Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Kerala PSC||It& cyber law||Part1 (in Malayalam)
2,145 plays

Previous questions

Siji Biju is teaching live on Unacademy Plus

Siji Biju
Computer Engineering Pg in sociology Cracked Kerala PSC

Unacademy user
B part is also erroneous sir ji
Vijendra Singh
a year ago
thanks. we will use were in place of was.
Pls share the link
Please share the link
  1. It &cyberlaw

  2. 1. A group of 4 bits is known as > A. Byte b nibble C. Octet D. quartet

  3. Decimal.. .hexa decimal 2 the hexadecimal equivalent of the decimal .2 number 162 A a2 B b2 C.c2 D.d2 15 162/16....Oremainder 2

  4. 3.which of the following system software translated execute high level languages source code statement by statement? A. Assembler .compiler C. interpreter D. operating system Interpreter Compiler Translates program one statement at a time. Scans the entire program and translates it as a whole into machine code. It takes large amount of time to It takes less amount of time to analyze the source analyze the source code but the code but the overall execution time is time is slower. overall execution comparatively faster.

  5. 4. Which of the following technology is used for exchange of data between different systems? A. Extensible markup language B. Hypertext markup language C. Dynamic hypertext markup language D. Practical extraction and reporting language Extensible Markup Language (XML) is usedto describe data. The XML standard is a flexible way to create information formats and electronically share structured data via the public Internet, as well as via corporate networks Hypertext Markup Language is the standard markup language for creating web pages and web applications for

  6. 5. A Java program that execute from a web page is called A. Portlet B.servlet C.weblet D.applet Applet is a Java program that can be embedded into aweb page. It runs inside the webbrowser and works at client side. Applet is embedded in a HTML pageusing the APPLET or OBJECT tag and hosted on a web server

  7. 6. A private computer network within an organisation or company that allows controlled access from the outside is known as? A. Intranet .extra net C.biznet D.firmnet however, is that an intranet is typically used internally. While an extranet allows businesses to communicate with clients and vendors, an intranet allows employees and colleagues to work with each other in a virtual space-no outside parties are involved HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP

  8. 7. Which is standard protocol for sending emails across the internet? A. Hypertext transfer protocol B. Post office protocol C. Simple mail transfer protocol D. Internet message access protocol

  9. 8. Software piracy refers to? A. Unauthorised copying of software B. Data theft by means of software C. Spreading of malicious software D. Daniel service of attack on a server

  10. 9.which of the following terms is not associated with th cybercrime of attempting to acquire information by masquerading as a trustworthy entity? A.whaling B. clone phishing C. bait fishing D.spear phishing