Computer (Part-3)

Total Questions: 50

1. In the field of computing, what does VRML stand for? [S.S.C. Online CHSL (T-I) 19.03.2020 (Shift-I)]

Correct Answer: (d) Virtual Reality Mark Up Language
Solution:VRML stands for Virtual Reality markup Language.
  1. VRML is an open-standard programming language created to design three-dimensional (3D) and Web- based models, textures and illusions.
  2. VRML is used to illustrate 3D objects, buildings, landscapes or other items requiring 3D structure and is very similar to Hypertext Markup Language (HTML).
  3. VRML also uses textual representation to define 3D illusion presentation methods.

2. What is the full form of BASIC in context of the BASIC computer language? [S.S.C. Online CHSL (T-I) 16.10.2020 (Shift-II)]

Correct Answer: (d) Beginner's All-Purpose Symbolic Instruction Code
Solution:The full form of BASIC in the context of BASIC computer language is Beginners All-Purpose symbolic instruction code.
  • BASIC is one of the simplest and earliest high-level programming language supports in all operating systems.
  • John G. Kemeny and Thomas E. Kurtz designed original BASIC language Dartmouth Basic in 1964, with the purpose that all students should be able to use the computers in every field.

3. In context of computing, what is the full form of URL? [S.S.C. Online CHSL (T-I) 14.10.2020 (Shift-II)]

Correct Answer: (a) Uniform Resource Locator
Solution:URL stands for "Uniform Resource Locator."
  • A URL is a reference or address used to access resources on the internet, such as web pages, images, and files. It specifies the location of a resource and the protocol used to retrieve it.

4. Choose the odd one out- [S.S.C. Online CHSL (T-I) 2.02.2017 (Shift-I)]

Correct Answer: (c) HTML
Solution:WWW and cyberspace are subsets of the Internet and thus are related to each other, while HTML is the language used to build web pages.

5. Web pages are created by using which of the following? [S.S.C. Online CHSL (T-I) 8.01.2017 (Shift-I)]

Correct Answer: (c) HTML
Solution:

Web pages are created by using the following:

1. HTML (HyperText Markup Language) – This is the standard language used to create the structure and content of web pages (e.g., headings, paragraphs, links, images).

2. CSS (Cascading Style Sheets) – Used to style and design HTML elements (e.g., colors, fonts, layout).

3. JavaScript – A programming language used to make web pages interactive (e.g., dynamic forms, animations, pop-ups).

Additional tools/languages that can also be used:

  • Web frameworks (e.g., React, Angular, Vue.js)

  • Back-end languages (e.g., PHP, Python, Node.js) – for dynamic pages and server-side logic

  • Databases (e.g., MySQL, MongoDB) – for storing web content/data

So, the main three components for creating web pages are:

HTML + CSS + JavaScript.

6. TCP in computer science stands for? [S.S.C. Online CHSL (T-I) 24.01.2017 (Shift-1)]

Correct Answer: (a) Transmission Control Protocol
Solution:TCP stands for Transmission Control Protocol.
  1. It is one of the main protocols of the Internet Protocol Suite and is used for transmitting data over a network.
  2. TCP is responsible for ensuring reliable, ordered, and error-checked delivery of data between applications running on hosts communicating over an IP network.
  3. It establishes a connection between the sender and receiver before data transmission begins, and it manages the flow of data to ensure that packets are delivered in the correct sequence and without errors.

7. Which mechanism is used by the computer virus 'worm' to duplicate itself? [S.S.C. Online Graduation Level (T-I) 31.08.2016 (Shift-III)]

Correct Answer: (c) Spawn
Solution:
Spawn (in computing): Refers to a function that loads and executes a new child process. The current process may wait for the child to complete or continue executing concurrently.
How Spawning Works:
The worm uses the "spawn" function to create multiple copies of itself, allowing it to quickly multiply and spread to other computers. This creates a chain of infection where each new copy can further duplicate itself. 

8. A ________ is a computer programme which can self-replicate and propagate over the network with or without human intervention and has malicious intent. [S.S.C. Online CHSL (T-I) 19.04.2021 (Shift-II)]

Correct Answer: (c) worm
Solution:A worm is a type of malware that can spread and replicate itself, often without user interaction.
  1.  It does not require a host program to spread, unlike a virus.
  2.  Worms use network connections to find vulnerable devices and systems to infect, and they can spread rapidly. 
  3. Unlike viruses, which need to attach to another program or document, worms are self-contained and can operate independently. 

9. Which of the following is a small piece of software that uses computer networks and security holes to replicate itself? [S.S.C. Online CHSL (T-I) 16.04.2021 (Shift-II)]

Correct Answer: (c) Worm
Solution:A worm is a type of malware that can spread and replicate itself, often without user interaction.
  1.  It does not require a host program to spread, unlike a virus.
  2.  Worms use network connections to find vulnerable devices and systems to infect, and they can spread rapidly. 
  3. Unlike viruses, which need to attach to another program or document, worms are self-contained and can operate independently. 

common types of malware found in computers, explained clearly:

  1. Virus

    • Attaches itself to clean files and spreads to other files or programs.

    • Can corrupt or delete data.

  2. Worm

    • Self-replicates and spreads independently across networks without needing to attach to files.

    • Can slow down or crash networks.

  3. Trojan Horse (Trojan)

    • Disguises itself as legitimate software to trick users into installing it.

    • Can create backdoors for hackers to access the system.

  4. Spyware

    • Secretly monitors user activity and collects sensitive information (e.g., passwords, credit card details).

    • Sends data to attackers without user consent.

  5. Adware

    • Automatically displays or downloads unwanted advertisements.

    • Often bundled with free software.

  6. Ransomware

    • Encrypts or locks user files and demands payment (ransom) to restore access.

    • Can cause severe data loss.

  7. Rootkit

    • Hides itself deep in the system to avoid detection.

    • Allows attackers to maintain unauthorized access.

  8. Keylogger

    • Records keystrokes to capture sensitive data like passwords or credit card numbers.

  9. Botnet Malware

    • Infects many computers to form a network (“botnet”) controlled remotely by hackers.

    • Used for spam, DDoS attacks, etc.

  10. Fileless Malware

    • Does not write files to disk, making it harder to detect.

    • Resides in memory and exploits legitimate system tools.

10. Which of the following is a valid phase of computer virus? [C.P.O. 5.1.6.06.2016 (Shift-I)]

Correct Answer: (c) Only Dormant, Propagation, Triggering, Executing
Solution:

The generally recognized phases of a computer virus include:

  1. Dormant Phase: In this initial stage, the virus is inactive. It has managed to enter the system but is not yet doing anything malicious. It might be waiting for a specific trigger, like a certain date, a particular program being run, or a specific user action.
  2. Propagation Phase: This is when the virus starts to replicate itself. It copies its code and attaches it to other executable programs or system areas on the infected computer. In some cases, it might also spread to other computers on a network.
  3. Triggering Phase: The virus activates and its malicious payload is unleashed. This could be caused by a condition specified during the dormant phase being met.
  4. Execution Phase (or Payload Phase): This is when the virus performs the harmful actions it was designed to carry out. These actions can range from displaying annoying messages or slowing down the system to more severe consequences like deleting files, corrupting data, or providing unauthorized access to the system.

Therefore, any of these phases – dormant, propagation, triggering, or execution – would be considered a valid phase of a computer virus.