*A set of computers connected together for the purpose of sharing resources Ans : Computer Network *Computers on a network are called Ans : Nodes *The computers may be connected via any data communication link like wires, cables, satellite links other communication media *The computer which acts like a workstation on the Network Ans : User's computer *To exchange information all over the world, millions of computers are connected through a Ans : Network
TYPES OF NETWORK
*LAN (Local Area Network) *WAN (Wide Area Network) *MAN (Metropolitan Area Network) *PAN (Personal Area Network)
LAN (LOCAL AREA NETWORK)
*The network that span a relatively small area Ans : Local Area Network *Most LAN connects workstations with Ans : Personal computers *The system in which computers are interconnected and the geographical area such as home, office building, school, may be within a building to small area Ans : LAN
LANGUAGE
YEAR
FOUNDER
LISP 1958 John McCarthy and Steve Russell Alain PROLOG 1972 Colmerauer *All terminals are connected to a main computer called Ans : Server *The most common technology currently used to build a LAN Ans : Ethernet and Wifi
WAN (WIDE AREA NETWORK)
*A network which is a geographically dispersed telecommunication network Ans : WAN *The network which spans a relatively large geographical area Ans : WAN *WAN can also be connected through cable line or satellites *The largest WAN in existence Ans : Internet *Most common network which interconnects countries Ans : WAN
MAN (METROPOLITAN AREA NETWORK)
*The data network designed for a town or city Ans : MAN *A collection of local area network is known as Ans : MAN *The network which connects an area larger than a LAN but smaller than a WAN Ans : MAN
PAN (PERSONAL AREA NETWORK)
*The network used for communication among various electronic devices such as personal computer and mobile Ans : PAN
NETWORK DEVICES
REPEATER MODE
*An electronic device that receives a signal and retransmit it Ans : Repeater *Repeater has two ports and can connect two segment of a Ans : LAN
HUB
* A hardware device that contains multiple, independent ports that match the cable type of the network Ans : Hub *Hub is also known as Ans : Concentrator *The hardware which takes data comes from one channel and sends out to all other channels Ans : Hub
ROUTER
*The hardware which is used to forward data packets from one logical network to another Ans : Router *A hardware device which is designed to receive, analyze, convert the packet data with two or more networks Ans : Router
SWITCHES
*The hardware device that joins multiple computers together with LAN Ans : Switches *First Ethernet switch was introduced by Ans : Kalpana (1990)
BRIDGE
*The hardware which is used to connect two or more LAN together that uses same protocol Ans : Bridge *The hardware which reduces the amount of traffic on a LAN by dividing it into two segment Ans : Bridge
GATEWAY
*The hardware which is used to connect network using different protocols Ans : Gateway *Gateway may be Ans : Router or Proxy Server
MULTIPLEXER
*A device that selects one input signal from multiple analog or digital input signals and forwards the selected input into a single line Ans : Multiplexer
NETWORK TOPOLOGY
*The geometric arrangement of various devices (nodes) on the network is known as Ans : Topology
PROTOCOL
FULL FORM
USES
*HTTP-Hyper Text Transfer Protocol-to transfer data over the www *HTTPS- Hyper Text Transfer Protocol Secure-Secured version of http *FTP -File Transfer Protocol-to transfer file over the Network *TCP/IP -Transfer Control Protocol/Internet Protocol-Communication and delivery of packets through network *SMTP -Simple Mail Transfer Protocol-For sending email over the internet *POP -Post Office Protocol-For receiving email message *IMAP-Internet Message Access Protocol-For receiving email message *SNMP -Simple Network Management Protocol-Network Management
*The simplest Network topology is known as Ans : Bus Topology *In Bus Topology, all nodes are connected to a central cable called Ans : Bus *Topology in which every node is connected to a single cable, all devices share a single communication line Ans : Bus Topology *Failure of one device will not affect other devices in Ans : Bus Topology
STAR TOPOLOGY
*Star Topology is all the nodes are connected to a central system called Ans : Switch *In star topology, every node has its own dedicated communication to the Ans : Hub *In star Topology, central computer acts as a Ans : Server
RING TOPOLOGY
* All the nodes are connected each other in such a way that they make a close loop in Ans : Ring Topology Failure of any node results in the failure of whole ring in Ans : Ring Topology
TREE TOPOLOGY
* Tree Topology is the combination of Ans : Bus topology and star topology * In Tree Topology, number of star networks are connected using Ans : Bus
MESH TOPOLOGY
* Topology in which each node is connected to all other nodes Ans : Mesh Topology * The topology which is a point - to point connection to the other nodes or devices Mesh Ans : Topology
INTERNET CONNECTION
1.Dial - up connection 2.Broadband connection 3.Wireless connection
DIAL-UP CONNECTION
* The connection which uses telephone line to connect PC to the Internet Ans : Dial-up connection * The device which connects the computer through the standard phone lines Ans : Modem
BROADBAND CONNECTION
*A high speed internet connection provided through either cable or telephone companies is known as Ans : Broadband connection *Broadband internet connection such as DSL and cable are considered Ans : High-bandwidth connections
WIRELESS CONNECTION
*The connection which requires neither a modem nor cables Ans : Wireless connection *The network can easily be established where there is no DSL or Cable through Ans : Wireless connection *The network which is considered the ancient form of internet Ans : ARPANET *Internet in India was started by Ans : VSNL
WORLD WIDE WEB (WWW)
*An information system on the internet which allows documents to be connected to other documents Ans : World Wide Web *WWW is an information sharing model that is built on the top of the Ans : Browser *Father of WWW Ans : Tim Berners-Lee *Headquarters of WWW Ans : Geneva
INTRANET
*A private network that is contained within an enterprise Ans : Intranet
EXTRANET
*An extension of intranet to users outside the organization is known as Ans : Extranet *Extranet can be accessed only by the members of the same company
■ COMMUNICATION MODES
*Simplex : Communication in only one direction (Eg. Radio) *Half Duplex : Communication in both directions, but only one direction at a time (Eg. Wireless) *Full Duplex : Communication in both direction at the same time (Eg Mobile Phone)
Wi - FI (WIRLESS FIDELITY)
*The technology which allows high speed internet connections without the use of cable or wires Ans : Wi-Fi *The working principle of wi-fi Ans : Radio wave technology
WIMAX (WORLD WIDE INTEROPERABILITY FOR MICROWAVE ACCESS)
*The technology similar to wi-fi but at higher speed over greater distances and for a greater number of users Ans : WiMAX
*IMPORTANT TERMS RELATED TO INTERNET
DOMAIN NAME
*A unique name that identifies a website is known as Ans : Domain Name *The way to idetify and locate computers connected to the Internet ans : Domain *The domain names were initially registered by Ans : ICANN (Internet Corporation for Assigned Name and Numbers) *Every domain name has a suffix that indicates Ans : Top - level domain name
URL (UNIFORM RESOURCE LOCATOR)
*The global address of documents and other resources on the world wide web Ans : URL *URL was developed by Ans : Tim Berners Lee URL : https//www.keralapsc.gov https - Protocol www - subdomain keralapsc.gov - domain name *Webpage webpage is document that is accessible through Internet using a web browser *Website website is a set of related webpage *Home page Home page is the main page or front page of a web site
SEARCH ENGINES
*Search Engine is used to search for information on Ans : World Wide Web *Worlds first search Engine Ans : Archie *India's first search engine Ans : Guruji
TOP - LEVEL DOMAIN NAME
*.gov - Government *.com - Commercial *.org - Non - Profit organisation .edu - Educational *.mil - Military *.net - Network resources *.biz - Business purpose
*The application which uses to view web pages on the Internet Ans : Web browser *The client that contacts the web server and requests information Ans : Browser *The first web browser was invented by Ans : Tim Berners Lee *First web browser Ans : Nexus *First web browser developed by India Ans : Epic *Google was founded by Ans : Larry Page and Sergey Brin *Google was launched in Ans : 1998 *Headquarters of Google Ans : Menlo park, California *Yahoo was founded by Ans : Jerry Yang and David Filo *Yahoo was launched in Ans : 1995 *Headquarters of Google Ans : Sunnyvale, California
COMMON WEB BROWSERS ARE
*Nexus *Epic *Internet Explorer *Google Chrome *Safari *Mosaic *UC Browser *Netscape Navigator *Microsoft Edge (Spartan) *Sea monkey *Torch *Flying Fish
VIRUS & ANTI VIRUS
*A small software program that can spread from one computer system to another and cause interferences with computer operations Ans : Virus *VIRUS is Ans : Vital Information Resource Under Siege *The person who defined the term computer virus Ans : Fred Cohen (1983) *Programs that multiply like viruses but spread from computer to computer are called Ans : Worms *Programmers who write virus programmes are known as Ans : Vickser
ABBREVIATIONS
* First Personal Computer Virus Ans : Apple * First Micro Computer Virus Ans : Elk doner * First Computer virus Ans : Creeper / Brain * First Mobile Virus Ans : Cabir * First Virus effected in ARPANET Ans : Creeper *A computer software which is used to prevent, delete and detect the presence of virus in computer Anti Virus
Examples of Computer Virus
TEXAS, Blaster, Gappy,Slammer,Wanna Cry AVG,Any malicious computer program which is used to hack into a computer by misleading users of its true intent is known as Trojan Horse
COMPUTER VANDALISM
Damaging or destroying data rather than stealing or misusing them is called Computer vandalism ADSL - Asymmetric Digital Subscriber Line ALU - Arithmetic and Logical Unit ANSI - American National Standard Institute ARPANET - Advanced Research Project Agency Network ASCII - American Standard Code for Information Interchange BASIC - Beginners All Purpose Symbolic Instruction Code BCD - Binary Coded Decimal Bin - Binary BIOS - Basic Input / Output System Bit - Binary Digit BMP - BitMap CAD - Computer Aided Design CD - Compact Disk CDMA - Code Division Multiple Access COBOL - Common Business Oriented Language CPU - Central Processing Unit CRT - Cathode Ray Tube DBA - Database Administration DBMS - Database Management System DNS - Domain Name Service DOS - Disk Operating System DPI - Dots Per Inch DRAM - Dynamic Random Access Memory DSL - Digital Subscriber Line DTP - Desktop Publishing DVD - Digital Versatile Disk * EBCDIC - Extended Binary Coded Decimal Interchange * EDSAC - Electronic Delay storage Automatic Calculator * EDVAC - Electronic Discrete Variable Automatic Computer * EPROM - Erasable Programmable Read Only Memory * EEPROM - Electrically Erasable Programmable Read Only Memory * ENIAC - Electronic Numerical Integrator and Calculator (Computer) * EXE - Executable * FAT - File Allocation Table * FAX - Facsimile * FORTRAN- Formula Translation * FTP - File Transfer Protocol * GHz - Gigahertz * GIF - Graphics Interchange Format * GPRS - General Packet Radio Service * GPS - Global Positioning System * GSM - Global System for Mobile Communication * GUI - Graphical User Interface * HTML - Hyper Text Markup Language * HTTP - Hyper Text Transfer Protocol * HTTPS - Hyper Text Transfer Protocol * IBM - International Business Machine * IMAP - Internet Message Access Protocol * ICANN - Internet Corporation for Assigned Names and Numbers * INFUBNET- Information and Library Network * IP - Internet Protocol * ISDN - Integrated Service Digital Network * ISoC - Internet Society * ISP - Internet Society Provider * JPEG - Joint Photographic Expert Group * LCD - Liquid Crystal Display * LED - Light Emitting Diode * LPI - Line Per Inch * NASSCOM - National Association for Software Service and Computer * NOS - Network Operating System * NTFS - New Technology File System * MALWARE - Malicious Software * MDA - Mail Delivery Agent * MHZ - Megahertz * MICR - Magnetic Ink Character Recognition * MMS - Multimedia Message Service * MODEM - Modulate / Demodulate * MPEG - Moving Picture Expert Group * OCR - Optical Character Reader * OOP - Object Oriented Programming * OMR - Optical Mark Reader * PDF - Portable Document Format * PNG - Portable Network Graphics * POP - Post Office Protocol * POST - Power On Self Test * PPP - Point - to - Point Protocol * PROM - Programmable Read Only Memory *RAM - Random Access Memory RDBMS - Relational Database Management System *ROM - Read Only Memory *SIM - Subscriber Identification Module *SMTP - Simple Mail Transfer Protocol *SNMP - Simple Network Management Protocol *SQL - Structured Query Language *SRAM - Static Random Access Memory *TCP/IP - Transfer Control Protocol / Internet Protocol *TFT- Thin Film Transistor *ULSI-Ultra Large Scale Integrated Circuit *UNIVAC-Universal Automatic Computer *UPS-Uninterruptable Power Supply *URL-Uniform Resource Locator *USB-Universal Serial Bus *VDU-Visual Display Unit *VGA-Video Graphics Array *VIRUS-Vital Information Resource Under Siege *VLSI-Very Large Scale Integrated Circuits *VOIP-Voice Over Internet Protocol *WAP-Wireless Application Protocol *Wi-Fi-Wireless Fidelity *WORM-Write Once Read Many *WWW-World Wide Web *XML-Extensible Markup language *Zip-Zone Information Protocol
CYBER LAW
*The primary source of cyber law in India Ans : Information Technology Act IT Act 2000 was enacted on June 9, 2000 *IT Act 2000 came into force on Ans : October 17, 2000 *IT Act 2000 was substantially amended through the Ans : IT (Amendment) Act 2008 IT ACT 2000 HAS: *13 Chapters *94 Sections *4 Schedules
IT AMENDMENT ACT 2008
*14 chapters (chapter XIIA was added) *124 sections (Now 119 sections) *2 schedules *4 Parts *First 14 sections deals with some legal aspects concerning Ans : Digital signature *Section 43 to 47 provide for Ans : Penalties and Compensation *Section 48 to 64 deals with Ans : Tribunals and appeal to High court *Section 64 to 79 of the Act deals with Ans : Offence *Section 80 to 94 of the Act deals with Ans : Miscellaneous *IT (Amendment) Act 2008 was enacted on Ans: December 23, 2008 *IT Amendment Act 2008 came into force on Ans: October 27, 2009 *The law relating to cyber crimes, electronic or digital signatures, intellectual property, data protection and privacy include in Ans: Cyber law of India
IMPORTANT SECTIONS IN IT ACT
*Section 3 : Authentication Electronic Records *Section 4 : Legal Recognition of Electronic Records *Section 5 : Legal recognition of Electronic Signature *Section 6 : Use of Electronic Records and Electronic Signature in Government and its agencies *Section 7 : Retention of Electronic Records *Section 8 : Publication of rules, regulation etc in Electronic Gazette *Section 11 : Attribution of Electronic Records *Section 12 : Acknowledgement of Receipt (Modified by ITA Act 2008) *Section 13 : Time and place of despatch and receipt of electronic record *Section 15 : Secure Electronic Signature (Substituted vide ITAA 2008) *Section 17 : Appointment of Controller and other officers (Amended Vide ITAA 2008) *Section 18 : The Controller may perform all or any of the following functions namely *Section 19 : Recognition of foreign Certifying Authorities *Section 21 : License to issue electronic signature certificates *Section 35 : Certifying Authority to issue Electronic Signature Certificate *Section 36 : Representations upon issuance of Digital Signature Certificate *Section 43 : Penalty and Compensation for damage to computer, computer system, etc (Amended vide ITAA 2008) *Section 44: Penalty for failure to furnish information . return, etc *Section 48 : Establishment of Cyber Appellate Tribunal *Section 49 : Composition of Cyber Appellate Tribunal (Substituted vide ITAA 2008) *Section 62 : Appeal to High court
'SECTION
OFFENCE
PENALTY
65 - Tampering with computer source documents, - Imprison ment up to three years, or/and with fine up to Rs. 200,000 66 - Hacking with computer system - Imprisonment up to three years, or/and with fine up to Rs.500,000 66B - Receiving stolen computer or communication device - Im prison men t up to three years, or/and with fine up to Rs. 100,000 66C - Using password of another person - Imprisonment up to five years/ or/and with fine up 66D - Cheating using computer resource - Imprisonment up to three years, or/and with fine up to Rs.100,000 66E- Publishing private images of others - Imprisonment up to three years, or/and with fine up to Rs.100,000 *66F - Acts of cyber terrorism - Imprisonment up to three years, or/and with fine up to Rs.200,000 to 1,000000 *67 - Publishing information which is obscene in electronic form. - Im prison men tup to life *67A - Publishing images containing sexual acts - Imprisonment up to seven years, or/and with fine up to Rs.1,000,000 *67B - Publishing child.porn or predating children online - Imprisonment up to five years, or/and with fine up to Rs. 1,000,000 *67C - Failure to maintain records - Imprisonment up to three years,or/and with fine up to Rs.200,000 *68 - Failure/refusal to comply with orders - Imprisonment up to three years, or/and with fine up to Rs.200,000 69 - Failure/refusal to decrypt data - Imprisonment up to seven years and possible fine. *70 - Securing access or attempting to secure access to a protected system - Imprisonment up to ten years, or/and with fine. *71 - Misrepresentation - Imprisonment up to three years, or/and with fine [nw]
SCRAPPED SECTIONS
*The supreme court has suspended following sections as unconstitutional from the IT Act /Kerala Police Act
SECTION 66 A OF IT ACT
*Punishment for sending offensive messages through electronic means
SECTION 118 D OF KERALA POLICE ACT
Causes annoyance to any person in an indecent manner by statements or verbal or comments or telephone calls or calls of any type or by chasing or sending messages or mails by any
DIGITAL SIGNATURE
*The contents of electronic documents is authenticated by Ans : Digital Signature *Digital Signature is otherwise known as Ans : Electronic Signature
PUBLIC KEY AND PRIVATE KEY
*A cryptographic key used for creating an electronic signature Ans : Private Key *A cryptographic key used to verify the electronic signature Ans : Public Key *Private key is used for Ans : Encryption *Public key is used for Ans : Decryption *A data encrypted with the private key can only be decrypted with its corresponding Ans : Public key
DIFFERENT TYPES OF CYBER CRIMES HACKING
*An unauthorized intrusion into a computer or a network is called Ans : Hacking
HACKERS ARE THREE TYPE
1.White hat hackers 2.Black hat hackers 3.Gray hat hackers
1.WHITE HAT HACKERS
*White hat hackers is also known as Ans : Ethical Hackers *The hackers who hack the system for a good reason is known as Ans : White hat hackers
2.BLACK HAT HACKERS
*A Person who breaks the security of a computer system without permission from an authorized party is known as Ans : Black hat hacker
3.GRAY HAT HACKERS
*The person who hack system sometimes for good reason and sometime for bad reason is known as Ans : Gray hat hackers
WEB JACKING
*A hacking of website by password alteration for fulfilling political objectives or for money Ans : Web jacking *The term Web jacking is derived from Ans : Hijacking
CRACKING
*A person who breaks into a computer system just like a hacker with the intention to steal Passwords, Files, Programmes for unauthorized use Ans : Cracker
DENIAL OF SERVICE
*The act by a criminal, who floods the bandwidth of the victim's network Ans : Denial of service
PHISHING
*The fraudulent attempt, usually made through email, to steal personal information such as user name, password and credit card details Ans : Phishing
CLONE PHISHING
*The act of a phisher who creates a cloned email Ans : Clone phishing *Clone phisher manage to get a previously delivered email of other person and then sends the same email with link or attachment replaced by malicious ones
SPEAR PHISHING
*Spear phishing targets a Ans : Specific group *Instead of casting out thousands of emails randomly spear phishers target selected group of people with something in common, for example people from the same organisation
SALAMI ATTACK
*Bank employee can grab money using programs to reduce small amount of money from all customer accounts and adding it to own account is called Ans : Salami Attack *It is a financial cyber crime conducted by computer expert in bank
CYBER SQUATTING
*Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark Ans : Cyber Squatting
CYBER STALKING
*Harassing an individual or a group of individuals by using internet or electronic device especially against women is known as Ans : Cyber Stalking
DATA DIDDLING
*Unauthorized changing of data before or during their input to a computer system Ans : Data Diddlig
CYBER PORNOGRAPHY
*Transmitting sexual pictures of vidoes via electronic device or through Internet is known as Ans : Cyber Pornography
E-MAIL BOMBING
*E-mail bombers attack the mail server by sending bulk mails to break the server *Spam mail is also called Ans : Junk e-mail *Spam mails are sent to numerous recipients similar to a chain letter
LOGIC BOMB
*A code initially inserted into a software that will come as a harmful function when specified conditions are met Ans : Logic Bomb
CYBER DEFAMATION
*Spreading false messages about a person or a company through E-mail, mobile, social networking in.sites is called Ans : Cyber Defamation
SOFTWARE PIRACY
*Theft of software through illegal copying of genuine programs or counterfeiting and distribution of products intended to pass for the original is known as Ans : Software Piracy
CYBER FORGERY
*Creating fake mark list, fake identity card, fake currencies etc with the help of a computer is known as Ans : Cyber Forgery
SCORING MACHINE (PREVIOUS QUESTION)
*An attempt to make a computer resource unavailable to its intended users is called Ans : Denial - of - service attack *Who is considered to be the first programmer Ans : Ada Lovelace *'mpg' extension refers usually to what kind of file Ans : Animation / movie file *Codes consisting of light and dark marks of various thickness which may be optically read is known as Ans : Bar code *A computer program that is used to convert an assembly language to machine language is Ans : Assembler *Name the Act that governs the internet usage in India Ans : The Information Technology act 2000 *A device that modulates signal to (encode digital information and demodulates signals to decoded) the transmitted information Ans : Modem *The brain of any Computer System is CPU (Central Processing Unit) *The inventor of world wide web Ans : Tim Berner's Lee *The fraudulent attempt, usually made through email, to steal personal
*information Such as user name, password and credit card details is termed as
Ans : Phishing *The resolution of a computer monitor is determined Ans : Number of pixels *HTML stands for Ans : Hyper Text Markup Language *Who is known as the father of free software foundation Ans : Richard Stallman *The maximum speed at which data can be transferred between two nodes on network is called Ans : Bandwidth *The process of finding and correcting the logical errors in a computer program is called Ans : Debugging *Unwanted bulk messaging into email inbox is known as Ans : Spamming *Who is known as the father of internet Ans : Vinton Cerf *The term used for environmentally sustainable computing is Ans : Green Computing *The process of loading operating system into computers Primary Memory is called Ans : Booting *Name the chess playing computer developed by IBM that defeated world champion Garry Kasparov Ans : Deep Blue *The process of discovering new patterns from large data sets Ans : Data mining *An error in computer data is called Ans : Bug *Which technology is used in Compact disk Ans : Laser *A computer program that converts an entire program into machine language is called Ans : Compiler *What is the alternative computer Jargon Ans : Glitch *India passed IT Act 2000 and notified it for effectiveness on Ans : October 17, 2000 *Viruses that travel from computer to computer to spread their infection Ans : Worm *EBCDIC stands for Ans : Extended Binary Coded Decimal Interchange Code *________is the virtual network of libraries Ans : INFLXBNET *What is the full form of Wi-Fi? Ans : Wireless Fidelity *HTTPs (https) stands for Ans : Hypertext Transfer Protocol Secure *Who is known as the father of computer science? Ans : Alan Turing *BIOS software is stored in Ans : ROM *A java program that executes from a web page is called Ans : Applet *A private computer network within an organisation or a company that allows controlled access from the outside is known as Ans : Extranet *Which is the standard protocol for e- mails across the internet Ans : SMTP (Simple Mail Transfer Protocol) *'Software piracy' refers to Ans : Unauthorized copying of software *Section 67 of IT act 2000 deals with Ans : Publishing of information which is observed in electronic form *A group of four bits is known as Ans : Nibble *The first mobile virus Ans : Cabir *Which is the technology used in exchange of data between different system Ans : XML *Which computer language is used for artificial intelligence Ans : PROLOG, LISP *'Tux' the penguin is the Mascot of Ans : Linux *The OS that allows only one program to run at a time is Ans : Batch processing *A gate in which all input must be low to get high output is called Ans : NOR gate *Which company is known as 'Big Blue' Ans : IBM *Information Technology Act was enacted on Ans : June 9, 2000 *A technology to provide high speed internet access over telephone wiring Ans : ADSL (Asymmetric Digital Subscriber Line) *Internet packets are called Ans : Data Grams *Software such as Explorer and Firefox are referred to as Ans : Web Browsers *Ice cream, Sandwich and Jelly bean are the latest version of which operating system Ans : Android *E-mail that appears to have been originated from one source when it was actually sent from another source is referred to as Ans : E-mail spoofing *Data diddling involves Ans : Changing data prior or during input to the computer *Which hardware device is used to interconnect different types of network with different protocols Ans : Gateway *The Walkie Talkie is an example of which mode of communication Ans : Half Duplex
*A device that combines data from multiple computer and load them on a common communication channel is
Ans : Multiplexor *In the e-mail address admin @ vms.org Ans : Host Name with non commercial domain *IBM 1401 is_____Generation computer Ans : Second *The term associated with the processing speed of computer Ans : MIPS (Million Instructions Per Second) *Unauthorised attempts to bypass the security mechanisms of an information system or network is called Ans : Hacking *Software which allows the user to load a web page is called Ans : Browser *System software which translate and execute high level language code statement by statement Ans : Interpreter *One Giga byte is equal to Ans : 1024 MB *Who invented the high level programming language C Ans : Dennis M. Ritchie *Along with whom did Bill Gates found Microsoft Ans : Paul Allen *A software program stored in a ROM that cannot be changed easily is known as Ans : Firmware *When the mouse pointer is positioned on a_____it is shaped like a hand Ans : Hyperlink *First High level language Ans : FORTRAN *A central computer surrounded by one or more satellite computer is called Ans : Star network topology *Who is the founder of whatsapp Ans : Jan Koum *The picture which represents programs on the Desktop is called Ans : Icons *Communication between computers always Ans : Serial *____developed Touch method Ans : Frank Me Gurrin *The concentric circles of floppy disk is known as Ans : Track *Chief component of first generation computer Ans : Vacuum tubes *Group of instructions that directs a computer is called Ans : Program *The first antivirus programme was Ans : Creaper *Internet came into force in India in Ans : 1995 *Standard using High level language in Internet Ans : Java *A commonly used data format for exchanging information between computer or programmes Ans : ASCII *The process of writing data to CD is called Ans : Burning *The restart of computer is called a Ans : Warm booting *The first microprocessor developed by Intel is Ans : Intel - 4004 *The digital - security system that uses some unique characteristic of Human biology to identify authorized users Ans : Biometrics *The high level language best suited for business application is Ans : COBOL *Who is known as the father of personal computer Ans : Henri Edward Robert *If a computer has more than one processor, then it is known as Ans : Multi processor *Storing same data in many places is called Ans : Redundancy *____________ is the process of dividing the disk into tracks and sectors Ans : Formatting *A temporary storage attached to the CPU of the computer for input-output operation is a Ans : Register *First cyber forensic laboratory in India is at Ans : Tripura *The cyber Terrorism comes under ______of IT Act 2000 Ans : Section 66F *Which award is known as Nobel Prize in Computer Science Ans : Turing Award *The number of functional keys in keyboard Ans : 12 *First Techno park was established in India at Ans : Thiruvananthapuram *The technology of second generation computers is based on Ans : Transistor *A programme designed to detect and remove malicious virus Ans : Antivirus *JPEG is the acronym for Ans : Joint photographic expert group *The personnel who deals with the computer and its management put together are called Ans : Human Ware *ALU stands for Ans : Arithmetic and Logical unit
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use