Philosophy of Informatics Multiple Choice Questions
1. Informatics is the applied form of:
A. information technology
B. computer science
C. information statistics
D. information
Answer: D. information
2. Informatics includes disciplines of Computer science, Information systems, Information technology and —————- .
A. mathematics
B. statistics
C. physics
D. biology
Answer: B. statistics
3. The word Informatics is coined by :
A. walter f. banner
B. luciano floridi
C. karl steinbuch
D. dummett
Answer: A. walter f. banner
4. The word Informatics is coined from two terms; Information and ————– .
A. computernetic
B. automatic
C. systematic
D. arithmetic
Answer: B. automatic
5. PI means:
A. philosophy and information
B. philosophical informatics
C. philosophy of informatics
D. philosophy of information
Answer: D. philosophy of information
6. Who coined the term Philosophy of Information?
A. karl steinbuch
B. luciano floridi
C. walter f. banner
D. mccarthy
Answer: B. luciano floridi
7. Philosophy of Information is a branch of:
A. philosophy
B. computer science
C. information technology
D. artificial intelligence
Answer: A. philosophy
8. ICS means:
A. information and computer statistics
B. informational and computational statistics
C. information and computational science
D. integrated computational science
Answer: C. information and computational science
9. ICT means:
A. information and computer technology
B. information and computer technology
C. digital information and computer technology
D. digital information and communication
Answer: D. digital information and communication
10. ———— and —————– played major role in establishing PI as a mature area of philosophical investigation.
A. karl steinbuch and walter f. banner
B. mc carthy and alan evans
C. bynum and moor
D. darren george and kenneth c laudon
Answer: C. bynum and moor
11. Philosophy of Information treated ———————- as only one of the process of in which information can be involved.
A. networking
B. computation
C. information gathering
D. communication
Answer: B. computation
12. ————– is a representation of a fact or idea.
A. data
B. knowledge
C. information
D. intelligence
Answer: A. data
13. Data is a representation of:
A. quantity
B. quality
C. fact
D. information
Answer: C. fact
14. Organized data is called:
A. knowledge
B. information
C. sensation
D. none of these
Answer: B. information
15. —————– is the data processing language.
A. binary language
B. digital language
C. computational language
D. mathematical
Answer: A. binary language
16. In order to process data into information computer has particular language which is called:
A. digital language
B. computational language
C. binary language
D. arithmetical language
Answer: C. binary language
17. Binary language consists of just two digits:
A. 1 and 2
B. 1 and 0
C. 0 and 10
D. 1and 10
Answer: B. 1 and 0
18. ————- is the short for binary digit.
A. byte
B. digit
C. bite
D. bit
Answer: D. bit
19. One byte is combined by:
A. six bits
B. eight bits
C. ten bits
D. seven bits
Answer: B. eight bits
20. One Megabyte is combined by:
A. 1048576 bytes
B. 1048576 bits
C. 1048706 kilo bytes
D. 1002578 gigabyte
Answer: A. 1048576 bytes
21. The ————- is the means to we use to access information over the internet.
A. google
B. web
C. yahoo
D. hyper link
Answer: B. web
22. The unique identification number of a computer is called:
A. individual protocol address
B. internet protocol address
C. internet protection address
D. internet protection code.
Answer: B. internet protocol address
23. IP address means:
A. individual protocol address
B. internet protocol address
C. internet protection address
D. internet procedure address
Answer: B. internet protocol address
24. ————- is the largest computer network in the world.
A. yahoo messenger
B. internet
C. dignet
D. google
Answer: B. internet
25. The concept of ‘Fair use’ is related to:
A. internet protocol
B. intellectual property right
C. information gathering
D. green
Answer: B. intellectual property right
26. WBT means:
A. web built trade
B. world based trade
C. web-based trade
D. web- based training
Answer: D. web- based training
27. Which among the following is the academic service for libraries?
A. nicnet
B. brnet
C. inflibnet
D. shkshat
Answer: C. inflibnet
28. BRNET is basically meant to bring together ————— information resources scattered over different networks.
A. biological
B. business
C. medical
D. technological
Answer: A. biological
29. —————– are beneficial to students , who are unable to attend the centralized classroom.
A. smart classrooms
B. virtual classrooms
C. e- classrooms
D. internet cafes
Answer: B. virtual classrooms
30. The discrepancy between the “haves” and “have-nots” with regard computer technology is commonly referred to as the:
A. digital divide
B. digital discrimination
C. digital discrepancy
D. digital devoid
Answer: A. digital divide
31. Which among the following is a free software?
A. microsoft
B. micro word
C. mac os
D. linux
Answer: D. linux
32. Free software is also known as:
A. open software
B. open-source software
C. open data software
D. none of these
Answer: B. open-source software
33. —————— is an example for open source software.
A. microsoft operating system
B. mac os operating system
C. linux operating system
Answer: C. linux operating system
34. Open source soft wares are distributed under:
A. general public license
B. general license
C. general open license
D. open license
Answer: A. general public license
35. ——————— is an open source license.
A. general open license
B. general license
C. general public license
D. open license
Answer: C. general public license
36. GPL means:
A. goodwill public license
B. general public license
C. general popular license
Answer: B. general public license
37. Linux began in:
A. 1990
B. 1992
C. 1994
D. 1991
Answer: D. 1991
38. GNU is related to:
A. linux
B. ms office
C. microsoft
D. mysql
Answer: A. linux
39. Who created Linux operating system?
A. linus mc carthy
B. linus tormy
C. linus torvalds
D. linus james.
Answer: C. linus torvalds
40. MySQL is a/ an
A. open source software
B. system software
C. operating system
D. search engine .
Answer: A. open source software
41. What is Linux?
A. system software
B. search engine
C. office tool
D. open source operating system
Answer: D. open source operating system
42. Instead of low income ————— can be a factor for digital divide.
A. language
B. population
C. terrain
D. gender
Answer: C. terrain
43. Microsoft is an example for:
A. open software
B. system software
C. open source software
D. proprietary software
Answer: D. proprietary software
44. An attempt which helps to overcome the digital divide is called:
A. free software movement
B. free digital movement
C. universal digital movement
Answer: A. free software movement
45. ————— bringing a macroscopic change both in science and in philosophy.
A. inter net
B. free software
C. ict
D. inflinet
Answer: C. ict
46. Philosophy of Informatics is a —————- subject.
A. inter disciplinary
B. trans disciplinary
C. applied
D. meta disciplinary
Answer: B. trans disciplinary
47. Development and use of ICS and ICT is called as:
A. information explosion
B. internet turn
C. e, knowledge explosion
D. information turn
Answer: D. information turn
48. A macroscopic change which was bring by ICs and ICT is called:
A. computer revolution
B. internet revolution
C. trans revolution
D. knowledge revolution
Answer: A. computer revolution
49. ————- is the most puzzling and most characteristic feature of the mind.
A. intelligence
B. imagination
C. consciousness
D. none of these
Answer: C. consciousness
50. ————— is the awareness of yourself and your sensing and thinking when you are
awake.
A. intelligence
B. imagination
C. consciousness
D. attitude
Answer: C. consciousness
51. Consciousness is:
A. subjective
B. objective
C. relative
D. universalistic
Answer: A. subjective
52. “Human beings are immaterial minds within material bodies”. This vies is called:
A. pluralism
B. dualism
C. monism
D. parallelism
Answer: B. dualism
53. Who is the first philosophical figure of Modern European philosophy advocated Mind-body
Dualism?
A. rene descartes
B. hume
C. spinoza
D. leibniz
Answer: A. rene descartes
54. A cording to Descartes —————- is the basic feature of mind.
A. figure
B. solidity
C. extension
D. thought
Answer: D. thought
55. According to Descartes ——————– makes mind very different from body.
A. ability to extend
B. ability to develop
C. ability to think
D. ability to execute
Answer: C. ability to think
56. Descartes argues ——————– is necessary for self.
A. thinking
B. compounding
C. extension
D. evaluating
Answer: A. thinking
57. According to Descartes thinking is the ———— of self.
A. quality
B. essence
C. sign
D. result
Answer: B. essence
58. Descartes theory of mind body relation is known as:
A. psychophysical parallelism
B. occasionalism
C. interactionism
D. pre-established
Answer: C. interactionism
59. ————– considered as the one of the pioneers of the view that only material body
exists.
A. hobbes
B. descartes
C. spinoza
D. malebranche
Answer: A. hobbes
60. “We should able to explain the operations of mind in terms of the working of the body”.
Who among the following proposed this view?
A. spinoza
B. descartes
C. hobbes
D. malebranche
Answer: C. hobbes
61. “We should able to explain the operations of mind in terms of the working of the body”. This
position is called:
A. idealism
B. materialism
C. dualism
D. skepticism
Answer: B. materialism
62. “The process such as thought and life really nothing more than physical and chemical
process”. This position is called:
A. reductionism
B. inclusivenism
C. radicalism
D. none of these
Answer: A. reductionism
63. ‘States of consciousness are identical with the states of brain’. This theory is called:
A. behaviorist theory
B. reductionist theory
C. dualistic theory
D. identity
Answer: D. identity
64. Who is the prime proponent of Identity theory?
A. malebranche
B. j. j. c. smart
C. hobbes
D. putnam
Answer: B. j. j. c. smart
65. ‘There are no nonphysical entities and nonphysical laws’. Who said this?
A. malebranche
B. j. j. c. smart
C. hobbes
D. putnam
Answer: B. j. j. c. smart
66. ‘Experience is a brain process’. This view is related to:
A. behaviorist theory
B. reductionist theory
C. dualistic theory
D. identity
Answer: D. identity
67. Which among the following is an AI language?
A. ict
B. lisp
C. iflinet
D. prolet
Answer: B. lisp
68. ‘Mental phenomena like thought cannot be identical with brain phenomena’. Who asserted
this view?
A. malebranche
B. j. j. c. smart
C. norman malcolm
D. putnam
Answer: C. norman malcolm
69. Who among the following is treated as the strong opponent of Identical theory?
A. malebranche
B. norman malcolm
C. hobbes
D. putnam
Answer: B. norman malcolm
70. According to J.J. C. Smart the identity between brain state and mental state is:
A. categorical
B. conditional
C. contingent
D. contradictory
Answer: C. contingent
71. ———– began as school of psychology.
A. dualism
B. behaviorism
C. reductionism
D. identity theory
Answer: B. behaviorism
72. School of psychology that restricted the study of humans what can be observed is called:
A. reductionism
B. identity theory
C. epiphenomenalism
D. behaviorism
Answer: D. behaviorism
73. ‘’We can explain mental activities in terms of people’s behaviours’. This position is called:
A. dualism
B. behaviorism
C. reductionism
D. identity theory
Answer: B. behaviorism
74. Who among the following is a behaviorist philosopher?
A. gilbert ryle
B. g. e. moore
C. norman malcolm
D. malebranche
Answer: A. gilbert ryle
75. For the behaviorists the mind is nothing more than:
A. behavior
B. bodily behavior
C. mental behavior
D. mental dispositions
Answer: B. bodily behavior
76. Who among the following is considered as a strong critic of Behaviorism?
A. spinoza
B. gilbert ryle
C. hegel
D. hilary putnam
Answer: D. hilary putnam
77. Behaviorism says that all feelings are external behavior that others can:
A. understand
B. observe
C. predict
D. infer
Answer: B. observe
78. ————– reduces mind to behavior.
A. behaviorism
B. reductionism
C. materialism
D. functionalism
Answer: A. behaviorism
79. Who among the following is the proponent of Functionalism?
A. d. m. armstrong
B. gilbert ryle
C. hegel
D. hilary putnam
Answer: A. d. m. armstrong
80. ‘We should explain mental activities and mental states in terms of perpetual inputs and
behavioral outputs’. This view is called:
A. behaviorism
B. reductionism
C. materialism
D. functionalism
Answer: D. functionalism
81. ——————— claims that all conscious mental states has the connections between sense
inputs and behavior outputs.
A. behaviorism
B. reductionism
C. materialism
D. functionalism
Answer: D. functionalism
82. —————– agree that a person’s intention can be explained in terms of the person’s
desires and beliefs.
A. materialists
B. dualists
C. functionalists
D. behaviourists
Answer: C. functionalists
83. According to functionalists all mental states ultimately are to be explained in terms of the
role play linking our —————– to our external behavior.
A. internal stimulation
B. sensory stimulation
C. stimulation
D. none of these
Answer: B. sensory stimulation
84. Functionalism says that if two people have exactly the same inputs and give exactly the
same outputs, those two people have ——————————- .
A. exactly same inner mental state
B. different mental state
C. relative mental state
Answer: A. exactly same inner mental state
85. Critics argues that Functionalism leaves out the ————————-.
A. output state
B. input state
C. inner conscious state
D. emotional stages
Answer: C. inner conscious state
86. ‘The human brain is a kind of computer that process inputs and generate outputs’. This view
is related to:
A. behaviorism
B. reductionism
C. materialism
D. functionalism
Answer: D. functionalism
87. “Humans are sophisticated computers”. This notion is proposed by
A. behaviorism
B. functionalism
C. materialism
D. identity theory
Answer: B. functionalism
88. ‘The computer is the equivalent of the human mind’. Who proposed this view?
A. norman malcolm
B. malebranche
C. alan turing
D. gilbert ryle.
Answer: C. alan turing
89. Turing test is related to:
A. dualism
B. functionalism
C. reductionism
D. identity theory
Answer: B. functionalism
90. Who said that computer has a mind?
A. norman malcolm
B. malebranche
C. alan turing
D. gilbert ryle.
Answer: C. alan turing
91. Computer theory of human nature is popularly known as:
A. dualism
B. functionalism
C. reductionism
D. identity theory
Answer: B. functionalism
92. ————— is a one of the most opponent of functionalism.
A. alan turing
B. malebranche
C. norman malcolm
D. john searle
Answer: D. john searle
93. ‘Computer is nothing more than a machine that follows the instructions in its program’.
Who asserted this?
A. alan turing
B. malebranche
C. norman malcolm
D. john searle
Answer: D. john searle
94. ‘The Myth of the Computer is written by:
A. john searle
B. malebranche
C. norman malcolm
D. alan turing
Answer: A. john searle
95. Who advocated Chinese Room Argument?
A. john searle
B. malebranche
C. norman malcolm
D. alan turing
Answer: A. john searle
96. Chinese Room Argument is form of criticism against:
A. dualism
B. functionalism
C. reductionism
D. identity theory
Answer: B. functionalism
97. ‘There is something that human minds have that a computer following a program does not
have’. Who said this?
A. alan turing
B. malebranche
C. john searle
D. norman malcolm
Answer: C. john searle
98. According to John Searle computer lacks something which is the essential to the human
mind, what is that?
A. intelligence
B. memory
C. storage
D. consciousness
Answer: D. consciousness
99. ——————– is essentials to human mind according to Searle.
A. intelligence
B. memory
C. storage
D. consciousness
Answer: D. consciousness
100. Searle argues that mental states or activities are not reducible to:
A. consciousness
B. physical things
C. intelligence
D. psychological things
Answer: B. physical things
101. Searle argues that mental states or activities are not reducible to physical things, but a
physical thing produce them- namely,
A. our body
B. our heart
C. our nervous
D. our brain
Answer: D. our brain
102. Searle explains that biological, physical and chemical process produces all our:
A. mental states
B. physical states only
C. character
D. none of these
Answer: B. physical states only
103. Who claimed humans are purely physical creature?
A. malebranche
B. descartes
C. john searle
D. putnam
Answer: C. john searle
104. ‘Only matter exists, so nonmaterial minds cannot exist’. This view is called:
A. materialism
B. eliminative materialism
C. physicalism
D. eliminative idealism
Answer: B. eliminative materialism
105. ‘Eliminative Materialism and the Philosophical Attitudes’ is written by:
A. john searle
B. paul churchland
C. alan turig
D. gilbert ryle
Answer: B. paul churchland
106. The content of our mind such as desires, beliefs, fears, intentions are do not really exist.
This view is called:
A. materialism
B. eliminative materialism
C. physicalism
D. eliminative idealism
Answer: B. eliminative materialism
107. Paul Churchland refers our ordinary view about human mind as:
A. folk psychology
B. folk physiology
C. mentalism
D. physicalism
Answer: A. folk psychology
108. ‘Churchland argues ————– is really antiquated theory of the mind.
A. eliminative materialism
B. folk psychology
C. functionalism
D. behaviorism
Answer: B. folk psychology
109. Recycling e-waste is an approach related to:
A. ethical computing
B. effective computing
C. natural computing
D. green computing
Answer: D. green computing
110. ———— theory is radically inadequate account our internal activities according to Paul
Churchland.
A. eliminative materialism
B. folk psychology
C. functionalism
D. behaviorism
Answer: B. folk psychology
111. For Eliminative materialist, desires, beliefs, and intentions, are like ———–.
A. demons
B. spirits
C. interactions
D. angels
Answer: A. demons
112. According to Chalmers —————– are physically like human being, and act like human
being but have no consciousness.
A. robots
B. zigmas
C. zoyasis
D. zombies
Answer: D. zombies
113. Who coined the term Artificial Intelligence?
A. john mccarthy
B. lynn bake
C. john searle
D. gilbert ryle
Answer: A. john mccarthy
114. Zombies would not have:
A. intelligence
B. storage
C. consciousness
D. memory
Answer: C. consciousness
115. Thought experiment is related to:
A. david j. chalmers
B. lynn bake
C. john searle
D. gilbert ryle
Answer: A. david j. chalmers
116. ‘Mental properties such as consciousness are not physical properties’. This position is
called:
A. dualism
B. property dualism
C. property idealism
D. monism
Answer: B. property dualism
117. Property dualism recommended by:
A. david j. chalmers
B. lynn bake
C. john searle
D. gilbert ryle
Answer: A. david j. chalmers
118. Chalmers have the view that mental states are special kind of properties that are different
from physical properties. This view is known as:
A. property pluralism
B. dualism
C. property idealism
D. property dualism
Answer: D. property dualism
119. Searle uses the ——————— to show the mind is not a computer program.
A. folk psychology
B. chinese room argument
C. zombie argument
D. turing
Answer: B. chinese room argument
120. Chalmers uses a ————————- to support property dualism.
A. folk psychology
B. chinese room argument
C. zombie argument
D. turing
Answer: C. zombie argument
121. According to McCarthy ———– is the science and engineering of making intelligent
machines.
A. computer engineering
B. software engineering
C. robotics
D. artificial intelligence
Answer: D. artificial intelligence
122. ————- memory is our ability to remember how to do something that we learned in the
past.
A. personal memory
B. habit memory
C. factual memory
D. individual memory
Answer: B. habit memory
123. ————— is our ability to bring into our present consciousness a representation of events
that we personally experienced in the past.
A. personal memory
B. habit memory
C. factual memory
D. individual memory
Answer: A. personal memory
124. ————— is our memory of all the facts that make up our knowledge of the world.
A. personal memory
B. habit memory
C. factual memory
D. individual memory
Answer: C. factual memory
125. Conscious experience involves properties of an individual that are not entailed by the
physical properties of that individual. This view is called:
A. property pluralism
B. dualism
C. property idealism
D. property dualism
Answer: D. property dualism
126. According to Samkhya ————— is the modification of mind.
A. mahat
B. ahankara
C. vritti
D. anthakarana
Answer: C. vritti
127. According to Samkhya mind is an ———-.
A. evolute
B. modification
C. effect
D. cause
Answer: A. evolute
128. According to Samkhya mind is:
A. sentient
B. insentient
C. reflective
D. none of these
Answer: B. insentient
129. Samkhya says intellect is —————— to mind.
A. independent
B. dependent
C. related
D. cause
Answer: A. independent
130. In Samkhya system Intellect, Ego and Mind are generally called:
A. external organ
B. attributes
C. internal organ
D. knowledge organ
Answer: C. internal organ
131. —————– one of the faculty of the internal organ according to Samkhya.
A. jnanendriya
B. tanmatras
C. mahabhutas
D. manas
Answer: D. manas
132. The practice of applying statistical, mathematical, and computational techniques on
genomic and molecular biological data so as to address biological problems is called:
A. bioresearch
B. dna computing
C. bioinformatics
D. green computing
Answer: C. bioinformatics
133. ————– is the first evolute of prakrti according to Samkhya.
A. manas
B. mahat
C. ahamkara
D. karmedriya
Answer: B. mahat
134. Samkhya emphasized ————– aspect of Intellect.
A. material
B. physiological
C. sociological
D. psychical
Answer: D. psychical
135. Samkhya says that knowledge possible by the instrumentation of the psychic medium
which is:
A. vrtti
B. mahat
C. ahamkara
D. karmedriya
Answer: A. vrtti
136. Samkhya emphasized —————–nature of Vrtti.
A. spritual
B. material
C. physical
D. psychic
Answer: D. psychic
137. According to Samkhya Intellect is the first evolute of Prakrti which is dominated by
——————- guna.
A. rajas
B. sattva
C. tamas
D. all of these
Answer: B. sattva
138. Mahat means:
A. the big
B. the light
C. the great
D. the first
Answer: C. the great
139. According to —————– mental states are nonphysical properties of the brain.
A. eliminative materialism
B. property dualism
C. functionalism
D. behaviorism
Answer: B. property dualism
140. Physical properties of the brain cause non-physical properties of the brain but not vice
versa. This position is known as:
A. eliminative materialism
B. epiphenomenalism
C. functionalism
D. behaviorism
Answer: B. epiphenomenalism
141. The distinctive feature of Epiphenomenalism is that the nonphysical properties of the brain
do not in turn, bring about —————— of the brain.
A. physical states
B. mental states
C. psychic states
D. nonphysical states
Answer: A. physical states
142. ——————————- is one that is freely available for developers to use or modify as
they wish.
A. an operating system
B. a multiuser operating program
C. a network operating system
D. an open- source program
Answer: D. an open- source program
143. ——————— is a stable, easy –to-use and widely distributed Linux operating system.
A. feroda
B. ubuntu
C. suse
D. unix
Answer: B. ubuntu
144. The most common tool that is used for searching information over the internet is:
A. network portal
B. open software
C. e mail
D. search engine
Answer: D. search engine
145. Data collecting program of a search engine is called
A. spider
B. tegs
C. index program
D. search engine software
Answer: A. spider
146. ——————– are the words you can use to refine your searches, making them more
effective.
A. wikis
B. manuals
C. spider
D. boolean operators
Answer: D. boolean operators
147. ——————– is actually the network of networks.
A. search engine
B. internet
C. website
D. podcast
Answer: B. internet
148. Blogs are:
A. podcasts posted on web
B. free software
C. search engine
D. personal logs posted on
Answer: D. personal logs posted on
149. Blogs are:
A. confidential
B. private
C. public
D. unalterable
Answer: C. public
150. ——————– are online personal networks where individuals are personal networks
where individuals are invited or allowed to join.
A. social networks
B. blogs
C. chat groups
D. podcasts
Answer: A. social networks
151. The policy of —————– has allowed a range of exceptions to the copyright provision.
A. limited use
B. ipr
C. specific use
D. fair use
Answer: D. fair use
152. —————— is based on the belief that the public is entitled to freely use portions of
copyrighted materials for certain purpose.
A. limited use
B. ipr
C. specific use
D. fair use
Answer: D. fair use
153. WebCT is :
A. an virtual classroom package
B. a chat group
C. an e-learning tool
D. social network
Answer: C. an e-learning tool
154. ————- is the training, which delivers educational content through a web browser over
the public or private interest.
A. ics
B. wbt
C. virtual classroom
D. cbt
Answer: B. wbt
155. ——————– is the where a computer program provides motivation and feedback in
place of a live instructor.
A. ics
B. wbt
C. virtual classroom
D. cbt
Answer: D. cbt
156. ————— is the technology which captivate the student’s interest.
A. wbt
B. virtual classroom
C. cbt
D. ict
Answer: B. virtual classroom
157. ——————– is meant for e-governance applications.
A. brnet
B. inflibnet
C. vast
D. nicnet
Answer: D. nicnet
158. Spam means:
A. unwanted e-mail
B. virus
C. software
D. search engine
Answer: A. unwanted e-mail
159. ———————– are small text files that some web sites automatically store on your
computer hard drive when you visit the site.
A. spam
B. cookies
C. adware
D. malware
Answer: B. cookies
160. Phishing is related to:
A. copy right
B. virus
C. e-learning
D. identity theft
Answer: D. identity theft
161. ——————- contain information that is untrue.
A. cookies
B. virus
C. internet hoaxes
D. spam
Answer: C. internet hoaxes
162. A —————- defined as anyone who breaks into a computer system unlawfully.
A. hacker
B. virus
C. spam
D. internet hoaxes
Answer: A. hacker
163. A ———————- is a program that appears to be something useful or desirable, but at
the same time does something malicious in the background without our knowledge.
A. hacker
B. virus
C. trojan horse
D. cookies
Answer: C. trojan horse
164. ——————– is a computer program that attaches itself to another computer program
and attempts to spread it to other computers when files are exchanged.
A. hacker
B. virus
C. trojan horse
D. cookies
Answer: B. virus
165. What is logic bomb?
A. hacker
B. virus
C. trojan horse
D. cookies
Answer: B. virus
166. —————- are viruses that are triggered by the passage of time or on certain date.
A. trojan horses
B. worms
C. logic bombs
D. time bombs
Answer: D. time bombs
167. ——————— slightly different from virus.
A. trojan horses
B. worms
C. logic bombs
D. cookies
Answer: B. worms
168. A computer user copies an application onto more than one computer, if the license
agreement does not permit this, is participating:
A. phishing
B. hacking
C. identity theft
D. software piracy
Answer: D. software piracy
169. —————– is an agreement between the user and the software developer.
A. copy right
B. software license
C. ipr
D. none of these
Answer: B. software license
170. The Computer Ethics Institute of United States developed:
A. guide lines for fair use
B. free software program
C. anti-virus program
D. ten
Answer: D. ten
171. ————————- is treated as the bench mark for ethical computing.
A. copyright law
B. ipr law
C. ten commandments of computer ethics
D. six commandments of computer ethics
Answer: C. ten commandments of computer ethics
172. ———— is the right to be left alone to do as one pleases.
A. ipr
B. privacy
C. copy right
D. freedom
Answer: B. privacy
173. Which state among the following is claimed Privacy is a basic human right?
A. united states of america
B. britain
C. india
D. netherland
Answer: A. united states of america
174. In India Cyber laws have been defined under the:
A. cyber law act, 2000
B. ethical computing law, 2005
C. it act, 2000
D. cyber act 2003
Answer: C. it act, 2000
175. —————– comprise of a set of legal provisions to regulate the activities of cyber space
or internet.
A. cyber ethics
B. cyber laws
C. it act 2000
D. internet laws
Answer: B. cyber laws
176. The state in which the too much use of the computer and internet, affecting the routine life
of an individual is called:
A. internet addiction
B. cyber divide
C. software addiction
D. cyber addiction
Answer: D. cyber addiction
177. An individual who becomes too much dependent on computer and internet is called:
A. computer addict
B. internet addict
C. cyber addict
D. technocrat
Answer: C. cyber addict
178. Net gamming related to:
A. cyber addiction
B. cyber law
C. copy right
D. cyber ethics
Answer: A. cyber addiction
179. ———— refers the addiction toward unlimited information available on the internet.
A. cyber addiction
B. internet addiction
C. information overloaded
D. knowledge
Answer: C. information overloaded
180. —————— is a study involving efficient usage of computer resources.
A. eco computing
B. green computing
C. sustainable computing
D. natural computing
Answer: B. green computing
181. Efficient algorithm is related to:
A. software development
B. free software movement
C. digital divide
D. green computing
Answer: D. green computing
182. Which among the following is considered as a key approach of Green computing.
A. virtualization of computer system
B. net computing
C. resource computing
Answer: A. virtualization of computer system
183. ————– is a specific feature of a computer
A. Mechanical
B. Accuracy
C. Compactness
D. None of these
Answer: B. Accuracy
184. Which one is called a storage device?
A. Monitor
B. CPU
C. Mother Board
D. CD-ROM
Answer: D. CD-ROM
185. An ——————-enables you to enter data and instructions into the computer
A. Input device
B. Output device
C. Printer
D. CD-ROM
Answer: A. Input device
186. Which of the following is the leading keyboard?
A. Cursor control keyboard
B. QWERTY key board
C. Dvorak Keyboard
D. Gaming key board
Answer: C. Dvorak Keyboard
187. There are two primary categories of printers, which are they?
A. Impact and Nonimpact
B. laser and Inkjet
C. Colour and black
D. None of these
Answer: A. Impact and Nonimpact
188. LCD monitors using —————————technology
A. Cathode-ray tube
B. digital
C. crystal
D. liquid crystal display
Answer: D. liquid crystal display
189. Which of the following is the most common example of a locally administered network?
A. Server network
B. peer – to- peer network
C. central network
D. none of these
Answer: B. peer – to- peer network
190. The term network architecture means.
A. the design of a network
B. peer – to- peer network
C. locally administered network
D. net work group
Answer: A. the design of a network
191. The first Web domain was hosted on the Web on
A. September 1990,
B. November 1990,
C. December 1990,
D. December 1991,
Answer: C. December 1990,
192. —————————————, are generally acknowledge as the “fathers” of the
Internet.
A. Babbage and Cerf
B. Vinton Cerf and Robert Kahn
C. Robert Kahn and Michel
D. Vinton Cerf and Michel
Answer: B. Vinton Cerf and Robert Kahn
193. LAN means
A. Long area networks
B. Listed area networks
C. Local area networks
D. Land area networks
Answer: C. Local area networks
194. WAN means
A. Wild area networks
B. Western area networks
C. Wide area networks
D. None of these
Answer: C. Wide area networks
195. ———————technology provides a cost-effective means for electronic communication
A. ATM
B. Mobile
C. Wireless
D. None of these
Answer: C. Wireless
196. The largest and fastest pathway is the main artery of the Internet is called
A. Internet backbone,
B. Internet artery
C. Internet Nerve
D. None of these
Answer: A. Internet backbone,
197. LSN means
A. Local space networking,
B. Large size networking
C. Long scale networking
D. Large Scale Networking
Answer: D. Large Scale Networking
198. ————————–networks are true multi-service networks with the potential to offer
broadband services
A. ATM
B. LSN
C. WAN
D. None of these
Answer: A. ATM
199. —————————are a result of the combination of features of various portable devices
A. Portable media players
B. Smart phones
C. Personal digital assistants
D. Cellular phones
Answer: B. Smart phones
200. Which is considered as an expensive and powerful tool for carrying electronic information?
A. Notebook computers
B. Smart phones
C. Cellular phones
D. Portable media players
Answer: A. Notebook computers
201. Which of the following is a software programs that help us to run the computer and
coordinates instructions between application software and the computer’s hardware devices?
A. Operative software.
B. System software
C. Application software
D. None of these
Answer: B. System software
202. ——————————is a group of programs that controls how your computer system
functions.
A. System software
B. Application software
C. Operating software
D. The operating system
Answer: D. The operating system
203. The software we use to do everyday tasks at home and at work is called
A. System software
B. Application software
C. The operating system
D. None of these
Answer: B. Application software
204. Which are called two basic types of software?
A. application software and system software
B. application software and program software
C. program software and system software
D. None of these
Answer: B. application software and program software
205. Which of the following is an example for system software.
A. Excel
B. Microsoft Word
C. Windows
D. Power point
Answer: C. Windows
206. Which of the following is an example for application software.
A. Microsoft Word
B. Windows
C. Linux
D. None of the above
Answer: A. Microsoft Word
207. A computer cannot operate without ———————————-
A. operating system
B. application software
C. MS. Windows
D. None of these
Answer: A. operating system
208. Which of the following is an open-source operating system?
A. Windows
B. Linux
C. Mac OS
D. None of these
Answer: B. Linux
209. Which one of the following is an example for Spreadsheet software?
A. Microsoft Word
B. Mac OS
C. Microsoft Excel
D. Ms Paint
Answer: C. Microsoft Excel
210. ——————————-enables the computer to translates your spoken words into typed
text.
A. Speech-recognition software
B. Speech software
C. Voice software
D. None of these
Answer: A. Speech-recognition software
211. Microsoft has incorporated speech recognition software into its latest operating system
called
A. Windows XP
B. Microsoft Excel
C. Windows Vista
D. None of these
Answer: C. Windows Vista
212. Who developed Linux?
A. Linus Torvalds
B. Linus Edwin
C. Linus Tom
D. Linus Trogen
Answer: A. Linus Torvalds
213. ——————————- is basically a complex electronic filing system
A. Database software
B. Tax-preparation software
C. Personal information software
D. None of these
Answer: A. Database software
214. Which of the following is a personal information manager software
A. Microsoft Access
B. Oracle
C. Corel Paradox
D. Microsoft Outlook
Answer: D. Microsoft Outlook
215. In a computer the letter K is represented as
A. 00110011
B. 01010101
C. 01001011
D. 00001111
Answer: C. 01001011
216. In computer terms, data means
A. Information
B. idea
C. representation of name
D. representation of an idea
Answer: D. representation of an idea
217. The data which has been organized or presented in a meaningful fashion is called
A. idea
B. information
C. concept
D. none of these
Answer: B. information
218. A computers work exclusively with
A. data
B. idea
C. numbers
D. information
Answer: C. numbers
219. The language which consists of just two digits is called
A. system language
B. binary language
C. number language
D. mathematical language
Answer: B. binary language
220. A binary digit contains
A. One zero and two ones
B. two zero and one one
C. two zero and two ones
D. one zero and one one
Answer: D. one zero and one one
221. One byte is equal to
A. 6 bits
B. 8 bits
C. 4 bits
D. 5 bits
Answer: B. 8 bits
222. In binary language, the letter K is represented as
A. 01010101
B. 00110011
C. 00001111
D. 01001011.
Answer: D. 01001011.
223. Kilobytes, megabytes, and gigabytes are
A. name of bytes
B. amounts of bytes
C. group of bytes
D. none of these
Answer: B. amounts of bytes
224. A kilobyte (KB) is approximately
A. 1,000 bytes
B. 100 bytes
C. 10000
D. 10
Answer: A. 1,000 bytes
225. A megabyte (MB) is
A. major byte
B. minor byte
C. a million bytes
D. none of these
Answer: C. a million bytes
226. A gigabyte (GB) is equal to
A. billion bytes
B. great byte
C. one quadrillion bytes
D. none of these
Answer: A. billion bytes
227. A peta byte of data-that’s more than——————————bytes
A. one billion
B. one million
C. ten thousand
D. one quadrillion
Answer: D. one quadrillion
228. ———————————feature helps the user to return to a specific Web page without
always having to remember to type the address.
A. Tick mark
B. Dial Up
C. Bookmark
D. Search Engine
Answer: C. Bookmark
229. A Search engine has ————parts
A. Three
B. four
C. five
D. two
Answer: A. Three
230. Which of the following is not a part of search engine?
A. indexer program
B. spider
C. engine software
D. bookmark
Answer: D. bookmark
231. Which of the following is a search engine?
A. Google
B. AlltheWeb
C. Yahoo
D. all of these
Answer: D. all of these
232. ———————————–is a guide to the internet organized by topics and subtopics.
A. a search engine
B. a blog
C. a subject directory
D. podcast
Answer: C. a subject directory
233. Among the following which one is not a subject dictionary?
A. Google
B. Yahoo!
C. Triton
D. none of these
Answer: C. Triton
234. What is the name of the program that enables us to communicate in real time with others
who also are online?
A. Instant messaging
B. E. mail
C. Electronic messaging
D. none of these
Answer: A. Instant messaging
235. A clip of audio or video content that is broadcast over the internet using compressed files is
called
A. instant messaging
B. e. mail
C. spider
D. podcast
Answer: D. podcast
236. Weblogs or blogs are
A. a written message that is sent and received over electronic communication systems
B. audio or video content over the Internet
C. personal logs or journal entries that are posted on the web.
D. All of these
Answer: C. personal logs or journal entries that are posted on the web.
237. Which of the following is a blog site that devotes itself to discussing techno gadgets?
A. www.rottentomatoes.com
B. www.gizmodo.com
C. www.tech. com
D. www.itec.com
Answer: B. www.gizmodo.com
238. A written message that is sent and received over electronic communication systems is
called
A. E .mail
B. Weblogs
C. podcast
D. none of these
Answer: A. E .mail
239. ————————-is the broadcast of audio or video content over the Internet.
a.
A. podcast
B. a webcast
C. weblogs
D. e .mail
Answer: B. a webcast
240. Name of the educational initiative backed by government of India for information
technology is called
A. Sakshat
B. Rakshat
C. Prathyashat
D. none of these
Answer: A. Sakshat
241. E.-books and e-journals are
A. a written message
B. audio or video content
C. the content of open access publishing
D. a subject directory
Answer: C. the content of open access publishing
242. Claiming another person’s words as your own- this action is known as
A. copyright
B. plagiarism
C. patent
D. none of these
Answer: B. plagiarism
243. WebCT and Enspire are the tools for
A. E .mail
B. Electronic messaging
C. E-learning
D. Instant messaging
Answer: C. E-learning
244. Through ———————-students can get online education from remote places.
A. virtual classrooms
B. subject directory
C. NICNET
D. INFLIBNET
Answer: A. virtual classrooms
245. ——————————-is a virtual network of libraries
A. NICNET
B. INFLIBNET
C. BRNET
D. None of these
Answer: B. INFLIBNET
246. Name the networking infrastructure built by NIC for the e-governance applications.
A. NICNET
B. INFLIBNET
C. BRNET
D. None of these
Answer: A. NICNET
247. BRNET is related with
A. library information resources
B. geological information resources
C. biological information resources
D. all of these
Answer: C. biological information resources
248. WBT is an example for
A. a library information resources
B. a geological information resources
C. a biological information resources
D. a computer-based training
Answer: D. a computer-based training
249. Which of the following is true?
A. podcast content includes radio shows
B. podcast content includes audio books
C. podcast content includes magazines
D. all of these
Answer: D. all of these
250. Which of the following statement is not true to e-mail
A. it is not the most secure form of transmission
B. it is not a safe way to send personal or sensitive information
C. it is not a popular means of communication
D. None of these
Answer: C. it is not a popular means of communication
251. Broadband connections includes
A. cable
B. satellite
C. DSL
D. all of these
Answer: D. all of these
252. ICQ is related with
A. Weblogs
B. Instant messaging
C. Search engines
D. Podcasts
Answer: B. Instant messaging
253. CCTV is
A. Closed circuit television
B. Crime detection Software
C. Communication software
D. All the above
Answer: A. Closed circuit television
254. Britannica is a
A. Free online educational software
B. Class room aid
C. Edutainment
D. None of these
Answer: A. Free online educational software
255. INFLIBNET is
A. Sharing of library and information resources
B. Free online education software
C. Software for sharing information
D. Online bio-resource in centre
Answer: A. Sharing of library and information resources
256. Google earth is ——–
A. Entertainment software
B. Educational software
C. Anti- virus software
D. Hardware
Answer: B. Educational software
257. Which among shows IT for national integration
A. Permanent Account Number (PAN)
B. Electors Photo Identity Card (EPIC)
C. Sakshat and INFLIBNET
D. All of these.
Answer: D. All of these.
258. ——- is a non-profit corporation formed to educate about and advocate for the benefits of
open source and to build bridges among different constituencies in the open source community.
A. Free Software programme
B. Free Software development
C. Free Software Foundation
D. The open Source Initiative.
Answer: D. The open Source Initiative.
259. ——- can be referred as the use or application of computational devices in the field of
biological sciences and research.
A. Bio-computing
B. Virtual Computing
C. Artificial Intelligent
D. DNA
Answer: A. Bio-computing
260. This unlawful acts wherein the computer is either a tool or target or both
A. Cyber ethics
B. Cyber crime
C. Cyber abuse
D. Cyber literacy
Answer: B. Cyber crime
261. Which of the following is annoying, but really doesn’t render any harm to our computer?
A. Shareware
B. Malware
C. Spyware
D. Adware
Answer: D. Adware
262. Why do you not want too much personal data about you on the Internet?
A. It might reveal embarrassing facts about you
B. It might be used by an identity thief to impersonate you
C. It might be used by a potential employer to find out more about you
D. There is no reason to worry about personal information on the Internet
Answer: B. It might be used by an identity thief to impersonate you
263. What is the top rule for avoiding Internet fraud?
A. If it seems too good to be true, it probably is
B. Never use your bank account numbers
C. Only work with people who have verifiable e-mail address
D. Do not invest in foreign deals
Answer: C. Only work with people who have verifiable e-mail address
264. One scam that lures internet users into revealing personal information is
A. Malware
B. Spam
C. Phishing
D. Internet hoax
Answer: C. Phishing
265. When hackers use a program that pretends to be useful to a user while actually allowing the
hacker to gain control of the user’s computer, this is called a(n)
A. Zero-day Attack
B. Trojan Horse Attack
C. Distributed Denial of Service Attack
D. Boot Sector Virus Attack
Answer: B. Trojan Horse Attack
266. Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
A. Worms
B. Stealth Viruses
C. Logic bombs
D. Macro viruses
Answer: A. Worms
267. How could hacker use information about you found through Internet searches?
A. To guess passwords if your passwords are linked to personal
B. To guess passwords if your passwords are linked to your interests or hobbies
C. In social engineering, to ascertain more information about you or your computer system
D. All of the above
Answer: D. All of the above
268. What is the first step in protecting yourself from identity theft?
A. Never provide any personal data about yourself unless absolutely necessary
B. Routinely check your records for signs of identity theft.
C. Never use your real name on the Internet
D. Routinely check for spyware on your computer.
Answer: A. Never provide any personal data about yourself unless absolutely necessary
269. A backup is a …………………. against data loss a.Threat b. Security c. Countermeasure d. Abuse
111. What is malware?
A. Software that has some malicious purpose
B. Software that is not functioning properly
C. Software that damages your system
D. Software that is not properly configured for your system
Answer: B. Software that is not functioning properly
270. Which of the following is a step that all computer users should take to protect against virus
attacks?
A. Purchase and configure a firewall
B. Shut down all incoming ports
C. Use non-standard e-mail clients
D. Install and use antivirus software
Answer: D. Install and use antivirus software
271. ——– uses the principles and tools of computer science to model or algorithmically
specify complexes biological information system and computational systems with life-like capabilities.
A. Virtual Computing
B. Artificial Intelligent
C. Bio-computing
D. Cookies
Answer: C. Bio-computing
272. —— uses software to allow people to interact with three-dimensional simulated
environment.
A. Virtual Computing
B. Artificial Intelligent
C. Bio-computing
D. Cookies
Answer: A. Virtual Computing
273. The science and engineering of making intelligent machines, especially intelligent computer programs.
A. Artificial Intelligence
B. Stress Management
C. Anti-Virus
D. Intellectual Property Right
Answer: A. Artificial Intelligence
274. Computers are programmed to make decisions in real-life situations are known as
A. Virtual reality
B. Robotics
C. Neural Networks
D. Expert System
Answer: D. Expert System
275. Computing systems, which imitate human brain through a network of highly interconnected
processing elements.
A. Virtual reality
B. Robotics
C. Neural Networks
D. Expert System
Answer: C. Neural Networks
276. Which among the following is not applicable to internet use
A. Do not use email to strangers
B. Do not give out your email address to people you doesn’t know
C. Do not open email attachments from people you don’t know
D. Pretend to be someone else when you are online.
Answer: D. Pretend to be someone else when you are online.
277. Which among the following is applicable to internet use
A. Do not sent Spam, Worms and Viruses into cyberspace
B. Do not be rude or use bad language while you use email
C. Do not disclose your personal information such as your bank a/c number, passwords etc
D. All of these
Answer: D. All of these
278. Which among the following is unethical use of cell phone
A. Do not accept call while driving
B. Switch off cell phone inside an aircraft
C. Do capture the images of others without permission of that person
D. Keep silent tone in meetings
Answer: C. Do capture the images of others without permission of that person
279. A repetitive strain injury (RSI) in computer users caused by
A. Improperly positioned key-boards
B. a/c room
C. Proper lighting
D. Adjustable chair
Answer: A. Improperly positioned key-boards
280. Which of the following is not true of ethical computing guidelines
A. Not to use computer to promote lies
B. Use computers with consideration and respect for others
C. Avoid causing harm to othrs when using computer
D. Snoop in other people’s computer files.
Answer: D. Snoop in other people’s computer files.
281. The following metric is a measure of the journal quality
A. Impact factor
B. Prize
C. Article size
D. None of the above
Answer: A. Impact factor
282. The main advantage(s) of online education is (are)
A. Personalized education
B. Better flexibility
C. Better accessibility
D. All of the above
Answer: D. All of the above
283. Pick the odd one out
A. Spam
B. Spyware
C. Antivirus
D. Hoax
Answer: C. Antivirus
284. A …………. is a small text file which is placed on your computer on the request made by the
web server to your browser.
A. Spam
B. Cookie
C. Web bugs
D. Worms
Answer: B. Cookie
285. The commission of illegal acts through the use of computer or against a computer system.
A. Computer Crime
B. Computer Abuse
C. White hacking
D. Cyber Addition
Answer: A. Computer Crime
286. —– is an example of software being created independent of any money- making incentive or
any property rights
A. Spyware
B. Adware
C. Freeware
D. Malware
Answer: C. Freeware
287. A computer user, who copies an application onto more than one computer, if the license
agreement does not permit this, is participating in:
A. Software piracy
B. Personal privacy
C. Computer theft
D. Identity theft
Answer: A. Software piracy
288. Experts who are performing a needed service for society by helping companies realize the
vulerabilities that exist in their systems by break into system just for the challenge.
A. Black-hat hackers
B. White-hat hackers
C. Both Black-hat hackers and White-hat hackers
D. Neither Black-hat hackers nor White-hat hackers
Answer: B. White-hat hackers
289. If the antivirus software detects a virus signature or suspicious activity, it stops the execution
of the file and virus and notifies you that it has dtected virus is known as:
A. Quarantining
B. Searching
C. Phishing
D. All of these
Answer: A. Quarantining
290. The discrepancy between the “haves” and “have-notes” with regards to computer technology
is commonly referred as:
A. Social Justice
B. Intellectual Property Right
C. Digital Divide
D. Accountability
Answer: C. Digital Divide
291. An online archive of multidiscipline journal articles in the most significant professional journals.
A. ICPR
B. Jstor
C. Orkut
D. Facebook
Answer: B. Jstor
292. Which among the following is true
A. Internet is a democratic technology
B. Internet protects personal privacy
C. Internet facilitate the spread of right information
D. None of the above
Answer: D. None of the above
293. Which among the following skills need for locating appropriate information on the Internet
A. the ability to use Internet tools such as search engines
B. having knowledge of search techniques and ability to execute the search.
C. One needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search.
D. All of these
Answer: D. All of these