Computer (Part-5)

Total Questions: 50

21. _________is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. [S.S.C. Online CHSL (T-I) 21.01.2017 (Shift-I)]

Correct Answer: (a) PARAM
Solution:PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India.
  • The name "PARAM" means "supreme" in Sanskrit and also stands for "PARAllel Machine".

22. WIMAX stands for-- [S.S.C. Online Graduation Level (T-I) 4.09.2016 (Shift-II)]

Correct Answer: (c) Worldwide Interoperability for Microwave Access
Solution:WIMAX stands for Worldwide Interoperability for Microwave Access.
  • It is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile  cellular-type access.  

23. Who Invented Internet Protocol? [S.S.C. Online CHSL (T-I) 30.01.2017 (Shift-I)]

Correct Answer: (a) Vint Cerf
Solution:Computer scientists Vinton Cerf and Bob Kahn are credited with inventing the Internet communication protocols and the system referred to as the Internet.
  • January 1, 1983 is considered the official birthday of the Internet.
  • Before this, the various computer networks did not have a standard communication method.
  • Finally, a new communications protocol called Transfer Control Protocol/Internetwork Protocol (TCP/IP) was established.

24. In the Internet, what is the full form of TCP? [S.S.C. Online CHSL (T-I) 30.01.2017 (Shift-I)]

Correct Answer: (d) Transmission Control Protocol
Solution:

The full form of TCP in the context of the Internet is Transmission Control Protocol. 

  • TCP is one of the main protocols in the TCP/IP (Transmission Control Protocol/Internet Protocol) suite, which is the set of communication rules that underpin the Internet.
  • TCP is responsible for the reliable transmission of data, ensuring that it is delivered in order and without errors between applications on different devices.  

25. Two versions of the Internet Protocol (IP) are in use ______ . [S.S.C. Online CHSL (T-I) 23.01.2017 (Shift-I)]

Correct Answer: (a) IP Version 4 & IP Version 6
Solution:

The two versions of the Internet Protocol (IP) that are currently in use are:

IPv4 (Internet Protocol version 4):
This is the older, more widely deployed version. It uses 32-bit addresses, which allows for approximately 4.3 billion unique IP addresses. Due to the massive growth of the internet, this address space is nearing exhaustion.

IPv6 (Internet Protocol version 6):
This is the newer version designed to address the limitations of IPv4, particularly the address exhaustion problem.

  • It uses 128-bit addresses, providing a vastly larger address space (approximately  unique addresses). IPv6 also includes other improvements in terms of security and efficiency.
  • While IPv6 is being adopted, IPv4 is still prevalent, and both versions coexist on the internet.

26. How many bits does an IP address contain? [S.S.C. Online CHSL (T-I) 10.01.2017 (Shift-II)]

Correct Answer: (b) 32 bits
Solution:IP Address version 4 (IPv4) defines an Ip as a 32-bit number.
  • However, due to the development of the web and also the depletion of accessible IPv4 addresses, a brand new form of IP (IPv6), using 128 bits for that Ip, was standardized in 1998.

27. How many bits does an IP address consist of? [S.S.C. Online CHSL (T-I) 09.08.2021 (Shift-II)]

Correct Answer: (d) 32
Solution:IP Address version 4 (IPv4) defines an Ip as a 32-bit number.
  • However, due to the development of the web and also the depletion of accessible IPv4 addresses, a brand new form of IP (IPv6), using 128 bits for that Ip, was standardized in 1998.

28. Regarding Computers and the internet, which of the following viruses changes a disk's file system? [S.S.C. JE Electrical Exam 24.03.2021 (Shift-II)]

Correct Answer: (b) Cluster virus
Solution:A cluster virus is the type of virus that changes a disk's file system.
  • A cluster virus infects a computer by modifying directory or registry entries so that when a user runs a program, the virus also runs.
  • This essentially alters the way the computer accesses files on the disk, effectively changing the file system.

29. Which of the following is the slowest type of internet connection? [S.S.C. Online CHSL (T-I) 10.08.2021 (Shift-II)]

Correct Answer: (c) Dial-up
Solution:Dial-up is by far the slowest of all Internet connections available.
  • Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.
  • Speeds max out at about 56Kbps, which is only about a tenth of the speed of even the slowest broadband Dial-up connections.
  • Dial-up use is only recommended when no other option is available.

30. The_______protocol is used to receive e-mails. [S.S.C. Online C.P.O.S.L. (T-I) 7.07.2017 (Shift-I)]

Correct Answer: (c) POP-3
Solution:POP3 (Post Office Protocol version 3):
  1. This protocol downloads emails from a mail server to a local client (like your computer or phone).
  2. Once downloaded, the emails are usually deleted from the server, meaning you can typically only access them on the device you downloaded them to.