PSC Question Search

Wednesday, April 17, 2013

Computer Fundamentals and Cyberlaw for Upcoming PSC

 

JUNIOR ASSISTANT/CASHIER/ASSISTANT GRADE.II / CLERK GRADE.I / TIME KEEPER GRADE II / SENIOR ASSISTANT / ASSISTANT / JUNIOR CLERK etc.


Computer Fundamentals

Hardware and Software 

A computer system is made up from hardware and software. ie , tangible.
Hardware is the physical medium, for example:
  • circuit boards
  • processors
  • keyboard
  • mourse
Software is a collection of  computer program. ie, intangible for example:
  • an operating system ( Windows , Linux , Unix etc )
  • an editor
  • a compiler
  • ms word 
                                                  Read More >>




Sample Questions 

1. Use of the Internet or other electronic means to harass an individual, a group of individuals, or an organization.
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these

2. Which section of IT Act covers most of the common crimes arising out of “Unauthorized Access”
a) Section 66  b) Section 67 c)Section 73 d) Section 74 e) None of these

3. Section 66F of IT Act deals with 
a)Cyberstalking b) email bombing c) child pornography  d) cyber terrorism  e) DoS

4. The crime child pornography comes under 
a) Section 66F  b) Section 67B c)Section 67A d) Section 66 e) None of these

5. India's First case of cyber stalking registered at
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi

6. use of electronic messaging systems to send unsolicited bulk messages is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these

7.India's first cyber police station
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi

8.Term used for a process to verify the validity of stolen card
a) skimming b) bullying c) carding d) Phishing e) sneaking

9.First Cyber Crime Police Station of Kerala state started functioning at
a) Kannur b) Thiruvananthapuram c) Kozhikode d) Malappuram e) Kochi

10.Act of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity is 
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these

No comments:

Post a Comment