CBSE Questions for Class 8 General Knowledge India: Science And Technology Quiz 5 - MCQExams.com

What is the Semantic web?
  • It is a collaborative led by the World Wide Web Consortium to promote common formats for data on WWW.
  • It is a World Wide Web Consortium to replace the insecure mode of surfing onto registered secured interface.
  • It is a new website developed to compete with the WWW set up by the Tim Berners-Lee.
  • None of the above
Which one of the following is main use of the computer graphics?
  • Manipulation of 3D image data by a computer.
  • Digitally synthesizing and manipulation of visual contents.
  • Technologies used to create and represent images.
  • All of the above
Match the following.
List I(Institutes)List II(Locations)
A. National Institute of Immunology$$1$$. Pune
B. National Centre for Cell Science$$2$$. Manesar
C. Center of DNA Fingerprinting ad Diagnostics$$3$$. Hyderabad
D. National Brain Research Centre$$4$$. New Delhi
  • A-$$2$$, B-$$3$$, C-$$1$$, D-$$4$$
  • A-$$4$$, B-$$1$$, C-$$3$$, D-$$2$$
  • A-$$4$$, B-$$3$$, C-$$1$$, D-$$2$$
  • A-$$2$$, B-$$1$$, C-$$3$$, D-$$4$$
What is the Li-Fi? 
  • It is a high definition digital broadcasting of television signals.
  • It is a cheap and fast optical version of Wi-Fi.
  • It is the fast Wi-Fi in which the software allows internet access without modern.
  • None of the above
Consider the following statements:
Computer virus is a computer program that can copy itself and infect a computer.
A virus can spread from one computer to another through a removable medium like floppy disk, CD, DVD, or USB drive.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Which of the following is the use of computer software to control machine tool and related machinery in the manufacturing of work pieces? 
  • Computer-Aided Engineering (CAE)
  • Computer-Aided Designing (CAD)
  • Computer-Aided Manufacturing (CAM)
  • None of the above
What is the Web crawler?
  • It is a computer program that browses the World Wide Web in an automated manner and in an orderly fashion.
  • It is a computer program that browses the World- Wide Web with the intention to use the free memory available in the virtual world.
  • It is a computer program that assists the World Wide Web to establish a quick search engine.
  • None of the statements a, b and c is correct about the Web crawler.
Consider the following statements:
Spamdexing is a practice on the World Wide Web of modifying HTML pages to increase the chances of them being placed high on search engine relevancy lists.
Spamdexing sites use black hat search engine optimization techniques to unfairly increase their rank in search engines.
Which of the statements given above is/are correct?

  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Which one of the following is the application that captures data packets which can be used to capture passwords and other data-transit over the network?
  • Rootkits
  • Stuxnet
  • Spoofing attack
  • Packet sniffer
A person uses his/her expertise to gain access to other peoples computer to get information illegally or do damage is called as ______________.
  • Spammer
  • Programmer
  • Hacker
  • Instant messenger
Which one of the following is the program seems to be doing one thing, but is actually doing another that is it sets up a back door in a computer system such that the intruder can gain access later?
  • Keystroke logger
  • Computer phising
  • Trojan horse
  • Spam ping
Consider the following statements:
Web cookies cannot install malware on the host computer.
Web cookies are used as ways to compile long-term records of individuals browsing histories.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
What is the Malware? 
  • It is the software to spread the instant message about certain incidents in the social network.
  • It is the software designed to infiltrate a computer system without the owners informed consent.
  • It is the software designed to improve the working speed of the systems connected in the internet.
  • Both the statements 'a and b are correct about the Malware.
Which one of the following is the small piece of data sent from a website and stored in a user's web browser while a user is browsing a website?
  • Thumbnails
  • Computer worm
  • Cookie
  • None of the above
Which one of the following is the malicious program that allows the concealment of that program by modifying the hosts operating system so that the malware is hidden from the user?
  • Rootkits
  • Spyware
  • Stealware
  • Botnets
Which one of the following cookies is the cookie that is automatically recreated after a user has deleted it?
  • Session cookie
  • Persistent cookie
  • Supercookie
  • Zombie cookie
Which one of the following is the most common pathway to spread malwares?
  • Pendrives
  • Floppy Diskette
  • Removable Devices
  • E-mail
Consider the following statements:
Malware is the defective software and has contained harmful bugs.
Rootkits, computer viruses, worms, Trojan horses and spyware are some important malwares.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Consider the following statements:
Beerware provides end user the right to use a particular program or do anything else with source code.
Beerware term was invented by John Brixton.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Which one of the following malware cannot be included in the Greyware group of malicious software?
  • Adwares
  • Spywares
  • Joke program
  • Trojan horse
Which one of the following statements is correct about the internet meme?
  • It is a bait and switch in which a hyperlink claims its relevant to the topic at hand but the link actually takes the user to another site.
  • It is a computer software in internet to link and extract the personal information from the internet users.
  • It is a computer software which is automatically stored in the personal computer when the system is connected with internet.
  • Both (b) and (c)
Which one of the following is correct about the Zombie Computer?
  • It is a large sized parallel computer used to predict and simulate the weather and climatic conditions.
  • It is grid computer used to train the newly inducted flying officer in the simulated medium and get experience of flying.
  • It is an infected computer which is used as proxies to send out spam message to gain financial benefit to the creators.
  • None of the above
What is vishing in the modern information technology and computer era?
  • Criminal practice of using VoIP to gain access to private personal and financial information from the public for the purpose of financial reward.
  • Criminal practice of using VoIP to gain access to highly secured sites to morph the public sites.
  • Modern practice of accessing the data and files stored in a system with out the knowledge of the owner to delete the important data or files.
  • Modem methods of spread to computer worm in the form of cookies through the World Wide Web.
Which one of the following is not correctly matched?
Malware: Description
  • Trojan horse : Non-self-replication malware
  • Backdoor : Method of bypassing normal authentication
  • Beerware : Software released under a very relaxed license
  • None of the above
What is Hybrot? 
  • It is a computer formed by fusion of traditional analog with digital computers.
  • It is a robotic computer consisting both electronic and biological elements.
  • It is a robot formed by the fusion of analog and digital memories.
  • It is a robot run by using water as a propellant.
Which one of the following software applications of computer run automated tasks over the Internet?
  • Spam indexing
  • Spam bot
  • Web bot
  • Vishing
Which one of the following input techniques is used by the modern Automated Number Plate Recognition (ANPR) to control the traffic violations?
  • OMR
  • MICR
  • Plotters
  • OCR
Consider the following statements:
Chess game competition between a computer and chess wizard is one of application of artificial intelligence.
Artificial intelligence cannot be used in the medical diagnosis.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Consider the following statements
Machine vision is the technology to provide imaging-based automatic inspection, process control and robot guidance in industrial applications.
Machine vision software employs digital image processing techniques to extract the required information.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Consider the following statements:
Banks use artificial intelligence systems to organize operations and invest in stocks.
Answering machines of call centres of different services sectors employ artificial intelligence.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
What is the Data Mining, which employs the artificial intelligence in modern era?
  • The automatic or semi-automatic method of Phising of the important passwords through internet network.
  • The automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns.
  • The automated or semi-automated generation of adware to cyber clients to steal ones important information regarding bank's ID and password.
  • Both the statements given in (a) and (c) are correct descriptions about the Data Mining.
Consider the following statements:
Speech recognition is very useful for people with disabilities.
Acoustic modelling and language modelling are important parts of speech recognition algorithms.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
What is the HRP-Choromet?
  • It is a new computer game to compete with 21st century chess wizard.
  • It is a colouring system in the new image processing program.
  • It is a humanoid robot developed in Japan.
  • It is a prototype dinosaur robot to study the cause of extinction of massive reptile.
What is the Blue Brain Project?
  • It is a reverse-engineering technology to make artificial brain.
  • It is a project to develop the supercomputer which is faster than Blue Gene.
  • It is a project to isolate the gene of the blue whale brain.
  • None of the above
Consider the following statements:
Speech recognition, which employs artificial intelligence, is employed in the certain fighter aircraft.
Hidden Markov Model is generally employed in the modern general-purpose speech recognition systems.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Which one of the following radiations is used in the Automated Number Plate Recognition (ANPR) to store the images captured by the cameras as well as the text from the license plate?
  • X-rays
  • UV-rays
  • IR- rays
  • Gamma-rays
What is the Virtual Private Network?
  • It is a private computer network of an organisation where the remote users can transmit encrypted information through the server provider.
  • It is a computer network across a public internet that provides users access to their organisation's network while maintaining the security of the information transmitted.
  • It is a computer network in which users can access a shared pool of computing resource through a service provider.
  • None of the above
Which one of the following bands is used in the transmission of signals in the Direct-to-Home (DTH) television broadcasting?
  • X-band
  • Q-band
  • W-band
  • Ku-band
Which one of the following is used in the two-wheeled robots to detect how much a robot is falling and then drive the wheels proportionally in the opposite direction, to counter-balance the fall at hundreds of times per second?
  • Telescope
  • Gyroscope
  • Simulescope
  • None of these
Consider the following medicinal modifications:
Handwriting recognition is the ability of a computer and interpret intelligible handwritten input from sources.
Handwriting recognition device uses the artificial intelligence to detect and recognise the discrete detail of the handwriting.
Which of the statements given above is/are correct about the Cyborg man? 
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Consider the following devices:
Amateur Radio
Amateur Television
Microwave Oven
Wi-Fi
Which of the devices given above use/uses S-band region of microwave spectrum?
  • 1,2, 3 and 4
  • 1,2 and 3
  • 1,3 and 4
  • 1,2 and 4
Which one among the following is correct about the OCRopus?
  • A free document analysis and Optical Character Recognition (OCR) System.
  • A free software to install the game console without the authentic license of the publisher.
  • A software to determine the distinct character of the face recognition device.
  • None of the above
Consider the following statements:
The word Robotics was coined by the science fiction writer Isaac Asimov.
Kismet robot can produce social exchanges with humans through a range of facial expressions.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Consider the following statements:
Answering machines of call centre are based on the artificial intelligence of the modern computer science.
Fuzzy Logic controllers have been developed for automatic gearboxes in automobiles are not based on the principle of artificial intelligence.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
Consider the following medicinal modifications:
A man fitted with pacemaker in the heart.
A man who has undergone nose cosmetic surgery to realign the nose bone.
A man who has undergone the cochlear implantation.
Which of the modifications given above is/are correct about the Cyborg man?
  • 1,2 and 3
  • 1 and 3
  • 2 and 3
  • Only 2
Which one of the following persons invented the world's first digital and programmable robot?
  • George Devol
  • Hisashige Tanaka
  • Karel Capek
  • Joseph Engelberger
Which one of the following search engines is considered to the first web search engine in the World Wide Web?
  • Gopher
  • Yahoo
  • Veronica
  • Archie
Who is the inventor of World Wide Web (WWW)?
  • Vinod Dham
  • Sir John Dalton
  • Tim Berners-Lee
  • Bill Gates
Which one of the following statements are the correct characteristics of the optical fibres?
  • Optical fibres permit transmission of signal over longer distances than other methods of communication.
  • Optical fibres can carry lower bandwidth as compare with other metal wire system of communication.
  • Optical fibres are less prone of signal loss and immune to electromagnetic interference.
  • Both A and C
Consider the following statements:
Extranet is a public network that uses Internet protocols network connectivity.
Business to Consumer (B2C) is the integral purpose of the extranet private network.
Which of the statements given above is/are correct?
  • Only 1
  • Only 2
  • Both 1 and 2
  • Neither 1 nor 2
0:0:1


Answered Not Answered Not Visited Correct : 0 Incorrect : 0

Practice Class 8 General Knowledge Quiz Questions and Answers