The content of our mind such as desires, beliefs, fears, intentions are do not really exist.
This view is called:
A. materialism

B. eliminative materialism

C. physicalism

D. eliminative idealism

Answer: B. eliminative materialism
107. Paul Churchland refers our ordinary view about human mind as:
A. folk psychology

B. folk physiology

C. mentalism

D. physicalism

Answer: A. folk psychology
108. ‘Churchland argues ————– is really antiquated theory of the mind.
A. eliminative materialism

B. folk psychology

C. functionalism

D. behaviorism

Answer: B. folk psychology
109. Recycling e-waste is an approach related to:
A. ethical computing

B. effective computing

C. natural computing

D. green computing

Answer: D. green computing
110. ———— theory is radically inadequate account our internal activities according to Paul
Churchland.
A. eliminative materialism

B. folk psychology

C. functionalism

D. behaviorism

Answer: B. folk psychology

111. For Eliminative materialist, desires, beliefs, and intentions, are like ———–.
A. demons

B. spirits

C. interactions

D. angels

Answer: A. demons
112. According to Chalmers —————– are physically like human being, and act like human
being but have no consciousness.
A. robots

B. zigmas

C. zoyasis

D. zombies

Answer: D. zombies
113. Who coined the term Artificial Intelligence?
A. john mccarthy

B. lynn bake

C. john searle

D. gilbert ryle

Answer: A. john mccarthy
114. Zombies would not have:
A. intelligence

B. storage

C. consciousness

D. memory

Answer: C. consciousness
115. Thought experiment is related to:
A. david j. chalmers

B. lynn bake

C. john searle

D. gilbert ryle

Answer: A. david j. chalmers
116. ‘Mental properties such as consciousness are not physical properties’. This position is
called:
A. dualism

B. property dualism

C. property idealism

D. monism

Answer: B. property dualism

117. Property dualism recommended by:
A. david j. chalmers

B. lynn bake

C. john searle

D. gilbert ryle

Answer: A. david j. chalmers
118. Chalmers have the view that mental states are special kind of properties that are different
from physical properties. This view is known as:
A. property pluralism

B. dualism

C. property idealism

D. property dualism

Answer: D. property dualism
119. Searle uses the ——————— to show the mind is not a computer program.
A. folk psychology

B. chinese room argument

C. zombie argument

D. turing

Answer: B. chinese room argument
120. Chalmers uses a ————————- to support property dualism.
A. folk psychology

B. chinese room argument

C. zombie argument

D. turing

Answer: C. zombie argument
121. According to McCarthy ———– is the science and engineering of making intelligent
machines.
A. computer engineering

B. software engineering

C. robotics

D. artificial intelligence

Answer: D. artificial intelligence
122. ————- memory is our ability to remember how to do something that we learned in the
past.
A. personal memory

B. habit memory

C. factual memory

D. individual memory

Answer: B. habit memory

123. ————— is our ability to bring into our present consciousness a representation of events
that we personally experienced in the past.
A. personal memory

B. habit memory

C. factual memory

D. individual memory

Answer: A. personal memory
124. ————— is our memory of all the facts that make up our knowledge of the world.
A. personal memory

B. habit memory

C. factual memory

D. individual memory

Answer: C. factual memory
125. Conscious experience involves properties of an individual that are not entailed by the
physical properties of that individual. This view is called:
A. property pluralism

B. dualism

C. property idealism

D. property dualism

Answer: D. property dualism

126. According to Samkhya ————— is the modification of mind.
A. mahat

B. ahankara

C. vritti

D. anthakarana

Answer: C. vritti
127. According to Samkhya mind is an ———-.
A. evolute

B. modification

C. effect

D. cause

Answer: A. evolute
128. According to Samkhya mind is:
A. sentient

B. insentient

C. reflective

D. none of these

Answer: B. insentient
129. Samkhya says intellect is —————— to mind.
A. independent

B. dependent

C. related

D. cause

Answer: A. independent
130. In Samkhya system Intellect, Ego and Mind are generally called:
A. external organ

B. attributes

C. internal organ

D. knowledge organ

Answer: C. internal organ

131. —————– one of the faculty of the internal organ according to Samkhya.
A. jnanendriya

B. tanmatras

C. mahabhutas

D. manas

Answer: D. manas
132. The practice of applying statistical, mathematical, and computational techniques on
genomic and molecular biological data so as to address biological problems is called:
A. bioresearch

B. dna computing

C. bioinformatics

D. green computing

Answer: C. bioinformatics
133. ————– is the first evolute of prakrti according to Samkhya.
A. manas

B. mahat

C. ahamkara

D. karmedriya

Answer: B. mahat
134. Samkhya emphasized ————– aspect of Intellect.
A. material

B. physiological

C. sociological

D. psychical

Answer: D. psychical
135. Samkhya says that knowledge possible by the instrumentation of the psychic medium
which is:
A. vrtti

B. mahat

C. ahamkara

D. karmedriya

Answer: A. vrtti

136. Samkhya emphasized —————–nature of Vrtti.
A. spritual

B. material

C. physical

D. psychic

Answer: D. psychic
137. According to Samkhya Intellect is the first evolute of Prakrti which is dominated by
——————- guna.
A. rajas

B. sattva

C. tamas

D. all of these

Answer: B. sattva
138. Mahat means:
A. the big

B. the light

C. the great

D. the first

Answer: C. the great
139. According to —————– mental states are nonphysical properties of the brain.
A. eliminative materialism

B. property dualism

C. functionalism

D. behaviorism

Answer: B. property dualism
140. Physical properties of the brain cause non-physical properties of the brain but not vice
versa. This position is known as:
A. eliminative materialism

B. epiphenomenalism

C. functionalism

D. behaviorism

Answer: B. epiphenomenalism
141. The distinctive feature of Epiphenomenalism is that the nonphysical properties of the brain
do not in turn, bring about —————— of the brain.
A. physical states

B. mental states

C. psychic states

D. nonphysical states

Answer: A. physical states

142. ——————————- is one that is freely available for developers to use or modify as
they wish.
A. an operating system

B. a multiuser operating program

C. a network operating system

D. an open- source program

Answer: D. an open- source program
143. ——————— is a stable, easy –to-use and widely distributed Linux operating system.
A. feroda

B. ubuntu

C. suse

D. unix

Answer: B. ubuntu
144. The most common tool that is used for searching information over the internet is:
A. network portal

B. open software

C. e mail

D. search engine

Answer: D. search engine
145. Data collecting program of a search engine is called
A. spider

B. tegs

C. index program

D. search engine software

Answer: A. spider
146. ——————– are the words you can use to refine your searches, making them more
effective.
A. wikis

B. manuals

C. spider

D. boolean operators

Answer: D. boolean operators
147. ——————– is actually the network of networks.
A. search engine

B. internet

C. website

D. podcast

Answer: B. internet

148. Blogs are:
A. podcasts posted on web

B. free software

C. search engine

D. personal logs posted on

Answer: D. personal logs posted on
149. Blogs are:
A. confidential

B. private

C. public

D. unalterable

Answer: C. public
150. ——————– are online personal networks where individuals are personal networks
where individuals are invited or allowed to join.
A. social networks

B. blogs

C. chat groups

D. podcasts

Answer: A. social networks

151. The policy of —————– has allowed a range of exceptions to the copyright provision.
A. limited use

B. ipr

C. specific use

D. fair use

Answer: D. fair use
152. —————— is based on the belief that the public is entitled to freely use portions of
copyrighted materials for certain purpose.
A. limited use

B. ipr

C. specific use

D. fair use

Answer: D. fair use
153. WebCT is :
A. an virtual classroom package

B. a chat group

C. an e-learning tool

D. social network

Answer: C. an e-learning tool
154. ————- is the training, which delivers educational content through a web browser over
the public or private interest.
A. ics

B. wbt

C. virtual classroom

D. cbt

Answer: B. wbt
155. ——————– is the where a computer program provides motivation and feedback in
place of a live instructor.
A. ics

B. wbt

C. virtual classroom

D. cbt

Answer: D. cbt

156. ————— is the technology which captivate the student’s interest.
A. wbt

B. virtual classroom

C. cbt

D. ict

Answer: B. virtual classroom
157. ——————– is meant for e-governance applications.
A. brnet

B. inflibnet

C. vast

D. nicnet

Answer: D. nicnet
158. Spam means:
A. unwanted e-mail

B. virus

C. software

D. search engine

Answer: A. unwanted e-mail
159. ———————– are small text files that some web sites automatically store on your
computer hard drive when you visit the site.
A. spam

B. cookies

C. adware

D. malware

Answer: B. cookies
160. Phishing is related to:
A. copy right

B. virus

C. e-learning

D. identity theft

Answer: D. identity theft

161. ——————- contain information that is untrue.
A. cookies

B. virus

C. internet hoaxes

D. spam

Answer: C. internet hoaxes
162. A —————- defined as anyone who breaks into a computer system unlawfully.
A. hacker

B. virus

C. spam

D. internet hoaxes

Answer: A. hacker
163. A ———————- is a program that appears to be something useful or desirable, but at
the same time does something malicious in the background without our knowledge.
A. hacker

B. virus

C. trojan horse

D. cookies

Answer: C. trojan horse
164. ——————– is a computer program that attaches itself to another computer program
and attempts to spread it to other computers when files are exchanged.
A. hacker

B. virus

C. trojan horse

D. cookies

Answer: B. virus
165. What is logic bomb?
A. hacker

B. virus

C. trojan horse

D. cookies

Answer: B. virus
166. —————- are viruses that are triggered by the passage of time or on certain date.
A. trojan horses

B. worms

C. logic bombs

D. time bombs

Answer: D. time bombs

167. ——————— slightly different from virus.
A. trojan horses

B. worms

C. logic bombs

D. cookies

Answer: B. worms
168. A computer user copies an application onto more than one computer, if the license
agreement does not permit this, is participating:
A. phishing

B. hacking

C. identity theft

D. software piracy

Answer: D. software piracy
169. —————– is an agreement between the user and the software developer.
A. copy right

B. software license

C. ipr

D. none of these

Answer: B. software license
170. The Computer Ethics Institute of United States developed:
A. guide lines for fair use

B. free software program

C. anti-virus program

D. ten

Answer: D. ten
171. ————————- is treated as the bench mark for ethical computing.
A. copyright law

B. ipr law

C. ten commandments of computer ethics

D. six commandments of computer ethics

Answer: C. ten commandments of computer ethics
172. ———— is the right to be left alone to do as one pleases.
A. ipr

B. privacy

C. copy right

D. freedom

Answer: B. privacy

173. Which state among the following is claimed Privacy is a basic human right?
A. united states of america

B. britain

C. india

D. netherland

Answer: A. united states of america
174. In India Cyber laws have been defined under the:
A. cyber law act, 2000

B. ethical computing law, 2005

C. it act, 2000

D. cyber act 2003

Answer: C. it act, 2000
175. —————– comprise of a set of legal provisions to regulate the activities of cyber space
or internet.
A. cyber ethics

B. cyber laws

C. it act 2000

D. internet laws

Answer: B. cyber laws

176. The state in which the too much use of the computer and internet, affecting the routine life
of an individual is called:
A. internet addiction

B. cyber divide

C. software addiction

D. cyber addiction

Answer: D. cyber addiction
177. An individual who becomes too much dependent on computer and internet is called:
A. computer addict

B. internet addict

C. cyber addict

D. technocrat

Answer: C. cyber addict
178. Net gamming related to:
A. cyber addiction

B. cyber law

C. copy right

D. cyber ethics

Answer: A. cyber addiction
179. ———— refers the addiction toward unlimited information available on the internet.
A. cyber addiction

B. internet addiction

C. information overloaded

D. knowledge

Answer: C. information overloaded
180. —————— is a study involving efficient usage of computer resources.
A. eco computing

B. green computing

C. sustainable computing

D. natural computing

Answer: B. green computing

181. Efficient algorithm is related to:
A. software development

B. free software movement

C. digital divide

D. green computing

Answer: D. green computing
182. Which among the following is considered as a key approach of Green computing.
A. virtualization of computer system

B. net computing

C. resource computing

Answer: A. virtualization of computer system
183. ————– is a specific feature of a computer
A. Mechanical

B. Accuracy

C. Compactness

D. None of these

Answer: B. Accuracy
184. Which one is called a storage device?
A. Monitor

B. CPU

C. Mother Board

D. CD-ROM

Answer: D. CD-ROM
185. An ——————-enables you to enter data and instructions into the computer
A. Input device

B. Output device

C. Printer

D. CD-ROM

Answer: A. Input device

186. Which of the following is the leading keyboard?
A. Cursor control keyboard

B. QWERTY key board

C. Dvorak Keyboard

D. Gaming key board

Answer: C. Dvorak Keyboard
187. There are two primary categories of printers, which are they?
A. Impact and Nonimpact

B. laser and Inkjet

C. Colour and black

D. None of these

Answer: A. Impact and Nonimpact
188. LCD monitors using —————————technology
A. Cathode-ray tube

B. digital

C. crystal

D. liquid crystal display

Answer: D. liquid crystal display
189. Which of the following is the most common example of a locally administered network?
A. Server network

B. peer – to- peer network

C. central network

D. none of these

Answer: B. peer – to- peer network
190. The term network architecture means.
A. the design of a network

B. peer – to- peer network

C. locally administered network

D. net work group

Answer: A. the design of a network
191. The first Web domain was hosted on the Web on
A. September 1990,

B. November 1990,

C. December 1990,

D. December 1991,

Answer: C. December 1990,

192. —————————————, are generally acknowledge as the “fathers” of the
Internet.
A. Babbage and Cerf

B. Vinton Cerf and Robert Kahn

C. Robert Kahn and Michel

D. Vinton Cerf and Michel

Answer: B. Vinton Cerf and Robert Kahn
193. LAN means
A. Long area networks

B. Listed area networks

C. Local area networks

D. Land area networks

Answer: C. Local area networks
194. WAN means
A. Wild area networks

B. Western area networks

C. Wide area networks

D. None of these

Answer: C. Wide area networks
195. ———————technology provides a cost-effective means for electronic communication
A. ATM

B. Mobile

C. Wireless

D. None of these

Answer: C. Wireless
196. The largest and fastest pathway is the main artery of the Internet is called
A. Internet backbone,

B. Internet artery

C. Internet Nerve

D. None of these

Answer: A. Internet backbone,
197. LSN means
A. Local space networking,

B. Large size networking

C. Long scale networking

D. Large Scale Networking

Answer: D. Large Scale Networking

198. ————————–networks are true multi-service networks with the potential to offer
broadband services
A. ATM

B. LSN

C. WAN

D. None of these

Answer: A. ATM
199. —————————are a result of the combination of features of various portable devices
A. Portable media players

B. Smart phones

C. Personal digital assistants

D. Cellular phones

Answer: B. Smart phones
200. Which is considered as an expensive and powerful tool for carrying electronic information?
A. Notebook computers

B. Smart phones

C. Cellular phones

D. Portable media players

Answer: A. Notebook computers

201. Which of the following is a software programs that help us to run the computer and
coordinates instructions between application software and the computer’s hardware devices?
A. Operative software.

B. System software

C. Application software

D. None of these

Answer: B. System software
202. ——————————is a group of programs that controls how your computer system
functions.
A. System software

B. Application software

C. Operating software

D. The operating system

Answer: D. The operating system
203. The software we use to do everyday tasks at home and at work is called
A. System software

B. Application software

C. The operating system

D. None of these

Answer: B. Application software
204. Which are called two basic types of software?
A. application software and system software

B. application software and program software

C. program software and system software

D. None of these

Answer: B. application software and program software
205. Which of the following is an example for system software.
A. Excel

B. Microsoft Word

C. Windows

D. Power point

Answer: C. Windows

206. Which of the following is an example for application software.
A. Microsoft Word

B. Windows

C. Linux

D. None of the above

Answer: A. Microsoft Word
207. A computer cannot operate without ———————————-
A. operating system

B. application software

C. MS. Windows

D. None of these

Answer: A. operating system
208. Which of the following is an open-source operating system?
A. Windows

B. Linux

C. Mac OS

D. None of these

Answer: B. Linux
209. Which one of the following is an example for Spreadsheet software?
A. Microsoft Word

B. Mac OS

C. Microsoft Excel

D. Ms Paint

Answer: C. Microsoft Excel
210. ——————————-enables the computer to translates your spoken words into typed
text.
A. Speech-recognition software

B. Speech software

C. Voice software

D. None of these

Answer: A. Speech-recognition software

211. Microsoft has incorporated speech recognition software into its latest operating system
called
A. Windows XP

B. Microsoft Excel

C. Windows Vista

D. None of these

Answer: C. Windows Vista
212. Who developed Linux?
A. Linus Torvalds

B. Linus Edwin

C. Linus Tom

D. Linus Trogen

Answer: A. Linus Torvalds
213. ——————————- is basically a complex electronic filing system
A. Database software

B. Tax-preparation software

C. Personal information software

D. None of these

Answer: A. Database software
214. Which of the following is a personal information manager software
A. Microsoft Access

B. Oracle

C. Corel Paradox

D. Microsoft Outlook

Answer: D. Microsoft Outlook
215. In a computer the letter K is represented as
A. 00110011

B. 01010101

C. 01001011

D. 00001111

Answer: C. 01001011
216. In computer terms, data means
A. Information

B. idea

C. representation of name

D. representation of an idea

Answer: D. representation of an idea

217. The data which has been organized or presented in a meaningful fashion is called
A. idea

B. information

C. concept

D. none of these

Answer: B. information
218. A computers work exclusively with
A. data

B. idea

C. numbers

D. information

Answer: C. numbers
219. The language which consists of just two digits is called
A. system language

B. binary language

C. number language

D. mathematical language

Answer: B. binary language
220. A binary digit contains
A. One zero and two ones

B. two zero and one one

C. two zero and two ones

D. one zero and one one

Answer: D. one zero and one one
221. One byte is equal to
A. 6 bits

B. 8 bits

C. 4 bits

D. 5 bits

Answer: B. 8 bits
222. In binary language, the letter K is represented as
A. 01010101

B. 00110011

C. 00001111

D. 01001011.

Answer: D. 01001011.

223. Kilobytes, megabytes, and gigabytes are
A. name of bytes

B. amounts of bytes

C. group of bytes

D. none of these

Answer: B. amounts of bytes
224. A kilobyte (KB) is approximately
A. 1,000 bytes

B. 100 bytes

C. 10000

D. 10

Answer: A. 1,000 bytes
225. A megabyte (MB) is
A. major byte

B. minor byte

C. a million bytes

D. none of these

Answer: C. a million bytes

226. A gigabyte (GB) is equal to
A. billion bytes

B. great byte

C. one quadrillion bytes

D. none of these

Answer: A. billion bytes
227. A peta byte of data-that’s more than——————————bytes
A. one billion

B. one million

C. ten thousand

D. one quadrillion

Answer: D. one quadrillion
228. ———————————feature helps the user to return to a specific Web page without
always having to remember to type the address.
A. Tick mark

B. Dial Up

C. Bookmark

D. Search Engine

Answer: C. Bookmark
229. A Search engine has ————parts
A. Three

B. four

C. five

D. two

Answer: A. Three
230. Which of the following is not a part of search engine?
A. indexer program

B. spider

C. engine software

D. bookmark

Answer: D. bookmark

231. Which of the following is a search engine?
A. Google

B. AlltheWeb

C. Yahoo

D. all of these

Answer: D. all of these
232. ———————————–is a guide to the internet organized by topics and subtopics.
A. a search engine

B. a blog

C. a subject directory

D. podcast

Answer: C. a subject directory
233. Among the following which one is not a subject dictionary?
A. Google

B. Yahoo!

C. Triton

D. none of these

Answer: C. Triton
234. What is the name of the program that enables us to communicate in real time with others
who also are online?
A. Instant messaging

B. E. mail

C. Electronic messaging

D. none of these

Answer: A. Instant messaging
235. A clip of audio or video content that is broadcast over the internet using compressed files is
called
A. instant messaging

B. e. mail

C. spider

D. podcast

Answer: D. podcast

236. Weblogs or blogs are
A. a written message that is sent and received over electronic communication systems

B. audio or video content over the Internet

C. personal logs or journal entries that are posted on the web.

D. All of these

Answer: C. personal logs or journal entries that are posted on the web.
237. Which of the following is a blog site that devotes itself to discussing techno gadgets?
A. www.rottentomatoes.com

B. www.gizmodo.com

C. www.tech. com

D. www.itec.com

Answer: B. www.gizmodo.com
238. A written message that is sent and received over electronic communication systems is
called
A. E .mail

B. Weblogs

C. podcast

D. none of these

Answer: A. E .mail
239. ————————-is the broadcast of audio or video content over the Internet.
a.
A. podcast

B. a webcast

C. weblogs

D. e .mail

Answer: B. a webcast
240. Name of the educational initiative backed by government of India for information
technology is called
A. Sakshat

B. Rakshat

C. Prathyashat

D. none of these

Answer: A. Sakshat
241. E.-books and e-journals are
A. a written message

B. audio or video content

C. the content of open access publishing

D. a subject directory

Answer: C. the content of open access publishing

242. Claiming another person’s words as your own- this action is known as
A. copyright

B. plagiarism

C. patent

D. none of these

Answer: B. plagiarism
243. WebCT and Enspire are the tools for
A. E .mail

B. Electronic messaging

C. E-learning

D. Instant messaging

Answer: C. E-learning
244. Through ———————-students can get online education from remote places.
A. virtual classrooms

B. subject directory

C. NICNET

D. INFLIBNET

Answer: A. virtual classrooms
245. ——————————-is a virtual network of libraries
A. NICNET

B. INFLIBNET

C. BRNET

D. None of these

Answer: B. INFLIBNET
246. Name the networking infrastructure built by NIC for the e-governance applications.
A. NICNET

B. INFLIBNET

C. BRNET

D. None of these

Answer: A. NICNET
247. BRNET is related with
A. library information resources

B. geological information resources

C. biological information resources

D. all of these

Answer: C. biological information resources

248. WBT is an example for
A. a library information resources

B. a geological information resources

C. a biological information resources

D. a computer-based training

Answer: D. a computer-based training
249. Which of the following is true?
A. podcast content includes radio shows

B. podcast content includes audio books

C. podcast content includes magazines

D. all of these

Answer: D. all of these
250. Which of the following statement is not true to e-mail
A. it is not the most secure form of transmission

B. it is not a safe way to send personal or sensitive information

C. it is not a popular means of communication

D. None of these

Answer: C. it is not a popular means of communication

251. Broadband connections includes
A. cable

B. satellite

C. DSL

D. all of these

Answer: D. all of these
252. ICQ is related with
A. Weblogs

B. Instant messaging

C. Search engines

D. Podcasts

Answer: B. Instant messaging
253. CCTV is
A. Closed circuit television

B. Crime detection Software

C. Communication software

D. All the above

Answer: A. Closed circuit television
254. Britannica is a
A. Free online educational software

B. Class room aid

C. Edutainment

D. None of these

Answer: A. Free online educational software
255. INFLIBNET is
A. Sharing of library and information resources

B. Free online education software

C. Software for sharing information

D. Online bio-resource in centre

Answer: A. Sharing of library and information resources

256. Google earth is ——–
A. Entertainment software

B. Educational software

C. Anti- virus software

D. Hardware

Answer: B. Educational software
257. Which among shows IT for national integration
A. Permanent Account Number (PAN)

B. Electors Photo Identity Card (EPIC)

C. Sakshat and INFLIBNET

D. All of these.

Answer: D. All of these.
258. ——- is a non-profit corporation formed to educate about and advocate for the benefits of
open source and to build bridges among different constituencies in the open source community.
A. Free Software programme

B. Free Software development

C. Free Software Foundation

D. The open Source Initiative.

Answer: D. The open Source Initiative.
259. ——- can be referred as the use or application of computational devices in the field of
biological sciences and research.
A. Bio-computing

B. Virtual Computing

C. Artificial Intelligent

D. DNA

Answer: A. Bio-computing
260. This unlawful acts wherein the computer is either a tool or target or both
A. Cyber ethics

B. Cyber crime

C. Cyber abuse

D. Cyber literacy

Answer: B. Cyber crime

261. Which of the following is annoying, but really doesn’t render any harm to our computer?
A. Shareware

B. Malware

C. Spyware

D. Adware

Answer: D. Adware
262. Why do you not want too much personal data about you on the Internet?
A. It might reveal embarrassing facts about you

B. It might be used by an identity thief to impersonate you

C. It might be used by a potential employer to find out more about you

D. There is no reason to worry about personal information on the Internet

Answer: B. It might be used by an identity thief to impersonate you
263. What is the top rule for avoiding Internet fraud?
A. If it seems too good to be true, it probably is

B. Never use your bank account numbers

C. Only work with people who have verifiable e-mail address

D. Do not invest in foreign deals

Answer: C. Only work with people who have verifiable e-mail address
264. One scam that lures internet users into revealing personal information is
A. Malware

B. Spam

C. Phishing

D. Internet hoax

Answer: C. Phishing
265. When hackers use a program that pretends to be useful to a user while actually allowing the
hacker to gain control of the user’s computer, this is called a(n)
A. Zero-day Attack

B. Trojan Horse Attack

C. Distributed Denial of Service Attack

D. Boot Sector Virus Attack

Answer: B. Trojan Horse Attack
266. Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
A. Worms

B. Stealth Viruses

C. Logic bombs

D. Macro viruses

Answer: A. Worms

267. How could hacker use information about you found through Internet searches?
A. To guess passwords if your passwords are linked to personal

B. To guess passwords if your passwords are linked to your interests or hobbies

C. In social engineering, to ascertain more information about you or your computer system

D. All of the above

Answer: D. All of the above
268. What is the first step in protecting yourself from identity theft?
A. Never provide any personal data about yourself unless absolutely necessary

B. Routinely check your records for signs of identity theft.

C. Never use your real name on the Internet

D. Routinely check for spyware on your computer.

Answer: A. Never provide any personal data about yourself unless absolutely necessary
269. A backup is a …………………. against data loss a.Threat b. Security c. Countermeasure d. Abuse
111. What is malware?
A. Software that has some malicious purpose

B. Software that is not functioning properly

C. Software that damages your system

D. Software that is not properly configured for your system

Answer: B. Software that is not functioning properly
270. Which of the following is a step that all computer users should take to protect against virus
attacks?
A. Purchase and configure a firewall

B. Shut down all incoming ports

C. Use non-standard e-mail clients

D. Install and use antivirus software

Answer: D. Install and use antivirus software
271. ——– uses the principles and tools of computer science to model or algorithmically
specify complexes biological information system and computational systems with life-like capabilities.
A. Virtual Computing

B. Artificial Intelligent

C. Bio-computing

D. Cookies

Answer: C. Bio-computing
272. —— uses software to allow people to interact with three-dimensional simulated
environment.
A. Virtual Computing

B. Artificial Intelligent

C. Bio-computing

D. Cookies

Answer: A. Virtual Computing

273. The science and engineering of making intelligent machines, especially intelligent computer programs.
A. Artificial Intelligence

B. Stress Management

C. Anti-Virus

D. Intellectual Property Right

Answer: A. Artificial Intelligence
274. Computers are programmed to make decisions in real-life situations are known as
A. Virtual reality

B. Robotics

C. Neural Networks

D. Expert System

Answer: D. Expert System
275. Computing systems, which imitate human brain through a network of highly interconnected
processing elements.
A. Virtual reality

B. Robotics

C. Neural Networks

D. Expert System

Answer: C. Neural Networks

276. Which among the following is not applicable to internet use
A. Do not use email to strangers

B. Do not give out your email address to people you doesn’t know

C. Do not open email attachments from people you don’t know

D. Pretend to be someone else when you are online.

Answer: D. Pretend to be someone else when you are online.
277. Which among the following is applicable to internet use
A. Do not sent Spam, Worms and Viruses into cyberspace

B. Do not be rude or use bad language while you use email

C. Do not disclose your personal information such as your bank a/c number, passwords etc

D. All of these

Answer: D. All of these
278. Which among the following is unethical use of cell phone
A. Do not accept call while driving

B. Switch off cell phone inside an aircraft

C. Do capture the images of others without permission of that person

D. Keep silent tone in meetings

Answer: C. Do capture the images of others without permission of that person
279. A repetitive strain injury (RSI) in computer users caused by
A. Improperly positioned key-boards

B. a/c room

C. Proper lighting

D. Adjustable chair

Answer: A. Improperly positioned key-boards
280. Which of the following is not true of ethical computing guidelines
A. Not to use computer to promote lies

B. Use computers with consideration and respect for others

C. Avoid causing harm to othrs when using computer

D. Snoop in other people’s computer files.

Answer: D. Snoop in other people’s computer files.

281. The following metric is a measure of the journal quality
A. Impact factor

B. Prize

C. Article size

D. None of the above

Answer: A. Impact factor
282. The main advantage(s) of online education is (are)
A. Personalized education

B. Better flexibility

C. Better accessibility

D. All of the above

Answer: D. All of the above
283. Pick the odd one out
A. Spam

B. Spyware

C. Antivirus

D. Hoax

Answer: C. Antivirus
284. A …………. is a small text file which is placed on your computer on the request made by the
web server to your browser.
A. Spam

B. Cookie

C. Web bugs

D. Worms

Answer: B. Cookie
285. The commission of illegal acts through the use of computer or against a computer system.
A. Computer Crime

B. Computer Abuse

C. White hacking

D. Cyber Addition

Answer: A. Computer Crime

286. —– is an example of software being created independent of any money- making incentive or
any property rights
A. Spyware

B. Adware

C. Freeware

D. Malware

Answer: C. Freeware
287. A computer user, who copies an application onto more than one computer, if the license
agreement does not permit this, is participating in:
A. Software piracy

B. Personal privacy

C. Computer theft

D. Identity theft

Answer: A. Software piracy
288. Experts who are performing a needed service for society by helping companies realize the
vulerabilities that exist in their systems by break into system just for the challenge.
A. Black-hat hackers

B. White-hat hackers

C. Both Black-hat hackers and White-hat hackers

D. Neither Black-hat hackers nor White-hat hackers

Answer: B. White-hat hackers
289. If the antivirus software detects a virus signature or suspicious activity, it stops the execution
of the file and virus and notifies you that it has dtected virus is known as:
A. Quarantining

B. Searching

C. Phishing

D. All of these

Answer: A. Quarantining
290. The discrepancy between the “haves” and “have-notes” with regards to computer technology
is commonly referred as:
A. Social Justice

B. Intellectual Property Right

C. Digital Divide

D. Accountability

Answer: C. Digital Divide

291. An online archive of multidiscipline journal articles in the most significant professional journals.
A. ICPR

B. Jstor

C. Orkut

D. Facebook

Answer: B. Jstor

292. Which among the following is true
A. Internet is a democratic technology

B. Internet protects personal privacy

C. Internet facilitate the spread of right information

D. None of the above

Answer: D. None of the above

293. Which among the following skills need for locating appropriate information on the Internet
A. the ability to use Internet tools such as search engines

B. having knowledge of search techniques and ability to execute the search.

C. One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.

D. All of these

Answer: D. All of these

Philosophy of Informatics Objective Questions with Answers Pdf Download Online Test Exam