Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Sunday, September 13, 2015

IT Question Discussion Room : PSC SI TEST

Q. Which among the following  is a malware program that replicates itself in order to spread to other computers?

Computer worm


Q. The act of creating mis leading website for the purpose of online identity theft  is 
Spoofing

Q. Which of the following is not required to operate wifi

Ans : Transponder


Q. The activity of creating tracks and sectors on a hard disk is called
Ans : Formatting


Q. The indian computer emergency response team

Indian Computer Emergency Response Team (CERT-In) is the Government organisation under Ministry of Communications and Information Technology.It is a nodal agency that deals with cyber security threats like hacking and phishing. It strengthens security-related defence of the Indian Internet domain.

Q. What is the function of control unit in the CPU ?


The control unit (CU) is a component of a computer's central processing unit (CPU) that directs operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.


Q. Gnu Privacy Guard ( GPG  ) is
Ans: A cryptographic Software which provides for key based asymmetric cryptography used for encryption and authentication



Q. Which of the following protocol is used for email transmission across internet ?

Ans : SMTP

[Email Protocols: IMAP, POP3, SMTP and HTTP

Basicaly, a protocol is about a standard method used at each end of a communication channel, in order to properly transmit information. In order to deal with your email you must use a mail client to access a mail server. The mail client and mail server can exchange information with each other using a variety of protocols.

IMAP Protocol:

IMAP (Internet Message Access Protocol) – Is a standard protocol for accessing e-mail from your local server. IMAP is a client/server protocol in which e-mail is received and held for you by your Internet server. As this requires only a small data transfer this works well even over a slow connection such as a modem. Only if you request to read a specific email message will it be downloaded from the server. You can also create and manipulate folders or mailboxes on the server, delete messages etc.

POP3 Protocol:

The POP (Post Office Protocol 3) protocol provides a simple, standardized way for users to access mailboxes and download messages to their computers.

When using the POP protocol all your eMail messages will be downloaded from the mail server to your local computer. You can choose to leave copies of your eMails on the server as well. The advantage is that once your messages are downloaded you can cut the internet connection and read your eMail at your leisure without incuring further communication costs. On the other hand you might have transferred a lot of message (including spam or viruses) in which you are not at all interested at this point.

SMTP Protocol:

The SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server. The SMTP protocol can only be used to send emails, not to receive them. Depending on your network / ISP settings, you may only be able to use the SMTP protocol under certain conditions (see incoming and outgoing mail servers

HTTP Protocol:

The HTTP protocol is not a protocol dedicated for email communications, but it can be used for accessing your mailbox. Also called web based email, this protocol can be used to compose or retrieve emails from an your account. Hotmail is a good example of using HTTP as an email protocol. ]



No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.