SOCIETY AND TECHNOLOGY (Soft Study Course)
6th Semester Exam 2021
Questions & Answer
1. The term ‘Intellectual
Property Rights’
covers
[A] copyrights
[B] know-how
[C] trade dress
[D] All of the above
Xxx
2. Action research means
[A] a longitudinal research
[B] an applied research
[C] research which are initiated to
solve the immediate problems
[D] All of the above
Xxx
3. A hypothesis is a
[A] tentative statement whose validity
is still to be tested
[B] statement of fact
[C] supposition which is based
on the
past experiences
[D] All of the above
Xxx
4. Data collection can be done
through
[A] interview
[B] questionnaires
[C] e-mail or by telephone
[D] All of the above
Xxx
5. Field study is related to
[A] real life situations
[B] experimental situations
[C] laboratory situations
[D] None of the above
Xxx
6. The first page of the
research report is
[A] acknowledgement page
[B] index page
[C] title page
[D] None of the above
Xxx
7. ICT system consists of
[A] enable sensing
[B] visualizing
[C] storing and computing
[D] All of the above
Xxx
8. Which one of the following
is not a
survey method?
[A] Personal interview
[B] Telephonic interview
[C] Mail interview
[D] Structured observation
Xxx
9. The aim of research is
[A] verification
[B] fact finding
[C] theoritical development
[D] All of the above
10. Social research can be
divided into
[A] two categories
[B] three categories
[C] four categories
[D] five categories
Xxx
11. Which of the following is not the
Statutory Organization of (Ministry
of Electronics and Information Technology) MeitY?
[A] CAT
[B] UIDAI
[C] CCA
[D] ICERT
12. The _____ of business letter is called
layout.
[A] body
[B] content
[C] pattern
[D] All of the above
13. Which of the following searches Web
sites by keywords?
[A] Web bugs
[B] Search engine
[C] Spyware
[D] Portals
14. When did Cyber Law, the Information
Technology (Amendment) Act have been passed?
[A] June 2008
[B] February 2009
[C] July 2010
[D] March 2008
15. The symbol of Maharaja of Air India is
[A] copyright
[B] patent
[C] trademark
[D] All of the above
16. In India, the literary work is protected
until
[A] lifetime of author
[B] 25 years after the death of author
[C] 40 years after the death of author
[D] 60 years after the death of author
17. Ethical hackers who use their skill to
secure the integrity of computer
systems or network is called
[A] black hat
[B] white hat
[C] green hat
[D] None of the above
18. What is metadata?
[A] Data about the IT
[B] Data about the informatics
[C] Data about the tools and methods
[D] Data about the data
19. The agreement that is enforceable by
law is known as
[A] valid agreement
[B] void agreement
[C] illegal agreement
[D] unenforceable agreement
20. To protect yourself from computer
hacker, you should turn on a/an
[A] script
[B] firewall
[C] VLC
[D] antivirus
21. Key logger is a/an
[A] firmware
[B] antivirus
[C] spyware
[D] All of the above
22. Which country introduced Smart
Health Care Card in large scale for the
first time?
[A] France
[B] India
[C] USA
[D] China
23. Electronic discovery (e-discovery) refers
to
[A] discovery in electronic affairs for
storing information
[B] discovery in civil litigation with
electronically stored information
[C] discovery in outlining electronic
evidence
[D] discovery in accounting databases
and Web sites
24. When ethics and law overlap, this is
called as
[A] yellow area
[B] white area
[C] black area
[D] grey area
25. Which one falls under the cognitivist
metaethical theories?
[A] Emotivism
[B] Imperativism
[C] Supernaturalism
[D] Prescriptivism
26. Socially responsible behaviour
[A] never leads to improved financial
performance
[B] has adverse impact on
stakeholders
[C] is in a firm’s self-interest
[D] results
in ill-will from the
Community
27. Which is the research method used in
computer sciences?
[A] Experimental method
[B] Survey method
[C] Qualitative method
[D] All of the above
28. The World Intellectual Property Day is
observed on
[A] 26th June
[B] 26th May
[C] 26th April
[D] 26th July
29. ‘Cyber-crime against women’ is a
motive to intentionally harm the victim
[A] psychologically
[B] physically
[C] emotionally
[D] All of the above
30. Who was the famous inventor of the
first reading machine for the blind?
[A] Ray Kurzweil
[B] Friedrich Engels
[C] Karl Marx
[D] Hume
31. Fuels produced from energy crops are
[A] not storable
[B] storable
[C] very weak
[D] All of the above
32. Sugarcane can be fermented to make
[A] methane gas
[B] alcohol
[C] electricity
[D] All of the above
33. Which of the following is included in
geographical indications of goods?
[A] Handicraft
[B] Foodstuff
[C] Manufactured
[D] All of the above
34. In ‘quid pro quo’ stands for
[A] knowledge disclosed to the public
[B] monopoly granted for the term of the patent
[C] exclusive privilege of making,
selling and using the invention
[D] None of the above
35. Unauthorized access and viruses are
issues dealing with network
[A] performance
[B] reliability
[C] security
[D] None of the above
36. Network failure is primarily a _____issue.
[A] performance
[B] reliability
[C] security
[D] None of the above
37. The term ‘WIPO’ stands for
[A] World Investment Policy
Organization
[B] World
Intellectual Property
Organization
[C] Wildlife Investigation and Policing
Organization
[D] World Institute for Prevention of
Organized Crime
38. What is the full form of PDF?
[A] Printed Document Format
[B] Public Document Format
[C] Portable Document Format
[D] Published Document Format
39. The research design is a
[A] plan
[B] structure
[C] strategy
[D] All of the above
40. On the basis of time, research can be
classified as
[A] qualitative versus quantitative
[B] pure versus applied research
[C] cross-sectional versus longitudinal
research
[D] None of the above
41. The earliest calculating device is
[A] calculator
[B] abacus
[C] difference engine
[D] analytical engine
42. Computer’s basic architecture was
developed by
[A] John von Neumann
[B] Charles Babbage
[C] Blaise Pascal
[D] Jordan Murn
43. What type of commerce is enabled by
technology?
[A] Path-to-profitability
[B] E-commerce
[C] E-Buy
[D] Internet
44. Technology _____ has the power to help
the billions of poor people all over the earth.
[A] not guided by ethics
[B] guided by ethics
[C] guided by scientists
[D] None of the above
45. The Internet will allow people in remote
places to make
[A] business deals
[B] to buy and sell
[C] to keep in touch with their friends
[D] All of the above
46. Which of the following is not an audio
file format?
[A] .amr
[B] .m4a
[C] .mp4
[D] .mp3
47. In computer security, _____ means that
computer system assets can be
modified only by authorized parities.
[A] confidentiality
[B] integrity
[C] availability
[D] authenticity
48. Shortcut key in MS-Word for ‘select all’
is
[A] Ctrl+C
[B] Ctrl+V
[C] Ctrl+F
[D] Ctrl+A
49. In computer terminology, processed
data is called
[A] binary data
[B] information
[C] language
[D] code
50. Softwares are referred to as
[A] hardware
[B] computer programs
[C] binary data
[D] procedure
51. The first Web browser is
[A] mosaic
[B] netscape
[C] Internet explorer
[D] Collabra
52. The smallest unit of storage in
computer is referred to as
[A] bit
[B] alphabet
[C] nibble
[D] number
53. Which of the following is the parts of
computer hardware?
[A] Keyboard
[B] Printer
[C] Motherboard
[D] All of the above
54. The possible form(s) of computer crime
is/are
[A] bank and credit card fraud
[B] terrorism
[C] hacking
[D] All of the above
55. Which is not an office package software?
[A] Word
[B] Excel
[C] Paint
[D] Excess
56. Computer security is needed for
[A] prevention of work related
documents
[B] prevention of data theft
[C] prevention of bank accounts
[D] All of the above
57. The full form of WWW is
[A] World Wide Word
[B] World Wide Wood
[C] World Wide Width
[D] World Wide Web
58. OTP stands for
[A] One Time Password
[B] On Time Processing
[C] One Time Processing
[D] None of the above
59. Domain names are part of
[A] universal resource locator
[B] cascading style sheets
[C] extensible markup language
[D] All of the above
60. Portral is a system of
[A] a gateway
to information or news
about a range of services
[B] communication medium
[C] medium of exchange
[D] online payment medium payment medium61. The full form of IP is
[A] Internet Provider
[B] Internet Protocol
[C] Internet Password
[D] None of the above
62. Which type of ad appears on the top of
a Web page?
[A] Pop-under ad
[B] Pop-up ad
[C] Banner ad
[D] Discount ad
63. EDI stands for
[A] Electronic Data Information
[B] Electronic Data Interchange
[C] Exchange Data Interchange
[D] Electronic Device Information
64. Junk e-mail is also called
[A] spam
[B] spoof
[C] sniffer script
[D] spool
65. SMPS stands for
[A] Switched Mode Power Supply
[B] Start Mode Power Supply
[C] Store Mode Power Supply
[D] Single Mode Power Supply
66. The computer size was very large in
[A] first generation
[B] second generation
[C] third generation
[D] fourth generation
67. Which of the following are types of
ROMs?
[A] SROM and DROM
[B] PROM and EPROM
[C] Only one type there is no further
classification
[D] PROM and EROM
68. A non-erasable disk that stores
digitized audio information is
[A] CD
[B] CD-ROM
[C] DVD-R
[D] DVD-RW
69. Which of the following is not a
characteristic of a computer?
[A] Diligence
[B] IQ
[C] Accuracy
[D] Versatility
70. Which of the following is not a
positional number system?
[A] Roman number system
[B] Octal number system
[C] Binary number system
[D] Hexadecimal number system
71. The point used in computer to connect
external devices is
[A] port
[B] socket
[C] plug
[D] None of the above
72. Set of programs which consists of full
documentation is called
[A] software package
[B] system software
[C] utility software
[D] file package
73. What is required when more than one
person uses a central computer at the
same time?
[A] Light pen
[B] Mouse
[C] Digitizer
[D] Terminal
74. The first boot sector virus is
[A] computed
[B] mind
[C] brain
[D] Elk Cloner
75. The linking of computers with a
communication system is called
[A] assembling
[B] interlocking
[C] pairing
[D] networking
76. The phrase _____ describes viruses,
worms, Trojan horse attack applets
and attack scripts.
[A] spam
[B] phishing
[C] malware
[D] virus
77. Everything that the computer does is
controlled by its
[A] CPU
[B] ROM
[C] RAM
[D] storage devices
78. Encrypted passwords are used for
[A] security purpose
[B] passwords list secret
[C] faster execution
[D] Both [A] and [B]
79. Which memory is non-volatile and may
be written only once?
[A] PROM
[B] RAM
[C] EPROM
[D] SRAM
80. Which device of computer dispenses
with the use of the keyboard?
[A] Mouse
[B] Light pen
[C] Joystick
[D] Touch