Type Here to Get Search Results !

Society and Technology (Soft Study Course) most important & expected questions and answers 2021


Society and Technology (Soft Study Course) 
Semester: 6th Semester 2021

Question Bank

 

 

 

1.      What is a brand?

a.       The name of companies that made computers

b.      The name of product a company gives to identify its product in market.

c.       A name of class to indicate all similar products from different companies.

d.      All of the above.

Answer: (b) The name of product a company gives to identify its product in market.

 

2.      Which of the following is known as father of computer?

a.       Dennis Ritchie.

b.      Napier.

c.       Charless Babbage

d.      Alam Turing

Answer: (c) Charless Babbage

 

 

3.      The earliest calculating device is :

a.       Calculator

b.      Abacus

c.       Difference engine

d.      Analytical engine Answer: (b) Abacus

 

 

4.      First computer of the world

a.      CRAY-1

b.      PARAM

c.       Tian

d.      IBM-370

Answer: (a) CRAY-1

 

 

5.      Which of the following is the fastest type of computer ?

a.       Laptop

b.      PC

c.       Work station

d.      Super computer

Answer: (d) Super computer

 

 

 

6.      First super computer developed in India is

a.      PARAM

b.      Aryabhatt

c.       Buddha

d.      Ram

Answer: (a) PARAM

 

 

7.      Computer’s basic architecture was developed by

a.      John Von Neumann

b.      Charles Babbage


c.       Blaiscpascal

d.      Jordan Murn

Answer: (a) John Von Neumann


 

 

 

8.      Who invented Vaccumtubes ?

a.       John Bardeen

b.      William Shockley

c.       Lee de Forest

d.      None of above

Answer: (c) Lee de Forest

 

 

9.      The first general purpose electronic computer in the world was

a.       UNIVAC

b.      EDVAC

c.       ENIAC

d.      All of the above Answer: (c) ENIAC

 

10.  The term ‘Computer’ is derived from

a.       Greek language

b.      Sanskrit language

c.       Latin language

d.      German language

Answer: (c) Latin language

 

 

11.  SPSS

a.      Statistics package for the social science

b.      Software package for system development

c.       Software package for editing

d.      None of the above

Answer: (a) Statistics package for the social science

 

 

12.  Formula in Excel start with

a.       %

b.   =

c.   +

d.   

Answer: (b) =


 

 

 

13.  In Excel, a data series is define as what?

a.       A type of chart

b.      A cell reference

c.       A collection of related data

d.      A division of results

Answer: (c) A collection of related data

 

 

14.  Multiple calculations can be made in a single formula using……

a.       Standard Formula

b.      Array Formula

c.       Complex Formulas

d.      Smart Formula

Answer:  (b) Array Formula


 

 

15.                                  Which chart can be created in Excel

a.       Area


b.      Line

c.       Pie

d.      All of the above

Answer: (d) All of the above


 

 

16.  Which of the following is not a term of MS-Excel?

a.       Cells

b.      Rows

c.       Columns

d.      Document

Answer: (d) Document

 

17.  What type of commerce is enable by technology

a.       Path-to-profitability

b.      E-commerce

c.       EBuy

d.      Internet

Answer: (b) E-commerce

 

18.  What age group was born after the digital revolution?

a.      Digital natives

b.      Digital immigrants

c.       Digital boomers

d.      Web kids

Answer: (a) Digital natives


 

 

19.  When two companies are linked together by computers and they send business transactions through these computer, they are probably using-

a.       Digital wallets

b.      Electronic data interchange

c.       B2C

d.      Smart cards

Answer: (b) Electronic data interchange

 

20.  What is the term used when the government employs technology to deal with citizens, businesses and other government agencies?

a.       G2BC

b.      Web

c.       Consumer

d.      E-government

Answer: (d) E-government.

 

 

21.  It is impossibleto proceed to the age of the steam-mill until one has passed through the age of

a.      The hand-mill.

b.      The hydroelectric plant.

c.       The steam-mill.

d.      The nuclear power age. Answer: (a) The hand-mill.


 

 

 

22.  The inventionof a steam engine (the aeolipile)was

a.       Alexander Fleming.

b.      Aldo Leopold.

c.       Hero of Alexandria.


d.      None of them.

Answer: (c) Hero of Alexandria.

 

 

23.  The development of technical progress has always seemed intrinsically

a.      Predictable.

b.      Unpredictable.

c.       Gradual.

d.      Uneven.

Answer: (a) Predictable.

 

 

24.  For a ‘‘higher’’ stage of technology depends not alone on knowledgeor sheer skill but on

a.       The division of labor.

b.      The specialization of industry.

c.       Both a. and b.

d.      None of them.

Answer: (c) Both a. and b.

 

 

25.  Technology imposes certain                        characteristics upon the society in which it is found.

a.       Social.

b.      Political.

c.       Cultural.

d.      Both a. and b.

Answer: (d) Both a. and b.

 

 

 

26.                   wrote in The German Ideology, ‘‘A certain mode of production, or industrial stage, is alwayscombined with a certain mode of cooperation, or social stage,’’

a.      Karl Marx.

b.      Rousseau.

c.       Frank.

d.      Alexander.

Answer: (a) Karl Marx.


 

 

 

27.  The Hierarchical Organization of Work Different technological apparatuses not onlyrequire different labor forces but different orders of

a.       Supervision.

b.      Co-ordination.

c.       Both a. and b.

d.      None of the above. Answer: (c) Both a. and b.


 

 

 

28.  Who said that, ‘‘engineers have committed such blunders as saying thetypewriter brought women to work in offices, and with the typesetting machine madepossible the great modern newspaper, forgetting that in Japan there are women officeworkers and great modern newspapers getting practically no help from typewriters andtypesetting machines.’’

a.       Marx.

b.      Gilfillan.

c.       Roosevelt.

d.      None of the above. Answer: (b) Gilfillan.


 

29.  Technological Change Must Be Compatible with Existing

a.       Social Conditions.

b.      Economic Conditions.

c.       Other institutions in society.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

30.  Who said that what is needed is an understanding of technology from inside, both as a body of knowledgeand as a social system. Instead, technology is often treated as a ‘‘black box’’ whose contentsand behaviour may be assumed to be common knowledge.

a.       Layton.

b.      Rolston III.

c.       Hume.

d.      John Locke. Answer: (a) Layton.

 

 

 

31.  Scientific findings are                to more than one interpretation.

a.       Not open.

b.      Open.

c.       Static.

d.      None of the above. Answer: (b) Open.

 

 

32.  Technology                     _ has the power to help the billions of poor people all over the earth.

a.       Not guided by ethics.

b.      Guided by ethics.

c.       Guided by Scientists.

d.      None of the above.

Answer: (b) Guided by ethics.

 

 

33.  Too much of technologytoday is making                       .

a.      Toys for the rich.

b.      Toys for the poor.

c.       Toys for both rich and poor.

d.      None of the above.

Answer: (a) Toys for the rich.

 

 

34.  The  sun,  the genome, and                   are three revolutionaryforces arriving with the new century.

a.       The Mobile.

b.      The Computer.

c.       The internet.

d.      None of the above. Answer: (c) The internet.

 

35.  What is one of the greatest evils in the world?

a.      Rural poverty.

b.      Dowry system.


c.       Child marriage.

d.      Caste system.

Answer: (a) Rural poverty.

 

 

36.  Poverty can be reduced by a combination of solar energy,                        andthe internet.

a.      Genetic engineering.

b.      Cyber café.

c.       Nanotechnology.

d.      All of the above.

Answer: (a) Genetic engineering.

 

37.  Solar energy is distributed                      overthe earth.

a.       Unequally.

b.      Equitably.

c.       Same.

d.      Evenly.

Answer: (b) Equitably.

 

 

 

38.  What can make solar energy usable everywhere for thelocal creation of wealth?

a.       Internet.

b.      Sun.

c.       Genetic engineering.

d.      None of the above.

Answer: (c) Genetic engineering.

 

 

 

39.  What can provide people in every village withthe information and skillsthey need to develop their talents?

a.       The solar system.

b.      The internet.

c.       The Genome.

d.      All of the above. Answer: (b) The internet.

 

 

 

40.  Solar energy is most abundant where it is most needed, in the

a.       Countryside.

b.      In the tropical countries.

c.       Temperate latitudes.

d.      Both a. and b.

Answer: (d) Both a. and b.


 

 

1.      The technology of solar energy is still too expensivefor average                   countriesto afford.

a.       First world.

b.      Third-world.

c.       Both a. and b.

d.      None of them.

Answer: (b) Third-world.

 

 

2.      There is enough               to supply our needs many times over, if we can find away to use it.

a.       Sunlight.


b.      Internet.

c.       Animals.

d.      None of the above. Answer:(a) Sunlight.

 

 

 

3.      Sugar cane canbe fermented to make             .

a.       Methane gas.

b.      Alcohol.

c.       Electricity.

d.      All of the above. Answer: (b) Alcohol.

 

 

 

4.      Solar energy has not yetbeen used on a large scale for one simple reason: it is

a.      Too expensive.

b.      Too cheap.

c.       Not much available.

d.      All of the above.

Answer: (a) Too expensive.

 

 

 

5.      Solar energy is expensive today because it has to be collected from large areas andwe do not yet have a technology that covers large areas

a.       Easily.

b.      Cheaply.

c.       Conveniently.

d.      None of the above. Answer: (b) Cheaply.

 

 

 

6.      What are the two main tools for collecting solar energy?

a.      Photoelectric panels and energy crops.

b.      Genetic engineering and internet.

c.       Both a. and b.

d.      None of the above.

Answer: (a) Photoelectric panels and energy crops.

 

 

 

7.      Fuels produced from energy crops are                   .

a.       Not storable.

b.      Storable.

c.       Very weak.

d.      All of the above. Answer: (b) Storable.

 

8.      Traditional farming has always been based on                      .

a.      Genetic engineering.

b.      Solar harvesting.

c.       Photosynthesis.

d.      All of the above.

Answer: (a) Genetic engineering.

 

 

 

9.      Alongside the human genome, what are other genomes beingsequenced?


a.       Bacteria.

b.      Yeast.

c.       Worms.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

10.  Before long we shall have sequenced the genomes of the major crop plants,

a.       Wheat.

b.      Maize.

c.       Rice.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

11.  The internet will allow people in remote places tomake

a.       Business deals.

b.      To buy and sell.

c.       To keep in touch with their friends.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

12.  Cheap solar energy and genetic engineering will provide the basis for primaryindustries in the countryside,

a.       Modernized farming.

b.      Mining.

c.       Manufacturing.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

13.  Ethics must guide technology in the direction of

a.       Political justice.

b.      Cultural justice.

c.       Social justice.

d.      None of the Above. Answer: (c)Social Justice.

 

 

14.  Who said that, “The increased deployment of nuclear power facilities must lead societytoward authoritarianism. Indeed, safe reliance upon nuclear power as the principalsource of energy may be possible only in a totalitarian state.”

a.       Mumford.

b.      Denis Hayes.

c.       Louise.

d.      None of the above. Answer: (b) Denis Hayes.

 

 

 

15.  Who said that ‘‘dispersed solar sources are more compatible than centralized technologies withsocial equity, freedom and cultural pluralism.’’

a.       Mumford.

b.      Denis Hayes.

c.       Louise.

d.      None of the above.


Answer: (b) Denis Hayes.

 

 

 

16.  The factory system,automobile, telephone, radio, television, space program and nuclear powerhave all at one time or another been described as

a.       Democratizing forces.

b.      Liberating forces.

c.       Mobilizing forces.

d.      Both a. and b.

Answer: (d) Both a. and b.

 

 

 

17.  It is obvious that technologies can be used in ways that enhance the                         of some over others, for example, the use of television to sell acandidate.

a.       Power.

b.      Authority.

c.       Privilege.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

18.  Who wrote the little essay ‘‘On Authority’’ in 1872?

a.      Friedrich Engels.

b.      Karl Marx.

c.       Rousseau.

d.      None of the above.

Answer: (a) Friedrich Engels.

 

 

 

19.  Who said that the roots of unavoidable authoritarianism are deeply implanted in the human involvementwith science and technology?

a.       Karl Marx.

b.      Friedrich Engels.

c.       Immanuel Kant.

d.      John Locke.

Answer: (b) Friedrich Engels.

 

 

 

20.  The atom bomb is an inherently a

a.      Political artifact.

b.      Social artifact.

c.       Cultural artifact.

d.      Economical artifact. Answer: (a) Political artifact.

 

 

 

21.  Who was the famous inventorof the first reading machine for the blind?

a.      Ray Kurzweil.

b.      Friedrich Engels.

c.       Karl Marx.

d.      Hume.

Answer: (a) Ray Kurzweil.

 

 

 

22.  Who wrote “The Age of Spiritual Machines”?

a.      Ray Kurzweil.


b.      Hume.

c.       Frank.

d.      None of the above. Answer: (a) Ray Kurzweil.

 

 

 

23.  ‘‘Anything that can go wrong, will’’ whose law is it?

a.      Finagle’s law.

b.      Ray Kurzweil’s law.

c.       Friedrich Engels’ law.

d.      None of the above. Answer: (a) Finagle’s law.


 

 

24.  Who wrote the book “Robot: Mere Machine to Transcendent Mind”?

a.       Finagle.

b.      Moravec.

c.       Engels.

d.      Marx.

Answer: (b) Moravec.

 

 

 

25.  What are the most compelling 21st-century technologies?

a.       Robotics.

b.      Genetic engineering.

c.       Nanotechnology.

d.      All of the above.

Answer: (d) All of the above.

 


 

 

 

26.  Who said that in the game of life and evolution there are three players at the table: human beings, nature, and machines?

a.      George Dyson.

b.      Engels.

c.       Marx.

d.      None of them.

Answer: (a) George Dyson.

 

 

 

27.  Genetic engineering promises to revolutionize agriculture by

a.       Increasing crop yields.

b.      Reducing the use of pesticides.

c.       Creating tens of thousands of novel species of bacteria,plants, viruses, and animals.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

28.  The effort to build the first atomic bomb was led by the brilliant physicist             .

a.      J. RobertOppenheimer.

b.      Rousseau.

c.       John Locke.

d.      Hume.

Answer: (a) J. Robert Oppenheimer.

 

 

 

29.  Who wrote the book “Visions of Technology”?


a.      Richard Rhodes.

b.      Robert Oppenheimer.

c.       Aristotle.

d.      Descartes.

Answer: (a) Richard Rhodes.

 

 

30.  Who said, ‘‘We do not ride on the railroad; it rides upon us’’?

a.       Richard Rhodes.

b.      Aristotle.

c.       Thoreau.

d.      None of them. Answer: (c) Thoreau.


 

 

31.    Cybercrime is also known as

a.       Computer crime

b.       Network crime

c.       Surfing crime

d.      Digital crime.

Answer: (a) Computer crime

 

 

 

32.  Cybercrime that involves

a.       A computer and a network

b.       A computer and a website

c.       A computer and a computer expert.

d.      All of the above.

Answer: (a). a computer and a network .

 

 

 

 

33.  The device of cybercrime is

a.       Internet.

b.       (b). emails

c.       Mobile phones.

d.      All of the above.

Answer: (d). all of the above.

 

 

 

34.  Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as

a.       Cyber warfare.

b.       Cybercrime.

c.       Financial crime.

d.      None of all these. Answer: (a) Cyber warfare.

 

 

 

35.  “Cyber-crime against women” is a motive to intentionally harm the victim

a.       Psychologically.

b.       Physically.

c.       Emotionally.

d.      All of the above.

Answer: (d).all of the above.

 

36.    Juniper Research estimated that the costs of cybercrime could be as high as 2.1 trillion by a. 2018.


b.  2019.

c.   2017.

d.   2020.

Answer: (b) 2019.

 

 

 

37.    Computer fraud refers

a.       Bank Fraud.

b.       Carding.

c.       Theft of Classified Information.

d.      All of the above.

Answer: (d). all of the above.

 

 

38.  Someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them is called

a.       A cyber-terrorist.

b.       A cyber theft.

c.       A terrorist.

d.      None of the these. Answer: (a)A cyber-terrorist.

 

 

 

 

39.  Cyberterrorism in general, as an act of terrorism committed through the use of cyberspace or computer resources is defined by

a.       DebaratiHalder.

b.       K. Jaishankar.

c.       Parker.

d.      Kramer. Answer:(c). Parker.


 

 

 

 

40.  Phishing is mostly propagated via

a.       Email.

b.       Internet

c.       Computer

d.      Mobile Answer:(a) Email.

 

 

41.  One area of Internet pornography that has been the target of the strongest efforts at curtailment is

a.       Adult pornography.

b.       Women pornography.

c.       Child pornography.

d.      None of the above. Answer: (c) Child pornography.

 

 

 

42.    The dark web site silk road was a major online marketplace for

a.       Terrorism.

b.      Drugs.

c.       Pornography.

d.      Computer.

Answer:(b)Drugs.

 

 

 


43.  A European wide Data Retention Directive (applicable to all EU member states) states that all E-mail traffic should be retained for a minimum of

a.       13 months.

b.       10 months.

c.       11 months.

d.      12 months.

Answer:(d) 12 months.

 

 

 

 

44.  The process of preventing and detecting unauthorized use of computer is known as

a.       Internet security.

b.       Cyber security.

c.       Computer security.

d.      All of the above. Answer:(c) Computer security.


 

 

 

45.    Computer security is needed for

a.       Prevention of work related documents.

b.       Prevention of data theft.

c.       Prevention of bank accounts.

d.      All of the above.

Answer: (d)All of the above.

 

 

 

 

46.    World Intellectual Property will organize on

a.       26th June.

b.       26th May.

c.       26th April.

d.      All of the above. Answer: (c) 26th April.

 

 

 

47.    Responsible computing can be defined as

a.       Lawful use of computing and information resources.

b.       Respect the right of others.

c.       Never create problems by using virus.

d.      All of the above.

Answer: (d)All of the above.

 

 

 

 

48.  Creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names an and images used in commerce is known as

a.       Intellectual property.

b.       Personal property.

c.       Computer property.

d.      None of the above.

Answer: (a). intellectual property.

 

 

 

 

49.    Intellectual property is protected in law by, for example

a.       Patents.

b.       Copyright.

c.       Trademarks.

d.      All of the above.


Answer: (d) All of the above.

 

 

 

 

50.    Intellectual Property system aims to foster an environment in which

a.       Creativity and innovation can flourish.

b.       Creativity can flourish.

c.       Innovation can flourish.

d.      Motivation can flourish.

Answer: (a)Creativity and innovation can flourish.

 

 

 

51.  Types of intellectual property are

a.       Copyright.

b.       Patents.

c.       Trademark.

d.      All of the above.

Answer: (d) All of the above.

 

 

 

52.    The objectives of intellectual property law is

a.       Financial incentive.

b.       Economic growth.

c.       Morality.

d.      All of the above.

Answer: (d) All of the above.

 

 

53.    In cybercrime the computer may have been used

a.       In the commission of a crime.

b.       It may be the target.

c.       In the commission of a crime, or it may be the target.

d.      None of the above.

Answer: (c) In the commission of a crime, or it may be the target.

 

 

 

54.  DebaratiHalder and K. Jaishankar define cybercrimes as: "Offences that are committed against

a.       Individuals.

b.       Group of individuals.

c.       None of the above.

d.      Both (a) and (b).

Answer: (d)Both (a) and (b).

 

 

55.    The motive of cybercrime is

a.       Intentionally harm the reputation of the victim.

b.       Physically harm.

c.       Mentally harm.

d.      All of the above.

Answer: (d). all of the above

 

 

56.    The only way to solve social issues caused by the rise of technology is

a.       Good citizenship in the internet community.

b.       Academic excellency.

c.       Computer experts.

d.      Only (a)


Answer: (d)Only (a).

 

 

 

57.    Major computer crime can be categorized into

a.       Four.

b.       Five.

c.       Two.

d.      None of the above. Answer: (a)Four.

 

 

 

58.    Internal computer crime includes

a.       Trojan horses.

b.       Logic bombs.

c.       Worms and viruses.

d.      All of the above.

Answer:(d)All of the above.

 

 

 

59.    Hacking is a

a.       Cybercrime.

b.       Internal computer crime.

c.       Telecommunications crime.

d.      All of the above.

Answer: (c) Telecommunications crime.

 

 

 

60.                            The most common form of computer crime is

a.       Bank and credit card fraud.

b.       Terrorism.

c.       Hacking.

d.      All of the above. Answer: (c) Hacking.

 

 

 

61.     Who was called the father of computer?

a) J. Presper Eckert                                          b) John W. Mauchly

c) Charles Babbage                                        d) Clifford Berry

 

 

 

62.     Which of the following are the parts of Computer Hardware?

a) Keyboards                                                  b) Printers

c) Motherboard                                               d) All of the above

 

 

 

63.     What is business ethics?

a)  The study of business situations, activities, and decisions where issues of right and wrong are addressed

b)  Defined as decisions organisations make on issues that could be considered right or wrong

c)  Ethics that can be applied to an organisation’s practises

d)  Ethical processes businesses use in order to achieve a good ethical standard

e)  

 

 

64.     Define morality-

a)  What is considered as correct within a society

b)  Making the right decision's where there is a chance to do wrong

c)  Defining what is right and wrong for an individual or a community


d)  Where individuals have a conscious choice to make a right and ethical decision

 

 

 

65.     According to Utilitarianism theory-

a)  an action is morally right if it results in the greatest amount of good for the greatest amount of people affected by the action

b)   an action is morally right if results in the most amount of good possible in the given situation.

c)  an action is if you do a whole lotta good

d)  an action is morally right if it results in the least amount of negativity possible

 

 

 

66.       A byte consists of how many bits?

a) 16                                                               b) 4

c) 2                                                                 d) 8

 

67.     Which is the research methods used in computer sciences?

a) Experimental method                                   b) Survey method

c) Qualitative method                                      d) All the above

 

 

68.     What are ethical theories?

a)    Ethical theories are conduct that should be followed in order to have good ethical practise.

b)  Ethical theories are the rules and principles that determine right and wrong for any given situation.

c)  Ethical theories are ancient hypothesis on how to create good business practise.

d)  Ethical the 0ries give guidelines on how to achieve a good corporate image.

 

 

 

69.     Pirating software is an example of violating:

a) Morals                                                         b) Ethics

c) Laws                                                            d) Character

 

70.     Which is a model of management ethics?

a) Moral Management                                      b) Immoral Management

 

c) Amoral Management                       d) All of the above

 

 

71.     What are the threats to privacy in privacy encroachment issues?

a) Public Information Availability                   b) Commercial Compromise of Privacy

c) Government compromise of Privacy           d) All of the above

 

 

 

72.       In which year was chip used inside the computer for the first time? a) 1964                                                   b) 1975

c) 1999                                                            d) 1944

 

 

73.     The main purpose of research in education is to             

a) Help in the personal growth of an individual b) Help the candidate become an eminent educationist

c) Increase job prospects of an individual        d) Increase social status of an individual

 

74.     The data of research is          

a) Qualitative only                                           b) Quantitative only

c) Both (a) and (b)                                          d) Neither (a) nor (b)

 


75.     Which of the following approaches says that ethical issues should be judged on the basis of some universal code?

a) Deontological                                                          b) Ethical skepticism

c) Utilitarianism                                                           d) None of them

 

 

76.     Socially responsible behaviour

a) never leads to improved financial performance       b) has adverse impact on stakeholders

c) is in a firm’s self-interest                                        d) results in ill-will from the community

 

 

77.     Who designed the basic design called Analytical Engine based on which computers are made today?

a) Clifford Berry                                                          b) Charles Babbage

c) John W. Mauchly                                                    d) J. Presper Eckert

 

 

78.     What does Simulation Research Method investigate?

a) It makes predictions and study performances

b)  It Studiesorganizational and social phenomena in the social and cultural contexts.

c)  It identifies issues and problems previously unrecognized.

d)  It collects information about the population from the drawn sample.

 

 

 

79.     What is research?

a) Searching again and again                                        b) Finding solution to any problem

c) Working in a scientific way to search for              d) None of the above

truth of any problem

 

 

80.     Modern supercomputers and minicomputers, accessed by network are called

a) Desktop Computers                                                 b) Laptops

c) Servers                                                                    d) Micro Computer

 

 

81.     Every letter of computer is referred to as

a) Bit                                                                           b) Alphabet

c) Nibble                                                                      d) Number

 

 

82.     Which are the advantages of simulation?

a)   Results are accurate in general, compared to analytical model

b)   Help to find un-expected phenomenon, behavior of the system

c)   Easy to perform ``What-If'' analysis

d)   All of the above

 

 

83.     Which one is not a key branch of ethics?

a) Performative ethics                                                b) Normative ethics

c) Applied ethics                                                          d) Descriptive ethics

 

84.     Which one falls under the cognitivist metaethical theories?

a) Emotivism                                                               b) Imperativism

c) Supernaturalism                                                     d) Prescriptivism

 

 

85.     Who invented ethics of duty?

a) Wilson, H                                                                b) Wilson, I

c) Kant, H                                                                    d) Kant, I

 

 

86.     John Locke’s Ethic’s of Rights-

a) Right to life, liberty, justice and property             b) Right to life, safety and shelter

c) Right to safety, esteem, self-actualisation,               d) Right to life and justice

 


and psychological needs

 

87.     Ethics & Law overlap. This is called…

a) Yellow area                                                             b) White area

c) Black area                                                                d) Grey area

 

 

 

88.     The fraudulent practice of sending emails purposing to be from reputable companies in order to induce individuals

to reveal personal information (Credit or Debit card) details is called-

a) Hot swapping of devices                                         b) Pharming

c) Phishing                                                                  d) None

 

 

89.     Who is the author of ‘The Rise of the Network Society’?

a) Anthony Giddens                                                    b) Manuel Castells

c) Immanuel Wallerstein                                              d) Thomas L. Friedman

 

 

 

90.     Consequentialism/Teleological-

a)  Decisions are established based on previous consequences and results from past actions

b)  Focus on the outcomes/ consequence of ethical decisions, not on moral principles.

c)  Focuses on the intrinsic goodness or value of an action

d)  Consequences of competitor actions determine your actions

 

 

 

91.       Virtue Ethics…

a)  Assumes good businesses will make good decisions

b)  Assumes good governments will enforce good ethical practices on their businesses

c)  Assumes good persons will make good decisions and personal qualities affect decisions

d)  Assumes good persons will make good decisions but it has nothing to do with personal qualities.

 

 

 

 

92.     Which country introduced Smart Health Care Card in large scale for the first time?

a) France                                                                     b) India

c) USA                                                                         d) China

 

 

 

 

93.      Electronic discovery (“e-discovery”) refers to

a)  Discovery in Electronic Affairs for Storing Information

b)  Discovery in Civil Litigation with Electronically Stored Information

c)  Discovery in outlining Electronic evidence

d)  Discovery in accounting databases and websites

 

 

 

94.     Which organization developed Telemedicine facility at Remote CHC/PHC in Tripura?

a) WECS, Kolkata                                                      b) SGPGI, Lucknow

c) CDAC, Mohali                                                         d) CDAC, Pune

 

 

 

95.     Which of the following is known as Malicious software

a) illegalware                                                               b) badware

c) malware                                                                  d) maliciousware

 

 

 

96.     Key logger is a

a) Firmware                                                                 b) Antivirus

c) Spyware                                                                  d) All of the Above

 

 


97.     To protect yourself from computer hacker, you should turn on a

a) Script                                                                       b) Firewall

c) VLC                                                                         d) Antivirus

 

 

 

98.     The term “ Intellectual Property Rights” covers

a) Copyrights                                                               b) Know-how

c) Trade dress                                                              d) All of the above

 

 

 

99.     The following can be patented

a) Machine                                                                   b) Process

c) Composition of matter                                             d) All of the Above

 

 

 

100. The agreement that is enforceable by law is known as

a) Valid agreement                                                     b) Void agreement

c) Illegal agreement                                                      d) Unenforceable agreement


 

 

 

101.   A           is a TCP name for a transport service access point.

a) port                                                                         b) pipe

c) node                                                                        d) none of the mentioned

 

 

 

102. Which device is required for the Internet connection?

a) Joystick                                                                   b) Modem

c) CD Drive                                                                 d) NIC Card

 

 

 

103. The first web browser is

a) Mosaic                                                                    b) Netscape

c) Internet explorer                                                      d) Collabra

 

 

 

104. What is the term that describes a gap in terms of access to and usage of information and communication technology?

a) Digital Information                                                  b) Digital Divide

c) Digital Hub                                                              d) Digital Technology

 

 

105. What is ‘metadata’?

a) Data about the IT                                                     b) Data about the Informatics

c) Data about the tools and methods                            d) Data about the data

 

 

 

106. Which is not among the major factors responsible for successful implementation and sustenance of ICT projects for social development?

a) Degree of efficiency and transparency demonstrated in citizen services

b)  Extent of reduction in cost and improvement of convenience for citizens

c)  Extent of reengineering and improvement of back-end services

d)  Degree of autocracy and informative step from the state authority.

e) 

 

 

107. Which of the following is Pre-archival Processing Tool?

a) e-SANGRAHAN                                                     b) e-RUPANTAR

c) DATÄ€NTAR                                                           d) e-Goshwara

 

 

 

108. Ethical hackers who use their skill to secure the integrity of computer systems or networks is called-

a) Black Hat                                                                 b) White Hat


c) Green Hat                                                                d) None.

 

 

109. In India, the literary work is protected until

a) Lifetime of author                                                   b) 25 years after the death of author

c) 40 years after the death of author                            d) 60 years after the death of author

 

 

110. Symbol of Maharaja of Air India is

a) Copyright                                                                 b) Patent

c) Trademark                                                             d) All of the above

 

 

 

151------- is the measurement of things such as fingerprints and retinal scans used for security access.

a)  Biometrics                                                               b) Bio measurement

c) Computer security                                                   d) Smart weapon machinery

 

 

152. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

a)  Hacker                                                                    b) spammer

c) instant messenger                                                     d) programmer

 

 

153. Who wrote the book ‘Small is Beautiful: A Study of Economics As If People Mattered (1973)?

a)  Albert Einstein                                                         b) Ivan Illch

c) E. F. Schumacher                                                   d) Amartya Sen

 

 

 

154. When did Cyber Law, The Information Technology (Amendment) Act have been passed?

a) June, 2008                                                               b) February, 2009

c) July, 2010                                                                d) March, 2008

 

 

155. Which of the following searches websites by keyword(s)?

a) ndif]-->Web bugs                                                                 b) Search engine

c) Spyware                                                                   d) Portals

 

 

156. ICT is a blend of

a)  IT and telecommunication                                      b) Technology and communication

c) Codes and information                                            d) IT and social networking

 

 

157. The following is (are) the most effective ways of communication.

a) Verbal                                                                      b) Non verbal

c) Written                                                                     d) All of the above

 

 

158. The           of business letter is called layout.

a)  Body                                                                        b) Content

c) Pattern                                                                    d) All of the above

 

 

159. Which of the following is true about civil liberties?

a)  They are constitutionally established guarantees against government interference.

b)  They are positive acts of government designed to protect individual liberties.

c)  The term applies to both constitutionally established guarantees against government interference, and positive acts of government designed to protect individual liberties.


d)  None of the above

 

 

 

160. Which of the following is not the Statutory organization of (Ministry of Electronics and Information Technology) MeitY?

a)  CAT                                                                        b) UIDAI

c) CCA                                                                        d) ICERT


 

 

161.   Method used to transfer information to far off places instantly is called

i)    Information technology

ii)     Language

iii)     Data

iv)    Telecommunication

 

 

 

 

162.   ICT is a blend of

i)   IT and telecommunication

ii)   Technology and communication

iii)   Codes and information

iv)   IT and social networking

 

 

 

163.   Software are referred to as

i)    Hardware

ii)    Computer programs

iii)     Binary data

iv)     Procedure

 

 

 

164.   In Computer terminology processed data is called

i) Binary data                ii) Information

iii) Language               iv) Code

 

 

 

165.   This invention replaced vacuum tubes and made computers much smaller and faster. However, it was eventually replaced by another invention

(i) RAM    (ii) ENIAC   (iii) Transformer        (iv) Transistor.

 

 

 

166.   On the basis of time, research can be classified as,

(i)     Qualitative versus Quantitative

(ii)      Pure versus applied research

(iii)     Cross-sectional versus longitudinal research

(iv)      None of the above

 

 

 

167.   Research is basically-

(i)     A methodology of enquiry

(ii)      Search of truth

(iii)      A systematic exploration of facts

(iv)     All of the above

 

 

 

 

168.   Social research can be divided into-

(i)     Two categories


(ii)      Three categories

(iii)     Four categories

(iv)      Five categories

 

 

 

169.   This person created a machine called The Analytical Engine. His ideas were some of the first that led to the creation of computers.

(i)   Simon Konrad             (iii) John Lovelace

(ii)      Charles Babbage        (iv) William Howard

 

 

 

170.   Research design is-

(i)     A plan

(ii)      A structure

(iii)      A strategy

(iv)     All of these


 

 

 

171.   This invention was 1,000 times faster than any machine built before it. It was so big that it could fill up a house.

(i)     Apple I

(ii)     ENIAC

(iii)      Windows

(iv)      Z3

 

 

 

172.   Which of the following Researches emphasise primarily the factual aims?

(i)     Philosophical researches

(ii)     Historical researches

(iii)      Theoretical researches

(iv)      Behavioural researches

 

 

 

173.   The aims of research is/are

(i)     verification

(ii)      fact finding

(iii)      theoretical development

(iv)     All of the above

 

 

 

174.   Which of the following is the first step in starting the research process?

(i)     Searching sources of information to locate problem.

(ii)      Survey of related literature

(iii)     Identification of problem

(iv)      Searching for solutions to the problem

 

 

 

175.   One of the following is not a survey method

(i)     Personal interview

(ii)      Telephone interview

(iii)      Mail interview

(iv)     Structured observation


 

 

 

176.   How many models are for technological innovation-

(i) Two                        (ii) Three

(iii) Four                      (iv) None of the above

 

 

 

 

177.   ICT systems consists of-

(i)     Enable sensing

(ii)      Visualizing

(iii)      Storing and computing

(iv)     All of the above

 

 

 

178.   Bibliography given in a research report

(i)     Helps those interested in further research and studying the problem

(ii)      Makes the report authentic

(iii)     Both (i) & (ii)

(iv)      None of the above

 

 

 

179.     The data of research is-

(i)     Qualitative only

(ii)      Quantitative only

(iii)     Both (i) and (ii)

(iv)      Neither (i) nor (ii)

 

 

 

180.   Inductive reasoning is-

(i)     Data collection analysis method

(ii)      Theory data collection analysis method

(iii)      Data collection method

(iv)     Both (i) and (ii)

 

 

 

 

181.   Research design of a study should not include

(i)     Objectives

(ii)      Hypothesis

(iii)     Findings

(iv)      Blue print of Research

 

 

 

182.   The first page of the research report is-

(i)     Acknowledgement Page

(ii)      Index Page

(iii)     Title Page

(iv)      None of the above

 

 

183.   Factors that create the digital divide-

(i)     Economic & Geographical

(ii)      Technological

(iii)      Social & Cultural

(iv)     All of the above


 

 

184.   Field study is related to

(i)    Real life situations

(ii)    Experimental situations

(iii)    Laboratory situations

(iv)   None of the above

 

 

185.   Questionnaire is a

(i)     Research method

(ii)      Measurement technique

(iii)     Data collection technique

(iv)      None of the above

(v)  


 

 

186.   Quantitative data refers to

(i)     Graphs and tables

(ii)      Any data you present in your report

(iii)      Statistical analysis

(iv)    Numerical data that could be useful to answer your research question(s) and to meet your

Objectives

 

 

187.   Data collection can be done through

(i)     Interview

(ii)      Questionnaires

(iii)      Through E-Mail or by Telephone

(iv)     All of the above

(v)  

 

 

188.   Independent variables are not manipulated in

(i)     Normative researches

(ii)      Ex-post facto researches

(iii)     Both of the above

(iv)      None of the above

 

 

189.   A hypothesis is a

(i)    tentative statement whose validity is still to be tested

(ii)    statement of fact

(iii)    supposition which is based on the past experiences

(iv)   All of the above

 

 

190.   Action research means

(i)     a longitudinal research

(ii)      an applied research

(iii)     research which are initiated to solve the immediate problems

(iv)      All of the above

 

 


191.    In computer security,                   means that computer system assets can be modified only by authorized parities.

i)    Confidentiality

ii)    Integrity

iii)     Availability

iv)     Authenticity

 

 

 

 

192.   Which of the following is independent malicious program that need not any host program?

i)    Trap doors

ii)     Trojan horse

iii)     Virus

iv)    Worm

 

 

 

193.   Verification of a login name and password is known as

i)    Configuration

ii)     Accessibility

iii)    Authentication

iv)     logging in

 

 

 

194.   The common name for the crime of stealing passwords is

i)    Jacking

ii)     Identify Theft

iii)    Spoofing

iv)     Hacking

 

 

 

35.     Which of the following is/are threats for electronic payment systems?

i)    Computer worms

ii)     Computer virus

iii)     Trojan horse

iv)    All of the above


 

 

196.      The term 'Intellectual Property Rights' covers

i)    Copyrights

ii)     Know-how

iii)     Trade dress

iv)    All of the above

 

 

197.     The following can not be exploited by assigning or by licensing the rights to others.

i)    Patent

ii)     Designs

iii)    Trademark

iv)     All of the above

 

 

 

198.      The altering of data so that it is not usable unless the changes are undone is

i)    Ergonomics

ii)     Compression

iii)     Biometrics

iv)    Encryption

 

 

 


199.                     is the measurement of things such as fingerprints and retinal scans used for security access.

i)   Biometrics

ii)     Bio measurement

iii)     Computer security

iv)     Smart weapon machinery

 

 

 

 

200.        Code red is a(n)                

i)    Word Processing Software

ii)     Antivirus

iii)    Virus

iv)     Photo Editing Software

****** NB : (1) Answer Key are given highlighted in Bold Mark.

(2)  Question Banks are prepared and uploaded as received from various colleges.

(3)  If any error in the Questions & answer keys University would not have any liability.


Post a Comment

0 Comments

Projects