Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Wednesday, May 4, 2016

IT & Cyberlaw : PSC Previous Question Paper Solved

Assistant Grade II (Beverages) Held on 25 /07/2015


1.     Ice cream sandwich and Jelly bean are the latest versions of which OS ?
a)     Ubuntu
b)     Android
c)     Apple
d)    Unix
Answer: ( b )
Android

2.     Email that appears to have been originated from one source when it was actually sent from another source is referred to as
a)     Email spoofing
b)     Email Bombing
c)     Email Spamming
d)    None of these
Answer: ( a )
Email Spoofing

3.     When did Information Technology Act come in to force in India
a)     Oct 17th 2000
b)     Oct 17th 2001
c)     June 4th 2000
d)    June 4th 2001
Answer: ( a )
Oct 17th 2000

4.     Data Diddling involves
a)     Destroying data before input to the computer.
b)     Unauthorized copying of data
c)     Changing data in to information
d)    Changing data prior or during input to the computer
Answer: (d )

5.     Which hardware device is used to interconnect different types of networks with different protocol?
a)     Bridge
b)     Router
c)     Gateway
d)    Repeater
Answer: ( c )
Gateway

6.     A Collection of four bits is called
a)     Nibble
b)     Byte
c)     Word
d)    Double word
Answer: (a )
Nibble

7.     The walkie Talkie is an example of which mode of communication?
a)     Simplex
b)     Half Duplex
c)     Duplex
d)    None of these
Answer: ( b )
Half Duplex
8.     A device that combines data from multiple computers and load them on a common communication channel
a)     Modem
b)     Repeater
c)     Multiplexer
d)    Encoder
Answer: ( c )
Multiplexer

9.     In the email address admin@vms.org, “ , “vms “  is the :
a)     Host name with commercial domain
b)     Host name with non-commercial domain
c)     Client name with educational domain
d)    Client name with government domain
Answer: ( b )

10.  ______ is the modification of software to remove or disable features which are undesirable by a person
a)     Software Hacking
b)     Software Licensing
c)     Software Piracy
d)    Software Cracking
Answer: ( d )
Software Cracking



No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.