Kerala PSC IT and Cyber Laws Questions and Answers

1. Which ports used to connect special types of music instruments

Answer: MIDI

2. ________ is an spreadsheet program

Answer: MS-excel

3. ഇൻഡ്യൻ l.T.ആക്ട് നിലവിൽ വന്നത്

Answer: 2000 ഒക്ടോബർ 17

4. Which of the following protocol below are suited for email retrieval?

Answer: Both and b above

5. The process of assigning IP address for specific times to the various hosts by DHCP is called as?

Answer: Lease

6. What are connector symbol ?

Answer: All the above

7. Use of computer resources to intimidate or coerce others, is termed:

Answer: Cyber terrorism

8. A type of cyber crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad’s link.

Answer: Click fraud

9. There may be a maximum of how many character m a data file–

Answer: 40

10. The following is the shortcut key for spelling check–

Answer: F7

11. Two or more computers connected to each other of sharing information form a–

Answer: Network

12. A DVD is an example of a(n)–

Answer: optical disc

13. You must install a(n) ………………….. on a network if you want to share a broadband Internet connection.

Answer: router

14. Execution of two or more programs by a single CPU is know as–

Answer: multiprogramming

15. If you want to connect to your own computer through the Internet from another location, you can use–

Answer: Telnet

16. Before a package can be used in a java program it must be–

Answer: imported

17. Expand CAT related to law

Answer: Cyber applet tribunal

18. Puzzle to Puzzle You' ആരുടെ പുസ്തകം ?

Answer: ശകുന്ദളാ ദേവി

19. മൈക്രോസോഫ്റ്റിന്റെ ആപ്ത വാക്യം ?

Answer: Be what\'s next

20. ആദ്യ ഹൈലെവൽ ലാഗ്വോജ് ?

Answer: FORTRAN

Facebook Page Whatsapp Share Twitter Share Google Plus Share