Information Technology and Cybr law

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC, PSC, BANK, RAILWAY,etc. Examination Questions

Questions about Information Technology including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-Damaging or destroying data rather than stealing or misusing them



Cyber vandalism


Question2:- theft of internet surfing time , an unathorized person use the internet time without permission of the victim



Internet time theft


Question3:-The First personal computer………..



The Altair 8800


Question4:-The first indigenously developed computer in India



ISIJU


Question5:-India’s first 4G service provider



Bharati airtel


Question6:-The first 3G introduced in kerala



Kozhikode


Question7:-The first IT university in India



JP university


Question8:- The first world wide web information service in India launched on



January 14 1995


Question9:-The first internet movie



Heart beat


Question10:-The first computer graphics use movie



Tron


Question11:-The first net work that planted the seed of internet



ARPANET


Question12:-The first film which used morphing



Willow


Question13:-The first E-paper



The Thejith


Question14:-The first microprocessor



Intel 4004


Question15:-The first internet news paper



Financial express


Question16:-The first e-news paper



New paper today


Question17:-The first electronic digital programmable computer



Colossus Mark-2


Question18:-The first humanoid robot



ASIMO


Question19:-The first palmtop computer



Newton


Question20:-The first complete computer



Apple 2


Question21:-The first real time computer



Whirlwind


Question22:-The first super computer installed in India



Cray X MP -14


Question23:-The first super computer



Cray 1


Question24:-The fist portable computer



Osborne 1


Question25:-The first mini computer



PDP-8


Question26:-First ARPA net virus



Creeper


Question27:-The first Personal computer virus



Brain


Question28:-The First computer virus



Apple /Elk cloner


Question29:-The first real mechanical calculating machine



Pascaline


Question30:- The first computer magazine



Computers and Automation


Question31:-The first computer magazine Published on



published by Edmund Berkley in 1950


Question32:-The first Industrial IT network in India



Indho.net


Question33:- Inida’s First private internet service provider



Styam Info way ltd


Question34:-The firs computer animated news reader



Ananova -Russia


Question35:-The first digital computer



Mark-1


Question36:-Inida’s First private internet service provider



Styam Info way ltd


Question38:-The first electronic digital computer



ABC


Question39:-The first computer installed in India



HEC-2M in Kolkata in 1955


Question40:-The first laser printer was introduced by



IBM


Question41:-The hackers are good , who focus on securing IT system



White hacker / Ethical hacker


Question42:-The firs computer programmer



Lady Ada Lovelace


Question43:-The first home based computer



LISA


Question44:-The first GUI based computer



LISA


Question45:-The first Elector Mechanical computer



Mark-1


Question46:-The first commercial purpose computer .



UNIVAC


Question47:-The first genral purpose computer



UNIVAC


Question48:-The first electronic general purpose computer



ENIAC


Question49:-The first electronic computer



ENIAC


Question50:- The First personal computer………..



The Altair 8800


Question51:-____________ is a programme for high school girls in India lauched by Which IT company Microsoft



Digi Girlz


Question52:-_________is a term used to denote second generation of internet. User can post their opinions in website and modify the content in it.



Web 2.0


Question53:-Penalty amount of Tampering with computer source documents in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹200,000


Question54:- Penalty amount of Hacking with computer system in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹500,000


Question55:- Penalty amount of Receiving stolen computer or communication device in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹100,000


Question56:-Penalty amount of Using password of another person in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹100,000


Question57:- Penalty amount of Cheating using computer resource in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹100,000


Question58:- Penalty amount of Publishing private images of others in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹200,000


Question59:- Penalty of Acts of cyberterrorism in IT act 2000



Imprisonment up to life.


Question60:- Penalty amount of Publishing information which is obscene in electronic form in IT act 2000



Imprisonment up to five years, or/and with fine up to ₹1,000,000


Question61:-Penalty amount of Publishing images containing sexual acts in IT act 2000



Imprisonment up to seven years, or/and with fine up to ₹1,000,000


Question62:- Penalty amount of Publishing child porn or predating children online in IT act 2000



Imprisonment up to five years, or/and with fine up to ₹1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to ₹1,000,000 on second conviction.


Question63:- Penalty amount of Failure to maintain records in IT act 2000



Imprisonment up to three years, or/and with fine.


Question64:- Penalty amount of Failure/refusal to comply with orders in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹200,000


Question65:- Penalty amount of Failure/refusal to decrypt data in IT act 2000



Imprisonment up to seven years and possible fine


Question66:- Penalty amount of Securing access or attempting to secure access to a protected system in IT act 2000



Imprisonment up to ten years, or/and with fine


Question67:- Penalty amount of Misrepresentation in IT act 2000



Imprisonment up to three years, or/and with fine up to ₹100,000


Question68:-Penalty of Publishing offensive, false or threatening information in IT act 2000



Imprisonment up to three years, with fine.


Question69:-The first cyber post office in India



Chennai


Question70:-The application proxy server for users who were allowed to access the external services, is called as_____



Gatekeeper


Question71:- The internal mail server, this machine was not accesible from the out side, is called as __________



Mail gate


Question72:-When an orgnaization is connected to internet without firewall is called as_____



Zone of risk


Question73:- One device can monitor and protect the network from out side attack, is called as_____



Firewall


Question74:- _________ is a device with set of rules to permit or deny network by aunauthorized services



Firewall


Question75:- _________ device filter incoming and out going traffic of internet



firewall


Question76:-All internet traffic in the network is of the _________ form



packet


Question77:- In the network one dvice or software filter all packets, this device is called as______



Firewall


Question78:-what is IDS



Intrusion Detection System


Question79:-What is IPS



Intrusion prevention system


Question80:- IP blocking devices:



Firewall, router, Configuring switches


Question81:- _______ is a trap to detect, defect or in some manner counteract attempts at unauthorized use of information system



Honeypot


Question82:- What is ICMP



Internet Control Message Protocol


Question83:- What is NMAP



Net work scanning tool (software)


Question84:- What is Ethereal



A network packet / protocol analyser (software).


Question85:- What is Nessus



Vulenrability scanning software


Question86:- _________ is the translation of information into a codded form.



Cryptography


Question87:- In cryptography, information is called as _____



Plain text


Question88:- In cryptography, codded text is called as _____



cypertext


Question89:- ___________ is mostly used to protect the privacy of information



Cryptography


Question90:-The word cryptography has been taken from ___________



Greek word ('Krypto' means hidden and 'Graphen' means write)


Question91:-DSA



Digital Signature algorithms


Question92:- _______ function creates a fixed lenght string from a block of data



Hash


Question93:- _________ system is an implementation of an encryption scheme or algoritham



Cryptos system


Question94:-How many keys is cryptosystem



Two (public and private key)


Question95:- __________ device funcationing based on crypto system



Digital signature


Question96:-Secret key algoritham



symmetric


Question97:- Data encryption standared (DES)



symmetric


Question98:-Public key algoritham



Assymmetric


Question99:-RSA algoritham is an



Assymmetric


Question100:- _______ means a private key and its mathematical related to public key.



Key pair