Information Technology (IT) and Cyber laws Notes for University/High Court assistant Exam

0
998

Information Technology (IT) and Cyber laws Notes for University/High Court assistant Exam

±The process of loading the operating system in to computer memory

a)Formatting

b)Booting

c)Phishing

d)Data sharing

±——————- is used to authenticate electronic Records

a)Electronic seal

b)Electronic Badge

c)Electronic signature

d)Electronic ID

±Section 67 A in IT act related to……..

±

a)Hacking

b)Violation of piracy

c)Sending offensive messages

d)Cyber pornography

±Second generation of computer is based on the technology

±

±transistors

±Which of the following is used for email transmission across internet?

a)SMTP

b)POP

c)IMAP

d)FTP

±Where does the computer add and compare its data?

a)Hard disk

b)CPU

c)Memory

d)Floppy disc

±After copying the content, how many times can you paste?

a)Once

b)Twice

c)Zero

d)Many

±Who invented QWERTY keyboard?

a)Carl shoels

b)Christopher latham sholes

c)None of these

±Gate that  is also known as inverter is called

±AND

±NAND

±XOR

±NOT

±Which device in computer can understand difference between data programs?

1.Input device

2.Output device

3.Memory

4.Microprocessor

±——- are specially designed computer that perform complex calculations rapidly

1.Tablets

2.Laptops

3.Super computers

4.Main frames

±Use of electronic messaging system to send unsolicited message is called……..

1.Stalking

2.Spamming

3.Spoofing

4.Bombing

±The command LINUX ‘echo’ is used to….

Display message on the screen

Display a command

Display the date and time

None of the above

±bluetooth  was developed by;

1.Apple

2.Erricson

3.Samsung

4.Nokia

±A 32 bit micro processor has the wordlength equal to …

a)2 byte

b)32 byte

c)4 byte

d)1  byte

you can watch the Video Class here

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.