Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Sunday, April 17, 2016

IT & Cyberlaw : Previous Questions Analysis



1. Who coined the term ‘Computer Virus’?
a) Frederick Cohen

b) William Gibson

c) John Von Neumann

d) Charles Babbage

Answer: ( a)

· Frederick Cohen is an American Computer Scientist and best known as inventor of computer virus defense techniques.

· The term VIRUS stands for Vital Information Resource Under Siege.

· A computer virus is a malware that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.

· William Gibson coined the term ‘ Cyber Space’ in his novel ‘ Neuromancer ‘ published in 1984.

· John Von Neumann formulated the ‘ Stored program concept ‘.

· Charles Babbage, the Father of Computer who invented Analytical Engine and Difference Engine



2. Operating system is a type of
a) Application software

b) Utility software

c) System software

d) None of these

Answer: (c)

· Operating System is System Software.

· Operating system acts as an interface between user and hardware.

· System software is a type of computer program that is designed to run a computer’s hardware and application program.



3. What is the expansion of the term ASCII ?
a) American security code for information Interchange

b) American scientific code for information Interchange

c) American Standard Code for Interchange information

d) American Standard Code for Information Interchange

Answer: (d)

· ASCII Stands for American Standard Code for Information Interchange.

· ASCII is a character-encoding scheme used in a Computer.

· ASCII uses 7 bits or 8 bits to represent character.

· ASCII-7 can represent 128 characters and ASCII-8 can represent 256 characters.



4. Attempt to acquire sensitive information such as passwords and credit card details by masquerading as a trustworthy entity.

a) Phishing

b) Spoofing

c) Hacking

d) None of these

Answer: (a)

· Phishing is an attempt to acquire sensitive information such as passwords and credit card details by masquerading as a trustworthy entity.

· Phishing is a cybercrime carried out by email spoofing.

· Spoofing is a cyber crime mostly used for concealing the identity of the sender impersonating another computer system.

· Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.

· The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.



5. Process of ‘knowledge discovery in databases' is
a) Data tuning

b) Data Diddling

c) Data Fragmentation

d) Data Mining



Answer: (d)

· Data mining is the extraction of patterns and knowledge from large amount of data.

· Database Tuning is the activity of making a database application run more quickly.

· Changing data before or during entry in to computer system is called Data Diddling

· Data Fragmentation means in some operating system's file systems, a data file over a certain size is stored in several fragments rather than in a single contiguous sequence of bits in one place on the storage medium.


No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.