Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Tuesday, April 26, 2016

IT & CYBER LAW MODEL EXAM PAPERS

SET-3
Who developed the computer high level language’ JAVA ‘
Dennis Ritchie
James Gosling
Jack Kilby
Alan Turing
Answer: (b) James Gosling
James Arther gosling is a Canadian computer scientist best known as the father of Java programming language.
Dennis Ritchie developed high level programming language C at Bell Labs in 1970s.
Jack Kilby, the inventor of Integrated Circuit.
Alan Turing, the father of Computer Science.



Which of the following is a single user Operating System ?
DOS
Windows
Unix
Linux
Answer: (a)
Disk Operating System (DOS) is single user operating system developed by Microsoft.
Windows is a multi user operating system developed by Microsoft supports Graphical User Interface.
Unix (often spelled "UNIX," especially as an official trademark) is an operating system that originated at Bell Labs in 1969 as an interactive time-sharing system. Ken Thompson and Dennis Ritchie are considered the inventors of Unix.
Linux is the best known and most-used open source operating system developed by Linus Torvalds.
Mascot of Linux is ‘Tux’ Penguin.

Which is the expanded form of ENIAC?
Electrical Numerical Integrator and Calculator
Electronic Numerical Integrator and Calculator
Electrical Numerical Integrated Computer
Electronic Numeric Integrity Computer
Answer: (b)
ENIAC stands for Electronic Numerical Integrator and Calculator
ENIAC was the first electronic general-purpose computer announced in 1946.
Creation of email messages with a forged sender address is
Spoofing
Phishing
Email Bombing
None of these
Answer:  (a)
Spoofing is a cyber crime mostly used for concealing the identity of the sender impersonating another computer system.
Phishing: Fraudulent practice of sending emails purporting to be from reputed companies in order to induce individuals to reveal personnel information, such as passwords, credit card numbers online.
Email Bomb is a form of net abuse consisting of sending huge volume of e-mail to an address in an attempt to overflow the mailbox.


Who proposed the Relational Data Model?
Charles Babbage
Charles Bachmann
E.F Codd
James Gosling
Answer: c)
Edger Frank Codd was an English Computer Scientist while working for IBM invented the Relational Model for database management.
Which of the following computer language can be used to develop Artificial Intelligent Application ?
COBOL
PASCAL
JAVA
PROLOG
Answer : (d)
PROLOG ( Programming in Logic )  created by Philippe Roussel and Aldin Colmeraaver in 1972.
Compiler can be best described as _____________
Application Software
Firewall
Language Processor
Anti VIRUS
Answer : ( c)
A Language processor can be used to perform transformation of  source code ( Human readable format ) in to Object Code ( Machine Readable Format ). Assembler , Interpreter and Compiler are Language Processors.
Protocol used in sending emails.
SMTP
FTP
WAP
TCP
Answer: (a)
SMTP (Simple Mail Transfer Protocol)
Process of transforming plain text to non readable cipher text is called _______
Decryption
Phishing
Encryption
Data hiding
Answer: C
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to secret key or password that enables you to decrypt it.

Which company provides the cloud storage called One Drive?
Google
Apple
Amazon
Microsoft
Answer: (d)
Microsoft is a US based multinational software company developed by Bill Gates and Paul Allen in 1975. One Drive was previously called as Sky Drive. Cloud storage is an online storage service.

No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.