Computer 2

COMPUTER NETWORK


*A set of computers connected together for the purpose of sharing resources
Ans : Computer Network
*Computers on a network are called
Ans : Nodes
*The computers may be connected via any data communication link like wires, cables, satellite links other communication media
*The computer which acts like a workstation on the Network
Ans : User's computer
*To exchange information all over the world, millions of computers are connected through a
Ans : Network



TYPES OF NETWORK


*LAN (Local Area Network)
*WAN (Wide Area Network)
*MAN (Metropolitan Area Network)
*PAN (Personal Area Network)



LAN (LOCAL AREA NETWORK)


*The network that span a relatively small area
Ans : Local Area Network
*Most LAN connects workstations with
Ans : Personal computers
*The system in which computers are interconnected and the geographical area such as home, office building, school, may be within a building to small area
Ans : LAN



LANGUAGE

       

YEAR

           

FOUNDER


LISP                      1958          John McCarthy and Steve Russell Alain                                                    
PROLOG              1972              Colmerauer
*All terminals are connected to a main computer called
Ans : Server
*The most common technology currently used to build a LAN
Ans : Ethernet and Wifi



WAN (WIDE AREA NETWORK)


*A network which is a geographically dispersed telecommunication network 
Ans : WAN
*The network which spans a relatively large geographical area 
Ans : WAN
*WAN can also be connected through cable line or satellites 
*The largest WAN in existence 
Ans : Internet
*Most common network which interconnects countries 
Ans : WAN



MAN (METROPOLITAN AREA NETWORK)


*The data network designed for a town or city
Ans : MAN
*A collection of local area network is known as 
Ans : MAN 
*The network which connects an area larger than a LAN but smaller than a WAN 
Ans : MAN



PAN (PERSONAL AREA NETWORK)


*The network used for communication
among various electronic devices such as personal computer and mobile 
Ans : PAN



NETWORK DEVICES


REPEATER MODE


*An electronic device that receives a signal and retransmit it
Ans : Repeater
*Repeater has two ports and can connect two segment of a 
Ans : LAN



HUB


* A hardware device that contains multiple, independent ports that match the cable type of the network 
Ans : Hub
*Hub is also known as
Ans : Concentrator
*The hardware which takes data comes from one channel and sends out to all other channels
Ans : Hub



ROUTER


*The hardware which is used to forward data packets from one logical network to another
Ans : Router
*A hardware device which is designed to receive, analyze, convert the packet data with two or more networks
Ans : Router



SWITCHES


*The hardware device that joins multiple computers together with LAN
Ans : Switches
*First Ethernet switch was introduced by
Ans : Kalpana (1990)



BRIDGE


*The hardware which is used to connect two or more LAN together that uses same protocol
Ans : Bridge
*The hardware which reduces the amount of traffic on a LAN by dividing it into two segment
Ans : Bridge



GATEWAY


*The hardware which is used to connect network using different protocols
Ans : Gateway
*Gateway may be
Ans : Router or Proxy Server



MULTIPLEXER


*A device that selects one input signal from multiple analog or digital input signals and forwards the selected input into a single line
Ans : Multiplexer 



NETWORK TOPOLOGY


*The geometric arrangement of various devices (nodes) on the network is known as
Ans : Topology



PROTOCOL

   

FULL FORM

USES


*HTTP-Hyper Text Transfer Protocol-to transfer data over the www
*HTTPS- Hyper Text Transfer Protocol Secure-Secured version of http
*FTP -File Transfer Protocol-to transfer file over the Network
*TCP/IP -Transfer Control Protocol/Internet Protocol-Communication and delivery of packets through network
*SMTP -Simple Mail Transfer Protocol-For sending email over the internet
*POP -Post Office Protocol-For receiving email message
*IMAP-Internet Message Access Protocol-For receiving email message
*SNMP -Simple Network Management  Protocol-Network Management



Types OF TOPOLOGY

 

*BUS Topology
*Star Topology 
*Ring Topology
*Tree Topology
*Mesh Topology



BUS TOPOLOGY


*The simplest Network topology is known as
Ans : Bus Topology
*In Bus Topology, all nodes are connected to a central cable called
Ans : Bus
*Topology in which every node is connected to a single cable, all devices share a single communication line
Ans : Bus Topology
*Failure of one device will not affect other devices in
Ans : Bus Topology



STAR TOPOLOGY


*Star Topology is all the nodes are connected to a central system called
Ans : Switch
*In star topology, every node has its own dedicated communication to the
Ans : Hub
*In star Topology, central computer acts as a
Ans : Server



RING TOPOLOGY


* All the nodes are connected each other in such a way that they make a close loop in
Ans : Ring Topology
Failure of any node results in the failure of whole ring in
Ans : Ring Topology



TREE TOPOLOGY


* Tree Topology is the combination of
Ans : Bus topology and star topology 
* In Tree Topology, number of star networks are connected using 
Ans : Bus



MESH TOPOLOGY


* Topology in which each node is connected to all other nodes
Ans : Mesh Topology
* The topology which is a point - to point connection to the other nodes or devices Mesh 
Ans : Topology



INTERNET CONNECTION


1.Dial - up connection
2.Broadband connection
3.Wireless connection



DIAL-UP CONNECTION


* The connection which uses telephone line to connect PC to the Internet
Ans : Dial-up connection 
* The device which connects the computer through the standard phone lines 
Ans : Modem



BROADBAND CONNECTION 


*A high speed internet connection provided through either cable or telephone companies is known as 
Ans : Broadband connection
*Broadband internet connection such as DSL and cable are considered
Ans :  High-bandwidth connections



WIRELESS CONNECTION


*The connection which requires neither a modem nor cables
Ans : Wireless connection 
*The network can easily be established where there is no DSL or Cable through
Ans : Wireless connection 
*The network which is considered the ancient form of internet
Ans : ARPANET
*Internet in India was started by 
Ans : VSNL



WORLD WIDE WEB (WWW)


*An information system on the internet which allows documents to be connected to other documents
Ans : World Wide Web
*WWW is an information sharing model that is built on the top of the 
Ans : Browser 
*Father of WWW
Ans : Tim Berners-Lee 
*Headquarters of WWW 
Ans : Geneva



INTRANET


*A private network that is contained within an enterprise
Ans : Intranet



EXTRANET


*An extension of intranet to users outside the organization is known as 
Ans : Extranet
*Extranet can be accessed only by the members of the same company



■ COMMUNICATION MODES 


*Simplex : Communication in only one direction (Eg. Radio)
*Half Duplex : Communication in both directions, but only one direction at a time (Eg. Wireless)
*Full Duplex : Communication in both direction at the same time (Eg Mobile Phone)



Wi - FI (WIRLESS FIDELITY)


*The technology which allows high speed internet connections without the use of cable or wires
Ans : Wi-Fi
*The working principle of wi-fi 
Ans : Radio wave technology



WIMAX (WORLD WIDE INTEROPERABILITY FOR MICROWAVE ACCESS)


*The technology similar to wi-fi but at higher speed over greater distances and for a greater number of users
Ans : WiMAX



*IMPORTANT TERMS RELATED TO INTERNET


DOMAIN NAME


*A unique name that identifies a website is known as 
Ans : Domain Name
*The way to idetify and locate computers connected to the Internet
ans : Domain
*The domain names were initially registered by
Ans : ICANN (Internet Corporation for Assigned Name and Numbers)
*Every domain name has a suffix that indicates
Ans : Top - level domain name



URL (UNIFORM RESOURCE LOCATOR)


*The global address of documents and other resources on the world wide web
Ans : URL
*URL was developed by
Ans : Tim Berners Lee
URL : https//www.keralapsc.gov
https - Protocol
www - subdomain
keralapsc.gov - domain name 
*Webpage
webpage is document that is accessible through Internet using a web browser
*Website
website is a set of related webpage
*Home page Home page is the main page or front page of a web site



SEARCH ENGINES


*Search Engine is used to search for information on
Ans : World Wide Web
*Worlds first search Engine 
Ans : Archie
*India's first search engine
Ans : Guruji



TOP - LEVEL DOMAIN NAME


*.gov - Government
*.com - Commercial
*.org - Non - Profit organisation
.edu - Educational
*.mil - Military
*.net - Network resources
*.biz - Business purpose



COMMON SEARCH ENGINES


*Google 
*Yahoo
*Bing
*Infoseek
*Altavista
*Wandex
*Hotbot
*Excite
*Webcrawler
*Lycos



WEB BROWSER


*The application which uses to view web pages on the Internet
Ans : Web browser
*The client that contacts the web server and requests information
Ans : Browser
*The first web browser was invented by
Ans : Tim Berners Lee
*First web browser
Ans : Nexus
*First web browser developed by India
Ans : Epic
*Google was founded by
Ans : Larry Page and Sergey Brin 
*Google was launched in 
Ans : 1998
*Headquarters of Google
Ans : Menlo park, California 
*Yahoo was founded by
Ans : Jerry Yang and David Filo  
*Yahoo was launched in 
Ans : 1995
*Headquarters of Google
Ans : Sunnyvale, California 



COMMON WEB BROWSERS ARE


*Nexus
*Epic
*Internet Explorer
*Google Chrome
*Safari
*Mosaic
*UC Browser
*Netscape Navigator
*Microsoft Edge (Spartan)
*Sea monkey
*Torch
*Flying Fish



VIRUS & ANTI VIRUS


*A small software program that can spread from one computer system to another and cause interferences with computer operations
Ans : Virus
*VIRUS is
Ans : Vital Information Resource Under Siege
*The person who defined the term computer virus
Ans : Fred Cohen (1983)
*Programs that multiply like viruses but spread from computer to computer are called
Ans : Worms
*Programmers who write virus programmes are known as
Ans : Vickser



ABBREVIATIONS


* First Personal Computer Virus 
Ans : Apple
* First Micro Computer Virus 
Ans : Elk doner
* First Computer virus
Ans : Creeper / Brain 
* First Mobile Virus 
Ans : Cabir
* First Virus effected in ARPANET
Ans : Creeper
*A computer software which is used to prevent, delete and detect the presence of virus in computer Anti Virus

Examples of Computer Virus

   

TEXAS, Blaster, Gappy,Slammer,Wanna Cry  AVG,Any malicious computer program which is used to hack into a computer by misleading users of its true intent is known as Trojan Horse

COMPUTER VANDALISM

 

Damaging or destroying data rather than stealing or misusing them is called Computer vandalism
ADSL  -  Asymmetric Digital Subscriber Line
ALU - Arithmetic and Logical Unit
ANSI - American National Standard Institute
ARPANET -  Advanced Research Project Agency Network
ASCII  -  American Standard Code for Information Interchange
BASIC  -  Beginners All Purpose Symbolic Instruction Code
BCD - Binary Coded Decimal
Bin - Binary
BIOS - Basic Input / Output System
Bit - Binary Digit
BMP - BitMap
CAD - Computer Aided Design
CD - Compact Disk
CDMA - Code Division Multiple Access
COBOL - Common Business Oriented Language
CPU - Central Processing Unit
CRT - Cathode Ray Tube
DBA - Database Administration
DBMS - Database Management System
DNS - Domain Name Service
DOS - Disk Operating System
DPI - Dots Per Inch
DRAM - Dynamic Random Access Memory
DSL - Digital Subscriber Line
DTP - Desktop Publishing
DVD - Digital Versatile Disk
* EBCDIC - Extended Binary Coded Decimal Interchange
* EDSAC - Electronic Delay storage Automatic Calculator
* EDVAC - Electronic Discrete Variable Automatic Computer
* EPROM - Erasable Programmable Read Only Memory
* EEPROM - Electrically Erasable Programmable Read Only Memory
* ENIAC - Electronic Numerical Integrator and Calculator (Computer)
* EXE - Executable
* FAT - File Allocation Table
* FAX - Facsimile
* FORTRAN- Formula Translation
* FTP - File Transfer Protocol
* GHz - Gigahertz
* GIF - Graphics Interchange Format
* GPRS - General Packet Radio Service
* GPS - Global Positioning System
* GSM - Global System for Mobile Communication
* GUI - Graphical User Interface 
* HTML - Hyper Text Markup Language 
* HTTP - Hyper Text Transfer Protocol
* HTTPS - Hyper Text Transfer Protocol 
* IBM - International Business Machine
* IMAP - Internet Message Access Protocol
* ICANN - Internet Corporation for Assigned Names and Numbers
* INFUBNET- Information and Library Network
* IP - Internet Protocol
* ISDN - Integrated Service Digital Network
* ISoC - Internet Society
* ISP - Internet Society Provider
* JPEG - Joint Photographic Expert Group
* LCD - Liquid Crystal Display
* LED - Light Emitting Diode
* LPI - Line Per Inch
* NASSCOM - National Association for Software Service and Computer
* NOS - Network Operating System 
* NTFS - New Technology File System 
* MALWARE - Malicious Software 
* MDA - Mail Delivery Agent 
* MHZ - Megahertz
* MICR - Magnetic Ink Character Recognition
* MMS - Multimedia Message Service
* MODEM - Modulate / Demodulate
* MPEG - Moving Picture Expert Group  
* OCR - Optical Character Reader
* OOP - Object Oriented Programming
* OMR - Optical Mark Reader
* PDF - Portable Document Format
* PNG - Portable Network Graphics
* POP - Post Office Protocol 
* POST - Power On Self Test
* PPP - Point - to - Point Protocol
* PROM - Programmable Read Only Memory
*RAM - Random Access Memory RDBMS - Relational Database Management System
*ROM - Read Only Memory
*SIM - Subscriber Identification Module
*SMTP - Simple Mail Transfer Protocol
*SNMP - Simple Network Management Protocol
*SQL - Structured Query Language
*SRAM - Static Random Access Memory
*TCP/IP - Transfer Control Protocol / Internet Protocol
*TFT- Thin Film Transistor
*ULSI-Ultra Large Scale Integrated Circuit
*UNIVAC-Universal Automatic Computer
*UPS-Uninterruptable Power Supply
*URL-Uniform Resource Locator
*USB-Universal Serial Bus
*VDU-Visual Display Unit
*VGA-Video Graphics Array
*VIRUS-Vital Information Resource Under Siege
*VLSI-Very Large Scale Integrated Circuits
*VOIP-Voice Over Internet Protocol
*WAP-Wireless Application Protocol
*Wi-Fi-Wireless Fidelity
*WORM-Write Once Read Many
*WWW-World Wide Web
*XML-Extensible Markup language
*Zip-Zone Information Protocol


CYBER LAW


*The primary source of cyber law in India 
Ans : Information Technology Act IT Act 2000 was enacted on June 9, 2000
*IT Act 2000 came into force on 
Ans : October 17, 2000
*IT Act 2000 was substantially amended through the
Ans : IT (Amendment) Act 2008
IT ACT 2000 HAS:
*13 Chapters
*94 Sections
*4 Schedules


IT AMENDMENT ACT 2008


*14 chapters (chapter XIIA was added) 
*124 sections (Now 119 sections)
*2 schedules  
*4 Parts
*First 14 sections deals with some legal aspects concerning
Ans : Digital signature
*Section 43 to 47 provide for
Ans : Penalties and Compensation
*Section 48 to 64 deals with
Ans : Tribunals and appeal to High court
*Section 64 to 79 of the Act deals with
Ans : Offence
*Section 80 to 94 of the Act deals with
Ans : Miscellaneous
*IT (Amendment) Act 2008 was enacted on 
Ans: December 23, 2008 
*IT Amendment Act 2008 came into force on 
Ans: October 27, 2009
*The law relating to cyber crimes, electronic or digital signatures, intellectual property, data protection and privacy include in 
Ans: Cyber law of India


IMPORTANT SECTIONS IN IT ACT


*Section 3  : Authentication Electronic Records
*Section 4  : Legal Recognition of Electronic Records
*Section 5  : Legal recognition of Electronic Signature
*Section 6  : Use of Electronic Records and Electronic Signature in Government and its agencies
*Section 7  : Retention of Electronic Records
*Section 8  : Publication of rules, regulation etc in Electronic Gazette
*Section 11 : Attribution of Electronic Records
*Section 12 : Acknowledgement of Receipt (Modified by ITA Act 2008)
*Section 13 : Time and place of despatch and receipt of electronic record
*Section 15 : Secure Electronic Signature (Substituted vide ITAA 2008)
*Section 17 : Appointment of Controller and other officers (Amended Vide ITAA 2008)
*Section 18 : The Controller may perform all or any of the following functions namely
*Section 19 : Recognition of foreign Certifying Authorities
*Section 21 : License to issue electronic signature certificates
*Section 35 : Certifying Authority to issue Electronic Signature Certificate
*Section 36 : Representations upon issuance of Digital Signature Certificate
*Section 43 : Penalty and Compensation for damage to computer, computer system, etc   (Amended vide ITAA 2008)
*Section 44: Penalty for failure to furnish information . return, etc
*Section 48 : Establishment of Cyber Appellate Tribunal
*Section 49 : Composition of Cyber Appellate Tribunal (Substituted vide ITAA 2008)
*Section 62 : Appeal to High court

 

'SECTION

             

OFFENCE

                                               

PENALTY


65 - Tampering with computer source documents, - Imprison ment up to three years, or/and with fine up to Rs. 200,000
66 - Hacking with computer system - Imprisonment up to three years, or/and with fine up to Rs.500,000
66B - Receiving stolen computer or communication device - Im prison men t up to three years, or/and with fine up to Rs. 100,000
66C - Using password of another person - Imprisonment up to five years/ or/and with fine up 
66D - Cheating using computer resource - Imprisonment up to three years, or/and with fine up to Rs.100,000
66E- Publishing private images of others - Imprisonment up to three years, or/and with fine up to Rs.100,000 
*66F - Acts of cyber terrorism - Imprisonment up to three years, or/and with fine up to Rs.200,000 to 1,000000
*67 - Publishing information which is obscene in electronic form. - Im prison men tup to life
*67A - Publishing images containing sexual acts - Imprisonment up to seven years,
or/and with fine up to Rs.1,000,000
*67B - Publishing child.porn or predating children online - Imprisonment up to five years, or/and with fine up to Rs. 1,000,000 
*67C - Failure to maintain records - Imprisonment up to three years,or/and with fine up to Rs.200,000
*68 - Failure/refusal to comply with orders - Imprisonment up to three years,
or/and with fine up to Rs.200,000
69 - Failure/refusal to decrypt data - Imprisonment up to seven years and possible fine.
*70 - Securing access or attempting to secure access to a protected system - Imprisonment up to ten years, or/and with fine.
*71 - Misrepresentation - Imprisonment up to three years, or/and with fine 
[nw]

SCRAPPED SECTIONS


*The supreme court has suspended following sections as unconstitutional from the IT Act /Kerala Police Act

SECTION 66 A OF IT ACT


*Punishment for sending offensive messages through electronic means

SECTION 118 D OF KERALA POLICE ACT


Causes annoyance to any person in an indecent manner by statements or verbal or comments or telephone calls or calls of any type or by chasing or sending messages or mails by any

DIGITAL SIGNATURE


*The contents of electronic documents is authenticated by
Ans : Digital Signature
*Digital Signature is otherwise known as 
Ans : Electronic Signature

PUBLIC KEY AND PRIVATE KEY


*A cryptographic key used for creating an electronic signature
Ans : Private Key
*A cryptographic key used to verify the electronic signature
Ans : Public Key 
*Private key is used for
Ans : Encryption 
*Public key is used for
Ans : Decryption
*A data encrypted with the private key can only be decrypted with its corresponding Ans : Public key

DIFFERENT TYPES OF CYBER CRIMES HACKING


*An unauthorized intrusion into a computer or a network is called
Ans : Hacking

HACKERS ARE THREE TYPE


1.White hat hackers
2.Black hat hackers
3.Gray hat hackers

1.WHITE HAT HACKERS


*White hat hackers is also known as
Ans : Ethical Hackers
*The hackers who hack the system for a good reason is known as
Ans : White hat hackers

2.BLACK HAT HACKERS 


*A Person who breaks the security of a computer system without permission from an authorized party is known as
Ans : Black hat hacker

3.GRAY HAT HACKERS


*The person who hack system sometimes for good reason and sometime for bad reason is known as
Ans : Gray hat hackers

WEB JACKING


*A hacking of website by password alteration for fulfilling political objectives or for money
Ans :  Web jacking
*The term Web jacking is derived from 
Ans :  Hijacking

CRACKING


*A person who breaks into a computer system just like a hacker with the intention to steal Passwords, Files, Programmes for unauthorized use 
Ans :  Cracker

DENIAL OF SERVICE


*The act by a criminal, who floods the bandwidth of the victim's network
Ans :  Denial of service

PHISHING


*The fraudulent attempt, usually made through email, to steal personal information such as user name, password and credit card details 
Ans :  Phishing

CLONE PHISHING 


*The act of a phisher who creates a cloned email
Ans :  Clone phishing
*Clone phisher manage to get a previously delivered email of other person and then sends the same email with link or attachment replaced by malicious ones

SPEAR PHISHING


*Spear phishing targets a 
Ans :  Specific group 
*Instead of casting out thousands of emails randomly spear phishers target selected group of people with something in common, for example people from the same organisation

SALAMI ATTACK


*Bank employee can grab money using programs to reduce small amount of money from all customer accounts and adding it to own account is called 
Ans :  Salami Attack
*It is a financial cyber crime conducted by computer expert in bank

CYBER SQUATTING


*Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
Ans :  Cyber Squatting

CYBER STALKING


*Harassing an individual or a group of individuals by using internet or electronic device especially against women is known as 
Ans :  Cyber Stalking

DATA DIDDLING


*Unauthorized changing of data before or during their input to a computer system 
Ans :  Data Diddlig

CYBER PORNOGRAPHY


*Transmitting sexual pictures of vidoes via electronic device or through Internet is known as
Ans : Cyber Pornography

E-MAIL BOMBING


*E-mail bombers attack the mail server by sending bulk mails to break the server 
*Spam mail is also called
Ans : Junk e-mail
*Spam mails are sent to numerous recipients similar to a chain letter

LOGIC BOMB


*A code initially inserted into a software that will come as a harmful function when specified conditions are met
Ans : Logic Bomb

CYBER DEFAMATION


*Spreading false messages about a person or a company through E-mail, mobile, social networking in.sites is called
Ans : Cyber Defamation

SOFTWARE PIRACY


*Theft of software through illegal copying of genuine programs or counterfeiting and distribution of products intended to pass for the original is known as
Ans : Software Piracy

CYBER FORGERY


*Creating fake mark list, fake identity card, fake currencies etc with the help of a computer is known as
Ans : Cyber Forgery

SCORING MACHINE (PREVIOUS QUESTION)


*An attempt to make a computer resource unavailable to its intended users is called
Ans : Denial - of - service attack
*Who is considered to be the first programmer
Ans : Ada Lovelace
*'mpg' extension refers usually to what kind of file
Ans : Animation / movie file
*Codes consisting of light and dark marks of various thickness which may be optically read is known as
Ans : Bar code
*A computer program that is used to convert an assembly language to machine language is
Ans : Assembler
*Name the Act that governs the internet usage in India
Ans : The Information Technology act 2000
*A device that modulates signal to (encode digital information and demodulates signals to decoded) the transmitted information
Ans : Modem
*The brain of any Computer System is
CPU (Central Processing Unit)
*The inventor of world wide web
Ans : Tim Berner's Lee
*The fraudulent attempt, usually made through email, to steal personal
*information Such as user name, password and credit card details is termed as

Ans : Phishing
*The resolution of a computer monitor is determined
Ans : Number of pixels 
*HTML stands for
Ans : Hyper Text Markup Language
*Who is known as the father of free software foundation
Ans : Richard Stallman
*The maximum speed at which data can be transferred between two nodes on network is called
Ans : Bandwidth
*The process of finding and correcting the logical errors in a computer program is called
Ans : Debugging
*Unwanted bulk messaging into email inbox is known as
Ans : Spamming
*Who is known as the father of internet 
Ans : Vinton Cerf
*The term used for environmentally sustainable computing is
Ans : Green Computing
*The process of loading operating system into computers Primary Memory is called
Ans : Booting
*Name the chess playing computer developed by IBM that defeated world champion Garry Kasparov
Ans : Deep Blue
*The process of discovering new patterns from large data sets
Ans : Data mining
*An error in computer data is called
Ans : Bug
*Which technology is used in Compact disk
Ans : Laser
*A computer program that converts an entire program into machine language is called
Ans : Compiler
*What is the alternative computer Jargon
Ans : Glitch
*India passed IT Act 2000 and notified it for effectiveness on
Ans : October 17, 2000
*Viruses that travel from computer to computer to spread their infection
Ans : Worm
*EBCDIC stands for
Ans : Extended Binary Coded Decimal Interchange Code
*________is the virtual network of libraries
Ans : INFLXBNET
*What is the full form of Wi-Fi?
Ans : Wireless Fidelity
*HTTPs (https) stands for
Ans : Hypertext Transfer Protocol Secure
*Who is known as the father of  computer science?
Ans : Alan Turing
*BIOS software is stored in 
Ans : ROM
*A java program that executes from a web page is called
Ans : Applet
*A private computer network within an organisation or a company that allows controlled access from the outside is known as
Ans : Extranet
*Which is the standard protocol for e- mails across the internet
Ans : SMTP (Simple Mail Transfer Protocol)
*'Software piracy' refers to
Ans : Unauthorized copying of software
*Section 67 of IT act 2000 deals with
Ans : Publishing of information which is observed in electronic form
*A group of four bits is known as
Ans : Nibble
*The first mobile virus
Ans : Cabir
*Which is the technology used in exchange of data between different system
Ans : XML
*Which computer language is used for artificial intelligence
Ans : PROLOG, LISP
*'Tux' the penguin is the Mascot of
Ans : Linux
*The OS that allows only one program to run at a time is
Ans : Batch processing
*A gate in which all input must be low to get high output is called
Ans : NOR gate
*Which company is known as 'Big Blue'
Ans : IBM
*Information Technology Act was enacted on
Ans : June 9, 2000
*A technology to provide high speed internet access over telephone wiring
Ans : ADSL (Asymmetric Digital Subscriber Line)
*Internet packets are called
Ans : Data Grams
*Software such as Explorer and Firefox are referred to as
Ans : Web Browsers
*Ice cream, Sandwich and Jelly bean are the latest version of which operating system
Ans : Android
*E-mail that appears to have been originated from one source when it was actually sent from another source is referred to as
Ans : E-mail spoofing
*Data diddling involves
Ans : Changing data prior or during input to the computer
*Which hardware device is used to interconnect different types of network with different protocols
Ans : Gateway
*The Walkie Talkie is an example of which mode of communication
Ans : Half Duplex
*A device that combines data from multiple computer and load them on a common communication channel is

Ans : Multiplexor
*In the e-mail address admin @ vms.org
Ans : Host Name with non commercial domain
*IBM 1401 is_____Generation computer
Ans : Second
*The term associated with the processing speed of computer
Ans : MIPS (Million Instructions Per Second)
*Unauthorised attempts to bypass the security mechanisms of an information system or network is called
Ans : Hacking
*Software which allows the user to load a web page is called
Ans : Browser
*System software which translate and execute high level language code statement by statement
Ans : Interpreter
*One Giga byte is equal to 
Ans : 1024 MB
*Who invented the high level programming language C
Ans : Dennis M. Ritchie
*Along with whom did Bill Gates found Microsoft
Ans : Paul Allen
*A software program stored in a ROM that cannot be changed easily is known as
Ans : Firmware
*When the mouse pointer is positioned on a_____it is shaped like a hand
Ans : Hyperlink
*First High level language
Ans : FORTRAN
*A central computer surrounded by one or more satellite computer is called
Ans : Star network topology
*Who is the founder of whatsapp
Ans : Jan Koum
*The picture which represents programs on the Desktop is called
Ans : Icons
*Communication between computers always
Ans : Serial
*____developed Touch method
Ans : Frank Me Gurrin
*The concentric circles of floppy disk is known as
Ans : Track
*Chief component of first generation computer
Ans : Vacuum tubes
*Group of instructions that directs a computer is called
Ans : Program 
*The first antivirus programme was
Ans : Creaper
*Internet came into force in India in
Ans : 1995
*Standard using High level language in Internet
Ans : Java
*A commonly used data format for exchanging information between computer or programmes
Ans :  ASCII
*The process of writing data to CD is called
Ans :  Burning
*The restart of computer is called a
Ans :  Warm booting
*The first microprocessor developed by Intel is
Ans :  Intel - 4004
*The digital - security system that uses some unique characteristic of Human biology to identify authorized users
Ans :  Biometrics
*The high level language best suited for business application is
Ans :  COBOL
*Who is known as the father of personal computer
Ans :  Henri Edward Robert
*If a computer has more than one processor, then it is known as
Ans :  Multi processor
*Storing same data in many places is called
Ans :  Redundancy
*____________ is the process of dividing the disk into tracks and sectors
Ans :  Formatting
*A temporary storage attached to the CPU of the computer for input-output operation is a
Ans :  Register
*First cyber forensic laboratory in India is at
Ans :  Tripura
*The cyber Terrorism comes under ______of IT Act 2000
Ans :  Section 66F
*Which award is known as Nobel Prize in Computer Science
Ans :  Turing Award
*The number of functional keys in keyboard
Ans :  12
*First Techno park was established in India at
Ans :  Thiruvananthapuram
*The technology of second generation computers is based on
Ans :  Transistor
*A programme designed to detect and remove malicious virus
Ans :  Antivirus
*JPEG is the acronym for
Ans :  Joint photographic expert group
*The personnel who deals with the computer and its management put together are called
Ans :  Human Ware
*ALU stands for
Ans :  Arithmetic and Logical unit
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions