IT and Cyberlaw (Part-13)

UPSC, PSC, BANK, RAILWAY,etc. Examination Questions

PSC Question and Answer about IT and Cyberlaw(Part-13) including for Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. We will update balance portion of the study material.....

Session-1(1-50 Q&A)


Question1:-Who was developed by URL



Tim Berners Lee in 1994


Question2:-Which device is used to forwards data packets between computer and networks



Switch or Router


Question3:-Which protocol transtor is used to interconnect two different networks such as LAN and WAN



Gate way


Question4:-In a network which computer acting as a gateway



Server computer


Question5:-Which device is used to connect two similar network



Bridge


Question6:-Which server act as an intermediary between client and web server ?



Proxy Server


Question7:-Which device is used to boost the signal



Repeater


Question8:-Spam mail is also known as ?



Junk mail or Grey mail


Question9:- Short cut key of right justify



Ctrl+J


Question10:-Workbook is callection of ___________ in excell or calc



work sheet


Question11:-which tab is used to move between sheet in excell



Sheettab


Question12:-Macros are available in Excell 2016 under which tab



View


Question13:-Which program, installed on the user’s computer help him to communicate or send request on the network?



Browser


Question14:-A collection of unprocessed item is called as ________?



data


Question15:-Which decice is used to direct and despatch data packets between different network?



Router


Question16:-How many function keys have a keyboard ?



12


Question17:-How many enter keys have a keyboard ?



Two


Question18:-How many control keys have a keyboard ?



Two


Question19:-How many alt keys have a keyboard ?



Two


Question20:-Which is the longest key in the keyboard ?



Space Bar


Question21:-In cryptography, what is cipher?



algorithm for performing encryption and decryption


Question22:-What does error 404 or Not Found error while accessing a URL mean?



The server could not find the requested URL


Question23:-Which type of system can learn and adjust to new circumstances by themselves?



Neural Network


Question24:-The first electronic digital computer contained _________?



Electronic Valves


Question25:-What is the blinking symbol on the screen that shows where the next character will appear?



cursor


Question26:-Track ball is a ____________ device ?



Pointing device


Question27:-Cartridge term related with ____________?



Printer


Question28:- MAC address is commonly used for



Networking


Question29:-In 2014, Apple decided to invent a programming language. What is the name of that programming language?



Swift


Question30: In MS Word spelling check is a feature available in which tab?



Review tab


Question31:-What is MAC address ?



Media access control address


Question32:BIOS statnds for ?



Basic Input Output System


Question33:-Who is the inventor of Tabulating Machine?



Herman Hollerith


Question34:-_____ is an essential program which makes it easy to use a computer for end-user.



Operating System


Question35:-



O(n)


Question36:- Which disk is used to cold boot a PC?



System Disk


Question37:-What is the smallest and largest font size available in Font Size tool of MS World on formatting toolbar?



8 and 72


Question38:- A character that is raised and smaller above the baseline is known as _______________.



SuperScript


Question39:-Which bar is usually located below that Title Bar that provides categorised options?



Menu Bar


Question40:-What is the use of Telnet?



Remote login


Question41:-What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?



cmos


Question42:- __________ is a machine independent language?



High level language


Question43:-Which term is used for: Unauthorized copying of software to be used for personal gain?



Software Piracy


Question44:-Which of the following is a term for the process of trading goods over the Internet?



E-Commerce


Question45:-What is a named area on a disk that is used to store related subfolders and files called?



Folder


Question46:-The two ways to arrange multiple windows on the desktop are:



cascade and tile


Question47:- Which image formats was developed for CompuServe?



GIF


Question48:-Bridge is a _________ device.



Layar 2


Question49:-Which of the following cable types is called cheapernet?



Thinnet,the installation cost of thinnet coaxial cable is less, it is also known as cheapernet.


Question50:-The __________ menu contains the options to add symbols in a Word document.



Insert


Session-II(51-100 Q&A)


Question51:-The __________ shows a brief description and, optionally, keyboard shortcuts of commands of dialog box launchers.



ScreenTip, is a small window that appears when the pointer is rolled over a command or control.


Question52:-You can select which of the format to save a document in a previous Word version?



word 97-2003 format


Question53:-A Bug can be called an error which generally comes in a software or a hardware. Which among the following is another name that may refer to bugs in computers?



Glitch


Question54:-Which equipment displays the work done by a computer?



Monitor


Question55:-What is the function of the AutoCorrect feature across all MS Office applications?



Replacing misspelled words with the correct ones while typing


Question56:-A cell range in Excel is represented by using which sign?



colon


Question57:-FORTRAN is a programming language. It is more suitable for _______.



Scientific


Question58:-A function inside another function is called a _______ function.



Nested


Question59:-Who invented the QWERTY keyboard?



Christopher Latham Sholes


Question60:-Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?



Cold booting

Cold booting or Hard booting:- Reboots the system when the power to the system is physically turned off

Warm booting or Soft booting :-The system restarts without the need to interrupt the power.



Question61:- ________ is a protocol-based communication system between a server and its clients.



Web socket


Question62:- Who invented the QWERTY keyboard?



Christopher Latham Sholes invented the keyboard in 1868.


Question63:- What is Windows Vista?



Operating System


Question64:-What is a spooler?



Spooler is a program in computing that is used to line up print jobs by storing them in the buffer for a short time and allows the printer to print at the time when it is use.


Question65:- Which device that is used for identifying people by their unique characteristics?



Biometric


Question66:-WORM stands for?



Write once, Read Many


Question67:-In MS Word, __________ is a predefined decorative text that you can add to a document.



Word Art


Question68:-In Excel, a new workbook contains __________ worksheets by default.



Three


Question69:-In a Windows-based application, when you click the Maximize button, it changes to the



Restore down button


Question70:- How long is an IPv6 address?



128 bits


Question71:-What does P2P stands for?



peer to peer


Question72:-How many rows are there in latest version of MS Excel?



1,048,576 rows and 16,384 columns.


Question73:- What is Direct X?



Software that drives graphics hardware to enable game and multimedia to your system


Question74:- Which type of device is used by banking websites to enter the password and prevent keystroke legging?



Virtual keyboard or floating keyboard


Question75:- A browser extension is a _____________ that extends the functionality of a web browser.



plug-in


Question76:-Which key should you use to indent the first paragraph of your document?



Tab key


Question77:-Changing desktop wallpaper is a simple task which can be accessed through ________ section of all control panel items.



Personalise


Question78:- Assembly languageS are ______________?



low level language


Question79:-Which operating system is defined as self-contained in device and resident in ROM?



Embeded operatiing system


Question80:- ________ allows you to access your e-mail from anywhere.



Webmail interface


Question81:-Which options is used to display information such as title, page number of the document?



Header and footer


Question82:- What type of monitoring file is commonly used on and accepted from Internet sites?



Cookies

Cookies are small files which are stored on a user's computer.



Question83:-Q7. In a database, a column in the table is also called _____.



attribute


Question84:-An image that is displayed on the monitor includes thousands of small coloured dots known as ___________.



pixels


Question85:- On which of the following models does the working of Bluetooth devices depend?



Master/Slave


Question86:- Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?



Full duplex


Question87:-Which memory directly associated with processor ?



Cache Memory


Question88:-Walkie-talkie is an example of which of the following?



Half-duplex communication


Question89:- In which types of network are all the computers considered equal?



Peer to peer


Question90:- __________ means that the data contained in a database is accurate, consistent and reliable.



Data integrity


Question91:-What is the maximum font size you can apply for any character?



1638


Question92:-The feature in database language that allows us to access certain records in database is called __________.



Query


Question93:-The __________ operation performs a set union of two similarly structured tables.



Union


Question94:-The first electro-mechanical computer MARK-1 invented was by ______. ?



Howard Aiken


Question95:-What was the first electronic computer in the world?



ENIAC


Question96:- ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.



web beacon

Is a analytical tool for email tracking , web tracking etc.



Question97:- ________key is the example of Toggle key.



Caps lock or Num lock or isert key

Toggle key have a ON or OFF fucntion



Question98:What is the IEEE Standard for Wireless LAN?



802.11 – Wireless LAN

802.3 - Ethernet

802.14 - Cable modems

802.15 - Wireless PAN

802.4 - Token bus



Question99:-The first Computer Virus is:



CREEPER


Question100:-What does DDoS stand for?



Distributed Denial-of-Service