Exam 5: Computer Science and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Pick the odd one out

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

Which of the following is a step that all computer users should take to protect against virus attacks?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

Computing systems, which imitate human brain through a network of highly interconnected processing elements.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

What is the first step in protecting yourself from identity theft?

(Multiple Choice)
4.9/5
(34)

The science and engineering of making intelligent machines, especially intelligent computer programs.

(Multiple Choice)
4.9/5
(43)

A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:

(Multiple Choice)
4.9/5
(27)

What is malware?

(Multiple Choice)
4.8/5
(44)

Computers are programmed to make decisions in real-life situations are known as

(Multiple Choice)
4.9/5
(50)

Established by the Ministry of Education, Government of India as an autonomous organization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research

(Multiple Choice)
4.7/5
(40)

The difficulty a person can have in understanding an issue and making decisions that can be caused by the presence of too much information

(Multiple Choice)
4.9/5
(31)

Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.

(Multiple Choice)
4.9/5
(44)

If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:

(Multiple Choice)
4.8/5
(38)

Which among the following is not an indication of cyber addition

(Multiple Choice)
4.9/5
(34)

Which among the following skills need for locating appropriate information on the Internet

(Multiple Choice)
4.8/5
(42)

Which among the following is not applicable to internet use

(Multiple Choice)
4.8/5
(45)

The discrepancy between the "haves" and "have-notes" with regards to computer technology is commonly referred as:

(Multiple Choice)
4.9/5
(38)

------ uses software to allow people to interact with three-dimensional simulated environment.

(Multiple Choice)
4.9/5
(43)

Which among the following is unethical use of cell phone

(Multiple Choice)
4.9/5
(32)

A repetitive strain injury (RSI) in computer users caused by

(Multiple Choice)
4.8/5
(40)

-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

(Multiple Choice)
4.8/5
(21)
Showing 1 - 20 of 28
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)