Pareekshavijayi e-Book
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
R<br />
12 Veto<br />
follow us: facebook.com/vetotrivandrum 22<br />
Hmtcm<br />
e¡hpw<br />
Hmtcm tSm¸nIv<br />
dnhn-j³<br />
1. The small pictures on the<br />
window desktop is called<br />
[Administrative Officer KSRTC<br />
2015]<br />
a) Commands b) Tabs<br />
c) Menus d) Icons<br />
2. Section 66F of IT Act 2008 deals<br />
with<br />
[Administrative Officer KSRTC<br />
2015]<br />
a) Cyber stalking<br />
b) Child pornography<br />
c) Phishing<br />
d) Cyber Terrorism<br />
3. ISDN stands for<br />
[Administrative Officer KSRTC<br />
2015]<br />
a) Indian Standard Data<br />
Network<br />
b) Independent Software Data<br />
Network<br />
c) Integrated Standard Digital<br />
Network<br />
d) Integrated Standard Data<br />
Network<br />
4. The translator program that<br />
translates each line of the source<br />
program as it runs is called<br />
[Administrative Officer KSRTC<br />
2015]<br />
a) Compiler b) Interpreter<br />
c) Editor d) Linker<br />
5. 1 megabyte is equal to ______<br />
bytes [Administrative<br />
Officer KSRTC 2015]<br />
a) 10 9 b) 10 6<br />
c) 10 8 d) 10 4<br />
6. India’s first cyber crime<br />
police station is located in<br />
[Administrative Officer KSRTC<br />
2015]<br />
a) Hyderabad b) Bangalore<br />
c) Delhi d) Mumbai<br />
7. The protocol used for retrieving<br />
email from a mail server is<br />
Topic Master - IT<br />
(50 Questions)<br />
[Administrative Officer KSRTC<br />
2015]<br />
a) POP b) SNMP<br />
c) SMTP d) FTP<br />
8. The software application used<br />
to access and view websites is<br />
called [Administrative Officer<br />
KSRTC 2015]<br />
a) Spreadsheet<br />
b) Microcode<br />
c) Web browser<br />
d) Malware<br />
9. The term _____ refers to a bad or<br />
criminal hacker [Administrative<br />
Officer KSRTC 2015]<br />
a) Black hat b) White hat<br />
c) Cracker d) Slacker<br />
10. What should you do if you require<br />
pasting the same format in many<br />
places when using MS Word?<br />
[University Assistant Calicut –<br />
2013]<br />
a) Click the format painter and go<br />
on pasting in many places holding<br />
Alt key<br />
b) Double click the format painter<br />
then go on pasting in many places<br />
c) Click the format painter then go<br />
on pasting to many places holding<br />
Ctrl key<br />
d) All of the above<br />
11. Hardware devices that are not part<br />
of the moon computer system<br />
and are often added later to the<br />
system?<br />
[University Assistant Calicut –<br />
2013]<br />
a) IPs b) Add-ons<br />
c) Peripherals<br />
d) Supporting systems<br />
12. An attack accomplished by using<br />
the internet to break into computers<br />
and using them to attack a network<br />
is called<br />
[University Assistant Calicut –<br />
2013]<br />
a) Cyber terrorism<br />
b) IP attack c) IPR violations<br />
d) Distributed DOS<br />
13. 1 GB is equal to<br />
[University Assistant Calicut –<br />
2013]<br />
a) 2 20 bytes b) 2 30 bytes<br />
c) 2 100 bytes d) 2 50 bytes<br />
14. What is the base of binary<br />
number system? [University<br />
Assistant Calicut – 2013]<br />
a) 0 b) 11<br />
c) 1 d) 2<br />
15. The practice of storing regularly<br />
used computer data on multiple<br />
servers that can be accessed<br />
through the internet is called<br />
[University Assistant Calicut –<br />
2013]<br />
a) Cloud computing<br />
b) E commerce<br />
c) Browsing<br />
d) Net log<br />
16. An email that appears to have been<br />
originated from the source when<br />
it was actually sent from another<br />
source.<br />
[University Assistant Calicut –<br />
2013]<br />
a) Email spamming<br />
b) Email spoofing<br />
c) Email hacking<br />
d) Trojan horse<br />
17. Which of the following institution<br />
is credited with the development<br />
of www<br />
[University Assistant Calicut –<br />
2013]<br />
a) CALTECH b) NAS<br />
c) MIT d) CERN<br />
18. Digital signature certificates are<br />
issued by<br />
[University Assistant Calicut –<br />
2013]<br />
a) Certification Agencies appointed<br />
by the office of the controller of<br />
certification agencies<br />
b) The Chief of the Cyber cell of<br />
State Governments<br />
c) The income tax department<br />
d) The unique identity authority of<br />
India<br />
19. What is the main objective of the<br />
Information Technology Act 2000<br />
[University Assistant Calicut –<br />
2013]<br />
a) To control the internet in India<br />
b) To provide legal recognition for<br />
transactions carried out by means<br />
of electronic data interchange<br />
c) To control all transactions<br />
through electronic media which<br />
are likely to jeopardize social<br />
stability<br />
d) To give the police unlimited<br />
power to deal with cyber crimes<br />
20. Following a person movements<br />
across the increment by posting<br />
threatening messages on the<br />
bulletin boards frequented by<br />
the victim, entering the chat<br />
rooms frequented by the victim,<br />
constantly, bombarding the victim<br />
with emails etc. is called<br />
[University Assistant Calicut – 2013]<br />
a) Cyber stacking<br />
b) Cyber smearing<br />
c) Cyber fraud<br />
d) Cyber defamation<br />
21. VoIP is a technology for<br />
[University Assistant Calicut –<br />
2013]<br />
a) Making telephone calls over the<br />
internet<br />
b) Editing web pages<br />
c) Controlling the volume of<br />
internet traffic in a particular<br />
network<br />
d) Voice operated internet protocol<br />
for mobile device<br />
22. The widely criticised section in the<br />
Information Technology Act 2000<br />
that allegedly curbs the freedom of<br />
expression of individuals through<br />
electronic media<br />
[University Assistant Calicut –<br />
2013]<br />
a) 81 B b) 28<br />
c) 66 A d) 12<br />
23. A program that has the capability<br />
to infect other programs and make<br />
copies of itself and spread into<br />
other programs is called<br />
[University Assistant Calicut –<br />
2013]<br />
a) Worm b) Trojan horse<br />
c) Malware d) Virus