09.02.2019 Views

Veto q&a 7 Month22 (1)

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

@e-book<br />

Q Unwanted or non requested e-mails received in a folder<br />

is known as<br />

A. Spam<br />

Q World’s first web browser ‘Nexus’ was invented by<br />

A. tim Berners Lee (1990)<br />

Q First Integrated Circuit (IC) was developed by<br />

A. jack kilby<br />

Q The unique data item in a record which is used to<br />

identify a particular record<br />

A. primary key<br />

Q The first Computer developed in India<br />

A. tifrac<br />

Q Kerala State IT Mission was established in<br />

A. 1999<br />

Q Digital India was launched on<br />

A. 1 st july 2015<br />

Q Father of Information Theory<br />

A. claude Shannon<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

father of computer<br />

father of internet<br />

father of cellular phone<br />

father of computer Sceince<br />

father of free software<br />

Father of Artificial<br />

intelligence<br />

charles Babbage<br />

Vinton cerf<br />

Martin coopper<br />

alan turing<br />

richard Stallman<br />

john Mccarthy<br />

C language is developed by<br />

A. Dennis ritchie<br />

The Information Technology Act 2000 was came into<br />

force on<br />

A. 17 th october, 2000<br />

Which chapter of the IT Amendment Act 2008 deals<br />

with ‘Electronic Signature Certificate’<br />

A. chapter Vii<br />

Indian Computer Emergency Response Term (ICERT)<br />

was established in<br />

A. january 2004<br />

T<strong>amp</strong>ering with source documents is dealt with under<br />

which section<br />

A. Section 65<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

Q<br />

2018<br />

June<br />

The unlawful acts where the computer is either a tool<br />

or a target or both is called<br />

A. cybercrime<br />

The program that acts like something useful but do<br />

the things that are quiet d<strong>amp</strong>ing. The programs of<br />

this kind are called<br />

A. trojans<br />

-------- refers to sending email to thousands and<br />

thousands of users-similar to a chain letter<br />

A. Spamming<br />

The programs which are permanent as hardware and<br />

stored in ROM is known as<br />

A. firmware<br />

What is the fullform of Wi-Fi<br />

A. wireless fidelity<br />

Buying and selling of products using computer and<br />

network is called<br />

A. e-commerce<br />

The Cyber Terrorism comes under ------- of IT Act<br />

2000<br />

A. Section 66f<br />

Process of loading operating system into primary<br />

memory is known as<br />

A. Booting<br />

The extension of .com, .in, .net etc are usually<br />

called<br />

A. Domain name<br />

'FTP' stands for<br />

A. file transfer protocol<br />

'BIOS' software is stored in<br />

A. roM<br />

‘Tux’ the penguine is the mascot of<br />

A. LinuX<br />

In 1983, who defined the term ‘Computer Virus’<br />

A. fred cohen<br />

Software which allows the user to load a web page is<br />

called<br />

A. Browser<br />

Expansion of UNIVAC is<br />

A. uniVersal automatic computer<br />

What is a firewall protection<br />

A. Security<br />

Q&A Bonus<br />

The Vermacular Press Act was introduced by Lytton in the year - 1878<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!