Which one of the following is not a microprocessor manufacturing company ?

FPI stands for :

Which of the following program is not a utility?

Which is the national nodal agency for responding to computer security incidents as and when they occur ?

What is the minimum bandwidth required for broadband connection ?

The process of recovering deleted and damaged files from criminal's computers comes under:

What does the .com domain represents?

Which of the following is the first commercial web browser ?

A website's main page is called ?

Which among the following is not an Open Source Software ?

Programs stored in ROM are called

What is E-mail Spoofing ?

Software, such as Explorer and Firefox, are referred to as

Which access method is used for obtaining a record from a cassette tape ?

Phishing is :

The open source software version of Netscape ?

ഇന്റർനെറ്റിന്റെ പിതാവ് എന്നറിയപ്പെടുന്നത് ആര് ?

Which of the following is correct format of Email address ?

The motto of SPG (Special Protection group) :

ടെലഗ്രാം എന്ന സോഷ്യൽ മീഡിയയുടെ സ്ഥാപകൻ ആരാണ് ?

ഇന്ത്യൻ I T ആക്ട് പാസ്സാക്കിയത് എന്നാണ് ?

സൈബർ ടെററിസവുമായി ബന്ധപ്പെട്ട I T ഭേദഗതി നിയമത്തിലെ സെക്ഷൻ ഏതാണ് ?

A printer is this kind of device:

An email account with storage area ?

Which hardware device is used to interconnect different types of networks with different protocols?

_____ is the modification of software to remove or disable features which areundesirable by a person.

The protocol used for retrieving email from a mail server is :

Which of the following is not a browsing software ?

ഒരു നെറ്റ്വർക്ക് ഹബ്ബിന്റെ കാര്യത്തിൽ ശരിയായ പ്രസ്താവന/പ്രസ്താവനകൾ ഏത് ?

i. ഒരു പ്രൈവറ്റ് നെറ്റ്വർക്കിലെ വിവിധ കമ്പ്യൂട്ടറുകളെ തമ്മിൽ ബന്ധിപ്പിക്കുവാൻ ഉപയോഗിക്കുന്നു.

ii. ഡാറ്റ പായ്ക്കറ്റുകൾ സ്വീകർത്താവിന് മാത്രം അയയ്ക്കുന്നു.

iii. ഹബ്ബിന് ഒരു ഇൻപുട്ട് പോർട്ടും ഒരു ഔട്ട്പുട്ട് പോർട്ടും ആണ് ഉള്ളത്.

Forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source is known as:

Google was founded in _____

net domain is used for

Which among the following is not an internet browser

In order to use cable for browsing web you will need

The limit for ADSL service is

An internet protocol address (IP address) is

WWW provides standardized access to

What should be minimum requirement of random-access memory (RAM) for internet access

The cyber terrorism comes under:

Which virus is treated as the first computer virus?

Which was the first search engine in the Internet?

The network topology in which nodes are connected to a central hub as known as

World Computer Security day is on:

Richard Stallman is in connection with :

The founder of Wiki Leaks is :

The term _____ refers to a bad or criminal hacker.

Find one that not belong to browser software :

Computers in the same room can be connected by using :

A unique number assigned to each computer on the Internet:

A programme used to access a resource provided by a server: