Computer (Part-3)

Total Questions: 50

1. In the field of computing, what does VRML stand for? [S.S.C. Online CHSL (T-I) 19.03.2020 (Shift-I)]

Correct Answer: (d) Virtual Reality Mark Up Language
Solution:VRML stands for Virtual Reality markup Language VRML is an open-standard programming language created to design three-dimensional (3D) and Web- based models, textures and illusions. VRML is used to illustrate 3D objects, buildings, landscapes or other items requiring 3D structure and is very similar to Hypertext Markup Language (HTML). VRML also uses textual representation to define 3D illusion presentation methods.

2. What is the full form of BASIC in context of the BASIC computer language? [S.S.C. Online CHSL (T-I) 16.10.2020 (Shift-II)]

Correct Answer: (d) Beginner's All-Purpose Symbolic Instruction Code
Solution:The full form of BASIC in the context of BASIC computer language is Beginners All-Purpose symbolic instruction code. BASIC is one of the simplest and earliest high-level programming language supports in all operating systems. John G. Kemeny and Thomas E. Kurtz designed original BASIC language Dartmouth Basic in 1964, with the purpose that all students should be able to use the computers in every field

3. In context of computing, what is the full form of URL? [S.S.C. Online CHSL (T-I) 14.10.2020 (Shift-II)]

Correct Answer: (a) Uniform Resource Locator
Solution:URL stands for "Uniform Resource Locator." A URL is a reference or address used to access resources on the internet, such as web pages, images, and files. It specifies the location of a resource and the protocol used to retrieve it.

4. Choose the odd one out- [S.S.C. Online CHSL (T-I) 2.02.2017 (Shift-I)]

Correct Answer: (c) HTML
Solution:WWW and cyberspace are subsets of the Internet and thus are related to each other, while HTML is the language used to build web pages.

5. Web pages are created by using which of the following? [S.S.C. Online CHSL (T-I) 8.01.2017 (Shift-I)]

Correct Answer: (c) HTML
Solution:

HTML stands for HyperText Markup Language. It is the standard markup language used to create and design web pages. HTML provides the basic structure of a web page, which is enhanced and modified by other technologies like CSS (Cascading Style Sheets) for styling and JavaScript for interactivity.

HTML uses a system of tags to define elements on a page, such as headings, paragraphs, links, images, and other content.

6. TCP in computer science stands for? [S.S.C. Online CHSL (T-I) 24.01.2017 (Shift-1)]

Correct Answer: (a) Transmission Control Protocol
Solution:

TCP stands for Transmission Control Protocol. It is one of the main protocols of the Internet Protocol Suite and is used for transmitting data over a network. TCP is responsible for ensuring reliable, ordered, and error-checked delivery of data between applications running on hosts communicating over an IP network. It establishes a connection between the sender and receiver before data transmission begins, and it manages the flow of data to ensure that packets are delivered in the correct sequence and without errors.

7. Which mechanism is used by the computer virus 'worm' to duplicate itself? [S.S.C. Online Graduation Level (T-I) 31.08.2016 (Shift-III)]

Correct Answer: (c) Spawn
Solution:
Spawn (in computing): Refers to a function that loads and executes a new child process. The current process may wait for the child to complete or continue executing concurrently.
How Spawning Works:
The worm uses the "spawn" function to create multiple copies of itself, allowing it to quickly multiply and spread to other computers. This creates a chain of infection where each new copy can further duplicate itself. 

8. A ________ is a computer programme which can self-replicate and propagate over the network with or without human intervention and has malicious intent. [S.S.C. Online CHSL (T-I) 19.04.2021 (Shift-II)]

Correct Answer: (c) worm
Solution:

A worm is a type of malware that can spread and replicate itself, often without user interaction. It does not require a host program to spread, unlike a virus. Worms use network connections to find vulnerable devices and systems to infect, and they can spread rapidly. Unlike viruses, which need to attach to another program or document, worms are self-contained and can operate independently. 

9. Which of the following is a small piece of software that uses computer networks and security holes to replicate itself? [S.S.C. Online CHSL (T-I) 16.04.2021 (Shift-II)]

Correct Answer: (c) Worm
Solution:

A worm is a type of malware that can spread and replicate itself, often without user interaction. It does not require a host program to spread, unlike a virus. Worms use network connections to find vulnerable devices and systems to infect, and they can spread rapidly. Unlike viruses, which need to attach to another program or document, worms are self-contained and can operate independently. 

10. Which of the following is a valid phase of computer virus? [C.P.O. 5.1.6.06.2016 (Shift-I)]

Correct Answer: (c) Only Dormant, Propagation, Triggering, Executing
Solution:

The generally recognized phases of a computer virus include:

  1. Dormant Phase: In this initial stage, the virus is inactive. It has managed to enter the system but is not yet doing anything malicious. It might be waiting for a specific trigger, like a certain date, a particular program being run, or a specific user action.
  2. Propagation Phase: This is when the virus starts to replicate itself. It copies its code and attaches it to other executable programs or system areas on the infected computer. In some cases, it might also spread to other computers on a network.
  3. Triggering Phase: The virus activates and its malicious payload is unleashed. This could be caused by a condition specified during the dormant phase being met.
  4. Execution Phase (or Payload Phase): This is when the virus performs the harmful actions it was designed to carry out. These actions can range from displaying annoying messages or slowing down the system to more severe consequences like deleting files, corrupting data, or providing unauthorized access to the system.

Therefore, any of these phases – dormant, propagation, triggering, or execution – would be considered a valid phase of a computer virus.