Computer and Information Technology Part (2)

Computer and Information Technology Part (2)

Total Questions: 50

41. A program that has the capability to infect other programs and make copies of itself and spread into other programs is called: [Uttarakhand P.C.S. (Pre) 2012]

Correct Answer: (b) Virus
Solution:Viruses, Worms, Trojans, and Bots are all part of a class of software called malware. A program that has the capability to infect other programs and make copies of it is called a virus.

42. Firewall is used in Communication Network/System for protection from: [M.P.P.C.S. (Pre) 2014]

Correct Answer: (a) Unauthorized attack
Solution:Firewall is a system designed to prevent an unauthorized private network to be created. Firewalls can be implemented in both hardware and software or a combination of both. Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet. All messages entering or leaving the internet pass through the firewall which examines each message and blocks those that do not meet the specified security criteria

43. What is the purpose of a firewall in cyber securit [M.P.P.C.S. (Pre) 2023]

Correct Answer: (b) To block unauthorized access to a network.
Solution:A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. It prevents unauthorized access to a network.

44. One of the first viruses to attract widespread public attention was designed to infect MS-DOS on 6th March 1992. Name of the virus is: [M.P.P.C.S. (Pre) 2006]

Correct Answer: (c) Michael Angelo
Solution:Michael Angelo was one of the first viruses designed to infect MS-DOS on 6th March 1992. It was first found in Australia in 1991.

45. 'Stuxnet' worm detected in the computers of Iran is: [U.P. U.D.A/L.D.A. (Pre) 2019]

Correct Answer: (b) A malicious program to sabotage nuclear centrifuges.
Solution:Stuxnet is a computer worm that targets industrial control systems, like those used to monitor and control power plants, dams, and waste processing systems. It was detected in the computers of the Bushehr nuclear power plant in Iran and is considered very dangerous for systems controlled by computers.

46. The terms 'WannaCry,' 'Petya,' and 'EternalBlue,' sometimes mentioned in the news recently, are related to: [I.A.S. (Pre) 2018]

Correct Answer: (c) Cyberattacks
Solution:WannaCry and Petya are two of the biggest cyber attacks in history, impacting the finances of many companies worldwide. The WannaCry ransomware virus, which appeared in May 2017, spread quickly across computer networks. Petya was another form of ransomware. EternalBlue was a cyberattack exploit used as part of the WannaCry ransomware attack.

47. In which country, the Pegasus spyware has been developed? [67th B.P.S.C. (Pre) 2022]

Correct Answer: (a) Israel
Solution:Israel's NSO Group has developed Pegasus spyware, the world's most invasive spyware. It can find a route into a target's device without requiring the target to take any action, such as clicking a link.

48. MS-DOS was first released in: [Uttarakhand Lower Sub. (Pre) 2010]

Correct Answer: (b) 1981
Solution:Microsoft Disk Operating System (MS-DOS) is a non-graphical command line operating system derived from 86-DOS. It was created for IBM-compatible computers and introduced by Microsoft in August 1981. The last update was in 1994 with MS-DOS .

49. 'Windows 3' a popular windowing environment was released by Microsoft in the year: [Uttarakhand P.C.S. (Pre) 2005]

Correct Answer: (d) 1990
Solution:Microsoft Windows is an operating system developed by Microsoft. Windows 3 was released in 1990. The most recent version, Windows 11, was released in October 2021.

50. Windows operating system was developed by: [Uttarakhand U.D.A./L.D.A. (Mains) 2006]

Correct Answer: (a) Microsoft
Solution:The Windows operating system was developed by the Microsoft Corporation.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *