||On which principle do digital computers work?
||If a domain name ends with .edu.us, then it is –
||An educational institute in USA
||On the website of an organization ‘.com’ indicates –
||To increase the length of a network without loss of signal strength, we would use –
||In computer terminology, U.S.B. stands for –
||Universal Serial Bus
||The place where accessories are connected in the computer is known as –
||‘Password’ in computers protects –
||Unauthorized access of the system
||Which infotech terminology is used to find out the User’s E-mail address?
||In India, the term “Public Key Infrastructure” is used in the context of –
||Digital security infrastructure
||Blowfish is a type of –
||Symmetric Encryption Algorithm
||Which work is not done by a computer?
||Which industry is the primary user of Magnetic Ink Character Recognition (MICR)?
||O.M.R. stands for –
||Optical Mark Reader
||Which one is mainly used in checking objective-type answer papers in the examination?
||I.R.C. stands for –
||Internet Relay Chat
||For which word, the letter ‘G’ has been used in ‘2G Spectrum’?
||C.A.D. stands for –
||‘GIF’ stands for –
||Graphical Interchange Format
||The use of Computers in Governance is known as –
||Multimedia can contain –
||Graphics, animation, video, music and voice
||When information is dialed on the telephone and read on the television screen, it is known as –
||The service of the Internet that provides ‘audio’ and ‘video’ conversation, is called –
||E-Mail stands for –
||What are the two parts of an e-mail address?
||User name and domain name
||The domain name of the E-mail address is marked. sttol @ITdesk.info is –
||What is singular data?
||Word ‘blog’ is a combination of two words –
||A ‘menu’ contains a list of –
||The size of virtual memory depends on –
||ICT stands for –
||Information & Communications Technology
||The full form of SIM is –
||Subscriber Identity Module
||SMS Means –
||Short messaging service
||How many days will the picture message stay in the private inbox?
||The latest Android mobile operating system 6.0 is named as –
||When customers of a Website are unable to access it due to flooding of fake network traffic, it is known as –
||Denial of service attack
||In Cyber Law terminology ‘DOS’ means –
||Denial of service
||A computer hacker is –
A person who violates computer security with malicious intentions for personal gain
||In the context of computer security, crackers are also known as –
||Black hat hackers
||One who gains unauthorized access, destroys vital data, denies legitimate user’s service or causes problems for their targets is called –
||Cybercrime is –
||The first cyber law which provides the legal infrastructure for e-commerce in India is –
||The Information Technology Act, 2000
||The basic Input-Output system in the computer resides –
||On the Hard Disc
||Data systems for planning are often called –
||Decision Support System
||The speedometer of a car represents –
||Another name for computer programs is –
||Who is the Chief of Wipro Company?
||Cloud computing services do not include –
||Allotment of electromagnetic spectrum
||‘Project Loon’, sometimes seen in the news, is related to –
||Wireless communication technology
||The web portal DACNET is related to –
||The full form of I.B.M. is –
||International Business Machine
||What is the full form of HTTP?
||Hypertext Transfer Protocol
||Which protocol may be used for accessing the World Wide Web?
||HTML stands for –
||Hyper Text Markup Language
||What does XML stand for?
||Extensible Markup Language
||URL stands for –
||Uniform Resource Locator
||FTP stands for –
||File Transfer Protocol
||SMPS stands for –
||Switched Mode Power Supply
||The full form of UPS is –
||Uninterrupted Power Supply
||Written Programs, due to which computers function in the desired way, are called –
||How many minimum number of NAND gates are needed to implement Ex-OR functions?
||‘World Computer Literacy Day’ is celebrated on –
||Enhancement of the use of information technology for development is the strategy of –
||Andhra Pradesh Government
||The term Information Technology can be defined as –
||Connectivity + Hardware