Computer and Information Technology (Part III) One Liner Questions & Answers

 

Questions Answers
1 On which principle do digital computers work? Logical
2 If a domain name ends with .edu.us, then it is – An educational institute in USA
3 On the website of an organization ‘.com’ indicates – Commercial
4 To increase the length of a network without loss of signal strength, we would use – Repeater
5 In computer terminology, U.S.B. stands for – Universal Serial Bus
6 The place where accessories are connected in the computer is known as – Port
7 ‘Password’ in computers protects – Unauthorized access of the system
8 Which infotech terminology is used to find out the User’s E-mail address? Finger
9 In India, the term “Public Key Infrastructure” is used in the context of – Digital security infrastructure
10 Blowfish is a type of – Symmetric Encryption Algorithm
11 Which work is not done by a computer? Understanding
12 Which industry is the primary user of Magnetic Ink Character Recognition (MICR)? Banks
13 O.M.R. stands for – Optical Mark Reader
14 Which one is mainly used in checking objective-type answer papers in the examination? OMR
15 I.R.C. stands for – Internet Relay Chat
16 For which word, the letter ‘G’ has been used in ‘2G Spectrum’? Generation
17 C.A.D. stands for – Computer-Aided Design
18 ‘GIF’ stands for – Graphical Interchange Format
19 The use of Computers in Governance is known as – E-Governance
20 Multimedia can contain – Graphics, animation, video, music and voice
21 When information is dialed on the telephone and read on the television screen, it is known as – Telefax
22 The service of the Internet that provides ‘audio’ and ‘video’ conversation, is called – Video Conferencing
23 E-Mail stands for – Electronic Mail
24 What are the two parts of an e-mail address? User name and domain name
25 The domain name of the E-mail address is marked. sttol @ITdesk.info is – ITdesk. info
26 What is singular data? Datum
27 Word ‘blog’ is a combination of two words – Web-log
28 A ‘menu’ contains a list of – Commands
29 The size of virtual memory depends on – Disc space
30 ICT stands for – Information & Communications Technology
31 The full form of SIM is – Subscriber Identity Module
32 SMS Means – Short messaging service
33 How many days will the picture message stay in the private inbox? 30 Days
34 The latest Android mobile operating system 6.0 is named as – Marshmallow
35 When customers of a Website are unable to access it due to flooding of fake network traffic, it is known as – Denial of service attack
36 In Cyber Law terminology ‘DOS’ means – Denial of service
37 A computer hacker is –
A person who violates computer security with malicious intentions for personal gain
38 In the context of computer security, crackers are also known as – Black hat hackers
39 One who gains unauthorized access, destroys vital data, denies legitimate user’s service or causes problems for their targets is called – Cracker
40 Cybercrime is – Disc space
41 The first cyber law which provides the legal infrastructure for e-commerce in India is – The Information Technology Act, 2000
42 The basic Input-Output system in the computer resides – On the Hard Disc
43 Data systems for planning are often called – Decision Support System
44 The speedometer of a car represents – Analog computer
45 Another name for computer programs is – Computer Software
46 Who is the Chief of Wipro Company? Azim Premji
47 Cloud computing services do not include – Allotment of electromagnetic spectrum
48 ‘Project Loon’, sometimes seen in the news, is related to – Wireless communication technology
49 The web portal DACNET is related to – E-Agriculture
50 The full form of I.B.M. is – International Business Machine
51 What is the full form of HTTP? Hypertext Transfer Protocol
52 Which protocol may be used for accessing the World Wide Web? HTTP
53 HTML stands for – Hyper Text Markup Language
54 What does XML stand for? Extensible Markup Language
55 URL stands for – Uniform Resource Locator
56 FTP stands for – File Transfer Protocol
57 SMPS stands for – Switched Mode Power Supply
58 The full form of UPS is – Uninterrupted Power Supply
59 Written Programs, due to which computers function in the desired way, are called – Software
60 How many minimum number of NAND gates are needed to implement Ex-OR functions? 4
61 ‘World Computer Literacy Day’ is celebrated on – 2nd December
62 Enhancement of the use of information technology for development is the strategy of – Andhra Pradesh Government
63 The term Information Technology can be defined as – Connectivity + Hardware