Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm
Last Answer : d)Worm
Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm
Last Answer : D) Worm
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie
Last Answer : A) Trojan Horse
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : c) Logic Bomb
Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie
Last Answer : a)Trojan Horse
Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these
Last Answer : b. Worm
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : a) Trap doors
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus
Last Answer : A) Trap doors
Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software
Last Answer : iii) Virus
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb
Last Answer : C) Logic Bomb
Description : The drawbacks of ICT in medicine are i) Part time staff may not be trained and cannot access vital information ii) Some staff may be resistant of using ICT iii) All staff will need training in the use of the software iv) All of these
Last Answer : iv) All of these
Description : Managing a patients record can be helpful as i) The patients data can be easily shared between the doctors ii) The patients need to pay a heavy charge for maintain the records iii) It may be difficult to search and retrieve the patient’s records. iv) None of these
Last Answer : i) The patients data can be easily shared between the doctors
Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors
Last Answer : B) Zombie
Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors
Last Answer : B) Virus
Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery
Last Answer : i) Biometrics
Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption
Last Answer : iv) Encryption
Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above
Last Answer : iii) Trademark
Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in
Last Answer : iii) Authentication
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these
Last Answer : iii) Both A & B
Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these
Last Answer : i) Computer technology for vision and hearing
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these
Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these
Last Answer : i) They use robots and barcodes
Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence
Last Answer : i) Foreign technology and culture are going heavy on our culture
Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these
Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C
Last Answer : iv) Both A & C
Description : The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as i) Telecommunication ii) Telemedicine iii) Expert systems iv) None of these
Last Answer : ii) Telemedicine
Description : Expert systems provides the functionalities of? i) The system provides medicine to the patients ii) The expert system consults the doctor immediately. iii) Medical staffs inputs patients symptoms iv) None of these
Last Answer : iii) Medical staffs inputs patients symptoms
Description : ICT is a combination of i) IT and Telecommunication ii) IT and Business iii) Information and Knowledge iv) None of These
Last Answer : i) IT and Telecommunication
Description : Teleconferencing can be helpful in i) Business Domain ii) Health Sector iii) Both A & B iv) None of these
Description : ICT has been an essential necessity for i) Communication at long distances ii) Employing IT and its services to the rural areas iii) Providing medical help to nurses and staffs for treatments iv) All of these
Description : Bibliography given in a research report (i) Helps those interested in further research and studying the problem (ii) Makes the report authentic (iii) Both (i) & (ii) (iv) None of the above
Last Answer : (iii) Both (i) & (ii)
Description : How many models are for technological innovation- (i) Two (ii) Three (iii) Four (iv) None of the above
Last Answer : (ii) Three
Description : One of the following is not a survey method (i) Personal interview (ii) Telephone interview (iii) Mail interview (iv) Structured observation
Last Answer : (iv) Structured observation
Description : Which of the following is the first step in starting the research process? (i) Searching sources of information to locate problem. (ii) Survey of related literature (iii) Identification of problem (iv) Searching for solutions to the problem
Last Answer : (ii) Survey of related literature
Description : The aims of research is/are (i) verification (ii) fact finding (iii) theoretical development (iv) All of the above
Last Answer : (iv) All of the above
Description : Data collection can be done through (i) Interview (ii) Questionnaires (iii) Through E-Mail or by Telephone (iv) All of the abov
Description : Field study is related to (i) Real life situations (ii) Experimental situations (iii) Laboratory situations (iv) None of the above
Last Answer : (i) Real life situations
Description : Research design of a study should not include (i) Objectives (ii) Hypothesis (iii) Findings (iv) Blue print of Research
Last Answer : (iii) Findings
Description : Quantitative data refers to (i) Graphs and tables (ii) Any data you present in your report (iii) Statistical analysis (iv) Numerical data that could be useful to answer your research question(s) and to meet your Objectives
Last Answer : (iv) Numerical data that could be useful to answer your research question(s) and to meet your Objectives
Description : Social research can be divided into- (i) Two categories (ii) Three categories (iii) Four categories (iv) Five categories
Last Answer : (iii) Four categories
Description : Research is basically- (i) A methodology of enquiry (ii) Search of truth (iii) A systematic exploration of facts (iv) All of the above
Description : On the basis of time, research can be classified as, (i) Qualitative versus Quantitative (ii) Pure versus applied research (iii) Cross-sectional versus longitudinal research (iv) None of the above
Last Answer : (iii) Cross-sectional versus longitudinal research