Ethical Hacking Technology

Ethical Hacking Technology

What is Ethical Hacking Technology? Introduction 1. An ethical hacker is an individual hired to hack into a system to identify and repair potential vulnerabilities , effectively preventing exploitation by  malicious hackers. 2. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. 3. Carrying out an ethical ...

Read more

Jini Technology

Jini Technology

Introduction 1. Jini technology provides a simple infrastructure for delivering services (application, database, printing, storage etc) in a network and for creating an interaction between programs that use these services regardless of their hardware/software implementation. 2. Services can be added or removed from the network and new clients can find existing services. History 1. The ...

Read more

E-BALL TECHNOLOGY

E-BALL TECHNOLOGY

INTRODUCTION 1. Its diameter is 6 inch.  2. It is having 120Ă—120mm motherboard. 3. It has projector instead of display unit. 4. It has virtual keyboard. 5. This computer has all the features like a traditional computer, like, mouse, DVD, large screen display, mother-board, hard drive, web came, modem, LAN & WAN slots etc.  WORKING OF ...

Read more

SENSOR TECHNOLOGY

SENSOR TECHNOLOGY

What is sensor technology? A Sensor is a device that measures a physical quantity and convert into a signal which can be read by an observer or by an instrument. Example :You can say that our skin, ear, eyes and nose are also a sensor because the can sensor touch, heat, cold, light, noise and ...

Read more

5 PEN PC TECHNOLOGY

5 PEN PC TECHNOLOGY

WHAT IS 5 PEN PC TECHNOLOGY? Introduction:- Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to use computer software. Modern computers which are based on integrated circuits are small enough to fit into mobile devices ...

Read more

COMPUTER SCIENCE : UGC-NET , KVS-SSA , JSA/LDC , STENOGRAPHER , JUNIOR ASSISTANT , CCC : MODEL PAPER – 10

https://www.youtube.com/watch?v=72BTviZkOPc 1. The value of the following MS Excel formula ………..  [ =MOD (11,3) ] (A) 33                                          (B) 4 (C) 14                                          (D) 2 2. Which of the following tools can be used to apply the font color and size of a text to multiple parts of the text in MS Word? (A) Format Painter                       (B) ...

Read more

COMPUTER SCIENCE : UGC-NET , KVS-SSA , JSA/LDC , STENOGRAPHER , JUNIOR ASSISTANT , CCC : MODEL PAPER – 9

https://www.youtube.com/watch?v=wFScVYbhXt8 1. IMAP, an email related protocol but what is the full form of IMAP? (A) Internet Media Access Protocol    (B) Intranet Media Access Protocol (C) Internet Message Access Protocol (D) Intranet Message Access Protocol 2. Which of the following keyboard shortcuts is used to move to the left side of each open tab in ...

Read more

COMPUTER SCIENCE : UGC-NET , KVS-SSA , JSA/LDC , STENOGRAPHER , JUNIOR ASSISTANT , CCC : MODEL PAPER – 8

https://www.youtube.com/watch?v=z6_VDQhHtwM 1. State whether the following statements are true or false. (i)In MS Word, “Landscape” is a valid page margin option (ii)In MS Word, “Portrait” is a valid page margin option (A) (i) True (ii) True                   (B) (i) False  (ii) False (C) (i) True  (ii) False                 (D) (i) False  (ii) True 2. Which of the ...

Read more

COMPUTER SCIENCE : UGC-NET , KVS-SSA , JSA/LDC , STENOGRAPHER , JUNIOR ASSISTANT , CCC : MODEL PAPER – 7

https://www.youtube.com/watch?v=_6eEYdlj4iE 1. Which of the following is a features used to type very small letters or numbers just above the text line? (A)Subscript                       (B) Superscript (C) Strike Through             (D) Format painter 2. TCP/IP is the most popular Internet Protocol. What is the full form of TCP? (A)Transmission Carrying Protocol (B)Transmission Carrying Progress (C)Transmission Control Protocol ...

Read more

COMPUTER SCIENCE : UGC-NET , KVS-SSA , JSA/LDC , STENOGRAPHER , JUNIOR ASSISTANT , CCC : MODEL PAPER -6

https://www.youtube.com/watch?v=1F1uS-VdCJc 1. Which of the following is the first neural network computer? (A) AN                                (B) AM(C) RFD                              (D) SNARC 2. When an algorithm is written in the form of a programming language, it becomes a _________ (A) Flowchart                       (B) Program(C) Pseudo code                   (D) Syntax 3.  What is information about data called? (A) Hyper data                      (B) ...

Read more