You are on page 1of 2

Societal Impacts of IT

A. Multiple choice questions:


1. Which field has been benefitted using the Information and
Communication Technology Tools?
a. Education b. Health c. Governance d. All of these
2. Which of the following is a popular travel agency?
a. MakeMyTrip b. MagicBricks c. Onlinesbi d. Who
3. Name the act of plagiarism that duplicates noteworthy bits of
content straight from a solitary source, without modification.
a. Ghost Writer b. Photocopy c. Potluck Paper d. Self Stealer
4. Name the term that is used to refer the freedom from intrusion by
the public, especially as a right.
a. Plagiarism b. Privacy c. Governance d. Authority
5. Name the term which is used to refer to criminal activity performed
using computers and the Internet.
a. Stealing b. Plagiarism c. Robbery d. Cyber Crime
6. Name the type of program that contains hidden malicious functions
but look like something funny or useful such as a game or utility, but
harms the system when executed.
a. Spyware b. Pirated Software c. Trojans d. Worms
7. ________________ is a junk mail which in most cases are useless that
are send automatically to flood the destination email inbox.
a. E-mail b. Junk c. Spam d. Phising
8. An option that is present in any Anti-virus software that disables a
virus:
a. Fix b. Remove c. Quarantine d. None of these
9. Great Bazaar has employed Yunus Kumar to manage and maintain
their networking architecture and wide area connectivity. Which of
these best describes his job profile?
a. Networking Engineer b. Database Analyst c. Web Designer d.
ProgrammerC
10. Sumriddhi is logging in to her gmail account and one of her friends
is trying to peep in and figure
out her password. Which of the following issues is being infringed?
a. Plagiarism b. Privacy c. Intellectual Rights d. None of these
11. Sam Niza, who was born in 1995, is thinking of a password for her
online bank account. Which
one of the following you would suggest for strengthening the security
of her account:
a. sam95 b. a99p54c66 c. samniza1995 d. sam1995
12. Amit has learnt photo editing and now he is planning to get a
career in web designing, which of
the following should he essentially learn:
a. C++ b. HTML c. Spreadsheet Package d. Presentation Package
13. It is an offence as per Cyber Laws to use a software without paying
the License Fee to the
Copyright Owner Company if that software belongs to the class of:
a. Shareware b. Freeware c. Open Source d. Proprietary Software
B. Fill in the blanks:
1. ___________ is a combination of the use of digital media, educational
technology and ICT in education.
2. ___________ allows you to transfer health resources and health care
by electronic means.
3. ___________ is the process of using ICT for delivering government
services to the nation.
4. ___________ is a term that is used to indicate the process of buying,
selling, transferring or exchanging products or services using ICT tools.
5. ___________ is the act of illegally taking away some other persons
writing, conversation, song, or even idea and publish or produce it as
your own.
6. A ___________ is generally referred to a writer who authors books
without taking credit for it and remains anonymous.
7. The term ___________ refers to the freedom from intrusion by the
public, especially as a right.
8. ___________ is a term which is used to refer to criminal activity
performed using computers and the Internet.
9. ___________ refers to a technique used to gain unauthorized access
to a computer system or network and in some cases even making
unauthorized use of this access.
10. ___________ programs secretly gather information from the
computer it has infected and transmit the information to a different
location.
C. State whether the following statements are true or false:
1. Anti-virus is a software is used to remove or disable virus in your
computer. [ ]
2. Intellectual property rights may be defined as the rights given to
persons over the creations of their minds. [ ]
3. Programming in C++ is essential for being a Web Developer. [ ]
4. Geospatial professionals are responsible for developing geographic
information. [ ]
5. Piracy is the act of illegally taking away some other persons writing,
conversation, song, or even idea and publish or produce it as your own.
[ ]
6. Virus is a term which is used to refer to criminal activity performed
using computers and the Internet. [ ]
7. Plagiarism refers to a technique used to gain unauthorized access to
a computer system or network and in some cases even making
unauthorized use of this access. [ ]
8. Hijack this is a malicious program that hijacks your browser. [ ]
9. Spam is a junk mail/mails which in most cases are useless that are
send automatically to flood the destination email inbox. [ ]
10. Worms are similar to virus but do not depend upon another
program to replicate it. [ ]

You might also like