May 2018 Vijayarekha
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
1 st <strong>May</strong> <strong>2018</strong><br />
TALENT<br />
A C A D E M Y<br />
VIJAYAREKHA Volume VI Issue No. 04 PSC a’c- ]- c- o£mamknI<br />
PSC Previous Questions - Information Technology<br />
(2010apX¬<strong>2018</strong>hscb- p≈P.S.C. Degree Level ]co£- I- f- nse<br />
IT hǹmK- Ø- n¬\n∂p≈tNmtZymØ- c- ß- ƒ)<br />
International Computer<br />
Security Day : November, 30 th<br />
World Computer Literacy Day<br />
December 2 nd<br />
The Indian Computer<br />
Emergency Response Team<br />
serves as<br />
The National Agency for<br />
incident response<br />
A program that has capability<br />
to infect other programs and<br />
make copies of itself and spread<br />
into other programs is called<br />
Virus<br />
Malware program that<br />
replicates itself in order to<br />
spread to other computers<br />
Computer worm<br />
The first computer virus<br />
Creeper virus<br />
In 1983, who defined the term<br />
‘Computer Virus’<br />
Fred Cohen<br />
Software that aims to gather<br />
information about a person or<br />
organization without their<br />
knowledge, that may send such<br />
information to another entity<br />
without the consumer’s<br />
consent, or that asserts control<br />
over a device without the<br />
consumer’s knowledge<br />
Spyware<br />
Unwanted bulk messaging<br />
into email in box is known<br />
as: Spamming<br />
Spim is: Unwanted instant<br />
messages<br />
To process data, computers use<br />
Machine Language<br />
A computer program that is<br />
used to convert an assembly<br />
language to machine language<br />
is: Assembler<br />
The symbols used in an<br />
assembly language are<br />
Mnemonics<br />
A computer program that<br />
converts an entire program into<br />
machine language is called an:<br />
Compiler<br />
The translator program that<br />
translates each line of the<br />
source program as it runs is<br />
called: Interpreter<br />
Inventor of high level<br />
programming language C<br />
Dennis M. Ritchie<br />
Programmed Instruction to the<br />
computer is known as:<br />
Code<br />
Computer language which is<br />
used for artificial intelligence<br />
PROLOG<br />
The process of finding and<br />
correcting the logical errors in a<br />
computer program is called:<br />
Debugging<br />
An error in software or hardware<br />
is called is a bug. The alternative<br />
computer jargon for it is<br />
Glitch<br />
PROTOCOLS<br />
Protocol which is used for<br />
secure communication over<br />
internet - HTTPS<br />
Protocol which is used for e-<br />
mail transmission across<br />
internet - SMTP<br />
The protocol used for<br />
retrieving email from a mail<br />
server is - POP<br />
Set of protocols developed to<br />
provide transmission and<br />
addressing for internet:<br />
TCP/IP<br />
The means by which all<br />
computers connected to the<br />
internet identify each other is<br />
IP address<br />
Hardware device used to<br />
interconnect different types of<br />
networks with different<br />
protocols<br />
Gateway<br />
In a client/server computer<br />
network, the users’ computer is<br />
usually called:<br />
Client<br />
The practice and study of<br />
techniques for secure data<br />
communication in the presence<br />
of third parties:<br />
Cryptography<br />
The inventor of<br />
world wide web<br />
Tim Berner’s<br />
Lee<br />
Tim Berner’s Lee<br />
Father of free software<br />
foundation<br />
Richard Stallman<br />
Founders of Whatsapp<br />
Brian Acton and Jan Koum<br />
OPERATING SYSTEM<br />
The set of programs which acts as an interface between user and<br />
computer - Operating system<br />
The process of loading the operating system files into dynamic<br />
random access memory - Booting<br />
Technology used in the processor of a computer to simulates a<br />
single processor into two virtual processors to the operating system<br />
- Hyper threading technology<br />
The first fully supported 64 -bit operating system - Linux<br />
Operating system is - System software<br />
Gnu Privacy Guard (GPG) is:<br />
A cryptographic software<br />
which provides for keybased<br />
asymmetric cryptography for<br />
encryption and authentication<br />
A measurement used in<br />
comparing software and<br />
Hardware performance:<br />
Benchmarking<br />
The software application used<br />
to access and view websites is<br />
called:<br />
Web browser<br />
Computer which stores the<br />
different web pages is called<br />
Web Server<br />
Specific web page and its<br />
computer on the Web is<br />
identified by<br />
URL<br />
The extension of .com, .edu, .org,<br />
.net etc are usually called:<br />
Domain name<br />
‘.mpg’ extension refers to<br />
Animation/movie file<br />
In the e-mail address -<br />
admin@vms.org, ‘vms’ is the:<br />
Host name with noncommercial<br />
domain<br />
–––––––––––– is a virtual<br />
network of libraries of different<br />
academic institutions<br />
INFLIBNET<br />
A private network inside a<br />
company is called<br />
Intranet<br />
The maximum speed at which<br />
data can be transferred between<br />
two modes on a network is<br />
called:<br />
Bandwidth<br />
First computer<br />
programmer<br />
Ada Lovelace<br />
First search<br />
engine in the<br />
Internet<br />
Archie<br />
India’s first cyber crime police<br />
station is located in -<br />
Bangalore<br />
A device that combines data<br />
from multiple computers and<br />
load them on a common<br />
communication channel is:<br />
Multiplexer<br />
The Walkie Talkie is an<br />
example of which mode of<br />
communication<br />
Half Duplex<br />
Short cuts<br />
The key F1 opens a:<br />
Help dialog box<br />
Function button for<br />
Spelling and Grammar<br />
F7<br />
Function key used for<br />
refreshing - F5<br />
Ctrl + D shortcut is for:<br />
Open Font dialog box<br />
Keyboard operation to<br />
Underline a text in MS<br />
word - Ctrl + U<br />
Command used to reboot<br />
the computer<br />
Ctrl+Alt+Del<br />
Clipboard is:<br />
A temporary storage place<br />
for data<br />
The resolution of a computer<br />
monitor is determined by:<br />
Number of pixels on the<br />
screen<br />
The small pictures on the<br />
window desktop is called:<br />
Icons<br />
The type of test used in<br />
computing to check whether or<br />
not the user is a human:<br />
CAPTCHA<br />
When the text is printed or typed<br />
lengthwise page orientation, it<br />
is called:<br />
Landscape<br />
www.talentacademy.co.in 10