Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Sunday, March 29, 2015

IT and Cyber Law : Previous Question Paper Discussion

SOLVED PAPER OF ASSISTANT GRADE II (KERALA STATE HOUSING BOARD) EXAM HELD ON 28-07-2012 (QUESTION PAPER CODE 118/2012).
1. The digital security system that uses some unique characteristic of human biology to identify authorised users?
Biometrics.
2. An artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment?
Virtual reality.
3. Unwanted bulk messaging into email inbox is known as?
Spamming.
4. The practice and study of technique for secure data communication in the presence of third parties?
Cryptography.
5. The process of discovering new patterns from large data sets?
Data mining.
6. The part of a computer which is equivalent to human brain?
Central processing unit.
7. Which of the following is not a search engine?
A. Tally
B. Google
C. Altavista
D. Bing
Ans: Tally.
8. Find the binary equivalent of decimal number 31.
11111.
9. The set of programs which acts as an interface between user and computer?
Operating system.
10. The device that allows a single communication channel to carry simultaneously data transmitted from many terminals?
Multiplexer

Pharmacist Grade II : PSC Notification : 2015

Gazette Date: 12/03/2015
Last Date: 16/04/2015
Category No: 11/2015
Applications are invited online only by `One Time Registration' system exclusively from qualified candidates for the under mentioned post. Candidates shall apply only through the online facility provided in the website of Kerala Public Service Commission.

1. Department : Health
2. Name of post : Pharmacist Gr-II
3. Scale of pay : 11620-20240/-
4. Number of vacancies : District wise
Wayanad – 1 (One)
Malappuram – 2 (Two)
Thrissur – 2 (Two)
Kannur – 1 (One)

Anticipated Vacancies in the below districts.
Thiruvananthapuram , Kollam , Pathanamthitta , Alappuzha , Kottayam , Idukki , Ernakulam  , Palakkad , Kozhikode , Kasaragod 

Thursday, March 26, 2015

Sec 66A of IT Act is no more : Cyber Law


Please go through this post , one possible question for Sec Asst Exam 2015.



PSC Exam Cotrespondence material from the Pioneer, Direction Calicut


Wednesday, March 25, 2015

Saturday, March 14, 2015

Direction Secretariat Asst 2015 : Correspondence Course



From the Publisher of ' Arivinte Pedakam ' , the Best Seller in the history of any Competitive Exam.



RankMaker Software Download Link Now Available

Please Download this software 

After installing this software if found any questions obsolete or not relevant you can delete the question.

Current Affairs Questions for Sec Asst PSC EXam 2015

Question 1 : “Four Comprehensives” is a new political theory unveiled by which country? 

[A]China
[B]USA
[C]Sri Lanka
[D]Russia

Answer : China


 “Four comprehensives” is a new political theory, unveiled by Chinese leader Xi Jinping. The four Comprehensives are comprehensively building a moderately prosperous society, c
omprehensively deepen reform, comprehensively govern the nation according to law and comprehensively strictly govern the Party.





Question 2 : Which country has recently developed the world’s first 3D-printed jet engine? 

[A]Japan
[B]China
[C]Australia
[D]Germany
Answer :Australia 

Australian researchers have created world’s first 3D jet engines using 3D printing. The technology is believed lead to cheaper, lighter and more fuel-efficient jets. 3D printing makes products by layering material until a three-dimensional object is created. Automotive and aerospace companies use it for producing prototypes as well as creating specialized tools, mouldings and some end-use parts.



Question 3 : Angkor Wat, one of the most famous sacred temples is in which country? 

[A]Cambodia
[B]Nepal
[C]Philippines
[D]Indonesia
Answer : Cambodia 



Angkor Wat is a temple complex in Cambodia. It was first a Hindu, later a Buddhist, temple complex and the largest religious monument in the world. The temple was built by the Khmer King Suryavarman II in the early 12th century.


More.....,..

Thursday, March 12, 2015

Frequently Asked Computer Abbreviations for PSC & Bank Exam

COMPUTER ABBREVIATIONS

AI: Artificial Intelligence
ALGOL: Algorithmic Language
ALU: Arithmetic Logic Unit
ANSI: American National Standards Institute
API: Application Program Interface
ARP: Address Resolution Protocol
ARPANET: Advanced Research Projects Agency Network
ASCII: American Standard Code For Information Interchange
ASP: Active Server Pages
ATM: Asynchronous Transfer Mode
AVI: Audio Video Interleave
BASIC: Beginner`s All Purpose Symbolic Instruction Code
BCD: Binary Coded Decimal
BDPS:: Business Data Processing Systems
BHTML: Broadcast Hyper Text Markup Language
BIOS: Basic Input Output System
BMP: Bitmap
C-DAC: Centre For Development Of Advanced Computing
CAD: Computer Aided Design
CADD: Computer Aided Design and Drafting
CAM: Computer Aided Manufacturing
CASE: Computer Aided Software Engineering
CCNA: Cisco Certified Network Associate
CD RW: Compact Disc ReWritable
CDMA: Code Division Multiple Access
CDROM: Compact Disc Read Only Memory
CGI: Common Gateway Interface
CISC: Complex Instruction Set Computers
CMOS: Complementary Metal Oxide Semiconductor
CMS: Content Management System
CMYK: Cyan, Magenta, Yellow, Key (Black)
COBOL: Common Business Oriented Language
CORBA: Common Object Request Broker Architecture
CPU: Central Processing Unit
CRC: Cyclic Redundancy Check
CRM: Customer Relationship Management
CRT: Cathode Ray Tube
CUI: Character User Interface
DAC: Digital To Analog Converter
DAO: Data Access Objects
DBA: Data Base Administrator
DBMS: Data Base Management System
DCL: Data Control Language
DCOM: Distributed Component Object Model
DCP: Data Communication Processor
DDL: Data Definition Language
DDOS: Distributed Denial Of Service
DDP: Distributed Data Processing
DFD: Data Flow Diagram
DFS: Distributed File System
DHCP: Dynamic Host Control Protocol
DHTML: Dynamics Hyper Text Markup Language
DLL: Dynamic Link Library
DMA: Direct Memory Access
DML: Data Manipulation Language
DNA: Distributed Internet Architecture
DNS: Domain Name System (Server)
DOM: Document Object Model
DOS: Disk Operating System, Denial Of Service
DPI: Dots Per Inch
DRAM: Dynamic Random Access Memory
DSL: Digital Subscriber Line
DSN: Digital Subscriber Network
DVD: Digital Versatile Disc
EAROM: Electrically Alterable Read Only Memory
EBCDIC: Extended Binary Coded Decimal Interchange Code
EEPROM: Electrically Erasable Programmable Read Only Memory
EFS: Encrypted File System
EJB: Enterprise Java Beans
ENIAC: Electronics Numerical Integrator And Calculator
EPROM: Erasable Programmable Read Only Memory
ERP: Enterprise Resource Planning
FAT: File Allocation Table
FDD: Floppy Disk Drive
FIFO: First In First Out
FLOPS: Floating Point Operations Per Second
FORTRAN: Formula Translation
FPS: Frames Per Second
FTP: File Transfer Protocol
GB: Giga Bytes
GIF: Graphic Interchange Format
GIGO: Garbage In Garbage Out
GPL: General Public License
GUI: Graphical User Interface
HDD: Hard Disk Drive
HTML: Hyper Text Markup Language
HTTP: Hyper Text Transfer Protocol
IBM: International Business Machines
IC: Integrated Circuit
ICMP: Internet Control Message Protocol
ICT: Information And Communication Technology
IDE: Integrated Development Environment
IE: Internet Explorer
IGMP: Internet Group Management Protocol
IP: Internet Protocol
IPX: Internetworked Packet Exchange
IRC: Internet Relay Chat
IRDA: Infrared Data Association
IRQ: Interrupt Request
ISDN: Integrated Services Digital Network
ISO: International Standard Organization
ISP: Internet Service Provider
JCL: Job Control Language
JDBC: Java Data Base Connectivity
JPEG: Joint Photographic Experts Group
JSP: Java Server Pages
KB: Kilo Bytes
KBPS: Kilo Bytes Per Second
LAN: Local Area Network
LCD: Liquid Crystal Display
LIFO: Last In First Out
LIPS: Logical Interfaces Per Second
LSI: Large Scale Integration
MAC: Media Access Control
MAN: Metropolitan Area Network
MB: Mega Bytes
MBPS: Mega Bytes Per Second
MBR: Master Boot Record
MCP: Microsoft Certified Professional
MDI: Multiple Document Interface
MICR: MagneticInk Characters Reader
MIDI: Musical Instrument Digital Interface
MIMD: Multiple Instruction Multiple Data
MIME: Multipurpose Internet Mail Extensions
MIPS: Millions Of Instructions Per Second
MISD: Multiple Instruction Single Data
MODEM: Modulator And Demodulator
MP3: Motion Pictures Experts Group Layer 3
MPEG: Motion Pictures Experts Group
MSDN: Microsoft Developer Network
MSIIS: Microsoft Internet Information Server
MSN: Microsoft Network
NASSCOM: National Association Of Software & Service Companies
NIC: National Informatics Centre,
NTFS: New Technology File System
OCR: Optical Character Readers
ODBC: Open Data Base Connectivity
OLE: Object Linking And Embedding
OMR: Optical Mark Reader
OOPS: Object Oriented Programming System
OS: Operating System
OSI: Open System Interconnection
PC: Personal Computer
PCI: Peripheral Component Interconnect
PDA: Personal Digital Assistant
PDF: Portable Document Format
PNG: Portable Network Graphics
PNP: Plug And Play
PPP: Peer To Peer Protocol
PROM: Programmable Read Only Memory
RAID: Redundant Array Of Independent Disks
RAM: Random Access Memory
RD RAM: Rambus Dynamic Random Access Memory
RDBMS: Relational Data Base Management System
RGB: Red Green Blue
RISC: Reduced Instruction Set Computer
ROM: Read Only Memory
RPC: Remote Procedure Call
RTF: Rich Text Format
RTOS: Real Time Operating System
SAP: Service Access Point, Systems Applications Products
SD RAM: Synchronous Dynamic Random Access Memory
SDK: Software Development Kit
SDN: Integrated Service Digital Network
SDRAM: Static Dynamic Random Access Memory
SDSL: Symmetric Digital Subscribes Line
SGML: Standard Generalized Markup Language
SIM: Subscriber Identification Module
SIMD: Single Instruction Multiple Data
SISD: Single Instruction Single Data
SMS: Short Message Service
SMTP: Simple Mail Transfer Protocol
SNA: System Network Architecture
SNMP: Simple Network Management Protocol
SNOBOL: String Oriented Symbolic Language
SOAP: Simple Object Access Protocol
SQL: Structured Query Language
SRAM: Static Random Access Memory
STP: Shielded Twisted Pair
TB: Tera Bytes
TCP/IP: Transmission Control Protocol Internet Protocol
TDMA: Time Division Multiple Access
UDP: User Datagram Protocol
UML: Unified Modelling Language
USB: Universal Serial Bus
UTP: Unshielded Twisted Pair
VGA: Video Graphics Array
VLSI: Very Large Scale Integrated Circuits
VPN: Virtual Private Network
VRML: Virtual Reality Modelling Language
W3C: World Wide Web Consortium
WAN: Wide Area Network
WAP: Wireless Application Protocol
WDM: Wave Division Multiplexing
WINDOWS ME: Windows Millennium Edition
WINDOWS NT: Windows New Technology
WINDOWS XP: Windows Experienced
WML: Wireless Markup Language
WORM: Write Once Read Many
WWW: World Wide Web
WYSIWYG: What You See Is What You Get
XML: Extensible Markup Language
Y2K: Year 2000

Expected Questions in IT and Cyberlaw in PSC


Sunday, March 8, 2015

IT TERMINOLOGY



Applet
A Java program embedded in web page
Archie
A program to find files on FTP servers
Avatar
A character representing an internet user
Backbone
Network mainline carrying data to smaller lines
Bandwidth
Amount of data sent through network
Bit
Smallest piece of information, that is, either 1 or 0
Bluetooth
A short range wireless technology to connect electronic devices
Boot
To start a computer
Byte
Sequence of information bits, which equals 8 bits
Cache
Technically classifying, it stores recently visited web addresses, web pages in hard disk/RAM/near processor, depending on cache types, for fast retrieval
Captcha
Response test that shows if the user is human or not
Centronics
36 pin parallel interface standard
Computer
A machine that computes and is programmable
Cookie
It is an internet term where the web server sent data records your activities on websites. Some websites record & remember information like your username and password, so you don’t have to type them again.
Crop
Removing part of an image or photo
Cyber Bullying
Harassing or threatening the young via cyberspace
Cyber Squatter
Someone registering a domain name (without web pages) to sell it
Default
When a user does not specify a setting, a preset value is used
Degauss
Removing magnetism from a device
Digital
Data represented in a series of zeros and ones
DirectX
Mostly used in video games, it is a set of commands
Domain
Network and computers connected to internet
Domain Name
Website name
Driver
A file that aids computer to connect with the hardware device
Dual-Core
A CPU that has 2 processors in a chip
Embed
Adding something from one document to another
Emoticons
Text based faces/objects
Encryption
Conversion of data into unreadable state
Ethernet
A networking connection that uses coaxial cables
Exabyte
Unit of data storage equalling to 2 to 60th power bytes
Fiber Optic
Transmits information faster than copper wire
File Sharing
Way of giving same file to many users by one server
Firewire
High speed interface for connecting digital/electronic players to computers
Firmware
Software programmed into hardware
Flash Drive
Data storage device with less units
Gigabyte (GB)
Equals 1024 megabytes
Gigahertz
Measurement for computer processing speed. 1 gigahertz =1000 megahertz
Gnutella
Internet file sharing network
Golden Master
Final version of software program sent to make retail copies
Hacker
A sly person who gains illegal access to other people’s computers
Hard Copy
A document that is printed
Hardware
Internal and external physical parts of a computer system
Heat Sink
A metal alloy that absorbs heat from the processor
Host
A network computer that acts as a server to other computers
Icon
A tiny display representing files and folders
Infrared
Red light invisible to naked eye and used in some wireless devices
Integrated Circuit
A semiconductor chip
Internet
A super highway network that connects smaller networks
Intranet
Internal network within an organisation
IP Address
It is internet protocol numbers ranging from 0 to 255 and separated by 3 dots. It is assigned to a computer connected to internet by Internet Service Provider (ISP).
Iteration
Program process repetition
JavaScript
A scripting language developed by Sun Microsystems
Joystick
A device consisting of base and stick used in video games
Jumper
Metal bridge to close electrical circuit
Kerberos
Used to give secure network authentication
Kernel
The foundation layer of an operating system
Keygen
Key generator that automatically generates  a registration or serial #
Keylogger
Keystrokes recording program that could be used by a hacker to find out passwords
Kibibyte (KiB)
Exact units of 1024 bytes
Kilobyte (KB)
Estimated 1000 bytes or 1024 bytes depending on the content in use. Hence, kilobyte has ambiguous units.
LAN
Local area network that covers a small area
Leaf
A file in hard disk
Limewire
A free software that allows network users to share files
Linkedin
Business social networking site
Linux
Operating system developed by Linus Torvalds. It is a popular OS for hosting web servers.
Macro
A command/script in form of a key or symbol
Mainframe
Big powerful computer processing mammoth volume at high speed
Malware
Programs like virus & Trojanintended to damage computers
Media
Data storage hardware like DVD, CD, HD
Meta Tag
Tool to store details like keywords & contents of a web page
Memory Stick
Sony’s flash memory cards
Name Server
Web domain is referred to IP address by name server
Nanosecond
A billionth of a second
Network
A system of connected computers that send and receive data
Node
Anything connected to a network
Null Value
Something that has no value in programming
Offline
State of computer devices that are neither turned on nor connected
Online
State of computer devices that are turned on and connected
Operating System(OS)
The significant program that runs the computer hardware
Oracle
Database management program developed by Oracle Corporation
Overclock
Technique to run a microprocessor faster than intended
Packet
Amount of data sent from source to destination
Path
Address of file
Peer to Peer (P2P)
Connected workstations sharing files without a central server
Peripheral
Any device attached to computer externally
Phishing (i.e. Password harvesting fishing)
Attempting to garner personal information via emails that seem genuine from banking and popular websites
Primary Key
A value that mainly identifies a record in a table
Quad-Core
CPU having 4 separate processors in a chip
Query
Request of a database in computer
Queue
Series of tasks waiting to be done by programs
QWERTY
Denotes standard keyboard because Q,W,E,R,T,Y keys are side by side in the upper left row
Random Access Memory (RAM)
Memory cells that make up memory module. Data is always loaded from hard disk to RAM since it is faster to read from it. The best method to make your computer work faster is to increase its RAM.  
Raw Data
Data that is not processed
Read-only Memory (ROM)
Memory storing hardware information that is not lost when power is turned off
Real Time
The moment, data is received, it is processed
Reboot
To restart
Registry
Database storing set up, software and hardware configuration information in Windows OS
Router
A device connecting one local area network to another
Script
A series of commands performed by a program
Serial Port
Interface or connection to peripherals
Server
Mainframe computer that serves other attached computers
Shadowing
Method of using high speed RAM to make computer to work faster
Simplex
Circuit that can either transmit or receive
Software
A code or program that is read by computer
Spam
Unnecessary emails
Static
Non interactive web page
System
Comprehensive inclusion of hardware, software & firmware items
Terabyte (TB)
One trillion bytes
Terminal
An internet computer screen
Throughout
Data amount processed in a given time
Topology
Physical and logical set up of a network
Trojan
Dangerous virus loaded deceptively through a host program
Undo
A command to cancel previous action
Universal Resource Locator (URL)
Another term for internet address
Universal Serial Bus (USB)
Computer port that is faster
Unix
Web server operating system developed by AT & T
Upload
To transfer files from local computer to web server/network
Virtual Memory
Memory generated by  hard disk sectors when RAM is full
Virtual Reality
Computer created illusion of reality
Virus
A code or program designed to replicate and damage computers
Wave
Microsoft’s waveform sound format
Weblog
A personal journal or blog on the web
Workstation
Any computer attached to internet
X2
Technology to send higher data rates on old phone system
XMS(Extended Memory Specification)
Procedure for using extended memory & area  of disk operating system (DOS)
Y2K
Year 2000; the predicted Millennium Bug that flopped
Yottabyte (YB)
Largest data storage unit, i.e. 1,000,000,000,000,000,000,000,000 bytes
Zero Day Exploit
Computer security loophole issue & attack on it are known on same day. Zero day left to release patch to fix it.
Zettabyte (ZB)
1,000, 000, 000, 000, 000, 000, 000 bytes
Zipping
Compressing files to save space
Zune
Digital music entertainment developed by Microsoft

Wednesday, March 4, 2015

Computer Ergonomics

Why computer ergonomics?

Many people spend hours a day in front of a computer without thinking about the impact on their bodies. They physically stress their bodies daily without realizing it by extending their wrists, slouching, sitting without foot support and straining to look at poorly placed monitors.

These practices can lead to cumulative trauma disorders or repetitive stress injuries, which create a life-long impact on health. Symptoms may include pain, muscle fatigue, loss of sensation, tingling and reduced performance.

Ergonomics is a field of study that attempts to reduce strain, fatigue, and injuries by improving product design and workspace arrangement. The goal is a comfortable, relaxed posture.

Object Oriented Programming Languages : Lessons Degree Level PSC Exam

ADA
Ada was named for Augusta Ada King, countess of Lovelace, who was an assistant to the 19th-century English inventor Charles Babbage, and is sometimes called the first computer programmer. Ada, the language, was developed in the early 1980s for the U.S. Department of Defense for large-scale programming. It combined Pascal-like notation with the ability to package operations and data into independent modules. Its first form, Ada 83, was not fully object-oriented, but the subsequent Ada 95 provided objects and the ability to construct hierarchies of them. While no longer mandated for use in work for the Department of Defense, Ada remains an effective language for engineering large programs.

JAVA
In the early 1990s, Java was designed by Sun Microsystems, Inc., as a programming language for the World Wide Web (WWW). Although it resembled C++ in appearance, it was fully object-oriented. In particular, Java dispensed with lower-level features, including the ability to manipulate data addresses, a capability that is neither desirable nor useful in programs for distributed systems. In order to be portable, Java programs are translated by a Java Virtual Machine specific to each computer platform, which then executes the Java program. In addition to adding interactive capabilities to the Internet through Web “applets,” Java has been widely used for programming small and portable devices, such as mobile telephones.

C++
The C++language, developed by Bjarne Stroustrup at AT&T in the mid-1980s, extended C by adding objects to it while preserving the efficiency of C programs. It has been one of the most important languages for both education and industrial programming. Large parts of many operating systems, such as the Microsoft Corporation’s Windows 98, were written in C++.

Tuesday, March 3, 2015

RankMaker 2015 : Updated Version for Sec Asst / Muncipal Secretary Exams

RankMaker 2015 , Software for PSC Exam ( with more questions and answers ) now ready to download from our official Blog. Download link will be sent to your email id.

If you are interested quote your emai ld here as comment.

Monday, March 2, 2015

Assistant / Auditor , Sec / PSC , Muncipal Secretary , Block Panchayath Secretary Exam Orientation

Cyber Terminologies

SALAMI ATTACK : Committing financial crimes in which criminals steal money a bit at a time from financial accounts on a system.

Information Technology and Cyber Law : Lessons

Great IT Inventions and Inventors.


Charles Babbage 
(26 December 1791 – 18 October 1871) was an English mathematician, philosopher, inventor and mechanical engineer who originated the concept of a programmable computer.Considered a "father of the computer", Babbage is credited with inventing the first mechanical computer. His inventions include Difference Engine and Analytical Engine.


Tim Berners-Lee 
(born 8 June 1955),also known as "TimBL", is a British computer scientist and the inventor of the World Wide Web. He made a proposal for an information management system in March 1989,and on 25 December 1990, with the help of Robert Cailliau and a young student at CERN, he implemented the first successful communication between a Hypertext Transfer Protocol(HTTP) client and server via the Internet.


Ada Lovelace
(10 December 1815 – 27 November 1852), born Augusta Ada Byron and now commonly known as Ada Lovelace, was an English mathematician and writer chiefly known for her work on Charles Babbage's early mechanical general-purpose computer, the analytical engine. Her notes on the engine include what is recognised as the first algorithm intended to be processed by a machine; she sometimes considered the world's first computer programmer.


John Vohn Neumann
December 28, 1903 – February 8, 1957) was a Hungarian-American mathematician and polymath who made major contributions to a vast number of fields. He formulated stored program concept , the working principle of modern computers. Von Neumann's design for a self-reproducing computer program is considered the world's first computer virus, and he is considered to be the theoretical father of computer virology.

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.