Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Thursday, April 30, 2015

Kerala PSC Sec Asst Examination 2015 : Tips and Tricks


Sunday, April 26, 2015

Kerala PSC Pharmacist Exam : Model Questions : Solved Papers

The Pharmacist
Candidates preparing for pharmacist exam 2015 can download the question paper here by click the following website link.
Kerala Public Service Commission going to conduct an exam for recruiting Pharmacist in 2015. No.of Vacancies present for this post.

Model Questions and Solved Papers 

Saturday, April 25, 2015

Nepal Earth Quake : Google Person Finder Service


Please use Google Person Finder service to get updates on missing persons. click here

Google Person Finder

or copy paste the URL in your browsers address bar

http://google.org/personfinder/global/home.html

Thursday, April 23, 2015

Receive PSC Mail Alerts in Your Inbox

To receive PSC job opportunities and Model PSC Questions in your mail follow this blog . Or please send your email Ids as comment for this post.

Monday, April 20, 2015

HSST Computer Science Interview Questions 2015

What is meant by Seek Time ?
Time to select a track
Time to select a sector
Time to access data
Time taken by the disk for one complete rotation

Mark Zuckerberg is related to 
Google
Facebook
Wikipedia
Whatsapp

Full form of WiFi
Wireless first
Wireless friendly
Wireless fidelity
Wireless fetching

1 PB represents 
1024 KB
1024 TB
1024 GB
1024 MB

Which company developed Android Operating System
Samsung
Google
Microsoft
IBM

Booting is process of 
Loading application program from secondary memory to primary memory
Loading OS from secondary memory to primary memory
Loading OS from primary memory to secondary memory
All of the Above

Microsoft is planning to release __________ OS that will support PC , Laptops , Smart Phones and Tablets.
Windows 8.2
Windows 8.3
Windows 9.0
Windows 10

Which of the following is invention of Charles Babbage
Abacus
Numerical Wheel Calculator
ENIAC
Difference Engine

Which of the following is first Intel Processor ?
a) 4004
4040
4001
8085

Knowledge base is related to
Compilers
 Operating Systems
Artificial Intelligence
GUI

11. Page Rank algorithm is used in
Yahoo
Google
Ask
Bing

12. Crawler programs are used in
DBMS  
Spread sheet      
Word processor  
Search Engine

13. Which of the following is an artificial intelligence based application
Dream Weaver  
Lotus      
SIRI  
None of these

14. Base of hexadecimal system is
Eight    b) One        c) Two d)16

15. The tangible parts  of a computer system are called as
malware b) software c) hardware d) firmware

16. The process of a sending request from client to server is  -----
downloading b) pulling c) Querying d) transferring

Find the binary equivalent of the decimal number 65
1000000
1000001
11111111
1110000

The term Quarantine virus means 
To heal the virus
To  protect the host
To isolate the infected file
To remove the infected file

The real time applications having
Quick response time
Quick Seek time
Quick Latency time
None of these

The term Kernel related to 
Application Software
Malicious Software
Operating System
Anti Virus programs

The First Computer Programmer
Charles Babbage
John Von Neumann
Ada Lovelace
Gordon Moore

Expand the term TCP
Transmission Control Protocol
Transfer Control Protocol
Transfer configuration Protocol
Transmission Configuration Protocol

The name Spartan related to
Operating System
Anti Virus
Web Browser
Device Driver

The Slogan ‘ Wisdom of mass principle ‘  
Google
Yahoo
Wikileaks
Wikipedia

Saturday, April 18, 2015

PSC Interview Questions : HSST Computer Science 2015

Questions on Operating System

Booting , Function of OS , Semaphore , Critical Section , Deadlock


Question on Computer Networks

OSI Reference Model , Application Protocols , Inter networking devices.


Question on Database Managment
Database Abstraction ,  Concepts of primary key , Normalization Theory.



Current Trends in Infomation Technology

Wednesday, April 15, 2015

HSST COMPUTER SCIENCE / APPLICATION SHORT LIST PUBLISHED

After long three years Kerala PSC published the short list of HSST CS / CA exam conducted on 19/09/2012.

Cut off Mark : 37.33


Wednesday, April 8, 2015

IT Questions Solved 4 Sec Asst Exam





What is meant by Seek Time ?
Time to select a track’
Time to select a sector
Time to access data
Time taken by the disk for one complete rotation

Mark Zuckerberg is related to
Google
Facebook
Wikipedia
Whatsapp

Full form of WiFi
Wireless first
Wireless friendly
Wireless fidelity
Wireless fetching

1 TB represents
1024 GB
1024 x 1024 GB
1024 x 1024 x 1024 GB
1024 X 1024 X 1024 X1024 GB

Who developed Android Operating System
Samsung
Google
Microsoft
IBM

Booting is process of
Loading application program from secondary memory to primary memory
Loading OS from secondary memory to primary memory
Loading OS from primary memory to secondary memory
All of the Above

Microsoft is planning to release __________ OS that will support PC , Laptops , Smart Phones and Tablets.
Windows 8.2
Windows 8.3
Windows 9.0
Windows 10

Which of the following is invention of Charles Babbage
Abacus
Numerical Wheel Calculator
ENIAC
Difference Engine

Which of the following is first Intel Processor ?
a) 4004
4040
4001
8085

Knowledge base is related to
Compilers
 Operating Systems
Artificial Intelligence
GUI

11. Page Rank algorithm is used in
Yahoo
Google
Ask
Bing

12. Crawler programs are used in
DBMS  
Spread sheet      
Word processor  
Search Engine

13. Which of the following is an artificial intelligence based application
Dream Weaver  
Lotus      
SIRI  
None of these

14. Base of hexadecimal system is
Eight    b) One        c) Two d)16

15. The tangible parts  of a computer system are called as
malware b) software c) hardware d) firmware

16. The process of a sending request from client to server is  -----
downloading b) pulling c) Querying d) transferring

Find the binary equivalent of the decimal number 65
1000000
1000001
11111111
1110000

The term Qurantine virus means
To heal the virus
To  protect the host
To isolate the infected file
To remove the infected file

The real time applications having
Quick response time
Quick Seek time
Quick Latency time
None of these

The term Kernel related to
Application Software
Malicious Software
Operating System
Anti Virus programs

The First Computer Programmer
Charles Babbage
John Von Neumann
Ada Lovelace
Gordon Moore

Expand the term TCP
Transmission Control Protocol
Transfer Control Protocol
Transfer configuration Protocol
Transmission Configuration Protocol

The name Spartan related to
Operating System
Anti Virus
Web Browser
Device Driver

The Slogan ‘ Wisdom of mass principle ‘
Google
Yahoo
Wikileaks
Wikipedia

Tuesday, April 7, 2015

How the word ` Harthal ` Originates ?

The term Harthal comes from Gujarati (હડતાળhaḍtāḷ or હડતાલ haḍtāl), signifying the closing down of shops and warehouses with the object of realizing a demand.Mahatma Gandhi, who hailed fromGujarat, used the term to refer to his anti-British general strikes, effectively institutionalizing the term.
Wikipedia

Friday, April 3, 2015

IT Terminology in Cyber Law


Security Breeches ( Spamming , Spoofing , Phishing , Hacking etc )

Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: Web search engine spam, spam in blogs etc. Email spam, also known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. A person who creates electronic spam is called a spammer.

Spoofing
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.

Types of Hackers & Ethical hacking
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.

White Hat Hacker
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.

Black Hat Hackers
Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Grey Hat Hacker
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker.


Cryptography 
Cryptography is the science of secret writing. This word emerged from the greek words 'krupto' means secret and 'graph' means writing.

Encryption
Encryption is the process of transforming plain text to unreadable scrambled text called cipher text.

Decryption
Decryption is the reverse process of encryption , ie it converts unreadable cipher text back to plain text.


Need of Security Protocols like HTTPS and SSL
Hypertext Transfer Protocol Secure (HTTPS) is a widely used communications protocol for secure communication over a computer network.

HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.

Eavesdropping
Eavesdropping is the act of secretly listening to the private conversation of others without their consent.

Why things go wrong ?


Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.