MCQOPTIONS
Saved Bookmarks
This section includes 1300 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 601. |
Scientific method focuses on -----------------------. |
| A. | creative expressions and culture. |
| B. | the process of creative intervention and culture. |
| C. | imaginative interpretation. |
| D. | accuracy and objectivity. |
| Answer» E. | |
| 602. |
Empirical proof is |
| A. | objective truth which is verifiable through sense experience. |
| B. | subjective truth which is verifiable through speculation. |
| C. | creative and speculative in nature. |
| D. | analysis and exchange of ideas. |
| Answer» B. subjective truth which is verifiable through speculation. | |
| 603. |
-------------------------is the hallmark of scientific exercise. |
| A. | imaginatively interpreting and expressing the meanings of lived in experiences. |
| B. | empirical proof. |
| C. | narrative imagination. |
| D. | none of the above. |
| Answer» D. none of the above. | |
| 604. |
The scientific method involves |
| A. | generating testable hypotheses in order to make predictions. |
| B. | methods that are speculative in nature |
| C. | analysis and exchange of ideas rather than the causal and quantitative explanations. |
| D. | answering questions such as what is right or wrong. |
| Answer» B. methods that are speculative in nature | |
| 605. |
Scientific knowledge can be defined as |
| A. | a set of methods that are creative and speculative in nature. |
| B. | a set of verified and verifiable statements about all phenomena. |
| C. | stories, ideas and words that help us to make sense of our lives and our wor |
| Answer» C. stories, ideas and words that help us to make sense of our lives and our wor | |
| 606. |
The concern of humanities is |
| A. | to give a knowledge of the natural world. |
| B. | to give a knowledge of the biological properties of man |
| C. | to create an intellectual and spiritual sense of the lived –wor |
| Answer» D. | |
| 607. |
-------------------------is recognized as part of the humanities. |
| A. | physics |
| B. | geography |
| C. | economics |
| D. | philosophy |
| Answer» E. | |
| 608. |
Today the term humanities refer to those disciplines of knowledge which are concerned with |
| A. | human thoughts, creative expressions and culture. |
| B. | psychological and physiological aspects of man |
| C. | study of the natural world |
| D. | study of the social world. |
| Answer» B. psychological and physiological aspects of man | |
| 609. |
The term humanities during the Italian Renaissance appeared |
| A. | in relation to the education of liberal arts |
| B. | in relation to the education of social science. |
| C. | in relation to the education of christians for their moral and spiritual development. |
| D. | none of the above. |
| Answer» D. none of the above. | |
| 610. |
The classical Greek notion of humanities was |
| A. | to improve our social world |
| B. | to provide a basis of a broad education to greek citizens |
| C. | to demarcate the natural world and social wor |
| Answer» C. to demarcate the natural world and social wor | |
| 611. |
Which among the following skills need for locating appropriate information on the Internet |
| A. | the ability to use internet tools such as search engines |
| B. | having knowledge of search techniques and ability to execute the search. |
| C. | one needs to have abilities such as searching for information, scanning and skimming information, and strategies such as planning, monitoring and evaluating in executing the search. |
| D. | all of these |
| Answer» E. | |
| 612. |
Which among the following is true |
| A. | internet is a democratic technology |
| B. | internet protects personal privacy |
| C. | internet facilitate the spread of right information |
| D. | none of the above |
| Answer» E. | |
| 613. |
The discrepancy between the “haves” and “have-notes” with regards to computer technologyis commonly referred as: |
| A. | social justice |
| B. | intellectual property right |
| C. | digital divide |
| D. | accountability |
| Answer» D. accountability | |
| 614. |
If the antivirus software detects a virus signature or suspicious activity, it stops the executionof the file and virus and notifies you that it has dtected virus is known as: |
| A. | quarantining |
| B. | searching |
| C. | phishing |
| D. | all of these |
| Answer» B. searching | |
| 615. |
Experts who are performing a needed service for society by helping companies realize thevulerabilities that exist in their systems by break into system just for the challenge. |
| A. | black-hat hackers |
| B. | white-hat hackers |
| C. | both black-hat hackers and white-hat hackers |
| D. | neither black-hat hackers nor white-hat hackers |
| Answer» C. both black-hat hackers and white-hat hackers | |
| 616. |
A computer user, who copies an application onto more than one computer, if the licenseagreement does not permit this, is participating in: |
| A. | software piracy |
| B. | personal privacy |
| C. | computer theft |
| D. | identity theft |
| Answer» B. personal privacy | |
| 617. |
----- is an example of software being created independent of any money-making incentive orany property rights |
| A. | spyware |
| B. | adware |
| C. | freeware |
| D. | malware |
| Answer» D. malware | |
| 618. |
The commission of illegal acts through the use of computer or against a computer system. |
| A. | computer crime |
| B. | computer abuse |
| C. | white hacking |
| D. | cyber addition |
| Answer» B. computer abuse | |
| 619. |
Established by the Ministry of Education, Government of India as an autonomousorganization designed to bring back the entire tradition of Indian philosophy to its pristine and original form and promote new thinking through its intensive programs of research |
| A. | university grand commission (ugc) |
| B. | indian council of social science research (icssr) |
| C. | indian council of philosophical research (icpr) |
| D. | indira gandhi national open university (ignou) |
| Answer» D. indira gandhi national open university (ignou) | |
| 620. |
A ............. is a small text file which is placed on your computer on the request made by theweb server to your browser. |
| A. | spam |
| B. | cookie |
| C. | web bugs |
| D. | worms |
| Answer» C. web bugs | |
| 621. |
The main advantage(s) of online education is (are) |
| A. | personalized education |
| B. | better flexibility |
| C. | better accessibility |
| D. | all of the above |
| Answer» E. | |
| 622. |
The following metric is a measure of the journal quality |
| A. | impact factor |
| B. | prize |
| C. | article size |
| D. | none of the above |
| Answer» B. prize | |
| 623. |
Which of the following is not true of ethical computing guidelines |
| A. | not to use computer to promote lies |
| B. | use computers with consideration and respect for others |
| C. | avoid causing harm to othrs when using computer |
| D. | snoop in other people’s computer files. |
| Answer» E. | |
| 624. |
Which among the following is not an indication of cyber addition |
| A. | a person frequently find on the internet longer than he wish |
| B. | find a person running late to appointments because of too much time spent online |
| C. | all the time one spends online leads isolation from family and friends and feel like no one in his real life |
| D. | don’t feel guilty or defensive about your internet use |
| Answer» E. | |
| 625. |
The difficulty a person can have in understanding an issue and making decisions thatcan be caused by the presence of too much information |
| A. | cyber addition |
| B. | information overload |
| C. | repetitive strain injury |
| D. | virtual reality |
| Answer» C. repetitive strain injury | |
| 626. |
A repetitive strain injury (RSI) in computer users caused by |
| A. | improperly positioned key-boards |
| B. | a/c room |
| C. | proper lighting |
| D. | adjustable chair |
| Answer» B. a/c room | |
| 627. |
Which among the following is unethical use of cell phone |
| A. | do not accept call while driving |
| B. | switch off cell phone inside an aircraft |
| C. | do capture the images of others without permission of that person |
| D. | keep silent tone in meetings |
| Answer» D. keep silent tone in meetings | |
| 628. |
Which among the following is applicable to internet use |
| A. | do not sent spam, worms and viruses into cyberspace |
| B. | do not be rude or use bad language while you use email |
| C. | do not disclose your personal information such as your bank a/c number, passwords etc |
| D. | all of these |
| Answer» E. | |
| 629. |
Which among the following is not applicable to internet use |
| A. | do not use email to strangers |
| B. | do not give out your email address to people you doesn’t know |
| C. | do not open email attachments from people you don’t know |
| D. | pretend to be someone else when you are online. |
| Answer» E. | |
| 630. |
Computing systems, which imitate human brain through a network of highlyinterconnected processing elements. |
| A. | virtual reality |
| B. | robotics |
| C. | neural networks |
| D. | expert system |
| Answer» D. expert system | |
| 631. |
Computers are programmed to make decisions in real-life situations are known as |
| A. | virtual reality |
| B. | robotics |
| C. | neural networks |
| D. | expert system |
| Answer» E. | |
| 632. |
The science and engineering of making intelligent machines, especially intelligentcomputer programs. |
| A. | artificial intelligence |
| B. | stress management |
| C. | anti-virus |
| D. | intellectual property right |
| Answer» B. stress management | |
| 633. |
------ uses software to allow people to interact with three-dimensional simulated environment. |
| A. | virtual computing |
| B. | artificial intelligent |
| C. | bio-computing |
| D. | cookies |
| Answer» B. artificial intelligent | |
| 634. |
-------- uses the principles and tools of computer science to model or algorithmicallyspecify complexes biological information system and computational systems with life-like capabilities. |
| A. | virtual computing |
| B. | artificial intelligent |
| C. | bio-computing |
| D. | cookies |
| Answer» D. cookies | |
| 635. |
Which of the following is a step that all computer users should take to protect against virusattacks? |
| A. | purchase and configure a firewall |
| B. | shut down all incoming ports |
| C. | use non-standard e-mail clients |
| D. | install and use antivirus software |
| Answer» E. | |
| 636. |
What is malware? |
| A. | software that has some malicious purpose |
| B. | software that is not functioning properly |
| C. | software that damages your system |
| D. | software that is not properly configured for your system |
| Answer» B. software that is not functioning properly | |
| 637. |
A backup is a ...................... against data loss |
| A. | threat |
| B. | security |
| C. | countermeasure |
| D. | abuse |
| Answer» C. countermeasure | |
| 638. |
What is the first step in protecting yourself from identity theft? |
| A. | never provide any personal data about yourself unless absolutely necessary |
| B. | routinely check your records for signs of identity theft. |
| C. | never use your real name on the internet |
| D. | routinely check for spyware on your computer. |
| Answer» B. routinely check your records for signs of identity theft. | |
| 639. |
How could hacker use information about you found through Internet searches? |
| A. | to guess passwords if your passwords are linked to personal |
| B. | to guess passwords if your passwords are linked to your interests or hobbies |
| C. | in social engineering, to ascertain more information about you or your computer system |
| D. | all of the above |
| Answer» E. | |
| 640. |
Virus that travel from computer to computer on their own (i.e. independent of hostileactivity) are called |
| A. | worms |
| B. | stealth viruses |
| C. | logic bombs |
| D. | macro viruses |
| Answer» B. stealth viruses | |
| 641. |
When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n) |
| A. | zero-day attack |
| B. | trojan horse attack |
| C. | distributed denial of service attack |
| D. | boot sector virus attack |
| Answer» C. distributed denial of service attack | |
| 642. |
Why do you not want too much personal data about you on the Internet? |
| A. | it might reveal embarrassing facts about you |
| B. | it might be used by an identity thief to impersonate you |
| C. | it might be used by a potential employer to find out more about you |
| D. | there is no reason to worry about personal information on the internet |
| Answer» C. it might be used by a potential employer to find out more about you | |
| 643. |
What is the top rule for avoiding Internet fraud? |
| A. | if it seems too good to be true, it probably is |
| B. | never use your bank account numbers |
| C. | only work with people who have verifiable e-mail address |
| D. | do not invest in foreign deals |
| Answer» D. do not invest in foreign deals | |
| 644. |
Which of the following is annoying, but really doesn’t render any harm to our computer? |
| A. | shareware |
| B. | malware |
| C. | spyware |
| D. | adware |
| Answer» E. | |
| 645. |
------- can be referred as the use or application of computational devices in the field ofbiological sciences and research. |
| A. | bio-computing |
| B. | virtual computing |
| C. | artificial intelligent |
| D. | dna |
| Answer» B. virtual computing | |
| 646. |
..... is social networking site |
| A. | orkut |
| B. | |
| C. | myspace |
| D. | all of these |
| Answer» E. | |
| 647. |
Theft of software comes under ...... |
| A. | software piracy |
| B. | intellectual property right |
| C. | individual privacy |
| D. | it stress |
| Answer» B. intellectual property right | |
| 648. |
Which is the wrong meaning of Digital divide? |
| A. | the discrepancy between the “haves” and "have-notes” with regards to computer technology |
| B. | the gap between people with effective access to digital and information technology and those with very limited or no access at all. |
| C. | exploit the power of the internet for criminal or terrorist purposes. |
| D. | imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen. |
| Answer» D. imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen. | |
| 649. |
Software piracy comes under |
| A. | individual’s privacy |
| B. | intellectual property right |
| C. | accountability |
| D. | security of data |
| Answer» C. accountability | |
| 650. |
Which among is not to help bridge the digital divide: |
| A. | community organisations such as libraries and recreation centres are providing free internet access to the public. |
| B. | increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate, |
| C. | making linux based open source software widely available so that the computing devices cost less and become more affordable. |
| D. | decrease local and global internet and computer access. |
| Answer» E. | |