201. On which principle digital computer work?
(a) Calculation
(b) Measurement
(c) Electric
(d) Logical
[Uttarakhand U.D.A./L.D.A. (Pre) 2007]
Ans. (d) Logical
- Computers work using a language of just 1s and 0s, and use the rules of logic created by British mathematician George Boole in the 1850s.
- These rules include three operations (AND, OR and NOT) which can do any type of logical task, known as Boolean Logic.
|
202. If a domain name ends with .edu.us, then it is –
(a) An international organization
(b) A non-profit organization
(c) An educational institution in Australia
(d) An educational institute in USA
[M.P.P.C.S. (Pre) 2008]
Ans. (d) An educational institute in USA
- The “.us” domain name stands for the United States (America) and “.edu” stands for education.
- So, “.edu.us” is the domain name for educational institutions in the USA.
|
203. On the website of an organization ‘.com’ indicates
(a) Company
(b) Command
(c) Communication
(d) Commercial
Uttarakhand P.C.S. (Pre) 2010
Ans. (d) Commercial
- The .com part of a company website stands for commercial.
- It is the highest level of a domain name on the internet.
|
204. Which of the following is a valid domain name extension?
(a) .com
(b) .gov
(c) .net
(d) All of the above
[M.P.P.C.S. (Pre) 2012]
Ans. (d) All of the above
- The last part of a web address is called the top level domain, for example “.com” in www.cnn.com. Other top level domains include .edu, .gov, .org, .net, and .info.
|
205. Consider the following statements and select the correct answer from the codes given below :
(1) Proxy server provides TCP/IP address
(2) Proxy server processes clients’ requests by forwarding the requests to other servers.
Code :
(a) Only 1 is correct
(b) Only 2 is correct
(c) Both 1 and 2 are correct
(d) None of these
[M.P.P.C.S. (Pre) 2008]
Ans. (b) Only 2 is correct
- Statement 1 is wrong because a Proxy Server does not give out TCP/IP addresses.
- Statement 2 is right because a Proxy Server is a computer server that helps get resources from other servers for the people who asked for it.
|
206. With reference to communication technologies, what is/are the difference/differences between LTE (Long-Term Evolution) and VoLTE (Voice over Long-Term Evolution)?
1. LTE is commonly marketed as 3G and VoLTE is commonly marketed as advanced 3G.
2. LTE is data-only technology and VoLTE is voice-only technology.
Select the correct answer using the code given below:
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
[I.A.S. (Pre) 2019]
Ans. (d) Neither 1 nor 2
- LTE and VoLTE are both high speed mobile communication standards that are currently being used in India by telecom operators in 4G systems.
- LTE is usually called 4G and VoLTE is usually referred to as an advanced 4G.
- While LTE can support data and voice calls at the same time, it could affect the quality of the voice call.
- VoLTE, however, can handle both data and voice calls together without any negative effect on the quality of the voice call.
|
207. With reference to Visible Light Communication (VLC) technology, which of the following statements are correct?
1. VLC uses electromagnetic spectrum wavelengths 375 to 780 nm.
2. VLC is known as long-range optical wireless communication.
3. VLC can transmit large amounts of data faster than Bluetooth.
4. VLC has no electromagnetic interference.
Select the correct answer using the code given below:
(a) 1, 2 and 3 only
(b) 1, 2 and 4 only
(c) 1, 3 and 4 only
(d) 2, 3 and 4 only
[I.A.S. (Pre) 2020]
Ans. (c) 1, 3 and 4 only
- Visible Light Communication (VLC) is a way of sending data using light instead of wires.
- It uses special light wavelengths between 375-780 nanometres.
- It’s a type of optical wireless communication technology.
- It can be used with fluorescent lamps to transmit signals at 10 Kbit/s or with LEDs for up to 500 Mbit/s over short distances.
- It’s faster than radio waves, so it’s faster than Bluetooth when transferring data.
- It is also immune to interference from electromagnetic sources and networks.
- Therefore, the three other statements are true, while statement 2 is not.
|
208. With reference to ‘Near Field Communication (NFC) Technology’, which of the following statements is/are correct?
1. It is a contactless communication technology that uses electromagnetic radio fields .
2. NFC is designed for use by devices which can be at a distance of even a meter from each other.
3. NFC can use encryption when sending sensitive information .
Select the correct answer using the code given below.
(a) 1 and 2 only
(b) 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
[I.A.S. (Pre) 2015]
Ans. (c) 1 and 3 only
- Near Field Communication, or NFC, is a way for devices such as smartphones and tablets to communicate without being in direct contact.
- It works by using electromagnetic radio fields, and for extra security, it creates a secure channel and encrypts sensitive data like credit card numbers.
- NFC allows devices to exchange information within a 4 centimeter range, and it can do so at a maximum speed of 424 kbps.
|
209. In the context of digital technologies for entertainment, consider the following statements :
1. In Augmented Reality (AR), a simulated environment is created and the physical world is completely shut out.
2. In Virtual Reality (VR), images generated from a computer are projected onto real-life objects or surroundings.
3. AR allows individuals to be present in the world and improves the experience using the camera of a smartphone or PC.
4. VR closes the world, and transposes an individual, providing a complete immersion experience.
Which of the statements given above is/are correct?
(a) 1 and 2 only
(b) 3 and 4 only
(c) 1, 2 and 3
(d) 4 only
[I.A.S. (Pre) 2019]
Ans. (b) 3 and 4 only
- Augmented Reality (AR) places virtual items on top of the actual world.
- When you use AR, you can see and interact with the real world, while also seeing digital items added to it.
- This is done by using the camera on your Smartphone or PC. Virtual Reality (VR) is a full immersion experience that blocks out the real world.
- When using VR devices like HTC Vive, Oculus Rift or Google Cardboard, you can be taken into artificial digital worlds created by a computer.
|
210. With the present state of development, Artificial Intelligence can effectively do which of the following?
1. Bring down electricity consumption in industrial units
2. Create meaningful short stories and songs
3. Disease diagnosis
4. Text-to-Speech Conversion
5. Wireless transmission of electrical energy
Select the correct answer using the code given below:
(a) 1, 2, 3 and 5 only
(b) 1, 3 and 4 only
(c) 2, 4 and 5 only
(d) 1, 2, 3, 4 and 5
[I.A.S. (Pre) 2020]
Ans. (b) 1, 3 and 4 only
- AI can be used for a lot of different things.
- It can help factories save electricity by keeping track of energy usage. According to a 2018 NITI Aayog paper, AI can be used for diagnosing diseases and for turning text into speech or speech into text.
- Statement 2 and 5 are wrong when it comes to AI, so (b) is the right answer.
|
211. To increase the length of a network without loss of signal strength, we would use –
(a) Repeater
(b) Router
(c) Gateway
(d) Switch
[M.P.P.C.S. (Pre) 2008]
Ans. (a) Repeater
- A repeater is a device that boosts the strength of a network signal, allowing it to travel further along its cable without any signal loss.
|
212. In computer terminology, U.S.B. stands for –
(a) Universal Serial Bus
(b) Universal Set Bus
(c) Unif ed Serial Bus
(d) Undef ned Serial Bus
[Uttarakhand U.D.A./L.D.A. (Pre) 2007]
Ans. (a) Universal Serial Bus
- USB is the most common way of connecting a computer to other gadgets such as digital cameras, printers, scanners, and external hard drives.
|
213. The place where accessories are connected in computer is known as-
(a) Port
(b) Ring
(c) Bus
(d) Zip
[M.P.P.C.S. (Pre) 2015]
Ans. (a) Port
- The port acts as a bridge between the computer and other devices or extras.
- The monitor, keyboard, mouse, and other components of the computer are connected to the computer via the port.
- These ports are located on the motherboard.
|
214. ‘Password’ in computers protects –
(a) Hardware wearouts
(b) Software errors
(c) Unauthorized access of the system
(d) None of the above
[Uttarakhand P.C.S. (Mains) 2002]
Ans. (c) Unauthorized access of the system
- The port is a connection between the computer and other devices like monitors, keyboards, and mice.
- These ports are located on the motherboard.
|
215. Which infotech terminology used to fi nd out the User’s E-mail address ?
(a) Login
(b) Password
(c) Finger
(d) Archie
[U.P. U.D.A./L.D.A. (Spl.) (Pre) 2010]
Ans. (c) Finger
- ‘Finger’ protocol is used to find out the user’s E-mail address.
|
216. In India, the term “Public Key Infrastructure” is used in the context of :
(a) Digital security infrastructure
(b) Food security infrastructure
(c) Health care and education infrastructure
(d) Telecommunication and transportation infrastructure
[I.A.S. (Pre) 2020]
Ans. (a) Digital security infrastructure
- In India, ‘Public Key Infrastructure’ (PKI) is a system of tools and protocols used to ensure secure electronic communications.
- It is part of digital security infrastructure and its purpose is to help with activities such as e-commerce, internet banking and confidential email.
- PKI is used to authenticate users and devices in the digital world, and provides the foundation for using technologies like digital signatures and encryption on a large scale.
|
217. Consider the following statements :
A digital signature is
1. an electronic record that identifies the certifying authority issuing it.
2. used to serve as proof of identity of an individual to access information or server on Internet.
3. an electronic method of signing an electronic document and ensuring that the original content is unchanged.
Which of the statements given above is/are correct?
(a) 1 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3
[I.A.S. (Pre) 2019]
Ans. (c) 3 only
- A digital signature is a way of verifying someone’s identity when sending a message or document online.
- It also makes sure the message or document hasn’t been changed.
- Statements 1 and 2 are about digital signature certificates, which are different than digital signatures.
- Digital signatures are a way to electronically sign a document, while digital signature certificates prove someone’s identity online.
- They can be used to access information or services on the internet or to digitally sign documents. Statement 3 is correct
|
218. With reference to digital payments, consider the following statements :
1. The BHIM app allows the user to transfer money to anyone with a UPI-enabled bank account.
2. While a chip-pin debit card has four factors of authentication. BHIM app has only two factors of authentication.
Which of the statements given above is/are correct?
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
[I.A.S. (Pre) 2018]
Ans. (a) 1 only
- BHIM is an app that was made by the Indian government and it helps people to transfer money to each other with a UPI-enabled bank account.
- It was released in December 2016. Statement 1 is accurate but statement 2 is not because the BHIM app has 3 layers of security.
- You have to connect your device’s ID and phone number, sync your account to use it, and set up a PIN code to log in.
|
219. Which of the following is/are the aim/aims of ‘Digital India’ Plan of the Government of India?
1. Formation of India’s own Internet companies like China did.
2. Establish a policy framework to encourage overseas multinational corporations that collect Big Data to build their large data centers within our national geographical boundaries.
3. Connect many of our villages to the Internet and bring Wi-Fi to many of our schools, public places and major tourist centers.
Select the correct answer using the code given below:
(a) 1 and 2 only
(b) 3 only
(c) 2 and 3 only
(d) 1, 2 and 3
[I.A.S. (Pre) 2018]
Ans. (b) 3 only
- Digital India is a plan to make India more advanced technologically.
- It’s goal is to make sure people can access government services online.
- Prime Minister Narendra Modi began the program on July 1st 2015.
- It includes connecting rural areas to the internet and teaching people how to use digital tools.
|
220. The identity platform ‘Aadhaar’ provides open ‘Application Programming Interfaces (APIs)’. What does it imply?
1. It can be integrated into any electronic device.
2. Online authentication using iris is possible.
Which of the statements given above is/are correct?
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
[I.A.S. (Pre) 2018]
Ans. (c) Both 1 and 2
- Aadhaar offers special programming interfaces that can be added to any electronic device.
- These interfaces make it possible to authenticate online using either a fingerprint or an iris scan.
- Initially, the only biometric option was a fingerprint scan.
- However, since a lot of Indians are manual laborers and farmers, who often have worn down fingerprints, UIDAI decided to also include iris recognition since it is more accurate and inclusive.
|
221. With reference to “Blockchain Technology”, consider the following statements:
1. It is a public ledger that everyone can inspect, but which no single user controls.
2. The structure and design of blockchain is such that all the data in it are about cryptocurrency only.
3. Applications that depend on basic features of blockchain can be developed without anybody’s permission.
Which of the statements given above is/are correct?
(a) 1 only
(b) 1 and 2 only
(c) 2 only
(d) 1 and 3 only
[I.A.S. (Pre) 2020]
Ans. (d) 1 and 3 only
- Blockchain is a way of securely storing records (called blocks) on a shared system using cryptography so that everyone connected to the system can see and inspect the information, but not change it.
- It is a decentralized system that doesn’t need a third-party like a bank or government to verify or transfer ownership.
- Blockchain can be used for a variety of purposes, from cryptocurrency to storing data like vehicle ownership.
- It can be developed without permission from any government or central bank.
|
222. Consider the following pairs :
Terms sometimes seen in news Context/Topic
1. Belle II Artificial experiment Intelligence
2. Blockchain technology Digital/Cryptocurrency
3. CRISPR – Cas9 Particle Physics
Which of the pairs given above is/are correctly matched?
(a) 1 and 3 only
(b) 2 only
(c) 2 and 3 only
(d) 1, 2 and 3
[I.A.S. (Pre) 2018]
Ans. (b) 2 only
- The Belle II experiment is a scientific study about B-mesons. It has nothing to do with AI.
- Blockchain is connected to cryptocurrency, so they fit together.
- CRISPR-Cas 9 is a tool used to edit genomes accurately.
- This has nothing to do with particle physics.
|
223. Blowfish is a type of :
(a) Symmetric Encryption Algorithm
(b) Hashing Algorithm
(c) Digital Signature Algorithm
(d) Asymmetric Encryption Algorithm
[M.P.P.C.S. (Pre) 2020]
Ans. (a) Symmetric Encryption Algorithm
- Blowfish is an encryption method developed by Bruce Schneier in 1993 and is faster than DES. No one has been able to crack it yet, and it is not covered by any patents, so anyone can use it.
|
224. Which work is not done by a computer?
(a) Computing
(b) Processing
(c) Understanding
(d) Outputting
[M.P.P.C.S. (Pre) 2015]
Ans. (c) Understanding
- The computer provides information after analyzing the input given by the user. It happens in a phased manner –
- (i) Input, (ii) Processing, (iii) Computing, (iv) Outputting
- It is clear that the work of understanding is not done by a computer.
|
225. Which one of the following expresses an error in computer data –
(a) Chip
(b) Byte
(c) Bug
(d) Bit
[U.P.P.C.S. (GIC) 2010]
Ans. (c) Bug
- A software bug is a problem or mistake in a computer program or system which causes it to output wrong or unexpected results, or work in an unexpected way.
- These bugs are usually caused by people making mistakes in the program’s code or design.
|
226. Which industry is the primary user of Magnetic Ink Character Recognition (MICR)?
(a) Banks
(b) Footwear Designing
(c) Book Publishing
(d) None of these
[Uttarakhand P.C.S. (Pre) 2010]
Ans. (a) Banks
- MICR stands for Magnetic Ink Character Recognition.
- It describes the ink used to print a special font at the bottom of checks and other financial documents.
- It is mainly used in the banking industry to process checks using computers.
|
228. O.M.R. stands for :
(a) Optical Mark Reader
(b) Optical Machine Reader
(c) Octal Machine Reader
(d) Octal Mark Reader
[Uttarakhand P.C.S. (Mains) 2006]
Ans. (a) Optical Mark Reader
- O.M.R. stands for Optical Mark Reader. This is a way of getting information into a computer.
- Optical Mark Reader looks for marks made with pencil or pen on a paper form in certain spots to answer questions or check off items on a list.
- It is often used to check multiple choice answer papers.
|
228. Which one is mainly used in checking objective-type answer papers in the examination?
(a) MICR
(b) OMR
(c) OCR
(d) MCR
[M.P.P.C.S. (Pre) 2013]
Ans. (b) OMR
- OMR is used mainly to check exams with multiple choice answers.
- It allows someone to answer a question by filling in a small circle or “bubble” next to their chosen answer.
|
229. I.R.C. stands for :
(a) Internet Real-time Communication
(b) Internet Relay Chat
(c) Internet Real-time Chat
(d) None of the above
[Uttarakhand U.D.A./L.D.A. (Mains) 2007]
Ans. (b) Internet Relay Chat
- I.R.C. stands for Internet Relay Chat, which is an online tool that allows people to chat in real time using text.
- It is a form of online communication that happens in real time.
|
230. For which word, the letter ‘G’ has been used in ‘2G Spectrum’?
(a) Global
(b) Government
(c) Generation
(d) Google
[53rd to 55th B.P.S.C. (Pre) 2011]
Ans. (c) Generation
- 2G is a type of mobile phone technology that lets us send texts, photos, and access the internet.
- It stands for “2nd Generation”.
|
231. C.A.D. stands for :
(a) Computer Algorithm for Design
(b) Computer-Aided Design
(c) Computer Application in Design
(d) None of the above
[Uttarakhand P.C.S. (Mains) 2002]
Ans. (b) Computer-Aided Design
- CAD software is used by people like architects, engineers, drafters, and artists to create detailed drawings or illustrations.
- It can be used to make both 2D drawings and 3D models.
|
232. ‘GIF’ stands for –
(a) Geographical Image Format
(b) Global Image Format
(c) Graphical Interchange Format
(d) None of the above
[Uttarakhand P.C.S. (Pre) 2007]
Ans. (c) Graphical Interchange Format
- GIF is short for ‘Graphics Interchange Format’ which is a type of computer file used for pictures and basic animations.
- It was created by CompuServe in the late 1980s and became more popular when the Internet became more widespread.
- It makes it possible for pictures with great detail and quality to be seen on many different types of computers and is designed to be used to exchange and show graphics.
|
233. ‘3D printing’ has applications in which of the following?
1. Preparation of confectionery items
2. Manufacture of bionic ears
3. Automotive industry
4. Reconstructive surgeries
5. Data processing technologies
Select the correct answer using the code given below:
(a) 1, 3 and 4 only
(b) 2, 3 and 5 only
(c) 1 and 4 only
(d) 1, 2, 3, 4 and 5
[I.A.S. (Pre) 2018]
Ans. (d) 1, 2, 3, 4 and 5
- 3D printing is a type of technology that uses computers to join different materials together layer by layer to make 3D objects.
- It can be used for making sweets, bionic ears, car parts, reconstructive surgeries, and data processing.
|
234. The use of Computers in Governance is known as –
(a) Computer Governance
(b) E-mail Governance
(c) Internet Governance
(d) E-Governance
[Uttarakhand P.C.S. (Mains) 2006]
Ans. (d) E-Governance
- Using computers to run a government and provide services to citizens is called E-Governance.
|
235. A computer derives its strength from –
(a) Its speed
(b) Accuracy
(c) Memory
(d) All of the above
[Uttrakhand U.D.A./L.D.A. (Mains) 2006]
Ans. (d) All of the above
- A computer can calculate a huge number of things very quickly, and it does this without making any mistakes.
- It also has temporary and permanent memory which helps it process information.
|
236. Multimedia can contain :
(a) Numeric, text, and picture data
(b) Graphics, animation, video, music and voice
(c) Only numeric type data
(d) None of the above
[Uttarakhand P.C.S. (Pre) 2012]
Ans. (b) Graphics, animation, video, music and voice
- Multimedia is the area of study that deals with using computers to combine different types of information like text, pictures, videos, animation, sound, and more, which can all be stored, transmitted, and processed digitally.
|
237. The practice of using more than one type of medium in the computer at the same time is called :
(a) Multimedia
(b) Macromedia
(c) Interactivity
(d) None of the above
[Uttarakhand P.C.S. (Pre) 2012]
Ans. (a) Multimedia
- Multimedia applications can involve different forms of media.
- The main feature of a multimedia system is that it uses multiple forms of media to provide content and features.
|
238. The ability of an operating system to run more than one application at a time is called :
(a) Multiuser computing
(b) Time sharing
(c) Multiprogramming
(d) Multitasking
[U.P. Lower Sub. (Mains) 2015]
Ans. (d) Multitasking
- In computing, multitasking means doing several things at the same time over a certain period of time.
|
239. When information is dialed on the telephone and read on the television screen, it is known as
(a) Telax
(b) Telefax
(c) Teletax
(d) Teleprocessing
[R.A.S./R.T.S. (Pre) 1994-95]
Ans. (b) Telefax
- Using Telefax, you can send pictures and words from one place to another over the phone.
- Alexander Bain from Scotland made this invention in 1842.
|
240. What can we send through video mail?
(a) Graphics
(b) Video clips
(c) Video messages
(d) All of these
[M.P.P.C.S. (Pre) 2010]
Ans. (d) All of these
- Video mail is a way of sending an email with a video already recorded in it.
- This video can include graphics and video clips.
|
241. The service of the Internet that provides ‘audio’ and ‘video’ conversation, is called :
(a) chat
(b) e-mail
(c) video conferencing
(d) video chat
[M.P.P.C.S. (Pre) 2017]
Ans. (c) Video Conferencing
- Video conferencing is a way to have a meeting between two or more people who are in different places by using technology like cameras, microphones, and speakers that are connected to computers.
- It’s like a video phone call.
|
242. Video conferencing is :
(a) Conduct of video calls using telecom technology
(b) Conduct of telephone calls
(c) Conduct of video conference using a set of telescopic technology
(d) None of the above
[M.P.P.C.S. (Pre) 2012]
Ans. (a) Conduct of video calls using telecom technology
- Video conferencing is when two or more people in different locations have a video call using special technology that lets them hear and see each other at the same time.
|
243. Which of the following devices is compulsory for video conferencing?
(a) Printer
(b) Scanner
(c) Webcam
(d) Mouse
[M.P.P.C.S. (Pre) 2016]
Ans. (c) Webcam
- A video conference is when two or more people who are in different places can see each other and talk to each other in real-time.
- You need a webcam to see the other person and a computer monitor, TV, or projector to show the other person what you look like.
|
244. Which of the following is not an essential component required for the video conferencing system?
(a) Video camera
(b) Display device
(c) Telephone
(d) Microphone
[M.P. P.C.S. (Pre) 2018]
Ans. (c) Telephone
- Video conferencing is a way for people who are in different places to talk to each other while seeing and hearing each other.
- To use video conferencing, you need a camera, a screen, and a microphone, but you do not need a phone.
|
245. E-Mail stands for :
(a) Electrical Mail
(b) Electronic Mail
(c) Elastic Mail
(d) None of the above
[M.P. P.C.S. (Pre) 2012]
Ans. (b) Electronic Mail
- E-mail stands for ‘Electronic mail’.
|
246. What are the two parts of an e-mail address?
(a) Username and home address
(b) Legal name and phone number
(c) Signature and password
(d) User name and domain name
[M.P.P.C.S. (Pre) 2013]
Ans. (d) User name and domain name
- An e-mail address that works correctly is made up of two parts:
- a username and a domain name which will look like this:
- username@domainname.extension.
|
247. The domain name of the E-mail address is marked. sttol @ITdesk.info is
(a) mark. stool
(b) .sttol
(c) ITdesk. info
(d) .info
[M.P.P.C.S. (Pre) 2019]
Ans. (c) ITdesk. info
- The part of an email address before the # symbol is the username and the part after the # symbol is the domain name.
- In the given email address, ITdesk.info is the domain name.
|
248. Which of the following is a free e-mail service provider?
(a) Hotmail
(b) Redif mail
(c) Yahoo
(d) All of the above
[M.P.P.C.S. (Pre) 2012]
Ans. (d) All of the above
- There are a variety of free email services such as Hotmail, Redif mail, Yahoo, and Gmail.
|
249. What kind of digital files can be attached to the e-mail?
(a) Music
(b) Documents
(c) Photos
(d) All of the above
[U.P. Lower Sub. (Mains) 2013]
Ans. (d) All of the above
- Electronic mail (e-mail) is a way to communicate with others using technology like computers, tablets, and smartphones.
- You can attach files to your e-mail such as documents, text files, music, audio, video, and photos.
|
250. What is singular data?
(a) Datum
(b) Dat
(c) Data
(d) None of the above
[Uttarakhand P.C.S. (Mains) 2006]
Ans. (a) Datum
- The singular form of data is ‘Datum’.
|
251. Word ‘blog’ is a combination of two words –
(a) Web-log
(b) Wave-log
(c) Web-blog
(d) Wed-lock
[M.P.P.C.S. (Pre) 2010]
Ans. (a) Web-log
- A blog is a website that is like a personal diary.
- It usually is written by one person and published often.
- The person who writes the blog is called a blogger and the act of writing the blog is called blogging.
- The word blog is made up of the words web and log.
|
252. ………………….. is the process of carrying out commands –
(a) Fetching
(b) Storing
(c) Decoding
(d) Executing
[M.P.P.C.S. (Pre) 2010]
Ans. (d) Executing
- The Central Processing Unit (CPU) is the part of a computer that processes the data it receives.
- It is broken down into four parts:
- Fetch:- Retrieving information from the memory is called fetching.
- Decode:- This information is changed so that a computer can understand it, which is known as decoding.
- Execute:- Carrying out the instructions or decoded data is called executing.
- Write back or store
|
253. A ‘menu’ contains a list of :
(a) Data
(b) Objects
(c) Reports
(d) Commands
[M.P.P.C.S. (Pre) 2013]
Ans. (d) Commands
- The command menu has a bunch of related instructions.
|
254. ………….. is a way to quickly access a favorite website by saving it in your browser.
(a) Cookie
(b) Bookmark
(c) Blog
(d) None of these
[M.P.P.C.S. (Pre) 2019]
Ans. (b) Bookmark
- Bookmarking is a way to easily find your favorite website again by saving it in your web browser.
- It’s a convenient and fast way to save websites you want to remember.
|
255. The size of virtual memory depends on –
(a) Address lines
(b) Database
(c) Disc space
(d) All of these
[M.P.P.C.S. (Pre) 2010]
Ans. (c) Disc space
- Computer memory is a device used to store data, instructions, and results.
- This information goes to the computer’s Central Processing Unit first and then is transferred to the memory.
- In modern operating systems, the exchange of information between the hard drive and Random Access Memory (RAM) occurs quickly with the help of virtual memory.
- The amount of virtual memory depends on the space on the hard drive that has been allocated for it.
|
256. ICT stands for :
(a) Information and Computer Technology
(b) Information & Communications Technology
(c) Information Code Techniques
(d) Integrated Circuit Technology
[U.P. Lower Sub. (Mains) 2015]
Ans. (b) Information & Communications Technology
- ICT stands for Information and Communications Technology and refers to technologies that let people access information through telecommunications, such as the Internet, wireless networks, cell phones, and other communication tools.
|
257. The full form of SIM is :
(a) Subscriber Identity Module
(b) Subscriber Identity Machine
(c) Self-Identity Machine
(d) Self Identity Module
[U.P.P.C.S.(Pre) 2012]
Ans. (a) Subscriber Identity Module
- A Subscriber Identity Module (SIM) is a tiny card that stores information about a mobile phone user’s account.
- It enables the phone to connect to a mobile network.
- It is about the size of a postage stamp and is usually seen in phones that use GSM or UMTS technology.
|
258. SMS Means–
(a) Swift mail system
(b) Short messaging service
(c) Shorthand Manual script
(d) Speed mail service
[Uttaranchal P.C.S. (Pre) 2003]
Ans. (b) Short messaging service
- SMS stands for Short Messaging Service and is used to send and receive messages using a cell phone.
|
259. How many days will the picture message stay in the private inbox?
(a) 28 Days
(b) 30 Days
(c) 15 Days
(d) 7 Days
[M.P.P.C.S. (Pre) 2010]
Ans. (b) 30 Days
- A photo sent via text message will stay in the recipient’s private inbox for up to 30 days.
- To keep the photo for longer, it must be saved in the message box.
|
260. Which one of the following pairs is not correctly matched?
(a) Optic f bres – Light waves
(b) Android – Voice input
(c) Large Hadron Collider – God particle
(d) Red Planet – Mars
[Uttarakhand P.C.S. (Pre) 2012]
Ans. (b) Android – Voice input
- Option (b) does not accurately match the given pair.
- Android, developed by Google, is a mobile operating system (OS) primarily designed for touchscreen mobile devices like smartphones and tablets.
- It is based on the Linux kernel.
|
261. The latest Android mobile operating system 6.0 is named as :
(a) Marshmallow
(b) Jelly Bean
(c) Kitkat
(d) Lollipop
[R.A.S./R.T.S. (Pre) 2016]
Ans. (a) Marshmallow
- Android 6.0 to 6.0.1 ‘Marshmallow’ was the 6th version of the Android OS.
- It was first shown in May 2015 and was released in October 2015.
- Android 9.0 ‘Pie’ came out in August 2018, followed by ‘Android 10’ in September 2019 and ‘Android 11’ in September 2020.
- The newest version, ‘Android 12’, was released on 4 October 2021.
|
262. What are the unique features of the recently launched iPhone 4S? Select the correct answer from the codes given below:
1. It has 300 hours of standby time.
2. It has 8 hours of talk time on 3G.
3. It has a voice-recognizing and talking assistant.
4. It has 640 MB of RAM.
Codes :
(a) 1 and 2
(b) 1, 2 and 3
(c) 2 and 3
(d) 1, 2, 3 and 4
[U.P. Lower Sub. (Pre) 2009]
Ans. (c) 2 and 3
- The iPhone 4S is a smartphone made by Apple Inc. that features a dual-core processor and 512 MB of RAM.
- It had a long battery life, with up to 200 hours of standby time and 8-14 hours of talk time.
- It also had a voice assistant named Siri. Apple’s newest phone is the iPhone SE3, released in March 2022.
- It is part of the 15th generation of iPhones, alongside the iPhone 13/13 mini and iPhone 13 Pro/13 Pro Max, which came out in 2021.
|
263. When customers of a Website are unable to access it due to flooding of fake network traffic, it is known as
(a) virus
(b) Trojan horse
(c) cracking
(d) denial of service attack
[M.P. P.C.S. (Pre) 2018]
Ans. (d) denial of service attack
- A denial of service (DOS) attack is when hackers try to stop legitimate users from using a website.
- They send a lot of messages with false information to overload the network or server.
- This causes it to get too busy and it stops responding to real users.
|
264. In Cyber Law terminology ‘DOS’ means :
(a) Denial of Service
(b) Disk Operating System
(c) Distant Operator Service
(d) None of the above
[Uttarakhand P.C.S. (Pre) 2012]
Ans. (a) Denial of Service
- In cyber law, “DOS” means “Denial of Service”.
- A DoS attack is a type of cyberattack that stops people from accessing services and resources that they have the right to use.
|
265. What do you understand by hacking?
(a) Searching
(b) Security
(c) Both (a) and (b)
(d) None of these
[M.P.P.C.S. (Pre) 2010]
Ans. (d) None of these
- Hacking is when someone isn’t allowed to get into a system or access resources by finding weaknesses.
|
266. A computer hacker is :
(a) A person who maintains computer security
(b) A person who violates computer security with malicious intentions for personal gain
(c) A person responsible for safe computer operation
(d) A person who repairs computer
[M.P.P.C.S. (Pre) 2012]
Ans. (b) A person who violates computer security with malicious intentions for personal gain
- A computer hacker is someone who tries to get into someone else’s computer system without permission.
- The term hacker is usually used to describe someone who uses their technical skills to gain access to computer systems illegally.
|
267. The term _____ refers to an individual who breaks into computer systems without authorization and deliberately defaces websites for a fraudulent purpose.
(a) white hat
(b) backer
(c) cracker
(d) stacker
[M.P. P.C.S. (Pre) 2018]
Ans. (c) cracker
- A cracker is someone who hacks or breaks into a computer or network.
- They can do this for malicious reasons, to make money, for a cause, or just for fun.
- Sometimes crackers break into networks to show how poor the security system is.
- Generally, they want to steal confidential information, get free software, or cause damage.
|
268. In the context of computer security, crackers are also known as :
(a) black hat hackers
(b) white hat hackers
(c) elite hackers
(d) script kiddie
[M.P.P.C.S. (Pre) 2017]
Ans. (a) black hat hackers
- A black hat hacker, also known as a cracker, is someone who breaks into a computer system without permission and uses it to cause damage, commit fraud, steal identities, and do other unlawful activities on other people’s networks.
|
269. One who gains unauthorized access, destroys vital data, denies legitimate user’s service or causes problems for their targets is called
(a) White Hat Hacker
(b) Cracker
(c) Programmer
(d) Database Administrator
[M.P.P.C.S. (Pre) 2019]
Ans. (b) Cracker
- A cracker or black hat hacker is someone who looks for weaknesses in computer security and uses them for their own benefit or to cause harm.
- They try to get access to a computer system or network without permission, destroying data, blocking legitimate users, or causing other problems.
- This is different from white hat hackers, who are employed to use hacking techniques to find security issues that crackers or black hat hackers may take advantage of.
|
270. Cybercrime is :
(a) Hacking
(b) Stalking
(c) Denial of service attacks
(d) All of the above
[M.P.P.C.S. (Pre) 2012]
Ans. (d) Disc space
- Cybercrime is made up of hacking, stalking, and denial of service attacks.
- Hacking is when someone uses their knowledge or programming skills to break into someone else’s system and do something bad.
- Cyberstalking is when someone uses the internet or other electronic means to threaten or harass someone or an organization.
- A denial of service attack is when someone tries to make a computer or network unavailable to its users.
|
271. Which of the following is not a cybercrime?
(a) Phishing
(b) Cyber Stalking
(c) Identity Theft
(d) Online Chatting
[M.P.P.C.S. (Pre) 2019]
Ans. (d) Online Chatting
- Online chatting is not a type of cybercrime, however, phishing, cyberstalking, and identity theft are all considered cybercrimes.
- Phishing is when someone tries to trick you into giving them your personal information.
- Cyberstalking is when someone follows and harasses you online.
- Identity theft is when someone steals your personal information.
|
272. Which of the following are the two essential features of cybercrime?
(a) Computer technology as modus operandi and intangibility of the environment
(b) Of ender computer skills and victim ignorance of computer technology
(c) Hardware and software
(d) Hackers and crackers
[M.P. P.C.S. (Pre) 2018]
Ans. (b) Of ender computer skills and victim ignorance of computer technology
- The Cybercriminals are very knowledgeable when it comes to computers, while their victims have no knowledge about computer technology.
|
273. The first cyber law which provides the legal infrastructure for e-commerce in India is
(a) The Information Technology Act, 1996
(b) The Information Technology Act, 2000
(c) The Information Technology Act, 1998
(d) The Information Technology Act, 1990
[M.P.P.C.S. (Pre) 2019]
Ans. (b) The Information Technology Act, 2000
- The Information Technology Act, of 2000 was passed in India on June 9th, 2000, and was put into effect on October 17th, 2000.
- This is the first law that creates a legal basis for online shopping in the country.
- It also makes digital records and signatures legally binding and provides punishments for cyber crimes.
|
274. In India, it is legally mandatory for which of the following to report on cybersecurity incidents?
1. Service providers
2. Data centers
3. Body corporate
Select the correct answer using the code given below:
(a) 1 only
(b) 1 and 2 only
(c) 3 only
(d) 1, 2 and 3
[I.A.S. (Pre) 2017]
Ans. (d) 1, 2, and 3
- In India, the Information Technology Act of 2000 gives the Central Government the authority to create a government agency called the ‘Indian Computer Emergency Response Team’ (CERT-in).
- The Information Technology Rules of 2013 describe the duties of CERT-in and other information.
- These rules require service providers, intermediaries, data centers, and corporations to report cyber security incidents in a timely manner, so CERT-in can take action quickly.
|
275. In India, under cyber insurance for individuals, which of the following benefits are generally covered, in addition to payment for the loss of funds and other benefits?
1. Cost of restoration of the computer system in case of malware disrupting access to one’s computer
2. Cost of a new computer if some miscreant wilfully damages it, if proven so
3. Cost of hiring a specialized consultant to minimize the loss in case of cyber extortion
4. Cost of defense in the Court of Law if any third party files a suit
Select the correct answer using the code given below:
(a) 1, 2, and 4 only
(b) 1, 3, and 4 only
(c) 2 and 3 only
(d) 1, 2, 3 and 4
[I.A.S. (Pre) 2020]
Ans. (b) 1, 3, and 4 only
- Cyber insurance is a type of insurance that helps businesses and individuals protect themselves against risks and liabilities that come from the internet.
- There are two types of protection:
- first-party – First-party protection covers direct losses for the organization or individual.
- third party – Third-party protection covers claims and legal action from customers or partners.
- In India, individual cyber insurance policies do not cover damage or destruction to tangible property.
- The policy will only cover the cost of restoring a person’s computer if it is damaged due to malware or a cyber attack.
- Any other benefits are typically included in the individual cyber insurance policy in India.
|
276. Which of the following adopted a law on data protection and privacy for its citizens known as the ‘General Data Protection Regulation’ in April 2016 and started implementation on 25 May 2018?
(a) Australia
(b) Canada
(c) The European Union
(d) The United States of America
[I.A.S. (Pre) 2019]
Ans. (c) The European Union
- In 2016, the EU passed a law called the General Data Protection Regulation (GDPR) to protect the privacy of its citizens.
- This law went into effect on May 25, 2018, and replaced the Data Protection Directive of 1995.
- GDPR made sure that all EU countries had the same rules when it came to controlling and processing personal data.
- This law also gave more control to EU residents over their personal data and rights.
|
277. The basic Input-Output system in the computer resides
(a) On the Hard Disc
(b) In the RAM
(c) In the ROM
(d) None of the above
[Uttarakhand P.C.S. (Pre) 2006]
Ans. (a) On the Hard Disc
- The information needed to start up the computer is stored on the hard drive.
|
278. Networking of computers
(a) Increases the chances of threats.
(b) Increases the utility of computers.
(c) Increases the information access possibilities.
(d) All of the above.
[Uttarakhand P.C.S. (Pre) 2006]
Ans. (d) All of the above
- Computers are connected to each other in a system, allowing them to share data and resources.
- This network of computers makes them more useful but also increases the risk of security threats like hacking and viruses.
|
279. Data systems for planning are often called –
(a) Planning Analysis System
(b) Decision Analysis System
(c) Decision Support System
(d) None of the above
[Uttarakhand P.C.S. (Pre) 2006]
Ans. (c) Decision Support System
- Data Systems used for decision-making are often referred to as Decision Support Systems.
- A Decision Support System is a type of system that helps businesses or organizations with their decision-making processes.
|
280. The speedometer of a car represents
(a) Analog computer
(b) Digital computer
(c) Hybrid computer
(d) None of these
[Uttarakhand P.C.S. (Pre) 2010]
Ans. (a) Analog computer
- The speedometer in the car is a kind of analog computer.
- The data that it produces is the result of the computer’s calculations.
|
281. Another name for computer programs is
(a) Computer Hardware
(b) Computer Software
(c) Computer Language
(d) Computer Memory
[Uttarakhand P.C.S. (Mains) 2006]
Ans. (b) Computer Software
- The software allows computers to work with their hardware.
- It is made up of different programs that help the computer do its job.
- There are two main types of software:
|
282. Which is not the component of the computer?
(a) Input Unit
(b) Output Unit
(c) Memory Unit
(d) Basic Unit
[Uttarakhand P.C.S. (Mains) 2006]
Ans. (d) Basic Unit
- Today’s computers have four main parts:
- input/output devices
- a processor
- memory
- secondary storage
- The basic unit is not part of the computer.
|
283. Microsoft is a :
(a) Microchip Manufacturing Organization
(b) Software Developing Organization
(c) Micro Engineering Organization
(d) Computer Hardware Developing Organization
[Uttarakhand P.C.S. (Mains) 2002]
Ans. (b) Software Developing Organization
- Microsoft is a company that creates software.
- Its main office is located in Washington and was established by Bill Gates and Paul Allen on April 4th, 1975.
|
284. Who is the Chief of Wipro Company?
(a) Azim Premji
(b) Ratan Tata
(c) Anil Ambani
(d) Aditya Birla
[M.P.P.C.S. (Pre) 2016]
Ans. (a) Azim Premji
- Azim Hashim Premji is an extremely successful Indian businessman, investor, and philanthropist.
- He is the founder and former chairman of Wipro Limited and is widely known as the leader of the Indian IT industry.
- His son, Rishad Premji, became the new executive chairman of Wipro on July 30, 2019.
|
285. Which of the following is the biggest e-commerce company in India?
(a) Flipkart
(b) Jabong
(c) M. Junction
(d) Bharti Airtel
[U.P. Lower Sub. (Pre) 2015]
Ans. (c) M. Junction
- M-Junction is India’s biggest e-commerce company, which is run by Viresh Oberoi.
- It is a 50:50 joint venture between SAIL and Tata Steel and is the world’s largest online steel marketplace.
- It had a transaction value of more than Rs. 350,000 crore by December 2015.
- M-Junction declared itself as the biggest e-commerce company on its website, while Flipkart claimed to be the leading e-commerce company.
- However, the Uttar Pradesh Public Service Commission (U.P.P.S.C.) listed Flipkart as the correct answer in its answer key, which can be changed.
|
286. Cloud computing services do not include :
(a) Platform as a service
(b) Software as a service
(c) Allotment of electromagnetic spectrum
(d) Infrastructure as a service
[Jharkhand P.C.S. (Pre) 2021]
Ans. (c) Allotment of electromagnetic spectrum
- Cloud computing is a way of providing services over the internet without users having to actively manage them.
- These services come in three different forms:
- IaaS (infrastructure as a service)
- PaaS (platform as a service)
- SaaS (software as a service)
|
287. ‘Sky Drive’ is the name of a Cloud Computing Service of which one of the following companies?
(a) Vodafone
(b) BSNL
(c) Microsoft
(d) None of the above
[U.P. Lower Sub. (Pre) 2013]
Ans. (c) Microsoft
- Microsoft’s One Drive is a personal storage system that lets customers save, sync, and access their files from Windows PCs, Mac computers, and laptops, as well as mobile devices like smartphones and tablets.
- This service used to be called SkyDrive but has since been changed to One Drive.
|
288. ‘Project Loon’, sometimes seen in the news, is related to :
(a) Waste management technology
(b) Wireless communication technology
(c) Solar power production technology
(d) Water conservation technology
[I.A.S. (Pre) 2016, Jharkhand P.C.S. (Pre) 2016]
Ans. (b) Wireless communication technology
- Google X is working on a project called Project Loon that is designed to bring internet access to areas that are not easily reached.
- These high-altitude balloons are placed in the sky around 18 km up, making an aerial wireless network.
|
289. The web portal DACNET is related to :
(a) e-Agriculture
(b) e-Commerce
(c) e-Business
(d) e-Logistics
[Jharkhand P.C.S. (Pre) 2016]
Ans. (a) e-Agriculture
- DACNET (dacnet.nic.in) is a website related to e-Agriculture.
- This e-governance portal is run by the Department of Agriculture, Cooperation, and Farmers Welfare and is managed by the National Informatics Centre.
- It is designed to make it easier for people to access agricultural data and information online.
|
290. The full form of I.B.M. is :
(a) Indian Business Machine
(b) International Business Machine
(c) Italian Business Machine
(d) Integral Business Machine
[Uttarakhand P.C.S. (Mains) 2002]
Ans. (b) International Business Machine
- IBM(International Business Machine) is an American company that works with computers and other technologies.
|
291. What is the full form of HTTP?
(a) Hypertext Transfer Program
(b) Hypertext Transfer Protocol
(c) Hypertool Transfer Program
(d) Hypertool Transfer Protocol
[M.P.P.C.S. (Pre) 2016]
Ans. (b) Hypertext Transfer Protocol
- The Hypertext Transfer Protocol (HTTP) is an application used for communicating information on the internet.
- It is the base for how data is shared on the World Wide Web.
|
292. Which of the following protocols may be used for accessing the World Wide Web?
(a) HTTP
(b) SMTP
(c) SLIP
(d) None of the above
[M.P.P.C.S. (Pre) 2012]
Ans. (a) HTTP
- HTTP is a protocol that allows us to get information from the internet.
|
293. HTML stands for :
(a) Hybrid Text Markup Language
(b) Hyper Text Markup Language
(c) Higher Text Markup Language
(d) None of the above
[M.P.P.C.S. (Pre) 2012]
Ans. (b) Hyper Text Markup Language
- Hyper Text Markup Language is the name for HTML.
|
294. What does XML stand for?
(a) Example Markup Language
(b) Extensible Markup Language
(c) X Markup Language
(d) Extra Modern Link
[M.P. P.C.S. (Pre) 2020]
Ans. (b) Extensible Markup Language
- XML stands for eXtensible Markup Language.
- This is a type of language and file format used to store, send, and rebuild data.
- It creates a set of rules to make documents that can be understood by both humans and computers.
|
295. URL stands for :
(a) Unique Resource Locator
(b) Universal Resource Locator
(c) Uniform Resource Locator
(d) United Resource Locator
[M.P.P.C.S. (Pre) 2012]
Ans. (c) Uniform Resource Locator
- Every website has a unique address, which is called a uniform resource locator, or URL for short.
|
296. FTP stands for :
(a) File Translate Protocol
(b) File Transit Protocol
(c) File Typing Protocol
(d) File Transfer Protocol
[M.P.P.C.S. (Pre) 2014]
Ans. (d) File Transfer Protocol
- FTP stands for File Transfer Protocol and is used to send and receive files over the Internet.
|
297. SMPS stands for :
(a) Switched Mode Power Supply
(b) Start Mode Power Supply
(c) Signal Mode Power Supply
(d) Store Mode Power Supply
[M.P.P.C.S. (Pre) 2014]
Ans. (a) Switched Mode Power Supply
- SMPS stands for Switched-Mode-Power-Supply.
- In a modern computer, there is an SMPS that takes an AC power input, fixes any power problems, and then changes it into the low-voltage DC power needed by the computer.
|
298. The full form of UPS is –
(a) Uninterrupted Power Supply
(b) Universal Power Supply
(c) Universal Power Service
(d) Universal Power Saving
[U.P. Lower Sub. (Pre) 2015]
Ans. (a) Uninterrupted Power Supply
- UPS stands for Uninterrupted Power Supply.
- It’s a device that lets your computer continue running for a little while when the main power goes off, so you can shut it down properly.
|
299. Written Programs, due to which computers function in the desired way, are called
(a) Codes
(b) Instructions
(c) Software
(d) None of these
[Uttrakhand U.D.A./L.D.A. (Mains) 2007]
Ans. (c) Software
- Every computer needs a set of instructions in order to do its job.
- Software is these instructions that tell the computer what to do.
|
300. How many minimum number of NAND gates are needed to implement Ex-OR functions?
(a) 4
(b) 3
(c) 2
(d) 5
[U.P. Lower Sub. (Mains) 2015]
Ans. (a) 4
- You need to use at least 4 NAND gates to make an Ex-OR function work.
|
301. ‘World Computer Literacy Day’ is celebrated on :
(a) 2nd December
(b) 5th July
(c) 14th November
(d) 3rd November
[Uttarakhand U.D.A./L.D.A. (Pre) 2007]
Ans. (a) 2nd December
- People around the world mark the 2nd of December as World Computer Literacy Day.
|
302. Which of the following is claimed to be the cheapest Tablet P.C. in the world?
(a) Aakash
(b) Chirag
(c) Vidhyarthi
(d) Vasudha
[U.P. Lower Sub. (Pre) 2009]
Ans. (a) Aakash
- The Indian government is buying a low-cost tablet computer called Aakash to improve educational quality.
- It was released on October 5th, 2011, and was made by Datawind to the standards of IIT Jodhpur in Rajasthan.
- It cost Rs. 1100 after the government gave a 50% discount.
- However, Aakash 1 had some issues, so the government released Aakash 2.
|
303. Enhancement of the use of information technology for development is the strategy of–
(a) The West Bengal Government
(b) Tamil Nadu Government
(c) Haryana Government
(d) Andhra Pradesh Government
[U.P. Lower Sub. (Pre) 1998]
Ans. (d) Andhra Pradesh Government
- The Andhra Pradesh Government has a plan to improve the use of technology for growth, which began during Chandrababu Naidu’s time as Chief Minister (1999-2004).
|
304. The term Information Technology can be defined as
(a) Computers + Connectivity
(b) Computers + Network
(c) Hardware + Software
(d) Connectivity + Hardware
[Jharkhand P.C.S. (Pre) 2016]
Ans. (d) Connectivity + Hardware
- Information Technology is the use of computers and networks to get, store, protect, change, analyze, and design data.
|
305. In the context of wearable technology, which of the following tasks is/are accomplished by wearable devices?
1. Location identification of a person
2. Sleep monitoring of a person
3. Assisting the hearing-impaired person
Select the correct answer using the code given below :
(a) 1 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3
[I.A.S. (Pre) 2019]
Ans. (d) 1, 2 and 3
- Smartwatches and Fitbit devices can track where a person is by using GPS and also monitor their heart rate and sleep.
- There are also hearing aid devices that have been around longer than smartwatches and are used to help people who have hearing difficulties.
|
306. When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day’s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator to make breakfast, it recognizes the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers, and AC machines get switched off automatically. On your way to the office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly.
In the context of emerging communication technologies, which one of the following terms best applies to the above scenario?
(a) Border Gateway Protocol
(b) Internet of Things
(c) Internet Protocol
(d) Virtual Private Network
[I.A.S. (Pre) 2018]
Ans. (b) Internet of Things
- The Internet of Things (IoT) is an important new development that has an impact on technology, society, and the economy.
- It involves connecting everyday objects, such as devices, home appliances, cars, trucks, industrial and utility components, and others, with electronics, software, sensors, and the internet.
- This allows them to communicate with each other and be monitored and controlled from a distance.
|
307. Vidya Vahini Project lays emphasis on which of the following?
(a) Computer Education
(b) Value Education
(c) Environmental Education
(d) Skill Development
[U.P. Lower Sub. (Mains) 2013]
Ans. (a) Computer Education
- The Vidya Vahini project is about bringing computer classes to public elementary schools throughout India.
|