Exam 5: Computer Science and Ethics
Exam 1: Computer and Technology23 Questions
Exam 2: Computer and Internet Terminology23 Questions
Exam 3: Information Technology and Communication25 Questions
Exam 4: Technology and Cybersecurity25 Questions
Exam 5: Computer Science and Ethics28 Questions
Select questions type
Which of the following is a step that all computer users should take to protect against virus attacks?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
D
Computing systems, which imitate human brain through a network of highly interconnected processing elements.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
What is the first step in protecting yourself from identity theft?
(Multiple Choice)
4.9/5
(34)
The science and engineering of making intelligent machines, especially intelligent computer programs.
(Multiple Choice)
4.9/5
(43)
A computer user, who copies an application onto more than one computer, if the license agreement does not permit this, is participating in:
(Multiple Choice)
4.9/5
(27)
Computers are programmed to make decisions in real-life situations are known as
(Multiple Choice)
4.9/5
(50)
Established by the Ministry of Education, Government of India as an autonomous organization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research
(Multiple Choice)
4.7/5
(40)
The difficulty a person can have in understanding an issue and making decisions that can be caused by the presence of too much information
(Multiple Choice)
4.9/5
(31)
Experts who are performing a needed service for society by helping companies realize the vulerabilities that exist in their systems by break into system just for the challenge.
(Multiple Choice)
4.9/5
(44)
If the antivirus software detects a virus signature or suspicious activity, it stops the execution of the file and virus and notifies you that it has dtected virus is known as:
(Multiple Choice)
4.8/5
(38)
Which among the following is not an indication of cyber addition
(Multiple Choice)
4.9/5
(34)
Which among the following skills need for locating appropriate information on the Internet
(Multiple Choice)
4.8/5
(42)
Which among the following is not applicable to internet use
(Multiple Choice)
4.8/5
(45)
The discrepancy between the "haves" and "have-notes" with regards to computer technology is commonly referred as:
(Multiple Choice)
4.9/5
(38)
------ uses software to allow people to interact with three-dimensional simulated environment.
(Multiple Choice)
4.9/5
(43)
A repetitive strain injury (RSI) in computer users caused by
(Multiple Choice)
4.8/5
(40)
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.
(Multiple Choice)
4.8/5
(21)
Showing 1 - 20 of 28
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)