Information Technology (IT) and Cyber laws Notes for University/High Court assistant Exam
±The process of loading the operating system in to computer memory
±——————- is used to authenticate electronic Records
±Section 67 A in IT act related to……..
b)Violation of piracy
c)Sending offensive messages
±Second generation of computer is based on the technology
±Which of the following is used for email transmission across internet?
±Where does the computer add and compare its data?
±After copying the content, how many times can you paste?
±Who invented QWERTY keyboard?
b)Christopher latham sholes
c)None of these
±Gate that is also known as inverter is called
±Which device in computer can understand difference between data programs?
±——- are specially designed computer that perform complex calculations rapidly
±Use of electronic messaging system to send unsolicited message is called……..
±The command LINUX ‘echo’ is used to….
Display message on the screen
Display a command
Display the date and time
None of the above
±bluetooth was developed by;
±A 32 bit micro processor has the wordlength equal to …
you can watch the Video Class here