Description : Publishing false information in internet is an issue of a. Computer ethics b. Morality c. Computer equity d. Digital Divide
Last Answer : a. Computer ethics
Description : SBI branches in rural areas does not have Cash Deposit Machine, it is an issue of a. Digital divide b. Computer unequity c. Social issue d. None of the these
Last Answer : a. Digital divide
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Description : Computer class teaching discrimination based on gender is a case of a. Computer Crime b. Digital Divide c. Computer Equity d. All of the above
Last Answer : c. Computer Equity
Description : SBI, korbook branch does not have Cash Deposit Machine, it is an issue of- a. Digital divide b. Computer unequity c. Social issue d. None of the these
Description : The Internet ethical protocol is called (A) net protocol (B) netiquette (C) net ethics (D) net morality
Last Answer : Answer: B
Description : What is the difference between ethics and morality?
Last Answer : I slept with George Michael’s ethics teacher, not his morality teacher.
Description : What is the difference between morality and ethics?
Last Answer : The two words mean basically the same. Ethics means motivation based on ideas of right and wrong. While morality means concern with the distinction between good and evil or right and wrong; right or good conduct.
Description : Which statement is/are true? A. Ethics is not synonymous to religious morality or moral theology B. Ethics is the principle that guide the human behaviour C. The terms 'ethics' and 'morality' are not synonymous terms D. All of the above
Last Answer : D. All of the above
Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Last Answer : d) Ethics in black hat hacking
Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Description : What does a “Nose for News” mean? a) Space for News b) Senses material for News c) Publishing crime reports d) None of the above
Last Answer : b) Senses material for News
Description : What does “scoop” mean in terms of print journalism? a) Reporting for News b) Sensing the News story for the first before anybody c) Publishing parliamentary reports d) none of the above
Last Answer : b) Sensing the News story for the first before anybody
Description : What does a “Nose for News” stand for? a) Space for News b) Sensing ability to find material for News c) Publishing crime reports d) None of the above
Last Answer : b) Sensing ability to find material for News
Description : The term 'computer ethics' was first coined by- a)Anne Piere b)Walter Maner c)Charles Babbage d)None of the above
Last Answer : b)Walter Maner
Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner
Last Answer : d. Walter Maner
Description : Computer Ethics Institute defines how many commandments for Computer ethics - a.12 b. 8 c. 10 d. 15
Last Answer : c. 10
Description : Which one of the following belongs to the category of good 'research ethics'? (A) Publishing the same paper in two research journals without telling the editors. (B) Conducting a review of the literature ... for a favour even though the colleague did not make a serious contribution to the pa per.
Last Answer : (B) Conducting a review of the literature that acknowledges the contributions of other people in the relevant field or relevant prior work.
Description : Good research ethics' means (A) Not disclosing the holdings of shares/stocks in a company that sponsors your research. (B) Assigning a particular research problem to one Ph.D./research student only ... journal. (D) Submitting the same research manuscript for publishing in more than one jo urnal.
Last Answer : (B) Assigning a particular research problem to one Ph.D./research student only
Description : Gender equity is the process of being fair to a. Women. b. Men. c. Women and men. d. None of the above.
Last Answer : c. Women and men.
Description : Who said that ‘‘dispersed solar sources are more compatible than centralized technologies withsocial equity, freedom and cultural pluralism.’’ a. Mumford. b. Denis Hayes. c. Louise. d. None of the above.
Last Answer : b. Denis Hayes.
Description : Technology ___________ has the power to help the billions of poor people all over the earth. a. Not guided by ethics. b. Guided by ethics. c. Guided by Scientists.d. None of the above.
Last Answer : b. Guided by ethics.
Description : Ethics must guide technology in the direction of a. Political justice. b. Cultural justice. c. Social justice. d. None of the Above.
Last Answer : c. Social justice.
Description : Technology ___________ has the power to help the billions of poor people all over the earth. a. Not guided by ethics. b. Guided by ethics. c. Guided by Scientists. d. None of the above.
Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these
Last Answer : b. Ethics
Description : In which of the following circumstances would a CPA be bound by ethics to refrain from disclosing any confidential information obtained during the course of a professional engagement? a. The CPA is ... the PICPA. d. An inquiry by a disciplinary body of PICPA requests confidential client information
Last Answer : A major stockholder of a client company seeks accounting information from the CPA after management declined to disclose the requested information
Description : What is the name for direct computer to computer transfer of transaction information contained in business document? a) Internet commerce b) E-commerce c) Transaction information transfer d) Electronic data interchange
Last Answer : d) Electronic data interchange
Description : What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? a. internet commerce b. e-commerce c.transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : Which are microcomputers commonly used for commercial data processing, desktop publishing and engineering application. a. Digital computer b. Personal computer c. Both d. None of these
Last Answer : b. Personal computer
Description : DTP computer abbreviation usually means ? DeskTop Publishing Data Type Programming Digital Transmission Protocol None Of above
Last Answer : Data Type Programming
Description : What are plastic cards the size of a credit card that contains an embedded chief on which digital information can be stored? a) Customer relationship management system cards b) E-government identity cards c) FEDI cards d) Smart cards
Last Answer : d) Smart cards
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : _________ is a combination of hardware and software that facilitates the sharing of information between computing devices. a) Network b) Peripheral c) Expansion Board d) Digital Device
Last Answer : a) Network
Description : Kazi Nazrul Islam has to be imprisoned for one year for publishing what came in the autumn issue of Dhumketu in 1922 ?
Last Answer : Answer : For the publication of poems and 'Rebel's Apology' on the arrival of Anandamayi.
Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably using- a. Digital wallets b. Electronic data interchange c. B2C d. Smart cards
Last Answer : b. Electronic data interchange
Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably usinga. Digital wallets b. Electronic data interchange c. B2C d. Smart cards
Description : The domestic standards evolved to deal with the issue of IDPs are a. The Disaster Management Act. 2005 b. Land Acquisition Amendment Bill c. National Rehabilitation and Resettlement Policy, 2007 ( NRRP ) d. All of above
Last Answer : d. All of above
Description : Chipko Movement was against - (a) Scarcity of Water (b) Pollution Issue (c) Cutting of Trees (d) None of these
Last Answer : (c) Cutting of Trees
Description : During which plan was the development of women first considered as a separate issue? a. Fourth five year plan b. sixth five year plan c. eleventh five year plan d. first five year plan
Last Answer : b. sixth five year plan
Description : Which Article of the Indian Constitution empowers a High Court to issue writs? a.Art342 b.Art366 c.Art226 d.Art358
Last Answer : c.Art226
Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above
Last Answer : c. Security and Privacy
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove