24.11.2018 Views

Pareekshavijayi e-Book

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

R<br />

12 Veto<br />

follow us: facebook.com/vetotrivandrum 22<br />

Hmtcm<br />

e¡hpw<br />

Hmtcm tSm¸nIv<br />

dnhn-j³<br />

1. The small pictures on the<br />

window desktop is called<br />

[Administrative Officer KSRTC<br />

2015]<br />

a) Commands b) Tabs<br />

c) Menus d) Icons<br />

2. Section 66F of IT Act 2008 deals<br />

with<br />

[Administrative Officer KSRTC<br />

2015]<br />

a) Cyber stalking<br />

b) Child pornography<br />

c) Phishing<br />

d) Cyber Terrorism<br />

3. ISDN stands for<br />

[Administrative Officer KSRTC<br />

2015]<br />

a) Indian Standard Data<br />

Network<br />

b) Independent Software Data<br />

Network<br />

c) Integrated Standard Digital<br />

Network<br />

d) Integrated Standard Data<br />

Network<br />

4. The translator program that<br />

translates each line of the source<br />

program as it runs is called<br />

[Administrative Officer KSRTC<br />

2015]<br />

a) Compiler b) Interpreter<br />

c) Editor d) Linker<br />

5. 1 megabyte is equal to ______<br />

bytes [Administrative<br />

Officer KSRTC 2015]<br />

a) 10 9 b) 10 6<br />

c) 10 8 d) 10 4<br />

6. India’s first cyber crime<br />

police station is located in<br />

[Administrative Officer KSRTC<br />

2015]<br />

a) Hyderabad b) Bangalore<br />

c) Delhi d) Mumbai<br />

7. The protocol used for retrieving<br />

email from a mail server is<br />

Topic Master - IT<br />

(50 Questions)<br />

[Administrative Officer KSRTC<br />

2015]<br />

a) POP b) SNMP<br />

c) SMTP d) FTP<br />

8. The software application used<br />

to access and view websites is<br />

called [Administrative Officer<br />

KSRTC 2015]<br />

a) Spreadsheet<br />

b) Microcode<br />

c) Web browser<br />

d) Malware<br />

9. The term _____ refers to a bad or<br />

criminal hacker [Administrative<br />

Officer KSRTC 2015]<br />

a) Black hat b) White hat<br />

c) Cracker d) Slacker<br />

10. What should you do if you require<br />

pasting the same format in many<br />

places when using MS Word?<br />

[University Assistant Calicut –<br />

2013]<br />

a) Click the format painter and go<br />

on pasting in many places holding<br />

Alt key<br />

b) Double click the format painter<br />

then go on pasting in many places<br />

c) Click the format painter then go<br />

on pasting to many places holding<br />

Ctrl key<br />

d) All of the above<br />

11. Hardware devices that are not part<br />

of the moon computer system<br />

and are often added later to the<br />

system?<br />

[University Assistant Calicut –<br />

2013]<br />

a) IPs b) Add-ons<br />

c) Peripherals<br />

d) Supporting systems<br />

12. An attack accomplished by using<br />

the internet to break into computers<br />

and using them to attack a network<br />

is called<br />

[University Assistant Calicut –<br />

2013]<br />

a) Cyber terrorism<br />

b) IP attack c) IPR violations<br />

d) Distributed DOS<br />

13. 1 GB is equal to<br />

[University Assistant Calicut –<br />

2013]<br />

a) 2 20 bytes b) 2 30 bytes<br />

c) 2 100 bytes d) 2 50 bytes<br />

14. What is the base of binary<br />

number system? [University<br />

Assistant Calicut – 2013]<br />

a) 0 b) 11<br />

c) 1 d) 2<br />

15. The practice of storing regularly<br />

used computer data on multiple<br />

servers that can be accessed<br />

through the internet is called<br />

[University Assistant Calicut –<br />

2013]<br />

a) Cloud computing<br />

b) E commerce<br />

c) Browsing<br />

d) Net log<br />

16. An email that appears to have been<br />

originated from the source when<br />

it was actually sent from another<br />

source.<br />

[University Assistant Calicut –<br />

2013]<br />

a) Email spamming<br />

b) Email spoofing<br />

c) Email hacking<br />

d) Trojan horse<br />

17. Which of the following institution<br />

is credited with the development<br />

of www<br />

[University Assistant Calicut –<br />

2013]<br />

a) CALTECH b) NAS<br />

c) MIT d) CERN<br />

18. Digital signature certificates are<br />

issued by<br />

[University Assistant Calicut –<br />

2013]<br />

a) Certification Agencies appointed<br />

by the office of the controller of<br />

certification agencies<br />

b) The Chief of the Cyber cell of<br />

State Governments<br />

c) The income tax department<br />

d) The unique identity authority of<br />

India<br />

19. What is the main objective of the<br />

Information Technology Act 2000<br />

[University Assistant Calicut –<br />

2013]<br />

a) To control the internet in India<br />

b) To provide legal recognition for<br />

transactions carried out by means<br />

of electronic data interchange<br />

c) To control all transactions<br />

through electronic media which<br />

are likely to jeopardize social<br />

stability<br />

d) To give the police unlimited<br />

power to deal with cyber crimes<br />

20. Following a person movements<br />

across the increment by posting<br />

threatening messages on the<br />

bulletin boards frequented by<br />

the victim, entering the chat<br />

rooms frequented by the victim,<br />

constantly, bombarding the victim<br />

with emails etc. is called<br />

[University Assistant Calicut – 2013]<br />

a) Cyber stacking<br />

b) Cyber smearing<br />

c) Cyber fraud<br />

d) Cyber defamation<br />

21. VoIP is a technology for<br />

[University Assistant Calicut –<br />

2013]<br />

a) Making telephone calls over the<br />

internet<br />

b) Editing web pages<br />

c) Controlling the volume of<br />

internet traffic in a particular<br />

network<br />

d) Voice operated internet protocol<br />

for mobile device<br />

22. The widely criticised section in the<br />

Information Technology Act 2000<br />

that allegedly curbs the freedom of<br />

expression of individuals through<br />

electronic media<br />

[University Assistant Calicut –<br />

2013]<br />

a) 81 B b) 28<br />

c) 66 A d) 12<br />

23. A program that has the capability<br />

to infect other programs and make<br />

copies of itself and spread into<br />

other programs is called<br />

[University Assistant Calicut –<br />

2013]<br />

a) Worm b) Trojan horse<br />

c) Malware d) Virus

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!