Header Ads Widget

Information Technology (Questions & Answers ) - 06

Information Technology (Questions & Answers ) - 06

751. Which key combination is used to permanently delete a file or folder?

752. A common boundary between two computer systems is known as?

753. Network Interface Card (NIC) is generally used for .........?

754. Which is the web browser developed by Google? 

755. When a computer is turned on, a special type of absolute loader is executed known as ...? 
Bootstrap Loader

756. What is the name of the moving process from the main memory to disk? 

757. The IC chips of computers are usually made of.. .......?

758. What is the valid ending for an MS Word file?

759. What kind of software is Adobe Photoshop?
Graphics software 

760. What is the meaning of 'CC' in the case of e-mail? 
Carbon copy

761. What is the full form of RSS in relation to website feed­back? 
Really Simple Syndication 

762. In connection with mobile communication, what is the full form of CDMA?
Code Division Multiple Access 

763. What is used for denoting the detectable movement of a computer mouse?

764. What is the name of the input/ output device on a computer reserved for communication between the computer opera­tor & the computer? 

765. The peak cell rate (PCR), sustainable cell rate (SCR), & maximum burst size (MBS) are used for the measurement of?

766. What is the name of the stor­age device where the access time is effectively independent of the location of the data? 
Direct Access Storage Device

767. Which input device is used to convert graphic and pictorial data into binary inputs? 

768. What is the purpose of keep­ing electronic devices such as computers & remote-controlled devices on sleep mode?
Reduce power consumption 

769. When some unknown persons send mail in a trustworthy way asking for sensitive information, it is a case of .............?

770. Which is the error message indicating server not found? 
HTTP 404 

771. In a computer, what trans­forms input data into output data? 

772. Which virus is treated as the first computer virus? 
Creeper Virus
• It is a Jamming Program 

773. Which was the first search engine on the Internet?
• Created by Alan Emtage, Bill Heelan and J Peter Deutsch

774. When is world computer liter­acy day celebrated?
December 2nd 

775. World Computer Security Day - 
November 30th 

776. Which one is the first fully supported 64 bit operating System? 
Linux  ( It is a free software which was developed by Linus Bene­dict Trovals.)
• Linux is written in primary C language and assembly language. 

777. What type of software is an operating system?
System software 
• System software coordinates the operations of various hardware components of a
computer. Eg.: Operating system, utility software etc.
• Application software is a type of software that can perform only a pre-defined task. Eg.: Calculator 

778. What is the full form of the first electronic computer ENIAC?
Electronic Numerical Integrator and Calculator 

779. "The illegal copying of licensed software" - this crime is consid­ered as:
Software Piracy
• Hacking- hacking is unauthorized access without the permission of either the rightful owner or person in charge of a computer network.
• Trojan Attack- the program that acts like something useful but do the things that are quite 
dangerous is known as Trojan Attack 

780. In the IT Act, which section deals with the punishment of cyber terrorism? 
Section 66(F)
• Section 65: Tampering with computer documents
• Section 66: Hacking 
• Section 66 A: Punishment • Section 66 D: Cheating by personation using computer resources 
• Section 66 E: Violation of privacy
• Section 66 F: Acts of Cyber Terrorism 
• Section 67 A: Pornography
• Section 67 B: Child Pornog­raphy
• The Supreme Court has struck down Section 66A of the IT Act as it was unconsti­tutional

781. What is the process of loading the operating system files into dynamic random access mem­ory?
• Booting is the process of loading the operating system files into dynamic random access memory or computer main memory. It takes place each time computer is switched On.
• 2 types of Booting: Warm Booting - When the operating system alone is restarted after a system crash is called Warm booting 
Cold Booting - When the computer is started after being switched off is called Cold Booting. 

783. Which technology is used in the processor of a computer to simulate a single processor into two virtual processors to the operating system?
Hyperthreading Technology 

784. IBM 1401 is a .............generation computer.
Second-generation computer
• In the second generation main devices used in comput­ers were transistors. The time period of second-generation computers is 1956 - 1965. 

785. In 1983 who defined the term 'computer virus? 
Fred Cohen

786. When IT Act 2000 of India came into force?
17th October 2000
• IT Act 2000 was enacted on 9th June 2000. But it came into force on 17th October 2000. It had 13 chapters, 94 sections and 4 schedules. In 2008 it is amended and known as Information Technology 

787. A printer is which kind of a device? 
• Some examples for output devices are i- Monitor, Speak­er, plotter, Projector, head­ phone etc. 
• Examples for Input devices are keyboard, mouse, scanner, web camera, microphone etc. 

788. NotePad is a for Microsoft Windows. 
Text Editor
• MS Word is used for word processing purposes and the file created in MS Word is known as Document.
• MS Excel is used as an electronic spreadsheet and the file created in it is known as Workbook 

789. Software that allows the user loads a web program is called: 
• Examples for Browsers are Opera, Google Chrome, Mozilla Firefox, Safari Epic, Netscape Navigator etc.

790.  The first Web Browser in the world is Nexus. 

791. The first Web Browser in India is Epic

792. The fastest Web Browser is Safari. 

793. PROLOG is a computer lan­guage used for ..... 
Artificial Intelligence 
• PROLOG is a high-level programming language de­signed by Alain Clement Ader.
• COBOL is used for business purposes. The full form of COBOL is Common Business Oriented Language. 
• FORTRAN is the first implemented high-level pro­gramming language and it is the abbreviation for Formula Translation. 

794. Programmed instruction to the computer is known as: 
• Data - it is the collection of facts and figures 

795. Expansion of UNIVAC is: 
Universal Automatic Com­puter 

796. The binary number of the decimal number 15 is: 
• The base of the Binary number system is 2, ie use only 0 and 1. The base of the dec­imal number system is 10, ie. 

797. 1's complement of binary value 1011 is: 
• 1's complement of the binary value is obtained by changing 1 to 0 and 0 to 1. 

798. In a client/ server computer network, the user's computer is usually called: 
• Server is the powerful com­puter that provides services in a network, 

799. The extension of '.com', '.edu', '.org' etc are usually called: 
Domain name 
• IP address is the numerical address used for identifying resources of the internet. It is hav­ing four sections of one-byte length (Total 3 2 bits).
• Network is an interconnec­tion of computers. The devices connected to the network is known as a node. 

800. FTP stands for: 
File transfer protocol 
• It is used for sending the big files over the internet 

801. What is the objective of fire­ wall protection? 

802. When a key is pressed on the keyboard, which standard is used for converting the keystrokes into corresponding bits? 
• It is the abbreviation for American Standard Code for Information Interchange. 
• ASCII-7 and ASCII-8 are available. ASCII-7 can handle 128-bit data, while ASCII-8 
• Light Amplification by Stimulated Emission of Elec­tromagnetic Radiation 
• LASER was discovered by Theodore Maiman. 

803. The program which is as permanent as hardware and stored in ROM is known as : 
• It is the combination of persistent memory and program code and data can be stored in it.

804. Which access method is used for obtaining a record from a cassette tape?

805. identifies a specific webpage and its computer on the Web.
• Uniform Resource Locator is a standard way of identi­fying and locating internet resources on the world wide web. It includes letters, num­bers and punctuations. 

806. An optical input device that interprets pencil marks on paper media is :
OMR-Optical Mark Reader 

807. A computer program that converts an entire program into machine technology is called:
• It takes the entire program as input at a time and converts it into machine language, while an interpreter can convert single instruction at a time into machine language. 

808. A is approximately one billion bytes:

809. An error in software or hard­ware is called a bug. What is the alternate computer jargon for it?

810. VOIP is a technology for :
Making phone calls over the internet
• VoIP- Voice Over Internet Protocol 

811. Which institution is credited with the development of www? 

812. Which is the primary law in India dealing with cybercrime & electronic commerce? 
IT Act, 2000 

813. What was the total number of Sections in the original IT Act, 2000? 94 Sections Which Section of the IT Act 2000 deals with cyber terrorism? 
Section 66F 

814. An unauthorized intrusion into a computer or a network is known as ......... 

815. Which primary component of the computer runs the operating system & applications? 
CPU (Central Processing Unit) 

816. What is the full form of FPU? 
Floating Point Unit 

817. ......... are typically used to measure the performance of a computer processor. 
FLOPS (Floating Point Operations Per Second)

818. ...... is the rate at which a processor can complete a processing cycle. 
Clock speed 

819. What is SSD? 
Solid State Drive 

820. Which is the most common type of storage device in computers? 
Hard drive 

821. What is the fullform of 'SD in SD Cards? 
Secure Digital 

822. The keyboard layout in a computer is known as ......... design. 

823. Which are the modifier keys in a keyboard? 
Shift, function, control, alt, command & option 

824. Which key is used for capitalizing letters & entering different types of symbols? 

825. In Windows, which key is used for entering keyboard shortcuts? 
Control (Ctrl) 

826. By pressing Alt+F4, we can usually ........ a window. 

827. Which online encyclopedia was launched by Jimmy Wales and Larry Sanger in 2001?

828. Which is the largest online encyclopedia in the world? 

829. Which is the world's largest online social networking service in the world? 

830. Which famous social networking service was founded by Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes in 2004? 

831. Which is the world's leading messaging app for smartphones? 

832. Who were the founders of WhatsApp? 
Jan Koum and Brian Acton 

833. Name the world's leading E-commerce company founded by Jeff Bezos in 1994? 

834. Which IT company was founded by Steve Jobs, Steve Wozniak and Ronald Wayne in 1976 to develop personal computers? 
Apple Inc. 

835. Who has been referred to as 'the Father of the Digital Revolution and the Master evangelist of the Digital Age"? 
Steve Jobs 

836. Which Chinese multinational computer technology company was founded by Liu Chuanzhi? 

837. Who is considered the "Father of the Cell Phone'? 
Martin Cooper 

838. Who was the first person in history to make a handheld cellular phone call in public?
Martin Cooper 

839. Which company brought out the world's first cell phone? 

840. Which American entrepreneur and inventor is known as the First Lady of Wireless'? 
Arlene Harris 

841. Name the e-mail service founded by Sabeer Bhatia in 1996? 

842. In 1997, which IT company acquired the Hotmail services? 

843. In 2013, which e-mail service replaced Hotmail? 

844. Which company are the world's leading chip and microprocessor maker in the world? 
Intel Corporation 

845. Who were the founders of the Intel Corporation in 1968? 
Gordon Moore and Robert Noyce 

846. Which company created the world's first commercial microprocessor chip in 1971? 
Intel Corporation 

847. Which multinational corporation specializing in Internet-related services and products was founded by Larry Page and Sergey Brin in 1998? 

848. The formal corporate motto of Which IT company is 'Don't be Evil? 

849. Which world-famous Internet corporation was founded by Jerry Yang and David Filo in January 1994? 
Yahoo Inc. 

850. Which world-famous search engine was initially named "Jerry and David's Guide to the World Wide Web? 

851. Measured by revenues, which is the world's largest software maker? 
Microsoft Corporation 

852. Name the world's leading computer software company founded by Bill Gates and Paul Allen in 1975? 

853. Which IT company is nicknamed 'Big Blue' by the securities analysts? 

854. Name the former Vice President of America who called the Internet 'the Information Superhighway? 
Al Gore 

855. Safer Internet Day is organised by Insafe in February every Year. In 2015, Safer Internet Day is observed on .......... 
February 10 

856. World Computer Literacy Day: 
December 2 

857. Which company provides commercial web traffic data and global ranking of websites by use? 
Alexa Internet Inc. 

858. WeChat, Viber and LINE are the examples of ........... 
Instant messaging apps 

859. Which Indian born American scien­tist is known as 'the Father of Fiber Optics'?
Narinder Singh Kapany 

860. Who coined the term 'fibre optics' in the year 1956? 
Narinder Singh Kapany

861. What is the full form of E-mail? 
Electronic mail

862. Which American computer program­mer invented email in 1971?
Ray Tomlinson 

863. Which English computer scientist is known as the inventor of the World Wide Web?
Tim Berners Lee 

864. Which American scientist is known as 'the Father of the Internet'? 
Vinton Cerf

865. Which American scientist is known as 'the Father of the Personal Computer'?
Henry Edward Roberts 

866. Who is known as 'the Father of Supercomputing'? 
Seymour Cray

867. Who invented the computer mouse? 
Douglas Engelbart 

868. A set of instructions that directs the computer to process information is called - ---- -? 

869. What is the name of the software designed to operate & control the computer hardware and to provide a platform for running application software? 
System software

870. Which are the two parts of the system software?
Operating system & Language trans­lator 

871. What is the most important software that runs on a computer?
Operating system 

872. manages the computer's memory, process and all of its software & hard­ ware?
Operating system 

873. What is DOS?
Disk Operating System 

874. A single user, a single-tasking operating system with basic Kernel's functions and only one program at a time can run on it is called-------? 
Disk Operating System

875. Which company's graphical operating system is Mac OS ?

876. Which company developed the operating system Windows?

877. Which is an operating system based on Linux Kernel and designed primarily for touch screens mobile devices such as smartphones and tablet computers? 

878. Initially developed by Android Inc, which company bought the Android operating system in 2005?

879. What translate the symbolic codes of programs of assembly language into machine language?

880. Which program translates the whole source program written in some high-level language into machine code at a time?

881. What is the name of the program that executes the instructions written in a high-level language into machine code as line by line instructions? 

882. What is the name of the software which helps to maintain & control computer resources?
Utility Software 

883. Antivirus software, Disk tools & Back­ up software are examples of which software? 
Utility software

884. A user-defined specific of computer software that employs the capabilities of a computer directly to a task that the user wishes to perform is called --- ----? 
Application software

885. MS Office, Excel & PowerPoint are examples of which software?
Application software 

886. Which type of software is sometimes known as 'off-the-shelf' software?
General Purpose Software 

887. What is the name of the computer network covering a small physical area ( 1 Km or less)? 
Local Area Network (LAN)

888. A larger computer network that usually spans a city or a larger campus (5 to 15 km) is known as-------?
MAN (Metropolitan Area Network) 

889. What is the name of the computer net­ work that covers a broad area (cross metropolitan or regional boundaries)?
Wide Area Network (WAN) 

890. What is the name of the technology for using the internet or another intermedi­ate network to connect computers to isolated remote computer networks? 
VPN (Virtual Private Network)

891. What is the global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication proto­cols? 

892. Which network later became the basis for the Internet?

893. In which year was the Internet services launched in India? 

894. Which telecom company was the first to provide Internet services in India? 
VSNL (Videsh Sanchar Nigam Limited) 

895. Which command is given to reboot the computer? 

896. In windows, the key combination to close a window is?

897. What is the shortcut key to open the open dialogue box? 

898. What is the full form of MPEG? 
Moving Picture Experts Group

899. JPEG stands for? 
Joint Photographic Experts Group

900. PDF stands for? 
Portable Document Format 
PSC Solved Question Papers ---> Click here 
PSC TODAY's EXAM RESULTS ---> Click here
PSC Degree Level Questions & Answers - Click here
PSC 10th, +2 Level Questions & Answers - Click here
TEACHING APTITUDE TEST (K-TET, C-TET,, etc.) ---> Click here

Post a Comment