1) Object-oriented programming language 2) Relational programming language 3) Sixth-generation programming language 4) Database management programming language 5) None of these Ans : (1) 2. What type of internet technology sends information to you without you requesting that information? 1) F2b2C 2) Infoware 3) Push 4) Wiki 5) None of these Ans : (3) 3. What is the second generation of the Web called? 1) New web 2) Emerging space 3) Second life 4) Web 2.0 5) None of these Ans : (4) 4. What type of web technology allows its community members to continuously change the contents on a web site? 1) Intelligent bots 2) Social networks 3) Wiki 4) Blog 5) None of these Ans : (3) 5. What type of web technology provides news that can automatically download right to your desktop? 1) Social network 2) RSS feed 3) Podcast 4) Wiki 5) None of these Ans : (2) 6. What type of web technology creates an online community where people can make statements and others can read and respond to those statements? 1) I-Journal 2) Podcast 3) ASP 4) Blog 5) None of these Ans : (4) 7. What type of technology allows you to verbally speak with someone over the Internet? 1) Wiki 2) Social network 3) Ephone 4) VoIP 5) None of these Ans : (4) 8. What kind of environment is Facebook or MySpace part of? 1) Wiki 2) Blog 3) Social networking 4) VoIP 5) None of these Ans : (3) 9. What term refers to living life through technology? 1) Virtual living 2) E-living 3) Virtual space 4) E-Society 5) All of above Ans : (2) 10.What 3-D environment allows you to speak to someone who is far away but, at the same time, see them as a holographic image? 1) CAVE 2) Virtual space 3) E-space 4) VoIP 5) All of above Ans : (1) 11. What type of technology allows you to use your finger, eye, or voice print to secure your information resources? 1) Haptics 2) Caves 3) Biometrics 4) RFID 5) All of above Ans : (3) 12.In reference to your ethical structure, how much do you identify with the person or persons who will receive the benefit or suffer the harm is called which of the following? 1) Consequences 2) Relatedness 3) Likelihood of effect 4) Society's opinion 5) none of these Ans : (2) 13.Which tracking program records every keystroke you make on the computer? 1) ITrack/ULead 2) eFollow 3) Key logger 4) Stalking software 5) none of these Ans : (3) 14.What is a common medium used for thieves to steal others' identities? 1) Telephone 2) Pick pocketing 3) Burglary 4) Email 5) none of these Ans : (4) 15.What is it called when you are rerouted from your requested internet site to another, undesired site? 1) Phishing 2) Pharming 3) Redirecting 4) Hijacking 5) None of these Ans : (2) 16.What is the term that refers to an ad hidden inside software that you downloaded from an internet site? 1) Spam 2) Phish 3) Cookie 4) Adware 5) None of these Ans : (4) 17.What type of monitoring file is commonly used on and accepted from Internet sites? 1) Phishes 2) Smartware 3) Cookies 4) Trojans 5) None of these Ans : (3) 18.Ideally, your sense of what is ethical should tell you which of the following? 1) What to do 2) Who to do it to 3) When to do it 4) Where to do it 5) None of these Ans : (1) 19.What type of software secretly collects information about you and your internet habits? 1) Detectware 2) Spam 3) Spyware 4) Pharming 5) All the above Ans : (3) 20.In an educational setting, instructors have access to and use a whole host of copyrighted materials. What allows these individuals to make use of these materials? 1) Patent laws 2) Fair Use Doctrine 3) Intellectual property laws 4) Higher educational board 5) All the above Ans : (2)
Metaverse: The Visionary Guide for Beginners to Discover and Invest in Virtual Lands, Blockchain Gaming, Digital art of NFTs and the Fascinating technologies of VR, AR and AI