0% found this document useful (0 votes)
171 views59 pages

Computer IT Cyber Law Model Questions JCI

Uploaded by

kfslmsbase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views59 pages

Computer IT Cyber Law Model Questions JCI

Uploaded by

kfslmsbase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

Computer, IT, Cyber

Law Model
Questions - JCI

(https://www.entri.me) (https://play.google.com/store/apps/details?
id=me.entri.entrime)
1. What is Phishing?

A
Hacker's attack intended to redirect a website's traffic to another, bogus site.

B
Act of browsing the Internet by going from one web page to another web page
using hyperlinks in an Internet browser.

C An attempt to obtain sensitive information from a computer system.

D
It is the use of electronic messaging systems to send an unsolicited message
(spam), especially advertising, as well as sending messages repeatedly on the
same site.

Solution

Phishing is the fraudulent attempt to obtain sensitive information


such as usernames, passwords and credit card details by disguising
oneself as a trustworthy entity in an electronic communication.
Cyber crimes are crimes committed in connection with computer,
internet and mobile phone devices.

Cyberstalking is a threat made over the Internet, email, phone call,


text message, web camera, website, or video.

Hacking is the act of illegally entering or taking control of another's


computer system and destroying computer programs or data.
2. Which of the following is not an output device?

A Keyboard

B Printer

C Speaker

D Monitor

Solution

An output device is any device used to send data from a computer to


another device or user.
Most computer data output that is meant for humans is in the form
of audio or video. Thus, most output devices used by humans are in
these categories.
Examples include monitors, projectors, speakers, headphones and
printers.
3. What is the use of bridge in a network ?

A To connect to LANS

B To Separate LANS

C To control network speed

D All of the above

Solution

A bridge is a type of computer network device that provides


interconnection with other bridge networks that use the same
protocol.
Bridge devices work at the data link layer of the Open System
Interconnect (OSI) model, connecting two different networks
together and providing communication between them.
LAN- Local area network
4. What is the full form of HTML?

A Hyphenation Text Mark up Language

B Hyper Text Mark up Language

C Hyphenation Text Marking Language

D Hyper Text Marking Language

Solution

Hypertext Markup Language is the standard markup language for creating


web pages and web applications. With Cascading Style Sheets and
JavaScript, it forms a triad of cornerstone technologies for the World Wide
Web.
5. <p>As compared to the secondary storage devices, primary storage
units have:</p>

A <p>Faster</p>

B <p>Costlier</p>

C <p>Less storage capacity</p>

D <p>All the above</p>

Solution
Primary memory is the main memory ( RAM) where the operating
system resides.
Secondary memory can be external devices like CD, floppy
magnetic discs etc.
Secondary storage cannot be directly accessed by the CPU and is
also external memory storage.
6. Full form of URL is?

A Uniform Resource Locator

B Uniform Resource Link

C Uniform Registered Link

D Unified Resource Link

Solution

A URL (Uniform Resource Locator) is a unique identifier used to


locate a resource on the Internet.
It is also referred to as a web address. URLs consist of multiple parts
-- including a protocol and domain name -- that tell a web browser
how and where to retrieve a resource.
The URL contains the name of the protocol needed to access a
resource, as well as a resource name.
The first part of a URL identifies what protocol to use as the primary
access medium. The second part identifies the IP address or domain
name -- and possibly subdomain -- where the resource is located.
7. Facebook is launched in?

A 2004

B 2006

C 2007

D 2008

Solution

Facebook founded by Mark Zuckerberg.


It is a social networking website, it was launched in February, 2004.
Its headquarters is at Menlo Park,California.
Minimum age to join facebook is 13 years old.
8. Which of the following describe router functions?

A Packet switching

B Packet filtering

C Internetwork communication

D All of the above

Solution

Routers provide packet switching, packet filtering, internetwork


communication, and path selection.
A ROUTER is a networking device that is used to extend or segment
networks by forwarding packets from one logical network to
another.
Routers are most often used in large internetworks that use the
TCP/IP protocol suite and for connecting TCP/IP hosts and local
area networks (LANs) to the Internet using dedicated leased lines.
9. In LAN,WAN and MAN, what does each first letter stand for?

A Local, Warm, Main

B Local, Wide, Metropolitan

C Legal, Wide, Metro

D None of these

Solution

LAN- Local Area Network is locally available within a network.


WAN- WIde Area Network is available within a particular city
MAN-Metropolitan Area Network is available over a wide network.
10. Which among the following are considered as a cyber crime ?

1. Unauthorized Access and Hacking


2. Denial of service Attack
3. Salami Attack
4. Vital Information Resources under Siege Attack

A 1 and 2 only

B 3 and 4 only

C 1 , 2 and 4

D 1 , 2 , 3 and 4

Solution

All the options are cyber crimes.

A salami attack is when small attacks add up to one major attack that can
go undetected due to the nature of this type of cyber crime. It also known
as salami slicing.
11. Which of the following network type is used for television cable
network ?

A LAN

B MAN

C WAN

D SAN

Solution

A local area network (LAN) is a computer network that interconnects


computers within a limited area such as a residence, school, laboratory,
university campus or office building.

A wide area network (WAN) is a telecommunications network that extends


over a large geographical area for the primary purpose of computer
networking. Wide area networks are often established with leased
telecommunication circuits.

A metropolitan area network (MAN) is a computer network that


interconnects users with computer resources in a geographic region of the
size of a metropolitan area. The term MAN is applied to the
interconnection of local area networks (LANs) in a city into a single larger
network which may then also offer efficient connection to a wide area
network. The term is also used to describe the interconnection of several
local area networks in a metropolitan area through the use of point-to-point
connections between them .

A storage area network (SAN) or storage network is a computer network


which provides access to consolidated, block-level data storage. SANs are
primarily used to enhance accessibility of storage devices, such as disk
arrays and tape libraries, to servers so that the devices appear to the
operating system as locally-attached devices. A SAN typically is a
dedicated network of storage devices not accessible through the local area
network (LAN) by other devices, thereby preventing interference of LAN
traffic in data transfer.
12. Which of the following is not a network device ?

A NIC

B HUB

C SWITCH

D None of the above

Solution

Network devices:

1. NIC
2. HUB
3. Switch
4. Bridge
5. Router
6. Gateways
7. Repeater
8. Multiplexer
9. De Multiplexer
13. What does WAN stand for?

A Wap Area Network

B Wide Area Network

C Wide Array Net

D Wireless Area Network

Solution

Wide area network is a telecommunication network or computer


network that extends over a large geographical distance/place.
Wide area networks are often established with leased
telecommunication circuits.
14. Founder of Facebook?

A Ray Tomlinson

B Mark Zuckerberg

C Vinton Gray Cerf

D Jan Koum

Solution

Today, Mark Zuckerberg is one of the richest men in the world.


Facebook is the second most used network in the world after
Google.
The website was started by Harvard University students Mark
Zuckerberg, Dustin Moskovitz and Chris Hughes.
15. Which device enables movement of data from one network to other
network?

A HUB

B Repeater

C Router

D Modem
Solution

A router is a device that enables the movement of data from one


netwo
Network devices:

NIC
HUB
Switch
Bridge
Router
Gateways
Repeater
Multiplexer
De Multiplexer
16. The full form of www is

A Web Working Window

B Window World Wide

C World Wide Web

D World Working Web

Solution

The full form of www is World Wide Web. The World Wide Web
(WWW) is combination of all resources and users on the Internet
that are using the Hypertext Transfer Protocol (HTTP). The Web, as
it’s commonly known, is often confused with the Internet. Although
the two are intricately connected, they are different things. The
Internet is, as its name implies, a network – a vast, global network
that incorporates a multitude of lesser networks. As such, the
Internet consists of supporting infrastructure and other technologies.
In contrast, the Web is a communications model that, through HTTP,
enables the exchange of information over the Internet. Tim Berners
Lee is the inventor of the World Wide Web.
17. What is known as network interface card?

A Modem

B Ethernet card

C ISDN

D Repeater

Solution

NIC-Network Interface card


A Network interface card is an electronic device that connects a
computer to a computer network, usually a LAN.
It is considered a piece of computer hardware.
Most modern computers support an internal network interface
controller embedded in the motherboard directly rather than
provided as an external component.
18. In which year Twitter was launched?

A 2006

B 2004

C 2010

D 2002

Solution

Twitter is a social networking service on which users post and


interact with messages known as "tweets".
Twitter was launched on 21st March 2006, San Francisco,
California, United States.
Twitter was created by Jack Dorsey, Noah Glass, Biz Stone, and
Evan Williams.
19. Switch is a network device whose responsibility is to ---------.

A Connect Network devices

B Restart the Network

C Protect from virus attack

D Connect the Other Devices

Solution

Switch is a network device whose responsibility is to Connect


Network devices.
NIC-Network Interface card
A Network interface card is an electronic device that connects a
computer to a computer network, usually a LAN.
It is considered a piece of computer hardware
20. What do you call hacking with good intentions?

A White hackers

B Black hackers

C Gray Hackers

D None of these

Solution

White Hat Hacker

White Hat hackers are also known as Ethical Hackers.


They never intent to harm a system, rather they try to find out
weaknesses in a computer or a network system as a part of
penetration testing and vulnerability assessments.

Ethical hacking is not illegal and it is one of the demanding jobs


available in the IT industry. There are numerous companies that hire
ethical hackers for penetration testing and vulnerability assessments.

Black Hat Hacker

Black hat hackers also are known as crackers because he accesses


the system in an unauthorised way to harm the system or to steal
sensitive information or money.
Black Hat hacking is always illegal hackers because of its bad intent
for stealing violating privacy, blocking network communication,
damaging the system, corporate data, etc.
21. What is Registers?

A
Register are used to quickly accept, store, and transfer data and instructions

B Register are used to record data.

C Register are used to encrypt data

D Register are used to decrypt data

Solution
Register are used to quickly accept, store, and transfer data and
instructions that are being used immediately by the CPU, there are various
types of Registers those are used for various purpose. Among of the some
Mostly used Registers named as AC or Accumulator, Data Register or DR,
the AR or Address Register, program counter (PC), Memory Data Register
(MDR) ,Index register,Memory Buffer Register.
22. Which of the following is primary memory ?

A RAM

B ROM

C SSD

D Both A and B
Solution

Primary memory is computer memory that a processor or computer


accesses first or directly.
It allows a processor to access running execution applications and
services that are temporarily stored in a specific memory location.
Primary memory is also known as primary storage or main memory.
23. Choose the correct statement/s about Data and Data processing ?

1. It denotes raw facts and figures such as numbers, words,


amount, quantity etc.

2. Storage and instructions are the product of processed data.

3. It refers to the operations performed on data to generate


information.

A 3 only

B 1 and 3

C 2 only

D 1 and 2

Solution
The word 'data' is originated from the Latin word 'datum'

Collection of facts and figures are called Data

The way that computers manipulate data into information is called


processing

Data processing therefore refers to the process of transforming raw


data into meaningful output i.e. information
Information refers to the meaningful output obtained after
processing the data.
24. Choose the incorrect statement/s about Input unit?

1 . It converts information into suitable binary code form acceptable


to a computer.

2 . Data entered through these devices are temporarily stored in the


main memory.

3 . A variety of devices are available to input the data depending on


its nature.

4 . We get the results of processed data through this.

A 2 and 4

B 1 and 3

C 4 only

D 1 and 4

Solution
Device which receives data for processing are called Input devices

The data may be in different forms like number, text, image, audio,
video etc.
Examples - Keyboard, Mouse, Scanner, Light pen, Joystick, Optical
Mark Reader(OMR), Magnetic Ink Character Recognition(MICR),
Barcode Reader etc

4th statement is about Output unit.


25. Choose the correct statement/s about the fuctions of Input devices?

1. Accepts instructions and data from the outside world

2. Supplies the converted instructions and data to the computer


for processing

3. Converts instructions and data into a form acceptable to the


computer

A 1 only

B 1 and 2

C 1 and 3

D All of these

Solution
Input unit is one of the functional unit of a computer

4 Functional unit of a computer are,

Input unit, Central processing unit (CPU), Storage unit and Output unit

The computer will be of no use unless it is able to communicate with


the outside world.
Input/Output devices are required for users to communicate with the
computer

Input devices bring information INTO the computer and Output


devices bring information OUT of a computer system
26. Choose the correct statement/s about Central Processing Unit?

1. Responsible for activating and controlling the operations of


other units of the computer

2. All the data processing is done inside the CPU

3. Control unit is the only part of the CPU

A 1 only

B 1 and 2

C 2 and 3

D All of these

Solution

3 parts of CPU are,

Arithmetic and Logic unit (ALU), Control Unit(CU) and Memory unit

ALU performs all arithmetical and logical operations.

CU controls and coordinates the funtions of all units of a computer


sysytem

Memory unit is used for the storage of data. Memory is mainly


classified into primary memory and seconadry memory
27. Choose the correct statement/s about functions of CPU?

1. The acutal operations specified in the instructions are carried


out in the ALU.

2. The data and instructions stores in the storage unit are


transfered to the Control unit and the processing takes place in
it.

3. There is a data flow between the storage and the ALU many
times before the entire processing is completed.

A 1 only

B 2 and 3

C 1 and 3

D All of these

Solution

All statements are about Arithmetic and logic unit of CPU

The data and instructions stores in the storage unit are transfered to
the ALU and the processing takes place in it
Intermediate results produced by the ALU are temporarily
transferred back to the storage and are retrieved later when needed
for further processing.

ALU performs calculations and logical operations such as


comparisons and decision making.
28. Choose the correct statement/s related to the functions of CPU?

1. The central nervous system that manages and coordinates all


other units of the computer is ALU.

2. Parts of CPU which decode program instruction is control unit.

3. Control unit invokes the other units to take charge of the


operation they are associated with.

A 1 and 2

B 1 and 3

C 2 and 3

D All of these

Solution
All statement is about Control unit not ALU.

Control unit is known as the nerve centre of the computer.

It fetches instruction from memory

Control unit obtains instructions from the program stored in the


memory, interprets the operation and issues signals to the unit
concerned in the system to execute them.
29. Which of the following statements are true?

1. ALU is responsible for all computing and decision making


operations and coordinates the working of a computer
2. The performance of the CPU determines the overall
performance of a computer
3. CPU is the integrated circuit package which contains millions
of transistors and other components fabricated into a single
silicon chip which is known as microprocessor

A 1,2

B 2.3

C 1,2,3

D 1,3

Solution

CPU is responsible for all computing and decision making


operations and coordinates the working of a computer.
The arithmetic-logic unit (ALU) is that functional part of the digital
computer that carries out arithmetic and logic operations on machine
words that represent operands.
The control unit (CU) is a component of a computer's central
processing unit (CPU) that directs the operation of the processor.
30. Which among the followings are microprocessors?

1. Intel core i5
2. Intel core i7
3. AMB Octa core
4. AMD Quad core

A 1,2,4

B 1,2

C 1,3,4

D 1,2,3

Solution

A microprocessor is a computer processor where the data processing


logic and control is included on a single integrated circuit, or a small
number of integrated circuits.
The microprocessor contains the arithmetic, logic, and control
circuitry required to perform the functions of a computer's central
processing unit.
Examples of microprocessors Intel Pentium 4. Intel Core i7. AMD
Athlon.
31. Which of the following statements are not true about Registers?

1. Registers located outside the CPU


2. A register permanently holds frequently used data, instructions,
and memory address that are to be used by CPU.
3. It is a part of the main memory
4. Registers are the storage locations that offer advantage of speed

A 1,2

B 2,3,4

C 1,2,3

D 2,3

Solution

Registers are a type of computer memory used to quickly accept,


store, and transfer data and instructions that are being used
immediately by the CPU
Registers located inside the CPU
A register temporarly holds frequently used data, instructions, and
memory address that are to be used by CPU.
It is not a part of the main memory
32. Devices on one network can communicate with devices on another
network via a ............

A file server

B Utility server

C Printer server

D gateway

Solution

Gateways are network protocol converters.


The two networks joined by a gateway use different underlying
protocols.
A gateway can be implemented entirely in software, hardware, or a
combination of both.
33. What is computer network?

A Set of devices connected through links

B All input devices

C All output devices

D None of the above

Solution

A computer network is a set of devices connected through links.


A node can be a computer, printer or any other devices capable of
sending and receiving data.
A network is a collection of computers, servers, mainframes,
network devices, peripherals, or other devices connected to allow
data sharing.
The most common resource shared today is connection to the
Internet. Other shared resources can include a printer or a file server.
The Internet itself can be considered a computer network.
34. What are the types of network topology?

A Bus

B Ring

C Tree

D All of the above

Solution

There are 6 types of network topology.


They are as follows:
Bus topology
Ring topology
Tree topology
star topology
Mesh topology
Hybrid topology
35. ------------ connects electronic devices within a user's immediate area?

A LAN

B MAN

C PAN

D WAN

Solution

LAN- Local Area Network is locally available within a network.


WAN- WIde Area Network is available within a particular city
MAN-Metropolitan Area Network is available over a wide network.
36. -------is a collection of devices connected together in one physical
location, such as a building, office, or home ?

A LAN

B MAN

C PAN

D WAN

Solution

A local-area network (LAN) is a computer network that spans a


relatively small area.
Most often, a LAN is confined to a single room, building or group of
buildings, however, one LAN can be connected to other LANs over
any distance via telephone lines and radio waves.
WAN- WIde Area Network is available within a particular city
MAN-Metropolitan Area Network is available over a wide network.
37. The main disadvantage of a hub is ?

A Not effective

B Increases the effective bandwidth

C Increases the network traffic

D None of these

Solution

A hub is a network device that connects various network nodes, e.g.


in an Ethernet, in a star configuration.
In the OSI (Open Systems Interconnections) reference model, hubs
are classified as level 1 devices that operate at the physical layer.
Their main task is to interconnect several computers and
immediately forward received data.
38. Clients can access the documents on the servers using software
.............

A Browser

B Hyperlinks

C Search engines

D None of these

Solution

A browser is an application program that provides a way to look at


and interact with all the information on the World Wide Web.
This includes Web pages, videos and images.
39. Which of the following are the examples of search engines?

A Google

B Yask

C Bing

D All of these

Solution

A search engine is a software system designed to carry out web


searches.
They search the World Wide Web in a systematic way for particular
information specified in a textual web search query.
The search results are generally presented in a line of results, often
referred to as search engine results pages.
40. Cyber squatting is...........?

A Creating fake websites

B Crime by a financial institution

C Hacking

D None of these

Solution

Cybersquatting is the practice of registering, trafficking in, or using an


Internet domain name, with bad faith intent to profit from the goodwill of a
trademark belonging to someone else.
41. Which of the following terms are associated with cyber crime?

A Hacking

B Phishing

C Cyber squatting

D All of these

Solution

Cybercrime is a crime that involves a computer and a network.


The computer may have been used in the commission of a crime, or
it may be the target.
Cybercrime may harm someone's security and financial health.
42. Which of the following is not a social media ?

A Facebook

B Instagram

C Whatsapp

D All of the above are examples of social media.

Solution

Social media are interactive technologies that facilitate the creation


and sharing of information, ideas, interests, and other forms of
expression through virtual communities and networks.
Social media are interactive Web 2.0 Internet-based applications.
Social media helps the development of online social networks by
connecting a user's profile with those of other individuals or groups.
43. Social medias are classified into ----- types ?

A 4

B 5

C 6

D 2

Solution

Social medias are classified into 6 types


Internet forums
Social blogs
Micro blogs
Wikis
Social networks
Content communities
44. ------- is an online discussion website where people can engage in
conversations in the form of posted messages ?

A Internet forums

B Microblogs

C Wikis

D None of the above

Solution

An Internet forum , or message board, is an online discussion site


where people can hold conversations in the form of posted
messages.
Forums have a specific set of jargon associated with them; e.g., a
single conversation is called a "thread", or topic.
45. ------ is a discussion or informational website consisting of entries or
posts displayed in the reverse chronological order ?

A Post

B Blog

C Comment

D Status

Solution

Blog is a regularly updated website or web page, typically one run


by an individual or small group, that is written in an informal or
conversational style.
Some blogs provide comments on a particular subject
examples are - blogger.com,wordpress.com
46. Twitter is an example of ------ ?

A Internet forums

B Microblogs

C Wikis

D None of the above

Solution

Microblogs allows users to exchange short sentances individual


images or video links
Twitter is a microblogging and social networking service on which
users post and interact with messages known as "tweets", owned by
American company Twitter, Inc.
Registered users can post, like, and retweet tweets, however,
unregistered users have the ability to only read tweets that are
publicly available .
47. Youtube is an example of --------- ?

A Internet forums

B Microblogs

C Wikis

D Content communities

Solution

Content communities are sites that allow users to share multimedia


content.
These communities include sites like YouTube (www.youtube.com),
Daily Motion (www.dailymotion.com), Imagr (http://imgur.com
(http://imgur.com)), Tumblr (www.tumblr.com), and FlickR
(www.flickr.com).
(https://play.google.com/store/apps/details?
(https://www.entri.me)
id=me.entri.entrime)

You might also like