Information Technology and Cybr law

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC/PSC/BANK/RAILWAY,etc. examination questions

Questions about Information Technology including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-IT ACT 2000 was approved by the union cabinet on



2000 May 13


Question2:- IT Act 2000 was passed by the parliament on



2000 june 9


Question3:-IT Act get notified for effectiveness on



2000 October 17


Question4:-How many chaparters and sections in IT Act 2000



13 chapter and 94 Sections


Question5:-ITA 2008 passed by Rajyasbha on



2008 December 24


Question6:- ITA 2008 was accented by president on



2009 February 5


Question7:- ITA 2008 get notified for effectiveness on



2009 October 27


Question8:- How many chapters and sections in ITA 2008



14 chapters and 124 sections


Question9:-3.Authentication of electronic records comes under ____________of IT Act 2000



Chapter II section 3


Question10:- Electroninc Signature or Digital signaure comes under _______ of IT Act 2000



Chapter II section 3A


Question11:-Leadgal recognition of Electronic Signature comes under __________ on IT Act 2000



Chapter III Section 5


Question12:-Leadgal recognition of Electronic records comes under __________ on IT Act 2000



Chapter III Section 4


Question13:- e-gonverns comes under __________ on IT Act 2000



Chapter III


Question14:-use of electronic recodes comes under __________ on IT Act 2000



Chapter III Section 6


Question15:-secure of electronic records comes under __________ on IT Act 2000



Chapter V Section 14


Question16:- secure of electronic signaure comes under __________ on IT Act 2000



Chapter V Section 15


Question17:-Licence to issue electronic signature Certificates comes under __________ on IT Act 2000



Chapter VI Section 21


Question18:-Access to computers and data comes under __________ on IT Act 2000



Chapter VI Section 29


Question19:-Certifying authority to issue electronic signature Certificate comes under __________ on IT Act 2000



Chapter VII Section 35


Question20:-Acceptance of Digital Signature Certificate comes under __________ on IT Act 2000



Chapter VIII Section 41


Question21:-Penalty and compensation for damage to computer, computer comes under __________ on IT Act 2000



Chapter IX Section 43


Question22:- Compensation for failure to protect data comes under __________ on IT Act 2000



Chapter IX Section 43A


Question23:-Appeal to High Court comes under __________ on IT Act 2000.



Chapter X Section 62


Question24:- Recovery of penalty or compensation comes under __________ on IT Act 2000.



Chapter X Section 64


Question25:-Tampering with computer source documents comes under __________ on IT Act 2000.



Chapter XI Section 65


Question26:-Punishment for sending offensive messages through comes under __________ on IT Act 2000.



Chapter XI Section 66A


Question27:- Punishment for identity theft comes under __________ on IT Act 2000.



Chapter XI Section 66C


Question28:- Power to investigate offences comes under __________ on IT Act 2000.



Chapter XI Section 78


Question29:- Power of police officer and other officers to enter, search comes under __________ on IT Act 2000.



Chapter XIII Section 80


Question30:-National Internet Security day



February 6


Question31:- National computer Literacy day



December 2


Question32:- National Internet Safety Day



November 30


Question33:- The first cyber crime police station in India was setup at _____



Bangluru


Question34:- The first cyber crime police station in Kerala was setup at __________



Pattom, Thriuvananthapurma


Question35:- The first cyber crime police station in Kerala was setup on __________



on July 1,2009


Question36:- High tech crime enquiry cell established in kerala at ______



plice Headquarter Tvm


Question38:-High tech crime enquiry cell established in kerala on _________



on 5th may 2006.


Question39:-Uuathorized person access to a computer either directly or through a network.



Hacker


Question40:-The hackers are good , who focus on securing IT system



White hat hacker or Ethhical hackers


Question41:- Hacking for leagal or testing purpose



White hat hacker or Ethhical hackers


Question42:- Bad purpose hacker is called as



Black hat hacker


Question43:-some hackers are Testing and provide securing code for preventing the attack



White hat hacker or Ethhical hackers


Question44:- unauthorized hackers are called as_________



Black hat hacker


Question45:-som hacker access the data and destroy the data or system



Black hat hacker


Question46:- A combination of black and white hat hacker.



Grey hat hacker


Question47:-Hackers are does not hack for personal gain but they can access the system without permission which is illegal.



Grey hat hacker


Question48:- Some hackers are expert in creating duplicate website which is difficult to differentiate. They catch the information like password, account name etc. through this website. Normally this type of hacking found in bank web site, e-commercial site. This is known as ____________



Phishers


Question49:-Phisher creates a cloned email, he manages to get a previously delivered email of other person and then send the same email with links or attachments replaced by malicious ones.



Clone phishing


Question50:-the email appears to be from the original sender but it is a fake e-mail



Address spoofing


Question51:-Spear phishing is known as_________



Whaling


Question52:- One attack blocking a website or internet service



Denial of Service Attack


Question53:-The cyber attackers send bulk of requests is not affordable to the webserver, then the web server fail to response. This attack is called as_________



Denial of Service Attack


Question54:- A financial cyber crime conducted in Bank is called as_________



Salami Attack


Question55:-The cyber attackers are altering of the data or information is called as_________



Data Didling


Question56:-Some one Spreading false messages about a person or a company through e-mail, mobile



Cyber defamation


Question57:-Hacker's attack manly target to Government web sites and other infrastructure, gvt policy sites. this type of attacke is called as _________



Cyber Terrorism


Question58:- Cyber Terrorism is also known as _________



Cyber War


Question59:-Spreading sexual pictures, videos of children through internet, especially children.



Cyber pornography


Question60:-Hacker Making identical domain name and attracting customers to duplicate domain.



Cyber Squatting


Question61:-Sending bulk mail to server and break the capacity of the email server.



E-mail bombing


Question62:-Some one steals another person’s information with out their knowledge.



Identity theft


Question63:-unwanted mails are filtered by the email provider and sent to a separate folder called ___________



Spam mail


Question64:- Spam mail is also called as _______



Junk mail .


Question65:-Copying files from one computer to another by using any media



Data theft


Question66:-Some E-mails are hide the original sender’s address:



E-mail spoofing


Question67:-Email that appears to have been originated form one source when it was actually sent from another source



E-mail spoofing


Question68:-harassing an individual or group of a individul by using internet especially women, is called as_________



E-mail spoofing


Question69:-Creating fake currencies, stamps, marklists, certificate, etc . with help of IT infrastructure



Cyber forgery


Question70:-________ is a program that can replicate itself and can make harmful to the other computer programs.



Virus


Question71:-_______ need minimum One attachment to spread



Virus


Question72:- someone forcefully takes the control of a website. Then they can change content of the web site:



Web Jacking


Question73:-A computer connected to the internet that has been compromised by a hacker , virus or trojan horse to perform malicious task under remote direction, this type of attack is called as_________



Zombie


Question74:-Releasing or spreading of virus is called as_________



Virus dissemination


Question75:-Illegal copying of genuine programs.



Software piracy


Question76:-An error in software or hardware is called a ______



bug


Question77:- bugs often correct itself, and is therefore difficult to troubleshoot is called as_________



Glitch


Question78:-Superconducting Quantum Interference Device



Squid


Question79:-______ Is the process of inserting information bits into data to break up bit patterns to affect the synchronous.



Bit stuffing


Question80:-IT Act 2008 passed by Lokah Sabha on



2008 December 23


Question81:-Accessing RAM without interfering with the CPU. Clever exploitation of CPU:



Cycle Stealing


Question82:-what is CARD



Computer aided administration of Registraton Department, It Is a Adhra Pradesh Government e-governance project


Question83:-What is ERP



(Enterprise Resource Planning ) (ERP).Is a business management software typically suite for all application or functions in the company. It include salary, marketing, store, production, HRM,etc…


Question84:-Dishonestly withholding assets for the purpose of conversion of such assests, by one or more pesons to who the assets were entrusted either to be held or to be used for specific purpose



Embezzlement


Question85:-_______ is a software application which creates a virtual machine version of a mobile device, computer etc,



Simulator


Question86:- Simulatior is also konwn as_________



emulator


Question87:-Rearranges the file on your harddisk so that had disk space is increased and become more faster:



Disk defragmenter


Question88:-Floppy disk are organized by _______



Track


Question89:-Father of B



Ken Thompson and Dennis M Rithce


Question90:-father of google



larry page, sergey Brin


Question91:-google headquarters



mountain view , california,united states


Question92:-founder of twitter



Jack Dorsey, Noah Glass, Evan Williams, Biz Stone


Question93:-founder of WhatsApp



Jan Koum, Brian Acton


Question94:-founder of Facebook



Mark Zuckerberg


Question95:-father of gamil



Paul Buchheit


Question96:-father of email



Raymond Samuel Ray Tomlinson


Question97:-first email was send by _________



Raymond Samuel "Ray" Tomlinson in 1971


Question98:-First messeage was like_____________



"QWERTYUIOP"


Question99:-father of hotmail



Sabeer Bhatia


Question100:-father of yahoo



Jerry Yang David Filo