Society and Technology (Soft Study Course)
Semester: 6th
Semester 2021
1. What is a brand?
a. The name of companies that made computers
b. The name of product a company gives to
identify its product in market.
c. A name of class to indicate all similar products from different companies.
d. All of the above.
Answer: (b) The name of product a company gives to identify its product in market.
2. Which of the following is known as father of computer?
a. Dennis Ritchie.
b. Napier.
c. Charless
Babbage
d. Alam Turing
Answer: (c) Charless Babbage
3. The earliest calculating device is :
a. Calculator
b. Abacus
c. Difference engine
d. Analytical engine Answer: (b) Abacus
4. First computer of the world
a. CRAY-1
b. PARAM
c. Tian
d. IBM-370
Answer: (a) CRAY-1
5. Which of the following is the fastest type of computer ?
a. Laptop
b. PC
c. Work station
d. Super computer
Answer: (d) Super computer
6. First super computer developed in India is
a. PARAM
b. Aryabhatt
c. Buddha
d. Ram
Answer: (a) PARAM
7. Computer’s basic architecture was developed by
a. John Von
Neumann
b. Charles Babbage
c. Blaiscpascal
d. Jordan Murn
Answer: (a) John Von Neumann
8. Who invented Vaccumtubes ?
a. John Bardeen
b. William Shockley
c. Lee de Forest
d. None of above
Answer: (c) Lee de Forest
9. The first general purpose electronic computer in the world was
a. UNIVAC
b. EDVAC
c. ENIAC
d. All of the above Answer: (c) ENIAC
10. The term ‘Computer’ is derived from
a. Greek language
b. Sanskrit language
c. Latin language
d. German language
Answer: (c) Latin language
11. SPSS
a. Statistics package for the social science
b. Software package for system development
c. Software package for editing
d. None of the above
Answer: (a) Statistics package for the social science
12. Formula in Excel start with
a. %
b. =
c. +
d. –
Answer: (b) =
13. In Excel, a data series is define as what?
a. A type of chart
b. A cell reference
c. A collection of related data
d. A division of results
Answer: (c) A collection of related data
14. Multiple calculations can be made in a single formula using……
a. Standard Formula
b. Array Formula
c. Complex Formulas
d. Smart Formula
Answer: (b) Array Formula
15. Which chart can be created in Excel
a. Area
b. Line
c. Pie
d. All of the
above
Answer: (d) All of the above
16. Which of the following is not a term of MS-Excel?
a. Cells
b. Rows
c. Columns
d. Document
Answer: (d) Document
17. What type of commerce is enable by technology
a. Path-to-profitability
b. E-commerce
c. EBuy
d. Internet
Answer: (b) E-commerce
18. What age group was born after the digital revolution?
a. Digital natives
b. Digital immigrants
c. Digital boomers
d. Web kids
Answer: (a) Digital natives
19. When two companies are linked together by computers and they send business transactions through these computer, they are probably using-
a. Digital wallets
b. Electronic data interchange
c. B2C
d. Smart cards
Answer: (b) Electronic data interchange
20. What is the term used when the government employs technology to deal with citizens, businesses and other government agencies?
a. G2BC
b. Web
c. Consumer
d. E-government
Answer: (d) E-government.
21. It is impossibleto proceed
to the age of the steam-mill until one has passed through the age of
a. The hand-mill.
b.
The hydroelectric plant.
c.
The steam-mill.
d.
The nuclear power age. Answer: (a) The
hand-mill.
22. The inventionof a steam
engine (the aeolipile)was
a.
Alexander Fleming.
b.
Aldo Leopold.
c. Hero of Alexandria.
d. None of them.
Answer: (c) Hero of Alexandria.
23. The development of technical
progress has always seemed intrinsically
a. Predictable.
b.
Unpredictable.
c.
Gradual.
d.
Uneven.
Answer: (a) Predictable.
24. For a ‘‘higher’’ stage of
technology depends not alone on knowledgeor sheer skill but on
a.
The division of labor.
b.
The specialization of industry.
c. Both a. and b.
d.
None of them.
Answer: (c) Both a. and b.
25. Technology imposes
certain characteristics
upon the society in which it is found.
a.
Social.
b.
Political.
c.
Cultural.
d. Both a. and b.
Answer: (d) Both a. and b.
26. wrote in The German Ideology, ‘‘A certain mode of
production, or industrial stage, is alwayscombined with a certain mode of cooperation,
or social stage,’’
a. Karl Marx.
b.
Rousseau.
c.
Frank.
d.
Alexander.
Answer: (a) Karl Marx.
27. The Hierarchical
Organization of Work Different technological apparatuses not onlyrequire
different labor forces but different orders of
a.
Supervision.
b.
Co-ordination.
c. Both a. and b.
d.
None of the above. Answer: (c) Both a. and b.
28. Who said that, ‘‘engineers
have committed such blunders as saying thetypewriter brought women to work in
offices, and with the typesetting machine madepossible the great modern
newspaper, forgetting that in Japan there are women officeworkers and great
modern newspapers getting practically no help from typewriters andtypesetting machines.’’
a.
Marx.
b. Gilfillan.
c.
Roosevelt.
d.
None of the above. Answer: (b) Gilfillan.
29. Technological Change Must Be
Compatible with Existing
a.
Social Conditions.
b.
Economic Conditions.
c.
Other institutions in society.
d. All of the above.
Answer: (d) All of the above.
30. Who said that what is needed
is an understanding of technology from inside, both as a body of knowledgeand
as a social system. Instead, technology is often treated as a ‘‘black box’’
whose contentsand behaviour may be assumed to be common knowledge.
a. Layton.
b. Rolston III.
c.
Hume.
d.
John Locke. Answer: (a) Layton.
31. Scientific findings
are to more
than one interpretation.
a.
Not open.
b.
Open.
c.
Static.
d.
None of the above. Answer:
(b) Open.
32. Technology _ has the power to help
the billions of poor people all over the earth.
a.
Not guided by ethics.
b. Guided by ethics.
c.
Guided by Scientists.
d.
None of the above.
Answer: (b) Guided by ethics.
33. Too much of technologytoday is making .
a. Toys for the rich.
b.
Toys for the poor.
c.
Toys for both rich and poor.
d.
None of the above.
Answer: (a) Toys for the rich.
34. The sun,
the genome, and are
three revolutionaryforces arriving with the new
century.
a.
The Mobile.
b.
The Computer.
c. The internet.
d.
None of the above. Answer: (c) The internet.
35. What is one of the greatest
evils in the world?
a. Rural poverty.
b.
Dowry system.
c. Child marriage.
d.
Caste system.
Answer: (a) Rural poverty.
36. Poverty can be reduced by a
combination of solar energy, andthe internet.
a. Genetic engineering.
b.
Cyber café.
c.
Nanotechnology.
d.
All of the above.
Answer: (a) Genetic engineering.
37. Solar energy is distributed
overthe earth.
a.
Unequally.
b.
Equitably.
c.
Same.
d.
Evenly.
Answer: (b) Equitably.
38. What can make solar energy
usable everywhere for thelocal creation of wealth?
a.
Internet.
b.
Sun.
c. Genetic engineering.
d.
None of the above.
Answer: (c) Genetic engineering.
39. What can provide people in
every village withthe information and skillsthey need to develop their talents?
a.
The solar system.
b. The internet.
c.
The Genome.
d.
All of the above. Answer: (b) The internet.
40. Solar energy is most
abundant where it is most needed, in the
a.
Countryside.
b.
In the tropical countries.
c.
Temperate latitudes.
d. Both a. and b.
Answer: (d) Both a. and b.
1. The technology of solar
energy is still too expensivefor average countriesto afford.
a.
First world.
b. Third-world.
c.
Both a. and b.
d.
None of them.
Answer: (b) Third-world.
2. There is enough to supply our needs many times
over, if we can find away to use it.
a.
Sunlight.
b. Internet.
c.
Animals.
d.
None of the above. Answer:(a) Sunlight.
3. Sugar cane canbe fermented to make
.
a.
Methane gas.
b. Alcohol.
c.
Electricity.
d.
All of the above. Answer: (b) Alcohol.
4. Solar energy has not yetbeen
used on a large scale for one simple reason: it is
a. Too expensive.
b.
Too cheap.
c.
Not much available.
d.
All of the above.
Answer: (a) Too expensive.
5. Solar energy is expensive
today because it has to be collected from large areas andwe do not yet have a
technology that covers large areas
a. Easily.
b.
Cheaply.
c. Conveniently.
d.
None of the above. Answer: (b) Cheaply.
6. What are the two main tools
for collecting solar energy?
a. Photoelectric panels and energy crops.
b.
Genetic engineering and internet.
c.
Both a. and b.
d.
None of the above.
Answer: (a) Photoelectric panels and energy crops.
7. Fuels produced from energy crops are
.
a.
Not storable.
b. Storable.
c.
Very weak.
d.
All of the above. Answer: (b) Storable.
8. Traditional farming has
always been based on .
a. Genetic engineering.
b.
Solar harvesting.
c.
Photosynthesis.
d.
All of the above.
Answer: (a) Genetic engineering.
9. Alongside the human genome,
what are other genomes beingsequenced?
a. Bacteria.
b.
Yeast.
c.
Worms.
d. All of the above.
Answer: (d) All of the above.
10. Before long we shall have
sequenced the genomes of the major crop plants,
a.
Wheat.
b.
Maize.
c.
Rice.
d. All of the above.
Answer: (d) All of the above.
11. The internet will allow
people in remote places tomake
a. Business deals.
b.
To buy and sell.
c.
To keep in touch with their friends.
d. All of the above.
Answer: (d) All of the above.
12. Cheap solar energy and
genetic engineering will provide the basis for primaryindustries in the countryside,
a.
Modernized farming.
b. Mining.
c.
Manufacturing.
d. All of the above.
Answer: (d) All of the above.
13. Ethics must guide technology
in the direction of
a.
Political justice.
b.
Cultural justice.
c. Social justice.
d.
None of the Above. Answer: (c)Social
Justice.
14. Who said that, “The
increased deployment of nuclear power facilities must lead societytoward
authoritarianism. Indeed, safe reliance upon nuclear power as the
principalsource of energy may be possible only in a totalitarian state.”
a.
Mumford.
b. Denis Hayes.
c.
Louise.
d.
None of the above. Answer: (b) Denis Hayes.
15. Who said that ‘‘dispersed
solar sources are more compatible than centralized technologies withsocial
equity, freedom and cultural pluralism.’’
a. Mumford.
b. Denis Hayes.
c.
Louise.
d. None of the above.
Answer: (b) Denis Hayes.
16. The factory
system,automobile, telephone, radio, television, space program and nuclear
powerhave all at one time or another been described as
a.
Democratizing forces.
b.
Liberating forces.
c.
Mobilizing forces.
d. Both a. and b.
Answer: (d) Both a. and b.
17. It is obvious that technologies can be used in ways that enhance
the of
some over others, for example, the use of television to sell acandidate.
a.
Power.
b. Authority.
c.
Privilege.
d. All of the above.
Answer: (d) All of the above.
18. Who wrote the little essay
‘‘On Authority’’ in 1872?
a. Friedrich Engels.
b.
Karl Marx.
c.
Rousseau.
d.
None of the above.
Answer: (a) Friedrich Engels.
19. Who said that the roots of
unavoidable authoritarianism are deeply implanted in the human involvementwith
science and technology?
a.
Karl Marx.
b. Friedrich Engels.
c.
Immanuel Kant.
d.
John Locke.
Answer: (b) Friedrich Engels.
20. The atom bomb is an
inherently a
a. Political artifact.
b.
Social artifact.
c.
Cultural artifact.
d.
Economical artifact. Answer: (a) Political artifact.
21. Who was the famous
inventorof the first reading machine for the
blind?
a. Ray Kurzweil.
b.
Friedrich Engels.
c.
Karl Marx.
d.
Hume.
Answer: (a) Ray Kurzweil.
22. Who wrote “The Age of
Spiritual Machines”?
a. Ray Kurzweil.
b. Hume.
c.
Frank.
d.
None of the above. Answer: (a) Ray Kurzweil.
23. ‘‘Anything that can go
wrong, will’’ whose law is it?
a. Finagle’s law.
b.
Ray Kurzweil’s law.
c.
Friedrich Engels’ law.
d.
None of the above. Answer: (a) Finagle’s law.
24. Who wrote the book “Robot:
Mere Machine to Transcendent Mind”?
a. Finagle.
b. Moravec.
c.
Engels.
d.
Marx.
Answer: (b) Moravec.
25. What are the most compelling
21st-century technologies?
a.
Robotics.
b.
Genetic engineering.
c.
Nanotechnology.
d. All of the above.
Answer: (d) All of the above.
26. Who said that in the game of
life and evolution there are three players at the table: human beings, nature,
and machines?
a. George Dyson.
b.
Engels.
c.
Marx.
d.
None of them.
Answer: (a) George Dyson.
27. Genetic engineering promises
to revolutionize agriculture by
a.
Increasing crop yields.
b.
Reducing the use of pesticides.
c. Creating tens of thousands
of novel species of bacteria,plants, viruses, and animals.
d. All of the above.
Answer: (d) All of the above.
28. The effort to build the
first atomic bomb was led by the brilliant
physicist .
a. J. RobertOppenheimer.
b.
Rousseau.
c.
John Locke.
d.
Hume.
Answer: (a) J. Robert Oppenheimer.
29. Who wrote the book “Visions
of Technology”?
a. Richard Rhodes.
b.
Robert Oppenheimer.
c.
Aristotle.
d.
Descartes.
Answer: (a) Richard Rhodes.
30. Who said, ‘‘We do not ride
on the railroad; it rides upon us’’?
a.
Richard Rhodes.
b.
Aristotle.
c. Thoreau.
d.
None of them. Answer: (c) Thoreau.
31. Cybercrime is also known as
a. Computer crime
b.
Network crime
c. Surfing crime
d. Digital crime.
Answer: (a) Computer crime
32. Cybercrime that involves
a. A computer and a network
b.
A computer and a website
c. A computer and a computer expert.
d. All of the above.
Answer: (a). a computer and a network .
33. The device of cybercrime is
a. Internet.
b. (b). emails
c. Mobile phones.
d. All of the above.
Answer: (d). all of the above.
34. Activity crossing international borders and involving the interests of
at least one nation state is sometimes referred to as
a. Cyber warfare.
b.
Cybercrime.
c. Financial crime.
d.
None of all these. Answer: (a) Cyber
warfare.
35. “Cyber-crime against women”
is a motive to intentionally harm the victim
a. Psychologically.
b. Physically.
c. Emotionally.
d. All of the above.
Answer: (d).all of the above.
36. Juniper Research estimated
that the costs of cybercrime could be as high as 2.1 trillion by a. 2018.
b. 2019.
c. 2017.
d. 2020.
Answer: (b) 2019.
37. Computer fraud refers
a. Bank Fraud.
b. Carding.
c. Theft of Classified Information.
d. All of the above.
Answer: (d). all of the above.
38. Someone who intimidates or coerces a government or organization to
advance his or her political or
social objectives by launching a computer-based attack against computers,
networks, or the information stored on them is
called
a. A cyber-terrorist.
b.
A cyber theft.
c. A terrorist.
d.
None of the these. Answer: (a)A cyber-terrorist.
39. Cyberterrorism in general, as an act of terrorism committed through the
use of cyberspace or computer
resources is defined by
a. DebaratiHalder.
b. K. Jaishankar.
c.
Parker.
d.
Kramer. Answer:(c). Parker.
40. Phishing is mostly propagated via
a. Email.
b.
Internet
c. Computer
d.
Mobile Answer:(a) Email.
41. One area of Internet pornography that has been the target of
the strongest efforts at curtailment is
a. Adult pornography.
b. Women pornography.
c. Child pornography.
d.
None of the above. Answer: (c) Child pornography.
42. The dark web site silk road
was a major online marketplace for
a. Terrorism.
b. Drugs.
c.
Pornography.
d.
Computer.
Answer:(b)Drugs.
43. A European wide Data Retention Directive (applicable to all EU member states) states that all E-mail traffic
should be retained for a minimum of
a. 13 months.
b. 10 months.
c. 11 months.
d. 12 months.
Answer:(d) 12 months.
44. The process of preventing
and detecting unauthorized use of computer is known as
a. Internet security.
b. Cyber security.
c. Computer security.
d.
All of the above. Answer:(c) Computer
security.
45. Computer security is needed for
a. Prevention of work related documents.
b. Prevention of data theft.
c. Prevention of bank accounts.
d. All of the above.
Answer: (d)All of the above.
46. World Intellectual Property
will organize on
a. 26th June.
b. 26th May.
c. 26th April.
d.
All of the above. Answer: (c) 26th April.
47. Responsible computing can be
defined as
a. Lawful use of computing and
information resources.
b. Respect the right of others.
c. Never create problems by
using virus.
d. All of the above.
Answer: (d)All of the above.
48. Creations of the mind, such as inventions; literary and artistic works;
designs; and symbols, names an and
images used in commerce is known as
a. Intellectual property.
b.
Personal property.
c. Computer property.
d. None of the above.
Answer: (a). intellectual property.
49. Intellectual property is
protected in law by, for example
a. Patents.
b. Copyright.
c. Trademarks.
d. All of the above.
Answer: (d) All of the above.
50. Intellectual Property system
aims to foster an environment in which
a. Creativity and innovation can flourish.
b.
Creativity can flourish.
c. Innovation can flourish.
d. Motivation can flourish.
Answer: (a)Creativity and innovation can flourish.
51. Types of intellectual
property are
a. Copyright.
b. Patents.
c. Trademark.
d. All of the above.
Answer: (d) All of the above.
52. The objectives of
intellectual property law is
a. Financial incentive.
b. Economic growth.
c. Morality.
d. All of the above.
Answer: (d) All of the above.
53. In cybercrime the computer may
have been used
a. In the commission of a crime.
b. It may be the target.
c. In the commission of a crime, or it may be the target.
d.
None of the above.
Answer: (c) In the commission of a crime, or it may be the target.
54. DebaratiHalder and K.
Jaishankar define cybercrimes as: "Offences that are committed against
a. Individuals.
b. Group of individuals.
c. None of the above.
d. Both (a) and (b).
Answer: (d)Both (a) and (b).
55. The motive of cybercrime is
a. Intentionally harm the
reputation of the victim.
b. Physically harm.
c. Mentally harm.
d. All of the above.
Answer: (d). all of the above
56. The only way to solve social
issues caused by the rise of technology is
a. Good citizenship in the
internet community.
b. Academic excellency.
c. Computer experts.
d. Only (a)
Answer: (d)Only (a).
57. Major computer crime can be
categorized into
a. Four.
b.
Five.
c. Two.
d.
None of the above. Answer: (a)Four.
58. Internal computer crime
includes
a. Trojan horses.
b. Logic bombs.
c. Worms and viruses.
d. All of the above.
Answer:(d)All of the above.
59. Hacking is a
a. Cybercrime.
b. Internal computer crime.
c. Telecommunications crime.
d.
All of the above.
Answer: (c) Telecommunications crime.
60.
The most common form of computer crime
is
a. Bank and credit card fraud.
b. Terrorism.
c. Hacking.
d.
All of the above. Answer: (c) Hacking.
61. Who was called the father of computer?
a) J. Presper Eckert b) John W. Mauchly
c) Charles Babbage d) Clifford Berry
62. Which of the following are the parts of Computer Hardware?
a) Keyboards b) Printers
c) Motherboard d)
All of the above
63. What is business ethics?
a) The study of business situations,
activities, and decisions where issues of right and wrong are addressed
b) Defined as decisions organisations make on issues that could be considered right or wrong
c) Ethics that can be applied to an organisation’s practises
d) Ethical processes businesses use in order to achieve a good ethical standard
e)
64. Define morality-
a) What is considered as correct within a society
b) Making the right decision's where there is a chance to do wrong
c) Defining what is right and wrong for an
individual or a community
d) Where individuals have a conscious choice to make a right and ethical decision
65. According to Utilitarianism theory-
a) an action is morally right if it results in the greatest amount of good for the greatest amount of people affected by the action
b) an action is morally right if results in the most amount of good possible in the given situation.
c) an action is if you do a whole lotta good
d) an action is morally right if it results in the least amount of negativity possible
66.
A byte consists of
how many bits?
a) 16 b) 4
c) 2 d) 8
67. Which is the research methods used in computer sciences?
a) Experimental method b) Survey method
c) Qualitative method d)
All the
above
68. What are ethical theories?
a) Ethical theories are conduct that should be followed in order to have good ethical practise.
b) Ethical theories are the rules and
principles that determine right and wrong for any given situation.
c) Ethical theories are ancient hypothesis on how to create good business practise.
d) Ethical the 0ries give guidelines on how to achieve a good corporate image.
69. Pirating software is an example of violating:
a) Morals b) Ethics
c) Laws d) Character
70. Which is a model of management ethics?
a) Moral Management b) Immoral Management
c) Amoral
Management d)
All of the above
71. What are the threats to privacy in privacy encroachment issues?
a) Public Information Availability b) Commercial Compromise of Privacy
c) Government
compromise of Privacy d) All of the
above
72. In
which year was chip used inside the computer for the first time? a) 1964 b) 1975
c) 1999 d) 1944
73. The main purpose of research in education is to
a) Help in the personal growth of an individual b) Help the candidate become an eminent educationist
c) Increase job prospects of an individual d) Increase social status of an individual
74. The data of research is
a) Qualitative only b) Quantitative only
c) Both (a) and (b) d) Neither (a) nor (b)
75. Which of the following approaches says that ethical issues should be judged on the basis of some universal code?
a) Deontological b) Ethical skepticism
c) Utilitarianism d) None of them
76. Socially responsible behaviour
a) never leads to improved financial performance b) has adverse impact on stakeholders
c) is in a firm’s self-interest d) results in ill-will from the community
77. Who designed the basic design called Analytical Engine based on which computers are made today?
a) Clifford
Berry b)
Charles
Babbage
c) John W. Mauchly d) J. Presper Eckert
78. What does Simulation Research Method investigate?
a) It makes predictions and study performances
b) It Studiesorganizational and social phenomena in the social and cultural contexts.
c) It identifies issues and problems previously unrecognized.
d) It collects information about the population from the drawn sample.
79. What is research?
a) Searching again and again b) Finding solution to any problem
c) Working in a scientific way to search for d) None of the above
truth
of any problem
80. Modern supercomputers and minicomputers, accessed by network are called
a) Desktop Computers b) Laptops
c) Servers d) Micro Computer
81. Every letter of computer is referred to as
a) Bit b) Alphabet
c) Nibble d) Number
82. Which are the advantages of simulation?
a) Results are accurate in general, compared to analytical model
b) Help to find un-expected phenomenon, behavior of the system
c) Easy to perform ``What-If'' analysis
d) All of the
above
83. Which one is not a key branch of ethics?
a) Performative ethics b) Normative ethics
c) Applied ethics d) Descriptive ethics
84. Which one falls under the cognitivist metaethical theories?
a) Emotivism b) Imperativism
c) Supernaturalism d) Prescriptivism
85. Who invented ethics of duty?
a) Wilson, H b) Wilson, I
c) Kant,
H d)
Kant,
I
86. John Locke’s Ethic’s of Rights-
a) Right to life, liberty, justice and property b) Right to life, safety and shelter
c) Right to safety, esteem, self-actualisation, d) Right to life and justice
and psychological needs
87. Ethics & Law overlap. This is called…
a) Yellow area b) White area
c) Black area d)
Grey area
88. The fraudulent practice of sending emails purposing to be from reputable companies in order to induce individuals
to reveal personal information (Credit or Debit card) details is called-
a) Hot swapping of devices b) Pharming
c) Phishing d) None
89. Who is the author of ‘The Rise of the Network Society’?
a) Anthony Giddens b)
Manuel
Castells
c) Immanuel Wallerstein d) Thomas L. Friedman
90. Consequentialism/Teleological-
a) Decisions are established based on previous consequences and results from past actions
b) Focus on the outcomes/ consequence of
ethical decisions, not on moral principles.
c) Focuses on the intrinsic goodness or value of an action
d) Consequences of competitor actions determine your actions
91. Virtue Ethics…
a) Assumes good businesses will make good decisions
b) Assumes good governments will enforce good ethical practices on their businesses
c) Assumes good persons will make good
decisions and personal qualities affect
decisions
d) Assumes good persons will make good decisions but it has nothing to do with personal qualities.
92. Which country introduced Smart Health Care Card in large scale for the first time?
a) France b) India
c) USA d) China
93. Electronic
discovery (“e-discovery”) refers to
a) Discovery in Electronic Affairs for Storing Information
b) Discovery in Civil Litigation with
Electronically Stored Information
c) Discovery in outlining Electronic evidence
d) Discovery in accounting databases and websites
94. Which organization developed Telemedicine facility at Remote CHC/PHC in Tripura?
a) WECS, Kolkata b) SGPGI, Lucknow
c) CDAC, Mohali d) CDAC, Pune
95. Which of the following is known as Malicious software
a) illegalware b) badware
c) malware d) maliciousware
96. Key logger is a
a) Firmware b) Antivirus
c) Spyware d) All of the Above
97. To protect yourself from computer hacker, you should turn on a
a) Script b) Firewall
c) VLC d) Antivirus
98. The term “ Intellectual Property Rights” covers
a) Copyrights b) Know-how
c) Trade dress d) All of the
above
99. The following can be patented
a) Machine b) Process
c) Composition of matter d) All of the
Above
100. The agreement that is enforceable by law is known as
a) Valid agreement b) Void agreement
c) Illegal agreement d) Unenforceable agreement
101. A is a TCP name for a transport service access point.
a) port b) pipe
c) node d) none of the mentioned
102. Which device is required for the Internet connection?
a) Joystick b) Modem
c) CD Drive d) NIC Card
103. The first web browser is
a) Mosaic b) Netscape
c) Internet explorer d) Collabra
104. What is the term that describes a gap in terms of access to and usage of information and communication technology?
a) Digital
Information b)
Digital
Divide
c) Digital Hub d) Digital Technology
105. What is ‘metadata’?
a) Data about the IT b) Data about the Informatics
c) Data about the tools and methods d) Data about the data
106. Which is not among the major factors responsible for successful implementation and sustenance of ICT projects for social development?
a) Degree of efficiency and transparency
demonstrated in citizen services
b) Extent of reduction in cost and improvement of convenience for citizens
c) Extent of reengineering and improvement of back-end services
d) Degree of autocracy and informative step from the state authority.
e)
107. Which of the following is Pre-archival Processing Tool?
a) e-SANGRAHAN b) e-RUPANTAR
c) DATÄ€NTAR d) e-Goshwara
108. Ethical hackers who use their skill to secure the integrity of computer systems or networks is called-
a) Black
Hat b)
White
Hat
c) Green Hat d) None.
109. In India, the literary work is protected until
a) Lifetime of author b) 25 years after the death of author
c) 40 years after
the death of author d)
60 years after the death of author
110. Symbol of Maharaja of Air India is
a) Copyright b) Patent
c) Trademark d) All of the above
151------- is the measurement of things such as fingerprints and retinal scans used for security access.
a) Biometrics b) Bio measurement
c) Computer security d) Smart weapon machinery
152. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-
a) Hacker b) spammer
c) instant messenger d) programmer
153. Who wrote the book ‘Small is Beautiful: A Study of Economics As If People Mattered’ (1973)?
a) Albert Einstein b) Ivan Illch
c) E. F. Schumacher d) Amartya Sen
154. When did Cyber Law, The Information Technology (Amendment) Act have been passed?
a) June, 2008 b)
February, 2009
c) July, 2010 d) March, 2008
155. Which of the following searches websites by keyword(s)?
a)
ndif]-->Web bugs b)
Search
engine
c) Spyware d) Portals
156. ICT is a blend of
a) IT and telecommunication b) Technology and communication
c) Codes and information d) IT and social networking
157. The following is (are) the most effective ways of communication.
a) Verbal b)
Non verbal
c) Written d) All of the above
158. The of business letter is called layout.
a) Body b) Content
c) Pattern d) All of the above
159. Which of the following is true about civil liberties?
a) They are constitutionally established guarantees against government interference.
b) They are positive acts of government designed to protect individual liberties.
c) The term applies to both constitutionally established guarantees against government interference, and positive acts of government designed to protect individual liberties.
d) None of the above
160. Which of the following is not the Statutory organization of (Ministry of Electronics and Information Technology) MeitY?
a) CAT b) UIDAI
c) CCA d) ICERT
161.
Method
used to transfer information to far off places instantly is called
i)
Information technology
ii) Language
iii)
Data
iv)
Telecommunication
162. ICT is a blend of
i)
IT and telecommunication
ii)
Technology
and communication
iii)
Codes
and information
iv) IT and social networking
163. Software are referred to as
i) Hardware
ii)
Computer programs
iii)
Binary data
iv)
Procedure
164. In Computer terminology processed data
is called
i) Binary
data ii) Information
iii)
Language iv) Code
165. This invention replaced
vacuum tubes and made computers much smaller and faster. However, it was
eventually replaced by another invention
(i)
RAM (ii) ENIAC (iii) Transformer (iv) Transistor.
166. On the basis of time, research can be
classified as,
(i) Qualitative versus Quantitative
(ii)
Pure
versus applied research
(iii)
Cross-sectional versus longitudinal research
(iv)
None
of the above
167. Research is basically-
(i) A methodology of enquiry
(ii)
Search
of truth
(iii)
A
systematic exploration of facts
(iv)
All of the above
168. Social research can be divided into-
(i) Two
categories
(ii) Three
categories
(iii)
Four
categories
(iv)
Five categories
169. This person created
a machine called The Analytical Engine. His ideas were some of the first that
led to the creation of computers.
(i)
Simon Konrad (iii) John
Lovelace
(ii)
Charles Babbage (iv)
William Howard
170.
Research
design is-
(i) A plan
(ii)
A structure
(iii)
A strategy
(iv) All
of these
171. This invention was 1,000 times
faster than any machine built before it. It was so big that it could fill up a
house.
(i) Apple
I
(ii) ENIAC
(iii)
Windows
(iv)
Z3
172.
Which
of the following Researches emphasise primarily the factual aims?
(i) Philosophical researches
(ii)
Historical researches
(iii) Theoretical researches
(iv)
Behavioural researches
173. The aims of research is/are
(i) verification
(ii)
fact finding
(iii)
theoretical development
(iv)
All of the above
174. Which of the following is the first step
in starting the research process?
(i)
Searching
sources of information to locate problem.
(ii)
Survey
of related literature
(iii)
Identification of problem
(iv)
Searching
for solutions to the problem
175.
One
of the following is not a survey method
(i)
Personal interview
(ii)
Telephone interview
(iii)
Mail interview
(iv)
Structured observation
176.
How
many models are for technological innovation-
(i) Two (ii) Three
(iii)
Four (iv) None
of the above
177.
ICT
systems consists of-
(i)
Enable sensing
(ii) Visualizing
(iii)
Storing
and computing
(iv)
All of the above
178. Bibliography given in a research
report
(i) Helps those interested in further
research and studying the problem
(ii)
Makes
the report authentic
(iii)
Both (i) & (ii)
(iv)
None
of the above
179.
The
data of research is-
(i)
Qualitative only
(ii)
Quantitative only
(iii)
Both (i) and (ii)
(iv)
Neither
(i) nor (ii)
180.
Inductive
reasoning is-
(i)
Data
collection analysis method
(ii) Theory data collection analysis method
(iii)
Data
collection method
(iv)
Both (i) and (ii)
181.
Research
design of a study should not include
(i)
Objectives
(ii) Hypothesis
(iii)
Findings
(iv)
Blue
print of Research
182.
The
first page of the research report is-
(i)
Acknowledgement Page
(ii) Index
Page
(iii)
Title
Page
(iv)
None
of the above
183.
Factors
that create the digital divide-
(i)
Economic
& Geographical
(ii) Technological
(iii)
Social
& Cultural
(iv)
All of the above
184. Field study is related to
(i)
Real life situations
(ii) Experimental situations
(iii) Laboratory situations
(iv) None of the above
185.
Questionnaire
is a
(i)
Research method
(ii)
Measurement technique
(iii)
Data collection technique
(iv)
None
of the above
(v)
186.
Quantitative
data refers to
(i) Graphs and tables
(ii)
Any
data you present in your report
(iii) Statistical analysis
(iv)
Numerical data that could be useful to
answer your research question(s) and to meet your
Objectives
187.
Data
collection can be done through
(i)
Interview
(ii) Questionnaires
(iii)
Through
E-Mail or by Telephone
(iv) All
of the above
(v)
188.
Independent
variables are not manipulated in
(i)
Normative researches
(ii)
Ex-post
facto researches
(iii)
Both of the above
(iv)
None
of the above
189. A hypothesis is a
(i) tentative
statement whose validity is still to be tested
(ii) statement of fact
(iii) supposition which is based on the past experiences
(iv) All of the above
190. Action research means
(i) a longitudinal research
(ii) an applied research
(iii) research
which are initiated to solve the immediate problems
(iv)
All
of the above
191. In
computer security, means that computer system
assets can be modified only by authorized parities.
i)
Confidentiality
ii)
Integrity
iii)
Availability
iv)
Authenticity
192.
Which
of the following is independent malicious program that need not any host program?
i)
Trap
doors
ii)
Trojan horse
iii)
Virus
iv) Worm
193.
Verification
of a login name and password is known as
i)
Configuration
ii) Accessibility
iii)
Authentication
iv)
logging in
194.
The
common name for the crime of stealing passwords is
i)
Jacking
ii)
Identify Theft
iii)
Spoofing
iv)
Hacking
35. Which of the following is/are threats
for electronic payment systems?
i)
Computer worms
ii) Computer virus
iii)
Trojan horse
iv)
All of the above
196. The term 'Intellectual Property
Rights' covers
i) Copyrights
ii)
Know-how
iii)
Trade dress
iv)
All of the above
197. The following can not be exploited by
assigning or by licensing the rights to others.
i)
Patent
ii)
Designs
iii)
Trademark
iv)
All
of the above
198. The altering of data so that it is not
usable unless the changes are undone is
i)
Ergonomics
ii) Compression
iii)
Biometrics
iv)
Encryption
199.
is the measurement of things such as
fingerprints and retinal scans used for security access.
i)
Biometrics
ii) Bio
measurement
iii)
Computer security
iv)
Smart
weapon machinery
200.
Code
red is a(n)
i)
Word
Processing Software
ii)
Antivirus
iii)
Virus
iv)
Photo
Editing Software
****** NB : (1) Answer Key are given highlighted in Bold Mark.
(2) Question Banks are prepared and uploaded as received from various colleges.
(3) If any error in the Questions & answer keys University would not have any liability.