Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Kerala PSC||It &Cyber Law||Part 2(in Malayalam)
2,418 plays

Previous questions

Siji Biju is teaching live on Unacademy Plus

Siji Biju
FB Page : pscnotes-sijibiju Telegram : pscnotes YouTube. : pscnotes

  1. It &cyberlaw

  2. 4. Which of the following technology is used for exchange of data between different systems? A. Extensible markup language B. Hypertext markup language C. Dynamic hypertext markup language D. Practical extraction and reporting language Extensible Markup Language (XML) is usedto describe data. The XML standard is a flexible way to create information formats and electronically share structured data via the public Internet, as well as via corporate networks Hypertext Markup Language is the standard markup language for creating web pages and web applications for

  3. 5. A Java program that execute from a web page is called A. Portlet B.servlet C.weblet D.applet Applet is a Java program that can be embedded into aweb page. It runs inside the webbrowser and works at client side. Applet is embedded in a HTML pageusing the APPLET or OBJECT tag and hosted on a web server

  4. 6. A private computer network within an organisation or company that allows controlled access from the outside is known as? A. Intranet .extra net C.biznet D.firmnet however, is that an intranet is typically used internally. While an extranet allows businesses to communicate with clients and vendors, an intranet allows employees and colleagues to work with each other in a virtual space-no outside parties are involved HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP

  5. 7. Which is standard protocol for sending emails across the internet? A. Hypertext transfer protocol B. Post office protocol C. Simple mail transfer protocol D. Internet message access protocol

  6. 8. Software piracy refers to? A. Unauthorised copying of software B. Data theft by means of software C. Spreading of malicious software D. Daniel service of attack on a server

  7. 9.which of the following terms is not associated with th cybercrime of attempting to acquire information by masquerading as a trustworthy entity? A.whaling B. clone phishing C. bait fishing D.spear phishing

  8. 10. Section 67 of IT act 2000 deals with? A. Tampering of computer source documents B.penalty for damage to computer computer systems extra C. Establishment of Cyber appellate Tribunal D. Publishing of information which is obscene in electronic form