
Information Technology (Questions & Answers ) - 39
781. What is the process of loading the operating system files in to dynamic random access memory?
Booting
• Booting is the process of loading the operating system files into dynamic random access memory or computers main memory. It takes place each time computer switched On.
• 2 types of Booting: Warm Booting - When the operating system alone is restarted after a system crash is called Warm booting
Cold Booting - When the computer is started after switched off is called Cold Booting.
783. Which technology is used in the processor of a computer to stimulate single processor into two virtual processors to the operating system?
Hyper threading Technology
784. IBM 1401 is a .............generation computer.
Second generation computer
• In the second generation main devices used in computers were transistors. The time period of second generation computers is 1956 - 1965.
785. In 1983 who defined the term 'computer virus'?
Fred Cohen
786. When IT Act 2000 of India came into force?
17th October 2000
• IT Act 2000 was enacted on 9th June 2000. But it came into force on 17th October 2000. It had 13 chapter, 94 sections and 4 schedules. In 2008 it is amended and known as Information Technology
787. A printer is which kind of a device?
Output
• Some examples for output devices are i- Monitor, Speaker, plotter, Projector, head phone etc.
• Examples for Input devices are keyboard, mouse, scanner,web camera, microphone etc.
788. NotePad is a for Microsoft Windows.
Text Editor
• MS Word is used for word processing purposes and the file created in MS Word is known as Document.
• MS Excel is used as an electronic spread sheet and the file created in it is known as Workbook
789. Software which allows the user load a web program is called:
Browser
• Examples for Browsers are Opera, Google Chrome, Mozilla Firefox, Safari Epic, Netscape Navigator etc.
790. The first Web Browser in the world is Nexus.
791. The first Web Browser in India is Epic
792. Fastest Web Browser is Safari.
793. PROLOG is a computer language used for .....
Artificial Intelligence
• PROLOG is a high level programming language designed by Alain Clemer Accer.
• COBOL is used for business purposes. The full form of COBOL is Common Business Oriented Language.
• FORTRAN is the first implemented high level programming language and it is the abbreviation for Formula Translation.
794. Programmed instruction to the computer is known as:
Code
• Data - it is the collection of facts and figures
795. Expansion of UNIVAC is:
Universal Automatic Computer
796. Binary number of the decimal number 15 is:
1111
• The base of the Binary number system is 2, ie use only 0 and 1. Base of the decimal number system is 10, ie.
0,1,2,3,4,5,6,7,8,9.
797. 1's compliment of binary value 1011 is:
0100
• 1's compliment of the binary value is obtained by changing 1 to 0 and 0 to 1.
798. In a client/ server computer network, the user's computer is usually called:
Client
• Server is the powerful computer that provides services in a network,
799. The extension of '.com', '.edu', '.org' etc are usually called:
Domain name
• IP address is the numerical address used for identifying resources of internet. It is having four sections of one byte length (Total 3 2 bi ts).
• Network is an interconnection of computers. The devices connected to the network is known as node.
800. FTP stands for:
File transfer protocol
• It is used for sending the big files over internet
801. What is the objective of fire wall protection?
Security
802. When a key is pressed on the keyboard, which standard is used for converting the key
strokes into corresponding bits?
ASCII
• It is the abbreviation for American Standard Code for information Interchange.
• ASCII-7 and ASCII-8 are available. ASCII-7 can handle 128 bit data, while ASCII-8
• Light Amplification by Stimulated Emission of Electromagnetic Radiation
• LASER was discovered by Theodore Maiman.
803. The program which are as permanent as hardware and stored in ROM is known as :
Firmware
• It is the combination of persistent memory and program code and data can be stored in it.
804. Which access method is used for obtaining a record from a cassette tape?
Sequential
805. identifies a specific webpage and its computer on the Web.
URL
• Uniform Resource Locator is a standard way of identifying and locating internet resources on the world wide web. It includes letters, numbers and punctuations.
806. An optical input device that interprets pencil marks on paper media is :
OMR-Optical Mark Reader
807. A computer program that converts an entire program into machine technology is called:
Compiler
• It takes entire program as input at a time and converts into machine language, while an interpreter can convert single instruction at a time into machine language.
808. A is approximately one billion bytes:
Gigabyte
809. An error in software or hardware is called a bug. What is the alternate computer jargon
for it?
Glitch
810. VOIP is a technology for :
Making phone calls over the internet
• VOiP- Voice Over Internet Protocol
<Next Page>01, ... 38, 39, 40, 41, 42, 43, 44, 45, 46, 47>
PSC TODAYS EXAM RESULTS ---> Click here
PSC EXAM PROGRAMME -> Click here
PSC RANK LISTS / SHORT LISTS -> Click here
PSC FREE MOCK TEST -> Click here
Related Links
02. GENERAL KNOWLEDGE QUESTIONS (English) ---> Click here
03. LDC/LGS/VEO/LAB ASSISTANT QUESTIONS ---> Click here
03. LDC/LGS/VEO/LAB ASSISTANT QUESTIONS ---> Click here
* SCERT KERALA TEXT BOOKS FOR CLASS II, IV, VI, VIII, IX, X, XII – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS FOR ALL CLASSES – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS SOLUTIONS FOR ALL CLASSES ---> Click here
0 Comments