Advertisement

views

Kerala PSC - IT and Cyber Law Question and Answers - 52


1. Name the Malayali who is the founder of Rediff.com?


2. Cheetah, Puma, Jaguar, Panther, Tiger, Leopard, Snow Leopard are the version of which operating system?


3. Where was the first computer installed in India?


4. Name the educational programming language designed by Wally Feurzeig, Seymour Papert and Cynthia Solomon in 1967?


5. Who first used the word 'bit' in 1948 in his seminar paper 'A Mathematical Theory of Communication'?


6. The fraudulent practice of stealing money repeatedly in small quantities usually by taking advantage of rounding to the nearest unit in financial transactions is termed as


7. The new version of deep blue computer which defeated Garry Kasparov in chess?


8. A program that visits websites and reads their pages and other information in order to create entries for a search engine index is called?


9. POS machine is an electronic device used to process card payments etc at retail locations POS denotes?


10. The most widely used standard code represents each character as a unique or 8 bit code which was developed from telegraph code is


11. Who founded a company named wheels of Zeus in 2002?


12. In Artificial Intelligence, which test is a method of inquiring for determining whether or not a computer is capable of thinking like a human being?


13. In digital marketing which term is used to denote the deliberate manipulation of search engine indexes?


14. Name the post manteau word which is an act of misusing a computer system or network for a socially or politically motivated reason is


15. Which social media game was claimed to be invented by a psychology student Philipp Budeikin?


16. The act of browsing the internet by getting from one web page to another web page using hyperlinks in an internet browser is termed as?


17. RDRAM is a type of computer device active memory. While expanding RDRAM the first letter R represents what?


18. 'Replace' option is availabe in?


19. The criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. This is termed?


20. What is the science revolving around the used of nanostructures to build devices on an extremely small scale?



Post a Comment

0 Comments