ICT Questions
ICT Questions
ICT Questions
Pandey
Q.1 Which layer is used to link the network support layers and user support
layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
Ans: (c)
Explanation: Physical, data link and network layers are network support layers
and session, presentation and application layers are user support layers. The
transport layer links these layers by segmenting and rearranging the data. It uses
protocols like TCP and UDP.
Q.2 Decryption and encryption are the features of
a) Transport layer
b) Presentation layer
c) Network Layer
d) Session layer
Ans: (b)
Explanation:- Encryption and decryption are carried out by the presentation
layer to secure data over the network. It ensures that only the communicating
devices are able to understand pertinent data.
Q.3 The_________ layer uses data compression yo reduce the number of bits to
be transmitted.
a). Presentation
b). Network
c). Data link
d). Application
Ans: (a)
Explanation:- The presentation layer has the responsibility of encrypting and
decrypting sensitive data before it is transferred via common channels. It is
responsible for data compression, which is used to minimize the actual number
of bits that must be transmitted on the network media to the receiver.
Q 4. In the context of Internet programming, what does CGI stand for ?
a). Crappy Graphics Interface
b). Computer Generated Images
c). Common Gateway Interface
d). Calculated Graphical Integration
Ans:- (c)
Q 5. Common gateway interface is used to
a). generate executable files from web content by web server
b). generate web pages
c). stream videos
d). none of the mentioned
Ans:- (a)
Explanation:-
The Common Gateway Interface (CGI) is a standard that facilitates
communication between web servers and external databases or information
sources. It acts as middleware, allowing web servers to interact with
applications that process data and send back responses. The CGI standard was
defined by the World Wide Web Consortium (W3C) and specifies how a
program interacts with a Hyper Text Transfer Protocol server.
Q.6 What is one of the primary functions of internet security software in
relation to your computer's protection?
(a) Ensures you never download any Internet Files
(b) Remove all Viruses and Trojans from your system
(c) Blocks your access to the Internet
(d)Enhances your computer's protection against online threats.
Ans:- (d)
Explanation-Internet security software primarily enhances your computer's
protection against online threats, including viruses, trojans, and other malware.
It does not prevent internet file downloads, block internet access, or guarantee
the complete removal of all threats.
Q.7 Consider the following:
1. Aarogya Setu
2. CoWIN
3. DigiLocker
4. DIKSHA
Which of the above are built on top of open-source digital platforms?
(a) 1 and 2 only
(b) 2, 3 and 4 only
(c) 1, 3 and 4 only
(d) 1, 2, 3 and 4
Ans:- (d)
Explanation:-
On 2nd April 2020, India launched Aarogya Setu mobile App for helping
augment the efforts of limiting the spread of COVID19, with an objective of
enabling Bluetooth based contact tracing, mapping of likely hotspots and
dissemination of relevant information about COVID19. Aarogya Setu is an
Open Source, Digital Platform developed by the National Informatics Centre
under the Ministry of Electronics and Information Technology (MeITy)
CoWIN is an Indian government web portal for COVID-19 vaccination
registration, owned and operated by India's Ministry of Health and Family
Welfare. It displays booking slots of COVID-19 vaccine available in the nearby
areas and can be booked on the website. Co-WIN, was developed by using open
source software. This type of software allows users to modify the source code
and distribute it.
DigiLocker uses the following tools, APIs & services for providing its
document sharing & verification capability. ownCloud is free, open source
software that provides universal access to your files through a web interface.
User accounts and document uploading in DigiLocker is based on ownCloud.
DigiLocker is a digitization service provided by the Ministry of Electronics and
Information Technology under its Digital India initiative. DigiLocker allows
access to digital versions of various documents including driver's licenses,
vehicle registration certificates and academic mark sheets etc.
DIKSHA stands for Digital Infrastructure for Knowledge Sharing. It is a
National digital Platform for Teachers. It is an initiative of the National Council
of Educational Research and Training (NCERT) under the aegis of the Ministry
of Education. DIKSHA is built on open source technology, Sunbird, which is
Made in India and Made for India. It incorporates internet-scale technologies
and enables several use-cases and solutions for teaching and learning.
Q.8 Which of the following is not an input device?
(a) Microphone
(b) Keyboard
(c) Joystick
(d) Monitor
Ans: (d)
Explanation:- Monitor is an Output Device
Q.9 Which of the following is an open source software?
(a) MS Word
(b) Windows
(c) Mozilla Firefox
(d) Acrobat Reader
Ans: (c)
Explanation:-
Open source software is software with source code that anyone can inspect,
modify, and enhance. Source code is the part of software that most computer
users don’t ever see; it’s the code computer programmers manipulate to control
how a program or application behaves. Programmers who have access to source
code can change a program by adding to it, changing it, or fixing parts of it that
aren’t working properly. OSS typically includes a license that allows
programmers to modify the software to best fit their needs and control how the
software can be distributed.
Q.10 The statement “the study, design, development, implementation, support or
management of computer-based information systems, particularly software
applications and computer Hardware” refers to
(a) Information Technology (IT)
(b) Information and Collaborative Technology (ICT)
(c) Information and Data Technology (IDT)
(d) Artificial Intelligence (AI)
Ans: (a)
Explanation:- Information technology (IT) is "the study, design, development,
implementation, support or management of computer-based information
systems, particularly software applications and computer hardware." IT deals
with the use of electronic computers and computer software to convert, store,
protect, process, transmit, and securely retrieve information.
Q.11 An unsolicited e-mail message sent to many recipients at once is a
(a) Worm
(b) Virus
(c) Threat
(d) Spam
Ans: (d)
Explanation:- Spamming is the use of messaging systems to send multiple
unsolicited messages to large numbers of recipients for the purpose of
commercial advertising, for the purpose of non-commercial proselytizing, for
any prohibited purpose, or simply repeatedly sending the same message to the
same user.
Q.12 _________ is a type of memory circuitry that holds the computer’s start-
up routine.
(a) RIM (Read Initial Memory)
(b) RAM (Random Access Memory)
(c) ROM (Read Only Memory)
(d) Cache Memory
Ans: (c)
Explanation:- ROM is a type of memory circuitry that holds the computer's
startup routine. The ROM BIOS tells the computer how to access the hard disk,
find the operating system, and load it into RAM.
Q.13 An ASCII is a character-encoding scheme that is employed by personal
computers in order to represent various characters, numbers and control keys
that the computer user selects on the keyboard. ASCII is an acronym for
(a) American Standard Code for Information Interchange
(b) American Standard Code for Intelligent Information
(c) American Standard Code for Information Integrity
(d) American Standard Code for Isolated Information
Ans: (a)
Q.14 Read the following two statements:
I: Information and Communication Technology (ICT) is considered a subset of
Information Technology (IT).
II: The ‘right to use’ a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
(a) Both I and II
(b) Neither I nor II
(c) II only
(d) I only
Ans: (b)
Explanation:- IT is considered to be a subset of information and
communications technology (ICT).
The proper term for “right to use a software” is not 'copyright' but 'license'.
Q.15 Which of the following correctly lists computer memory types from
highest to lowest speed?
(a) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
(b) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
(c) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
(d) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Ans: (c)
Q.16 What is the full form of USB as used in computer related activities?
(a) Ultra Security Block
(b) Universal Security Block
(c) Universal Serial Bus
(d) United Serial Bus
Ans: (c)
Explanation:-
Universal Serial Bus (USB) is an industry standard that allows data exchange
and delivery of power between many various types of electronics.
Q.17 With reference to Web 3.0, consider the following statements:
1. Web 3.0 technology enables people to control their own data.
2. In Web 3.0 world, there can blockchain based social networks.
3. Web 3.0 is operated by users collectively rather than a corporation.
Which of the statements given above are correct?
(a) 1 and 2 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (d)
Explanation:- Web 3.0, or Web3, is a set of values and technical applications
that define a new era of the World Wide Web. Prime Web 3.0 examples include
ubiquity, decentralization, artificial intelligence, blockchain, and connectivity.It
is also used for cryptocurrency transactions.
Statement 1 is correct: Presently, only centralized repositories are the ones that
own user data and profit from it. In Web 3.0, users can own and be properly
compensated for their time and data. In Web 3.0 people will control their
own data .
Statement 2 is correct: Web 3.0 will be permissionless and democratic. For
example Twitter will not be able to censor posts and Facebook will not be able
to maintain a database of billions of users that can be potentially used to
influence elections. Thus people can maintain blockchain based social
networks in Web 3.0.
Statement 3 is correct: Web3 will mean that sharing photos, communicating
with friends and buying things online will no longer by synonymous with Big
Tech companies but be done through a multitude of small competing services on
the blockchain. It means that all the value that’s created can be shared amongst
more people, rather than just the owners, investors and employees. Thus it
is operated by users collectively rather than corporation.
Q.18 With reference to "Software as a Service (SaaS)", consider the following
statements:
1. SaaS buyers can customise the user interface and can change data fields.
2. SaaS users can access their data through their mobile devices.
3. Outlook, Hotmail and Yahoo! Mail are forms of SaaS.
Which of the statements given above are correct?
(a) 1 and 2 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (d)
Explanation:-
Software-as-a-Service (SaaS) is a software licensing model. It allows access to
software on a subscription basis using external servers.
Statement 1 is correct: Today’s web-based software is flexible enough to be
modified for specific business uses but also individual users. Buyers
can customize the user interface (UI) to change the look and feel of the
program, as well as modify specific areas, such as data fields, to alter what
data appears. Several business process features can also be turned off and on at
will.
Statement 2 is correct: SaaS allows each user to access programs via the
Internet. The user need not install the software on his/her computer. Thus
users can access data through their mobile devices. SaaS allows users to
access the software through a web browser from multiple locations. He or she
can have remote desktop software and can work from home
Statement 3 is correct: Outlook, Hotmail or Yahoo! Mail are forms of
SaaS. With these services, a user log into their account over the Internet, often
from a web browser. The email software is located on the service provider’s
network and your messages are stored there as well. You can access your email
and stored messages from a web browser on any computer or Internet-
connected device
Q.19 Which one of the following is the context in which the term "qubit" is
mentioned?
(a) Cloud Services
(b) Quantum Computing
(c) Visible Light Communication Technologies
(d) Wireless Communication Technologies
Ans:- (b)
Explanation:-
A qubit (or quantum bit) is the quantum mechanical analogue of a classical
bit. In classical computing the information is encoded in bits, where each bit
can have the value zero or one.
Just like a binary bit is the basic unit of information in classical (or traditional)
computing, a qubit (or quantum bit) is the basic unit of information in quantum
computing.
In quantum computing the information is encoded in qubits. A qubit is a
two-level quantum system where the two basis qubit states are usually written
as 0 and 1. A qubit can be in state 0 or 1 or (unlike a classical bit) in a linear
combination of both states. The name of this phenomenon is superposition.
Q. 20. Consider the following communication technologies:
1. Closed-circuit Television
2. Radio Frequency Identification
3. Wireless Local Area Network
Which of the above are considered Short-Range devices/technologies?
(a) 1 and 2 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (d)
Explanation:-
Short Range Devices (SRD) are radio devices that offer a low risk of
interference with other radio services, usually because their transmitted power,
and hence their range, is low. The definition ‘Short Range Device’ may be
applied to many different types of wireless equipment, including various forms
of:
Access control (including door and gate openers)
Alarms and movement detectors
Closed-circuit television (CCTV)
Cordless audio devices, including wireless microphones
Industrial control
Local Area Networks
Medical implants
Metering devices
Remote control
Radio frequency identification (RFID)
Road Transport Telematics
Q. 21 With regard to computer memory, which of the following statement(s)
is/are TRUE?
P: Read Only Memory (ROM) is ‘volatile’ memory.
Q: Random Access Memory (RAM) is ‘volatile’ memory.
R: Secondary Memory is ‘volatile’ memory.
(a) P only
(b) Q only
(c) P and Q only
(d) P and R only
Ans:- (b)
Explanation:- Volatile memory refers to a computer storage that temporarily
holds data being used or processed. volatile memory requires a continuous
power supply to maintain its stored information whereas Non-volatile memory,
which retains data even when power is lost.
Cache memory and RAM are types of Volatile memory. Non-volatile memory,
on the other hand, is static. It remains in a computer even after a user switches it
off. HDD and ROM are types of non-volatile memory.
Q.22 If a major solar storm (solar flare) reaches the Earth, which of the
following are the possible effects on the Earth?
1. GPS and navigation systems could fail.
2. Tsunamis could occur at equatorial regions.
3. Power grids could be damaged.
4. Intense auroras could occur over much of the Earth.
5. Forest fires could take place over much of the planet.
6. Orbits of the satellites could be disturbed.
7. Shortwave radio communication of the aircraft flying over polar regions
could be interrupted.
Select the correct answer using the code given below:
(a) 1, 2, 4 and 5 only
(b) 2, 3, 5, 6 and 7 only
(c) 1, 3, 4, 6 and 7 only
(d) 1, 2, 3, 4, 5, 6 and 7
Ans:- (c)
Explanation:-
Solar flares are intense bursts of radiation from the sun that can directly
influence electronics on Earth. They are often associated with coronal mass
ejections (CMEs), which are large clouds of gas that erupt from the sun’s
interior into its atmosphere.
The large solar flare is projected to strike satellites in the Earth’s upper
atmosphere. Thus it affects GPS navigation, mobile phone transmissions, and
satellite TV. The flares might potentially disrupt power grids and electrical
networks in various regions of the planet.
Solar flares can temporarily alter the upper atmosphere creating disruptions. But
it does not cause Tsunamis. It only affects the upper atmosphere.
The high-energy particles emitted by the flare could also cause certain atoms
in the Earth’s atmosphere to glow, leading to auroras in Central Europe as
well as North America. The phenomenon could only be seen if the weather is
clear.
There is no causal link between the coronal mass ejections (CMEs) and the
deadly forest fires. There is a common misconception that solar storms are
associated with extreme geological and atmospheric effects on Earth. The sun
cannot produce solar flares or CMEs that physically burn the landscape, if it
did, I doubt complex life would have had much of a chance at evolving over the
last few billion years if our planet was constantly being sterilized.
The scientists found that solar flares and storms heated and expanded the
atmosphere and that these effects could extend to the satellites’ orbits. The
density of atmospheric gases increases, slowing the satellites and causing them
to lose altitude by a few kilometres per day.
Solar flares allow interference with the short wave radios that are being used,
emitting more rays allowing people to get more of a sun burn during this time
frame.
Q.23 With reference to street-lighting, how do sodium lamps differ from LED
lamps?
1. Sodium lamps produce light in 360 degrees but it is not so in the case of LED
lamps.
2. As street lights, sodium lamps have longer life span than LED lamps.
3. The spectrum of visible light from sodium lamps is almost monochromatic
while LED lamps offer significant colour advantages in street-lighting.
Select the correct answer using the code given below.
(a) 3 only
(b) 2 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (c)
Explanation:-
Statement 1 is correct. Sodium lamps produce light in 360 degrees but it is not
so in the case of LED lamps. LED lamps have 180-degree bulb angle to
preserve light efficiency and allow for target lighting over areas.
Statement 2 is incorrect. As street lights, sodium lamps have on an average
shorter lifespan than LED lamps. High Pressure Sodium lamps tend to have a
lifespan averaging 24,000 hours. Whereas, LED lamps lifespan ranges from
25,000 to 200,000 hours.
Statement 3 is correct. The spectrum of visible light from sodium lamps is
almost monochromatic as they are known for their warm yellow glow. On the
other hand, LED lamps offer significant colour advantages in street-lighting.
LEDs offer variety of colour options providing better lighting solutions than
High Pressure Sodium counterpart.
Q.24 With the present state of development, Artificial Intelligence can
effectively do which of the following?
1. Bring down electricity consumption in industrial units
2. Create meaningful short stories and songs
3. Disease diagnosis
4. Text-to-Speech Conversion
5. Wireless transmission of electrical energy
Select the correct answer using the code given below:
(a) 1, 2, 3 and 5 only
(b) 1, 3 and 4 only
(c) 2, 4 and 5 only
(d) 1, 2, 3, 4 and 5
Ans:- (d)
Explanation:-
Artificial Intelligence (AI) refers to the simulation of human intelligence
in machines that are programmed to think like humans and mimic their
actions.
Artificial Intelligence has various applications in today’s society. in
multiple industries, such as Healthcare, entertainment, finance, education,
etc.
AI has been used in disease diagnosis, creating songs like ‘I am AI’ and
‘Daddy’s Car’ and creating short stories and fictions. AI has been used in
Text -to -speech conversion, e.g. Cerewave AI.
Artificial Intelligence has also found use in power industry, e.g. Machine
-learning assisted power transfer (based on AI) using magnetic resonance
and AI used for energy efficiency.
Q.25 With reference to Visible Light Communication (VLC) technology, which
of the following statements are correct?
1. VLC uses electromagnetic spectrum wavelengths 375 to 780 nm.
2. VLC is known as long-range optical wireless communication.
3. VLC can transmit large amounts of data faster than Bluetooth.
4. VLC has no electromagnetic interference.
Select the correct answer using the code given below:
(a) 1, 2 and 3 only
(b) 1, 2 and 4 only
(c) 1, 3 and 4 only
(d) 2, 3 and 4 only
Ans:- (c)
Explanation:-
Visible light communication (VLC) is a wireless method that enables high-
speed transmission of data with visible light. This data is transmitted by
modulating the intensity of light given off by a LEDs. The signal is received by
a photodiode device that transforms the data into forms that are readable and
readily-consumed by end users.
Statement 1 is correct. Its biggest advantage is the size of the entire visible
light spectrum, 380 to 700 nanometres.
Statement 2 is incorrect. The nature of light is that it is unable to pass through
opaque surfaces, therefore it is a short-range transmission.
Statement 3 is correct. Transmission speed is VLC’s another advantage as light
travels 186,000 miles per second, which is way faster than the 344 meters per
second travelled by radio waves in air. A larger bandwidth and faster
speed allow it to transmit large amounts of data at much higher speed compared
to Bluetooth technology.
Statement 4 is correct. The Radio Frequency (RF) communication suffers from
interference while Visible Light Communication (VLC) has high bandwidth and
is immune to interference from electromagnetic sources.
Q.26 With reference to “Blockchain Technology”, consider the following
statements:
1. It is a public ledger that everyone can inspect, but which no single user
controls.
2. The structure and design of blockchain is such that all the data in it are about
cryptocurrency only.
3. Applications that depend on basic features of blockchain can be developed
without anybody’s permission.
Which of the statements given above is/are correct?
(a) 1 only
(b) 1 and 2 only
(c) 2 only
(d) 1 and 3 only
Ans:- (d)
Explanation:- It is a public ledger that everyone can inspect, but which no
single user controls - This statement is correct. Blockchain is a decentralized,
distributed ledger technology that allows for secure, transparent, and tamper-
proof record-keeping of transactions.
The structure and design of blockchain is such that all the data in it are about
cryptocurrency only - This statement is incorrect. Although blockchain
technology was initially developed for use in cryptocurrency, it has now found
applications in various fields beyond cryptocurrency.
Applications that depend on basic features of blockchain can be developed
without anybody’s permission - This statement is correct. Since blockchain is a
decentralized technology, applications can be built on top of it without requiring
permission from any central authority.
Q.27 Atal Innovation Mission is set up under the
(a) Department of Science and Technology
(b) Ministry of Labour and Employment
(c) NITI Aayog
(d) Ministry of Skill Development and Entrepreneurship
Ans:- (c)
Explanation:- Atal Innovation Mission (AIM) is Government of India’s
flagship initiative to create and promote a culture of innovation and
entrepreneurship across the length and breadth of our country. AIM’s objective
is to develop new programmes and policies for fostering innovation in different
sectors of the economy, provide platforms and collaboration opportunities for
different stakeholders, and create an umbrella structure to oversee the
innovation & entrepreneurship ecosystem of the country.
Q.28 With reference to communication technologies, what is/are the
difference/differences between LTE (Long-Term Evolution) and VoLTE (Voice
over Long-Term Evolution)?
1. LTE is commonly marketed as 3G and VoLTE is commonly marketed as
advanced 3G.
2. LTE is data-only technology and VoLTE is voice-only technology.
Select the correct answer using the code given below.
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
Ans:- (d)
Explanation:- LTE stands for Long Term Evolution. It is a model for high-
speed data communication systems, also called 4G. This means you can utilize
internet service at the 4G speed. It has the capacity to provide a download speed
of 100 Mbps and an uploading speed of 50 Mbps.
VoLTE stands for Voice over Long Term Evolution. Like LTE, it also holds 4G
networks, and you can enjoy the high-speed internet service with it. Even with
VoLTE, you can enjoy voice calling with data service.
Q.29 In the context of digital technologies for entertainment, consider the
following statements:
1. In Augmented Reality (AR), a simulated environment is created and the
physical world is completely shut out.
2. In Virtual Reality (VR), images generated from a computer are projected onto
real-life objects or surroundings.
3. AR allows individuals to be present in the world and improves the experience
using the camera of smart-phone or PC.
4. VR closes the world, and transposes an individual, providing complete
immersion experience.
Which of the statements given above is/are correct?
(a) 1 and 2 only
(b) 3 and 4
(c) 1, 2 and 3
(d) 4 only
Ans:- (b)
Explanation:- Augmented reality is an interactive experience that enhances the
real world with computer-generated perceptual information. Using software,
apps, and hardware such as AR glasses, augmented reality overlays digital
content onto real-life environments and objects.
Virtual reality is a simulated 3D environment that enables users to explore and
interact with a virtual surrounding in a way that approximates reality, as it is
perceived through the users' senses. The environment is created with computer
hardware and software, although users might also need to wear devices such as
helmets or goggles to interact with the environment.
Q.30 Consider the following statements:
A digital signature is
1. an electronic record that identifies the certifying authority issuing it
2. used to serve as a proof of identity of an individual to access information
or server on Internet
3. an electronic method of signing an electronic document and ensuring that
the original content is unchanged
Which of the statements given above is/are correct?
(a) 1 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3
Ans:- (d)
Explanation:-
A digital signature is a mathematical technique used to validate the authenticity
and integrity of a message, software or digital document. It’s the digital
equivalent of a handwritten signature or stamped seal, but it offers far more
inherent security. A digital signature is intended to solve the problem of
tampering and impersonation in digital communications.
Digital signatures can provide evidence of origin, identity and status of
electronic documents, transactions or digital messages. Signers can also use
them to acknowledge informed consent.
Q.31 In the context of wearable technology, which of the following tasks is/are
accomplished by wearable devices?
1. Location identification of a person
2. Sleep monitoring of a person
3. Assisting the hearing impaired person
Select the correct answer using the code given below:
(a) 1 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3
Ans:- (d)
Explanation:-
Wearable technology, wearables, fashion technology, tech togs, or fashion
electronics are smart electronic devices (electronic device with micro-
controllers) that are worn close to and/or on the surface of the skin, where they
detect, analyse, and transmit information concerning e.g. body signals such as
vital signs, and/or ambient data and which allow in some cases immediate
biofeedback to the wearer.
Wearable devices such as activity trackers are an example of the Internet of
Things, since "things" such as electronics, software, sensors, and connectivity
are effectors that enable objects to exchange data (including data quality
through the internet with a manufacturer, operator, and/or other connected
devices, without requiring human intervention.
Wearable technology has a variety of applications which grows as the field itself
expands. It appears prominently in consumer electronics with the popularization
of the smartwatch and activity tracker. Apart from commercial uses, wearable
technology is being incorporated into navigation systems, advanced textiles, and
healthcare.
Q.32 "3D printing" has applications in which of the following?
1. Preparation of confectionery items
2. Manufacture of bionic ears
3. Automotive industry
4. Reconstructive surgeries
5. Data processing technologies
Select the correct answer using the code given below.
(a) 1, 3 and 4 only
(b) 2, 3 and 5 only
(c) 1 and 4 only
(d) 1, 2, 3, 4 and 5
Ans:- (d)
Explanation:-
Additive manufacturing or 3D printing uses computer-aided designing to make
prototypes or working models of objects by laying down successive layers of
materials such as plastic, resin, thermoplastic, metal, fibre or ceramic. With the
help of software, the model to be printed is first developed by the computer,
which then gives instructions to the 3D printer.
Some of its Applications
Aerospace and Defence: Manufacture and repair spare parts of aircraft and
weapons.
Automotive and Electronics parts: Creation of complex geometries and
lightweight structures, 3D printing spare parts like engines, interior and exterior
parts of luxury vehicles, turbine blades etc.
Construction and Manufacturing purposes.
Consumer Goods like food items, wearables, jewellery, sportswear etc.
Healthcare: 3D printing is used for the creation of patient-specific replicas of
bones, organs, and blood vessels, dental prosthetics, surgical planning,
regenerative medicine and organ transplantation.
Preparation of Confectionary Items
Q.33 With reference to the Indian Regional Navigation Satellite System
(IRNSS), consider the following statements:
1. IRNSS has three satellites in geostationary and four satellites in
geosynchronous orbits.
2. IRNSS covers entire India and about 5500 sq. km beyond its borders.
Which of the statements given above is/are correct?
(a) 1 only
(b) 1 and 2 only
(c) 2 only
(d) None
Ans:- (a)
Explanation:-
The Indian Regional Navigation Satellite System (or NavIC) is an autonomous
regional satellite navigation system developed by ISRO. It provides accurate
real-time positioning and timing services. It covers India and a region extending
1,500 km around it.
Q.34 When the alarm of your smartphone rings in the morning, you wake up
and tap it to stop the alarm which causes your geyser to be switched on
automatically. The smart mirror in your bathroom shows the day's weather and
also indicates the level of water in your overhead tank. After you take some
groceries from your refrigerator for making breakfast, it recognises the shortage
of stock in it and places an order for the supply of fresh grocery items. When
you step out of your house and lock the door, all lights, fans, geysers and AC
machines get switched off automatically. On your way to office, your car warns
you about traffic congestion ahead and suggests an alternative route, and if you
are late for a meeting, it sends a message to your office accordingly.
In the context of emerging communication technologies, which one of the
following terms best applies to the above scenario?
(a) Border Gateway Protocol
(b) Internet of Things
(c) Internet Protocol
(d) Virtual Private Network
Ans:- (b)
Explanation:-
The Internet of Things (IoT) describes the network of physical objects—
“things”—that are embedded with sensors, software, and other technologies for
the purpose of connecting and exchanging data with other devices and systems
over the internet.
Q.35 In which of the following areas can GPS technology be used?
1. Mobile phone operations
2. Banking operations
3. Controlling the power grids
Select the correct answer using the code given below:
(a) 1 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (d)
Other Uses: Cell towers use it to route your phone calls, ATMs and cash
registers use it for your transactions, electrical grids use it to send power to your
house, and stock exchanges use it to regulate the trades that go into your stock
portfolio or investment fund.
Q.36 Consider the following actions:
1. Detection of car crash/collision which results in the deployment of airbags
almost instantaneously.
2. Detection of accidental free fall of a laptop towards the ground which results
in the immediate turning off of the hard drive
3. Detection of the tit of smartphone which results in the rotation of display
between portrait and landscape mode
In how many of the above action is the function of accelerometer required?
(a) Only one
(b) Only two
(c) All three
(d) None
Ans:- (c)
Explanation:
An accelerometer is an electronic sensor that measures the acceleration forces
acting on an object, in order to determine the object’s position in space and
monitor the object’s movement.
●In the case of a car crash/collision, the accelerometer is used to detect the
sudden deceleration of the vehicle and trigger the deployment of the airbags.
So, point 1 is correct.
●In the case of a laptop falling, the accelerometer is used to detect the
sudden change in motion and trigger the immediate turning off of the hard
drive to prevent damage to the data. So, point 2 is correct.
●An accelerometer is also required for the detection of the tilt of the
smartphone which results in the rotation of the display between portrait and
landscape mode. So, point 3 is correct.
Q.37 Which one of the following countries has its own Satellite Navigation
System?
a) Australia
b) Canada
c) Israel
d) Japan
Ans:- (d)
Explanation:- Japan is the country that has its own satellite navigation system.
The system is called the Quasi-Zenith Satellite System (QZSS) and it is
designed to augment the existing GPS system, providing more accurate and
reliable positioning and timing information within Japan and surrounding
regions.
Q.38 'Project Loon', sometimes seen in the news, is related to
(a) waste management technology
(b) wireless communication technology
(c) solar power production technology
(d) water conservation technology
Ans:- (b)
Explanation:- Project Loon is a wireless communication technology that aims
to tap the Earth’s stratosphere to provide internet connectivity to the remote
parts of the world. The project involves helium-filled balloons that remain in the
stratosphere and create aerial wireless networks. The project has collaborated
with several countries and their technology partners to provide internet
connectivity.
Q.39 With reference to ‘LiFi’, recently in the news, which of the following
statement(s) is/are correct?
1. It uses light as the medium for high speed data transmission.
2. It is a wireless technology and several times faster than ‘WiFi’.
Select the correct answer using the code given below.
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
Ans:- (c)
Explanation:-
LiFi is a mobile wireless communications technology that uses light rather than
radio frequencies to transmit data. LiFi is fully networked, and mobile. The
experience of using LiFi is similar to WiFi but offers a range of advantages.
Similar to other wireless communications technologies, LiFi can be used in a
variety of applications such as internet access, phone-2-phone or phone-to-TV
communications or in emerging use cases such as extended or mixed reality.
Q.40 With reference to ‘Bitcoins’, sometimes seen in the news, which of the
following statement(s) is/are correct?
1. Bitcoins are tracked by the Central Banks of the countries.
2. Anyone with a Bitcoin address can send and receive Bitcoins from anyone
else with a Bitcoin address.
3. Online payments can be sent without either side knowing the identity of the
other.
Select the correct answer using the codes given below.
(a) 1 and 2 only
(b) 2 and 3 only
(c) 3 only
(d) 1, 2 and 3
Ans:- (b)
Explanation:-
Bitcoins are tracked by the Central Banks of the countries - This
statement is incorrect. Bitcoins are not tracked by central banks as they
are decentralized and operate on a peer-to-peer network. Bitcoin
transactions are recorded on a public ledger called the blockchain, which
is maintained by a network of computers around the world.
Anyone with a Bitcoin address can send and receive Bitcoins from
anyone else with a Bitcoin address - This statement is correct. Bitcoin is a
digital currency that allows for peer-to-peer transactions without the need
for a middleman such as a bank. To send or receive Bitcoin, all you need
is a Bitcoin address, which is a string of letters and numbers that
functions like an email address.
Online payments can be sent without either side knowing the identity of
the other - This statement is also correct. Bitcoin transactions are
pseudonymous, meaning that while transactions are recorded on the
blockchain, the identities of the individuals involved are not directly
linked to their Bitcoin addresses. However, it is important to note that
Bitcoin transactions are not completely anonymous, as it is possible to
trace transactions through blockchain analysis and other methods.
Q.41 With reference to ‘Near Field Communication (NFC) Technology’, which
of the following is/are correct?
1. It is a contactless communication technology that uses electromagnetic radio
fields.
2. NFC is designed for use by devices which can be at a distance of even a
metre from each other.
3. NFC can use encryption when sending sensitive information.
Select the correct answer using the codes given below.
(a) 1 and 2 only
(b) 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (c)
Explanation:- NFC stands for Near Field Communication (NFC) is a set of
short-range wireless technologies, typically requiring a distance of 4 cm or less
to initiate a connection. It enables short range communication between
compatible devices. At least one transmitting device and another receiving
device is needed to transmit the signal.
Like other wireless signals Bluetooth and WiFi, NFC works on the principle of
sending information over radio waves. Near Field Communication is another
standard for wireless data transition which means devices must adhere to
certain specifications in order to communicate with each other properly. The
technology used in NFC is based on older technology which is the RFID
(Radio-frequency identification) that used electromagnetic induction in order
to transmit information.
Q.42 What is the difference between a CFL and an LED lamp?
1. To produce light, a CFL uses mercury vapour and phosphor while an LED
lamp uses semi-conductor material.
2. The average life span of a CFL is much longer than that of an LED lamp.
3. A CFL is less energy-efficient as compared to an LED lamp.
Which of the statement(s) given above is/are correct?
(a) 1 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
Ans:- (c)
Explanation:-LED stands for Light Emitting Diode. The LED bulb has a P-N
junction diode which produces light when an electric current passes through it.
In LED bulb, when forward bias is applied to the PN junction, the
recombination of charge carriers takes place. The result of this recombination of
charge carriers is the emission of light and heat.
CFL stands for Compact Fluorescent Lamp. The CFL lamps emits light by the
ionization of mercury vapours. In CFL, the ionized low pressure mercury
vapours produce UV rays, these UV rays collide with the phosphor coating and
hence visible light is produced by the lamp.
Average Lifespan of LED is More and It is More energy efficient than CFL
Q.43 What is the difference between Bluetooth and Wi-Fi devices?
(a) Bluetooth uses 2.4 GHz radio frequency band, whereas Wi-Fi can use 2.4
GHz or 5 GHz frequency band
(b) Bluetooth is used for Wireless Local Area Networks (WLAN) only, whereas
Wi-Fi is used for Wireless Wide Area Networks (WWAN) only
(c) When information is transmitted between two devices using Bluetooth
technology, the devices have to be in the line of sight of each other, but when
Wi-Fi technology is used the devices need not be in the line of sight of each
other
(d) The statement (a) and (b) given above are correct in this context
Ans:- (a)
Explanation:-