Which of the following is traditionally used in Artificial Intelligence?
FORTRAN
COBOL
C++
PROLOG
Answer and explanation
The correct answer is PROLOG. It is a logic programming language historically used in AI applications such as expert systems.
ObjectiveMcq
Print Protected
This page is protected for print. Use the website to view the content.
Which of the following is traditionally used in Artificial Intelligence?
FORTRAN
COBOL
C++
PROLOG
The correct answer is PROLOG. It is a logic programming language historically used in AI applications such as expert systems.
Which of the following is an antivirus software?
MS Office
Acrobat Reader
Tally
McAfee
None of the above
The correct answer is McAfee. It is a widely used antivirus software for detecting and removing malware.
Which activity is an example of an active digital footprint?
Browsing websites
Visiting a webpage
Sending an email
None of the above
The correct answer is sending an email. Active digital footprints are created when users intentionally share data online.
Which of the following is a safe and acceptable online practice?
Distributing copyrighted software illegally
Creating and spreading viruses
Sharing self-created notes on an educational forum
Accessing a friend's email without permission
The correct answer is sharing self-created notes on an educational forum. It is a legal and ethical practice.
Which of the following passwords is the strongest?
hello123
123456
myname2025
Qw!9@Lp#7x
The correct answer is Qw!9@Lp#7x. Strong passwords use a mix of uppercase, lowercase, numbers, and special characters.
Which term describes unauthorized listening to private conversations over a network?
Hacking
Eavesdropping
Phishing
Cyberbullying
None of the above
The correct answer is Eavesdropping. It refers to secretly listening to private communications over a network to obtain sensitive information.
What did Section 66A of the IT Act, 2000 state?
It empowered the government to block websites
It criminalized sending offensive messages electronically
It defined roles of ISPs and search engines
It required intermediaries to follow due diligence
None of the above
The correct answer is that it criminalized sending offensive messages electronically. Section 66A made it an offense to send offensive or false messages via electronic communication. It was later struck down by the Supreme Court of India in 2015.
Which type of malware alters the normal functioning of an operating system and gains administrator-level control?
Virus
Spyware
Trojan horse
Rootkit
None of the above
The correct answer is Rootkit. A rootkit modifies the operating system to provide unauthorized administrative control while remaining hidden.
________ is Microsoft's generative AI tool designed to understand and interact with text, images, audio, and code.
Copilot
Gemini
ChatGPT
Perplexity
The correct answer is Copilot. Microsoft Copilot is a generative AI tool that assists users by understanding and working with multiple types of data across applications.
Which of the following falls under social media etiquette?
Respecting the privacy of others
Plagiarizing content
Sharing copyrighted material without permission
Ignoring data protection laws
The correct answer is respecting the privacy of others. Social media etiquette includes responsible and respectful behavior such as protecting others' privacy.
Identify the type of cyber threat that disguises itself as useful software to install malware on a device.
Spoofing
Phishing
Trojan horse
Hacking
None of the above
The correct answer is Trojan horse. A Trojan horse is a type of malware that disguises itself as legitimate software to trick users into installing it, allowing attackers to gain access and steal data.