110 Expected Cyber Law, IT and Computer Questions

110 Expected Cyber Law, IT and Computer Questions

110 Expected Cyber Law, IT and Computer Questions

01. What's the expansion of a Virus? -  Vital Information Resource under Siege.
02. First Known Computer Virus? - Creeper
03. When was Creeper Virus Released? - 1971
04. A program designed to prevent, search for, detect and remove s/w viruses and other malicious s/w is called _____? - Anti Virus
05. Changing of data before or during entry into the computer system is called ____? - Data Diddling.
06. Hacking is an offence as per IT Act 2000 Section _____? - 66
07. An act of using the telephone in an attempt to scan the user into surrendering private and financial credentials is called _____? - Vishing
08. Cyber phishing activity by using Mobile SMS is called _____? - Smishing
09. Ethical computer hackers are called _____? - White Hat Hackers
10. Hackers who break security of a system for non-malicious reasons like testing their own system are called _____? - White Hat Hackers.
11. Hackers who break the security of a system for malicious intend are called _____? - Black Hat Hackers.
12. Hackers who intrude for the sole purpose of notifying the administrator about a security defect in the system is called _____? - Grey Hat Hackers
13. Those who work on a computer are _____? - Liveware
14. National Cyber Security Policy Started in India in the year? - 2013
15. Computer Literacy Day in India is observed on  - 2nd December 
16. First Computer virus infected Microsoft Operating System was _____? - Brain
17. Programs that are designed to display advt on your computer, redirect your research request to advertising websites etc are called _____? - Adware
18. The act of changing electronic information into an unreadable state by using algorithms is called _____? - Data Encryption.
19. India's first cyber forensic lab is situated in  - Tripura
20. The initiative by Govt. of Kerala to fight against Cyber terrorism and cyber attacks is ______? - CERT-K
21. An attempt to acquire sensitive information such as login credentials, account information etc for malicious reasons by masquerading as a trustworthy entity in electronic communication is called ______? - Phishing
22. _____ is essentially same as cyber defamation, except that the alleged defamatory material is posted on the Internet? - Cyber smearing
23. The act of harming or harassing a person via internet in a repeated and deliberate manner is called _____? - Cyberbullying
24 The first cybercrime Police station in Kerala is at _____? - Bangaluru
25. The first cyber crime Police station in Kerala is at _____? - Thiruvananthapuram
26. What is Ice Cream Sandwich? - Android OS 4.0
27. In Trivandrum Techno Park what is TBIC? - Techno Park Business Incubation Centre
28. What is Opera mini? - Mobile phone web browser
29. What is Spam related to e-mails? - Unwanted emails
30. What is 'Arrandale'? - Intel Processor
31. What is the full form of EBT? - Electronic Benefit Transfer
32. Who is the father of free software foundation? - Richard Mathew Stallman
33. Expand SOPA: - Stop online piracy act
34. 'Xoom' is the tablet computer introduced by which company? - Motorola
35. Expand CAT related to law: - Cyber applet tribunal
36. Which is the tablet computer introduced by Amazon? - Amazon Kindle Fire
37. What is F8 related to Facebook? - Annual developers conference
38. What is IMPS banking system? - Inter-banking mobile payment system
39. World computer literacy day is celebrated on  - 2nd December
40. Where is the headquarter of C-DAC? - Pune
41. Share-alike is related to what? - Share-alike is a copyright licensing term
42. Expand FOSS. - Free and Open Source Software
43. What is 'Yandex'? - Search Engine
44. Who developed 'Libre Office'? - The Document Foundation
45. Who Is The Author Of 'Weaving The Web'? - Tim Berners Lee
46. Who Is Known As Human Computer? - Shakuntala Devi
47. 'Do No Evil' Is The Tagline of? - Google
48. First Indian Daily To Get Online Edition? - Deepika
49. What Is Netizen? - Net Citizen
50. Name The Malayalam Web Browser By C-DIT? - Web Darshini
51. The first Indian state started Online Lottery - Sikkim.
52. The first Indian state government started e-Cabinet - Andhra Pradesh.
53.The place where Asian School of Cyber Laws situated - Pune
54. The Slogan of Google - Don't be Evil.
55. The Headquarters of Google situated in - California (USA)
56. World Computer Security Day is celebrated on - November 30
57. National Internet Safety Day Is celebrated on - February 16
58. World Computer Literacy Day is celebrated on - December 2
59. ZIP stands for - Zone Information Protocol
60. The fastest memory in a Computer System - Cache memory
61. The technology which is used in Compact Disks - Laser
62. The computer which defeated Gray Kasparov - Deep Blue
63. GIAS stands for - The Gateway to Internet Access Service
64. The Gateway to Internet Access Service Of India is situated at - Mumbai
65. The first Cyber Police Station in India - Bangalore
66. The first Cyber police station in Kerala - Pattom (Thiruvananthapuram)
67. The first fully Computerised Police station in Kerala - Perurkkada (Thiruvananthapuram)
68. The first fully computerized Panchayat in Kerala - Vellanad (Thiruvananthapuram)
69. The first super computer in the world - CRAY-1
70. The father of Super Computer - Seymour Cray
71. The first supercomputer developed in India - PARAM 8000
72. The first internet movie - Heartbeat
73. The first Computer game - Space War
74. The father of Wi-Fi - Victor Hayes
75. The first Internet provider in India - VSNL
76. Who is known as Father of Indian Information Technology - Rajiv Gandhi
77. Who is known as Father of Indian Super Computer - Vijay P Bhatkar
78. The first Techno Park in India - Thiruvananthapuram
79. The first fully Computer literate Panchayat in Kerala - Chamravattom
80. The first Internet magazine in Malayalam - Puzha.com
81. The technology that is used in CD-ROM - Laser
82. The year which CERT- in(Computer Emergency Response Team India) was introduced-2004
83. The first mobile Virus - Kabeer
84. The founder of  Email - Ray Tomlin son
85. Full form of  NAT - Network Address Translator
86. The number of functional keys on a keyboard - 12
87. Software used to prevent hacking is called - Firewall software
88. Father of Artificial Intelligence - John MC Cathy
89. The first computer graphic used movie - Tron
90. Voice response system is an example of - Input device
91. Computer Memory is normally measured in - Gigabyte
92. Which one is known as the BACKBONE of the World Wide Web - HTTP (Hyper Text Transfer Protocol)
93. Adobe Page Maker is an example of - DTP Software
94. Verification of login name and password is known as - Authentication
95. Alerts mostly appear in - Dialog box
96. The slogan of Sun Micro System - Write Once, Run Anywhere
97. The headquarters of Sun Microsystem - Santa Clare (California)
98. The founder of Computer Chess - Citric G Prince
99. First 4 G service provider in India - Bharat Airtel
100. The founder of JAVA - James A Gosling
101. The founder of Yahoo - Jerry Yang and David Filo
102. The slogan of Microsoft - Be What's Next
103. Headquarters of Microsoft - One Microsoft Way(Washington)
104. The slogan of Intel - Look Inside
105. Headquarters of Intel - Santa Clara (California)
106. Spam is also known as - Junk e-mails
107. IP address means - Internet Protocol
108. Father of  World Wide Web - Tim Burners-Lee
109. The Headquarters of  World Wide Web is situated in - Janeeva
110. The highest memory measurement unit - Geop Byte

Print Friendly and PDF

No comments: