Information Technology (IT) and Cyber laws Notes for University/High Court assistant Exam
±The process of loading the operating system in to computer memory
a)Formatting
b)Booting
c)Phishing
d)Data sharing
±——————- is used to authenticate electronic Records
a)Electronic seal
b)Electronic Badge
c)Electronic signature
d)Electronic ID
±Section 67 A in IT act related to……..
±
a)Hacking
b)Violation of piracy
c)Sending offensive messages
d)Cyber pornography
±Second generation of computer is based on the technology
±
±transistors
±Which of the following is used for email transmission across internet?
a)SMTP
b)POP
c)IMAP
d)FTP
±Where does the computer add and compare its data?
a)Hard disk
b)CPU
c)Memory
d)Floppy disc
±After copying the content, how many times can you paste?
a)Once
b)Twice
c)Zero
d)Many
±Who invented QWERTY keyboard?
a)Carl shoels
b)Christopher latham sholes
c)None of these
±Gate that is also known as inverter is called
±AND
±NAND
±XOR
±NOT
±Which device in computer can understand difference between data programs?
1.Input device
2.Output device
3.Memory
4.Microprocessor
±——- are specially designed computer that perform complex calculations rapidly
1.Tablets
2.Laptops
3.Super computers
4.Main frames
±Use of electronic messaging system to send unsolicited message is called……..
1.Stalking
2.Spamming
3.Spoofing
4.Bombing
±The command LINUX ‘echo’ is used to….
Display message on the screen
Display a command
Display the date and time
None of the above
±bluetooth was developed by;
1.Apple
2.Erricson
3.Samsung
4.Nokia
±A 32 bit micro processor has the wordlength equal to …
a)2 byte
b)32 byte
c)4 byte
d)1 byte
you can watch the Video Class here
https://www.youtube.com/watch?v=GxovMrwbI1A