Computer and Information Technology Part (2)

Computer and Information Technology Part (2)

Total Questions: 50

11. Which one of the following is not information technology terminology? [U.P.P.C.S.(pre) 2001]

Correct Answer: (c) Optical storage
Solution:Cyberspace, Upload, and Modem are terminology related to information technology, but Optical Storage refers to computer engineering and is not specifically IT terminology.

12. Which one of the following is not related to computer infotech terminology? [U.P.P.C.S. (MAINS) 2002]

Correct Answer: (c) Pinaka
Solution:Among the given options, Pinaka is not related to infotech terminology. It is a multiple rocket launcher produced in India and  developed by the Defence Research and Development Organization (DRDO) for the Indian Army.

13. Which one of the following is part of computer infotech terminology? [U.P.P.C.S. (pre) 2011]

Correct Answer: (d) All of the above
Solution:In information technology, a protocol is the special set of rules used by telecommunication connections when they communicate. A  Login is a set of credentials used to access to an area that requires proper authorization. Archie is  a  program that allow you to  search the flies of all the Internet FTP  servers that offer  anonymous FTP (file Transfer Protocol).

14. A set of rules that governs data communication is called: [U.P. Lower Sub (mains) 2015]

Correct Answer: (a) Protocols
Solution:A protocol is a set of rules that governs data communication. It represents an agreement between the communicating devices.
Without a protocol, two devices may be connected but not communicating with each other.

15. The set of protocols, which defines all transmission exchanges across the internet is called: [Uttarakhand P.C.S. (Pre) 2016]

Correct Answer: (b) TCP/IP
Solution:Transmission Control Protocol (TCP) is a routing protocol, while Internet Protocol (IP) is a routed protocol. Information on the internet is in the form of packets. The task of TCP is to create such packets, put them into systematic work, and ensure that no packet is missing. Whenever a packet is sent, it is given an IP address. Thus, IP is a process that places every piece of information in its right place.

16. IP addresses are used on which layer of OSI reference model? [Uttarakhand P.C.S. (Pre) 2021]

Correct Answer: (a) Network Layer
Solution:The Internet Layer of the TCP/IP model aligns with the Layer 3 (Network Layer) of the OSI reference model. This is where IP addresses and routing live. When data is transmitted from a node on one LAN to a node on a different LAN, the Internet Layer is used. Hence, IP Address works at the network layer of the OSI model.

17. The layer between Physical and Network layer is known as: [U.P. Lower Sub. (Mains) 2013]

Correct Answer: (a) Data Link Layer
Solution:The Open Systems Interconnection (OSI) reference model has been an essential element of computer network design since its ratification in 1984. The OSI model divides the complex task of computer-to-computer communications, traditionally called internetworking into a series of stages known as layers. The ISO-OSI model consists of seven-layer architecture. The physical layer or layer 1 is the first (lowest) layer. The data link layer or layer 2 is the second layer and the network layer is layer 3. So it is clear that data link layer exists between physical and network layer.

18. In a network environment, which is not a server? [M.P.P.C.S. (Pre) 2021]

Correct Answer: (d) Network Server
Solution:In a network environment, network server is not server. Network servers are high-powered computers used as a central repository for data and various programs shared by users within a network. A few examples of the types of servers in a network environment are as follows: Web server, Application server, Proxy server, Mail server, File server, Database server, Print server etc.

19. Junk email is also called - [M.P.P.C.S. (Pre) 2013]

Correct Answer: (d) Spam
Solution:Junk email messages are 'spam' messages which are unsolicited and typically unwanted. They are filtered by the service, and the service rejects the spam based on the reputation of the sending IP address.

20. Which of the following acronyms is normally used to describe unsolicited junk emails? [M.P.P.C.S. (Pre) 2018]

Correct Answer: (d) SPAM
Solution:Junk email messages are 'spam' messages which are unsolicited and typically unwanted. They are filtered by the service, and the service rejects the spam based on the reputation of the sending IP address.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *