A Blog for all job aspirants in fullfilling their dreams through the body charged with a very sensitive and sacred task of making selection of the most capable and deserving persons for manning the civil services and posts which has a direct bearing on the quality of governance. It brings about PSC Training an PSC Coaching Online. The Knowledge documents in this blog meant only to increase the general awareness of the readers. E&OE.
PSC Question Search
Subscribe this Blog
Followers
Thursday, April 30, 2015
Sunday, April 26, 2015
Kerala PSC Pharmacist Exam : Model Questions : Solved Papers
The Pharmacist
Candidates preparing for pharmacist exam 2015 can download the question paper here by click the following website link.
Kerala Public Service Commission going to conduct an exam for recruiting Pharmacist in 2015. No.of Vacancies present for this post.
Saturday, April 25, 2015
Nepal Earth Quake : Google Person Finder Service
Please use Google Person Finder service to get updates on missing persons. click here
Google Person Finder
or copy paste the URL in your browsers address bar
http://google.org/personfinder/global/home.html
Thursday, April 23, 2015
Receive PSC Mail Alerts in Your Inbox
To receive PSC job opportunities and Model PSC Questions in your mail follow this blog . Or please send your email Ids as comment for this post.
Tuesday, April 21, 2015
Monday, April 20, 2015
HSST Computer Science Interview Questions 2015
What is meant by Seek Time ?
Time to select a track
Time to select a sector
Time to access data
Time taken by the disk for one complete rotation
Mark Zuckerberg is related to
Google
Facebook
Wikipedia
Whatsapp
Full form of WiFi
Wireless first
Wireless friendly
Wireless fidelity
Wireless fetching
1 PB represents
1024 KB
1024 TB
1024 GB
1024 MB
Which company developed Android Operating System
Samsung
Google
Microsoft
IBM
Booting is process of
Loading application program from secondary memory to primary memory
Loading OS from secondary memory to primary memory
Loading OS from primary memory to secondary memory
All of the Above
Microsoft is planning to release __________ OS that will support PC , Laptops , Smart Phones and Tablets.
Windows 8.2
Windows 8.3
Windows 9.0
Windows 10
Which of the following is invention of Charles Babbage
Abacus
Numerical Wheel Calculator
ENIAC
Difference Engine
Which of the following is first Intel Processor ?
a) 4004
4040
4001
8085
Knowledge base is related to
Compilers
Operating Systems
Artificial Intelligence
GUI
11. Page Rank algorithm is used in
Yahoo
Google
Ask
Bing
12. Crawler programs are used in
DBMS
Spread sheet
Word processor
Search Engine
13. Which of the following is an artificial intelligence based application
Dream Weaver
Lotus
SIRI
None of these
14. Base of hexadecimal system is
Eight b) One c) Two d)16
15. The tangible parts of a computer system are called as
malware b) software c) hardware d) firmware
16. The process of a sending request from client to server is -----
downloading b) pulling c) Querying d) transferring
Find the binary equivalent of the decimal number 65
1000000
1000001
11111111
1110000
The term Quarantine virus means
To heal the virus
To protect the host
To isolate the infected file
To remove the infected file
The real time applications having
Quick response time
Quick Seek time
Quick Latency time
None of these
The term Kernel related to
Application Software
Malicious Software
Operating System
Anti Virus programs
The First Computer Programmer
Charles Babbage
John Von Neumann
Ada Lovelace
Gordon Moore
Expand the term TCP
Transmission Control Protocol
Transfer Control Protocol
Transfer configuration Protocol
Transmission Configuration Protocol
The name Spartan related to
Operating System
Anti Virus
Web Browser
Device Driver
The Slogan ‘ Wisdom of mass principle ‘
Google
Yahoo
Wikileaks
Wikipedia
Time to select a track
Time to select a sector
Time to access data
Time taken by the disk for one complete rotation
Mark Zuckerberg is related to
Wikipedia
Full form of WiFi
Wireless first
Wireless friendly
Wireless fidelity
Wireless fetching
1 PB represents
1024 KB
1024 TB
1024 GB
1024 MB
Which company developed Android Operating System
Samsung
Microsoft
IBM
Booting is process of
Loading application program from secondary memory to primary memory
Loading OS from secondary memory to primary memory
Loading OS from primary memory to secondary memory
All of the Above
Microsoft is planning to release __________ OS that will support PC , Laptops , Smart Phones and Tablets.
Windows 8.2
Windows 8.3
Windows 9.0
Windows 10
Which of the following is invention of Charles Babbage
Abacus
Numerical Wheel Calculator
ENIAC
Difference Engine
Which of the following is first Intel Processor ?
a) 4004
4040
4001
8085
Knowledge base is related to
Compilers
Operating Systems
Artificial Intelligence
GUI
11. Page Rank algorithm is used in
Yahoo
Ask
Bing
12. Crawler programs are used in
DBMS
Spread sheet
Word processor
Search Engine
13. Which of the following is an artificial intelligence based application
Dream Weaver
Lotus
SIRI
None of these
14. Base of hexadecimal system is
Eight b) One c) Two d)16
15. The tangible parts of a computer system are called as
malware b) software c) hardware d) firmware
16. The process of a sending request from client to server is -----
downloading b) pulling c) Querying d) transferring
Find the binary equivalent of the decimal number 65
1000000
1000001
11111111
1110000
The term Quarantine virus means
To heal the virus
To protect the host
To isolate the infected file
To remove the infected file
The real time applications having
Quick response time
Quick Seek time
Quick Latency time
None of these
The term Kernel related to
Application Software
Malicious Software
Operating System
Anti Virus programs
The First Computer Programmer
Charles Babbage
John Von Neumann
Ada Lovelace
Gordon Moore
Expand the term TCP
Transmission Control Protocol
Transfer Control Protocol
Transfer configuration Protocol
Transmission Configuration Protocol
The name Spartan related to
Operating System
Anti Virus
Web Browser
Device Driver
The Slogan ‘ Wisdom of mass principle ‘
Yahoo
Wikileaks
Wikipedia
Saturday, April 18, 2015
PSC Interview Questions : HSST Computer Science 2015
Questions on Operating System
Booting , Function of OS , Semaphore , Critical Section , Deadlock
Question on Computer Networks
OSI Reference Model , Application Protocols , Inter networking devices.
Question on Database Managment
Database Abstraction , Concepts of primary key , Normalization Theory.
Current Trends in Infomation Technology
Booting , Function of OS , Semaphore , Critical Section , Deadlock
Question on Computer Networks
OSI Reference Model , Application Protocols , Inter networking devices.
Question on Database Managment
Database Abstraction , Concepts of primary key , Normalization Theory.
Current Trends in Infomation Technology
Wednesday, April 15, 2015
HSST COMPUTER SCIENCE / APPLICATION SHORT LIST PUBLISHED
After long three years Kerala PSC published the short list of HSST CS / CA exam conducted on 19/09/2012.
Cut off Mark : 37.33
Cut off Mark : 37.33
Friday, April 10, 2015
Wednesday, April 8, 2015
IT Questions Solved 4 Sec Asst Exam
What is meant by Seek Time ?
Time to select a track’
Time to select a sector
Time to access data
Time taken by the disk for one complete rotation
Mark Zuckerberg is related to
Wikipedia
Full form of WiFi
Wireless first
Wireless friendly
Wireless fidelity
Wireless fetching
1 TB represents
1024 GB
1024 x 1024 GB
1024 x 1024 x 1024 GB
1024 X 1024 X 1024 X1024 GB
Who developed Android Operating System
Samsung
Microsoft
IBM
Booting is process of
Loading application program from secondary memory to primary memory
Loading OS from secondary memory to primary memory
Loading OS from primary memory to secondary memory
All of the Above
Microsoft is planning to release __________ OS that will support PC , Laptops , Smart Phones and Tablets.
Windows 8.2
Windows 8.3
Windows 9.0
Windows 10
Which of the following is invention of Charles Babbage
Abacus
Numerical Wheel Calculator
ENIAC
Difference Engine
Which of the following is first Intel Processor ?
a) 4004
4040
4001
8085
Knowledge base is related to
Compilers
Operating Systems
Artificial Intelligence
GUI
11. Page Rank algorithm is used in
Yahoo
Ask
Bing
12. Crawler programs are used in
DBMS
Spread sheet
Word processor
Search Engine
13. Which of the following is an artificial intelligence based application
Dream Weaver
Lotus
SIRI
None of these
14. Base of hexadecimal system is
Eight b) One c) Two d)16
15. The tangible parts of a computer system are called as
malware b) software c) hardware d) firmware
16. The process of a sending request from client to server is -----
downloading b) pulling c) Querying d) transferring
Find the binary equivalent of the decimal number 65
1000000
1000001
11111111
1110000
The term Qurantine virus means
To heal the virus
To protect the host
To isolate the infected file
To remove the infected file
The real time applications having
Quick response time
Quick Seek time
Quick Latency time
None of these
The term Kernel related to
Application Software
Malicious Software
Operating System
Anti Virus programs
The First Computer Programmer
Charles Babbage
John Von Neumann
Ada Lovelace
Gordon Moore
Expand the term TCP
Transmission Control Protocol
Transfer Control Protocol
Transfer configuration Protocol
Transmission Configuration Protocol
The name Spartan related to
Operating System
Anti Virus
Web Browser
Device Driver
The Slogan ‘ Wisdom of mass principle ‘
Yahoo
Wikileaks
Wikipedia
Tuesday, April 7, 2015
How the word ` Harthal ` Originates ?
The term Harthal comes from Gujarati (હડતાળhaḍtāḷ or હડતાલ haḍtāl), signifying the closing down of shops and warehouses with the object of realizing a demand.Mahatma Gandhi, who hailed fromGujarat, used the term to refer to his anti-British general strikes, effectively institutionalizing the term.
Wikipedia
Friday, April 3, 2015
IT Terminology in Cyber Law
Security Breeches ( Spamming , Spoofing , Phishing , Hacking etc )
Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: Web search engine spam, spam in blogs etc. Email spam, also known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. A person who creates electronic spam is called a spammer.
Spoofing
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.
Types of Hackers & Ethical hacking
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.
White Hat Hacker
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.
Black Hat Hackers
Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
Grey Hat Hacker
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker.
Cryptography
Cryptography is the science of secret writing. This word emerged from the greek words 'krupto' means secret and 'graph' means writing.
Encryption
Encryption is the process of transforming plain text to unreadable scrambled text called cipher text.
Decryption
Decryption is the reverse process of encryption , ie it converts unreadable cipher text back to plain text.
Need of Security Protocols like HTTPS and SSL
Hypertext Transfer Protocol Secure (HTTPS) is a widely used communications protocol for secure communication over a computer network.
HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.
Eavesdropping
Eavesdropping is the act of secretly listening to the private conversation of others without their consent.
Subscribe to:
Posts (Atom)
Total Pageviews
Disclaimer : Blog Policies
This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.