Computer and Information Technology (Part III) – Old Year Questions

201. On which principle digital computer work?

(a) Calculation
(b) Measurement
(c) Electric
(d) Logical

[Uttarakhand U.D.A./L.D.A. (Pre) 2007]


202. If a domain name ends with, then it is –

(a) An international organization
(b) A non-profit organization
(c) An educational institution in Australia
(d) An educational institute in USA

[M.P.P.C.S. (Pre) 2008]


203. On the website of an organization ‘.com’ indicates

(a) Company
(b) Command
(c) Communication
(d) Commercial

Uttarakhand P.C.S. (Pre) 2010


204. Which of the following is a valid domain name extension?

(a) .com
(b) .gov
(c) .net
(d) All of the above

[M.P.P.C.S. (Pre) 2012]


205. Consider the following statements and select the correct answer from the codes given below :

(1) Proxy server provides TCP/IP address
(2) Proxy server processes clients’ requests by forwarding the requests to other servers.

Code :

(a) Only 1 is correct
(b) Only 2 is correct
(c) Both 1 and 2 are correct
(d) None of these

[M.P.P.C.S. (Pre) 2008]


206. With reference to communication technologies, what is/are the difference/differences between LTE (Long-Term Evolution) and VoLTE (Voice over Long-Term Evolution)?

1. LTE is commonly marketed as 3G and VoLTE is commonly marketed as advanced 3G.
2. LTE is data-only technology and VoLTE is voice-only technology.

Select the correct answer using the code given below:

(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2

[I.A.S. (Pre) 2019]


207. With reference to Visible Light Communication (VLC) technology, which of the following statements are correct?

1. VLC uses electromagnetic spectrum wavelengths 375 to 780 nm.
2. VLC is known as long-range optical wireless communication.
3. VLC can transmit large amounts of data faster than Bluetooth.
4. VLC has no electromagnetic interference.

Select the correct answer using the code given below:

(a) 1, 2 and 3 only
(b) 1, 2 and 4 only
(c) 1, 3 and 4 only
(d) 2, 3 and 4 only

[I.A.S. (Pre) 2020]


208. With reference to ‘Near Field Communication (NFC) Technology’, which of the following statements is/are correct?

1. It is a contactless communication technology that uses electromagnetic radio fields .
2. NFC is designed for use by devices which can be at a distance of even a meter from each other.
3. NFC can use encryption when sending sensitive information .

Select the correct answer using the code given below.

(a) 1 and 2 only
(b) 3 only
(c) 1 and 3 only
(d) 1, 2 and 3

[I.A.S. (Pre) 2015]


209. In the context of digital technologies for entertainment, consider the following statements :

1. In Augmented Reality (AR), a simulated environment is created and the physical world is completely shut out.
2. In Virtual Reality (VR), images generated from a computer are projected onto real-life objects or surroundings.
3. AR allows individuals to be present in the world and improves the experience using the camera of a smartphone or PC.
4. VR closes the world, and transposes an individual, providing a complete immersion experience.

Which of the statements given above is/are correct?

(a) 1 and 2 only
(b) 3 and 4 only
(c) 1, 2 and 3
(d) 4 only

[I.A.S. (Pre) 2019]


210. With the present state of development, Artificial Intelligence can effectively do which of the following?

1. Bring down electricity consumption in industrial units
2. Create meaningful short stories and songs
3. Disease diagnosis
4. Text-to-Speech Conversion
5. Wireless transmission of electrical energy

Select the correct answer using the code given below:

(a) 1, 2, 3 and 5 only
(b) 1, 3 and 4 only
(c) 2, 4 and 5 only
(d) 1, 2, 3, 4 and 5

[I.A.S. (Pre) 2020]


211. To increase the length of a network without loss of signal strength, we would use –

(a) Repeater
(b) Router
(c) Gateway
(d) Switch

[M.P.P.C.S. (Pre) 2008]


212. In computer terminology, U.S.B. stands for –

(a) Universal Serial Bus
(b) Universal Set Bus
(c) Unif ed Serial Bus
(d) Undef ned Serial Bus

[Uttarakhand U.D.A./L.D.A. (Pre) 2007]


213. The place where accessories are connected in computer is known as-

(a) Port
(b) Ring
(c) Bus
(d) Zip

[M.P.P.C.S. (Pre) 2015]


214. ‘Password’ in computers protects –

(a) Hardware wearouts
(b) Software errors
(c) Unauthorized access of the system
(d) None of the above

[Uttarakhand P.C.S. (Mains) 2002]


215. Which infotech terminology used to fi nd out the User’s E-mail address ?

(a) Login
(b) Password
(c) Finger
(d) Archie

[U.P. U.D.A./L.D.A. (Spl.) (Pre) 2010]


216. In India, the term “Public Key Infrastructure” is used in the context of :

(a) Digital security infrastructure
(b) Food security infrastructure
(c) Health care and education infrastructure
(d) Telecommunication and transportation infrastructure

[I.A.S. (Pre) 2020]


217. Consider the following statements :

A digital signature is

1. an electronic record that identifies the certifying authority issuing it.
2. used to serve as proof of identity of an individual to access information or server on Internet.
3. an electronic method of signing an electronic document and ensuring that the original content is unchanged.

Which of the statements given above is/are correct?

(a) 1 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3

[I.A.S. (Pre) 2019]


218. With reference to digital payments, consider the following statements :

1. The BHIM app allows the user to transfer money to anyone with a UPI-enabled bank account.
2. While a chip-pin debit card has four factors of authentication. BHIM app has only two factors of authentication.

Which of the statements given above is/are correct?

(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2

[I.A.S. (Pre) 2018]


219. Which of the following is/are the aim/aims of ‘Digital India’ Plan of the Government of India?

1. Formation of India’s own Internet companies like China did.
2. Establish a policy framework to encourage overseas multinational corporations that collect Big Data to build their large data centers within our national geographical boundaries.
3. Connect many of our villages to the Internet and bring Wi-Fi to many of our schools, public places and major tourist centers.

Select the correct answer using the code given below:

(a) 1 and 2 only
(b) 3 only
(c) 2 and 3 only
(d) 1, 2 and 3

[I.A.S. (Pre) 2018]


220. The identity platform ‘Aadhaar’ provides open ‘Application Programming Interfaces (APIs)’. What does it imply?

1. It can be integrated into any electronic device.
2. Online authentication using iris is possible.

Which of the statements given above is/are correct?

(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2

[I.A.S. (Pre) 2018]


221. With reference to “Blockchain Technology”, consider the following statements:

1. It is a public ledger that everyone can inspect, but which no single user controls.
2. The structure and design of blockchain is such that all the data in it are about cryptocurrency only.
3. Applications that depend on basic features of blockchain can be developed without anybody’s permission.

Which of the statements given above is/are correct?

(a) 1 only
(b) 1 and 2 only
(c) 2 only
(d) 1 and 3 only

[I.A.S. (Pre) 2020]


222. Consider the following pairs :

Terms sometimes seen in news  Context/Topic

1. Belle II Artificial experiment Intelligence
2. Blockchain technology Digital/Cryptocurrency
3. CRISPR – Cas9 Particle Physics

Which of the pairs given above is/are correctly matched?

(a) 1 and 3 only
(b) 2 only
(c) 2 and 3 only
(d) 1, 2 and 3

[I.A.S. (Pre) 2018]


223. Blowfish is a type of :

(a) Symmetric Encryption Algorithm
(b) Hashing Algorithm
(c) Digital Signature Algorithm
(d) Asymmetric Encryption Algorithm

[M.P.P.C.S. (Pre) 2020]


224. Which work is not done by a computer?

(a) Computing
(b) Processing
(c) Understanding
(d) Outputting

[M.P.P.C.S. (Pre) 2015]


225. Which one of the following expresses an error in computer data –

(a) Chip
(b) Byte
(c) Bug
(d) Bit

[U.P.P.C.S. (GIC) 2010]


226. Which industry is the primary user of Magnetic Ink Character Recognition (MICR)?

(a) Banks
(b) Footwear Designing
(c) Book Publishing
(d) None of these

[Uttarakhand P.C.S. (Pre) 2010]


228. O.M.R. stands for :

(a) Optical Mark Reader
(b) Optical Machine Reader
(c) Octal Machine Reader
(d) Octal Mark Reader

[Uttarakhand P.C.S. (Mains) 2006]


228. Which one is mainly used in checking objective-type answer papers in the examination?

(a) MICR
(b) OMR
(c) OCR
(d) MCR

[M.P.P.C.S. (Pre) 2013]


229. I.R.C. stands for :

(a) Internet Real-time Communication
(b) Internet Relay Chat
(c) Internet Real-time Chat
(d) None of the above

[Uttarakhand U.D.A./L.D.A. (Mains) 2007]


230. For which word, the letter ‘G’ has been used in ‘2G Spectrum’?

(a) Global
(b) Government
(c) Generation
(d) Google

[53rd to 55th B.P.S.C. (Pre) 2011]


231. C.A.D. stands for :

(a) Computer Algorithm for Design
(b) Computer-Aided Design
(c) Computer Application in Design
(d) None of the above

[Uttarakhand P.C.S. (Mains) 2002]


232. ‘GIF’ stands for –

(a) Geographical Image Format
(b) Global Image Format
(c) Graphical Interchange Format
(d) None of the above

[Uttarakhand P.C.S. (Pre) 2007]


233. ‘3D printing’ has applications in which of the following?

1. Preparation of confectionery items
2. Manufacture of bionic ears
3. Automotive industry
4. Reconstructive surgeries
5. Data processing technologies

Select the correct answer using the code given below:

(a) 1, 3 and 4 only
(b) 2, 3 and 5 only
(c) 1 and 4 only
(d) 1, 2, 3, 4 and 5

[I.A.S. (Pre) 2018]


234. The use of Computers in Governance is known as –

(a) Computer Governance
(b) E-mail Governance
(c) Internet Governance
(d) E-Governance

[Uttarakhand P.C.S. (Mains) 2006]


235. A computer derives its strength from –

(a) Its speed
(b) Accuracy
(c) Memory
(d) All of the above

[Uttrakhand U.D.A./L.D.A. (Mains) 2006]


236. Multimedia can contain :

(a) Numeric, text, and picture data
(b) Graphics, animation, video, music and voice
(c) Only numeric type data
(d) None of the above

[Uttarakhand P.C.S. (Pre) 2012]


237. The practice of using more than one type of medium in the computer at the same time is called :

(a) Multimedia
(b) Macromedia
(c) Interactivity
(d) None of the above

[Uttarakhand P.C.S. (Pre) 2012]


238. The ability of an operating system to run more than one application at a time is called :

(a) Multiuser computing
(b) Time sharing
(c) Multiprogramming
(d) Multitasking

[U.P. Lower Sub. (Mains) 2015]


239. When information is dialed on the telephone and read on the television screen, it is known as

(a) Telax
(b) Telefax
(c) Teletax
(d) Teleprocessing

[R.A.S./R.T.S. (Pre) 1994-95]


240. What can we send through video mail?

(a) Graphics
(b) Video clips
(c) Video messages
(d) All of these

[M.P.P.C.S. (Pre) 2010]


241. The service of the Internet that provides ‘audio’ and ‘video’ conversation, is called :

(a) chat
(b) e-mail
(c) video conferencing
(d) video chat

[M.P.P.C.S. (Pre) 2017]


242. Video conferencing is :

(a) Conduct of video calls using telecom technology
(b) Conduct of telephone calls
(c) Conduct of video conference using a set of telescopic technology
(d) None of the above

[M.P.P.C.S. (Pre) 2012]


243. Which of the following devices is compulsory for video conferencing?

(a) Printer
(b) Scanner
(c) Webcam
(d) Mouse

[M.P.P.C.S. (Pre) 2016]


244. Which of the following is not an essential component required for the video conferencing system?

(a) Video camera
(b) Display device
(c) Telephone
(d) Microphone

[M.P. P.C.S. (Pre) 2018]


245. E-Mail stands for :

(a) Electrical Mail
(b) Electronic Mail
(c) Elastic Mail
(d) None of the above

[M.P. P.C.S. (Pre) 2012]


246. What are the two parts of an e-mail address?

(a) Username and home address
(b) Legal name and phone number
(c) Signature and password
(d) User name and domain name

[M.P.P.C.S. (Pre) 2013]


247. The domain name of the E-mail address is marked. sttol is

(a) mark. stool
(b) .sttol
(c) ITdesk. info
(d) .info

[M.P.P.C.S. (Pre) 2019]


248. Which of the following is a free e-mail service provider?

(a) Hotmail
(b) Redif mail
(c) Yahoo
(d) All of the above

[M.P.P.C.S. (Pre) 2012]


249. What kind of digital files can be attached to the e-mail?

(a) Music
(b) Documents
(c) Photos
(d) All of the above

[U.P. Lower Sub. (Mains) 2013]


250. What is singular data?

(a) Datum
(b) Dat
(c) Data
(d) None of the above

[Uttarakhand P.C.S. (Mains) 2006]


251. Word ‘blog’ is a combination of two words –

(a) Web-log
(b) Wave-log
(c) Web-blog
(d) Wed-lock

[M.P.P.C.S. (Pre) 2010]


252. ………………….. is the process of carrying out commands –

(a) Fetching
(b) Storing
(c) Decoding
(d) Executing

[M.P.P.C.S. (Pre) 2010]


253. A ‘menu’ contains a list of :

(a) Data
(b) Objects
(c) Reports
(d) Commands

[M.P.P.C.S. (Pre) 2013]


254. ………….. is a way to quickly access a favorite website by saving it in your browser.

(a) Cookie
(b) Bookmark
(c) Blog
(d) None of these

[M.P.P.C.S. (Pre) 2019]


255. The size of virtual memory depends on –

(a) Address lines
(b) Database
(c) Disc space
(d) All of these

[M.P.P.C.S. (Pre) 2010]


256. ICT stands for :

(a) Information and Computer Technology
(b) Information & Communications Technology
(c) Information Code Techniques
(d) Integrated Circuit Technology

[U.P. Lower Sub. (Mains) 2015]


257. The full form of SIM is :

(a) Subscriber Identity Module
(b) Subscriber Identity Machine
(c) Self-Identity Machine
(d) Self Identity Module

[U.P.P.C.S.(Pre) 2012]


258. SMS Means–

(a) Swift mail system
(b) Short messaging service
(c) Shorthand Manual script
(d) Speed mail service

[Uttaranchal P.C.S. (Pre) 2003]


259. How many days will the picture message stay in the private inbox?

(a) 28 Days
(b) 30 Days
(c) 15 Days
(d) 7 Days

[M.P.P.C.S. (Pre) 2010]


260. Which one of the following pairs is not correctly matched?

(a) Optic f bres – Light waves
(b) Android – Voice input
(c) Large Hadron Collider – God particle
(d) Red Planet – Mars

[Uttarakhand P.C.S. (Pre) 2012]


261. The latest Android mobile operating system 6.0 is named as :

(a) Marshmallow
(b) Jelly Bean
(c) Kitkat
(d) Lollipop

[R.A.S./R.T.S. (Pre) 2016]


262. What are the unique features of the recently launched iPhone 4S? Select the correct answer from the codes given below:

1. It has 300 hours of standby time.
2. It has 8 hours of talk time on 3G.
3. It has a voice-recognizing and talking assistant.
4. It has 640 MB of RAM.

Codes :

(a) 1 and 2
(b) 1, 2 and 3
(c) 2 and 3
(d) 1, 2, 3 and 4

[U.P. Lower Sub. (Pre) 2009]


263. When customers of a Website are unable to access it due to flooding of fake network traffic, it is known as

(a) virus
(b) Trojan horse
(c) cracking
(d) denial of service attack

[M.P. P.C.S. (Pre) 2018]


264. In Cyber Law terminology ‘DOS’ means :

(a) Denial of Service
(b) Disk Operating System
(c) Distant Operator Service
(d) None of the above

[Uttarakhand P.C.S. (Pre) 2012]


265. What do you understand by hacking?

(a) Searching
(b) Security
(c) Both (a) and (b)
(d) None of these

[M.P.P.C.S. (Pre) 2010]


266. A computer hacker is :

(a) A person who maintains computer security
(b) A person who violates computer security with malicious intentions for personal gain
(c) A person responsible for safe computer operation
(d) A person who repairs computer

[M.P.P.C.S. (Pre) 2012]


267. The term _____ refers to an individual who breaks into computer systems without authorization and deliberately defaces websites for a fraudulent purpose.

(a) white hat
(b) backer
(c) cracker
(d) stacker

[M.P. P.C.S. (Pre) 2018]


268. In the context of computer security, crackers are also known as :

(a) black hat hackers
(b) white hat hackers
(c) elite hackers
(d) script kiddie

[M.P.P.C.S. (Pre) 2017]


269. One who gains unauthorized access, destroys vital data, denies legitimate user’s service or causes problems for their targets is called

(a) White Hat Hacker
(b) Cracker
(c) Programmer
(d) Database Administrator

[M.P.P.C.S. (Pre) 2019]


270. Cybercrime is :

(a) Hacking
(b) Stalking
(c) Denial of service attacks
(d) All of the above

[M.P.P.C.S. (Pre) 2012]


271. Which of the following is not a cybercrime?

(a) Phishing
(b) Cyber Stalking
(c) Identity Theft
(d) Online Chatting

[M.P.P.C.S. (Pre) 2019]


272. Which of the following are the two essential features of cybercrime?

(a) Computer technology as modus operandi and intangibility of the environment
(b) Of ender computer skills and victim ignorance of computer technology
(c) Hardware and software
(d) Hackers and crackers

[M.P. P.C.S. (Pre) 2018]


273. The first cyber law which provides the legal infrastructure for e-commerce in India is

(a) The Information Technology Act, 1996
(b) The Information Technology Act, 2000
(c) The Information Technology Act, 1998
(d) The Information Technology Act, 1990

[M.P.P.C.S. (Pre) 2019]


274. In India, it is legally mandatory for which of the following to report on cybersecurity incidents?

1. Service providers
2. Data centers
3. Body corporate

Select the correct answer using the code given below:

(a) 1 only
(b) 1 and 2 only
(c) 3 only
(d) 1, 2 and 3

[I.A.S. (Pre) 2017]


275. In India, under cyber insurance for individuals, which of the following benefits are generally covered, in addition to payment for the loss of funds and other benefits?

1. Cost of restoration of the computer system in case of malware disrupting access to one’s computer
2. Cost of a new computer if some miscreant wilfully damages it, if proven so
3. Cost of hiring a specialized consultant to minimize the loss in case of cyber extortion
4. Cost of defense in the Court of Law if any third party files a suit

Select the correct answer using the code given below:

(a) 1, 2, and 4 only
(b) 1, 3, and 4 only
(c) 2 and 3 only
(d) 1, 2, 3 and 4

[I.A.S. (Pre) 2020]


276. Which of the following adopted a law on data protection and privacy for its citizens known as the ‘General Data Protection Regulation’ in April 2016 and started implementation on 25 May 2018?

(a) Australia
(b) Canada
(c) The European Union
(d) The United States of America

[I.A.S. (Pre) 2019]


277. The basic Input-Output system in the computer resides

(a) On the Hard Disc
(b) In the RAM
(c) In the ROM
(d) None of the above

[Uttarakhand P.C.S. (Pre) 2006]


278. Networking of computers

(a) Increases the chances of threats.
(b) Increases the utility of computers.
(c) Increases the information access possibilities.
(d) All of the above.

[Uttarakhand P.C.S. (Pre) 2006]


279. Data systems for planning are often called –

(a) Planning Analysis System
(b) Decision Analysis System
(c) Decision Support System
(d) None of the above

[Uttarakhand P.C.S. (Pre) 2006]


280. The speedometer of a car represents

(a) Analog computer
(b) Digital computer
(c) Hybrid computer
(d) None of these

[Uttarakhand P.C.S. (Pre) 2010]


281. Another name for computer programs is

(a) Computer Hardware
(b) Computer Software
(c) Computer Language
(d) Computer Memory

[Uttarakhand P.C.S. (Mains) 2006]


282. Which is not the component of the computer?

(a) Input Unit
(b) Output Unit
(c) Memory Unit
(d) Basic Unit

[Uttarakhand P.C.S. (Mains) 2006]


283. Microsoft is a :

(a) Microchip Manufacturing Organization
(b) Software Developing Organization
(c) Micro Engineering Organization
(d) Computer Hardware Developing Organization

[Uttarakhand P.C.S. (Mains) 2002]


284. Who is the Chief of Wipro Company?

(a) Azim Premji
(b) Ratan Tata
(c) Anil Ambani
(d) Aditya Birla

[M.P.P.C.S. (Pre) 2016]


285. Which of the following is the biggest e-commerce company in India?

(a) Flipkart
(b) Jabong
(c) M. Junction
(d) Bharti Airtel

[U.P. Lower Sub. (Pre) 2015]


286. Cloud computing services do not include :

(a) Platform as a service
(b) Software as a service
(c) Allotment of electromagnetic spectrum
(d) Infrastructure as a service

[Jharkhand P.C.S. (Pre) 2021]


287. ‘Sky Drive’ is the name of a Cloud Computing Service of which one of the following companies?

(a) Vodafone
(b) BSNL
(c) Microsoft
(d) None of the above

[U.P. Lower Sub. (Pre) 2013]


288. ‘Project Loon’, sometimes seen in the news, is related to :

(a) Waste management technology
(b) Wireless communication technology
(c) Solar power production technology
(d) Water conservation technology

[I.A.S. (Pre) 2016, Jharkhand P.C.S. (Pre) 2016]


289. The web portal DACNET is related to :

(a) e-Agriculture
(b) e-Commerce
(c) e-Business
(d) e-Logistics

[Jharkhand P.C.S. (Pre) 2016]


290. The full form of I.B.M. is :

(a) Indian Business Machine
(b) International Business Machine
(c) Italian Business Machine
(d) Integral Business Machine

[Uttarakhand P.C.S. (Mains) 2002]


291. What is the full form of HTTP?

(a) Hypertext Transfer Program
(b) Hypertext Transfer Protocol
(c) Hypertool Transfer Program
(d) Hypertool Transfer Protocol

[M.P.P.C.S. (Pre) 2016]


292. Which of the following protocols may be used for accessing the World Wide Web?

(a) HTTP
(b) SMTP
(c) SLIP
(d) None of the above

[M.P.P.C.S. (Pre) 2012]


293. HTML stands for :

(a) Hybrid Text Markup Language
(b) Hyper Text Markup Language
(c) Higher Text Markup Language
(d) None of the above

[M.P.P.C.S. (Pre) 2012]


294. What does XML stand for?

(a) Example Markup Language
(b) Extensible Markup Language
(c) X Markup Language
(d) Extra Modern Link

[M.P. P.C.S. (Pre) 2020]


295. URL stands for :

(a) Unique Resource Locator
(b) Universal Resource Locator
(c) Uniform Resource Locator
(d) United Resource Locator

[M.P.P.C.S. (Pre) 2012]


296. FTP stands for :

(a) File Translate Protocol
(b) File Transit Protocol
(c) File Typing Protocol
(d) File Transfer Protocol

[M.P.P.C.S. (Pre) 2014]


297. SMPS stands for :

(a) Switched Mode Power Supply
(b) Start Mode Power Supply
(c) Signal Mode Power Supply
(d) Store Mode Power Supply

[M.P.P.C.S. (Pre) 2014]


298. The full form of UPS is –

(a) Uninterrupted Power Supply
(b) Universal Power Supply
(c) Universal Power Service
(d) Universal Power Saving

[U.P. Lower Sub. (Pre) 2015]


299. Written Programs, due to which computers function in the desired way, are called

(a) Codes
(b) Instructions
(c) Software
(d) None of these

[Uttrakhand U.D.A./L.D.A. (Mains) 2007]


300. How many minimum number of NAND gates are needed to implement Ex-OR functions?

(a) 4
(b) 3
(c) 2
(d) 5

[U.P. Lower Sub. (Mains) 2015]


301. ‘World Computer Literacy Day’ is celebrated on :

(a) 2nd December
(b) 5th July
(c) 14th November
(d) 3rd November

[Uttarakhand U.D.A./L.D.A. (Pre) 2007]


302. Which of the following is claimed to be the cheapest Tablet P.C. in the world?

(a) Aakash
(b) Chirag
(c) Vidhyarthi
(d) Vasudha

[U.P. Lower Sub. (Pre) 2009]


303. Enhancement of the use of information technology for development is the strategy of–

(a) The West Bengal Government
(b) Tamil Nadu Government
(c) Haryana Government
(d) Andhra Pradesh Government

[U.P. Lower Sub. (Pre) 1998]


304. The term Information Technology can be defined as

(a) Computers + Connectivity
(b) Computers + Network
(c) Hardware + Software
(d) Connectivity + Hardware

[Jharkhand P.C.S. (Pre) 2016]


305. In the context of wearable technology, which of the following tasks is/are accomplished by wearable devices?

1. Location identification of a person
2. Sleep monitoring of a person
3. Assisting the hearing-impaired person

Select the correct answer using the code given below :

(a) 1 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3

[I.A.S. (Pre) 2019]


306. When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day’s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator to make breakfast, it recognizes the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers, and AC machines get switched off automatically. On your way to the office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly.

In the context of emerging communication technologies, which one of the following terms best applies to the above scenario?

(a) Border Gateway Protocol
(b) Internet of Things
(c) Internet Protocol
(d) Virtual Private Network

[I.A.S. (Pre) 2018]


307. Vidya Vahini Project lays emphasis on which of the following?

(a) Computer Education
(b) Value Education
(c) Environmental Education
(d) Skill Development

[U.P. Lower Sub. (Mains) 2013]