Showing posts with label Information technology. Show all posts
Showing posts with label Information technology. Show all posts

Tuesday, 29 January 2013

kerala psc computer question

 Arson
  • Arson is the crime of intentionally and maliciously setting fire to buildings, wildland areas,carsor other property with the intent to cause damage. 
  • Arson often involves fires deliberately set to the property of another or to one's own property as to collect insurance compensation 
  Larceny

  •  Larceny is a crime involving the wrongful acquisition of the personal property of another person.
  •  It was an offence under the common law of England and became an offence in jurisdictions which incorporated the common law of England into their own law.
 Embezzlement
  •  Embezzlement is the act of dishonestly withholding assets for the purpose of conversion (theft) of such assets by one or more individuals to whom such assets have been entrusted, to be held and/or used for other purposes.

  • Embezzlement is a kind of financial fraud
 To See the Question =>click here


Saturday, 5 January 2013

Computer gk Questions

kerala psc Computer gk Questions

Objective Question Bank


1. Data going into the computer is called
Ans. Input

2. How many values can be represented by a single byte?
Ans. 512

3. Microsoft Office is:
Ans. An application suite

4. Information travels between components on the motherboard through:
Ans. Buses

5. One megabyte equals approximately
Ans. 1 million bytes

6. When you are working on a document on PC, where is the document temporarily stored?
Ans. RAM

7. How are data organized in a spreadsheet?
Ans. Rows and columns

8. Magnetic tape is not practical for applications where data must be quickly recalled because tape is:
Ans. An expensive storage medium

9. When cutting and pasting, item cut is temporarily stored in:
Ans. Clipboard

10. One advantage of dial-up internet access is:
Ans. It utilizes existing telephone service

11. Network components are connected to the same cable in the ………… topology
Ans. Bus

12. Two or more computers connected to each other for sharing information form a:
Ans. Network

13. What is the term for unsolicited e-mail?
Ans. Spam

14. What type of program controls the various computer parts and allows the user to interact with the computer?
Ans. Operating system

15. Office LANs that are spread geographically apart on a large scale can be connected using a corporate
Ans. LAN

16. What is the process of copying software programs from secondary storage media to the hard disk called?
Ans. Installation

17. The code for a Web page is written using …………….
Ans. HTML

18. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
Ans. Table

19. The first computers were programmed using:
Ans. Machine language

20. When the pointer is positioned on a …………., it is shaped like a hand.
Ans. Hyperlink