Soft Study MODEL QUESTIONS
6th Semester, 2021
Subject:
Society & Technology
Answer Key are given in Bold letter
1. Method used to transfer information to far off places instantly
is called
i)
Information technology
ii)
Language
iii)
Data
iv) Telecommunication
2. Software are referred to
as
i)
Hardware
ii) Computer programs
iii)
Binary data
iv)
procedure
3. This invention replaced vacuum tubes and made computers
much smaller and faster.
However,
it was eventually replaced by another invention
(i)
RAM
(ii)
ENIAC
(iii)
Transformer
(iv) Transistor.
4. On the basis of time, research can be classified as,
(i)
Qualitative versus Quantitative
(ii)
Pure versus applied research
(iii) Cross-sectional versus longitudinal research
(iv)
None of the above
5. Research is basically-
(i)
A methodology of enquiry
(ii)
Search of truth
(iii)
A systematic exploration of facts
(iv) All of the above
6. Social research can be divided into-
(i)
Two categories
(ii)
Three categories
(iii) Four categories
(iv)
Five categories
7. Quantitative data refers
to
(i)
Graphs and tables
(ii)
Any data you present in your report
(iii)
Statistical analysis
(iv)
Numerical data that could be useful to answer
your research question(s) and to meet your Objectives
8. Research design of a study should not include
(i)
Objectives
(ii)
Hypothesis
(iii) Findings
(iv) Blue print of Research
9. Field study is related to
(i) Real life situations
(ii)
Experimental situations
(iii)
Laboratory situations
(iv)
None of the above
10. Data collection can be done through
(i)
Interview
(ii)
Questionnaires
(iii)
Through E-Mail or by Telephone
(iv) All of the above
11. The aims of research is/are
(i)
verification
(ii)
fact finding
(iii)
theoretical development
(iv) All of the above
12. Which of the following is the first step in starting the research process?
(i)
Searching sources of information to locate problem.
(ii) Survey of related literature
(iii)
Identification of problem
(iv)
Searching for solutions to the problem
13. One of the
following is not a survey method
(i)
Personal interview
(ii)
Telephone interview
(iii)
Mail interview
(iv) Structured observation
14. How many models are for
technological innovation-
(i)
Two
(ii) Three
(iii)
Four
(iv)
None of the above
15.
Bibliography given
in a research report
(i)
Helps those interested in further research and studying
the problem
(ii)
Makes the report authentic
(iii) Both
(i) & (ii)
(iv)
None of the above
16. ICT has been an essential
necessity for
i)
Communication at long distances
ii)
Employing IT and its services to the rural areas
iii)
Providing medical help to nurses and staffs for treatments
iv) All of these
17.
Teleconferencing
can be helpful in
i)
Business Domain
ii)
Health Sector
iii) Both
A & B
iv)
None of these
18.
ICT is a
combination of
i) IT
and Telecommunication
ii)
IT and Business
iii)
Information and Knowledge
iv)
None of These
19.
Expert systems
provides the functionalities of?
i)
The system provides medicine to the patients
ii)
The expert system consults the doctor immediately.
iii) Medical staffs inputs patients symptoms
iv)
None of these
20.
Managing a patients record can be
helpful as
i) The patients data can be easily shared between the doctors
ii)
The patients need to pay a heavy charge for maintain the records
iii)
It may be difficult to search and retrieve the patient’s records.
iv)
None of these
21.
The drawbacks of ICT in medicine are
i)
Part time staff may not be trained and cannot access vital information
ii)
Some staff may be resistant of using ICT
iii)
All staff will need training
in the use of the software
iv) All of these
22. The use of computers, internet and other communication technologies to
provide medical care to patients
at distance is known as
i)
Telecommunication
ii) Telemedicine
iii)
Expert systems
iv)
None of these
23.
ICT is used
extensively in
i)
Wider access to learning and participation
ii)
Antisocial activities involving harassment of individuals
iii) Flexibility
to study where, when and how best suits individual needs and preferences
iv) Both A & C
24.
ICT is helpful in
i)
Doing more amount of work and accomplishing the task quickly.
ii)
Analyzing information
iii)
Learning computer skills
iv) All of these
25.
The drawbacks of
ICT involves
i) Foreign technology and culture are going heavy on our culture
ii)
Increased commitments to learning works
iii)
Learn more independently and at their own pace
iv)
Increase in self-directed learning and independence
26.
Computerized pharmacy are helpful
for a common individual as
i) They use robots and barcodes
ii)
They use ultrasound surgery
iii)
They can be used to diagnose
a patient in a better way
iv)
None of these
27.
Effects of
Telemedicine results in
i)
Medical assistants at the remote sites
ii)
Small hospitals can have hardware costs reduced
iii)
Research study and scope for medical and cost effectiveness
iv) All of these
28.
Using Teleconferencing to deliver psychotherapy is termed as
i)
Telepathology
ii) Telepsychiatry
iii)
Telepsychology
iv)
Psychology
29.
Prosthetic Devices includes
i) Computer technology for vision and hearing
ii)
Powerful IC
iii)
MRI Systems
iv)
None of these
30.
Medicine technology have applications in the fields of
i)
Pharmacy
ii)
Prosthetics
iii) Both
A & B
iv)
None of these
31. In
computer security, _ means
that computer system assets can be modified only by authorized parities.
i)
Confidentiality
ii) Integrity
iii)
Availability
iv)
Authenticity
32. Which of the following is independent
malicious program that need not any host program?
i)
Trap doors
ii)
Trojan horse
iii)
Virus
iv) Worm
33.
Verification of a login name and password is known as
i) Configuration
ii)
Accessibility
iii) Authentication
iv)
logging in
34.
The
common name for the crime of stealing passwords
is
i) Jacking
ii)
Identify Theft
iii) Spoofing
iv)
Hacking
35.
Which of the following
is/are threats for electronic payment systems?
i) Computer worms
ii)
Computer virus
iii)
Trojan horse
iv) All of the above
36.
The term
'Intellectual Property Rights' covers
i)
Copyrights
ii)
Know-how
iii)
Trade dress
iv) All of the above
37. The following can not be exploited by
assigning or by licensing the rights to others.
i)
Patent
ii)
Designs
iii) Trademark
iv)
All of the above
38. The altering of data so that it is not usable unless the changes are
undone is
i)
Ergonomics
ii)
Compression
iii)
Biometrics
iv) Encryption
39. is the measurement of things such as fingerprints and
retinal scans used for security access.
i) Biometrics
ii)
Bio measurement
iii)
Computer security
iv)
Smart weapon machinery
40.
Code red is a(n)
i) Word Processing Software
ii)
Antivirus
iii) Virus
iv)
Photo Editing Software
41.
The term "Technology" has been derived
from which of the following
language?
a. Latin b. Greek c. Spanish d. English
42.
Which
of the following is known as father of modern
computer?
a. Dennis
Ritchie b. John
Napier c. Charles Babbage
d. Alan Turing
43.
First
Supercomputer developed in India is-
a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
44.
Peoples' having fear of using technology are called as-
a. Technician b. Technophobes c. both a &
b d. None of the
these
45.
Copying or stealing someone
else's works or ideas and passing them
off as your own work
is reffered as-
a. Computer vandalism
b. Computer fraud c. Plagiarism d. All of the these
46.
Discrimination of computer studies
based on caste/tribe is an issue
of -
a.
Digital divide b. Computer
equity c. Euality d.
None of the
these
47.
Which
of the following is an example of presentation software?
a. Ms-Access b. Spreadsheet c. Power-point d. Word
processing
48.
Pirating software is an act of violating-
a. Equity b. Ethics c. Law d. None of the these
49.
Who
coined the term
"Computer ethics" as a branch
of philosophy?
a. Aryabhatt b. Grace
Hoppers c. John Von Neumann
d. Walter Maner
50.
Which
of the following are example
of communication technology tools?
a. Cell
Phones b. Computer c. satellite system d. All of the these
51.
What
type of computer is found inside
the watch?
a. Mini Computer b. Embedded Computer
c. Micro Computer
d. None of the these
52.
ICT in education includes-
a. Video
Lectures b.Use of Projector c. Use of Internet d. All of the these
53.
SBI,
korbook branch does not have Cash Deposit
Machine, it is an issue of-
a. Digital divide b. Computer
unequity c. Social
issue d. None of the
these
54.
Software program used to view web pages is-
a. Web Technology b. Web Browser c.
World wide
web
d. HTML
55.
HTTP stands
for-
a. Hyper text transfer parameter
b. High transmission
tool
protocol
c.
Hyper text transfer protocol
d. Hyper test transmission permission
56.
The
simultaneous processing of two or more programs
by multiple processors is called-
a. Multi-processing b.Multi-tasking c. Multi-sharing d.
All of the these
57.
In which year the first operating system
was developed-
a. 1956 b. 1950 c. 1945 d.
None of these
58.
Computer Ethics
Institute defines how many commandments for Computer ethics
- a.12 b. 8 c. 10 d.
15
59.
Unwanted internet mails and ads. are also known as -
a. Fraud b.Spam c. Drafts d.
All of the these
60.
The use
of information and communication technology to provide clinical
health care from
a distance is termed as-
a. Telemedicine b. Telecommunication c. Video
Conferencing
d. None of these
61.
Social
issues of Using ICT in medicine are-
a. Disclosing gender of unborn babies.
b.
False reporting of diagonsis.
c. None of these d.
All of these
62.
Which
of the following is/are an example of medical devices
that diagnose or scense the body?
a.
CT Scanner b. MRI
Scanner c. Ultrasound d. All of these
63.
The use of ICT by the
government to provide
efficient, convenient &
transparent services to the
citizens and business is termed as-
a. e-governance b. e-government c. e-business d. None of these
64.
Which
among the following relationship is not covered in e-governance?
a. G2C b. G2B c. B2B d. G2G
65.
In India, National
e-governance plan(NeGP) was initiated on-
a. 16th May 2006 b. 16th November
2006
c.
10th May 2005 d. 8th
April 2006
66.
Uses
of Information & Communication Technology in Millitary are-
a. GPS Technology b. Wireless Technology
c. Satellite system d. All of
these
67.
What
does GPS stands
for-
a. Global Positioning
Satellite
b.
Global Positioning
System
c. Global
Paid system
d. None of the these
68.
Publishing false information in internet is an issue
of-
a. Computer ethics b. Morality c. Computer
equity
d. Digital Divide
69.
Which
of the following is the fastest spreading Virus?
a. Macro
Virus b. Trojan
Horse c. Worm d. I LOVE YOU
Virus
70.
The term
used to describe
a terrorist attack
on a computer information system
is-
a. Cyber
Attack b. Cyber
Terrorism c. Time
Bomb d. None of the
these
71.
In Computer Crime, VIRUS stands
for-
a.
Vital
Information Resouce Under Seize
b.
Very Important Resouce Under Seize
c.
Various Information Resouce Under Seize
d.
None of these
72.
A malicious program
that copies itself from computer
to computer is -
a. Spam b. Worm c. Trojan
Horse d. None of the these
73.
World
Intellectual Property Organisation (WIPO) was established in which year?
a.
14th july 1967 b.
4th july 1968 c.
14th june 1967 d. 14th
july 1965
74.
A distinctive sign that identifies certain goods or services produced
or provided by an individuals or a company is called-
a. Copyright b.Patents c. Trademark d. All of these
75.
The first owner
of the question paper of an examination is-
a. Moderator b.Question paper setter
c. Examiner d.
None of these
76.
In which year first copyright act was passed
in India?
a. 1956 b. 1934 c. 1914 d. 1924
77.
- 8. The common name for the crime of stealing passwords is
a. Hacking b. Spoofing c. Identity
theft d. Cracking
78.
Laws
relating to protecting the internet and other online
communication technology is-
a. Cyber Law b. Computer Law c. IT Law d. None of these
79.
Which
of the following is/are example
of application software
used in business?
a. Project management & accounting software
b.
Office software c. Graphics software
d. All of these
80.
Which
Act in India focuses on data privacy
and information technology?
a. IT(ammendment)Act 2008
b. Indian
Penal code c. IT Act 2000 d. None of these
81.
9. Intellectual property refers to:
a. Creation of minds b.
Literary works c. Artistic works d. All of the above
82.
Use
of Full Body Scanner at Airport is an issue between
a. Security
and Copyright
b. Copyright and Privacy
c.
Security and Privacy
d. None of the above
83.
First
Supercomputer developed in India is-
a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
84.
Peoples' having fear of using technology are called as-
a. Technician b. Technophobes c. both a &
b d. None of the
these
85.
Copying or stealing someone
else's works or ideas and
passing them off
as your own work is reffered as-
a. Computer vandalism
b. Computer fraud c. Plagiarism d. All of the these
86.
Discrimination of computer studies
based on caste/tribe is an issue
of -
a.
Digital divide b. Computer
equity c. Euality d.
None of the
these
87.
Which
of the following is an example of presentation software?
a. Ms-Access b. Spreadsheet c. Power-point d. Word
processing
88.
What
does GPS stand for?
a. Global Portable
Service
b.
Global Positioning
System
c. General Position Service
d. None of the above
89.
Who
coined the term
"Computer ethics" as a branch
of philosophy?
a. Aryabhatt b. Grace
Hoppers c. John Von Neumann
d. Walter Maner
90.
Which
of the following are example
of communication technology tools?
a. Cell
Phones b. Computer c. satellite system d. All of the these
91.
What
type of computer is found inside
the watch?
a. Mini Computer b. Embedded Computer
c. Micro Computer
d. None of the these
92.
ICT in education includes-
a. Video
Lectures b.Use of Projector c. Use of Internet d. All of the these
93.
SBI
branches in rural areas does not have Cash Deposit
Machine, it is an issue of-
a. Digital divide b. Computer
unequity c. Social
issue d. None of the
these
94.
Software program used to view web pages is-
a. Web Technology b. Web Browser c.
World wide
web
d. HTML
95.
HTTP stands
for-
a. Hyper text transfer parameter
b. High transmission
tool
protocol
c.
Hyper text transfer protocol
d. Hyper test transmission permission
96.
The simultaneous processing of two or more programs
by multiple processors is called-
a. Multi-processing b.Multi-tasking c. Multi-sharing d.
All of the these
97.
In which year the first operating system
was developed-
a. 1956 b. 1950 c. 1945 d.
None of these
98.
Computer class teaching discrimination based on gender
is a case of
a. Computer Crime b. Digital
Divide c. Computer
Equity
d. All of the above
99.
Unwanted internet mails and ads. are also known as -
a. Fraud b.Spam c. Drafts d.
All of the these
100.
The use of information and communication technology to provide clinical
health care from
a distance is termed as-
a. Telemedicine b. Telecommunication c. Video
Conferencing
d. None of these
101.
Social
issues of Using ICT in medicine are-
a. Disclosing gender of unborn babies.
b.
False reporting of diagonsis.
c. None of these d.
All of these
102.
Which
of the following is/are an example of medical devices
that diagnose or scense the body?
a. CT Scanner b. MRI
Scanner c. Ultrasound d. All of these
103.
The use
of ICT by the government to provide efficient, convenient & transparent services to the citizens and business is termed as-
a. e-governance b. e-government c. e-business d. None of these
104.
Which
among the following relationship is not covered in e-governance?
a. G2C b. G2B c. B2B d. G2G
105.
In India, National
e-governance plan(NeGP) was initiated on-
a. 16th May 2006 b. 16th November
2006
c.
10th May 2005 d. 8th
April 2006
106.
Uses
of Information & Communication Technology in Millitary are-
a. GPS Technology b. Wireless Technology
c. Satellite system d. All of
these
107.
What
does GPS stands
for-
a. Global Positioning
Satellite
b.
Global Positioning
System
c. Global
Paid system
d. None of the these
108.
Publishing false information in internet is an issue
of-
a. Computer ethics b. Morality c. Computer
equity
d. Digital Divide
109.
Which
of the following is the fastest spreading
Virus?
a. Macro
Virus b. Trojan
Horse c. Worm d. I LOVE YOU
Virus
110.
The term
used to describe
a terrorist attack
on a computer information system
is-
a. Cyber
Attack b. Cyber
Terrorism c. Time
Bomb d. None of the
these
111.
In Computer Crime,
VIRUS stands for-
a.
Vital
Information Resouce Under Seize
b.
Very Important Resouce Under Seize
c.
Various Information Resouce Under Seize
d.
None of these
112.
A malicious program
that copies itself
from computer to computer is -
a. Spam b. Worm c. Trojan
Horse d. None of the these
113.
World
Intellectual Property Organisation (WIPO) was established in which year?
a.
14th july 1967 b.
4th july 1968 c.
14th june 1967 d. 14th
july 1965
114.
A distinctive sign that identifies certain goods or services produced
or provided by an individuals or a company is called-
a. Copyright b.Patents c. Trademark d. All of these
115.
The first owner
of the question paper of an examination is-
a. Moderator b.Question paper setter
c. Examiner d.
None of these
116.
In which year first copyright act was passed in India?
a. 1956 b. 1934 c. 1914 d. 1924
117.
The common name for the crime of
stealing - passwords is
a. Hacking b. Spoofing c. Identity
theft d. Cracking
118.
Right
to Privacy is included in which article
of Indian constitutions?
a. Article 21 b. Article 12 c. Article
15 d. Article 25
119.
Which
of the following is/are example
of application software
used in business?
a. Project management & accounting software
b.
Office software c. Graphics software
d. All of these
120.
Which
Act in India focuses on data privacy
and information technology?
a. IT(ammendment)Act 2008
b. Indian
Penal code c. IT Act 2000 d. None of these
121.
The Term
'Intellectual Property Rights' covers a)Copyrights b)Trademark c)Patent d) All of these
122.
Intellectual Property
Rights (IPR) protect
the use of of information and idea that
are of a)Ethical value
b)Social value c)Moral
value d) commercial value
123. Symbol of Maharaja of Air India
is
a)Copyright b)Patent
c)Trademark d)All of the above
124.
The rights
of an author or artist
with respect to his/her creation
are governed by the law of
a)Patent b)Copyright c)Trademarks d)Intellectual designs
125.
World Intellectual Property Day is observed annualy
on a)26th March b)26th April
c)26th May d)26th
June
126.
Theme of World
Intellectual Property Day 2018 is- a)Powering change:women in innovation and creativity
b)'Innovation-Improving Lives'
c) 'Digital
creativity :culture Reimagined'
d) Movies-A
Global Passion
127.
The
term 'computer ethics'
was first coined
by-
a)Anne Piere b)Walter Maner c)Charles Babbage d)None
of the above
128.
A is a program that
can infect other
programs by modifying them,the modification includes a copy of the virus
program which can go on to infect
other programs
a)Worm b)Virus c)Zombie d) Trpdoors
129.
Which of the following is independent malicious program that need
not any host programme-
a)Trap doors b)Trojan horse c)Virus
d)Worm
130) Which of the following malicious programme do not replicate
automatically
a) Trojan
Horse b)Virus c)Worm
d)Zombie
131) Which of the following
domain is used for Business
purpose-
a) .net
b) .edu c) .com d) .org
132) Read
the following statements:
I)
Information and Communication Technology (ICT) is considered as a subset
of Information Technology (IT)
II) The 'right
to use' a piece of software is termed as copyrights
133. Which of the
above statement(s) is/are correct-
a) Both
I & II b) Neither I nor II c) II only d) I only
134)
NMEICT stans for----
a)
National Mission
on Education through
ICT
b)national Mission
on E-Governance through
ICT
c)
National Mission on E-Commerce through ICT
d)National Mission
on E-Learning through
ICT
135)
Encoding or scrambling data
for transmission across
a network is khown as a)Protection b) Detection c) Encryption d) Decryption
136)
Technology that
helps companies change
business by allowing
them to use new methods
is called
a) data processing b)information system
c)information technology d) virtualization
137)
A company wide network,closed to public access,which uses internet type technology is called
a) Intranet b)
Internet c) Extranet d)none of these
138)
Sending
Questionnaire to a respondent with a request to complete and return by post is
called –
a) Mail survey
b) Interview
c)
Observation
d) Panel
139) The most dynamic
change in business technology in recent
year is a)The speed of the Printers
b)
The move away from mainframe computers toward network system
c) The
cost of computers
d) none
of the above
140)
VGA is
a) Video Graphics Array
b) Visual Graphics Array
c)
Volatile Graphics Array
d) Video Graphic Adapter
141) MRI, CT-scan,
Ultrasound devices are examples of use of computer in
a)
Medical
Science b)Education c)Business d)Stock-exchange
142) Design, shipping and
process control are
few uses of computer in a)Science b)Education c)Industry
d)Government
143)
Which device is
required for the Internet Connection?
a)
Joystic
b) Modem
c)
CD Drive
d) NIC Card
144) A problem
of the information society includes-
a)
Electronic crime b)survelliance c)technological unemployment d)all of the above
145)
ALU is
a) Arithmetic
Logic Unit
b) Array Logic Unit
c)
Application
Logic Unit
d) None of above
146) Educational institutions,libraries, hospitals and industries store
concerned information by- a)Operating systems b) Word
Processing c) Data management d) informing systems
147)
CD-ROM stand for
a)
Compactable Read
Only Memory
b) Compact Data Read Only Memory
c)
Compactable Disk
Read Only Memory
d) Compact Disk
Read Only Memory
148) The branch of physics that
deals with the motion of a very
small particle is called-
a)Field theory b)Particle Physics c)Quantum
Mechanics d)Atomic Physics
149)
What is a light pen?
a)
A Mechanical Input device
b) Optical input device
c)
Electronic input device
d) Optical output device
150) Pedology is the
science related to the study
of a)atmosphere b)soil c) pollutants d)seeds
151)
You organize files
by storing them in
a)
Archives
b) Folders
c)
Indexes
d) Lists
152) The Defence Research
Development Organization (DRDO)
has developed a drug named 'Lukosin'.It is being used in the treatment of
a)
Leukorrhea b) Lung Cancers c) Leucoderma
d) Leukemia
153)
Social Science deals with
a)
Objects
b) Human beings
c)
Non living things
d) None of the above
154)
Rubber is a product of
a)
Fibre b)Latex c) Resin d) Gum
155)
is a combination of hardware and software that
facilitates the sharing of information between computing devices.
a) Network
b) Peripheral
c)
Expansion Board
d) Digital Device
156) If someone is injured in an accident
and brokes his/her
knee joint ,then
he/she needs to consult-
a) Orthopedic b)
Paediatrician c)Oncologist d)Urologist
157)
Survey is a study.
a)
Descriptive
b) Fact finding
c)
Analytical
d) Systematic
158) Communication
satellite are used to
a)
Transmit communication signal only
b)Receive
Communication signal only
c)Receive and redirect communication signal
d)Provides information of natural resources only.
159)
Key logger is a
a)
Firmware
b) Antivirus
c) Spyware
d) All of the above
160) Vermiculture technology is used in
a)
Production of fish b)Animal
Husbandary c) Poultry
farming d) Organic Farming
161)
A computer
is used in Banking
a)
PC
b) Palm pilot
c) Mainframe
d) Laptop
162) The basic function
of technology 'Blue
tooth' is to allow
a)Landline phone to mobile phone
communication
b)Signal transmission on mobile phones
only c)Satellite television communication
d)Wireless
communication between equipment.
163)
Which of the
following is/are threats for electronic payment systems?
a)
Computer worms
b) Computer Virus
c)
Trojan horse
d) All of the above
164) 'Genetic Engineering ' is related
to
a)
Medical science b) Communication Technology c) Electrical Engineering d) Bio-technology
165)
A is
a computer program that can replicate itself and spread from one computer to another.
a)
Antivirus
b) Pen Drive
c)
Mouse
d) Computer Virus
166)
In computer security,.................... means that computer
system assets can be
modified only by authorized parities.
a)
Confidentiality
b) Integrity
c)
Availability
d)
Authenticity
167)
VIRUS stands for
a)
Very Intelligent
Result Until Source
b) Very Interchanged Resource Under Search
c) Vital
Information Resources Under Seize
d) Viral Important Record User Searched
168) In computer
security,..................... means
that the
information in a computer system
only be accessible for reading by authorized
parities.
a)
Confidentiality
b)
Integrity
c)
Availability
d)
Authenticity
169)
The type of threats on the security
of a computer system or network
are ……………………..
i) Interruption ii)Interception iii) Modification
iv) Creation v)Fabrication
a) i, ii, iii and iv only
b) ii, iii, iv and v only
c)
i, ii, iii and v only
d)
All
i, ii, iii, iv and v
170)
World Wide Web is
being standard by
a)
Worldwide
corporation
b) W3C
c)
World Wide Consortium
d) World Wide Web Standard
171)
The.............. is code that recognizes
some special sequence
of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
a)
Trap doors
b)
Trojan
horse
c)
Logic
Bomb
d)
Virus
172)
In computer
terminology, OCR stands for
a) Optical
Character Reader
b) Optical Card Reader
c)
Office Cash
Receiver
d) Online Computer Retrieval
173) The.............. is code embedded in some legitimate program
that is set to “explode” when certain conditions are met.
a) Trap doors
b)
Trojan
horse
c)
Logic Bomb
d) Virus
174)
Which among the
following is the first step of Research Process?
a)
Review of Literature
b) Collection of Data
c)
Editing and Coding
d) Selection of a problem
175)
programs can be used to accomplish functions
indirectly that an
unauthorized user could not accomplish directly.
a) Zombie
b) Worm
c) Trojan
Horses
d) Logic Bomb
176)
McAfee is an example of
a)
Photo Editing Software
b) Quick Heal
c)
Virus
d) Antivirus
177)
State
whether true of false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
a) True, False
b) False, True
c)
True, True
d) False, False
178)
Who among the
following is known as “The father of scientific management”?
a)
Frederich W. Taylor
b) Henry Fayol
c) Robert Owen
d) None of the above
179) Intruders is a most common security
threat which referred
as?
a)
Account Access
b) Data Access
c) Hacker or Cracker
d) Computer Access
180)
In processes, access
control implements a
a) Security Policy
b) Access Policy
c) Control Policy
d) Check Policy
181)
What is not a role
of encryption?
a)
It is used to
protect data from unauthorized access during
transmission.
b) It is used to ensure user authentication
c)
It is used to ensure
data integrity
d)
It is used to ensure data corruption does not happens
182)
Type of software
which is used to create slide show is
a)
Web design software
b) Presentation software
c)
Word-processing software
d) Spreadsheet software
183)
MSI stands for
a) Medium Scale
Integrated Circuits
b) Medium System Integrated
Circuits
c)
Medium Scale
Intelligent Circuit
d) Medium System Intelligent Circuit
184)
MICR stands for
a) Magnetic Ink
Character Reader
b) Magnetic Ink Code Reader
c)
Magnetic Ink Cases Reader
d) None
185)
EBCDIC stands for
a) Extended Binary
Coded Decimal Interchange Code
b) Extended Bit Code Decimal Interchange Code
c)
Extended Bit
Case Decimal Interchange Code
d) Extended Binary Case Decimal Interchange Code
186)
Content analysis
uses which of the below methods?
a)
Counting
b) Classifying
c)
Recording
d) All of the above
187)
Which of the
following is an example of primary data?
a) Book
b) Journal
c)
Field Report
d) Census Report.
188)
A study of the
culture in different societies is called –
a) Personality
b) Authropoly
c)
Perception
d) Attitudes
189)
What type of
resource is most likely to be a shared common resource in a computer Network?
a) Printers
b) Speakers
c)
Floppy disk drives
d) Keyboards
190)
Which of the
following is a part of the Central Processing
Unit?
a)
Printer
b) Key board
c)
Mouse
d) Arithmetic and
Logic Unit
191)
What is a brand?
a.
The name of companies that made computers
b.
The name of product
a company gives
to identify its product in market.
c. A name of class to indicate
all similar products
from different companies.
d. All of
the above.
192)
Which of the following is known as father of computer?
a. Dennis Ritchie.
b. Napier.
c.
Charless Babbage
d. Alam Turing
193)
The earliest calculating device is :
a. Calculator
b.
Abacus
c. Difference engine
d. Analytical engine
194)
First computer of the world
a. CRAY-1
b. PARAM
c. Tian
d. IBM-370
195)
Which of the following is the fastest type of
computer ?
a. Laptop
b. PC
c. Work station
d.
Super
computer
196)
First super computer developed in India is
a. PARAM
b. Aryabhatt
c. Buddha
d. Ram
197)
Computer’s basic architecture was developed by
a. John Von Neumann
b. Charles Babbage
c. Blaiscpascal
d. Jordan Murn
198)
Who invented Vaccumtubes ?
a. John Bardeen
b. William Shockley
c.
Lee de Forest
d. None of above
199)
The first general purpose electronic computer in
the world was
a. UNIVAC
b. EDVAC
c.
ENIAC
d. All of
the above
200)
The term ‘Computer’ is derived from
a. Greek language
b. Sanskrit language
c.
Latin language
d. German language
201)
SPSS
a. Statistics package for the social science
b. Software
package for system development
c. Software
package for editing
d. None of
the above
202)
Formula in Excel start with
a. %
b. =
c. +
d. –
203)
In Excel, a data series is define as what?
a. A type
of chart
b. A cell reference
c.
A
collection of related data
d. A
division of results
204)
Multiple calculations can be made in a single
formula using……
a. Standard Formula
b.
Array
Formula
c. Complex Formulas
d. Smart Formula
205)
Which chart can be created in Excel
a. Area
b. Line
c. Pie
d.
All of
the above
206)
Which of the following is not a term of MS-Excel?
a. Cells
b. Rows
c. Columns
d.
Document
207)
What type of commerce is enable by technology
a. Path-to-profitability
b.
E-commerce
c. EBuy
d. Internet
208)
What age group was born after the digital revolution?
a. Digital natives
b. Digital immigrants
c. Digital boomers
d. Web kids
209) When two companies are linked
together by computers and they send business transactions through these computer, they
are probably using-
a.
Digital wallets
b.
Electronic
data interchange
c. B2C
d. Smart cards
210) What is the term used when the government employs
technology to deal with citizens, businesses and other government agencies?
a. G2BC
b. Web
c. Consumer
d.
E-government
211) It is impossibleto proceed to the age of the steam-mill until one has passed through the age of
a.
The hand-mill.
b. The hydroelectric plant.
c. The steam-mill.
d. The nuclear power age.
212) The inventionof a steam engine (the aeolipile)was
a. Alexander Fleming.
b. Aldo Leopold.
c. Hero of Alexandria.
d. None of them.
213) The development of technical progress has always seemed intrinsically
a. Predictable.
b. Unpredictable.
c. Gradual.
d. Uneven.
214) For a ‘‘higher’’ stage of technology depends not alone on knowledgeor sheer skill but on
a. The division of labor.
b. The specialization of industry.
c.
Both
a. and b.
d. None of them.
215) Technology imposes certain characteristics upon the society in which it is found.
a. Social.
b. Political.
c. Cultural.
d. Both a. and b.
216) wrote in The German Ideology, ‘‘A certain mode of production, or industrial stage, is alwayscombined with a certain mode of cooperation, or social stage,’’
a. Karl Marx.
b. Rousseau.
c. Frank.
d. Alexander.
217) The Hierarchical Organization of Work Different technological apparatuses not onlyrequire different labor forces but different orders of
a. Supervision.
b. Co-ordination.
c.
Both
a. and b.
d. None of the above.
218) Who said that, ‘‘engineers have committed such blunders as saying thetypewriter brought women to work in offices, and with the typesetting machine madepossible the great modern newspaper, forgetting that in Japan there are women officeworkers and great modern newspapers getting practically no help from typewriters andtypesetting machines.’’
a. Marx.
b.
Gilfillan.
c. Roosevelt.
d. None of the above.
219) Technological Change Must Be Compatible with Existing
a. Social Conditions.
b. Economic Conditions.
c. Other institutions in society.
d. All of the
above.
220) Who said that what is needed is an understanding of technology from inside, both as a body of knowledgeand as a social system. Instead, technology is often treated as a ‘‘black box’’ whose contentsand behaviour may be assumed to be common knowledge.
a. Layton.
b. Rolston III.
c. Hume.
d. John Locke.
221) Scientific findings are to more than one interpretation.
a. Not open.
b. Open.
c. Static.
d. None of the above.
222) Technology _ has the power to help the billions of poor people all over the earth.
a. Not guided by ethics.
b.
Guided
by ethics.
c. Guided by Scientists.
d. None of the above.
223) Too much of technologytoday is making .
a. Toys for the rich.
b. Toys for the poor.
c. Toys for both rich and poor.
d. None of the above.
224) The sun, the genome, and _ are three revolutionaryforces arriving with the new century.
a. The Mobile.
b. The Computer.
c.
The internet.
d. None of the above.
225) What is one of the greatest evils in the world?
a. Rural poverty.
b. Dowry system.
c. Child marriage.
d. Caste system.
226) Poverty can be reduced by a combination of solar energy,
andthe internet.
a. Genetic engineering.
b. Cyber café.
c. Nanotechnology.
d. All of the above.
227) Solar energy is distributed overthe earth.
a. Unequally.
b. Equitably.
c. Same.
d. Evenly.
228) What can make solar energy usable everywhere for thelocal creation of wealth?
a. Internet.
b. Sun.
c. Genetic engineering.
d. None of the above.
229) What can provide people in every village withthe information and skillsthey need to develop their talents?
a. The solar system.
b.
The internet.
c. The Genome.
d. All of the above.
230) Solar energy is most abundant where it is most needed, in the
a. Countryside.
b. In the tropical countries.
c. Temperate latitudes.
d.
Both
a. and b.
Answer: (d) Both a. and b.
231) The technology of solar energy is still too expensivefor average
countriesto afford.
a. First world.
b. Third-world.
c. Both a. and b.
d. None of them.
232) There is enough to supply our needs many times over, if we can find away to use it.
a. Sunlight.
b. Internet.
c. Animals.
d. None of the above.
233) Sugar cane canbe fermented to make .
a. Methane gas.
b.
Alcohol.
c. Electricity.
d. All of the above.
234) Solar energy has not yetbeen used on a large scale for one simple reason: it is
a. Too expensive.
b. Too cheap.
c. Not much available.
d. All of the above.
235) Solar energy is expensive today because it has to be collected from large areas andwe do not yet have a technology that covers large areas
a. Easily.
b. Cheaply.
c. Conveniently.
d. None of the above.
236) What are the two main tools for collecting solar energy?
a.
Photoelectric
panels and energy crops.
b. Genetic engineering and internet.
c. Both a. and b.
d. None of the above.
237) Fuels produced from energy crops are .
a. Not storable.
b.
Storable.
c. Very weak.
d. All of the above.
238) Traditional farming has always been based on .
a.
Genetic engineering.
b. Solar harvesting.
c. Photosynthesis.
d. All of the above.
239) Alongside the human genome, what are other genomes beingsequenced?
a. Bacteria.
b. Yeast.
c. Worms.
d. All of the
above.
240) Before long we shall have sequenced the genomes of the major crop plants,
a. Wheat.
b. Maize.
c. Rice.
d. All of the
above.
241) The internet will allow people in remote places tomake
a. Business deals.
b. To buy and sell.
c. To keep in touch with their friends.
d. All of the
above.
242) Cheap solar energy and genetic engineering will provide the basis for primaryindustries in the countryside,
a. Modernized farming.
b. Mining.
c. Manufacturing.
d. All of the
above.
243) Ethics must guide technology in the direction of
a. Political justice.
b. Cultural justice.
c.
Social justice.
d. None of the Above.
244) Who said that, “The increased deployment of nuclear power facilities must lead societytoward authoritarianism. Indeed, safe reliance upon nuclear power as the principalsource of energy may be possible only in a totalitarian state.”
a. Mumford.
b.
Denis Hayes.
c. Louise.
d. None of the above.
245) Who said that ‘‘dispersed solar sources are more compatible than centralized technologies withsocial equity, freedom and cultural pluralism.’’
a. Mumford.
b. Denis Hayes.
c. Louise.
d. None of the above.
246) The factory system,automobile, telephone, radio, television, space program and nuclear powerhave all at one time or another been described as
a. Democratizing forces.
b. Liberating forces.
c. Mobilizing forces.
d. Both a. and b.
247) It is obvious that technologies can be used in ways that enhance the
of some over others, for example, the use of television to sell acandidate.
a. Power.
b. Authority.
c. Privilege.
d. All of the
above.
248) Who wrote the little essay ‘‘On Authority’’ in 1872?
a. Friedrich
Engels.
b. Karl Marx.
c. Rousseau.
d. None of the above.
249) Who said that the roots of unavoidable authoritarianism are deeply implanted in the human involvementwith science and technology?
a. Karl Marx.
b.
Friedrich Engels.
c. Immanuel Kant.
d. John Locke.
250) The atom bomb is an inherently a
a. Political
artifact.
b. Social artifact.
c. Cultural artifact.
d. Economical artifact.