Search This Blog

Saturday 21 April 2018

PSC REPEATED IT Questions & Answers

Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

Information Technology Questions asked in

Kerala PSC

1. The number of functional keys in a key board:

(a) 9 (b) 10 (c) 11 (d) 12

Answer: (d)

2. The top most bar in any application window is the ____ which displays the

name of the document or application:

(a) Status bar (b) Tool bar

(c) Menu bar (d) Title bar

Answer: (d)

3. ____ is not a point device.

(a) Joystick (b) Light pen

(c) Key board (d) Mouse

Answer: (c)

4. When the pointer is positioned on a ____, it is shaped like a hand.

(a) Screentip (b) Hyperlink

(c) Formatting error (d) None of these

Answer: (b)

5. The copy,cut and paste features use keyboard short cuts with the ____ key and

a keyboard letter.

(a) Shift (b) Windows (c) Alt (d) Ctrl

Answer: (d)

6.. A graphical bar displayed across the top of the document window:

(a) Scale (b) Bar (c) Slide (d) Ruler

Answer: (d)

7. Computer and internet usage in the area of market known as:

(a) E-Commerce (b) E- Literacy

(c) E-groups (d)None o f these

Answer: (a)

8. Pick the odd one out:

(a) Mouse (b) Printer

(c) Image scanner (d) Keyboard

Answer: (b)
________________________________________________________
Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

________________________________________________________

9. Identify the one which is not a mouse operation:

(a) Clicking (b) Dragging

(c) Drawing (d) None of these

Answer: (c)

10. _____ are capable of capturing live video and transfer it directly to the

computer.

(a) Monitors (b) Webcams

(c) Scanners (d) Printers

Answer: (b)

11. Most websites have a main page, the _____, which acts as a doorway to the rest

of the website pages:

(a) Search engine (b) Home page

(c) Browser (d) URL

Answer: (b)

12. The diagram which represents the order of functions in a program is called a:

(a) Sequence of steps (b) Software design

(c) Algorithm (d) Flow chart

Answer: (d)

13. The basic unit of a work sheet into which you enter data in Excel is called a:

(a) Tab (b) Cell (c) Box (d) Range

Answer: (b)

14.Address of the first cell in the work sheet is:

(a) 1 (b) A (c) A1 (d) 1A

Answer: (c)

15. When a computer suddenly stops working, it is said to be:

(a) Crashed (b) Bugged

(c) Hanged (d) Held up

Answer: (c)

16. Paint brush belong to:

(a) Accessories group (b) Application group

(c) Main group (d) None of these

Answer: (b)

17. CPU gets the address of the next instruction to be processed from:

(a) Instruction register (b) Memory address register

(c) Index register (d) Program register

Answer: (d)
_______________________________________________________
Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________
18. The internet allows you to:

(a) send electronic mail (b) view web pages

(c) connect servers all around the world (d) All of these

Answer: (d)

19 .What are the speakers attached to your com- puter used for:

(a) Displaying images (b) Sending messages

(c) Storing messages (d) Handling sound and music

Answer: (d)

20. The smallest unit in the computer which represents information is:

(a) Byte (b) Bit (c) Character (d) Digit

Answer: (b)

21. The concept of stored program was given by:

(a) Von Neuman (b) Charles Babbage

(c) Blaise Pascal (d) None of these

Answer: (a)

22. Who is known as ‘the father of personal computer’?

(a) Charles Babbage (b) Henri Edward Roberts

(c) Alan Turing (d) Edgar Rice Boroughs

Answer: (b)

23. The first computer virus:

(a) Kabir (b) Firewall (c) Norton (d) Elk Cloner

Answer: (d)

24. A compiler translates a program written in a high-level language into:

(a) Java (b) Algorithm

(c) Machine language (d) A debugged program

Answer: (c)

25. The vast network of computers that connects millions of people all over the

world is called:

(a) OUAN (b) Hypertext (c)Interpo l(d) Internet

Answer: (d)

26. What type of devices are computer speakers and headphones?

(a) Input (b) Input/output

(c) Software (d) Output

Answer: (d)

_______________________________________________________
Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

27. Who discovered Unix operating system?

(a) Angelbart (b) Paul Allen

(c) Dennis Ritchie (d) John Newman

Answer: (c)

28. The _____ of system includes the programs and instructions.

(a) Icon (b) Hardware

(c) Software (d) Information

Answer: (c)

29. What is the full form of USB?

(a) Universal Security Block (b) Ultra Serial Block

(c) United Service Block (d) Universal Serial Bus

Answer: (d)

30. Which of the following is a Web Browser?

(a) Paint (b) Fire fox

(c) Power Point (d) Word

Answer: (b)

31. Computer is a/an:

(a) Mechanical device (b) Electrical device

(c) Electronic device (d) None of these

Answer: (c)

32. Back up of a data file will help to prevent:

(a) Loss of confidentiality (b) Duplication of data

(c) Virus attack (d) Loss of data

Answer: (d)

33. A program for viewing a web page is called:

(a) Word processor (b) Spreadsheet

(c) Protocol (d) a browser

Answer: (d)

34. A repair for a known software bug, usually available at no charge on the

internet, is called:

(a) Version (b) Ad-on

(c) Tutorial (d) Patch

Answer: (d)

35. Alta Vista is a:

(a) Programme (b) Software

(c) Browser (d) Search engine

Answer: (d)

_______________________________________________________
Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

36. Text in a column generally aligned:

(a) Right (b) Left

(c) Centre (d) Justified

Answer: (d)

37. Which of the following is the only language that a computer can understand?

(a) High level language (b) Pseudo code

(c) Machine language (d) Assembly language

Answer: (c)

38. Which one of the following has the smallest storage capacity?

(a) Zip disk (b) Hard disk

(c) Floppy Disk (d) Data cartridge

Answer: (c)

39. Which one of the following is not a computer programming language?

(a) C (b) C++

(c) Java (d) Microsoft

Answer: (d)

40. The term used to describe the intangible instructions that will tell the

computer what to do is:

(a) Hardware (b) Software

(c) Storage (d) Input/output

Answer: (b)

41. Which of the following is an important open source Operating system?

(a) DOS (b) Windows

(c) LINUX (d) SPSS

Answer: (c)

42. The process of adopting software for a particular country or region is called

———.

(a) Localization (b) Networking

(c) Blog (d) None of the above

Answer: (a)

43. The application software used to make calculations:

(a) MS Word (b) MS Power Point

(c) MS Excel (d) CorelDraw

Answer: (c)

44._____ is the set of programs necessary to carry out operations for a specified

application:

(a) Application software (b) Operating System

(c) Hardware (d) Utility

Answer: (a)

45. The folder to which an office application save file by default is:

(a) Desktop (b) My documents

(c) My computer (d) None of these

Answer: (b)

46. The initiative of the US government which is considered as the early form of

internet:

(a) ULTRANET (b) CARPANET

(c) HARPANET (d) ARPANET

Answer: (d)

47. World Computer Security Day:

(a) October 30 (b) November 30

(c) December 30 (d) January 30

Answer: (b)

48. This is the exclusive right granted by statute to the author of the works to

reproduce dramatic, artistic, literary or musical work or to authorize its

reproduction by others:

(a) Patent (b) Copy Right

(c)Trade Mark (d) None of the above

Answer: (b)

49. Feeling guilty or defensive about our internet use is a symptom of ________.

(a) Cyber addiction (b) Net Gaming

(c) Online-Chatting (d) Cyber crime

Answer: (a)

50._______ are a bundle of exclusive rights over creations of the mind, both

artistic and commercial:

(a) Intellectual property rights (b) Copyright

(c) Patent (d) Trademark

Answer: (a)

51. Digital images are entered into the computer using ____

(a) Keyboard (b) Speaker

(c) Scanner (d) Digital Camera

Answer: (d)

52.Spell check is the under ___ menu.

(a) Tool (b) Format

(c) Edit (d) View

Answer: (a)

53.Hotmail was created by:

(a) Bill Gates (b) Sabir Bhatia

(c) Berners Lee (d) Richard Stallman

Answer: (b)

54. Which one of the following is not an internet browser?

(a) Mozilla (b) Internet explorer

(c) Windows Explorer (d) Netscape Navigator

Answer: (c)

55. The domain name for government organisations is:

(a) .gov (b).govnt

(c) .com (d) .org

Answer: (a)

56. Which one of the following is not an input device?

(a) Mouse (b) Keyboard

(c) Barcode reader (d) Monitor

Answer: (d)

57. The full form of U.P.S.

(a) Uniform Power Supply

(b) Uninterrupted Power Supply

(c) Universal Power Supply

(d) Unidirectional Power Supply

Answer: (b)

58. The domain name for government institutions:

(a) org (b) gov (c) com (d) firm

Answer: (b)

59. Which device is used to display graphics and information on video screen?

(a) CPU (b) Modem (c) Scanner (d) Monitor

Answer: (d)

60. The programs or instructions that tells the computer what to do:

(a) Software (b) Hard

(c) Virus (d) mailmerge

Answer: (a)

61. Compact Disc was invented by:

(a) James T.Russel (b) Sabir Bhatia

(c) Ray Tomlinson (d) Marcony

Answer: (a)

62. A device that connects to a network without the use of a cable is said to be:

(a) Distributed (b) Centralised

(c) Open source (d) Wireless

Answer: (d)

63. The main system board of a computer is called:

(a) Integrated circuit (b) Motherboard

(c) Processor (d) Microchip

Answer: (b)

64. A website address is a unique name that identifies a specific ____ on the web.

(a) Web browser (b) Website

(c) PDA (d) Link

Answer: (b)

65. ____ is processed by the computer into information:

(a) numbers (b) processor

(c) input (d) data

Answer: (d)

66. The name a user assigns to a document is called a(n):

(a) Filename (b) Program

(c) Record (d) Data

Answer: (a)
_______________________________________________________
Youtube.com/Tech Zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

67. A class that inherits a base class containing virtual function is called:

(a) Virtual (b) Polymorphic

(c) Derived (d) Base

Answer: (b)

68. Division is carried out in computer by:

(a) Reverse multiplication (b) Repeated subtraction

(c) Repeated addition (d) None of these

Answer: (b)

69.____ is the part of the computer that does the arithmetical calculations.

(a) OS (b) ALU

(c) CPU (d) Memory

Answer: (b)

70. Which of the following is not an example of hardware?

(a) WORD (b) Printer

(c) Monitor (d) Mouse

Answer: (a)

71. Graphics are inserted in:

(a) Frame (b) Box

(c) Page (d) None of these

Answer: (a)

72. RTF stands for:

(a) Real Time Fonts (b) Real Time Files

(c) Rich Text Format (d) Rich Text Fonts

Answer: (c)

73.To save a document in the first time, ____ option is used.

(a) Save first (b) Save as

(c) Save on (d) Copy

Answer: (b)

74. What does an electronic spread sheet consists of (Choose the best answer):

(a) Rows (b) Columns

(c) Cells (d) All of these

Answer: (d)

75.Screen savers program prevent:

(a) Brownouts (b) Burn-in

(c) Screen flickering (d) Bad sectors

Answer: (b)

76. Antivirus software is an example of ____

(a) Business software (b) An operating system

(c)A security utility (d) An office suite

Answer: (c)

77.The ____ is the box that houses the most important parts of a computer

system?

(a) Software (b) Hardware

(c) Input device (d) System unit

Answer: (d)

78.A menu contains a list of:

(a) Commands (b) data

(c) objects (d) reports

Answer: (a)

79.Modem refers to:

(a) Modulator

(b) Modulation

(c) Modulator and demodulater

(d) Modern modes of communication

Answer: (c)

80.A temporary storage area used to hold information that is being transferred

from one program to another:

(a) Clip board (b) Buffer

(c) Memory (d) Swap

Answer: (a)

81. Which company developed MS WORD?

(a) Linux (b) Apple (c) Compac (d) Microsoft

Answer: (d)

82. RAM stands for:

(a) Random Approach Memory

(b) Random Access Memory

(c) Read Access Memory

(d) Rapid Access Memory

Answer: (b)

83. Computers connected to a LAN :

(a) run faster (b) go online

(c) share information and/or share peripheral equipment

(d) e-mail

Answer: (c)

84. All physical equipment and accessories of a system:

(a) Software (b) Hardware

(c) Peripherals (d) Internet

Answer: (b)

85. A collection of programs that controls how your computer system runs and

processes information is called:

Page 11 of 43

(a) Compiler (b) Interpreter

(c) Office (d) Operating system

Answer: (d)

86. Which of the following languages is frequently used to design web pages?

(a) COBOL (b) C

(c) PASCAL (d) JAVA

Answer: (d)

87. Floppy Disc is usually located in—— drive.

(a) A (b) B (c) C (d) D

Answer: (a)

88. URL stands for:

(a) Uniform Resource Locator

(b) Universal Reference Locator

(c) Universal Resource Language

(d) Uniform Reference Locator

Answer: (a)

89. In the abbreviation ‘HTML’, the letter ‘m’ stands for:

(a) Markup (b) Method (c) Meta (d) Machine

Answer: (a)

90. When you save to this, your data will remain intact even when the computer

is turned off:

(a) RAM

(b) Motherboard

(c) Secondary storage device

(d) Primary storage device

Answer: (c)

91. A computer cannot perform which one of the following functions?

(a) Addition (b) Division

(c) Bake a cake (d) Subtraction

Answer: (c)

92. The primary purpose of the software is turn the data into:

(a) Websites (b) Information

(c) Programs (d) Objects

Answer: (b)

93. The components of a computer system with the circutry to control in control

interpretation and execution of instructions is known as:

(a) ALU (b) Memory (c) Control (d) CPU

Answer: (d)

94. ‘Megabytes’ is the unit for measuring which of the following:

(a) Intensity of earth quake

(b) Memory capacity of a computer

(c) Intensity of wave length

(d) None of these

Answer: (b)

95. Most of the commonly used personal computers/ laptops do not have a

command key known as:

(a) Turnover (b) Shift (c) Alter (d) Delete

Answer: (a)

96. The father of Super Computer:

(a) Charles Babbage (b) Glen Ricort

(c) Seymor Cray (d) Winton Surf

Answer: (c)

97. The heart of any computer is:

(a) Memory (b) CPU

(c) I/O Unit (d) Disks

Answer: (b)

98. The word ‘Computer’ is originated from ......... language.

(a) German (b) Italian

(c) Latin (d) Spanish

Answer: (c)

99. What is the default file extension for all Word documents?

(a) WRD (b) TXT (c) DOC (d) FIL

Answer: (c)

100. Email stands for:

(a) Educational mail (b) Electronic mail

(c) Entertainment mail (d) Excess mail

Answer: (b)

101. Programming errors generally fall into which of the following categories?

(a) Syntax errors (b) Execution errors

(c) Logical errors (d) All of these

Answer: (d)

102.The process of transferring files from a computer on the internet to your

computer is called:

(a) Downloading (b) Uploading

(c) Downsize (d) JPEG

Answer: (a)

103. Which of the following is the fastest printer?

(a) Laser (b) Ink Jet (c) Dot-matrix (d) Plotter

Answer: (a)

104. The most common type of storage devices are:

(a) Persistent (b) Optical

(c) Magnetic (d) Flash

Answer: (c)

105. Unsolicited commercial email is commonly known as:

(a) Spam (b) Junk (c) Hoaxes (d) Hypertext

Answer: (a)

106. What is the full form of ATM?

(a)Automated Tailoring Machine

(b) Any Time Money

(c) Automated Teller Machine

(d) All Time Money

Answer: (C)

107. The most popular way to materialize XML document is to use:

(a)DTD (b) XSLT

(c) HTML (d) SOAP

Answer: (b)

108. To open the font dialogue box in MS Word, we can use the short cut key:

(a)Alt+F (b) Ctrl+F

(c) Ctrl+D (d) Alt+D

Answer: (C)

109. Who was the inventor of mechanical calculator for adding numbers?

(a)Charles Babbage (b) Pascal

(c) Peano (d) De Morgan

Answer: (b)

110. In a DTP software, to strech as short title of a paper across the page, use the

_____ option.

(a)Expanded (b) Proportional

(c) Scale (d) Horizontal Algnment

Answer: (a)

111. RAD stands for:

(a)Repeated Application Development

(b) Ready Application Development

(c) Relative Application Development

(d) Rapid Application Development

Answer: (d)

112. What is I-beam?

(a)A pointer used to select text (b) A special tool used in animations

(c) Transitions (d) None of these

Answer: (a)

113. All the information collected during database development is stored in a:

(a)Data path (b) Data warehouse

(c) RAD (d) CASE

Answer: (b)

114. Primary key is selected from the:

(a)Candidate keys

(b) Composite keys

(c) Determinants

(d) Foreign keys

Answer: (a)

115. The personal computer industry was started by:

(a)IBM (b) Apple

(c) HLC (d) Compaq

Answer: (a)

116. As compared to the secondary storage devices, primary storage units have:

(a)Faster (b) Costlier

(c) Less storage capacity (d) All of the above

Answer: (d)

117. Which of the following does not affect the resolution of a video display

image?

(a)Band width

(b) Raster scan rage

(c) Vertical and horizontal lines of resolution

(d) Screen size

Answer: (d)

Page 15 of 43

118. What is the name of the operating system for

laptop computer called MacLite?

(a)MS-DOS (b) Windows-NT

(c) OZ (d) Windows-XP

Answer: (C)

119. The number of processes completed per unit time is known as:

(a)Hit ratio (b) Efficiency

(c) Capacity (d) Throughput

Answer: (d)

120. The altering of data so that it is not usable unless the changes are undone is:

(a)Biometrics (b) Ergonomics

(c) Encryption (d) Compression

Answer: (C)

121. Two main measures for the efficiency of an algorithm are:

(a)Data and space

(b) Complexity and capacity

(c) Time and space

(d) Capacity and cost

Answer: (C)

122. The CPU communicates with the memory using:

(a)Control bus (b) Data bus

(c) Address bus (d) All of the above

Answer: (d)

123. A very large initial letter of the first word of the paragraph is called:

(a) Drop cap (b) Dropped

(c) Capital (d) Figure

Answer: (a)

124. In addition to slide tab in Normal View, which allows a user to select slides

in MS Power Point?

(a)Slide show (b) Print preview

(c) Outline (d) Slide sorter

Answer: (d)

125. Which of the following is not a part of the operating system?

(a)Network system (b) Kernel

(c) Shell (d) File system

Answer: (a)

Page 16 of 43

126. A strip of buttons across the top of the main window in MS Power Point is

called:

(a)Menu bar (b) Tool bar

(c) Status bar (d) Ribbon

Answer: (d)

127. Which of the following is an abstract data type?

(a)Int (b) Double

(c) String (d) Class

Answer: (d)

128. The start button and system tray are part of what feature of Windows?

(a)Quick launch bar (b) Menu bar

(c) Task pane (d) Task bar

Answer: (d)

129. Which of the following is not a computer language?

(a)LOTUS (b) BASIC

(c) COBOL (d) FORTRAN

Answer: (a)

130. Microsoft Word contains built in paragraph formats called:

(a)Gutters (b) Styles

(c) Bullets (d) Formats

Answer: (b)

131. The charecter spacing tab is located in the _____ dialogue box in Microsoft

Word:

(a)Text (b) Format

(c) Font (d) Word Art

Answer: (c)

132. Which of the following is a semi conductor memory?

(a)MAR (b) RAM

(c) CD (d) CD-ROM

Answer: (b)

133. What does MBR stands for:

(a)Memory Bus Register

(b) Master Boot Record

(c) Microsoft Buffer Register

(d) None of the above

Answer: (b)

134. The dispatcher:

(a)Schedules the tasks into the processor

(b) Puts tasks in I/O wait

(c) Is small and simple

(d) Never changes task priorities

Answer: (a)

135. In Windows, tool used for managing files and folders are called:

(a)Windows Explorer (b) File System

(c) My computer (d) My documents

Answer: (a)

136. The file system ‘NTFS’ stands for:

(a)New Type File System

(b) Non Terminated File System

(c) Never Terminated File System

(d) New Technology File System

Answer: (d)

137. A slide show begins with the:

(a)Animated slide (b) Current slide

(c) Bulletted slide (d) First slide

Answer: (d)

138. The system program that sets up an executable program in main memory

for execution is:

(a)Assembler (b) Linker

(c) Compiler (d) Loader

Answer: (d)

139. A DBMS that combines a DBMS and an application generator is:

(a)MS-SQL Server (b) MS-Access

(c) DB-2 (d) Oracle

Answer: (b)

140. In satellite based communication, VSAT stands for:

(a)Very Small Analog Terminal

(b) Very Small Aperture Terminal

(c) Very Small Audio Terminal

(d) Varying Size Aperture Terminal

Answer: (b)

141. Which is the incorrect statement?

_______________________________________________________
Youtube.com/Tech Zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

(a)RAM is Random Access Memory

(b) RAM is volatile

(c) We cannot perform read operations in RAM

(d) RAM is directly accessed by the CPU

Answer: (c)

142. In software development, if requirements are frequently changing, which

model is best suited?

(a)Waterfall (b) Spiral

(c) RAD (d) Prototype

Answer: (d)

143. How can you save a file with a new name in MS Excel?

(a)Using save as menu

(b) Using save menu

(c) Using copy and paste options

(d) Using cut and paste options

Answer: (a)

144. A term associated with the comparison of processing speeds of different

computer systems is:

(a)EFTS (b) MIPS

(c) CFPS (d) MPG

Answer: (b)

145. Which allows wireless mobile devices to access the internet and its services

such as the web and e-mail?

(a)TCP/IP (b) Ethernet

(c) WAP (d) Token ring

Answer: (c)

146. Which of the following is second generation of computers?

(a)EDSAC (b) IBM-1401

(c) CDC-1604 (d) ICL-2900

Answer: (c)

147. ‘DOS’ floppy disk does not have:

(a)Boot record (b) File allocation table

(c) Root directory (d) Virtual memory

Answer: (d)

148. Which operation is not possible on data structures?

(a)Traversing (b) Reading

(c) Insertion (d) Deletion

Page 19 of 43

Answer: (b)

149. What is the full form of POST?

(a)Program Oriented System Testing

(b) Print On Self Test

(c) Private Office Software Trainee

(d) Power On Self Test

Answer: (d)

150. Windows 7 was released in:

(a)2001 (b) 2009 (c) 2007 (d) 2006

Answer: (b)

151. Charles Babbage invented:

(a) Electronic computer (b) Analytical engine

(c) ENIAC (d) IBM

Answer: (b)

152. A multidimensional database model is used most often in which of the

following models?

(a)Data warehouse (b) Relational

(c) Network (d) Hierarchical

Answer: (a)

153. What will appear on screen, if you press Shift+5?

(a) % (b) &

(c) * (d) #

Answer: (a)

154. Resolution of externally defined symbol is performed by:

(a)Compiler (b) Linker

(c) Assembler (d) Loader

Answer: (b)

155. Word Art is available on the _____ tab.

(a)Insert (b) Format

(c) Clip Art (d) Graphics

Answer: (a)

156. In fiber optical cable, data is transferred in the form of:

(a)Light (b) Charge

(c) Electricity (d) Sound

Answer: (a)

Page 20 of 43

157. Which type of the folder view displays complete information about a folder

in Windows Environment?

(a)List view (b) Large icons view

(c) Details view (d) None of the above

Answer: (c)

158. The financial business transaction that occur over an electronic network is

known as:

(a)E-commerce (b) Online shopping

(c) Online auction (d) Intenet banking

Answer: (a)

159. In MS Word, the file that contains the form letter is called as:

(a)Data source (b) Main document

(c) Word Field (d) None of these

Answer: (b)

160. MPIS stands for:

(a)Multiple Instructions Per Second

(b) Multiple Instruction Processing System

(c) Million Instructions Per Second

(d) None of these

Answer: (c)

161. Which of the following is classified as an impact printer?

(a)Daisy wheel printer (b) Laser printer

(c) Thermal printer (d) All of the above

Answer: (a)

162. Outlook Express is a/an:

(a)E-mail client (b) Scheduler

(c) Address book (d) All of these

Answer: (a)

163. The number of digits in a number system is called:

(a)Byte (b) Bit

(c) Component (d) Base

Answer: (d)

164. Paragraph formatting options include all of the following except:

(a)Spell Check (b) Line Spacing

(c) Alignment (d) Pagination

Answer: (a)

Page 21 of 43

165. What is the shape of the mouse pointer when drawing a table in MS Word?

(a)Pencil (b) Black plus

(c) Arrow (d) None of these

Answer: (a)

166. In Internet the files are transferred using the protocol:

(a)HTTP (b) TCP/IP (c) DHCP (d) FTP

Answer: (d)

167. What is a screen tip?

(a)The text displayed on the task bar

(b) Object’s name or description that appears when you point to it

(c) This message displayed when you open a software

(d) None of these

Answer: (b)

168. In which printer heated pins are used to print characters?

(a)Dot matrix printer (b) Chain printer

(c) Thermal printer (d) Daisy wheel printer

Answer: (c)

169. PPP stands for:

(a)Point to point Protocol

(b) Public Piracy Protocol

(c) Portable Periferal Point

(d) None of these

Answer: (a)

170. The short cut key Alt+F4 is used to:

(a)Close the active program

(b) Switch to next window

(c) Refresh a window

(d) Select all files and folders

Answer: (a)

171. In MS Word the tool bar, which contains icons for changing the look style of

text:

(a)Outlining (b) Drawing

(c) Autotext (d) Formatting

Answer: (d)

172. Choose the odd one:

(a)Mouse (b) Webcam

Page 22 of 43

(c) Joystick (d) Trackball

Answer: (b)

173. The address of a web page is called:

(a)Hypertext (b) World Wide Web

(c) Domain Name (d) Uniform Resource Locator

Answer: (d)

174. When the scroll boxes are not present in the scroll bars this indicate that:

(a)There is an error in the software

(b) The complete text is visible in the same window

(c) Indication of a virus attack

(d) Text is hidden somewhere in the document

Answer: (b)

175. In which year Linus Kernel created by Linus Torvards released?

(a)1991 (b) 1994

(c) 2000 (d) 1997

Answer: (a)

176. In a mail account the incoming messages are stored in:

(a)Tools (b) Outbox

(c) Inbox (d) Compose

Answer: (c)

177. Hamming Code is used in:

(a)Programming language (b) Operating system

(c) Processor (d) Data commnunication

Answer: (d)

178. BIOS of a computer is stored in:

(a)Hard Disk (b) RAM

(c) CD (d) ROM

Answer: (d)

179. OS that permits multiple programs to be run simultaneously using a single

processor is referred to as:

(a)Multitasking (b) Multithreading

(c) Multiuser (d) Multiprocessing

Answer: (a)

180. One of the following is an Antivirus software. Find it out:

(a)Mozilla Firefox

(b) Acrobat Reader

Page 23 of 43

(c) PC Wizard

(d) Quick Heal

Answer: (d)

181. Which one of the following is used to write files for the web?

(a) HTTP (b) HTML

(c) FTP (d) Gopher

Answer: (b)

182. Three main parts of a processor are:

(a) ALU, Control Unit and Register

(b) ALU, Control Unit and RAM

(c) Cach, Control Unit and

(d) Control Unit, Register and RAM

Answer: (a)

183. In a document you can label a graphic or part of a graphic by inserting a:

(a) Field (b) Object

(c) Comment (d) Text box

Answer: (d)

184. The hardware part of a computer with numbers, letters and symbols on it is

called:

(a) Mouse (b) Keyboard

(c) UPS (d) Monitor

Answer: (b)

185. Which of the following is not correct method of editing the cell content?

(a) Press F6 key (b) Press F2 key

(c) Click on Formula Bar (d) Double click the cell

Answer: (a)

186. A program that translates one instruction at a time into machine language

and executes it is called:

(a) Booting (b) Interpreter

(c) Assembler (d) Compiler

Answer: (b)

187. What is Firewall in a Computer Network?

(a) A system designed to prevent unauthorised access

(b) An operating system used in computer network

(c) A web browsing software

(d) A physical boundary of network

Page 24 of 43

Answer: (a)

188. In a broad sense a railway track is an example of:

(a) Full-Duplex (b) Half-Duplex

(c) Simplex (d) All of the above

Answer: (b)

189. A software that acts as an interface between the user and the inner

workings of the internet is called:

(a) Search engine (b) Browser

(c) World Wide Web (d) All of the above

Answer: (b)

190. Which of the following is the command used to display files in a directory in

Unix system?

(a) mv (b) man

(c) ls (d) dir

Answer: (c)

191. The text which appears in the internet is called:

(a) Hyper text (b) Plain text

(c) Cipher text (d) Hyper link

Answer: (a)

192. Expand the term SMPS?

(a) Simple Micro Processor System

(b) Simple Mode Processing System

(c) Switched Mode Power Supply

(d) None of these

Answer: (c)

193. What do you need to have a dial up internet connection?

(a) Internet account with ISP

(b) Telephone line

(c) Computer with modem

(d) All of the above

Answer: (d)

194. Which is the first search engine?

(a) Google (b) Yahoo

(c) Alta Vista (d) Archie

Answer: (d)

195. Which of the following circuit is used as a ‘memory device’ in computer?

(a) Diode (b) Rectifier

Page 25 of 43

(c) Flip-Flop (d) Comparator

Answer: (c)

196. Which one of the following will indicate the current position of the mouse

on the screen:

(a) Scrolling (b) Dragging

(c) Floppy (d) Mouse Pointer

Answer: (d)

197. Which of the following commands is given to reboot the Computer?

(a) Ctrl+Alt+Del (b) Ctrl+Alt+Tab

(c) Ctrl+F3 (d) Ctrl+Alt+F2

Answer: (a)

198. DNS is the abbreviation of:

(a) Dynamic Name System

(b) Domain Name System

(c) Dynamic Network System

(d) Domain Network System

Answer: (b)

199. In MS Word you can force a page break by:

(a) Positioning the cursor at appropriate place and press Ctrl+Enter

(b) Positioning the cursor at appropriate place and press Alt+Enter

(c) Using F12 key

(d) None of the above

Answer: (a)

200. In Windows, the key combination to close a window is:

(a) Ctrl+A (b) Ctrl+Esc

(c) Alt+F4 (d) Ctrl+Alt+Del

Answer: (c)

201. What is the short cut key to open the open dialogue box?

(a) Ctrl+F12 (b) Alt+F12

(c) F12 (d) Shift+F12

Answer: (a)

202. Which component of the mother board links CPU with the other parts of

computer?

(a) System bus (b) Input Unit

(c) Primary Memory (d) ALU

Answer: (a)

Page 26 of 43

203. Which of the following has the least storage capacity?

(a) CD-ROM (b) Hard Disk

(c) 3.5" Floppy Disk (d) Zip Disk

Answer: (c)

204. Which file starts MS Word?

(a) Winword.exe (b) MS Word.exe

(c) Word 2007.exe (d) Word.exe

Answer: (b)

205. The XP in Windows XP stands for:

(a) Extra personal (b) Extra Premium

(c) Extra Peculiar (d) Experience

Answer: (d)

206. O.C.R. stands for:

(a) Optical Charecter Recognition

(b) Optimal Code Response

(c) Object Code Response

(d) Optical Code Recognition

Answer: (a)

207. All the characters that a device can use is called its:

(a) Skill set (b) Characters codes

(c) Keyboard characters (d) Character set

Answer: (d)

208. _____ key is used in combination with another key to perform a specific task:

(a) Control (b) Enter

(c) Tab (d) Space bar

Answer: (a)

209. Which utility is used to transfer files and exchange messages?

(a) WWW (b) Web browsers

(c) Hypertext (d) E-mail

Answer: (d)

210. Select the odd one out:

(a) MICR (b) Speaker

(c) Bar code reader (d) OMR

Answer: (b)

Page 27 of 43

211. Which language is directly understood by the computer without

translation programme?

(a) High Level Language

(b) Assembly Language

(c) Machine language

(d) None of the above

Answer: (c)

212. What does EBCDIC stands for?

(a) Extended Binary Coded Decimal Interchange Code

(b) Extended Bit Code Decimal Interchange Code

(c) Extended Bit Case Decimal Interchange Code

(d) Extended Binary Case Decimal Interchange Code

Answer: (a)

213. The octal equivalent of 1110001:

(a) 71 (b) 161

(c) 113 (d) 121

Answer: (b)

214. Which of the following is not a peripheral device?

(a) Printer (b) Key board

(c) Monitor (d) Hard disk

Answer: (d)

215. A dumb terminal has:

(a) Microprocessor, but no memory

(b) No microprocessor, but huge amount of memory

(c) A keyboard and screen

(d) Processor, memory and I/O devices

Answer: (c)

216. Which of the following are the two maincomponents of the CPU

(a) Control unit and registers

(b) Registers and main memory

(c) Control unit and ALU

(d) ALU and bus

Answer: (c)

217. The process of starting a computer by loading instructions from a

secondary storage device into computer memory is called:

(a) Start up (b) Loading

(c) Paging (d) Booting

Answer: (d)

Page 28 of 43

218. Which of the following is human readable version of a program?

(a) System code (b) Compiled code

(c) Machine code (d) Source code

Answer: (d)

219. ....... is a virtual network of libraries of different academic institutions

(a) BRNET (b) INFLIBNET

(c) NIC NET (d) UGCNET

Answer: (b)

220. The memory which is programmed at the time it is manufactured:

(a) Floppy disk (b) RAM

(c) EPROM (d) ROM

Answer: (d)

_______________________________________________________
Youtube.com/Tech Zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

221. To move the cursor across the screen, _____ key is used.

(a) Control (b) Tab

(c) Alt (d) Delete

Answer: (b)

222. 1 MB Stands for?

(a) 1024 bits (b) 1024 GB

(c) 1024 KB (d) 1024 Bytes

Answer: (c)

223. Which statement is valid about the interpreter?

(a) It translates the entire program at a time

(b) Object code is saved for the future use

(c) It translates one instruction at a time

(d) It is used for testing a program

Answer: (c)

224. MP3 is a kind of:

(a) Input device (b) Output device

(c) Sound format (d) Printer

Answer: (c)

225. HTTPS stands for:

(a) Hypertext Transfer Protocol Secure

(b) Hypertext Transport Protocol Security

(c) Hypertext Transfer Per Second

(d) Hypertext Transfer Protocol Security

Answer: (a)

Page 29 of 43

226. In O.M.R, the letter ‘M’ stands for:

(a) Memory (b) Mark

(c) Mode (d) Mega

Answer: (b)

227. What type of a device is 3.5 inch floppy drive?

(a) Input (b) Output

(c) Software (d) Storage

Answer: (d)

228. What is the fullform of Wi-Fi?

(a) Wired Fidelity (b) Wireless Fidelity

(c) Wireless Fixation (d) Wired Fixation

Answer: (b)

229. During the processing phase of a program, the computer converts the input

data into:

(a) Suggestions (b) Records

(c) Reports (d) Information

Answer: (d)

230. The capacity at which a given communication channel transfers

information is known as:

(a) Network capacity (b) Channel capacity

(c) Bandwidth (d) Band capacity

Answer: (c)

231. Which of the following is used to check for errors in RAM chips?

(A) ROM Chip (B) Microprocessor Chip

(C) Parity Chip (D) EPROM Chip

Answer: (c)

232. All other computers other than the server is called

(A) Nodes (B) Switch

(C) bus (D) bridge

Answer: (a)

233. Missing slot covers on a computer can cause

(A) Over Heat (B) Power surge

(C) EMI (D) Incomplete path for ESD

Answer: (a)

234. WWW was introduced on:

Page 30 of 43

(A) 12th March 1989 (B) 26th July 1988

(C) 13th May 1986 (D) 12th June 1988

Answer: (a)

235. What is the first web based email service?

(A) Gmail (B) Hotmail

(C) Yahoo mail (D) Outlook

Answer: (b)

236. The sortware used to visit a website is

(A) search engine (B) browser

(C) file manager (D) www

Answer: (b)

237. The dos command used to change directory Is?

(A) tree (B) md

(C) subst (D) cd

Answer: (b)

238. Which of the following refers to a small, single· site network?

(A) LAN ) (B) DSL

(C) RAM (D) USB

Answer: (a)

239. The term push and pop is related to

(A) linked list (B) Que

(C) Stack (D) Array

Answer: (b)

240. The term 'blog' was first come by

(A) John Barger (B) Jan Koum

(C) Brain Acton (D) Peter Merholz

Answer: (d)

241. Buffer is where

(A) Data are permanently stored (B) Data with error are stored

(C) Incomplete data are stored (D) Data are temporarily stored

Answer: (d)

242. Standard using High level language in Internet?

(A) Unix (B) Pascal

(C) Java (D) Basic

Answer: (c)

243. The symbols used in assembly language are

Page 31 of 43

(A) Codes (B) Mnemonics

(C) Notations (D) All of these

Answer: (b)

244. A device that connects to a network without the use of cables is said to be

(A) distributed (B) cabled

(C) centralised (D) wireless

Answer: (d)

245. Which of the following domain is used by profit or ganlsations

(A) .org ( (B) .com )

(C) .net (D) .eou

Answer: (b)

246. The first web Robot is

(A) Rovio (B) Python

(C) wandex (D) Java

Answer: (c)

247. The term 'redbook', 'yellow book' and 'orange book' is related to

(A) SCSI (B) IDE

(C) PCI (D) CD-ROM

Answer: (d)

248. A gate in which all inputs must be low to get a high output is called

(A) ANAND gate (B) NOR gate

(B) Inverter (D) AND gate

Answer: (b)

249. The principle of locality of reference justifies the use of

(A) Reusable (B) Non reusable

(C) Virtual memory (D) Cache memory

Answer: (d)

250. What is the use of bridge in network?

(A) To connect LAN'S

(C) To control network speed

(B) To separate LAN's

(D) All of the above

Answer: (a)

Page 32 of 43

Cyber laws (Questions & Answers)

1. World Computer Security Day:

(a)October 30 (b) November 30

(c) December 30 (d) January 30

Answer: (b)

2. Many cyber crimes come under the Indian Penal Code. Which one of the

following is an example?

(a) Sending threatening messages by email

(b) Forgery of electronic records

(c) Bogus websites

(d) All of these

Answer: (d)

3. Information Technology Act, 2000 made amendment to which of the

following existing laws?

(a) Indian Penal Code (b) Indian Evidence Act

(c) Bankers Book Evidence Act (d) All of these

Answer: (d)

4. A ____ is a set of exclusive rights granted by a state to an inventor or his

assignee for a limited period of time in exchange for a disclosure of an invention:

(a) Copyright (b) Blog

(c) Patent (d) Trademark

Answer: (c)

5. ____ gives the author of an original work exclusive right for a certain time

period in relation to that work, including its publication, distribution and

adaptation:

(a) Copyright (b) Copy left

(c) Patent (d) Trademark

Answer: (a)

6. The rental of software to consumers without the permission of the copyright

holder known as

(a) Unbundling (b) Renting

(c) Counter Felting (d) Soft loading

Answer: (b)

Page 33 of 43

7. Copying the materials published on the internet as one’s own without proper

acknowledgement is called _____:

(a) Internet Plagiarism (b) Internet reference

(c) Internet surfing (d) Internet publishing

Answer: (a)

8. Any criminal activity that uses a computer either as an instrumentality, target

or a means for perpetuating further crimes comes within the ambit

of:

(a) Software Piracy (b) Cyber Crime

(c) Conventional Crime (d) None of these

Answer: (b)

9. _______ are a bundle of exclusive rights over creations of the mind, both artistic

and commercial:

(a) Intellectual property rights (b) Copyright

(c) Patent (d) Trademark

Answer: (a)

10. Which of the following come under cyber crime?

(a) Intellectual Property Crime (b) Pornography

(c) Online Gambling (d) All the above

Answer: (d)

11. Under the I.T. Act, whoever commits or conspires to commit cyber terrorism

shall be punishable with imprisonment which may extend to ____.

(a) two years (b) five years

(c) ten years (d) imprisonment for life

Answer: (d)

12. An unauthorized program which functions from inside what seems to be an

authorized program, thereby concealing what it is actually doing:

(a) Trojan Horse (b) Voyeur

(c) Diddling (d) Spamming

Answer: (a)

13. As per the IT (Amendment) Act 2008, Tampering with Computer Source

Documents shall be punishable with imprisonment up to years, or with

fine which may extend up to _____rupees, or with both.

(a) two lakh (b) three lakh

(c) four lakh (d) five lakh

Answer: (a)

14. Which of the following is a cyber crime against individual?

Page 34 of 43

(a) Email spoofing (b) Cyber Defamation

(c) Cyber stalking (d) All of these

Answer: (d)

15. The first cyber police station in Kerala was inagurated in:

(a) 2009 (b) 2010 (c) 2011 (d) 2012

Answer: (a)

16. Which of the following is an Intellectual Property crime?

(a) Theft of computer source code

(b) Trademarks violations

(c) Software piracy

(d) All of these

Answer: (d)

17. Altering raw data just before it is processed by a computer and then changing

it back after the processing is completed, is termed:

(a) Salami Attack (b) Data diddling

(c) Computer voyeur (d) none of these

Answer: (b)

18. Use of computer resources to intimidate or coerce others, is termed:

(a) Cybernetics (b) Cyber terrorism

(c) Web hosting (d) none of these

Answer: (b)

19. The criminal reads or copies confidential or proprietary information,but the

data is neither deleted nor changed- This is termed:

(a) Computer voyeur (b) Spamming

(c) Data diddling (d) None of these

Answer: (a)

20. India’s first cyber police station was started at:

(a) Chennai (b) Bangalore

(c) New Delhi (d) Mumbai

Answer: (b)

21. Posting derogatory remarks about the employer on a social networking site

is an example of:

(a) Hacking (b) Spamming

(c) Cyber defamation (d) Spoofing

Answer: (c)

22. The president of India who gave assent to Information Technology Act 2000:

(a) APJ Abdul Kalam (b) K.R.Narayanan

Page 35 of 43

(c) Pratibha Patil (d) None of these

Answer: (b)

23. The IT (Amendment) Bill 2008 was passed by the two houses of the Indian

Parliament on_____ 2008.

(a) December 23 and 24 (b) February 7 and 8

(c) October 26 and 27 (d) Decemeber 30 and 31

Answer: (a)

24.Cyber crime can be defined as:

(a) A crime committed online

(b) Stealing of a computer

(c) Organising theft in a computer shop

(d) None of these

Answer: (a)

25. Cyber Laws are included in:

(a) Union List (b) State List

(c) Residuary Powers (d) Concurrent List

Answer: (c)

26. The seat of the Asian School of Cyber Laws:

(a)New Delhi (b) Pune

(c) Chennai (d) Mumbai

Answer: (b)

27. The explicit portrayal of sexual subject matter is termed:

(a) Pornography (b) Spamming

(c) Junking (d) None of these

Answer: (a)

28. _____refers to email that appears to have been originated from one source

when it was actually sent from another source.

(a) Email bombing (b) Email spoofing

(c) Email spamming (d) None of these

Answer: (b)

29. A type of cyber crime that occurs in pay per click online advertising when a

person, automated script or computer program imitates a legitimate user of a

web browser clicking on an ad, for the purpose of generating a charge per click

without having actual interest in the target of the ad’s link.

(a) Phishing (b) Zombie

(c) Click fraud (d) None of these

Answer: (c)

Youtube.com/Tech Zone  PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

Information Technology Questions asked in

Kerala PSC

1. The number of functional keys in a key board:

(a) 9 (b) 10 (c) 11 (d) 12

Answer: (d)

2. The top most bar in any application window is the ____ which displays the

name of the document or application:

(a) Status bar (b) Tool bar

(c) Menu bar (d) Title bar

Answer: (d)

3. ____ is not a point device.

(a) Joystick (b) Light pen

(c) Key board (d) Mouse

Answer: (c)

4. When the pointer is positioned on a ____, it is shaped like a hand.

(a) Screentip (b) Hyperlink

(c) Formatting error (d) None of these

Answer: (b)

5. The copy,cut and paste features use keyboard short cuts with the ____ key and

a keyboard letter.

(a) Shift (b) Windows (c) Alt (d) Ctrl

Answer: (d)

6.. A graphical bar displayed across the top of the document window:

(a) Scale (b) Bar (c) Slide (d) Ruler

Answer: (d)

7. Computer and internet usage in the area of market known as:

(a) E-Commerce (b) E- Literacy

(c) E-groups (d)None o f these

Answer: (a)

8. Pick the odd one out:

(a) Mouse (b) Printer

(c) Image scanner (d) Keyboard

Answer: (b)
________________________________________________________
Youtube.com/Tech Zone  PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

________________________________________________________

9. Identify the one which is not a mouse operation:

(a) Clicking (b) Dragging

(c) Drawing (d) None of these

Answer: (c)

10. _____ are capable of capturing live video and transfer it directly to the

computer.

(a) Monitors (b) Webcams

(c) Scanners (d) Printers

Answer: (b)

11. Most websites have a main page, the _____, which acts as a doorway to the rest

of the website pages:

(a) Search engine (b) Home page

(c) Browser (d) URL

Answer: (b)

12. The diagram which represents the order of functions in a program is called a:

(a) Sequence of steps (b) Software design

(c) Algorithm (d) Flow chart

Answer: (d)

13. The basic unit of a work sheet into which you enter data in Excel is called a:

(a) Tab (b) Cell (c) Box (d) Range

Answer: (b)

14.Address of the first cell in the work sheet is:

(a) 1 (b) A (c) A1 (d) 1A

Answer: (c)

15. When a computer suddenly stops working, it is said to be:

(a) Crashed (b) Bugged

(c) Hanged (d) Held up

Answer: (c)

16. Paint brush belong to:

(a) Accessories group (b) Application group

(c) Main group (d) None of these

Answer: (b)

17. CPU gets the address of the next instruction to be processed from:

(a) Instruction register (b) Memory address register

(c) Index register (d) Program register

Answer: (d)
_______________________________________________________
Youtube.com/Tech PSC class
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________
18. The internet allows you to:

(a) send electronic mail (b) view web pages

(c) connect servers all around the world (d) All of these

Answer: (d)

19 .What are the speakers attached to your com- puter used for:

(a) Displaying images (b) Sending messages

(c) Storing messages (d) Handling sound and music

Answer: (d)

20. The smallest unit in the computer which represents information is:

(a) Byte (b) Bit (c) Character (d) Digit

Answer: (b)

21. The concept of stored program was given by:

(a) Von Neuman (b) Charles Babbage

(c) Blaise Pascal (d) None of these

Answer: (a)

22. Who is known as ‘the father of personal computer’?

(a) Charles Babbage (b) Henri Edward Roberts

(c) Alan Turing (d) Edgar Rice Boroughs

Answer: (b)

23. The first computer virus:

(a) Kabir (b) Firewall (c) Norton (d) Elk Cloner

Answer: (d)

24. A compiler translates a program written in a high-level language into:

(a) Java (b) Algorithm

(c) Machine language (d) A debugged program

Answer: (c)

25. The vast network of computers that connects millions of people all over the

world is called:

(a) OUAN (b) Hypertext (c)Interpo l(d) Internet

Answer: (d)

26. What type of devices are computer speakers and headphones?

(a) Input (b) Input/output

(c) Software (d) Output

Answer: (d)

_______________________________________________________
Youtube.com/Tech PSC class
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

27. Who discovered Unix operating system?

(a) Angelbart (b) Paul Allen

(c) Dennis Ritchie (d) John Newman

Answer: (c)

28. The _____ of system includes the programs and instructions.

(a) Icon (b) Hardware

(c) Software (d) Information

Answer: (c)

29. What is the full form of USB?

(a) Universal Security Block (b) Ultra Serial Block

(c) United Service Block (d) Universal Serial Bus

Answer: (d)

30. Which of the following is a Web Browser?

(a) Paint (b) Fire fox

(c) Power Point (d) Word

Answer: (b)

31. Computer is a/an:

(a) Mechanical device (b) Electrical device

(c) Electronic device (d) None of these

Answer: (c)

32. Back up of a data file will help to prevent:

(a) Loss of confidentiality (b) Duplication of data

(c) Virus attack (d) Loss of data

Answer: (d)

33. A program for viewing a web page is called:

(a) Word processor (b) Spreadsheet

(c) Protocol (d) a browser

Answer: (d)

34. A repair for a known software bug, usually available at no charge on the

internet, is called:

(a) Version (b) Ad-on

(c) Tutorial (d) Patch

Answer: (d)

35. Alta Vista is a:

(a) Programme (b) Software

(c) Browser (d) Search engine

Answer: (d)

_______________________________________________________
Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

36. Text in a column generally aligned:

(a) Right (b) Left

(c) Centre (d) Justified

Answer: (d)

37. Which of the following is the only language that a computer can understand?

(a) High level language (b) Pseudo code

(c) Machine language (d) Assembly language

Answer: (c)

38. Which one of the following has the smallest storage capacity?

(a) Zip disk (b) Hard disk

(c) Floppy Disk (d) Data cartridge

Answer: (c)

39. Which one of the following is not a computer programming language?

(a) C (b) C++

(c) Java (d) Microsoft

Answer: (d)

40. The term used to describe the intangible instructions that will tell the

computer what to do is:

(a) Hardware (b) Software

(c) Storage (d) Input/output

Answer: (b)

41. Which of the following is an important open source Operating system?

(a) DOS (b) Windows

(c) LINUX (d) SPSS

Answer: (c)

42. The process of adopting software for a particular country or region is called

———.

(a) Localization (b) Networking

(c) Blog (d) None of the above

Answer: (a)

43. The application software used to make calculations:

(a) MS Word (b) MS Power Point

(c) MS Excel (d) CorelDraw

Answer: (c)

44._____ is the set of programs necessary to carry out operations for a specified

application:

(a) Application software (b) Operating System

(c) Hardware (d) Utility

Answer: (a)

45. The folder to which an office application save file by default is:

(a) Desktop (b) My documents

(c) My computer (d) None of these

Answer: (b)

46. The initiative of the US government which is considered as the early form of

internet:

(a) ULTRANET (b) CARPANET

(c) HARPANET (d) ARPANET

Answer: (d)

47. World Computer Security Day:

(a) October 30 (b) November 30

(c) December 30 (d) January 30

Answer: (b)

48. This is the exclusive right granted by statute to the author of the works to

reproduce dramatic, artistic, literary or musical work or to authorize its

reproduction by others:

(a) Patent (b) Copy Right

(c)Trade Mark (d) None of the above

Answer: (b)

49. Feeling guilty or defensive about our internet use is a symptom of ________.

(a) Cyber addiction (b) Net Gaming

(c) Online-Chatting (d) Cyber crime

Answer: (a)

50._______ are a bundle of exclusive rights over creations of the mind, both

artistic and commercial:

(a) Intellectual property rights (b) Copyright

(c) Patent (d) Trademark

Answer: (a)

51. Digital images are entered into the computer using ____

(a) Keyboard (b) Speaker

(c) Scanner (d) Digital Camera

Answer: (d)

52.Spell check is the under ___ menu.

(a) Tool (b) Format

(c) Edit (d) View

Answer: (a)

53.Hotmail was created by:

(a) Bill Gates (b) Sabir Bhatia

(c) Berners Lee (d) Richard Stallman

Answer: (b)

54. Which one of the following is not an internet browser?

(a) Mozilla (b) Internet explorer

(c) Windows Explorer (d) Netscape Navigator

Answer: (c)

55. The domain name for government organisations is:

(a) .gov (b).govnt

(c) .com (d) .org

Answer: (a)

56. Which one of the following is not an input device?

(a) Mouse (b) Keyboard

(c) Barcode reader (d) Monitor

Answer: (d)

57. The full form of U.P.S.

(a) Uniform Power Supply

(b) Uninterrupted Power Supply

(c) Universal Power Supply

(d) Unidirectional Power Supply

Answer: (b)

58. The domain name for government institutions:

(a) org (b) gov (c) com (d) firm

Answer: (b)

59. Which device is used to display graphics and information on video screen?

(a) CPU (b) Modem (c) Scanner (d) Monitor

Answer: (d)

60. The programs or instructions that tells the computer what to do:

(a) Software (b) Hard

(c) Virus (d) mailmerge

Answer: (a)

61. Compact Disc was invented by:

(a) James T.Russel (b) Sabir Bhatia

(c) Ray Tomlinson (d) Marcony

Answer: (a)

62. A device that connects to a network without the use of a cable is said to be:

(a) Distributed (b) Centralised

(c) Open source (d) Wireless

Answer: (d)

63. The main system board of a computer is called:

(a) Integrated circuit (b) Motherboard

(c) Processor (d) Microchip

Answer: (b)

64. A website address is a unique name that identifies a specific ____ on the web.

(a) Web browser (b) Website

(c) PDA (d) Link

Answer: (b)

65. ____ is processed by the computer into information:

(a) numbers (b) processor

(c) input (d) data

Answer: (d)

66. The name a user assigns to a document is called a(n):

(a) Filename (b) Program

(c) Record (d) Data

Answer: (a)
_______________________________________________________
Youtube.com/Tech Zone  PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

67. A class that inherits a base class containing virtual function is called:

(a) Virtual (b) Polymorphic

(c) Derived (d) Base

Answer: (b)

68. Division is carried out in computer by:

(a) Reverse multiplication (b) Repeated subtraction

(c) Repeated addition (d) None of these

Answer: (b)

69.____ is the part of the computer that does the arithmetical calculations.

(a) OS (b) ALU

(c) CPU (d) Memory

Answer: (b)

70. Which of the following is not an example of hardware?

(a) WORD (b) Printer

(c) Monitor (d) Mouse

Answer: (a)

71. Graphics are inserted in:

(a) Frame (b) Box

(c) Page (d) None of these

Answer: (a)

72. RTF stands for:

(a) Real Time Fonts (b) Real Time Files

(c) Rich Text Format (d) Rich Text Fonts

Answer: (c)

73.To save a document in the first time, ____ option is used.

(a) Save first (b) Save as

(c) Save on (d) Copy

Answer: (b)

74. What does an electronic spread sheet consists of (Choose the best answer):

(a) Rows (b) Columns

(c) Cells (d) All of these

Answer: (d)

75.Screen savers program prevent:

(a) Brownouts (b) Burn-in

(c) Screen flickering (d) Bad sectors

Answer: (b)

76. Antivirus software is an example of ____

(a) Business software (b) An operating system

(c)A security utility (d) An office suite

Answer: (c)

77.The ____ is the box that houses the most important parts of a computer

system?

(a) Software (b) Hardware

(c) Input device (d) System unit

Answer: (d)

78.A menu contains a list of:

(a) Commands (b) data

(c) objects (d) reports

Answer: (a)

79.Modem refers to:

(a) Modulator

(b) Modulation

(c) Modulator and demodulater

(d) Modern modes of communication

Answer: (c)

80.A temporary storage area used to hold information that is being transferred

from one program to another:

(a) Clip board (b) Buffer

(c) Memory (d) Swap

Answer: (a)

81. Which company developed MS WORD?

(a) Linux (b) Apple (c) Compac (d) Microsoft

Answer: (d)

82. RAM stands for:

(a) Random Approach Memory

(b) Random Access Memory

(c) Read Access Memory

(d) Rapid Access Memory

Answer: (b)

83. Computers connected to a LAN :

(a) run faster (b) go online

(c) share information and/or share peripheral equipment

(d) e-mail

Answer: (c)

84. All physical equipment and accessories of a system:

(a) Software (b) Hardware

(c) Peripherals (d) Internet

Answer: (b)

85. A collection of programs that controls how your computer system runs and

processes information is called:

Page 11 of 43

(a) Compiler (b) Interpreter

(c) Office (d) Operating system

Answer: (d)

86. Which of the following languages is frequently used to design web pages?

(a) COBOL (b) C

(c) PASCAL (d) JAVA

Answer: (d)

87. Floppy Disc is usually located in—— drive.

(a) A (b) B (c) C (d) D

Answer: (a)

88. URL stands for:

(a) Uniform Resource Locator

(b) Universal Reference Locator

(c) Universal Resource Language

(d) Uniform Reference Locator

Answer: (a)

89. In the abbreviation ‘HTML’, the letter ‘m’ stands for:

(a) Markup (b) Method (c) Meta (d) Machine

Answer: (a)

90. When you save to this, your data will remain intact even when the computer

is turned off:

(a) RAM

(b) Motherboard

(c) Secondary storage device

(d) Primary storage device

Answer: (c)

91. A computer cannot perform which one of the following functions?

(a) Addition (b) Division

(c) Bake a cake (d) Subtraction

Answer: (c)

92. The primary purpose of the software is turn the data into:

(a) Websites (b) Information

(c) Programs (d) Objects

Answer: (b)

93. The components of a computer system with the circutry to control in control

interpretation and execution of instructions is known as:

(a) ALU (b) Memory (c) Control (d) CPU

Answer: (d)

94. ‘Megabytes’ is the unit for measuring which of the following:

(a) Intensity of earth quake

(b) Memory capacity of a computer

(c) Intensity of wave length

(d) None of these

Answer: (b)

95. Most of the commonly used personal computers/ laptops do not have a

command key known as:

(a) Turnover (b) Shift (c) Alter (d) Delete

Answer: (a)

96. The father of Super Computer:

(a) Charles Babbage (b) Glen Ricort

(c) Seymor Cray (d) Winton Surf

Answer: (c)

97. The heart of any computer is:

(a) Memory (b) CPU

(c) I/O Unit (d) Disks

Answer: (b)

98. The word ‘Computer’ is originated from ......... language.

(a) German (b) Italian

(c) Latin (d) Spanish

Answer: (c)

99. What is the default file extension for all Word documents?

(a) WRD (b) TXT (c) DOC (d) FIL

Answer: (c)

100. Email stands for:

(a) Educational mail (b) Electronic mail

(c) Entertainment mail (d) Excess mail

Answer: (b)

101. Programming errors generally fall into which of the following categories?

(a) Syntax errors (b) Execution errors

(c) Logical errors (d) All of these

Answer: (d)

102.The process of transferring files from a computer on the internet to your

computer is called:

(a) Downloading (b) Uploading

(c) Downsize (d) JPEG

Answer: (a)

103. Which of the following is the fastest printer?

(a) Laser (b) Ink Jet (c) Dot-matrix (d) Plotter

Answer: (a)

104. The most common type of storage devices are:

(a) Persistent (b) Optical

(c) Magnetic (d) Flash

Answer: (c)

105. Unsolicited commercial email is commonly known as:

(a) Spam (b) Junk (c) Hoaxes (d) Hypertext

Answer: (a)

106. What is the full form of ATM?

(a)Automated Tailoring Machine

(b) Any Time Money

(c) Automated Teller Machine

(d) All Time Money

Answer: (C)

107. The most popular way to materialize XML document is to use:

(a)DTD (b) XSLT

(c) HTML (d) SOAP

Answer: (b)

108. To open the font dialogue box in MS Word, we can use the short cut key:

(a)Alt+F (b) Ctrl+F

(c) Ctrl+D (d) Alt+D

Answer: (C)

109. Who was the inventor of mechanical calculator for adding numbers?

(a)Charles Babbage (b) Pascal

(c) Peano (d) De Morgan

Answer: (b)

110. In a DTP software, to strech as short title of a paper across the page, use the

_____ option.

(a)Expanded (b) Proportional

(c) Scale (d) Horizontal Algnment

Answer: (a)

111. RAD stands for:

(a)Repeated Application Development

(b) Ready Application Development

(c) Relative Application Development

(d) Rapid Application Development

Answer: (d)

112. What is I-beam?

(a)A pointer used to select text (b) A special tool used in animations

(c) Transitions (d) None of these

Answer: (a)

113. All the information collected during database development is stored in a:

(a)Data path (b) Data warehouse

(c) RAD (d) CASE

Answer: (b)

114. Primary key is selected from the:

(a)Candidate keys

(b) Composite keys

(c) Determinants

(d) Foreign keys

Answer: (a)

115. The personal computer industry was started by:

(a)IBM (b) Apple

(c) HLC (d) Compaq

Answer: (a)

116. As compared to the secondary storage devices, primary storage units have:

(a)Faster (b) Costlier

(c) Less storage capacity (d) All of the above

Answer: (d)

117. Which of the following does not affect the resolution of a video display

image?

(a)Band width

(b) Raster scan rage

(c) Vertical and horizontal lines of resolution

(d) Screen size

Answer: (d)

Page 15 of 43

118. What is the name of the operating system for

laptop computer called MacLite?

(a)MS-DOS (b) Windows-NT

(c) OZ (d) Windows-XP

Answer: (C)

119. The number of processes completed per unit time is known as:

(a)Hit ratio (b) Efficiency

(c) Capacity (d) Throughput

Answer: (d)

120. The altering of data so that it is not usable unless the changes are undone is:

(a)Biometrics (b) Ergonomics

(c) Encryption (d) Compression

Answer: (C)

121. Two main measures for the efficiency of an algorithm are:

(a)Data and space

(b) Complexity and capacity

(c) Time and space

(d) Capacity and cost

Answer: (C)

122. The CPU communicates with the memory using:

(a)Control bus (b) Data bus

(c) Address bus (d) All of the above

Answer: (d)

123. A very large initial letter of the first word of the paragraph is called:

(a) Drop cap (b) Dropped

(c) Capital (d) Figure

Answer: (a)

124. In addition to slide tab in Normal View, which allows a user to select slides

in MS Power Point?

(a)Slide show (b) Print preview

(c) Outline (d) Slide sorter

Answer: (d)

125. Which of the following is not a part of the operating system?

(a)Network system (b) Kernel

(c) Shell (d) File system

Answer: (a)

Page 16 of 43

126. A strip of buttons across the top of the main window in MS Power Point is

called:

(a)Menu bar (b) Tool bar

(c) Status bar (d) Ribbon

Answer: (d)

127. Which of the following is an abstract data type?

(a)Int (b) Double

(c) String (d) Class

Answer: (d)

128. The start button and system tray are part of what feature of Windows?

(a)Quick launch bar (b) Menu bar

(c) Task pane (d) Task bar

Answer: (d)

129. Which of the following is not a computer language?

(a)LOTUS (b) BASIC

(c) COBOL (d) FORTRAN

Answer: (a)

130. Microsoft Word contains built in paragraph formats called:

(a)Gutters (b) Styles

(c) Bullets (d) Formats

Answer: (b)

131. The charecter spacing tab is located in the _____ dialogue box in Microsoft

Word:

(a)Text (b) Format

(c) Font (d) Word Art

Answer: (c)

132. Which of the following is a semi conductor memory?

(a)MAR (b) RAM

(c) CD (d) CD-ROM

Answer: (b)

133. What does MBR stands for:

(a)Memory Bus Register

(b) Master Boot Record

(c) Microsoft Buffer Register

(d) None of the above

Answer: (b)

134. The dispatcher:

(a)Schedules the tasks into the processor

(b) Puts tasks in I/O wait

(c) Is small and simple

(d) Never changes task priorities

Answer: (a)

135. In Windows, tool used for managing files and folders are called:

(a)Windows Explorer (b) File System

(c) My computer (d) My documents

Answer: (a)

136. The file system ‘NTFS’ stands for:

(a)New Type File System

(b) Non Terminated File System

(c) Never Terminated File System

(d) New Technology File System

Answer: (d)

137. A slide show begins with the:

(a)Animated slide (b) Current slide

(c) Bulletted slide (d) First slide

Answer: (d)

138. The system program that sets up an executable program in main memory

for execution is:

(a)Assembler (b) Linker

(c) Compiler (d) Loader

Answer: (d)

139. A DBMS that combines a DBMS and an application generator is:

(a)MS-SQL Server (b) MS-Access

(c) DB-2 (d) Oracle

Answer: (b)

140. In satellite based communication, VSAT stands for:

(a)Very Small Analog Terminal

(b) Very Small Aperture Terminal

(c) Very Small Audio Terminal

(d) Varying Size Aperture Terminal

Answer: (b)

141. Which is the incorrect statement?

_______________________________________________________
Youtube.com/Tech Zone  PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

(a)RAM is Random Access Memory

(b) RAM is volatile

(c) We cannot perform read operations in RAM

(d) RAM is directly accessed by the CPU

Answer: (c)

142. In software development, if requirements are frequently changing, which

model is best suited?

(a)Waterfall (b) Spiral

(c) RAD (d) Prototype

Answer: (d)

143. How can you save a file with a new name in MS Excel?

(a)Using save as menu

(b) Using save menu

(c) Using copy and paste options

(d) Using cut and paste options

Answer: (a)

144. A term associated with the comparison of processing speeds of different

computer systems is:

(a)EFTS (b) MIPS

(c) CFPS (d) MPG

Answer: (b)

145. Which allows wireless mobile devices to access the internet and its services

such as the web and e-mail?

(a)TCP/IP (b) Ethernet

(c) WAP (d) Token ring

Answer: (c)

146. Which of the following is second generation of computers?

(a)EDSAC (b) IBM-1401

(c) CDC-1604 (d) ICL-2900

Answer: (c)

147. ‘DOS’ floppy disk does not have:

(a)Boot record (b) File allocation table

(c) Root directory (d) Virtual memory

Answer: (d)

148. Which operation is not possible on data structures?

(a)Traversing (b) Reading

(c) Insertion (d) Deletion

Page 19 of 43

Answer: (b)

149. What is the full form of POST?

(a)Program Oriented System Testing

(b) Print On Self Test

(c) Private Office Software Trainee

(d) Power On Self Test

Answer: (d)

150. Windows 7 was released in:

(a)2001 (b) 2009 (c) 2007 (d) 2006

Answer: (b)

151. Charles Babbage invented:

(a) Electronic computer (b) Analytical engine

(c) ENIAC (d) IBM

Answer: (b)

152. A multidimensional database model is used most often in which of the

following models?

(a)Data warehouse (b) Relational

(c) Network (d) Hierarchical

Answer: (a)

153. What will appear on screen, if you press Shift+5?

(a) % (b) &

(c) * (d) #

Answer: (a)

154. Resolution of externally defined symbol is performed by:

(a)Compiler (b) Linker

(c) Assembler (d) Loader

Answer: (b)

155. Word Art is available on the _____ tab.

(a)Insert (b) Format

(c) Clip Art (d) Graphics

Answer: (a)

156. In fiber optical cable, data is transferred in the form of:

(a)Light (b) Charge

(c) Electricity (d) Sound

Answer: (a)

Page 20 of 43

157. Which type of the folder view displays complete information about a folder

in Windows Environment?

(a)List view (b) Large icons view

(c) Details view (d) None of the above

Answer: (c)

158. The financial business transaction that occur over an electronic network is

known as:

(a)E-commerce (b) Online shopping

(c) Online auction (d) Intenet banking

Answer: (a)

159. In MS Word, the file that contains the form letter is called as:

(a)Data source (b) Main document

(c) Word Field (d) None of these

Answer: (b)

160. MPIS stands for:

(a)Multiple Instructions Per Second

(b) Multiple Instruction Processing System

(c) Million Instructions Per Second

(d) None of these

Answer: (c)

161. Which of the following is classified as an impact printer?

(a)Daisy wheel printer (b) Laser printer

(c) Thermal printer (d) All of the above

Answer: (a)

162. Outlook Express is a/an:

(a)E-mail client (b) Scheduler

(c) Address book (d) All of these

Answer: (a)

163. The number of digits in a number system is called:

(a)Byte (b) Bit

(c) Component (d) Base

Answer: (d)

164. Paragraph formatting options include all of the following except:

(a)Spell Check (b) Line Spacing

(c) Alignment (d) Pagination

Answer: (a)

Page 21 of 43

165. What is the shape of the mouse pointer when drawing a table in MS Word?

(a)Pencil (b) Black plus

(c) Arrow (d) None of these

Answer: (a)

166. In Internet the files are transferred using the protocol:

(a)HTTP (b) TCP/IP (c) DHCP (d) FTP

Answer: (d)

167. What is a screen tip?

(a)The text displayed on the task bar

(b) Object’s name or description that appears when you point to it

(c) This message displayed when you open a software

(d) None of these

Answer: (b)

168. In which printer heated pins are used to print characters?

(a)Dot matrix printer (b) Chain printer

(c) Thermal printer (d) Daisy wheel printer

Answer: (c)

169. PPP stands for:

(a)Point to point Protocol

(b) Public Piracy Protocol

(c) Portable Periferal Point

(d) None of these

Answer: (a)

170. The short cut key Alt+F4 is used to:

(a)Close the active program

(b) Switch to next window

(c) Refresh a window

(d) Select all files and folders

Answer: (a)

171. In MS Word the tool bar, which contains icons for changing the look style of

text:

(a)Outlining (b) Drawing

(c) Autotext (d) Formatting

Answer: (d)

172. Choose the odd one:

(a)Mouse (b) Webcam

Page 22 of 43

(c) Joystick (d) Trackball

Answer: (b)

173. The address of a web page is called:

(a)Hypertext (b) World Wide Web

(c) Domain Name (d) Uniform Resource Locator

Answer: (d)

174. When the scroll boxes are not present in the scroll bars this indicate that:

(a)There is an error in the software

(b) The complete text is visible in the same window

(c) Indication of a virus attack

(d) Text is hidden somewhere in the document

Answer: (b)

175. In which year Linus Kernel created by Linus Torvards released?

(a)1991 (b) 1994

(c) 2000 (d) 1997

Answer: (a)

176. In a mail account the incoming messages are stored in:

(a)Tools (b) Outbox

(c) Inbox (d) Compose

Answer: (c)

177. Hamming Code is used in:

(a)Programming language (b) Operating system

(c) Processor (d) Data commnunication

Answer: (d)

178. BIOS of a computer is stored in:

(a)Hard Disk (b) RAM

(c) CD (d) ROM

Answer: (d)

179. OS that permits multiple programs to be run simultaneously using a single

processor is referred to as:

(a)Multitasking (b) Multithreading

(c) Multiuser (d) Multiprocessing

Answer: (a)

180. One of the following is an Antivirus software. Find it out:

(a)Mozilla Firefox

(b) Acrobat Reader

(c) PC Wizard

(d) Quick Heal

Answer: (d)

181. Which one of the following is used to write files for the web?

(a) HTTP (b) HTML

(c) FTP (d) Gopher

Answer: (b)

182. Three main parts of a processor are:

(a) ALU, Control Unit and Register

(b) ALU, Control Unit and RAM

(c) Cach, Control Unit and

(d) Control Unit, Register and RAM

Answer: (a)

183. In a document you can label a graphic or part of a graphic by inserting a:

(a) Field (b) Object

(c) Comment (d) Text box

Answer: (d)

184. The hardware part of a computer with numbers, letters and symbols on it is

called:

(a) Mouse (b) Keyboard

(c) UPS (d) Monitor

Answer: (b)

185. Which of the following is not correct method of editing the cell content?

(a) Press F6 key (b) Press F2 key

(c) Click on Formula Bar (d) Double click the cell

Answer: (a)

186. A program that translates one instruction at a time into machine language

and executes it is called:

(a) Booting (b) Interpreter

(c) Assembler (d) Compiler

Answer: (b)

187. What is Firewall in a Computer Network?

(a) A system designed to prevent unauthorised access

(b) An operating system used in computer network

(c) A web browsing software

(d) A physical boundary of network

Answer: (a)

188. In a broad sense a railway track is an example of:

(a) Full-Duplex (b) Half-Duplex

(c) Simplex (d) All of the above

Answer: (b)

189. A software that acts as an interface between the user and the inner

workings of the internet is called:

(a) Search engine (b) Browser

(c) World Wide Web (d) All of the above

Answer: (b)

190. Which of the following is the command used to display files in a directory in

Unix system?

(a) mv (b) man

(c) ls (d) dir

Answer: (c)

191. The text which appears in the internet is called:

(a) Hyper text (b) Plain text

(c) Cipher text (d) Hyper link

Answer: (a)

192. Expand the term SMPS?

(a) Simple Micro Processor System

(b) Simple Mode Processing System

(c) Switched Mode Power Supply

(d) None of these

Answer: (c)

193. What do you need to have a dial up internet connection?

(a) Internet account with ISP

(b) Telephone line

(c) Computer with modem

(d) All of the above

Answer: (d)

194. Which is the first search engine?

(a) Google (b) Yahoo

(c) Alta Vista (d) Archie

Answer: (d)

195. Which of the following circuit is used as a ‘memory device’ in computer?

(a) Diode (b) Rectifier

(c) Flip-Flop (d) Comparator

Answer: (c)

196. Which one of the following will indicate the current position of the mouse

on the screen:

(a) Scrolling (b) Dragging

(c) Floppy (d) Mouse Pointer

Answer: (d)

197. Which of the following commands is given to reboot the Computer?

(a) Ctrl+Alt+Del (b) Ctrl+Alt+Tab

(c) Ctrl+F3 (d) Ctrl+Alt+F2

Answer: (a)

198. DNS is the abbreviation of:

(a) Dynamic Name System

(b) Domain Name System

(c) Dynamic Network System

(d) Domain Network System

Answer: (b)

199. In MS Word you can force a page break by:

(a) Positioning the cursor at appropriate place and press Ctrl+Enter

(b) Positioning the cursor at appropriate place and press Alt+Enter

(c) Using F12 key

(d) None of the above

Answer: (a)

200. In Windows, the key combination to close a window is:

(a) Ctrl+A (b) Ctrl+Esc

(c) Alt+F4 (d) Ctrl+Alt+Del

Answer: (c)

201. What is the short cut key to open the open dialogue box?

(a) Ctrl+F12 (b) Alt+F12

(c) F12 (d) Shift+F12

Answer: (a)

202. Which component of the mother board links CPU with the other parts of

computer?

(a) System bus (b) Input Unit

(c) Primary Memory (d) ALU

Answer: (a)

203. Which of the following has the least storage capacity?

(a) CD-ROM (b) Hard Disk

(c) 3.5" Floppy Disk (d) Zip Disk

Answer: (c)

204. Which file starts MS Word?

(a) Winword.exe (b) MS Word.exe

(c) Word 2007.exe (d) Word.exe

Answer: (b)

205. The XP in Windows XP stands for:

(a) Extra personal (b) Extra Premium

(c) Extra Peculiar (d) Experience

Answer: (d)

206. O.C.R. stands for:

(a) Optical Charecter Recognition

(b) Optimal Code Response

(c) Object Code Response

(d) Optical Code Recognition

Answer: (a)

207. All the characters that a device can use is called its:

(a) Skill set (b) Characters codes

(c) Keyboard characters (d) Character set

Answer: (d)

208. _____ key is used in combination with another key to perform a specific task:

(a) Control (b) Enter

(c) Tab (d) Space bar

Answer: (a)

209. Which utility is used to transfer files and exchange messages?

(a) WWW (b) Web browsers

(c) Hypertext (d) E-mail

Answer: (d)

210. Select the odd one out:

(a) MICR (b) Speaker

(c) Bar code reader (d) OMR

Answer: (b)

211. Which language is directly understood by the computer without

translation programme?

(a) High Level Language

(b) Assembly Language

(c) Machine language

(d) None of the above

Answer: (c)

212. What does EBCDIC stands for?

(a) Extended Binary Coded Decimal Interchange Code

(b) Extended Bit Code Decimal Interchange Code

(c) Extended Bit Case Decimal Interchange Code

(d) Extended Binary Case Decimal Interchange Code

Answer: (a)

213. The octal equivalent of 1110001:

(a) 71 (b) 161

(c) 113 (d) 121

Answer: (b)

214. Which of the following is not a peripheral device?

(a) Printer (b) Key board

(c) Monitor (d) Hard disk

Answer: (d)

215. A dumb terminal has:

(a) Microprocessor, but no memory

(b) No microprocessor, but huge amount of memory

(c) A keyboard and screen

(d) Processor, memory and I/O devices

Answer: (c)

216. Which of the following are the two maincomponents of the CPU

(a) Control unit and registers

(b) Registers and main memory

(c) Control unit and ALU

(d) ALU and bus

Answer: (c)

217. The process of starting a computer by loading instructions from a

secondary storage device into computer memory is called:

(a) Start up (b) Loading

(c) Paging (d) Booting

Answer: (d)

218. Which of the following is human readable version of a program?

(a) System code (b) Compiled code

(c) Machine code (d) Source code

Answer: (d)

219. ....... is a virtual network of libraries of different academic institutions

(a) BRNET (b) INFLIBNET

(c) NIC NET (d) UGCNET

Answer: (b)

220. The memory which is programmed at the time it is manufactured:

(a) Floppy disk (b) RAM

(c) EPROM (d) ROM

Answer: (d)

_______________________________________________________
Youtube.com/Tech zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

221. To move the cursor across the screen, _____ key is used.

(a) Control (b) Tab

(c) Alt (d) Delete

Answer: (b)

222. 1 MB Stands for?

(a) 1024 bits (b) 1024 GB

(c) 1024 KB (d) 1024 Bytes

Answer: (c)

223. Which statement is valid about the interpreter?

(a) It translates the entire program at a time

(b) Object code is saved for the future use

(c) It translates one instruction at a time

(d) It is used for testing a program

Answer: (c)

224. MP3 is a kind of:

(a) Input device (b) Output device

(c) Sound format (d) Printer

Answer: (c)

225. HTTPS stands for:

(a) Hypertext Transfer Protocol Secure

(b) Hypertext Transport Protocol Security

(c) Hypertext Transfer Per Second

(d) Hypertext Transfer Protocol Security

Answer: (a)

226. In O.M.R, the letter ‘M’ stands for:

(a) Memory (b) Mark

(c) Mode (d) Mega

Answer: (b)

227. What type of a device is 3.5 inch floppy drive?

(a) Input (b) Output

(c) Software (d) Storage

Answer: (d)

228. What is the fullform of Wi-Fi?

(a) Wired Fidelity (b) Wireless Fidelity

(c) Wireless Fixation (d) Wired Fixation

Answer: (b)

229. During the processing phase of a program, the computer converts the input

data into:

(a) Suggestions (b) Records

(c) Reports (d) Information

Answer: (d)

230. The capacity at which a given communication channel transfers

information is known as:

(a) Network capacity (b) Channel capacity

(c) Bandwidth (d) Band capacity

Answer: (c)

231. Which of the following is used to check for errors in RAM chips?

(A) ROM Chip (B) Microprocessor Chip

(C) Parity Chip (D) EPROM Chip

Answer: (c)

232. All other computers other than the server is called

(A) Nodes (B) Switch

(C) bus (D) bridge

Answer: (a)

233. Missing slot covers on a computer can cause

(A) Over Heat (B) Power surge

(C) EMI (D) Incomplete path for ESD

Answer: (a)

234. WWW was introduced on:

(A) 12th March 1989 (B) 26th July 1988

(C) 13th May 1986 (D) 12th June 1988

Answer: (a)

235. What is the first web based email service?

(A) Gmail (B) Hotmail

(C) Yahoo mail (D) Outlook

Answer: (b)

236. The sortware used to visit a website is

(A) search engine (B) browser

(C) file manager (D) www

Answer: (b)

237. The dos command used to change directory Is?

(A) tree (B) md

(C) subst (D) cd

Answer: (b)

238. Which of the following refers to a small, single· site network?

(A) LAN ) (B) DSL

(C) RAM (D) USB

Answer: (a)

239. The term push and pop is related to

(A) linked list (B) Que

(C) Stack (D) Array

Answer: (b)

240. The term 'blog' was first come by

(A) John Barger (B) Jan Koum

(C) Brain Acton (D) Peter Merholz

Answer: (d)

241. Buffer is where

(A) Data are permanently stored (B) Data with error are stored

(C) Incomplete data are stored (D) Data are temporarily stored

Answer: (d)

242. Standard using High level language in Internet?

(A) Unix (B) Pascal

(C) Java (D) Basic

Answer: (c)

243. The symbols used in assembly language are

(A) Codes (B) Mnemonics

(C) Notations (D) All of these

Answer: (b)

244. A device that connects to a network without the use of cables is said to be

(A) distributed (B) cabled

(C) centralised (D) wireless

Answer: (d)

245. Which of the following domain is used by profit or ganlsations

(A) .org ( (B) .com )

(C) .net (D) .eou

Answer: (b)

246. The first web Robot is

(A) Rovio (B) Python

(C) wandex (D) Java

Answer: (c)

247. The term 'redbook', 'yellow book' and 'orange book' is related to

(A) SCSI (B) IDE

(C) PCI (D) CD-ROM

Answer: (d)

248. A gate in which all inputs must be low to get a high output is called

(A) ANAND gate (B) NOR gate

(B) Inverter (D) AND gate

Answer: (b)

249. The principle of locality of reference justifies the use of

(A) Reusable (B) Non reusable

(C) Virtual memory (D) Cache memory

Answer: (d)

250. What is the use of bridge in network?

(A) To connect LAN'S

(C) To control network speed

(B) To separate LAN's

(D) All of the above

Answer: (a)

Cyber laws (Questions & Answers)

1. World Computer Security Day:

(a)October 30 (b) November 30

(c) December 30 (d) January 30

Answer: (b)

2. Many cyber crimes come under the Indian Penal Code. Which one of the

following is an example?

(a) Sending threatening messages by email

(b) Forgery of electronic records

(c) Bogus websites

(d) All of these

Answer: (d)

3. Information Technology Act, 2000 made amendment to which of the

following existing laws?

(a) Indian Penal Code (b) Indian Evidence Act

(c) Bankers Book Evidence Act (d) All of these

Answer: (d)

4. A ____ is a set of exclusive rights granted by a state to an inventor or his

assignee for a limited period of time in exchange for a disclosure of an invention:

(a) Copyright (b) Blog

(c) Patent (d) Trademark

Answer: (c)

5. ____ gives the author of an original work exclusive right for a certain time

period in relation to that work, including its publication, distribution and

adaptation:

(a) Copyright (b) Copy left

(c) Patent (d) Trademark

Answer: (a)

6. The rental of software to consumers without the permission of the copyright

holder known as

(a) Unbundling (b) Renting

(c) Counter Felting (d) Soft loading

Answer: (b)

7. Copying the materials published on the internet as one’s own without proper

acknowledgement is called _____:

(a) Internet Plagiarism (b) Internet reference

(c) Internet surfing (d) Internet publishing

Answer: (a)

8. Any criminal activity that uses a computer either as an instrumentality, target

or a means for perpetuating further crimes comes within the ambit

of:

(a) Software Piracy (b) Cyber Crime

(c) Conventional Crime (d) None of these

Answer: (b)

9. _______ are a bundle of exclusive rights over creations of the mind, both artistic

and commercial:

(a) Intellectual property rights (b) Copyright

(c) Patent (d) Trademark

Answer: (a)

10. Which of the following come under cyber crime?

(a) Intellectual Property Crime (b) Pornography

(c) Online Gambling (d) All the above

Answer: (d)

11. Under the I.T. Act, whoever commits or conspires to commit cyber terrorism

shall be punishable with imprisonment which may extend to ____.

(a) two years (b) five years

(c) ten years (d) imprisonment for life

Answer: (d)

12. An unauthorized program which functions from inside what seems to be an

authorized program, thereby concealing what it is actually doing:

(a) Trojan Horse (b) Voyeur

(c) Diddling (d) Spamming

Answer: (a)

13. As per the IT (Amendment) Act 2008, Tampering with Computer Source

Documents shall be punishable with imprisonment up to years, or with

fine which may extend up to _____rupees, or with both.

(a) two lakh (b) three lakh

(c) four lakh (d) five lakh

Answer: (a)

14. Which of the following is a cyber crime against individual?

(a) Email spoofing (b) Cyber Defamation

(c) Cyber stalking (d) All of these

Answer: (d)

15. The first cyber police station in Kerala was inagurated in:

(a) 2009 (b) 2010 (c) 2011 (d) 2012

Answer: (a)

16. Which of the following is an Intellectual Property crime?

(a) Theft of computer source code

(b) Trademarks violations

(c) Software piracy

(d) All of these

Answer: (d)

17. Altering raw data just before it is processed by a computer and then changing

it back after the processing is completed, is termed:

(a) Salami Attack (b) Data diddling

(c) Computer voyeur (d) none of these

Answer: (b)

18. Use of computer resources to intimidate or coerce others, is termed:

(a) Cybernetics (b) Cyber terrorism

(c) Web hosting (d) none of these

Answer: (b)

19. The criminal reads or copies confidential or proprietary information,but the

data is neither deleted nor changed- This is termed:

(a) Computer voyeur (b) Spamming

(c) Data diddling (d) None of these

Answer: (a)

20. India’s first cyber police station was started at:

(a) Chennai (b) Bangalore

(c) New Delhi (d) Mumbai

Answer: (b)

21. Posting derogatory remarks about the employer on a social networking site

is an example of:

(a) Hacking (b) Spamming

(c) Cyber defamation (d) Spoofing

Answer: (c)

22. The president of India who gave assent to Information Technology Act 2000:

(a) APJ Abdul Kalam (b) K.R.Narayanan

(c) Pratibha Patil (d) None of these

Answer: (b)

23. The IT (Amendment) Bill 2008 was passed by the two houses of the Indian

Parliament on_____ 2008.

(a) December 23 and 24 (b) February 7 and 8

(c) October 26 and 27 (d) Decemeber 30 and 31

Answer: (a)

24.Cyber crime can be defined as:

(a) A crime committed online

(b) Stealing of a computer

(c) Organising theft in a computer shop

(d) None of these

Answer: (a)

25. Cyber Laws are included in:

(a) Union List (b) State List

(c) Residuary Powers (d) Concurrent List

Answer: (c)

26. The seat of the Asian School of Cyber Laws:

(a)New Delhi (b) Pune

(c) Chennai (d) Mumbai

Answer: (b)

27. The explicit portrayal of sexual subject matter is termed:

(a) Pornography (b) Spamming

(c) Junking (d) None of these

Answer: (a)

28. _____refers to email that appears to have been originated from one source

when it was actually sent from another source.

(a) Email bombing (b) Email spoofing

(c) Email spamming (d) None of these

Answer: (b)

29. A type of cyber crime that occurs in pay per click online advertising when a

person, automated script or computer program imitates a legitimate user of a

web browser clicking on an ad, for the purpose of generating a charge per click

without having actual interest in the target of the ad’s link.

(a) Phishing (b) Zombie

(c) Click fraud (d) None of these

Answer: (c)

30. Which of the following is a cyber crime?

( a) Hacking (b) Worm attack

(c) Virus attack (d) All of these

Answer: (d)

31. In cyber law terminology ‘DoS’ means:

(a) Denial of Service (b) Disc operating System

(c) Distant Operator service(d) None of these

Answer: (a)

32. A program that has capability to infect other programs and make copies of

itself and spread into other programs is called:

(a) Worm (b) Virus

(c) Trojan (d) None of these

Answer: (b)

33. The Indian Parliament passed the Information Technology Bill , which is

regarded as the mother legislation regulating the use of computers, computer

systems and computer networks as also data and information in the electronic

format , in the year:

(a) 2000 (b) 2001

(c) 2002 (d) 2003

Answer: (a)

34. Which one of the following is an example of ‘denial of service attack’?

(a) Attempts to “flood” a network, thereby preventing legitimate network traffic

(b) Attempts to disrupt connections between two machines, thereby preventing

access to a service

(c) Attempts to prevent a particular individual from accessing a service

(d) All of these

Answer: (d)

35. The use of the Internet or other electronic means to stalk or harass an

individual, a group of individuals, or an organization is termed:

(a) Cyberspace (b) Cyberstalking

(c) Pornography (d) None of these

Answer: (b)

36. _____ refers to a code of safe and responsible behavior for the internet

community:

(a) Cyber crime (b) Cyber Literacy

(c) Cyber Ethics (d) None of the above

Answer: (c)

37. ____ is a theft in which the internet surfing hours of the victim are used up by

another person by gaining access to the login ID and the password:

(a) Logic bombs (b) Salami attacks

(c) Internet Time theft (d) Web jacking

Answer: (c)

38. _____ software programs are designed to keep computers safe from hackers:

(a) Fire Walls (b) Cyber security measure

(c) Cyber laws (d) None of these

Answer: (a)

39. The compulsive use of internet pornography known as :

(a) Cyber Addiction (b) Cyber sex

(c) Information Overload (d) Cyber Crime

Answer: (b)

40. This unlawful act wherein the computer is either a tool or target or both:

(a) cyber ethics (b) Cyber Crimes

(c) Cyber literacy (d)None of these above

Answer: (b)

41. Cryptography is used for ______.

(a) Privacy (b) safety

(c) copyright purpose (d) All of these

Answer: (d)

42. This is the exclusive right granted by statute to the author of the works to

reproduce dramatic, artistic, literary or musical work or to authorize its

reproduction by others:

(a) Patent (b) Copy Right

(c)Trade Mark (d) None of the above

Answer: (b)

43. Which of the following is not harmful for computer?

(a) Spyware (b) Cookies

(c) Virus (d) Malware

Answer: (b)

44. Which one of the following is an example of unethical behavior of cyber

world?

(a) Communalism (b) Eve teasing

(c) terrorism (d) Pirating Music and Videos

Answer: (d)

45. India passed the IT Act 2000 and notified it for effectiveness on:

(a) 2000 May 17 (b) 2000 June 9

(c) 2000 July 9 (d) 2000 October 17

Answer: (d)

46. Which of the following come under software piracy?

(a) Unbundling (b) Renting

(c)Counter Felting (d) All the above

Answer: (d)

47. Loosely organized groups of Internet criminals are called as:

(a) Cyber Criminals (b) Web Gangs

(c) Organized hackers (d) Crackers

Answer: (b)

48. Cryptography is the practice and study of ———.

(a) Accessing information (b) Hiding information

(c) Distributing information (d) None of the above.

Answer: (b)

49. Feeling guilty or defensive about our internet use is a symptom of ________.

(a) Cyber addiction (b) Net Gaming

(c) Online-Chatting (d) Cyber crime

Answer: (a)

50. Making distributing and selling the software copies those are fake, known as:

(a) Renting (b) Unbundling

(c) Soft Loading (d)Counter felting

Answer: (d)

Information Technology Questions asked in Kerala PSC

Company Corporation Assistant Grade Examinations - 2013.

1. Which of the following is not related to a computer monitor?

(a) VDU

(b) Plasma Display

(c) Pointing devices

(d) CRT

Answer: Pointing devices

2. ......... is an input device commonly available in laptops.

(a) Trackball

(b) Touchpad

(c) Touch screen

(d) Joystick

Answer: Touchpad

3. A temporary storage area attached to the CPU of the computer for input-output operations is a:

(a) Register

(b) Buffer

(c) Channel

(d) Core

Answer: Register

4. Product of the data processing is:

(a) Data

(b) A computer

(c) Software

(d) Information

Answer: Information

5. A collection of parallel lines that connects several devices in a computer is called:

(a) Bus

(b) Link

(c) Bidirectional wires

(d) Cables

Answer: Bus

6. Software installed to help prevent hacking is called:

(a) System software

(b) Antivirus software

(c) Firewall software

(d) Application software

Answer: Firewall software

_______________________________________________________
Youtube.com/Tech Zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

7. Encryption of data means that:

(a) Data cannot be sent over the internet

(b) Data is encoded so it cannot be read without decoding software

(c) Data is kept locked in special room

(d) Data has been hacked into

Answer: Data is encoded so it cannot be read without decoding software

8. A person who gains unauthorized access to a computer network for profit, criminal mischief or

personal pleasure is:

(a) Hacker

(b) Cracker

(c) Programmer

(d) None of these

Answer: Hacker

9. Linux is a .........

(a) Database program

(b) Application program

(c) Operating system

(d) None of these

Answer: Operating system

10. ......... is a legal monopoly granted for a limited time to the owner of an invention?

(a) Trade secrets

(b) Copyright

(c) Trademark

(d) Patent

Answer: Patent

11. This is based on individual who knows how to use information and communication technologies

and those who do not?

(a) Access

(b) Usage

(c) Usage Quality

(d) None of the above

Answer: Usage

12. The kind of crime involves altering raw data just before a computer processes it and then

changing it back after the processing is completed:

(a) Data diddling

(b) Data tampering

(c) Salami attacks

(d) None of the above

Answer: Data diddling

13. Information Technology Act in India was amended in:

(a) 2000

(b) 2004

(c) 2008

(d) 2010

Answer: 2008

14. This network is an autonomous Inter-University Centre of the University Grants Commission:

(a) NICENET

(b) BRNET

(c) INFLIBNET

(d) NICNET

Answer: INFLIBNET

15. Which of the following is not a wireless communication device?

(a) Blue tooth

(b) GPS

(c) Infra red communication

(d) None of these

Answer: None of these

16. Computer to computer exchange of business documents is done through?

(a) EDI

(b) ERP

(c) CAM

(d) CAD

Answer: EDI

17. Who started Free Software Foundation?

(a) Linus Torvald

(b) Richard Stallman

(c) Bill Gates

(d) GNU

Answer: Richard Stallman

18. Which of the following is not an e-governance project in India?

(a) PRAYAN

(b) FRIENDS

(c) Bhoomi

(d) CARD

Answer: PRAYAN

19. The resolution of a monitor is governed by the:

(a) Size of the screen

(b) Cost of the monitor

(c) Contrast of the pixels on the screen

(d) Number of pixels

Answer: Number of pixels

1. In which category does 'youku.com' belongs?

Ans: Video site

2. Expand EDGE:

Ans: Enhanced Data rate for GSM Evolution

3. DIASPORA is a nonprofit, user owned, distributed ____?

Ans: Social Network

4. 13.Eka is a _____?

Ans: Supercomputer

5. Expand FOSS:

Ans: Free and Open Source Software

6. Western Indian Products' is Commonly Known as?

Ans: Wipro

7. Expand VICTERS:

Ans: Virtual Classroom Technology On EDUSAT For Students

8. Expand W3C:

Ans: World Wide Web Consorsium

9. Name the Open Source Software KSEB Uses For Billing?

Ans: Oruma

10. 'Stored Program Concept' postulated by:

Ans: John Von Neumann

11. Founder of the social networking website 'Facebook':

Ans: Mark Elliot Zuckerberg

12. The main route that data travels over the internet is called:

Ans: Internet backbone

13. An IT term refers to allowing someone to open web pages and

see web sites on the internet.

Ans: Web Surfing

14. An Internet protocol that allows quick file transmission to

remote computers is known as:

Ans: FTP

15. The device/software that protects all computers in the network

from many attacks is called:

Ans: Firewall

16. Free telephone style conversations to travel over the internet

to virtually anywhere in the world is known as:

Ans: Internet Telephony

17. What is the full form of USB?

Ans: Universal Serial Bus

18. Who invented computer mouse?

Ans: Douglas Engelbart

19. Who invented QWERTY type Keyboard?

Ans: Christopher Sholes

20. Who invented Compact Disc (CD)?

Ans: James Russell

21. Who is known as the Father of Internet?

Ans: Vint Cerf

22. Who invented Integrated Circuit (IC) chips?

Ans: Jack Kilby and Robert Noyce

23. What is the full form of PDF?

Ans: Portable Document Format

24. In cyber law terminology 'DoS' me:

Ans: Denial of Service

25. What is meant by liveware?

Ans: People who work with the computer

_______________________________________________________
Youtube.com/Tech Zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

30. Which of the following is a cyber crime?

( a) Hacking (b) Worm attack

(c) Virus attack (d) All of these

Answer: (d)

31. In cyber law terminology ‘DoS’ means:

(a) Denial of Service (b) Disc operating System

(c) Distant Operator service(d) None of these

Answer: (a)

32. A program that has capability to infect other programs and make copies of

itself and spread into other programs is called:

(a) Worm (b) Virus

(c) Trojan (d) None of these

Answer: (b)

33. The Indian Parliament passed the Information Technology Bill , which is

regarded as the mother legislation regulating the use of computers, computer

systems and computer networks as also data and information in the electronic

format , in the year:

(a) 2000 (b) 2001

(c) 2002 (d) 2003

Answer: (a)

34. Which one of the following is an example of ‘denial of service attack’?

(a) Attempts to “flood” a network, thereby preventing legitimate network traffic

(b) Attempts to disrupt connections between two machines, thereby preventing

access to a service

(c) Attempts to prevent a particular individual from accessing a service

(d) All of these

Answer: (d)

35. The use of the Internet or other electronic means to stalk or harass an

individual, a group of individuals, or an organization is termed:

(a) Cyberspace (b) Cyberstalking

(c) Pornography (d) None of these

Answer: (b)

36. _____ refers to a code of safe and responsible behavior for the internet

community:

(a) Cyber crime (b) Cyber Literacy

(c) Cyber Ethics (d) None of the above

Answer: (c)

37. ____ is a theft in which the internet surfing hours of the victim are used up by

another person by gaining access to the login ID and the password:

(a) Logic bombs (b) Salami attacks

(c) Internet Time theft (d) Web jacking

Answer: (c)

38. _____ software programs are designed to keep computers safe from hackers:

(a) Fire Walls (b) Cyber security measure

(c) Cyber laws (d) None of these

Answer: (a)

39. The compulsive use of internet pornography known as :

(a) Cyber Addiction (b) Cyber sex

(c) Information Overload (d) Cyber Crime

Answer: (b)

40. This unlawful act wherein the computer is either a tool or target or both:

(a) cyber ethics (b) Cyber Crimes

(c) Cyber literacy (d)None of these above

Answer: (b)

41. Cryptography is used for ______.

(a) Privacy (b) safety

(c) copyright purpose (d) All of these

Answer: (d)

42. This is the exclusive right granted by statute to the author of the works to

reproduce dramatic, artistic, literary or musical work or to authorize its

reproduction by others:

(a) Patent (b) Copy Right

(c)Trade Mark (d) None of the above

Answer: (b)

43. Which of the following is not harmful for computer?

(a) Spyware (b) Cookies

(c) Virus (d) Malware

Answer: (b)

44. Which one of the following is an example of unethical behavior of cyber

world?

(a) Communalism (b) Eve teasing

(c) terrorism (d) Pirating Music and Videos

Answer: (d)

45. India passed the IT Act 2000 and notified it for effectiveness on:

(a) 2000 May 17 (b) 2000 June 9

(c) 2000 July 9 (d) 2000 October 17

Answer: (d)

46. Which of the following come under software piracy?

(a) Unbundling (b) Renting

(c)Counter Felting (d) All the above

Answer: (d)

47. Loosely organized groups of Internet criminals are called as:

(a) Cyber Criminals (b) Web Gangs

(c) Organized hackers (d) Crackers

Answer: (b)

48. Cryptography is the practice and study of ———.

(a) Accessing information (b) Hiding information

(c) Distributing information (d) None of the above.

Answer: (b)

49. Feeling guilty or defensive about our internet use is a symptom of ________.

(a) Cyber addiction (b) Net Gaming

(c) Online-Chatting (d) Cyber crime

Answer: (a)

50. Making distributing and selling the software copies those are fake, known as:

(a) Renting (b) Unbundling

(c) Soft Loading (d)Counter felting

Answer: (d)

Information Technology Questions asked in Kerala PSC

Company Corporation Assistant Grade Examinations - 2013.

1. Which of the following is not related to a computer monitor?

(a) VDU

(b) Plasma Display

(c) Pointing devices

(d) CRT

Answer: Pointing devices

2. ......... is an input device commonly available in laptops.

(a) Trackball

(b) Touchpad

(c) Touch screen

(d) Joystick

Answer: Touchpad

3. A temporary storage area attached to the CPU of the computer for input-output operations is a:

(a) Register

(b) Buffer

(c) Channel

(d) Core

Answer: Register

4. Product of the data processing is:

(a) Data

(b) A computer

(c) Software

(d) Information

Answer: Information

5. A collection of parallel lines that connects several devices in a computer is called:

(a) Bus

(b) Link

(c) Bidirectional wires

(d) Cables

Answer: Bus

6. Software installed to help prevent hacking is called:

(a) System software

(b) Antivirus software

(c) Firewall software

(d) Application software

Answer: Firewall software

_______________________________________________________
Youtube.com/Tech Zone PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

7. Encryption of data means that:

(a) Data cannot be sent over the internet

(b) Data is encoded so it cannot be read without decoding software

(c) Data is kept locked in special room

(d) Data has been hacked into

Answer: Data is encoded so it cannot be read without decoding software

8. A person who gains unauthorized access to a computer network for profit, criminal mischief or

personal pleasure is:

(a) Hacker

(b) Cracker

(c) Programmer

(d) None of these

Answer: Hacker

9. Linux is a .........

(a) Database program

(b) Application program

(c) Operating system

(d) None of these

Answer: Operating system

10. ......... is a legal monopoly granted for a limited time to the owner of an invention?

(a) Trade secrets

(b) Copyright

(c) Trademark

(d) Patent

Answer: Patent

11. This is based on individual who knows how to use information and communication technologies

and those who do not?

(a) Access

(b) Usage

(c) Usage Quality

(d) None of the above

Answer: Usage

12. The kind of crime involves altering raw data just before a computer processes it and then

changing it back after the processing is completed:

(a) Data diddling

(b) Data tampering

(c) Salami attacks

(d) None of the above

Answer: Data diddling

13. Information Technology Act in India was amended in:

(a) 2000

(b) 2004

(c) 2008

(d) 2010

Answer: 2008

14. This network is an autonomous Inter-University Centre of the University Grants Commission:

(a) NICENET

(b) BRNET

(c) INFLIBNET

(d) NICNET

Answer: INFLIBNET

15. Which of the following is not a wireless communication device?

(a) Blue tooth

(b) GPS

(c) Infra red communication

(d) None of these

Answer: None of these

16. Computer to computer exchange of business documents is done through?

(a) EDI

(b) ERP

(c) CAM

(d) CAD

Answer: EDI

17. Who started Free Software Foundation?

(a) Linus Torvald

(b) Richard Stallman

(c) Bill Gates

(d) GNU

Answer: Richard Stallman

18. Which of the following is not an e-governance project in India?

(a) PRAYAN

(b) FRIENDS

Page 42 of 43

(c) Bhoomi

(d) CARD

Answer: PRAYAN

19. The resolution of a monitor is governed by the:

(a) Size of the screen

(b) Cost of the monitor

(c) Contrast of the pixels on the screen

(d) Number of pixels

Answer: Number of pixels

1. In which category does 'youku.com' belongs?

Ans: Video site

2. Expand EDGE:

Ans: Enhanced Data rate for GSM Evolution

3. DIASPORA is a nonprofit, user owned, distributed ____?

Ans: Social Network

4. 13.Eka is a _____?

Ans: Supercomputer

5. Expand FOSS:

Ans: Free and Open Source Software

6. Western Indian Products' is Commonly Known as?

Ans: Wipro

7. Expand VICTERS:

Ans: Virtual Classroom Technology On EDUSAT For Students

8. Expand W3C:

Ans: World Wide Web Consorsium

9. Name the Open Source Software KSEB Uses For Billing?

Ans: Oruma

10. 'Stored Program Concept' postulated by:

Ans: John Von Neumann

11. Founder of the social networking website 'Facebook':

Ans: Mark Elliot Zuckerberg

Page 43 of 43

12. The main route that data travels over the internet is called:

Ans: Internet backbone

13. An IT term refers to allowing someone to open web pages and

see web sites on the internet.

Ans: Web Surfing

14. An Internet protocol that allows quick file transmission to

remote computers is known as:

Ans: FTP

15. The device/software that protects all computers in the network

from many attacks is called:

Ans: Firewall

16. Free telephone style conversations to travel over the internet

to virtually anywhere in the world is known as:

Ans: Internet Telephony

17. What is the full form of USB?

Ans: Universal Serial Bus

18. Who invented computer mouse?

Ans: Douglas Engelbart

19. Who invented QWERTY type Keyboard?

Ans: Christopher Sholes

20. Who invented Compact Disc (CD)?

Ans: James Russell

21. Who is known as the Father of Internet?

Ans: Vint Cerf

22. Who invented Integrated Circuit (IC) chips?

Ans: Jack Kilby and Robert Noyce

23. What is the full form of PDF?

Ans: Portable Document Format

24. In cyber law terminology 'DoS' me:

Ans: Denial of Service

25. What is meant by liveware?

Ans: People who work with the computer

_______________________________________________________
Youtube.com/Tech Zone  PSC
WhatsApp +918893088933
Free psc class : click & subscribe

http://bit.ly/2FNyy3e ( free Psc class )

ഞങ്ങളുടെ ധhatsapp നമ്പർ: +918893088933
Tech Zone PSC ക്ലാസ് എന്ന് നമ്പർ SAVE ചെയ്യുക
എന്നിട്ട് മാത്രം മെസേജുകൾ അയക്കുക അല്ലാത്തപക്ഷം സേവനങ്ങൾ ലഭിക്കുകയില്ല

_______________________________________________________

IT PSC QUESTIONS AND ANSWERS

Special Rank Rare PSC Questions Tech zone PSC Join free WhatsApp updates +918893088933 YouTube.com/ Tech Zone PSC

Special Rank Rare PSC Questions Tech zone PSC Join free WhatsApp updates +918893088933 YouTube.com/ Tech Zone PSC 1. With which does t...