Computer Quiz

1. What kind of programming language is Java?
1) Object-oriented programming language
2) Relational programming language
3) Sixth-generation programming language
4) Database management programming language
5) None of these

2. What type of internet technology sends information to you without you requesting that information?
1) F2b2C                                
2) Infoware
3) Push                                    
4) Wiki
5) None of these

3. What is the second generation of the Web called?
1) New web                            
2) Emerging space
3) Second life                        
4) Web 2.0
5) None of these

4. What type of web technology allows its community members to continuously change the contents on a web site?
1) Intelligent bots                
2) Social networks
3) Wiki                                    
4) Blog
5) None of these

5. What type of web technology provides news that can automatically download right to your desktop?
1) Social network                
2) RSS feed
3) Podcast                              
4) Wiki
5) None of these

6. What type of web technology creates an online community where people can make statements and others can read and respond to those statements?
1) I-Journal                            
2) Podcast
3) ASP                                      
4) Blog
5) None of these

7. What type of technology allows you to verbally speak with someone over the Internet?
1) Wiki                                    
2) Social network
3) Ephone                                              
4) VoIP
5) None of these

8. What kind of environment is Facebook or MySpace part of?
1) Wiki                                    
2) Blog
3) Social networking        
4) VoIP
5) None of these

9. What term refers to living life through technology?
1) Virtual living                    
2) E-living
3) Virtual space                    
4) E-Society
5) All of above

10.What 3-D environment allows you to speak to someone who is far away but, at the same time, see them as a holographic image?
1) CAVE                                    
2) Virtual space
3) E-space                                              
4) VoIP
5) All of above

11. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
1) Haptics                                              
2) Caves
3) Biometrics                      
5) All of above

12.In reference to your ethical structure, how much do you identify with the person or persons who will receive the benefit or suffer the harm is called which of the following?
1) Consequences                  
2) Relatedness
3) Likelihood of effect        
4) Society’s opinion
5) none of these

13.Which tracking program records every keystroke you make on the computer?
1) ITrack/ULead                  
2) eFollow
3) Key logger                        
4) Stalking software
5) none of these

14.What is a common medium used for thieves to steal others’ identities?
1) Telephone                        
2) Pick pocketing
3) Burglary                            
4) Email
5) none of these

15.What is it called when you are rerouted from your requested internet site to another, undesired site?
1) Phishing                            
2) Pharming
3) Redirecting                      
4) Hijacking
5) None of these

16.What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
1) Spam                                  
2) Phish
3) Cookie                                
4) Adware
5) None of these

17.What type of monitoring file is commonly used on and accepted from Internet sites?
1) Phishes                                              
2) Smartware
3) Cookies                              
4) Trojans
5) None of these

18.Ideally, your sense of what is ethical should tell you which of the following?
1) What to do                      
2) Who to do it to
3) When to do it                    
4) Where to do it
5) None of these

19.What type of software secretly collects information about you and your internet habits?
1) Detectware                      
2) Spam
3) Spyware                            
4) Pharming
5) All the above

20.In an educational setting, instructors have access to and use a whole host of copyrighted materials. What allows these individuals to make use of these materials?
1) Patent laws                      
2) Fair Use Doctrine
3) Intellectual property laws
4) Higher educational board
5) All the above