Computer Information Technology Part-6

Total Questions: 50

41. What are the unique features of recently launched iPhone 4S? [U.P. Lower Sub. (Pre) 2009]

Select the correct answer from the codes given below:

  1. It has 300 hours of standby time.
  2. It has 8 hours of talk time on 3G.
  3. It has a voice recognizing and talking assistant.
  4. It has 640 MB of RAM.

Codes:

Correct Answer: (c) 2 and 3
Note:

iPhone 4S is a smartphone that was designed and marketed by Apple Inc. It had a dual-core Apple A5 processor with 512 MB RAM. The iPhone 4S had a 200 hours standby time, 8 hours talk time on 3G, and 14 hours talk time on 2G. It also introduced a new voice recognizing and talking assistant named Siri. Apple's latest mobiles are iPhone 15, 15 Plus, 15 Pro, and 15 Pro Max, which were released in September 2023. They are the seventeenth generation of iPhones.

42. Using websites to pour out one's grievances is called: [Jharkhand P.C.S. (Pre) 2023]

Correct Answer: (d) Cyber venting
Note:

Using a website to pour out one's grievances is called cyber venting. Cyber venting is the act of denigrating about one's employer, senior executives, etc., with the motive of letting out the anger and frustration using online websites. While the websites do not restrict the mentioning of the name of the employer, company or its address, it allows for the anonymity of the employee who posts the comments. Cyber venting relaxes and calms people in short-run.

43. When customers of a Website are unable to access it due to flooding of fake network traffic, it is known as [M.P. P.C.S. (Pre) 2018]

Correct Answer: (d) denial of service attack
Note:

A denial of service (DOS) is any type of attack where the attacker (hackers) attempt to prevent legitimate users from accessing the website. In a DOS attack, the attackers usually send excessive messages asking the network or server to authenticate requests that have invalid return addresses. As the service becomes unable to handle the deluge of connections and traffic it is receiving, it shuts down or drops legitimate requests coming from real users.

44. In Cyber Law terminology 'DOS' means : [Uttarakhand P.C.S. (Pre) 2012]

Correct Answer: (a) Denial of Service
Note:

A denial of service (DOS) is any type of attack where the attacker (hackers) attempt to prevent legitimate users from accessing the website. In a DOS attack, the attackers usually send excessive messages asking the network or server to authenticate requests that have invalid return addresses. As the service becomes unable to handle the deluge of connections and traffic it is receiving, it shuts down or drops legitimate requests coming from real users.

45. What is Distributed Denial of Service (DDoS) attack? [Chhattisgarh P.C.S. (Pre) 2021]

Correct Answer: (b) A cyber attack
Note:

A Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. In a DDoS attack, the incoming traffic flooding the victim originates from many different sources. DDoS cyber attacks are carried out with networks of Internet-connected machines. DDoS attacks are a primary concern in Internet security today. More sophisticated strategies are required to mitigate this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources.

46. What do you understand by hacking? [M.P.P.C.S. (Pre) 2010]

Correct Answer: (d) None of these
Note:

Hacking is the process of exploiting vulnerabilities to gain unauthorized access to a system or resources by an unknown person.

47. A computer hacker is : [M.P.P.C.S. (Pre) 2012]

Correct Answer: (b) A person who violates computer security with malicious intention for personal gain
Note:

A computer hacker is one who attempts to crack someone else's system or otherwise uses programming or expert knowledge to act maliciously. While 'hacker' can refer to any skilled computer programmer, the term has become associated in popular culture with a 'security hacker', someone who with their technical knowledge, uses bugs or exploits to break into computer systems.

48. The term ........... refers to an individual who breaks into computer systems without authorization, deliberately defaces websites for a fraudulent purpose. [M.P. P.C.S. (Pre) 2018]

Correct Answer: (c) cracker
Note:

A cracker is an individual who performs cracking or the process of breaking into a computer or a network system. A cracker might be performing cracking to malicious activities, profit, for certain non-profit intentions or causes, or just for a challenge. Some crackers break into a network system deliberately to point out the flaws involved in that network’s security system. In most cases, crackers aim to gain access to confidential data, get hold of free software applications or carry out malicious damage to files.

49. In the context of computer security, crackers are also known as : [M.P.P.C.S. (Pre) 2017]

Correct Answer: (a) black hat hackers
Note:

 

A black hat hacker, sometimes called a cracker, is someone who breaks computer security without any authority and uses technology to deliberately damage the system, commits fraud, steals identity and does other illegal activities on other people's networks.

50. One who gains unauthorized access, destroys vital data, denies legitimate user's service or causes problems for their targets is called [M.P.P.C.S. (Pre) 2019]

Correct Answer: (b) Cracker
Note:

A cracker or black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. He gains unauthorized access in a computer system or network, destroys vital data, denies legitimate user's service or causes problems for their targets. This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that crackers or black hat hackers may exploit.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *