Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Friday, June 7, 2013

Sec Asst Grade IT Model Questions

Sec Asst IT Questions
1. The digital security system that uses some unique characteristic of human biology to identify authorized users:
(A) Biometrics (B) PIN Number (C)Encryption (D)Password

2. ‘Do no evil ‘ is the tag line of 
(a) Yahoo b) IBM c) Wipro d) Google

3. The concept of ‘stored program computer’ is first proposed by 
(a) John Von Neumann (b) Charles babage (c) Lady Ada (d) George Bool

4.PDF is the acronym for 
(a) Personal digital assistant form (b) Personal digital file (c) Portable document Format (d) Portable digital file

5. An artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment. 
(A) Virtual Reality (B)Digital Reality (C)Dream (D)Artificial Reality

6. The process of loading O/S from the secondary storage on to RAM is known as ----------------- 
a) Loading b) Booting c) Linking d) Compiling

7. Which device is used for reading DD/Cheque number in bank 
(a) OCR (b) OMR (c) MICR (d) OBR

8.Which is volatile memory 
(a) PEN DRIVE (b) DVD (c) ROM (d) RAM

9.Super computer of India unveiled on 8 February 2013 
(a) PARAM 10000 (b) Prithivi (c) PARAM Yuva II (d) Cray - II

10. Which of the following is a cyber crime? 
a)Hacking b)Worm attack c)spamming d)All of these

11.In cyber law terminology ‘DoS’ means: 
a)Denial of Service b)Disk operating System c)Distant operator Service d)None of these

12. By hacking web server taking control on another persons website is called 
a)Spoofing b)Hijacking c)Spamming d) Hosting

13. The Indian Parliament passed the Information Technology Bill, which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format, in the year: 
(a)2000 b)2001 c)2002 d)2003

14. .......... Is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort of another under remote direction. 
a)Server b)Zombie c)Symbian d)None of

E& OE
More Questions available at www.psctrainer.com 

No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.