Type Here to Get Search Results !

Society & Technology Soft Studies Qustions with Answers 2021

Soft Study MODEL QUESTIONS 

6th Semester, 2021


Subject: Society & Technology


 Answer Key are given in Bold letter



 

1.     Method used to transfer information to far off places instantly is called

i)    Information technology

ii)    Language

iii)     Data

iv)    Telecommunication

 

2.    Software are referred to as

i)    Hardware

ii)   Computer programs

iii)     Binary data

iv)     procedure

 

3.    This invention replaced vacuum tubes and made computers much smaller and faster.

However, it was eventually replaced by another invention

(i)    RAM

(ii)     ENIAC

(iii)      Transformer

(iv)       Transistor.

 

4.    On the basis of time, research can be classified as,

(i)    Qualitative versus Quantitative

(ii)     Pure versus applied research

(iii)    Cross-sectional versus longitudinal research

(iv)     None of the above

 

5.    Research is basically-

(i)    A methodology of enquiry

(ii)     Search of truth

(iii)      A systematic exploration of facts

(iv)    All of the above

 

6.    Social research can be divided into-

(i)    Two categories

(ii)     Three categories

(iii)    Four categories

(iv)     Five categories

 

7.    Quantitative data refers to

(i)    Graphs and tables

(ii)     Any data you present in your report

(iii)      Statistical analysis

(iv)    Numerical data that could be useful to answer your research question(s) and to meet your Objectives

 

8.   Research design of a study should not include

(i)    Objectives

(ii)     Hypothesis

(iii)    Findings


(iv)     Blue print of Research

 

9.    Field study is related to

(i)     Real life situations

(ii)    Experimental situations

(iii)    Laboratory situations

(iv)    None of the above

 

10.     Data collection can be done through

(i)    Interview

(ii)     Questionnaires

(iii)      Through E-Mail or by Telephone

(iv)    All of the above

 

11.      The aims of research is/are

(i)    verification

(ii)     fact finding

(iii)      theoretical development

(iv)    All of the above

 

12.     Which of the following is the first step in starting the research process?

(i)    Searching sources of information to locate problem.

(ii)   Survey of related literature

(iii)      Identification of problem

(iv)     Searching for solutions to the problem

 

13.     One of the following is not a survey method

(i)    Personal interview

(ii)     Telephone interview

(iii)      Mail interview

(iv)    Structured observation

 

14.     How many models are for technological innovation-

(i)    Two

(ii)   Three

(iii)      Four

(iv)     None of the above

 

15.     Bibliography given in a research report

(i)    Helps those interested in further research and studying the problem

(ii)     Makes the report authentic

(iii)    Both (i) & (ii)

(iv)     None of the above

 

16.     ICT has been an essential necessity for

i)    Communication at long distances

ii)    Employing IT and its services to the rural areas

iii)     Providing medical help to nurses and staffs for treatments

iv)    All of these

17.    Teleconferencing can be helpful in


i)    Business Domain

ii)    Health Sector

iii)    Both A &  B

iv)     None of these

18.              ICT is a combination of

i)      IT and Telecommunication

ii)    IT and Business

iii)    Information and Knowledge

iv)     None of These

19.     Expert systems provides the functionalities of?

i)    The system provides medicine to the patients

ii)    The expert system consults the doctor immediately.

iii)    Medical staffs inputs patients symptoms

iv)     None of these

20.    Managing a patients record can be helpful as

i)      The patients data can be easily shared between the doctors

ii)    The patients need to pay a heavy charge for maintain the records

iii)    It may be difficult to search and retrieve the patient’s records.

iv)     None of these

21.     The drawbacks of ICT in medicine are

i)    Part time staff may not be trained and cannot access vital information

ii)    Some staff may be resistant of using ICT

iii)     All staff will need training in the use of the software

iv)    All of these

22.    The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as

i)    Telecommunication

ii)   Telemedicine

iii)     Expert systems

iv)     None of these

23.    ICT is used extensively in

i)    Wider access to learning and participation


ii)    Antisocial activities involving harassment of individuals

iii)     Flexibility to study where, when and how best suits individual needs and preferences

iv)    Both A & C

24.    ICT is helpful in

i)    Doing more amount of work and accomplishing the task quickly.

ii)    Analyzing information

iii)     Learning computer skills

iv)    All of these

25.    The drawbacks of ICT involves

i)      Foreign technology and culture are going heavy on our culture

ii)    Increased commitments to learning works

iii)     Learn more independently and at their own pace

iv)     Increase in self-directed learning and independence

26.    Computerized pharmacy are helpful for a common individual as

i)      They use robots and barcodes

ii)    They use ultrasound surgery

iii)     They can be used to diagnose a patient in a better way

iv)     None of these

27.     Effects of Telemedicine results in

i)    Medical assistants at the remote sites

ii)    Small hospitals can have hardware costs reduced

iii)     Research study and scope for medical and cost effectiveness

iv)    All of these

28.    Using Teleconferencing to deliver psychotherapy is termed as

i)    Telepathology

ii)   Telepsychiatry

iii)     Telepsychology

iv)     Psychology

29.    Prosthetic Devices includes

i)      Computer technology for vision and hearing

ii)    Powerful IC


iii)     MRI Systems

iv)     None  of these

30.    Medicine technology have applications in the fields of

i)    Pharmacy

ii)    Prosthetics

iii)    Both A & B

iv)     None of these

31.      In  computer security, _                         means that computer system assets can be modified only by authorized parities.

i)    Confidentiality

ii)   Integrity

iii)     Availability

iv)     Authenticity

32.     Which of the following is independent malicious program that need not any host program?

i)    Trap doors

ii)    Trojan horse

iii)     Virus

iv)    Worm

33.    Verification of a login name and password is known as

 

i)    Configuration

ii)    Accessibility

iii)    Authentication

iv)     logging in

34.    The common name for the crime of stealing passwords is

 

i)    Jacking

ii)    Identify Theft

iii)    Spoofing

iv)     Hacking

35.    Which of the following is/are threats for electronic payment systems?

 

i)    Computer worms

ii)    Computer virus


iii)     Trojan horse

iv)    All of the above

36.    The term 'Intellectual Property Rights' covers

 

i)    Copyrights

ii)    Know-how

iii)     Trade dress

iv)    All of the above

37.   The following can not be exploited by assigning or  by licensing the rights  to others.

i)    Patent

ii)    Designs

iii)    Trademark

iv)     All of the above

38.    The altering of data so that it is not usable unless the changes are undone is

i)    Ergonomics

ii)    Compression

iii)     Biometrics

iv)    Encryption

39.                             is the measurement of things such as fingerprints and retinal scans used for security access.

i)      Biometrics

ii)    Bio measurement

iii)     Computer security

iv)     Smart weapon machinery

40.      Code red is a(n)                        

 

i)    Word Processing Software

ii)    Antivirus

iii)    Virus

iv)     Photo Editing Software


41. The term "Technology" has been derived from which of the following language?

a. Latin                               b. Greek                              c. Spanish                    d. English

 


42. Which of the following is known as father of modern computer?

a. Dennis Ritchie                 b. John Napier                      c. Charles Babbage


d. Alan Turing


 

43. First Supercomputer developed in India is-

a. Aryabhatt                       b. Cray-1                              c. PARAM                     d. IBM-370

 

44. Peoples' having fear of using technology are called as-

a. Technician                      b. Technophobes                      c. both a & b                 d. None of the

these

 

45. Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as-


a.  Computer vandalism


b.   Computer fraud                c. Plagiarism                    d. All of the these


 

46. Discrimination of computer studies based on caste/tribe is an issue of -

a.   Digital divide                      b. Computer equity               c. Euality                      d. None of the

these

 

47. Which of the following is an example of presentation software?

a. Ms-Access                         b. Spreadsheet                     c. Power-point                  d. Word

processing

 

48. Pirating software is an act of violating-

a. Equity                            b. Ethics                                 c. Law                           d. None of the these

 


49. Who coined the term "Computer ethics" as a branch of philosophy?

a. Aryabhatt                       b. Grace Hoppers                 c. John Von Neumann


d. Walter Maner


 

50. Which of the following are example of communication technology tools?

a. Cell Phones                     b. Computer                         c. satellite system          d. All of the these

 


51. What type of computer is found inside the watch?

a. Mini Computer                b. Embedded Computer


c.  Micro Computer


d.  None of the these


 

52. ICT in education includes-

a. Video Lectures                b.Use of Projector                c. Use of Internet           d. All of the these

 

53. SBI, korbook branch does not have Cash Deposit Machine, it is an issue of-


a. Digital divide                  b. Computer unequity           c. Social issue               d. None of the

these

 


54. Software program used to view web pages is-

a. Web Technology             b. Web Browser                   c. World wide

web


d. HTML


 


55. HTTP stands for-

a.  Hyper text transfer parameter


b.  High transmission tool protocol


c.  Hyper text transfer protocol


d.  Hyper test transmission permission


 

56. The simultaneous processing of two or more programs by multiple processors is called-

a. Multi-processing                  b.Multi-tasking                     c. Multi-sharing             d. All of the these

 

 

57. In which year the first operating system was developed-

a. 1956                               b. 1950                                c. 1945                         d. None of these

 

58. Computer Ethics Institute defines how many commandments for Computer ethics - a.12    b. 8     c. 10                             d. 15

 

59. Unwanted internet mails and ads. are also known as -

a. Fraud                             b.Spam                               c. Drafts                       d. All of the these

 

60. The use of information and communication technology to provide clinical health care from a distance is termed as-


a. Telemedicine                      b. Telecommunication           c. Video

Conferencing


d. None of these


 

61. Social issues of Using ICT in medicine are-


a.  Disclosing gender of unborn babies.


b.   False reporting of diagonsis.


c.  None of these            d. All of these


 

 

62. Which of the following is/are an example of medical devices that diagnose or scense the body?

a.  CT Scanner                       b. MRI Scanner                     c. Ultrasound                d. All of these

 

63. The use of ICT by the government to provide efficient, convenient & transparent services to the citizens and business is termed as-

a. e-governance                  b. e-government                       c. e-business                 d. None of these

 

64. Which among the following relationship is not covered in e-governance?

a. G2C                               b. G2B                                 c. B2B                          d. G2G

 

65. In India, National e-governance plan(NeGP) was initiated on-


a. 16th May 2006                 b. 16th November 2006


c. 10th May 2005           d. 8th April 2006


 

66. Uses of Information & Communication Technology in Millitary are-


a. GPS Technology                          b. Wireless Technology


c. Satellite system         d. All of these


 

67. What does GPS stands for-


a.  Global Positioning Satellite


b.   Global Positioning System


c.  Global Paid system


d.  None of the these


 

 


68. Publishing false information in internet is an issue of-

a. Computer ethics                   b. Morality                           c. Computer equity


d. Digital Divide


 

69. Which of the following is the fastest spreading Virus?

a. Macro Virus                    b. Trojan Horse                     c. Worm                       d. I LOVE YOU

Virus

 

70. The term used to describe a terrorist attack on a computer information system is-

a. Cyber Attack                   b. Cyber Terrorism                     c. Time Bomb                d. None of the

these

 

71. In Computer Crime, VIRUS stands for-


a.   Vital Information Resouce Under Seize


b. Very Important Resouce Under Seize


c.  Various Information Resouce Under Seize


d.   None of these


 

72. A malicious program that copies itself from computer to computer is -

a. Spam                             b. Worm                              c. Trojan Horse              d. None of the these

 

73. World Intellectual Property Organisation (WIPO) was established in which year?

a. 14th july 1967                  b. 4th july 1968                     c. 14th june 1967            d. 14th july 1965

 

74. A distinctive sign that identifies certain goods or services produced or provided by an individuals or a company is called-

a. Copyright                       b.Patents                             c. Trademark                    d. All of these

 

75. The first owner of the question paper of an examination is-


a. Moderator                      b.Question paper setter


c. Examiner                   d. None of these


 

76. In which year first copyright act was passed in India?

a. 1956                               b. 1934                                c. 1914                         d. 1924


77.  - 8. The common name for the crime of stealing passwords is

a. Hacking                          b. Spoofing                              c. Identity theft              d. Cracking

 

78. Laws relating to protecting the internet and other online communication technology is-

a. Cyber Law                      b. Computer Law                       c. IT Law                        d. None of these

 

79. Which of the following is/are example of application software used in business?


a.  Project management & accounting software


b.   Office software                 c. Graphics software


d. All of these


 

 

 

80. Which Act in India focuses on data privacy and information technology?


a. IT(ammendment)Act 2008


b. Indian Penal code              c. IT Act 2000                d. None of these


81. 9. Intellectual property refers to:

a. Creation of minds            b. Literary works                   c. Artistic works            d. All of the above

 

 

 

 

82. Use of Full Body Scanner at Airport is an issue between


a.  Security and Copyright


b.   Copyright and Privacy


c.  Security and Privacy


d.  None of the above


 

 

 

 

 

 

83. First Supercomputer developed in India is-

a. Aryabhatt                       b. Cray-1                              c. PARAM                     d. IBM-370

 

84. Peoples' having fear of using technology are called as-

a. Technician                      b. Technophobes                      c. both a & b                 d. None of the

these

 

85. Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as-


a.  Computer vandalism


b.   Computer fraud                c. Plagiarism                    d. All of the these


 

86. Discrimination of computer studies based on caste/tribe is an issue of -

a.   Digital divide                      b. Computer equity               c. Euality                      d. None of the

these

 

87. Which of the following is an example of presentation software?


a. Ms-Access                         b. Spreadsheet                     c. Power-point                  d. Word

processing

 

88. What does GPS stand for?


a.  Global Portable Service


b.   Global Positioning System


c.  General Position Service


d.  None of the above


 

 

 

 

 


89. Who coined the term "Computer ethics" as a branch of philosophy?

a. Aryabhatt                       b. Grace Hoppers                 c. John Von Neumann


d. Walter Maner


 

90. Which of the following are example of communication technology tools?

a. Cell Phones                     b. Computer                         c. satellite system          d. All of the these

 


91. What type of computer is found inside the watch?

a. Mini Computer                b. Embedded Computer


c. Micro Computer


d. None of the these


 

92. ICT in education includes-

a. Video Lectures                b.Use of Projector                c. Use of Internet           d. All of the these

 

93. SBI branches in rural areas does not have Cash Deposit Machine, it is an issue of-

a. Digital divide                  b. Computer unequity           c. Social issue               d. None of the

these

 


94. Software program used to view web pages is-

a. Web Technology             b. Web Browser                   c. World wide

web


d. HTML


 


95. HTTP stands for-

a.  Hyper text transfer parameter


b.  High transmission tool protocol


c.  Hyper text transfer protocol


d.  Hyper test transmission permission


 

96. The simultaneous processing of two or more programs by multiple processors is called-

a. Multi-processing                  b.Multi-tasking                     c. Multi-sharing             d. All of the these

 

 

97. In which year the first operating system was developed-

a. 1956                               b. 1950                                c. 1945                         d. None of these

 


98. Computer class teaching discrimination based on gender is a case of

a. Computer Crime              b. Digital Divide                   c. Computer

Equity


d. All of the above


99. Unwanted internet mails and ads. are also known as -

a. Fraud                             b.Spam                               c. Drafts                       d. All of the these

 

100. The use of information and communication technology to provide clinical health care from a distance is termed as-


a. Telemedicine                      b. Telecommunication           c. Video

Conferencing


d. None of these


 

101. Social issues of Using ICT in medicine are-


a.  Disclosing gender of unborn babies.


b.   False reporting of diagonsis.


c.  None of these            d. All of these


 

 

102. Which of the following is/are an example of medical devices that diagnose or scense the body?

a. CT Scanner                        b. MRI Scanner                     c. Ultrasound                d. All of these

 

103. The use of ICT by the government to provide efficient, convenient & transparent services to the citizens and business is termed as-

a. e-governance                  b. e-government                       c. e-business                 d. None of these

 

104. Which among the following relationship is not covered in e-governance?

a. G2C                               b. G2B                                 c. B2B                          d. G2G

 

105. In India, National e-governance plan(NeGP) was initiated on-


a. 16th May 2006                 b. 16th November 2006


c. 10th May 2005           d. 8th April 2006


 

106. Uses of Information & Communication Technology in Millitary are-


a. GPS Technology                          b. Wireless Technology


c. Satellite system         d. All of these


 

107. What does GPS stands for-


a.  Global Positioning Satellite


b.   Global Positioning System


c.  Global Paid system


d.  None of the these


 

 


108. Publishing false information in internet is an issue of-

a. Computer ethics                   b. Morality                           c. Computer equity


d. Digital Divide


 

109. Which of the following is the fastest spreading Virus?

a. Macro Virus                    b. Trojan Horse                     c. Worm                       d. I LOVE YOU

Virus

 

110. The term used to describe a terrorist attack on a computer information system is-


a. Cyber Attack                   b. Cyber Terrorism                     c. Time Bomb                d. None of the

these

 

111. In Computer Crime, VIRUS stands for-


a.   Vital Information Resouce Under Seize


b. Very Important Resouce Under Seize


c.  Various Information Resouce Under Seize


d.   None of these


 

112. A malicious program that copies itself from computer to computer is -

a. Spam                             b. Worm                              c. Trojan Horse              d. None of the these

 

113. World Intellectual Property Organisation (WIPO) was established in which year?

a. 14th july 1967                  b. 4th july 1968                     c. 14th june 1967            d. 14th july 1965

 

114. A distinctive sign that identifies certain goods or services produced or provided by an individuals or a company is called-

a. Copyright                       b.Patents                             c. Trademark                    d. All of these

 

115. The first owner of the question paper of an examination is-


a. Moderator                      b.Question paper setter


c. Examiner                   d. None of these


 

116. In which year first copyright act was passed in India?

a. 1956                               b. 1934                                c. 1914                         d. 1924

 

117.  The common name for the crime of stealing - passwords is

a. Hacking                          b. Spoofing                              c. Identity theft              d. Cracking

 

118. Right to Privacy is included in which article of Indian constitutions?

a. Article 21                        b. Article 12                          c. Article 15                   d. Article 25

 

119. Which of the following is/are example of application software used in business?


a.  Project management & accounting software


b.   Office software                 c. Graphics software


d. All of these


 

 

 

120. Which Act in India focuses on data privacy and information technology?


a. IT(ammendment)Act 2008


b. Indian Penal code              c. IT Act 2000                d. None of these


121. The Term 'Intellectual Property Rights' covers a)Copyrights b)Trademark c)Patent d) All of these

122. Intellectual Property Rights (IPR) protect the use of of information and idea that are of a)Ethical value b)Social value c)Moral value d) commercial value

123. Symbol of Maharaja of Air India is

 

a)Copyright b)Patent c)Trademark d)All of the above

 

124. The rights of an author or artist with respect to his/her creation are governed by the law of a)Patent b)Copyright c)Trademarks d)Intellectual designs

125.  World Intellectual Property Day is observed annualy on a)26th March b)26th April c)26th May d)26th June

126. Theme of World Intellectual Property Day 2018 is- a)Powering change:women in innovation and creativity b)'Innovation-Improving Lives'

c) 'Digital creativity :culture Reimagined'

 

d)  Movies-A Global Passion

 

127.   The term 'computer ethics' was first coined by-

 

a)Anne Piere b)Walter Maner c)Charles Babbage d)None of the above

 

128.   A                         is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs

a)Worm b)Virus c)Zombie d) Trpdoors

 

129.  Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

130)     Which of the following malicious programme do not replicate automatically

 

a)  Trojan Horse b)Virus c)Worm d)Zombie

 

131)    Which of the following domain is used for Business purpose-

 

a)  .net b) .edu c) .com d) .org

 

132)    Read the following statements:

 

I)        Information and Communication Technology (ICT) is considered as a subset of Information Technology (IT)

 

II)       The 'right to use' a piece of software is termed as copyrights

 

133. Which of the above statement(s) is/are correct-

 

a) Both I & II       b) Neither I nor II c) II only d) I only


134)             NMEICT stans for----

 

a)  National Mission on Education through ICT

 

b)national Mission on E-Governance through ICT

 

c)  National Mission on E-Commerce through ICT

 

d)National Mission on E-Learning through ICT

 

135)          Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

136)          Technology that helps companies change business by allowing them to use new methods is called

a)  data processing b)information system c)information technology d) virtualization

 

137)        A company wide network,closed to public access,which uses internet type technology is called

 

a) Intranet b) Internet c) Extranet d)none of these

 

 

138)     Sending Questionnaire to a respondent with a request to complete and return by post is called

a)  Mail survey

b)  Interview

c)  Observation

d)  Panel

 

 

139)       The most dynamic change in business technology in recent year is a)The speed of the Printers

b)  The move away from mainframe computers toward network system

 

c) The cost of computers

 

d)  none of the above

 

 

140)     VGA is

a)  Video Graphics Array

b)  Visual Graphics Array

c)  Volatile  Graphics Array

d)  Video  Graphic Adapter


141)       MRI, CT-scan, Ultrasound devices are examples of use of computer in

 

a) Medical Science b)Education c)Business d)Stock-exchange

 

 

142)     Design, shipping and process control are few uses of computer in a)Science b)Education c)Industry d)Government

 

 

143)     Which device is required for the Internet Connection?

a)  Joystic

b)   Modem

c)  CD Drive

d)  NIC Card

 

 

144)    A problem of the information society includes-

 

a) Electronic crime b)survelliance c)technological unemployment d)all of the above

 

 

145)     ALU is

a)  Arithmetic Logic Unit

b)  Array Logic Unit

c)  Application Logic Unit

d)  None of above

 

 

146)       Educational institutions,libraries, hospitals and industries store concerned information by- a)Operating systems b) Word Processing c) Data management d) informing systems

 

 

147)     CD-ROM stand for

a)  Compactable Read Only Memory

b)  Compact Data Read Only Memory

c)  Compactable Disk Read Only Memory

d)   Compact Disk Read Only Memory

 

 

148)    The branch of physics that deals with the motion of a very small particle is called- a)Field theory b)Particle Physics c)Quantum Mechanics d)Atomic Physics


149)     What is a light pen?

a)  A Mechanical Input device

b)   Optical input device

c)  Electronic input device

d)  Optical output device

 

 

150)     Pedology is the science related to the study of a)atmosphere b)soil c) pollutants d)seeds

 

 

151)     You organize files by storing them in

a)  Archives

b)   Folders

c)  Indexes

d)  Lists

 

 

152)    The Defence Research Development Organization (DRDO) has developed a drug named 'Lukosin'.It is being used in the treatment of

a)                          Leukorrhea b) Lung Cancers c) Leucoderma d) Leukemia

 

 

153)     Social Science deals with

a)  Objects

b)   Human beings

c)  Non living things

d)  None of the above

 

 

154)           Rubber is a product of

 

a)  Fibre b)Latex c) Resin d) Gum

 

 

155)                       is a combination of hardware and software that facilitates the sharing of information between computing devices.

a)  Network


b)  Peripheral

c)  Expansion Board

d)  Digital Device

 

 

156)     If someone is injured in an accident and brokes his/her knee joint ,then he/she needs to consult-

a) Orthopedic b) Paediatrician c)Oncologist d)Urologist

 

 

157)     Survey is a          study.

a)  Descriptive

b)  Fact finding

c)  Analytical

d)   Systematic

 

 

158)       Communication satellite are used to

 

a) Transmit communication signal only

 

b)Receive Communication signal only

 

c)Receive and redirect communication signal

 

d)Provides information of natural resources only.

 

 

159)     Key logger is a

a)  Firmware

b)  Antivirus

c)  Spyware

d)  All of the above

 

 

160)    Vermiculture technology is used in

 

a)  Production of fish b)Animal Husbandary c) Poultry farming d) Organic Farming

 

 

161)     A             computer is used in Banking

a)  PC

b)  Palm pilot


c)  Mainframe

d)  Laptop

 

 

162)     The basic function of technology 'Blue tooth' is to allow a)Landline phone to mobile phone communication

b)Signal transmission on mobile phones only c)Satellite television communication

d)Wireless communication between equipment.

 

 

163)     Which of the following is/are threats for electronic payment systems?

a)  Computer worms

b)  Computer Virus

c)  Trojan horse

d)   All of the above

 

 

164)    'Genetic Engineering ' is related to

 

a)  Medical science b) Communication Technology c) Electrical Engineering d) Bio-technology

 

 

165)     A               is a computer program that can replicate itself and spread from one computer to another.

a)  Antivirus

b)  Pen Drive

c)  Mouse

d)   Computer Virus

 

 

166)     In computer security,.................... means that computer

system assets can be modified only by authorized parities.

 

a) Confidentiality

 

b) Integrity

 

c) Availability

 

d) Authenticity


167)     VIRUS stands for

a)  Very Intelligent Result Until Source

b)  Very Interchanged Resource Under Search

c)  Vital Information Resources Under Seize

d)  Viral Important Record User Searched

 

 

168)    In computer security,..................... means that the

information in a computer system only be accessible for reading by authorized parities.

a)   Confidentiality

 

b)   Integrity

 

c)  Availability

 

d)   Authenticity

 

 

169)    The type of threats on the security of a computer system or network are ……………………..

i) Interruption                ii)Interception              iii) Modification

 

iv) Creation                    v)Fabrication

 

a)  i, ii, iii and iv only

 

b)   ii, iii, iv and v only

 

c)   i, ii, iii and v only

 

d)  All i, ii, iii, iv and v

 

 

170)     World Wide Web is being standard by

a)  Worldwide corporation

b)   W3C

c)  World Wide Consortium

d)  World Wide Web Standard

 

 

171)     The.............. is code that recognizes some special sequence

of input or is triggered by being run from a certain user ID of by unlikely sequence of events.

a)   Trap doors


b)   Trojan horse

 

c)   Logic Bomb

 

d)   Virus

 

 

172)     In computer terminology, OCR stands for

a)  Optical Character Reader

b)  Optical Card Reader

c)  Office Cash Receiver

d)  Online Computer Retrieval

 

 

173)    The.............. is code embedded in some legitimate program

that is set to “explode” when certain conditions are met.

 

a)  Trap doors

 

b)   Trojan horse

 

c)   Logic Bomb

 

d)  Virus

 

 

174)     Which among the following is the first step of Research Process?

a)  Review of Literature

b)  Collection of Data

c)  Editing and Coding

d)   Selection of a problem

 

 

175)    programs can be used to accomplish functions

indirectly that an unauthorized user could not accomplish directly.

 

a)  Zombie

 

b)   Worm

 

c)   Trojan Horses

 

d)  Logic Bomb

 

 

176)     McAfee is an example of

a)  Photo Editing Software


b)  Quick Heal

c)  Virus

d)   Antivirus

 

 

177)     State whether true of false.

 

i)  A worm mails a copy of itself to other systems.

 

ii)  A worm executes a copy of itself on another system.

 

a)  True, False

 

b)   False, True

 

c)   True, True

 

d)  False, False

 

 

178)     Who among the following is known as “The father of scientific management”?

a)  Frederich W. Taylor

b)  Henry Fayol

c)  Robert Owen

d)  None of the above

 

 

179)    Intruders is a most common security threat which referred as?

 

a) Account Access

b) Data Access

c) Hacker or Cracker

d) Computer Access

180)       In processes, access control implements a

a) Security Policy

b) Access Policy

c) Control Policy

d) Check Policy

181)         What is not a role of encryption?

a) It is used to protect data from unauthorized access during transmission.

b) It is used to ensure user authentication

c) It is used to ensure data integrity

d)  It is used to ensure data corruption does not happens


182)     Type of software which is used to create slide show is

a)  Web design software

b)   Presentation software

c)  Word-processing software

d)  Spreadsheet software

 

 

183)     MSI stands for

a)  Medium Scale Integrated Circuits

b)  Medium System Integrated Circuits

c)  Medium Scale Intelligent Circuit

d)  Medium System Intelligent Circuit

 

 

184)     MICR stands for

a)  Magnetic Ink Character Reader

b)  Magnetic Ink  Code Reader

c)  Magnetic  Ink Cases Reader

d)  None

 

 

185)     EBCDIC stands for

a)  Extended Binary Coded Decimal Interchange Code

b)  Extended Bit Code Decimal Interchange Code

c)  Extended Bit Case Decimal Interchange Code

d)  Extended Binary Case Decimal Interchange Code

 

 

186)     Content analysis uses which of the below methods?

a)  Counting

b)  Classifying

c)  Recording

d)   All of the above

 

 

187)     Which of the following is an example of primary data?

a)  Book


b)  Journal

c)  Field Report

d)  Census Report.

 

 

188)     A study of the culture in different societies is called

a)  Personality

b)  Authropoly

c)  Perception

d)  Attitudes

 

 

189)     What type of resource is most likely to be a shared common resource in a computer Network?

a)  Printers

b)  Speakers

c)  Floppy disk drives

d)  Keyboards

 

 

190)     Which of the following is a part of the Central Processing Unit?

a)  Printer

b)  Key board

c)  Mouse

d)   Arithmetic and Logic Unit

 

 

191)       What is a brand?

 

a.       The name of companies that made computers

b.       The name of product a company gives to identify its product in market.

c.       A name of class to indicate all similar products from different companies.

d.       All of the above.

 

192)     Which of the following is known as father of computer?

a.       Dennis Ritchie.

b.       Napier.

c.       Charless Babbage

d.       Alam Turing

 

193)     The earliest calculating device is :


a.       Calculator

b.       Abacus

c.       Difference engine

d.       Analytical engine

 

194)     First computer of the world

a.       CRAY-1

b.       PARAM

c.       Tian

d.       IBM-370

 

195)     Which of the following is the fastest type of computer ?

a.       Laptop

b.       PC

c.       Work station

d.       Super computer

 

196)     First super computer developed in India is

a.       PARAM

b.       Aryabhatt

c.       Buddha

d.       Ram

 

197)     Computer’s basic architecture was developed by

a.       John Von Neumann

b.       Charles Babbage

c.       Blaiscpascal

d.       Jordan Murn

 

198)     Who invented Vaccumtubes ?

a.       John Bardeen

b.       William Shockley

c.       Lee de Forest

d.       None of above

 

199)     The first general purpose electronic computer in the world was

a.       UNIVAC

b.       EDVAC

c.       ENIAC

d.       All of the above

 

200)     The term ‘Computer’ is derived from

a.       Greek language

b.       Sanskrit language

c.       Latin language

d.       German language

 

201)     SPSS


a.       Statistics package for the social science

b.       Software package for system development

c.       Software package for editing

d.       None of the above

 

202)     Formula in Excel start with

a. %

b.   =

c.   +

d.   

 

203)     In Excel, a data series is define as what?

a.       A type of chart

b.       A cell reference

c.       A collection of related data

d.       A division of results

 

204)     Multiple calculations can be made in a single formula using……

a.       Standard Formula

b.       Array Formula

c.       Complex Formulas

d.       Smart Formula

 

205)     Which chart can be created in Excel

a.       Area

b.       Line

c.       Pie

d.       All of the above

 

206)     Which of the following is not a term of MS-Excel?

a.       Cells

b.       Rows

c.       Columns

d.       Document

 

207)     What type of commerce is enable by technology

a.       Path-to-profitability

b.       E-commerce

c.       EBuy

d.       Internet

 

208)     What age group was born after the digital revolution?

a.       Digital natives

b.       Digital immigrants

c.       Digital boomers

d.       Web kids


209)     When two companies are linked together by computers and they send business transactions through these computer, they are probably using-

a.       Digital wallets

b.       Electronic data interchange

c.       B2C

d.       Smart cards

 

210)     What is the term used when the government employs technology to deal with citizens, businesses and other government agencies?

a.       G2BC

b.       Web

c.       Consumer

d.       E-government

 

211)   It is impossibleto proceed to the age of the steam-mill until one has passed through the age of

a.      The hand-mill.

b.      The hydroelectric plant.

c.      The steam-mill.

d.      The nuclear power age.

 

 

212)                       The inventionof a steam engine (the aeolipile)was

a.      Alexander Fleming.

b.      Aldo Leopold.

c.      Hero of Alexandria.

d.      None of them.

 

 

213)                       The development of technical progress has always seemed intrinsically

a.      Predictable.

b.      Unpredictable.

c.      Gradual.

d.      Uneven.

 

214)   For a ‘‘higher’’ stage of technology depends not alone on knowledgeor sheer skill but on

a.      The division of labor.

b.      The specialization of industry.

c.      Both a. and b.

d.      None of them.

 

215)   Technology  imposes  certain                             characteristics upon the society in which it is found.

a.      Social.

b.      Political.

c.      Cultural.

d.      Both a. and b.


216)             wrote in The German Ideology, ‘‘A certain mode of production, or industrial stage, is alwayscombined with a certain mode of cooperation, or social stage,’’

a.      Karl Marx.

b.      Rousseau.

c.      Frank.

d.      Alexander.

 

217)   The Hierarchical Organization of Work Different  technological  apparatuses  not onlyrequire different labor forces but different orders of

a.      Supervision.

b.      Co-ordination.

c.      Both a. and b.

d.      None of the above.

 

218)   Who said that, ‘‘engineers have committed such blunders as saying thetypewriter brought women to work in offices, and with the typesetting machine madepossible the great modern newspaper, forgetting that in Japan there are women officeworkers and great modern newspapers getting practically no help from typewriters andtypesetting machines.’’

a.      Marx.

b.      Gilfillan.

c.      Roosevelt.

d.      None of the above.

 

219)                       Technological Change Must Be Compatible with Existing

a.      Social Conditions.

b.      Economic Conditions.

c.      Other institutions in society.

d.      All of the above.

 

220)   Who said that what is needed is an understanding of technology from inside, both as a body of knowledgeand as a social system. Instead, technology is  often  treated as a ‘‘black box’’ whose contentsand behaviour may be assumed to  be  common knowledge.

a.      Layton.

b.      Rolston III.

c.      Hume.

d.      John Locke.

 

221)                       Scientific findings are             to more than one interpretation.

a.      Not open.

b.      Open.

c.      Static.

d.      None of the above.

 

222)   Technology                              _ has the power to help the billions of poor people all over the earth.

a.      Not guided by ethics.

b.      Guided by ethics.

c.      Guided by Scientists.


d.      None of the above.

 

223)                       Too much of technologytoday  is making                  .

a.      Toys for the rich.

b.      Toys for the poor.

c.      Toys for both rich and poor.

d.      None of the above.

 

224)   The  sun,  the  genome,  and  _                     are three revolutionaryforces arriving with the new century.

a.      The Mobile.

b.      The Computer.

c.      The internet.

d.      None of the above.

 

225)                       What is one of the greatest evils in the world?

a.      Rural poverty.

b.      Dowry system.

c.      Child marriage.

d.      Caste system.

 

226)                       Poverty  can  be  reduced  by  a  combination  of  solar  energy,                

andthe internet.

a.      Genetic engineering.

b.      Cyber café.

c.      Nanotechnology.

d.      All of the above.

 

227)                       Solar energy is distributed                   overthe earth.

a.      Unequally.

b.      Equitably.

c.      Same.

d.      Evenly.

 

228)   What can make solar energy usable everywhere for thelocal  creation  of  wealth?

a.      Internet.

b.      Sun.

c.      Genetic engineering.

d.      None of the above.

 

229)   What can provide people in every village withthe information and skillsthey need to develop their talents?

a.      The solar system.

b.      The internet.

c.      The Genome.

d.      All of the above.

 

230)                       Solar energy is most abundant where it is most needed, in the

a.      Countryside.

b.      In the tropical countries.


c.      Temperate latitudes.

d.      Both a. and b.

Answer: (d) Both a. and b.

 

231)                       The  technology  of  solar  energy  is  still  too  expensivefor  average          

countriesto afford.

a.      First world.

b.      Third-world.

c.      Both a. and b.

d.      None of them.

 

232)   There is enough                      to supply our needs many times over, if we can find away to use it.

a.      Sunlight.

b.      Internet.

c.      Animals.

d.      None of the above.

 

233)                       Sugar cane canbe fermented  to make         .

a.      Methane gas.

b.      Alcohol.

c.      Electricity.

d.      All of the above.

 

234)                       Solar energy has not yetbeen used on a large scale for one simple reason: it is

a.      Too expensive.

b.      Too cheap.

c.      Not much available.

d.      All of the above.

 

235)   Solar energy is expensive today because it has to be collected from large areas andwe do not yet have a technology that covers large areas

a.      Easily.

b.      Cheaply.

c.      Conveniently.

d.      None of the above.

 

236)                       What are the two main tools for collecting solar energy?

a.      Photoelectric panels and energy crops.

b.      Genetic engineering and internet.

c.      Both a. and b.

d.      None of the above.

 

237)                       Fuels produced from energy  crops are              .

a.      Not storable.

b.      Storable.

c.      Very weak.

d.      All of the above.

 

238)                       Traditional farming has always been  based on                .

a.      Genetic engineering.


b.      Solar harvesting.

c.      Photosynthesis.

d.      All of the above.

 

239)                       Alongside the human genome, what are other genomes beingsequenced?

a.      Bacteria.

b.      Yeast.

c.      Worms.

d.      All of the above.

 

240)                       Before long we shall have sequenced the genomes of the major crop plants,

a.      Wheat.

b.      Maize.

c.      Rice.

d.      All of the above.

 

241)                       The internet will allow people in remote places tomake

a.      Business deals.

b.      To buy and sell.

c.      To keep in touch with their friends.

d.      All of the above.

 

242)   Cheap solar energy and genetic engineering will provide the basis for primaryindustries in the countryside,

a.      Modernized farming.

b.      Mining.

c.      Manufacturing.

d.      All of the above.

 

243)                       Ethics must guide technology in the direction of

a.      Political justice.

b.      Cultural justice.

c.      Social justice.

d.      None of the Above.

 

244)   Who said that, “The increased deployment of  nuclear  power facilities must  lead societytoward authoritarianism. Indeed, safe reliance upon nuclear power as the principalsource of energy may be possible only in a totalitarian state.”

a.      Mumford.

b.      Denis Hayes.

c.      Louise.

d.      None of the above.

 

245)   Who said that ‘‘dispersed solar sources are more compatible than centralized technologies withsocial equity, freedom and cultural pluralism.’’

a.      Mumford.

b.     Denis Hayes.

c.      Louise.

d.     None of the above.


246)   The factory system,automobile, telephone, radio, television,  space  program  and nuclear powerhave all at one time or another been described as

a.      Democratizing forces.

b.      Liberating forces.

c.      Mobilizing forces.

d.      Both a. and b.

 

247)                       It is obvious that technologies can be used in ways that enhance the

                         of some over others, for example, the use of television to sell acandidate.

a.      Power.

b.      Authority.

c.      Privilege.

d.      All of the above.

 

248)                       Who wrote the little essay ‘‘On Authority’’ in 1872?

a.      Friedrich Engels.

b.      Karl Marx.

c.      Rousseau.

d.      None of the above.

 

249)   Who said that the  roots of unavoidable authoritarianism are deeply implanted  in the human involvementwith science and technology?

a.      Karl Marx.

b.      Friedrich Engels.

c.      Immanuel Kant.

d.      John Locke.

 

250)                       The atom bomb is an inherently a

a.      Political artifact.

b.      Social artifact.

c.      Cultural artifact.

d.      Economical artifact.


Post a Comment

0 Comments

Projects