PSC Question Search

Wednesday, May 4, 2016

IT & Cyberlaw : PSC Previous Question Paper Solved

Assistant Grade II (Beverages) Held on 25 /07/2015


1.     Ice cream sandwich and Jelly bean are the latest versions of which OS ?
a)     Ubuntu
b)     Android
c)     Apple
d)    Unix
Answer: ( b )
Android

2.     Email that appears to have been originated from one source when it was actually sent from another source is referred to as
a)     Email spoofing
b)     Email Bombing
c)     Email Spamming
d)    None of these
Answer: ( a )
Email Spoofing

3.     When did Information Technology Act come in to force in India
a)     Oct 17th 2000
b)     Oct 17th 2001
c)     June 4th 2000
d)    June 4th 2001
Answer: ( a )
Oct 17th 2000

4.     Data Diddling involves
a)     Destroying data before input to the computer.
b)     Unauthorized copying of data
c)     Changing data in to information
d)    Changing data prior or during input to the computer
Answer: (d )

5.     Which hardware device is used to interconnect different types of networks with different protocol?
a)     Bridge
b)     Router
c)     Gateway
d)    Repeater
Answer: ( c )
Gateway

6.     A Collection of four bits is called
a)     Nibble
b)     Byte
c)     Word
d)    Double word
Answer: (a )
Nibble

7.     The walkie Talkie is an example of which mode of communication?
a)     Simplex
b)     Half Duplex
c)     Duplex
d)    None of these
Answer: ( b )
Half Duplex
8.     A device that combines data from multiple computers and load them on a common communication channel
a)     Modem
b)     Repeater
c)     Multiplexer
d)    Encoder
Answer: ( c )
Multiplexer

9.     In the email address admin@vms.org, “ , “vms “  is the :
a)     Host name with commercial domain
b)     Host name with non-commercial domain
c)     Client name with educational domain
d)    Client name with government domain
Answer: ( b )

10.  ______ is the modification of software to remove or disable features which are undesirable by a person
a)     Software Hacking
b)     Software Licensing
c)     Software Piracy
d)    Software Cracking
Answer: ( d )
Software Cracking



No comments:

Post a Comment