Kerala PSC IT and Cyber Laws Questions and Answers

This page contains Kerala PSC IT and Cyber Laws Questions and Answers for psc exam preparations in Malayalam and English.

Click here to read PSC Question Bank by Category wise. Click here to Test your knowledge by atteneding Quiz.
1. Convert to Binary (25)10=

Answer: 11001

2. From the options below, which suits best for MODEM?

Answer: a device that modulates an analog carrier signal to encode digital information

3. TELNET used _________ protocol for data connection

Answer: TCP

4. Which of the following is not harmful for computer?

Answer: Cookies

5. The difference between people with access to computers and the Internet and those without this access is known as the–

Answer: digital divide

6. The PC and the Apple Macintosh are examples of two different ____________________
a. platforms
b. applications
c. programs
d. Storage devices

Answer: applications

7. …………………..are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.

Answer: Servers

8. Reusable optical storage will typically have the acronym–

Answer: RW

9. With the object-oriented (OO) approach, an object encapsulates, or…………………..a programmer.

Answer: hides, the details of an object from

10. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of:

Answer: Cyber Crime

11. The use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization is termed:

Answer: Cyberstalking

12. The primary memory of a personal computer consists of?

Answer: Both ROM and RAM

13. A______is approximately a million bytes?

Answer: Megabyte

14. Changing information by a person/a virus while typing the data, from the way it should be entered is called

Answer: Data diddling

15. Some Functions of the trojans use the ----- protocol

Answer: UDP

16. The Operation of a digital computer is based on the principle of?

Answer: Measuring

17. .INI extension refers to which kind of file?

Answer: System file

18. The term associated with the processing?

Answer: MIPS

19. Unauthorized attempts to bypass the security mechanisms of an information system or network is called?

Answer: Hacking

20. ’Find’ option is available in______Ribbon.

Answer: Home

Click here to read PSC Question Bank by Category wise. Click here to Test your knowledge by atteneding Quiz.