Computer (Physics) (Part-5)

Total Questions: 50

31. _______is an attempt to obtain sensitive information such as username, password and credit card details, etc. for malicious reasons, by posing as a trustworthy source in email. [S.S.C. JE Civil Exam 23.03.2021 (Shift-II)]

Correct Answer: (d) Phishing
Solution:

Phishing is an attempt to obtain sensitive information such as usernames, passwords, and credit card details, etc., for malicious reasons, by posing as a trustworthy source in email.

These deceptive emails often try to trick you into clicking on a malicious link or providing your information directly.

They might impersonate banks, online retailers, social media platforms, or even government agencies to appear legitimate.

32. VoIP in computer science stands for? [S.S.C. Online CHSL (T-I) 25.01.2017 (Shift-II)]

Correct Answer: (b) Voice over Internet Protocol
Solution:

In computer science, VoIP stands for Voice over Internet Protocol. 

It's a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.

VoIP converts your voice into digital data which is then transmitted over the internet.

33. The network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as- [S.S.C. Online Graduation Level (T-I) 2.09.2016 (Shift-II)]

Correct Answer: (b) Network Congestion
Solution:

The inability of the network to deliver data due to being overloaded with enormous data sent by many computers is termed network congestion.

  • Think of it like a traffic jam on a highway.
  • When too many cars try to use the same road at the same time, traffic slows down or even comes to a standstill.
  • Similarly, when a network has more data traffic than it can handle, it leads to congestion, resulting in delays, packet loss, and the inability to deliver data efficiently.

34. _______is a global system of interconnected government, academic, corporate, public and private computer networks. [S.S.C. Online CHSL (T-I) 31.01.2017 (Shift-II)]

Correct Answer: (b) Internet
Solution:

The Internet is a global system of interconnected government, academic, corporate, public, and private computer networks.

It's often referred to as a "network of networks" because it connects millions of smaller domestic, academic, business, and governmental networks all around the world.

The Internet uses the Internet Protocol suite (TCP/IP) to link devices worldwide.

35. A topology for a Local Area Network in which all nodes are individually connected to a central connection point like a hub or switch is called: [S.S.C. Online CHSL (T-I) 19.04.2021 (Shift-III)]

Correct Answer: (c) star topology
Solution:

A topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point like a hub or switch is called a star topology.

  1. Each device (node) has its own dedicated connection to the central hub or switch.
  2. All communication between devices goes through the central hub or switch.
  3. The central device acts as a relay point for data transmission.

This topology is popular due to its ease of installation, troubleshooting, and the fact that the failure of one node doesn't affect the rest of the network. However, the entire network's functionality depends on the central hub or switch.

Types of network topology in computer system

36. Which of the following consists of an electronic writing area and a special 'pen' that works with it? [S.S.C. Online CHSL (T-I) 15.10.2020 (Shift-II)]

Correct Answer: (d) Graphics Tablet
Solution:A graphics tablet (digitizer) is a computer input device that allows a user to draw pictures, animations, and graphics by hand.

It has a stylus like a pen, using which a person can draw pictures or graphics.

37. Which of the following is an input device used to enter motion data into computers or other electronic devices? [S.S.C. Online CHSL (T-I) 14.10.2020 (Shift-III)]

Correct Answer: (d) Trackball
Solution:Trackballs:
A pointing device consisting of a ball held by a socket containing sensors to detect rotation.
The user moves the cursor by rolling the ball with their hand, while the device itself remains stationary.

Kensington Orbit K64327F Wired Trackball Mouse (Grey) : Amazon.in: Computers & Accessories

38. Which of the following is a lever that can be moved in several directions to control the movement of an image on a computer monitor or similar display screen? [S.S.C. Online CHSL (T-I) 14.10.2020 (Shift-I)]

Correct Answer: (b) Joystick
Solution:A joystick is an input device that can be rotated in multiple directions to control the movement of images on a computer monitor or similar display screen.

Joysticks are often used to control video games.

MXMY PC Joystick with Vibration Function and Throttle Control - Wired Gamepad for Windows PC

39. Which of the following converts analogue information into digital form? [S.S.C. Online CHSL (T-I) 14.10.2020 (Shift-I)]

Correct Answer: (c) Digitizer
Solution:A digitizer converts analogue information into digital form.

A digitizer is a device that receives analog signals, such as sound or light, and transforms them into digital representations that can be processed by a computer.

This process is called digitization.

40. Which of the following is used to receive and send computer files over telephone lines? [S.S.C. Online CHSL (T-I) 14.10.2020 (Shift-II)]

Correct Answer: (a) Modem
Solution:
A modem is used to receive and send computer files over telephone lines.

A modem (Modulator-Demodulator) is a device that converts digital computer data into analog signals that can be transmitted over a phone line, and then converts the received analog signals back into digital data for the computer to understand.