Type Here to Get Search Results !

SOCIETY AND TECHNOLOGY (Soft Study Course) 6th Semester Exam 2021 Questions & Answer

 SOCIETY AND TECHNOLOGY  (Soft Study Course) 
6th Semester Exam 2021  
Questions & Answer 

 

 

 

1. The term ‘Intellectual Property Rights’

covers

[A] copyrights

[B] know-how

[C] trade dress

[D] All of the above

Xxx

 

 

 

2. Action research means

[A] a longitudinal research

[B] an applied research

[C] research which are initiated to

solve the immediate problems

[D] All of the above

Xxx

 

 

3. A hypothesis is a

[A] tentative statement whose validity

is still to be tested

[B] statement of fact

[C] supposition which is based on the

past experiences

[D] All of the above

Xxx

 

 

4. Data collection can be done through

[A] interview

[B] questionnaires

[C] e-mail or by telephone

[D] All of the above

Xxx

 

 

5. Field study is related to

[A] real life situations

[B] experimental situations

[C] laboratory situations

[D] None of the above

Xxx


 

 

 

6. The first page of the research report is

[A] acknowledgement page

[B] index page

[C] title page

[D] None of the above

Xxx

 

 

7. ICT system consists of

[A] enable sensing

[B] visualizing

[C] storing and computing

[D] All of the above

 

Xxx

 

 

8. Which one of the following is not a

survey method?

[A] Personal interview

[B] Telephonic interview

[C] Mail interview

[D] Structured observation

 

Xxx

 

 

 

9. The aim of research is

[A] verification

[B] fact finding

[C] theoritical development

[D] All of the above

 

10. Social research can be divided into

[A] two categories

[B] three categories

[C] four categories

[D] five categories

Xxx

 


 

 

11. Which of the following is not the

Statutory Organization of (Ministry

of Electronics and Information Technology) MeitY?

[A] CAT

[B] UIDAI

[C] CCA

[D] ICERT

12. The _____ of business letter is called

layout.

[A] body

[B] content

[C] pattern

[D] All of the above

 

13. Which of the following searches Web

sites by keywords?

[A] Web bugs

[B] Search engine

[C] Spyware

[D] Portals

 

14. When did Cyber Law, the Information

Technology (Amendment) Act have been passed?

[A] June 2008

[B] February 2009

[C] July 2010

[D] March 2008

 

15. The symbol of Maharaja of Air India is

[A] copyright

[B] patent

[C] trademark

[D] All of the above

 

16. In India, the literary work is protected

until

[A] lifetime of author

[B] 25 years after the death of author

[C] 40 years after the death of author

[D] 60 years after the death of author

 

17. Ethical hackers who use their skill to

secure the integrity of computer

systems or network is called

[A] black hat

[B] white hat

[C] green hat

[D] None of the above

 

18. What is metadata?

[A] Data about the IT

[B] Data about the informatics

[C] Data about the tools and methods

[D] Data about the data

 

19. The agreement that is enforceable by

law is known as

[A] valid agreement

[B] void agreement

[C] illegal agreement

[D] unenforceable agreement

 

 

20. To protect yourself from computer

hacker, you should turn on a/an

[A] script

[B] firewall

[C] VLC

[D] antivirus



 

21. Key logger is a/an

[A] firmware

[B] antivirus

[C] spyware

[D] All of the above

 

22. Which country introduced Smart

Health Care Card in large scale for the

first time?

[A] France

[B] India

[C] USA

[D] China

 

23. Electronic discovery (e-discovery) refers

to

[A] discovery in electronic affairs for

storing information

[B] discovery in civil litigation with

electronically stored information

[C] discovery in outlining electronic

evidence

[D] discovery in accounting databases

and Web sites

 

24. When ethics and law overlap, this is

called as

[A] yellow area

[B] white area

[C] black area

[D] grey area

 

 

25. Which one falls under the cognitivist

metaethical theories?

[A] Emotivism

[B] Imperativism

[C] Supernaturalism

[D] Prescriptivism

 

26. Socially responsible behaviour

[A] never leads to improved financial

performance

[B] has adverse impact on

stakeholders

[C] is in a firm’s self-interest

[D] results in ill-will from the

Community

 

27. Which is the research method used in

computer sciences?

[A] Experimental method

[B] Survey method

[C] Qualitative method

[D] All of the above

 

28. The World Intellectual Property Day is

observed on

[A] 26th June

[B] 26th May

[C] 26th April

[D] 26th July

 

29. ‘Cyber-crime against women’ is a

motive to intentionally harm the victim

[A] psychologically

[B] physically

[C] emotionally

[D] All of the above

 

30. Who was the famous inventor of the

first reading machine for the blind?

[A] Ray Kurzweil

[B] Friedrich Engels

[C] Karl Marx

[D] Hume



 

 

 

31. Fuels produced from energy crops are

[A] not storable

[B] storable

[C] very weak

[D] All of the above

 

32. Sugarcane can be fermented to make

[A] methane gas

[B] alcohol

[C] electricity

[D] All of the above

 

 

33. Which of the following is included in

geographical indications of goods?

[A] Handicraft

[B] Foodstuff

[C] Manufactured

[D] All of the above

 

34. In ‘quid pro quo’ stands for

[A] knowledge disclosed to the public

[B] monopoly granted for the term of the patent

[C] exclusive privilege of making,

selling and using the invention

[D] None of the above

 

35. Unauthorized access and viruses are

issues dealing with network

[A] performance

[B] reliability

[C] security

[D] None of the above

 

36. Network failure is primarily a _____issue.

[A] performance

[B] reliability

[C] security

[D] None of the above

 

37. The term ‘WIPO’ stands for

[A] World Investment Policy

Organization

[B] World Intellectual Property

Organization

[C] Wildlife Investigation and Policing

Organization

[D] World Institute for Prevention of

Organized Crime

 

 

38. What is the full form of PDF?

[A] Printed Document Format

[B] Public Document Format

[C] Portable Document Format

[D] Published Document Format

 

39. The research design is a

[A] plan

[B] structure

[C] strategy

[D] All of the above

 

40. On the basis of time, research can be

classified as

[A] qualitative versus quantitative

[B] pure versus applied research

[C] cross-sectional versus longitudinal

research

[D] None of the above


 

 

 

41. The earliest calculating device is

[A] calculator

[B] abacus

[C] difference engine

[D] analytical engine

 

42. Computer’s basic architecture was

developed by

[A] John von Neumann

[B] Charles Babbage

[C] Blaise Pascal

[D] Jordan Murn

 

43. What type of commerce is enabled by

technology?

[A] Path-to-profitability

[B] E-commerce

[C] E-Buy

[D] Internet

 

44. Technology _____ has the power to help

the billions of poor people all over the earth.

[A] not guided by ethics

[B] guided by ethics

[C] guided by scientists

[D] None of the above

 

45. The Internet will allow people in remote

places to make

[A] business deals

[B] to buy and sell

[C] to keep in touch with their friends

[D] All of the above

 

46. Which of the following is not an audio

file format?

[A] .amr

[B] .m4a

[C] .mp4

[D] .mp3

 

47. In computer security, _____ means that

computer system assets can be

modified only by authorized parities.

[A] confidentiality

[B] integrity

[C] availability

[D] authenticity

 

48. Shortcut key in MS-Word for ‘select all’

is

[A] Ctrl+C

[B] Ctrl+V

[C] Ctrl+F

[D] Ctrl+A

 

49. In computer terminology, processed

data is called

[A] binary data

[B] information

[C] language

[D] code

 

50. Softwares are referred to as

[A] hardware

[B] computer programs

[C] binary data

[D] procedure



 

51. The first Web browser is

[A] mosaic

[B] netscape

[C] Internet explorer

[D] Collabra

 

52. The smallest unit of storage in

computer is referred to as

[A] bit

[B] alphabet

[C] nibble

[D] number

 

53. Which of the following is the parts of

computer hardware?

[A] Keyboard

[B] Printer

[C] Motherboard

[D] All of the above

 

54. The possible form(s) of computer crime

is/are

[A] bank and credit card fraud

[B] terrorism

[C] hacking

[D] All of the above

 

 

55. Which is not an office package software?

[A] Word

[B] Excel

[C] Paint

[D] Excess

 

 

56. Computer security is needed for

[A] prevention of work related

documents

[B] prevention of data theft

[C] prevention of bank accounts

[D] All of the above

 

57. The full form of WWW is

[A] World Wide Word

[B] World Wide Wood

[C] World Wide Width

[D] World Wide Web

 

58. OTP stands for

[A] One Time Password

[B] On Time Processing

[C] One Time Processing

[D] None of the above

 

59. Domain names are part of

[A] universal resource locator

[B] cascading style sheets

[C] extensible markup language

[D] All of the above

 

 

60. Portral is a system of

[A] a gateway to information or news

about a range of services

[B] communication medium

[C] medium of exchange

[D] online payment medium payment medium

 

61. The full form of IP is

[A] Internet Provider

[B] Internet Protocol

[C] Internet Password

[D] None of the above

 

62. Which type of ad appears on the top of

a Web page?

[A] Pop-under ad

[B] Pop-up ad

[C] Banner ad

[D] Discount ad

 

 

63. EDI stands for

[A] Electronic Data Information

[B] Electronic Data Interchange

[C] Exchange Data Interchange

[D] Electronic Device Information

 

64. Junk e-mail is also called

[A] spam

[B] spoof

[C] sniffer script

[D] spool

 

65. SMPS stands for

[A] Switched Mode Power Supply

[B] Start Mode Power Supply

[C] Store Mode Power Supply

[D] Single Mode Power Supply

 

66. The computer size was very large in

[A] first generation

[B] second generation

[C] third generation

[D] fourth generation

 

67. Which of the following are types of

ROMs?

[A] SROM and DROM

[B] PROM and EPROM

[C] Only one type there is no further

classification

[D] PROM and EROM

 

68. A non-erasable disk that stores

digitized audio information is

[A] CD

[B] CD-ROM

[C] DVD-R

[D] DVD-RW

 

69. Which of the following is not a

characteristic of a computer?

[A] Diligence

[B] IQ

[C] Accuracy

[D] Versatility

 

70. Which of the following is not a

positional number system?

[A] Roman number system

[B] Octal number system

[C] Binary number system

[D] Hexadecimal number system


 

71. The point used in computer to connect

external devices is

[A] port

[B] socket

[C] plug

[D] None of the above

 

72. Set of programs which consists of full

documentation is called

[A] software package

[B] system software

[C] utility software

[D] file package

 

 

73. What is required when more than one

person uses a central computer at the

same time?

[A] Light pen

[B] Mouse

[C] Digitizer

[D] Terminal

 

74. The first boot sector virus is

[A] computed

[B] mind

[C] brain

[D] Elk Cloner

 

75. The linking of computers with a

communication system is called

[A] assembling

[B] interlocking

[C] pairing

[D] networking


 

76. The phrase _____ describes viruses,

worms, Trojan horse attack applets

and attack scripts.

[A] spam

[B] phishing

[C] malware

[D] virus

 

77. Everything that the computer does is

controlled by its

[A] CPU

[B] ROM

[C] RAM

[D] storage devices

 

78. Encrypted passwords are used for

[A] security purpose

[B] passwords list secret

[C] faster execution

[D] Both [A] and [B]

 

79. Which memory is non-volatile and may

be written only once?

[A] PROM

[B] RAM

[C] EPROM

[D] SRAM

 

80. Which device of computer dispenses

with the use of the keyboard?

[A] Mouse

[B] Light pen

[C] Joystick

[D] Touch

Post a Comment

0 Comments

Projects