Deck 3: Information Technology and Communication

Full screen (f)
exit full mode
Question
Weblogs or blogs are

A)a written message that is sent and received over electronic communication systems
B)audio or video content over the internet
C)personal logs or journal entries that are posted on the web.
D)all of these
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a blog site that devotes itself to discussing techno gadgets?

A)www.rottentomatoes.com
B)www.gizmodo.com
C)www.tech. com
D)www.itec.com
Question
A written message that is sent and received over electronic communication systems is called

A)e .mail
B)weblogs
C)podcast
D)none of these
Question
-------------------------is the broadcast of audio or video content over the Internet.

A)a. podcast
B)a webcast
C)weblogs
D)e .mail
Question
Name of the educational initiative backed by government of India for information technology is called

A)sakshat
B)rakshat
C)prathyashat
D)none of these
Question
E.-books and e-journals are

A)a written message
B)audio or video content
C)the content of open access publishing
D)a subject directory
Question
Claiming another person's words as your own- this action is known as

A)copyright
B)plagiarism
C)patent
D)none of these
Question
WebCT and Enspire are the tools for

A)e .mail
B)electronic messaging
C)e-learning
D)instant messaging
Question
Through ----------------------students can get online education from remote places.

A)virtual classrooms
B)subject directory
C)nicnet
D)inflibnet
Question
-------------------------------is a virtual network of libraries

A)nicnet
B)inflibnet
C)brnet
D)none of these
Question
Name the networking infrastructure built by NIC for the e-governance applications.

A)nicnet
B)inflibnet
C)brnet
D)none of these
Question
BRNET is related with

A)library information resources
B)geological information resources
C)biological information resources
D)all of these
Question
WBT is an example for

A)a library information resources
B)a geological information resources
C)a biological information resources
D)a computer-based training
Question
Which of the following is true?

A)podcast content includes radio shows
B)podcast content includes audio books
C)podcast content includes magazines
D)all of these
Question
Which of the following statement is not true to e-mail

A)it is not the most secure form of transmission
B)it is not a safe way to send personal or sensitive information
C)it is not a popular means of communication
D)none of these
Question
Broadband connections includes

A)cable
B)satellite
C)dsl
D)all of these
Question
ICQ is related with

A)weblogs
B)instant messaging
C)search engines
D)podcasts
Question
----- refers to the gap between people who possess regular access to Information technology and those who do not have this access.

A)cyber crime
B)digital divide
C)hacker
D)virus attack
Question
Who started Free software foundation

A)linus torvald
B)richard m stallman
C)gnu
D)none of the above
Question
Linux is a.

A)database programs
B)application programme
C)operating system
D)none of the above
Question
This unlawful acts wherein the computer is either a tool or target or both

A)cyber ethics
B)cyber crime
C)cyber literacy
D)cyber abuse
Question
Editing software

A)edusat
B)style writer
C)gliffy
D)cryosat
Question
A path-breaking effort in the concept of tele-education is

A)satallite
B)cryosat
C)edusat
D)none of these
Question
Telemedicine is launched by

A)isro
B)nrcs
C)iisc
D)ugc
Question
CCTV is

A)closed circuit television
B)crime detection software
C)communication software
D)all the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Information Technology and Communication
1
Weblogs or blogs are

A)a written message that is sent and received over electronic communication systems
B)audio or video content over the internet
C)personal logs or journal entries that are posted on the web.
D)all of these
personal logs or journal entries that are posted on the web.
2
Which of the following is a blog site that devotes itself to discussing techno gadgets?

A)www.rottentomatoes.com
B)www.gizmodo.com
C)www.tech. com
D)www.itec.com
www.gizmodo.com
3
A written message that is sent and received over electronic communication systems is called

A)e .mail
B)weblogs
C)podcast
D)none of these
e .mail
4
-------------------------is the broadcast of audio or video content over the Internet.

A)a. podcast
B)a webcast
C)weblogs
D)e .mail
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Name of the educational initiative backed by government of India for information technology is called

A)sakshat
B)rakshat
C)prathyashat
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
E.-books and e-journals are

A)a written message
B)audio or video content
C)the content of open access publishing
D)a subject directory
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Claiming another person's words as your own- this action is known as

A)copyright
B)plagiarism
C)patent
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
WebCT and Enspire are the tools for

A)e .mail
B)electronic messaging
C)e-learning
D)instant messaging
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Through ----------------------students can get online education from remote places.

A)virtual classrooms
B)subject directory
C)nicnet
D)inflibnet
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
-------------------------------is a virtual network of libraries

A)nicnet
B)inflibnet
C)brnet
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Name the networking infrastructure built by NIC for the e-governance applications.

A)nicnet
B)inflibnet
C)brnet
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
BRNET is related with

A)library information resources
B)geological information resources
C)biological information resources
D)all of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
WBT is an example for

A)a library information resources
B)a geological information resources
C)a biological information resources
D)a computer-based training
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true?

A)podcast content includes radio shows
B)podcast content includes audio books
C)podcast content includes magazines
D)all of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statement is not true to e-mail

A)it is not the most secure form of transmission
B)it is not a safe way to send personal or sensitive information
C)it is not a popular means of communication
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Broadband connections includes

A)cable
B)satellite
C)dsl
D)all of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
ICQ is related with

A)weblogs
B)instant messaging
C)search engines
D)podcasts
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
----- refers to the gap between people who possess regular access to Information technology and those who do not have this access.

A)cyber crime
B)digital divide
C)hacker
D)virus attack
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Who started Free software foundation

A)linus torvald
B)richard m stallman
C)gnu
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Linux is a.

A)database programs
B)application programme
C)operating system
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
This unlawful acts wherein the computer is either a tool or target or both

A)cyber ethics
B)cyber crime
C)cyber literacy
D)cyber abuse
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Editing software

A)edusat
B)style writer
C)gliffy
D)cryosat
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
A path-breaking effort in the concept of tele-education is

A)satallite
B)cryosat
C)edusat
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Telemedicine is launched by

A)isro
B)nrcs
C)iisc
D)ugc
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
CCTV is

A)closed circuit television
B)crime detection software
C)communication software
D)all the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.