LATEST

    LDC EXAM PREPARATION    ||         SI / BDO EXAM PREPARATION 2020    ||        PREVIOUS QUESTIONS 2020 DEGREE LEVEL     ||        PREVIOUS QUESTIONS LDC     PSC EXAM PROGRAMME 2020     ||        TODAY'S EXAM RESULTS 2020    ||        FINAL ANSWER KEY    ||    FREE STUDY MATERIALS (LDC)     ||    FREE STUDY MATERIALS (DEGREE LEVEL)     ||    CURRENT AFFAIRS-MALAYALAM 2020     ||    CURRENT AFFAIRS-ENGLISH 2020

Thursday, 17 January 2019

Information Technology (Questions & Answers ) - 38


Information Technology (Questions & Answers ) - 38
751. Which key combination is used to permanently delete a file or folder?
Shift+delete 

752. A common boundary between two computer systems is known as ?
Interface 

753. Network Interface Card (NIC) is generally used for ......... ?
Connectivity 

754. Which is the web browser developed by the Google? 
Chrome

755. When a computer is turned on, a special type of absolute loader is executed known as ...? 
Bootstrap Loader

756. What is the name of the moving process from the main memory to disk? 
Swapping

757. The IC chips of computers are usually made of.. ....... ?
Silicon 

758. What is the valid ending for a MS Word file?
.doc 

759. What kind of a software is Adobe Photoshop?
Graphics software 

760. What is the meaning of 'CC' in case of e-mail? 
Carbon copy

761. What is the full form of RSS in relation with website feed­back? 
Really Simple Syndication 

762. In connection with mobile communication, what is the full form of CDMA?
Code Division Multiple Access 

763. What is used for denoting the detectable movement of a computer mouse?
Mickey 

764. What is the name of the input/ output device on a computer reserved for communication between the computer opera­tor & the computer? 
Console

765. The peak cell rate (PCR), sustainable cell rate (SCR), & maximum burst size (MBS) are used for the measurement of ?
Bandwidth 

766. What is the name of the stor­age device where the access time is effectively independent of the location of the data? 
Direct Access Storage Device

767. Which input device is used to convert graphic and pictorial data into binary inputs? 
Digitizer

768. What is the purpose of keep­ing electronic devices such as computers & remote controlled devices on sleep mode?
Reduce power consumption 

769. When some unknown persons send mail in a trustworthy way asking for sensitive informations, it is a case of .............?
Phishing 

770. Which is the error message indicating server not find? 
HTTP 404 

771. In a computer, what trans­forms input data into output data? 
CPU 

772. Which virus is treated as the first computer virus? 
Creeper Virus
• It is a Jamming Program 

773. Which was the first search engine in the Internet?
Archie
• Created by Alan Entage, Bill Heelan and J Peter Deutsh

774. When is world computer liter­acy day celebrated?
December 2nd 

775. World Computer Security Day - 
November 30th 

776. Which one is the first fully supported 64 bit operating System? 
Linux  ( It is a free software which was developed by Linus Bene­dict Trovals.)
• Linux is written in primary C language and assembly language. 

777. What type of software is an operating system?
System software 
• System software coordinates the operations of various hardware components of a
computer. Eg.: Operating system, utility software etc.
• Application software is a type of software which can perform only a pre defined task. Eg.: Calculator 

778. What is the full form of first electronic computer ENIAC?
Electronic Numerical Integrator and Calculator 

779. "The illegal copying of licensed software" - this crime is consid­ered as:
Software Piracy
• Hacking- hacking is the unauthorized access without the permission of either the rightful owner or person in charge of a computer network.
• Trojan Attack- the program that acts like something useful but do the things that are quite 
dangerous is known as Trojan Attack 

780. In IT Act, which section deals with the punishment of cyber terrorism? 
Section 66(F)
• Section 65: Tampering with computer documents
• Section 66: Hacking 
• Section 66 A: Punishment • Section 66 D: Cheating by personation using computer resources 
• Section 66 E: Violation of privacy
• Section 66 F: Acts of Cyber Terrorism 
• Section 67 A: Pornography
• Section 67 B: Child Pornog­raphy
• The Supreme Court has struck down Section 66A of the IT Act as it was unconsti­tutional
<Next Page>01, ... 37, 38, 39, 40, 41, 424344454647>
PSC TODAYS EXAM RESULTS ---> Click here
PSC EXAM PROGRAMME -> Click here
PSC RANK LISTS / SHORT LISTS -> Click here
PSC FREE MOCK TEST -> Click here
Related Links
* SCERT KERALA TEXT BOOKS FOR CLASS II, IV, VI, VIII, IX, X, XII – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS FOR ALL CLASSES – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS SOLUTIONS FOR ALL CLASSES ---> Click here
Loading...

No comments:

Post a comment