App Logo

No.1 PSC Learning App

1M+ Downloads

Which of the following program is not a utility?

Which is the national nodal agency for responding to computer security incidents as and when they occur ?

What is the minimum bandwidth required for broadband connection ?

The process of recovering deleted and damaged files from criminal's computers comes under:

What does the .com domain represents?

Which of the following is the first commercial web browser ?

A website's main page is called ?

Which among the following is not an Open Source Software ?

Programs stored in ROM are called

What is E-mail Spoofing ?

Software, such as Explorer and Firefox, are referred to as

Which access method is used for obtaining a record from a cassette tape ?

Phishing is :

ഇന്റർനെറ്റിന്റെ പിതാവ് എന്നറിയപ്പെടുന്നത് ആര് ?

The open source software version of Netscape ?

Which of the following is correct format of Email address ?

The motto of SPG (Special Protection group) :

An email account with storage area ?

ടെലഗ്രാം എന്ന സോഷ്യൽ മീഡിയയുടെ സ്ഥാപകൻ ആരാണ് ?

ഇന്ത്യൻ I T ആക്ട് പാസ്സാക്കിയത് എന്നാണ് ?

സൈബർ ടെററിസവുമായി ബന്ധപ്പെട്ട I T ഭേദഗതി നിയമത്തിലെ സെക്ഷൻ ഏതാണ് ?

A printer is this kind of device:

Which hardware device is used to interconnect different types of networks with different protocols?

_____ is the modification of software to remove or disable features which areundesirable by a person.

The protocol used for retrieving email from a mail server is :

Which of the following is not a browsing software ?

ഒരു നെറ്റ്വർക്ക് ഹബ്ബിന്റെ കാര്യത്തിൽ ശരിയായ പ്രസ്താവന/പ്രസ്താവനകൾ ഏത് ?

i. ഒരു പ്രൈവറ്റ് നെറ്റ്വർക്കിലെ വിവിധ കമ്പ്യൂട്ടറുകളെ തമ്മിൽ ബന്ധിപ്പിക്കുവാൻ ഉപയോഗിക്കുന്നു.

ii. ഡാറ്റ പായ്ക്കറ്റുകൾ സ്വീകർത്താവിന് മാത്രം അയയ്ക്കുന്നു.

iii. ഹബ്ബിന് ഒരു ഇൻപുട്ട് പോർട്ടും ഒരു ഔട്ട്പുട്ട് പോർട്ടും ആണ് ഉള്ളത്.

Forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source is known as:

Google was founded in _____

net domain is used for

Which among the following is not an internet browser

In order to use cable for browsing web you will need

An internet protocol address (IP address) is

WWW provides standardized access to

What should be minimum requirement of random-access memory (RAM) for internet access

The cyber terrorism comes under:

Which virus is treated as the first computer virus?

Which was the first search engine in the Internet?

The network topology in which nodes are connected to a central hub as known as

World Computer Security day is on:

Richard Stallman is in connection with :

The founder of Wiki Leaks is :

The term _____ refers to a bad or criminal hacker.

Find one that not belong to browser software :

A programme used to access a resource provided by a server:

A unique number assigned to each computer on the Internet:

Computers in the same room can be connected by using :

URL stands for

Every Web page has a unique address called ____________

..... is one of the first social networking sites