Вы находитесь на странице: 1из 5

Computer Quiz

1. What kind of programming language is Java?


1) Object-oriented programming language
2) Relational programming language
3) Sixth-generation programming language
4) Database management programming language
5) None of these
Ans : (1)
2. What type of internet technology sends information to you
without you requesting that information?
1) F2b2C
2) Infoware
3) Push
4) Wiki
5) None of these
Ans : (3)
3. What is the second generation of the Web called?
1) New web
2) Emerging space
3) Second life
4) Web 2.0
5) None of these
Ans : (4)
4. What type of web technology allows its community members
to continuously change the contents on a web site?
1) Intelligent bots
2) Social networks
3) Wiki
4) Blog
5) None of these
Ans : (3)
5. What type of web technology provides news that can
automatically download right to your desktop?
1) Social network
2) RSS feed
3) Podcast
4) Wiki
5) None of these
Ans : (2)
6. What type of web technology creates an online community
where people can make statements and others can read and
respond to those statements?
1) I-Journal
2) Podcast
3) ASP
4) Blog
5) None of these
Ans : (4)
7. What type of technology allows you to verbally speak with
someone over the Internet?
1) Wiki
2) Social network
3) Ephone
4) VoIP
5) None of these
Ans : (4)
8. What kind of environment is Facebook or MySpace part of?
1) Wiki
2) Blog
3) Social networking
4) VoIP
5) None of these
Ans : (3)
9. What term refers to living life through technology?
1) Virtual living
2) E-living
3) Virtual space
4) E-Society
5) All of above
Ans : (2)
10.What 3-D environment allows you to speak to someone who
is far away but, at the same time, see them as a holographic
image?
1) CAVE
2) Virtual space
3) E-space
4) VoIP
5) All of above
Ans : (1)
11. What type of technology allows you to use your finger, eye,
or voice print to secure your information resources?
1) Haptics
2) Caves
3) Biometrics
4) RFID
5) All of above
Ans : (3)
12.In reference to your ethical structure, how much do you
identify with the person or persons who will receive the benefit
or suffer the harm is called which of the following?
1) Consequences
2) Relatedness
3) Likelihood of effect
4) Society's opinion
5) none of these
Ans : (2)
13.Which tracking program records every keystroke you make
on the computer?
1) ITrack/ULead
2) eFollow
3) Key logger
4) Stalking software
5) none of these
Ans : (3)
14.What is a common medium used for thieves to steal others'
identities?
1) Telephone
2) Pick pocketing
3) Burglary
4) Email
5) none of these
Ans : (4)
15.What is it called when you are rerouted from your
requested internet site to another, undesired site?
1) Phishing
2) Pharming
3) Redirecting
4) Hijacking
5) None of these
Ans : (2)
16.What is the term that refers to an ad hidden inside software
that you downloaded from an internet site?
1) Spam
2) Phish
3) Cookie
4) Adware
5) None of these
Ans : (4)
17.What type of monitoring file is commonly used on and
accepted from Internet sites?
1) Phishes
2) Smartware
3) Cookies
4) Trojans
5) None of these
Ans : (3)
18.Ideally, your sense of what is ethical should tell you which
of the following?
1) What to do
2) Who to do it to
3) When to do it
4) Where to do it
5) None of these
Ans : (1)
19.What type of software secretly collects information about
you and your internet habits?
1) Detectware
2) Spam
3) Spyware
4) Pharming
5) All the above
Ans : (3)
20.In an educational setting, instructors have access to and use
a whole host of copyrighted materials. What allows these
individuals to make use of these materials?
1) Patent laws
2) Fair Use Doctrine
3) Intellectual property laws
4) Higher educational board
5) All the above
Ans : (2)

Вам также может понравиться