11.09.2018 Views

May 2018 Vijayarekha

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1 st <strong>May</strong> <strong>2018</strong><br />

TALENT<br />

A C A D E M Y<br />

VIJAYAREKHA Volume VI Issue No. 04 PSC a’c- ]- c- o£mamknI<br />

PSC Previous Questions - Information Technology<br />

(2010apX¬<strong>2018</strong>hscb- p≈P.S.C. Degree Level ]co£- I- f- nse<br />

IT hǹmK- Ø- n¬\n∂p≈tNmtZymØ- c- ß- ƒ)<br />

International Computer<br />

Security Day : November, 30 th<br />

World Computer Literacy Day<br />

December 2 nd<br />

The Indian Computer<br />

Emergency Response Team<br />

serves as<br />

The National Agency for<br />

incident response<br />

A program that has capability<br />

to infect other programs and<br />

make copies of itself and spread<br />

into other programs is called<br />

Virus<br />

Malware program that<br />

replicates itself in order to<br />

spread to other computers<br />

Computer worm<br />

The first computer virus<br />

Creeper virus<br />

In 1983, who defined the term<br />

‘Computer Virus’<br />

Fred Cohen<br />

Software that aims to gather<br />

information about a person or<br />

organization without their<br />

knowledge, that may send such<br />

information to another entity<br />

without the consumer’s<br />

consent, or that asserts control<br />

over a device without the<br />

consumer’s knowledge<br />

Spyware<br />

Unwanted bulk messaging<br />

into email in box is known<br />

as: Spamming<br />

Spim is: Unwanted instant<br />

messages<br />

To process data, computers use<br />

Machine Language<br />

A computer program that is<br />

used to convert an assembly<br />

language to machine language<br />

is: Assembler<br />

The symbols used in an<br />

assembly language are<br />

Mnemonics<br />

A computer program that<br />

converts an entire program into<br />

machine language is called an:<br />

Compiler<br />

The translator program that<br />

translates each line of the<br />

source program as it runs is<br />

called: Interpreter<br />

Inventor of high level<br />

programming language C<br />

Dennis M. Ritchie<br />

Programmed Instruction to the<br />

computer is known as:<br />

Code<br />

Computer language which is<br />

used for artificial intelligence<br />

PROLOG<br />

The process of finding and<br />

correcting the logical errors in a<br />

computer program is called:<br />

Debugging<br />

An error in software or hardware<br />

is called is a bug. The alternative<br />

computer jargon for it is<br />

Glitch<br />

PROTOCOLS<br />

Protocol which is used for<br />

secure communication over<br />

internet - HTTPS<br />

Protocol which is used for e-<br />

mail transmission across<br />

internet - SMTP<br />

The protocol used for<br />

retrieving email from a mail<br />

server is - POP<br />

Set of protocols developed to<br />

provide transmission and<br />

addressing for internet:<br />

TCP/IP<br />

The means by which all<br />

computers connected to the<br />

internet identify each other is<br />

IP address<br />

Hardware device used to<br />

interconnect different types of<br />

networks with different<br />

protocols<br />

Gateway<br />

In a client/server computer<br />

network, the users’ computer is<br />

usually called:<br />

Client<br />

The practice and study of<br />

techniques for secure data<br />

communication in the presence<br />

of third parties:<br />

Cryptography<br />

The inventor of<br />

world wide web<br />

Tim Berner’s<br />

Lee<br />

Tim Berner’s Lee<br />

Father of free software<br />

foundation<br />

Richard Stallman<br />

Founders of Whatsapp<br />

Brian Acton and Jan Koum<br />

OPERATING SYSTEM<br />

The set of programs which acts as an interface between user and<br />

computer - Operating system<br />

The process of loading the operating system files into dynamic<br />

random access memory - Booting<br />

Technology used in the processor of a computer to simulates a<br />

single processor into two virtual processors to the operating system<br />

- Hyper threading technology<br />

The first fully supported 64 -bit operating system - Linux<br />

Operating system is - System software<br />

Gnu Privacy Guard (GPG) is:<br />

A cryptographic software<br />

which provides for keybased<br />

asymmetric cryptography for<br />

encryption and authentication<br />

A measurement used in<br />

comparing software and<br />

Hardware performance:<br />

Benchmarking<br />

The software application used<br />

to access and view websites is<br />

called:<br />

Web browser<br />

Computer which stores the<br />

different web pages is called<br />

Web Server<br />

Specific web page and its<br />

computer on the Web is<br />

identified by<br />

URL<br />

The extension of .com, .edu, .org,<br />

.net etc are usually called:<br />

Domain name<br />

‘.mpg’ extension refers to<br />

Animation/movie file<br />

In the e-mail address -<br />

admin@vms.org, ‘vms’ is the:<br />

Host name with noncommercial<br />

domain<br />

–––––––––––– is a virtual<br />

network of libraries of different<br />

academic institutions<br />

INFLIBNET<br />

A private network inside a<br />

company is called<br />

Intranet<br />

The maximum speed at which<br />

data can be transferred between<br />

two modes on a network is<br />

called:<br />

Bandwidth<br />

First computer<br />

programmer<br />

Ada Lovelace<br />

First search<br />

engine in the<br />

Internet<br />

Archie<br />

India’s first cyber crime police<br />

station is located in -<br />

Bangalore<br />

A device that combines data<br />

from multiple computers and<br />

load them on a common<br />

communication channel is:<br />

Multiplexer<br />

The Walkie Talkie is an<br />

example of which mode of<br />

communication<br />

Half Duplex<br />

Short cuts<br />

The key F1 opens a:<br />

Help dialog box<br />

Function button for<br />

Spelling and Grammar<br />

F7<br />

Function key used for<br />

refreshing - F5<br />

Ctrl + D shortcut is for:<br />

Open Font dialog box<br />

Keyboard operation to<br />

Underline a text in MS<br />

word - Ctrl + U<br />

Command used to reboot<br />

the computer<br />

Ctrl+Alt+Del<br />

Clipboard is:<br />

A temporary storage place<br />

for data<br />

The resolution of a computer<br />

monitor is determined by:<br />

Number of pixels on the<br />

screen<br />

The small pictures on the<br />

window desktop is called:<br />

Icons<br />

The type of test used in<br />

computing to check whether or<br />

not the user is a human:<br />

CAPTCHA<br />

When the text is printed or typed<br />

lengthwise page orientation, it<br />

is called:<br />

Landscape<br />

www.talentacademy.co.in 10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!