Millennium College of Nursing Sciences, Awka Introduction To Nursing Informatics Question Guide

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

MILLENNIUM COLLEGE OF NURSING SCIENCES, AWKA

INTRODUCTION TO NURSING INFORMATICS

QUESTION GUIDE

1. Which of the following devices can be considered as input devices?


A. keyboard and mouse
B. scanner and printer
C. hard drive and speakers
D. microphone and cd-rom drive

2. Which of the following is not one of the four major functions of a computer?
A. output
B. storage
C. processing
D. calculation

3. Which of the following is not an output device?


A. printer
B. hard drive
C. monitor
D. speakers

4. The resolution of a monitor is governed by the


A. size of the screen
B. cost of the monitor
C. number of pixels on the screen

1
D. contrast of the pixels on the screen

5. All of the following are important to consider when buying an LCD monitor
EXCEPT
A. brightness
B. viewing angle
C. pixel swap rate
D. resolution

6. Restarting the system after it has been completed powered off is called
A. a warm boot
B. a standby start
C. hibernation
D. a cold boot

7. An Ethernet port is used for connecting your computer to


A. a network
B. a printer
C. a monitor
D. a digital camera

8. Which of the following devices is considered the brain of the computer?


A. read only memory
B. central processing unit
C. random access memory
D. motherboard

9. Which of the following statements about the hard disks is TRUE?


A. hard disks are always installed inside the system unit of a computer
B. hard disks are considered volatile storage devices
C. with the rise of flash drives, hard disks are becoming legacy technology
D. hard disks are considered nonvolatile storage devices

10. Which one of the following statements is not true about instant messaging?
A. it is a popular form of communication
B. you communicate in real time
C. only two people can im at the same time

2
D. like e-mail, im is not good for private conversations

11. When shopping online which of the following does not indicate that you have a
secure connection display?
A. a closed padlock icon in the status bar
B. the url begins with https
C. the word “secure” in the title bar
D. the verisign seal on the web page

12. Pages on the web have spots youcan click called


A. hyperlinks
B. links
C. hot spots
D. all of the above

13. Links you can click on a web site include


A. highlighted text
B. highlighted graphics
C. buttons
D. all of the above

14. In addition to the web the internet also includes


A. e-mail
B. gopher and ftp
C. usenet and telnet
D. all of the above

15. To put a site on the web you need to work with


A. an access provider

3
B. a presence provider
C. the internet authority
D. a design company

16. A browser
A. displays web documents
B. allows you to navigate
C. allows you to copy, print and transfer documents
D. all of the above

17. To locate information on the web you can


A. use a search engine
B. select sites from list
C. click any link to browse
D. all of the above

18. When you use a search engine, the term hit refers to
A. a popular site
B. any site that’s listed
C. any site that’s related to popular music
D. any site related to baseball

19. Search engines search indexes of key terms that are often compiled by a
software program called
A. an insect
B. a spider
C. a worm
D. none of the above

20. The term bandwidth refers to


A. how much data can be sent through a connection
B. the amount of data in a multimedia file
C. how fast your computer is

4
D. none of the above

21. Browsers are enhanced by installing A. plug-ins


B. helper applications
C. a new version
D. all of the above

22. On the keyboard, the key you press to finalize a command or entry is
A. enter
B. control
C. escape
D. all of the above

23. When selecting a scanner, be sure to base your decision on


A. the number of bits assigned to each pixel
B. its optical resolution
C. whether it has optical character recognition software included
D. all of the above

24. The most common computer pointing device is


A. your finger
B. a mouse
C. a trackball
D. none of the above

25. The overall design of a font is called its


A. type style
B. type face
C. type size
D. serif

26. The name of the first digital computer is


A. enicac
B. mark i
C. ibm 132
D. apple ii

27. …………………designed Remington Rand became one of the first


commercially available computers.
A. univac-i
B. enicac
C. mark i
D. none of the above

28. notebook and smaller computers usually use


A. liquid crystal displays
B. electroluminescent displays
C. field emission displays
D. all of the above

29. Second generation computers contained ………………in place of vacuum


tubes.
A. transistors
B. liquid crystal displays
C. both a and b
D. neither a nor b

30. ………………….developed the integrated circuits


A. kim philby

5
B. jack philby
C. john neumann
D. thomas watson

31. Which of the following period is the first generation of computing?


A. 1945-55
B. 1956-63
C. 1964-1971
D. none of the above

32. Which of the following is the first general purpose computer?


A. mark i
B. eniac
C. ibm123
D. apple ii

33. Which of the following period is the second generation of computing?


A. 1945-55
B. 1956-63
C. 1964-1971
D. none of the above

34. IBM’s System/360 is an example of ……………generation computer.


A. first
B. second
C. third
D. fourth

35. The first personal computer was introduced by


A. ibm
B. commodore
C. apple

D. none of the above

36. Fifth generation computers are capable of ………………….


A. language translation
B. language processing
C. decision making
D. all of the above

37. Which of the following memory is the additional memory attached to a


computer system?
A. primary memory
B. secondary memory
C. ram
D. rom

38. ------------ unit of CPU directs and co-ordinates all operations of a computer.
A. alu
B. ram
C. control unit
D. register

39. Memory of a computer is generally expressed in terms of ‘K’, where ‘K’ stands
for
A. 1042
B. 1024
C. 1204

6
D. none of these

40. The first electronic computer was


A. mark i
B. univac
C. enicac
D. none of the above

41. --------------cards are an integrated circuit that generates an audio signal and
sends it to a computer’s speakers:
A. video card
B. sound cards
C. web cam
D. none of these

42. FORTRAN is a :
A. high level language
B. low level language
C. assembly language
D. none of these

43. The base of operations for the brains of a computer is :


A. desktop
B. keyboard
C. motherboard
D. pda

44. One cannot write new data in this type of memory:


A. ram
B. rom
C. cpu
D. none of these

45. These are machines which are used in computers to communicate with other
computing systems:
A. motherboard
B. modem
C. cd rom
D. graphic cards

46. The function of ALU is:


A. to do arithmetic operation
B. to control other parts of a computer
C. to do arithmetic and logic operations
D. to produce output

47. Mouse was invented by……………in 1963


A. douglas engelbart
B. jack philby
C. john neumann
D. thomas watson

48. USB means………………….


A. universal serial bus
B. university sector bus
C. unique serial bus
D. none of these

49. LAN stands for…………………

7
A. local area network
B. loyal area network
C. large area network
D. none of these

50. MAN stands for………………


A. metropolitan area network
B. man area network
C. manchester area network
D. none of these

51. WAN stands for………………


A. wireless area network
B. wired area network
C. wide area network
D. none of these

52. PAN stands for………………


A. pan american network
B. personal area network
C. personal academic network
D. none of these

53. VPN stands for…………….


A. virtual private network
B. very private network
C. voice passing network
D. none ofthese

54. GB stands for ………………….


A. gigabyte
B. giant byte
C. global bus
D. none of these

55. PDA stands for ………………..


A. personal digital assistant
B. personal dairy assistant
C. private digital assistant
D. none of these

56. ………………….. is the primary large printed circuit board within a personal
computer.
A. motherboard
B. main memory
C. magnetic disk
D. none of these

57. CRT means ……………………..


A. cathode ray tube
B. central ray tube
C. cathode ray tray
D. none of these

58. Magnetic disks are also known as………………….


A. hard disk
B. soft disk
C. compact disk

8
D. none of these

59. Which of the following documents handling system is not used for storage of
documents
A. cd-rom
B. microfiche
C. microfilm
D. none of these

60. Which of the following are input devices?


A. keyboard
B. mouse
C. card reader
D. all of these

61. Examples of output devices are


A. screen
B. printer
C. speaker
D. all of these

62. VDU is also called


A. screen
B. monitor
C. both 1 & 2
D. printer

63. Any two computers connected through a telephone line should be connected
with a………….on both sides.
A. printer
B. scanner
C. hard disk
D. modem

64. Which of the following is not a transmission medium


A. twisted pair cable
B. coaxial cable
C. modem
D. satellite system

65. A server in LAN is a


A. nic
B. work station with huge secondary storage
C. device offering service to user
D. none of these

9
66. Which of the following items is not used in Local Area Networks?
A. modem
B. printer
C. computer
D. cable

67. Different computers are connected to LAN by a cable and


A. special wires
B. telephone lines
C. modem
D. interface card

68. What is the name of the network technology in which there are bidirectional
links between each possible node?
A. star
B. ring
C. mesh
D. tree

69. The most flexible network topology is


A. ring
B. star
C. bus
D. none of these

70. Which of the following topologies is highly reliable?


A. ring
B. star
C. fully connected mesh
D. none of these

71. Data communication cable laying is not required when using

10
A. optical fibre
B. coaxial fibre
C. microwave transmission
D. none of these

72. Which data communication method is used for sending data in both direction
at the same time?
A. half duplex
B. full duplex
C. super duplex
D. simplex

73. Which of the following is suitable for networking within a building?


A. wan
B. lan
C. man
D. van

74. Which of the following is suitable for networking in two adjacent buildings?
A. wan
B. lan
C. man
D. van

75. Ethernet networks transmit data in small units. These units are called………
A. baud
B. frames
C. data bundles
D. none of these

11
76. Baud rate means
A. the rate at which data is transferred
B. the rate at which data is processed
C. the rate at which data is received from the modern
D. none of these.

77. Baud rate is measured in


A. bits per second
B. bytes per second
C. megabytes per second
D. none of these

78. Data can be transmitted in the form of……..


A. serial data transmission
B. parallel data transmission
C. both of these
D. none of these

79. Our public telephone network is also known as…………


A. public switched telephone network
B. private switched telephone network
C. value added network
D. none of these

80. Which of the following is most popular web browser


A. netscape navigator
B. novell netware
C. windows nt
D. internet explorer

81. Which must be a valid name of a website?


A. web.india.com
B. www.roseypublications.com
C. rosey@yahoo.co.in
D. none of these

82. Which of the following is a valid name of an e-mail address?


A. web.india.com
B. www.roseypublications.com
C. rosey@yahoo.co.in
D. none of these

83. The two broad categories of software are


A. word processing and spreadsheets
B. windows and mac os
C. transaction and application
D. system and application

84. Word processing, spreadsheet and photo-editing are examples of:


A. application software
B. system software
C. operating system software
D. platform software

85. ……………….is a set of computer programs used on a computer to help


perform tasks.
A. a processor
B. memory
C. software

12
D. a command

86. Linux is a ……………………. Operating system


A. open-source
B. windows
C. microsoft
D. mac

87. A ……………………………uses pictures(icons) and menus displayed on the


screen to send commands to the computer system.
A. command-based user interface
B. gui
C. system utility
D. none of these

88. Which of the following statements is wrong


A. windows xp is an operating system
B. linux is owned and sold by microsoft
C. photoshop is graphical design tool by adobe
D. linux is a free and open source software

89. Which of the following is true?


A. mp3 files contain audio data
B. mp3 files are the only recognized format for digital audio
C. windows media player is able to organize large collections of audio files.
D. only a and c are true.

90. Which one of the following statements is NOT true about instant messaging?
A. it is a popular form of communication
B. you communicate in real time
C. only two people can mi at the same time
D. like e-mail im is not good for private conversations

13
91. When shopping online, which of the following does NOT indicate that you have
a secure connection displays?
A. a closed padlock icon in the status bar.
B. the url begins with https.
C. the word ‘’secure’’ in the title bar.
D. the verisign seal on the web page.

92. With a podcast, you can


A. subscribe to video and audio content.
B. have the most recent content ‘’delivered’’ automatically.
C. play the video andaudio content on an mp3 player.
D. all of the above.

93. An online journal or chronological posting of thoughts and opinion is a[n]


A. podcast.
B. wiki
C. blog
D. im chat

94. When searching the internet which of the following is true?


A. it doesn’t matter which search engine you use; they all provide the same results
B. a subject directory is best to use when you can provide keywords
C. boolean operators and advanced search pages will help you to narrow your results
D. search engines are best to use when you need to narrow the search by specific topics

95. In a web address http://www.irs.gov, the .gov would be considered the


A. url
B. top-level domain
C. protocol
D. web address

14
96. Which of the following provides the fastest broadband internet connection by
transmitting data at the speed of light
A. cable
B. dsl
C. fiber optics
D. satellite

97. The primary disadvantage to DSL internet access is the quality and
effectiveness of service
A. are affected by the number of users on the same dsl line at any time
B. depend on your proximity to a phone company central office
C. can be affected by adverse weather conditions
D. depend on the internet service provider you select

98. A kilobyte stores how many numbers of bytes?


A. 1000
B. 1024
C. 1048
D. 100

99. What is a Podcast?


A. is a clip of audio or video content that is broadcast over the internet
B. is an instant messaging tool
C. is a free popular email service
D. is a web-conferencing tool

100. Which of the following is not a use of computers in the legal environment?
A. creating animations that simulate the crime for use in the courtroom
B. tracking criminal behavior patterns
C. predicting criminal behavior patterns
D. conducting interviews with suspects

15
76. Baud rate means
A. the rate at which data is transferred
B. the rate at which data is processed
C. the rate at which data is received from the modern
D. none of these.

77. Baud rate is measured in


A. bits per second
B. bytes per second
C. megabytes per second
D. none of these

78. Data can be transmitted in the form of……..


A. serial data transmission
B. parallel data transmission
C. both of these
D. none of these

79. Our public telephone network is also known as…………


A. public switched telephone network
B. private switched telephone network
C. value added network
D. none of these

80. Which of the following is most popular web browser


A. netscape navigator
B. novell netware
C. windows nt
D. internet explorer

81. Which must be a valid name of a website?


A. web.india.com
B. www.roseypublications.com
C. rosey@yahoo.co.in
D. none of these

82. Which of the following is a valid name of an e-mail address?


A. web.india.com
B. www.roseypublications.com
C. rosey@yahoo.co.in
D. none of these

83. The two broad categories of software are


A. word processing and spreadsheets
B. windows and mac os
C. transaction and application
D. system and application

84. Word processing, spreadsheet and photo-editing are examples of:


A. application software
B. system software
C. operating system software
D. platform software

85. ……………….is a set of computer programs used on a computer to help


perform tasks.
A. a processor
B. memory
C. software
D. a command

16
86. Linux is a ……………………. Operating system
A. open-source
B. windows
C. microsoft
D. mac

87. A ……………………………uses pictures(icons) and menus displayed on the


screen to send commands to the computer system.
A. command-based user interface
B. gui
C. system utility
D. none of these

88. Which of the following statements is wrong


A. windows xp is an operating system
B. linux is owned and sold by microsoft
C. photoshop is graphical design tool by adobe
D. linux is a free and open source software

89. Which of the following is true?


A. mp3 files contain audio data
B. mp3 files are the only recognized format for digital audio
C. windows media player is able to organize large collections of audio files.
D. only a and c are true.

90. Which one of the following statements is NOT true about instant messaging?
A. it is a popular form of communication
B. you communicate in real time
C. only two people can mi at the same time
D. like e-mail im is not good for private conversations

17
91. When shopping online, which of the following does NOT indicate that you have
a secure connection displays?
A. a closed padlock icon in the status bar.
B. the url begins with https.
C. the word ‘’secure’’ in the title bar.
D. the verisign seal on the web page.

92. With a podcast, you can


A. subscribe to video and audio content.
B. have the most recent content ‘’delivered’’ automatically.
C. play the video andaudio content on an mp3 player.
D. all of the above.

93. An online journal or chronological posting of thoughts and opinion is a[n]


A. podcast.
B. wiki
C. blog
D. im chat

94. When searching the internet which of the following is true?


A. it doesn’t matter which search engine you use; they all provide the same results
B. a subject directory is best to use when you can provide keywords
C. boolean operators and advanced search pages will help you to narrow your results
D. search engines are best to use when you need to narrow the search by specific topics

95. In a web address http://www.irs.gov, the .gov would be considered the


A. url
B. top-level domain
C. protocol
D. web address

18
96. Which of the following provides the fastest broadband internet connection by
transmitting data at the speed of light
A. cable
B. dsl
C. fiber optics
D. satellite

97. The primary disadvantage to DSL internet access is the quality and
effectiveness of service
A. are affected by the number of users on the same dsl line at any time
B. depend on your proximity to a phone company central office
C. can be affected by adverse weather conditions
D. depend on the internet service provider you select

98. A kilobyte stores how many numbers of bytes?


A. 1000
B. 1024
C. 1048
D. 100

99. What is a Podcast?


A. is a clip of audio or video content that is broadcast over the internet
B. is an instant messaging tool
C. is a free popular email service
D. is a web-conferencing tool

100. Which of the following is not a use of computers in the legal environment?
A. creating animations that simulate the crime for use in the courtroom
B. tracking criminal behavior patterns
C. predicting criminal behavior patterns
D. conducting interviews with suspects

101. ………………………integrates communications, data management, and


security services to
allow business applications within different organizations to automatically
interchange
information.
A. e-commerce
B. e-governance
C. e-banking
D. none of the above

102. Nanotechnology is the science of things on the order of


A. inches
B. milometers
C. nanometers
D. nanobytes

103. Computer systems can NOT be trained to understand


A. the indian taxcode
B. the human emotion
C. a good joke
D. the perfect golf swing

104. The most wired country in the world is


A. germany
B. japan
C. the us

19
D. south korea
105. The device that tracks movement is a
A. gps
B. rfid tag
C. mobile phone
D. patient simulator

106. Which of the following is not a good reason to learn more about computers?
A. to keep your home secure
B. to increase your career options
C. to learn how to hack into an organisation’s main computer
D. to make better informed purchasing decisions

107. Infrared scanners cannot


A. scan pages and detect unusual objects
B. be worn on the wrist
C. translate a bar code into a computer data file
D. be used by shipping companies to track packages as they move around the world

108. Computer forensics


A. uses computer technology to gather potential legal evidence
B. helps identify the remains of bodies
C. investigates a suspect’s home computer for evidence
D. all of the above

109. Robotic surgery devices help physicians because


A. they make more accurate incisions
B. the doctor does not have to be involved in the actual surgery
C. they monitor and make suggestive procedure
D. if runs into complications, they can suggest creative alternatives.

110. Artificial Intelligence is concerned with making computers behave like


A. humans

20
B. robots
C. home appliances
D. none of these

111. In Turing test the number of participants are:


A. one
B. three
C. four
D. none of the these

112. Knowledge based systems have been developed for fields such as:
A. financial markets
B. diagnosing diseases
C. scheduling airplanes
D. all of these

113. ) emoticon stands for


A. happy
B. sad
C. surprise
D. none of the above

114. Individuals who are not involved in expert system


A. mechanical engineer
B. end user
C. problem solving expert
D. knowledge engineer

115. Which of the following are artificial intelligence languages?


A. prolog
B. lisp
C. html

D. both (a) and (b)

116. News stories on Information Technology may be on topics such as


A. the information superhighway
B. multimedia
C. the internet
D. all of the above

117. Information Technology can


A. process raw data
B. recycle processed information and use it as data in another processing step
C. package information so it is easier to understand
D. all of the above.

118. The five steps, input, processing, output, storage and retrieval, and
distribution and communication are all part of
A. the information super highway
B. the internet
C. the information processing cycle
D. none of the above

119. Computer data can include


A. prices
B. flight numbers
C. video clips and sounds
D. all of the above

21
120. Typical operating systems include
A. microsoft word and excel
B. adobe photoshop and pagemaker
C. both a and b
D. neither a nor b

22
121. Computers are used in business to
A. process transactions
B. allow people to work at home
C. do desktop publishing of documents
D. all of the above

122. GPS is used to


A. determine location
B. make weather forecasts
C. enhance computer performance
D. guide satellites in space

123. The smallest computer (in size) is most likely called a


A. mainframe computer
B. server
C. handheld, palm-top, or personal digital assistant
D. notebook computer

124. The most powerful computer is most likely called a


A. workstation
B. minicomputer
C. mainframe
D. supercomputer

125. A computer advertised as a server might also be called a


A. workstation
B. mainframe
C. desktop computer
D. any of the above

126. A personal computer can


A. add numbers
B. sorts lists
C. display graphs
D. all of the above

127. In this type e-governance is created between the government and citizen?
A. g2g
B. g2c
C. g2b
D. none of these

128. CAD stands for:


A. computer aided manufacture
B. computer aided development
C. computer aided device
D. none of these

129. Computer to computer exchange of business information is done through:


A. cam
B. cad
C. erp
D. edi

130. This refers to the use of small and portable computing devices in wireless
enabled networks that provide wireless connections to a central main server.
A. cloud computing
B. mobile computing

23
C. green computing
D. none of these

131. This is a mechanism of delivery of short messages over the mobile networks.
A. mms
B. sms
C. ems
D. none of these

132. Which of the following is not a wireless communication device?


A. bluetooth
B. gps
C. infrared communication
D. none of these

133. This is a satellite-based navigation system made up of a network of 24 satellite


placed into orbit by the US Department of Defence.
A. bluetooth
B. gps
C. infrared communication
D. none of these

134. This is a plastic card embedded with a computer chip that stores and transacts
data between users:
A. credit card
B. smart card
C. debit card
D. none of these

135. These computers made of genes building blocks


A. motherboard
B. personal computers

24
C. dna computers
D. graphic cards

136. GPS satellites circle the earth ………………times a day:


A. three times
B. two times
C. six times
D. once in a month

137. …………………..is typically a medication ordering and fulfillment system


A. cpoe
B. e h r
C. cdss
D. pacs

138. ……………………provides physicians and nurses with real-time diagnostic


and treatment recommendations.
A. cdss
B. cpoe
C. e h r
D. pacs

139. ERP means…………………..


A. enterprise resource planning
B. electronic report presentation
C. electronic resource planning
D. none of these

140. Computer to computer exchange of business documents is called………….


A. edi
B. gps
C. sms

D. none of these

141. ICT stands for…………………….


A. information and communication technology
B. international communication technology
C. inter school communication technology
D. none of these

142. G2G e-governance means……………………….


A. government to government
B. government to citizens
C. government to employees
D. none of these

143. G2C e-governance means……………………….


A. government to government
B. government to citizens
C. government to employees

25
D. none of these

144. G2E e-governance means……………………….


A. government to government
B. government to citizens
C. government to employees
D. none of these

145. G2B e-governance means……………………….


A. government to business
B. government to citizens
C. government to employees
D. none of these

26
146. E H R means………………………
A. electronic health record
B. electronic health care
C. election hour report
D. none of these

147. …………………… is a communication technology that allows users to


exchange multimedia communication between capable mobile phones and other
devices.
A. bluetooth
B. blue eyes
C. blue devices
D. none of these

148. Mobile computing is used for only in professions that


A. don’t rely on internet access
B. where work requires intensive graphics and large display screens
C. where work requires intensive computer processing power
D. none of the above

149. ………….. is a computer based tool for mapping and analyzing things that
exist and events that happen on earth.
A. gis
B. gps
C. bis
D. none of the above

150. GPS is a………………….. owned utility.


A. us
B. japan
C. russian
D. uk

151. The device best suited for a sales person who has to demonstrate processor-
intensive multimedia to clients is a
A. smartphone with internet capabilities
B. pda with an external monitor
C. tablet pc
D. notebook computer

152. GPS chips are


A. installed in all newly manufactured automobiles
B. installed in all newly manufactured cell phones
C. reliable only when installed in tablet pcs
D. available only for pdas and smart phones

153. For internet access you should obtain


A. a tablet pc
B. a smartphone
C. a pda
D. all of the above can have internet capabilities

154. Portable devices that can be synchronized with your home computer are
A. pdas and gps units
B. ipods pdas and cell phones
C. pagers and gps units
D. any device with bluetooth.

155. What is an information?


A. raw data

27
B. processed data
C. collection of data
D. none of these

156. What is the full form of SMS?


A. switched mode system
B. short message service
C. short mail service
D. none of these

157. What is the full form of MMS?


A. mobile mode system
B. mobile message service
C. multimedia messaging service
D. none of these

158. The concept of line of sight means


A. alignment of sending and receiving devices
B. alignment of only hand devices
C. alignment of only receiving devices
D. none of these

159. What is the full form of EDI?


A. electronic data interchange
B. electronic data information
C. electric data interchange
D. none of these

160. Which of the following support is not available on MMS?


A. text
B. video
C. graphics

28
D. none of these

161. Computer to computer exchange of business is done through


A. e-banking
B. e-commerce
C. edi
D. internet banking

162. The height at which the GPS satellite is above the earth’s surface is
A. 12000 miles
B. 1000km
C. 1000miles
D. none of these

163. The knowledge that can be spoken in language and transmitted among
individuals.
A. general knowledge
B. explicit knowledge
C. tacit knowledge
D. none of the above

164. This is the exclusive right granted by statute to the author of the works to
reproduce dramatic, artistic, literary or musical work or to authorize its
reproduction by others.
A. patent
B. copy right
C. trade mark
D. none of the above

165. This is a legal monopoly granted for a limited time to the owner of an
invention.
A. patent
B. copy right
C. trade mark
D. none of the above

166. Any symbol, logo, or name used to enable the public to identify the supplier of
goods.
A. patent
B. copy right
C. trade mark
D. none of the above

167. The Indian Patent Act finally amended in


A. 1970
B. 1996
C. 2005
D. none of the above

168. CAIstands for:


A. computer aided training
B. computer assisted instruction
C. computer aided technology

29
D. none of these

169. This network is an autonomous Inter-University Centre of the University


Grants Commission.
A. inflibnet
B. nicenet
C. brnet
D. none of these

170. ………………knowledge are also known as informal knowledge.


A. tacit knowledge
B. explicit knowledge
C. information
D. none of these

30
171. IPR stands for………………
A. intellectual property rights
B. individual property rights
C. inter person rights
D. none of these

172. ………………knowledge are also known as formal knowledge.


A. explicit knowledge
B. tacit knowledge
C. information
D. none of these

173. ……………………….is one of many web-based learning management


systems(LMS) through
which teachers can work with students, whether in distance mode or as a
supplement to
face-to-face teaching.
A. nicenet
B. inflibnet
C. brnet
D. none of these

174. ………………….is a prototype portal site for biological information and bio-
resource information.
A. brnet
B. inflibnet
C. nicenet
D. none of these

175. The patent system in India is governed by the ………………..


A. patents act, 1970
B. patents act, 1911
C. patents act, 1972
D. none of these

31
176. CBT stands for:
A. computer based training
B. computer based tooling
C. computer based technology
D. none of these

177. TRIPS means……………..


A. trade related aspects of intellectual property rights
B. trade related activities and information providing rights
C. round trip to europe
D. none of these

178. Which of the following is a processed thing?


A. data
B. information
C. database
D. none of these

179. Which of the following operators cannot be applied to search?


A. or
B. not
C. and
D. bool

180. Intellectual Property Rights does not cover the following area
A. copyright
B. patents
C. trademark
D. none of these

181. Indiancopyright act came into existence in the year


A. 1950
B. 1955
C. 1957
D. none of these

182. …………………..developed a computer language called LOGO, so that


children could program computers.
A. seymorpapert
B. jean piaget
C. microsoft
D. none of the above

183. ……………….. is a computer language developed by Seymour Paper and his


colleagues at MIT,so that children could program computers.
A. logo
B. pogo
C. gigo
D. none of the above

184. When shopping online which of the following does NOT indicate that you have
a secure connection displays?
A. a closed padlock icon in the status bar
B. the url begins with https
C. the word “secure” in the title bar
D. the verisign seal on the web page.

185. Which of the following is annoying, but really doesn’t render any harm to

32
your computer?
A. adware
B. spyware

33
C. sneakware
D. malware

186. One scam that lures internet users into revealing personal information is
A. malware
B. phishing
C. spam
D. internet hoax

187. Cell phones use which category of operating systems


A. single user, single task
B. multi user, multi task
C. single user, multitask
D. real-time

188. When hacker use a program that pretends to be useful to a user while actually
allowing the hacker to gain control of the user’s computer, this is called a
A. zero-day attack
B. trojan horse attack
C. distributed denial of service attack
D. boot sector virus attack

189. Which is a benefit of a firewall?


A. they make it harder for a hacker to locate specific computer on a network
B. they repeatedly change the ip address of the router
C. they open unused logical ports to increase throughput
D. they filter out unwanted wireless signals

190. Viruses that travel from computer to computer on their own(independent of


host) are called
A. worms
B. stealth viruses

34
C. logic bombs
D. macro viruses

191. Flash drives have replaced floppy disks as the preferred method of portable
storage because:
A. they hold much more data than floppy disks
B. data is not magnetic so less subject to errors
C. they have quicker access time than a floppy drive
D. all of the above

192. Which of the following is not harmful for your computer


A. malware
B. spyware
C. virus
D. cookies

193. This is based on individuals who know how to use these technologies and those
who do not.
A. access
B. usage
C. usage quality
D. none of the above

194. This refers to the gap between people who possess regular access to
information technology and those who do not have this access.
A. digital divide
B. discrimination
C. computer divide
D. none of these

195. This type of digital divide is based on the difference between individuals with
access and those without access.
A. access

35
B. usage
C. usage quality
D. none of the above

196. It is based on the differences in the quality of using information technology.


A. access
B. usage
C. usage quality
D. none of these

197. Who started Free Software foundation?


A. linus torvald
B. richard m stallman
C. gnu
D. none of the above

198. This kind of attack involves altering raw data just before a computer
processes it and then changing it back after the processing is completed.
A. data diddling
B. salami attacks
C. virus attack
D. none of the above

199. This kind of crime is normally common in the financial institutions or for the
purpose of committing financial crimes.
A. data diddling
B. salami attacks
C. virus attack
D. none of the above

200. IT Act in India was amended in


A. 2000
B. 2004

36
C. 2008
D. none of these

201. This refers to environmentally sustaining computing or IT.


A. cloud computing
B. green computing
C. electronic computing
D. none of the above

202. …………………is the Universal character encoding standard, used for


representation of text for Computer processing.
A. unicode
B. sap
C. java
D. none of the above

203. …………………..software is a matter of Liberty not Price.


A. free
B. proprietary
C. application
D. none of these

204. ………………refers to a code of safe and responsible behavior for the Internet
Community
A. cyber ethics
B. social issues
C. cyber crime
D. none of the above

205. ………………… refers to unlawful acts wherein the computer is either a tool
or target or both.

37
A. cyber crime
B. cyber ethics
C. cyber law
D. none of the above

206. ………………refers to sending large number of mail to the victim, which may
be an individual or a company or even mail servers there by ultimately resulting
into crashing.
A. email bombing
B. logic bomb
C. virus
D. none of the above

207. …………….. are programs that attach themselves to a computer or a file and
then circulate themselves to other files and to other computers on a network.
A. virus
B. logic bomb
C. web jacking
D. none of these

208. In ……………… the hacker gains access and control over the web site of
another.
A. web jacking
B. time theft
C. logic bomb
D. none of the above

209. …………….are event dependent programs.


A. logic bombs
B. trojan bombs
C. salami attacks
D. none of these

38
210. ……………………..is the process of coding and scrambling of messages to
prevent unauthorized access to or understanding of the data being transmitted.
A. encryption
B. firewalls
C. antivirus program
D. none of the above

211. ……………………….refers to the compulsive Internet use which interferes


with daily life, work and relationships.
A. cyber addictions
B. alcohol addiction
C. drug addiction
D. none of the above

212. ……………………is a situation where an individual is given too much


information and as a result he is confused and cannot make optimal decisions.
A. information overload
B. cyber addiction
C. internet addiction
D. none of the above

213. ……………….can be defined as electronic equipments or products which have


become
obsolete due to advancement in technology, changes in fashion, style and status and
nearing the end of their useful life.
A. e-waste
B. toxic waste
C. computer waste
D. none of the above.

214. Which chapter of the IT Act deals with computer related unlawful acts?
A. chapter x
B. chapter xi

39
C. chapter ix
D. chapter viii

215. Linux is a …………


A. database program
B. application program
C. operating system
D. none of the above

216. This is a software that is distributed under a licensing arrangement and which
allows the computer code to be shared, viewed and modified by other users and
organisations.
A. free software
B. open source software
C. gnu
D. none of the above

217. Fedora, a community distribution sponsored by


A. redhat
B. novell
C. oracle
D. none of the above

218. OpenSUSE a community distribution mainly sponsored by


A. redhat
B. novell
C. oracle
D. none of the above

219. This is a storage location from which software packages may be retrieved and
installed on a computer.
A. software distribution

40
B. software repository
C. operating system
D. none of the above

220. AbiWord is a :
A. word processor
B. spreadsheet
C. database
D. none of these

221. In Open Office.org. “Calc” is a


A. word processor
B. spreadsheets
C. database
D. none of these

222. Unix is an……………


A. operating system
B. application software
C. database program
D. none of the above

223. ………………is a popular desktop and server distribution derived from


Debian, maintained by Canonical Ltd.
A. debian
B. ubuntu
C. fedora
D. none of the above

224. Repositories are also known as


A. library
B. stories

41
C. files
D. none of these 6

225. In Open Office.org. Impress is ……………….program


A. presentation tool
B. word processor
C. spreadsheets
D. none of these

226. Which is not a part of Open Office.org software?


A. open office.org notepad
B. open office.org writer
C. open office.org draw
D. open office.org base

227. PDF stands for ……..


A. portable document format
B. portable document file
C. pre defined format
D. pixel dots format

228. DTP stands for…..


A. desk top printing
B. desk top publishing
C. desk top page
D. none of these

229. Which of the following is not a graphics format?


A. jpeg
B. tiff
C. gif
D. none of these.

42

You might also like