0% found this document useful (0 votes)
8 views75 pages

MPPSC Unit 9 Revision Booklet-English

The document is a test on basic computer knowledge, covering various topics such as networking, programming languages, and computer hardware. It includes questions and answers about concepts like ISDN, control units, data encryption, and the OSI model. The test also addresses practical applications in software like Excel and JavaScript, as well as security measures like firewalls and passwords.

Uploaded by

akm.jsn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views75 pages

MPPSC Unit 9 Revision Booklet-English

The document is a test on basic computer knowledge, covering various topics such as networking, programming languages, and computer hardware. It includes questions and answers about concepts like ISDN, control units, data encryption, and the OSI model. The test also addresses practical applications in software like Excel and JavaScript, as well as security measures like firewalls and passwords.

Uploaded by

akm.jsn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

©Civil Services Club Bhopal-7747068666 Page 1

Test-61
Basic Knowledge of Computer

1. The acronym ISDN stands for _______.


Ans. Integrated Services Digital Network
Explanation. Integrated Services Digital Network, is a set of communication
standards developed in the 1980s. It aimed to revolutionize how people used their
phone lines by offering a digital upgrade over traditional analog systems.
2. The _______ is an important circuitry in a computer system that directs the
operation of the processor.
Ans. Control Unit
Explanation.The control unit (CU) is a component of a computer's central
processing unit (CPU) that directs the operation of the processor. It tells the
computer's memory, arithmetic/logic unit, and input and output devices how to
respond to a program's instructions.
3. A network switch is a device responsible for _______.
Ans. Connecting network devices
Explanation.A network switch is a computer networking device that connects
devices together on a computer network, using packet switching to receive, process,
and forward data to the destination device.
4. A device used to connect a central processor and peripherals that uses
multiplexing is known as a _______.
Ans. Multiplexer
Explanation.In electronics, a multiplexer (or mux) is a device that selects one of
several analog or digital input signals and forwards the selected input into a single
line. A multiplexer of 2n inputs has n select lines, which are used to select which
input line to send to the output.
5. Second-generation computers were made of _______.
Ans. Transistors
Explanation.Transistors replaced vacuum tubes and ushered in the
secondgeneration of computers. The transistor was far superior to the vacuumtube,
allowing computers to become smaller, faster, cheaper, more energy-efficient and
more reliable than their first-generation predecessors.
6. What is the primary component of third-generation computers?
Ans. Integrated circuits
Explanation.The third generation of computers, which spanned from 1965 to 1971,
used integrated circuits (ICs) instead of transistors. An IC contains many transistors,
resistors, and capacitors along with the associated circuitry.

©Civil Services Club Bhopal-7747068666 Page 2


7. Which programming language uses both a compiler and an interpreter in
its compilation process?
Ans. Java
Explanation.Java uses a two-step compilation process. The source code is first
converted into bytecode by a compiler. This bytecode is not machine code. For
execution, the Java Virtual Machine (JVM) uses an interpreter to convert these
bytecodes into machine language.
8. What is the term for the act of a hacker altering or forging information in
an electronic resource?
Ans. Data diddling
Explanation.Data diddling, also known as false data entry, occurs when someone
with access to information changes this information before it is entered into a
computer.
9. What is the role of a firewall in a computer network?
Ans. Prevent unauthorized access
Explanation.Firewalls are often used to prevent unauthorized Internet users from
accessing private networks connected to the Internet, especially intranets.
10. What type of lock uses a keypad to control access to areas?
Ans. Cipher
Explanation.A cipher lock includes a keypad that can be used to control access into
areas. The term “cipher” refers to the method of transforming text to make it secure
and unreadable to others who do not have the key to decode it.
11. What is the file extension used to denote a backup copy of a file?
Ans. BAK
Explanation.The ‘.BAK’ extension is commonly used to signify a backup copy of a
file. This naming scheme allows for the retrieval of the original contents of the file.
12. How can you rename an Excel worksheet?
Ans. Double click at the worksheet tab and type a new name
Explanation.To rename a worksheet in Excel, you can double-click on the worksheet
tab and type the new name.
13. Which scripting language is designed to receive values from web users?
Ans. JavaScript
Explanation. JavaScript is a client-side scripting language commonly used to
interact with web users. When a user requests an HTML page with JavaScript, the
script is sent to the browser for execution.
14. What is the term for the process of scrambling code to prevent
unauthorized access?

©Civil Services Club Bhopal-7747068666 Page 3


Ans. Encryption
Explanation.The process of converting information or data into a code to prevent
unauthorized access is known as encryption.
15. Which scripting language, similar to HTML, runs only on a browser?
Ans. JavaScript
Explanation.JavaScript is a high-level, dynamic, untyped, and interpreted
programming language that runs in a browser. It has been standardized in the ECMA
Script language specification.
16. What is the mode of data transmission where all stations in the network
may transmit or receive but at different times?
Ans. Half duplex
Explanation. Half-duplex data transmission allows data to be transmitted in both
directions on a signal carrier, but not at the same time.
17. What does DHTML stand for?
Ans. Dynamic hypertext markup language
Explanation.Dynamic HTML (DHTML) is a collection of technologies used together
to create interactive and animated websites. It combines a static markup language
(like HTML), a client-side scripting language (like JavaScript), a presentation
definition language (like CSS), and the Document Object Model (DOM).
18. Which ports connect special types of music instruments to sound cards?
Ans. MIDI
Explanation.A MIDI (Musical Instrument Digital Interface) interface is a device that
provides MIDI In/Out to and from a computer or MIDI-equipped hardware via
standard 5-pin MIDI jacks.
19. What happens when you press CTRL + 9 in Excel?
Ans. Hides the current row
Explanation.In Excel, pressing CTRL + 9 hides the current row.
20. What is the term for coded entries used to gain access to a computer
system?
Ans. Passwords
Explanation. A password is a word or string of characters used for user
authentication to prove identity or access approval to gain access to a resource.
21. Which protocol is used by the Ping utility?
Ans.ICMP
Explanation.Ping operates by sending Internet Control Message Protocol (ICMP)
echo request packets to the target host and waiting for an ICMP echo reply.

©Civil Services Club Bhopal-7747068666 Page 4


22. What type of circuits do fourth-generation PCs contain?
Ans. VLSI

Explanation. Computers of the fourth generation (1971-1980) used Very Large


Scale Integrated (VLSI) circuits.
23. Who is the inventor of the C++ programming language?
Ans. Bjarne Stroustrup

©Civil Services Club Bhopal-7747068666 Page 5


Explanation.C++ is a general-purpose programming language created by Danish
computer scientist Bjarne Stroustrup as an extension of the C programming
language, or “C with Classes”.
24. What type of processing is used when a large mail-order company
accumulates orders and processes them together in one large set?
Ans. Batch
Explanation.A batch file is a kind of script file in DOS, OS/2, and Windows. It
consists of a series of commands to be executed by the command-line interpreter,
stored in a plain text file.
25. What is the Windows utility program that locates and eliminates
unnecessary fragments and rearranges files and unused disk space to
optimize operations?
Ans. Disk Defragmenter
Explanation.Disk Defragmenter is a utility in Microsoft Windows designed to
increase access speed by rearranging files stored on a disk to occupy contiguous
storage locations, a technique called defragmentation.
26. What is the primary purpose of a password in a computer system?
Ans. Protection
Explanation.A password provides protection by containing a code that must be
entered to gain access to the system.
27. What is the function of the Autocorrect feature in Word?
Ans. Correction
Explanation. The Autocorrect feature in Word is used for automatically detecting
and correcting typos, misspelled words, and incorrect capitalization.
28. What is another name for White Box testing?
Ans. Glass box testing
Explanation.White Box testing, which deals with the internal logic and structure of
the code, is also known as glass box, open box, or clear box testing.
29. Which technology is used to store data in several disk units by breaking
them into similar pieces?
Ans. RAID
Explanation.Redundant Array of Independent Disks (RAID) is a technology that
provides increased storage functions and reliability through redundancy. This is
achieved by combining multiple disk drive components into a logical unit, where
data is distributed across the drives in one of several ways called “RAID levels”.
30. What is another name for a pre-programmed formula in Excel?
Ans. Function

©Civil Services Club Bhopal-7747068666 Page 6


Explanation.Functions in Excel are basically pre-programmed, easy-to-use tools
that can be called as part of a formula.
31. What does Bandwidth refer to in a Network?
Ans. Transmission capacity
Explanation. Bandwidth refers to the amount of information that can be
transmitted over a network in a given amount of time, usually expressed in bits per
second.
32. What does ‘SAP’ stand for in Open Systems Interconnection (OSI)
networking?
Ans. Service Access Point
Explanation.SAP is one of the largest vendors of enterprise resource planning (ERP)
software and related enterprise applications. The company’s ERP system enables its
customers to run their business processes, including accounting, sales, production,
human resources, and finance, in an integrated environment.
33. What allows you to access your e-mail from anywhere?
Ans. Webmail interface
Explanation.Webmail (or web-based email) is any email client implemented as a
web application running on a web server. Examples of webmail providers are AOL
Mail, Gmail, Outlook.com, and Yahoo!
34. What is the full form of VoIP?
Ans. Voice over Internet Protocol
Explanation.Voice over Internet Protocol (Voice over IP, VoIP) is a methodology and
group of technologies for the delivery of voice communications and multimedia
sessions over Internet Protocol (IP) networks, such as the Internet.
35. Which feature of Outlook is used to allow someone else to schedule your
meetings and appointments?
Ans. Delegate Access
Explanation.Delegate Access is most commonly used between a manager and his or
her assistant, where the assistant (delegate) is responsible for processing the
manager’s incoming meeting requests or e-mail messages and coordinating the
manager’s schedule.
36. Which type of software is designed to operate and control the computer
hardware and to provide a platform for running application software?
Ans. System software
Explanation.System software is computer software designed to operate and control
the computer hardware and to provide a platform for running application software.
It can be separated into two different categories, operating systems and utility
software.

©Civil Services Club Bhopal-7747068666 Page 7


37. What does LSI stand for in the context of computer technology?
Ans. Large Scale Integration
Explanation.Large-scale integration (LSI) is the process of integrating or embedding
thousands of transistors on a single silicon semiconductor microchip. LSI technology
was conceived in the mid-1970s when computer processor microchips were under
development.
38. What is the full form of OSI in terms of computers?
Ans. Open Systems Interconnection
Explanation.The Open Systems Interconnection model (OSI model) is a conceptual
model that characterizes and standardizes the communication functions of a
telecommunication or computing system without regard to their underlying internal
structure and technology.
39. In which layer of the OSI model does a Bridge operate?
Ans. Data link layer
Explanation.Bridges work at Layer 2 (Data Link) because they examine the MAC
address of the packet which they base decisions upon.
40. During which period did the third generation of computers exist?
Ans. 1965-1971
Explanation.The period of third generation was 1965-1971. The computers of third
generation used integrated circuits (IC’s) in place of transistors.
41. What does ‘Handshaking’ mean in the context of networking?
Ans. Connecting computers to a hub
Explanation.Handshaking is a networking process where two computers establish a
connection. Handshaking occurs when packets of data are exchanged between two
computers.
42. What unique address does every device on the internet have?
Ans. IP
Explanation.An Internet Protocol address (IP address) is a numerical label assigned
to each device (e.g., Computer, printer) participating in a Computer network that
uses the Internet Protocol for communication.
43. What is the process called that alters data so that it is not usable unless the
changes are undone?
Ans. Encryption
Explanation.Encryption is the process of encoding messages or information in such
a way that only authorized parties can read it. Encryption does not of itself prevent
interception, but denies the message content to the interceptor.
44. What technology succeeded Large-scale integration (LSI)?

©Civil Services Club Bhopal-7747068666 Page 8


Ans. Very Large-Scale Integration (VLSI)
Explanation.LSI is no longer in use. It was succeeded by very large-scale integration
(VLSI) and ultra large-scale integration (ULSI) technologies.
45. What is the principal function of an IP address?
Ans. Identification and location addressing
Explanation.An IP address serves two principal functions: host or network interface
identification and location addressing. Its role has been characterized as follows: “A
name indicates what we seek. An address indicates where it is.”
46. What is identified by the cell in the upper-left corner and the cell in the
lower-right corner, separated by a colon in Excel?
Ans. Range
Explanation.In Excel, a range is identified by the cell in the upper-left corner and
the cell in the lower-right corner, separated by a colon. The range is treated as a
single unit, you can make the same change, or combination of changes to more than
one cell at a time.
47. What is the term for a symbol or question on the screen that prompts you
to take action and tells the computer what to do next?
Ans. Prompt and dialog box
Explanation.The graphical control element dialog box (also called dialogue box or
just dialog) is a small window that communicates information to the user and
prompts them for a response. Dialog boxes are classified as “modal” or “modeless”,
depending on whether they block interaction with the software that initiated the
dialog.
48. Which generation of computers used microprocessors as switching
devices?
Ans. Fourth Generation
Explanation.The first microprocessor called Intel 4004 was developed by American
Intel Corporation in 1971. Microprocessors are used in the computers of fourth
generation computers. Personal microcomputers were possible due to the
microprocessors.
49. Who is known as the father of the Java programming language?
Ans. James Gosling
Explanation. James Arthur Gosling is a Canadian computer scientist best known as
the father of the Java programming language.
50. What is the main goal of fence protection?
Ans. Memory protection

©Civil Services Club Bhopal-7747068666 Page 9


Explanation.The main goal of fence protection is to prevent a user program from
destroying any of the operating system code that is resident in the main memory. In
order to achieve protection a hardware register called the fence register is used.
51. What does the acronym ERP stand for?
Ans. Enterprise Resource Planning
Explanation. ERP is an acronym for ‘Enterprise Resource Planning’. Enterprise
resource planning (ERP) is business management software typically a suite of
integrated applications that a company can use to collect, store, manage and
interpret data from many business activities.
52. What is the function of the system that translates internet domain and host
names to IP addresses?
Ans.DNS
Explanation.The Domain Name System (DNS) is used to translate Internet domain
and host names to IP addresses. It uses a distributed database to store the
combination of name and address information.
53. Why is FTP considered superior to HTTP?
Ans. It uses separate channels for data transmission and flow control
Explanation. FTP is better than HTTP as it has built-in flow control. The control
channel and data channels are independent of each other, using two separate TCP
connections.
54. Which device utilizes a handheld operating system?
Ans. PDA
Explanation.A personal digital assistant (PDA), also known as a handheld PC, is a
mobile device that functions as a personal information manager and uses a handheld
operating system.
55. What is located at the bottom of the Excel Window?
Ans. Sheet tabs
Explanation.Every Excel file is capable of having multiple worksheets and after
opening an Excel file, you will see multiple sheet tabs at the left bottom side.
56. What is an effective way to prevent signal attenuation?
Ans. Adding repeaters or amplifiers to a circuit
Explanation.Attenuation refers to any reduction in the strength of a signal.
Attenuation can be prevented by adding amplifiers or repeaters at approximately
spaced points.
57. What is the term for a diagrammatic or symbolic representation of an
algorithm?
Ans. Flowchart

©Civil Services Club Bhopal-7747068666 Page 10


Explanation.A flowchart is a type of diagram that represents an algorithm,
workflow, or process, showing the steps as boxes of various kinds, and their order by
connecting them with arrows.
58. What is the full form of UNIVAC, a first-generation computer?
Ans. Universal Automatic Computer
Explanation.UNIVAC (Universal Automatic Computer) is the name of a line of
electronic digital stored-program computers starting with the products of the
Eckert-Mauchly Computer Corporation.
59. What is the style sheet language used for describing the presentation of a
document written in a markup language?
Ans. Cascading Style Sheets
Explanation.Cascading Style Sheets (CSS) is a style sheet language used for
describing the presentation of a document written in a mark-up language.
60. What is the term for when a word automatically moves onto the next line in
word processing?
Ans. Word wrap
Explanation. In word processing, word wrap is a feature that automatically moves a
word that is too long to fit on a line to the next line.
61. What protocol is used to transfer files back and forth between a file server
and workstation?
Ans. FTP
Explanation. FTP is a two-way system as files are transferred back and forth
between the file server and workstation. Whereas HTTP is a one-way system as files
are transported only from the web server onto the workstation’s browser.
62. What is the technique used to convert an analog signal into a digital bit
stream?
Ans. Pulse code modulation
Explanation. Pulse code modulation is a technique in which the amplitude of an
analogue signal is converted to a binary value represented as a series of pulses.
63. Who is the inventor of the programming language Ruby?
Ans. Yukihiro Matsumoto
Explanation. Ruby, a dynamic, reflective, object-oriented, general-purpose
programming language, was designed and developed in the mid-1990s by Yukihiro
“Matz” Matsumoto in Japan.
64. What is the base of the hexadecimal number system?
Ans. 16

©Civil Services Club Bhopal-7747068666 Page 11


Explanation.The hexadecimal numeral system (hex) is a numeral system made up of
16 symbols (base 16). It uses the decimal numbers and includes six extra symbols.
65. What is a buffer in the context of data storage?
Ans. Where data are temporarily stored
Explanation.A data buffer is a region of a physical memory storage used to
temporarily store data while it is being moved from one place to another.
66. What is a collection of conceptual tools for describing data, relationships,
semantics, and constraints referred to as?
Ans. Data Model
Explanation.A data model organizes data elements and standardizes how the data
elements relate to one another. It represents reality as data elements document real-
life people, places, and things and the events between them.
67. What is a set of step-by-step procedures for accomplishing a task known
as?
Ans. Algorithm
Explanation.An algorithm is an effective method that can be expressed within a
finite amount of space and time and in a well-defined formal language for calculating
a function.
68. What is the operating system that is self-contained in a device and resident
in the ROM called?
Ans. Embedded Operating System
Explanation. The operating system that is self-contained in a device and resident in
the ROM is an Embedded Operating System. It is a specialized OS for use in the
computers built into larger systems.
69. What is the main thing a user has to know to send another station a
message?
Ans. The other station’s address
Explanation.To send a message to any other station, the user must know the other
station’s address.
70. What is the term for a system where data is temporarily stored while being
moved from one place to another?
Ans. Buffer
Explanation.A buffer is a device or storage area where data is temporarily stored
while it is being moved from one place to another.
71. What is the term for a specialized operating system used in computers built
into larger systems?
Ans. Operating System

©Civil Services Club Bhopal-7747068666 Page 12


Explanation.An embedded operating system is a specialized OS for use in
computers built into larger systems. It is self-contained in a device and resident in
the ROM.

72. What is the language used to write the code for a Web page?
Ans. Hypertext Markup Language
Explanation.HTML (Hypertext Markup Language) is the set of markup symbols
inserted in a file intended for display on a World Wide Web browser page. The

©Civil Services Club Bhopal-7747068666 Page 13


markup tells the Web browser how to display a Web page’s words and images for the
user.
73. What is the term for restarting the system when it is already powered on?
Ans. Warm boot
Explanation.Warm boot refers to the boot process in which a system regains its
initial state without hampering the power source. It means you’re initiating a reset
command by pressing the Ctrl, Alt and Delete key combination simultaneously. You
can also perform a warm boot by clicking on the “Restart” button on the Start menu.
74. Which generation is Artificial Intelligence associated with?
Ans. Fifth
Explanation. This fifth generation is based on parallel processing hardware and
Artificial Intelligence software. AI is an emerging branch in computer science, which
interprets means and method of making computers think like human beings.
75. What is the property of Universal Serial Bus (USB)?
Ans. Cross-platform technology
Explanation.USB is a cross-platform technology that is supported by most of the
major operating systems. USB (Universal Serial Bus) is the most popular connection
used to connect a computer to devices such as digital cameras, printers, scanners,
and external hard drives.
76. What is the most important/powerful computer in a typical network?
Ans. Network server
Explanation.Network servers have many functions and can form an important part
of your computer network.
77. Whodefined the term ‘computer virus’?
Ans. Frederick Cohen
Explanation.Frederick B. Cohen is an American computer scientist and best known
as the inventor of computer virus defense techniques. He gave the definition of
“computer virus”.
78. What are the Fifth generation computing devices based on?
Ans. Artificial intelligence
Explanation.Fifth generation computing devices, based on artificial intelligence, are
still in development, though there are some applications, such as voice recognition,
that are being used today. The use of parallel processing and superconductors is
helping to make artificial intelligence a reality.
79. What are websites used for building network with friends and relatives
called?
Ans. Social Networking

©Civil Services Club Bhopal-7747068666 Page 14


Explanation.A social networking service is an online platform that is used by people
to build social networks or social relations with others.
80. What type of computer protocol is Telnet?
Ans. Text
Explanation.Telnet is a session layer protocol used on the Internet or local area
networks to provide a bidirectional interactive text-oriented communication facility
using a virtual terminal connection.
81. What process does the computer perform when it is switched on?
Ans. Power OnSelf Test
Explanation.When your computer first starts, it will start counting its memory in
the top left corner of the screen. You may see the keyboard lights flash and hear the
hard drives spin. Then your computer will beep. This process is called the POST:
power on self test.
82. What type of software is distributed free but requires the users to pay some
amount for further use?
Ans. Shareware
Explanation.Shareware is commercial software that is distributed free to users,
eventually either requiring or encouraging users to pay for the continued support of
the software.
83. What is the package called which helps create, manipulate and analyse data
arranged in rows and columns?
Ans. Spreadsheet package
Explanation.A spreadsheet is an interactive computer application program for
organization, analysis and storage of data in tabular form. Spreadsheets developed
as computerized simulations of paper accounting worksheets.
84. What virtual server has the Indian Railways launched to optimise server
usage and faster connectivity?
Ans. RailCloud
Explanation. The Indian Railways has launched a virtual server ‘RailCloud’ to
optimise server usage and faster connectivity. RailCloud technology is developed by
rail PSU RailTel.
85. What is a method of implementing a memory management system?
Ans. Buddy system
Explanation.The buddy system is a procedure in which two people, the “buddies”,
operate together as a single unit so that they are able to monitor and help each other.
86. What is the use of Bridge in Network?
Ans. To connect LANs

©Civil Services Club Bhopal-7747068666 Page 15


Explanation.A Bridge is the device that connects two local-area networks (LANs) or
two segments of the same LAN that use the same protocol, such as Ethernet or
Token-Ring.
87. What happens if a memory chip is volatile?
Ans. Lose its contents if power is turned off
Explanation.Random-access memory (RAM) is normally associated with volatile
types of memory, where the stored information is lost if power is removed.
88. Which of the following computer languages is a mathematically oriented
language for scientific problems?
Ans. FORTRAN
Explanation.Fortran is a general-purpose, imperative programming language that is
especially suited to numeric computation and scientific computing.
89. What is the full form of RTF?
Ans. Rich Text Format
Explanation.RTF is a text file format used by Microsoft products, such as Word and
Office. RTF files support text style formatting, as well as images within the text. RTF
files can be converted into a different format by changing the formatting selection
when saving the word document.
90. What type of computer is designed for an individual user and includes a
personal storage unit, input & output unit, and a Central Processing Unit?
Ans. PC/Personal Computer
Explanation.Personal Computers (PCs) are single-user computer systems designed
for individual use, featuring components like storage, input, and output units, along
with a Central Processing Unit (CPU).
91. What is the term for malicious software?
Ans. Malware
Explanation.Malicious software (malware) is any software that gives partial to full
control of your computer to do whatever the malware creator wants. Malware can be
a virus, worm, trojan, adware, spyware, rootkit, etc.
92. What does CAD stand for?
Ans. Computer aided design
Explanation. Computer-aided design (CAD) is the use of computer systems to aid in
the creation, modification, analysis, or optimization of a design.
93. What are compilers and translators a form of?
Ans. Computer Programs
Explanation.Compilers and translators are one form of Computer Programs.
Compilers are computer programs that translate a high-level programming language

©Civil Services Club Bhopal-7747068666 Page 16


to a low-level programming language. A translator is a computer program that
performs the translation of a program written in a given programming language into
a functionally equivalent program in a different computer language, without losing
the functional or logical structure of the original code.
94. What is often delivered to a PC through an email attachment and is often
designed to do harm?
Ans. Viruses
95. What type of software is used in the design of products, structures, civil
engineering drawings, and maps?
Ans. CAD programs
Explanation. Computer-aided design (CAD) is the use of computer systems to assist
in the creation, modification, analysis, or optimization of a design. CAD software is
used to increase the productivity of the designer, improve the quality of design,
improve communications through documentation, and to create a database for
manufacturing.
96. What is a register that keeps track of the next instruction to be executed
called?
Ans. Program Counter
Explanation.The Program counter is an incrementing counter that keeps track of
the memory address of the instruction that is to be executed next.
97. What is a primary key in a relational database?
Ans. Unique key
Explanation.A primary key is a key in a relational database that is unique for each
record.
98. Who is the creator of the PHP language?
Ans. Rasmus Lerdorf
Explanation.PHP was originally created by Rasmus Lerdorf in 1994. PHP is a server-
side scripting language designed primarily for web development but is also used as a
general-purpose programming language.
99. What is a power-saving state designed primarily for laptops that saves your
open documents and programs to your hard disk and turns off your
computer?
Ans. Hibernate
Explanation. Hibernation is a power-saving state designed primarily for laptops.
While sleep puts your work and settings in memory and draws a small amount of
power, hibernation puts your open documents and programs on your hard disk and
then turns off your computer.
100. What does API typically stand for in the context of software
development?

©Civil Services Club Bhopal-7747068666 Page 17


Ans. Application Program Interface
Explanation.API stands for Application Program Interface, a set of rules and
protocols that allows different software applications to communicate with each
other.

Test-62
Electronics, Information and Communication
Technology

1. What is the origin of the term ‘electronics’?


Ans. Electrons
Explanation. The term ‘electronics’ is derived from the word ‘electrons’. It is a
branch of Physics that deals with the theory and use of devices in which the
electrons travel through a vacuum, gas, or a semiconductor medium.
2. What fields does electronics influence?
Ans. Physics
Explanation. Electronics is a branch of Physics that deals with the theory and use of
devices where electrons travel through different mediums under the influence of
applied electric and/or magnetic fields.
3. What are the two main classifications of electronics?
Ans. Physical Electronics and Electronics Engineering
Explanation.Electronics is broadly classified into two categories - Physical
Electronics and Electronics Engineering. Physical Electronics helps to understand
the motion of electrons in mediums like vacuum, gas, or semiconductor. Electronics
Engineering concentrates on the design, fabrication, and application of electronic
devices.
4. What does Physical Electronics study?
Ans. Electron motion
Explanation.Physical Electronics helps to understand the motion of electrons in
mediums like vacuum, gas, or semiconductor.
5. What is the focus of Electronics Engineering?
Ans. Electronic devices
Explanation.Electronics Engineering concentrates on the design, fabrication, and
application of electronic devices.
6. How has the field of electronics evolved over time?

©Civil Services Club Bhopal-7747068666 Page 18


Ans. Miniaturization
Explanation.Electronics have developed rapidly from large circuits to small and
powerful integrated circuits, a process often referred to as miniaturization.
7. What influences the motion of electrons in electronic devices?
Ans. Electric and magnetic fields
Explanation.The motion of electrons in electronic devices takes place under the
influence of applied electric and/or magnetic fields.
8. In what mediums can electrons travel in electronic devices?
Ans. Vacuum, gas, semiconductor
Explanation. In electronic devices, electrons can travel through a vacuum, gas, or a
semiconductor medium.
9. What has been the impact of the evolution of electronics on circuit size?
Ans. Reduction
Explanation.The evolution and development of electronics have led to a significant
reduction in circuit size, transitioning from large circuits to small and powerful
integrated circuits.
10. Who discovered the flow of electrons from one metal to another through a
vacuum?
Ans. Edison
Explanation. In 1883, the great Physicist Thomas Alva Edison found that electrons
flow from one metal to another through a vacuum. This theory was known as the
Edison Effect and it deals with conductors.
11. What is the Edison Effect?
Ans. Electron flow
Explanation.The Edison Effect is the theory that electrons flow from one metal to
another through a vacuum. It was discovered by Thomas Alva Edison in 1883.
12. Who invented the diode and when?
Ans. Fleming, 1897
Explanation. John Fleming in 1897 applied the Edison Effect to invent a two-
element electron tube known as a diode.
13. What is a triode and who discovered it?
Ans. De Forest
Explanation.The device used for amplification and transmission of electrical energy,
known as a triode, was discovered in the year 1906 by Lee de Forest. Triode is a
three-element tube that was developed using the Edison Effect.
14. Who developed the transistor and where?

©Civil Services Club Bhopal-7747068666 Page 19


Ans. Bell Laboratories

Explanation. In 1948, scientists Walter Brattain, John Bardeen, and William


Shockley developed a device known as a transistor at Bell Laboratories. This
invention was awarded the Nobel Prize.
15. Why were vacuum tubes replaced by metal transistors?
Ans. Efficiency

©Civil Services Club Bhopal-7747068666 Page 20


Explanation. Vacuum tubes were replaced by metal transistors since they offer
longer life, low cost, efficiency, are light in weight, have less power consumption, and
are smaller in size.
16. Who proposed the concept of an integrated circuit and when?
Ans. Dummer, 1952
Explanation.The concept of an integrated circuit was put forth in 1952 by Geoffrey
W. A. Dummer.
17. When did the full swing production of integrated circuits start?
Ans. 1960s
Explanation.Later in the 1960s, the full swing production of integrated circuits
started.
18. Name some devices that use integrated circuits.
Ans. Microcomputers
Explanation.Some of the devices that use integrated circuits are video cameras,
microcomputers, medical equipment, and communication satellites.
19. What is the main driving force behind the advancement of electronics?
Ans. Semiconductor industry
Explanation.The semiconductor industry continually produces ever-more
sophisticated electronic devices and circuits in response to global demand, driving
the advancement of electronics.
20. Name one of the active devices used in electronics to control and amplify
the flow of electric current.
Ans. Transistor
Explanation.Transistors are one of the active devices used in electronics to control
and amplify the flow of electric current.
21. What is used in the design of electronics?
Ans. Computer-aided design
Explanation.Computer-aided design is used in the design of electronics.
22. Who identified the electron in 1897?
Ans. Joseph John Thomson
Explanation.Thomson's discovery of the electron laid the foundation for the field of
electronics.
23. What was the first active electronic component that controlled current flow
by influencing the flow of individual electrons?
Ans. Vacuum tube

©Civil Services Club Bhopal-7747068666 Page 21


Explanation.Vacuum tubes enabled the construction of equipment for radio,
television, and telecommunications.
24. When was the first working point-contact transistor invented?
Ans. 1947
Explanation.The invention of the transistor marked a significant advancement in
electronics technology.
25. What was the first IBM product to use transistor circuits without any
vacuum tubes?
Ans. IBM 608
Explanation.The IBM 608 was a calculator that used more than 3,000 germanium
transistors.
26. Who ordered all future IBM products to use transistors in their design?
Ans. Thomas J. Watson Jr.
Explanation.Watson's decision to use transistors paved the way for their
widespread adoption in electronic devices.
27. Who invented the MOSFET (MOS transistor) in 1959?
Ans. Mohamed Atalla and Dawon Kahng
Explanation.The MOSFET revolutionized the electronics industry due to its high
scalability and affordability.
28. What problem did the invention of the integrated circuit solve?
Ans. Size and speed of circuits
Explanation.Integrated circuits made circuits smaller and faster by integrating all
components on a single semiconductor wafer.
29. What were the first two stages of integrated circuit development after
small-scale integration (SSI)?
Ans. Medium-scale integration (MSI) and very large-scale integration (VLSI)
Explanation.These stages led to the integration of more components on a single
chip, increasing complexity and functionality.
30. When did billion-transistor processors become commercially available?
Ans. 2008
Explanation.The development of billion-transistor processors marked a milestone
in integrated circuit technology.
31. Who invented the diode, which made the detection of small electrical
voltages practicable?
Ans. Ambrose Fleming

©Civil Services Club Bhopal-7747068666 Page 22


Explanation.Fleming's invention of the diode paved the way for the development of
electronic communication.
32. What was the first truly compact transistor that could be miniaturized and
mass-produced?
Ans. MOSFET (MOS transistor)
Explanation.The MOSFET revolutionized the electronics industry due to its
compactness and mass-production capabilities.
33. Who were the inventors of the first working point-contact transistor?
Ans. John Bardeen and Walter Houser Brattain
Explanation.Their invention of the transistor marked a significant advancement in
electronic technology.
34. What is the subfield of electronics that deals with the continuous range of
voltage or current?
Ans. Analog electronics
Explanation.Analog electronics use continuous signals to represent information.
35. Which subfield of electronics focuses on the study of electronic circuits for
audio applications?
Ans. Audio electronics
Explanation.Audio electronics involve the design and implementation of circuits for
audio processing and amplification.
36. What is the subfield of electronics that deals with discrete levels of voltage
or current?
Ans. Digital electronics
Explanation.Digital electronics use discrete signals to represent information.
37. Which subfield of electronics focuses on the integration of electronics into
other systems?
Ans. Embedded systems
Explanation.Embedded systems are specialized computing systems that are part of
a larger system.
38. What is the subfield of electronics that deals with the miniaturization of
electronic components?
Ans. Microelectronics
Explanation.Microelectronics involves the design and fabrication of very small
electronic components and circuits.
39. What is the subfield of electronics that focuses on the study of extremely
small electronic components?

©Civil Services Club Bhopal-7747068666 Page 23


Ans. Nanoelectronics
Explanation.Nanoelectronics involves the study and application of electronic
devices on the nanometer scale.
40. Which subfield of electronics deals with the control and conversion of
electric power?
Ans. Power electronics
Explanation.Power electronics involves the control and conversion of electric
power using electronic devices.
41. What is the term for electronic components that do not require a power
source to operate?
Ans. Passive components
Explanation.Passive components include resistors, capacitors, and inductors.
42. Which type of electronic component controls current flow at the electron
level?
Ans. Semiconductor devices
Explanation. Semiconductor devices include transistors and thyristors.
43. What is the term for a group of electronic components connected together
to perform a specific function?
Ans. Circuit
Explanation.Circuits can be simple or complex, depending on the function they are
designed to perform.
44. Which type of circuit is used to compare two voltage levels and produce a
digital output?
Ans. Comparator
Explanation.A comparator takes in a continuous range of voltage but only outputs
one of two levels as in a digital circuit.
45. What is the term for an electronic component that stores electrical energy?
Ans. Capacitor
Explanation.Capacitors store electrical energy and are commonly used in electronic
circuits.
46. Which type of circuit is used to amplify or switch electronic signals?
Ans. Amplifier
Explanation.Amplifiers are used to increase the amplitude of electronic signals.
47. What is the term for a semiconductor device that amplifies or switches
electronic signals?

©Civil Services Club Bhopal-7747068666 Page 24


Ans. Transistor
Explanation. Transistors are semiconductor devices that can amplify or switch
electronic signals.
48. What is the most common physical representation of Boolean algebra?
Ans. Digital circuits
Explanation.Digital circuits are the most common physical representation of
Boolean algebra, serving as the basis for all digital computers.
49. Which system do most digital circuits use, with two voltage levels labeled
"0" and "1"?
Ans. Binary system
Explanation. Most digital circuits use a binary system with two voltage levels
labeled "0" and "1".
50. What are the two voltage levels often labeled "Low" and "High" in digital
circuits?
Ans. "0" and "1"
Explanation. In digital circuits, the two voltage levels are often labeled "0" and "1",
with "0" as "Low" and "1" as "High".
51. What are some examples of digital circuits?
Ans. Adders, flip-flops, counters, registers, multiplexers, Schmitt triggers
Explanation.Examples of digital circuits include adders, flip-flops, counters,
registers, multiplexers, and Schmitt triggers.
52. What is the main purpose of thermal management in electronic devices?
Ans. Dissipation
Explanation.Heat generated by electronic circuitry must be dissipated to prevent
immediate failure and improve long term reliability. This is achieved by passive
conduction/convection using heat sinks, fans, and other cooling techniques.
53. Which method was often used in early electronics for connecting
components?
Ans. Point to point wiring
Explanation.Early electronics often used point to point wiring with components
attached to wooden breadboards to construct circuits.
54. Which region became the world's leading source of advanced
semiconductors by the 2020s?
Ans. Taiwan
Explanation.By the 2020s, Taiwan had become the world's leading source of
advanced semiconductors, followed by South Korea, the United States, Japan,
Singapore, and China.

©Civil Services Club Bhopal-7747068666 Page 25


55. What is the term for unwanted disturbances superposed on a useful signal?
Ans. Noise
Explanation. Noise is defined as unwanted disturbances superposed on a useful
signal that tend to obscure its information content.
56. What method of connecting components used components sandwiched
between two parallel circuit boards?
Ans. Cordwood construction
Explanation.Cordwood construction was a method used for connecting components
where they were sandwiched between two parallel circuit boards.
57. Which material is commonly used in semiconductor devices?
Ans. Silicon.
Explanation.Silicon is one of the most commonly used semiconductor materials in
the manufacturing of semiconductor devices.
58. What is the sign of charge carriers in a p-type semiconductor?
Ans. Positive.
Explanation. In a p-type semiconductor, the majority charge carriers are holes,
which have a positive charge.
59. What is the sign of charge carriers in an n-type semiconductor?
Ans. Negative.
Explanation.In an n-type semiconductor, the majority charge carriers are electrons,
which have a negative charge.
60. What is the purpose of a depletion region in a semiconductor diode?
Ans. Reserve current conduction.
Explanation.The depletion region in a semiconductor diode prevents current
conduction by the lack of mobile charge carriers.
61. What happens to the depletion region in a diode when it is forward biased?
Ans. Reduced.
Explanation.When a diode is forward biased, the depletion region is reduced,
allowing for significant conduction.
62. What is the term for a diode that takes advantage of light to increase
conductivity?
Ans. Photodiode.
Explanation. A photodiode is a diode that produces electron-hole pairs when
exposed to light, increasing conductivity.
63. What is the function of a compound semiconductor diode?

©Civil Services Club Bhopal-7747068666 Page 26


Ans. Generate light.
Explanation. Compound semiconductor diodes are used to generate light, such as
light-emitting diodes (LEDs) and laser diodes.
64. How are semiconductor devices different from vacuum tubes?
Ans. Solid-state conduction.
Explanation.Semiconductor devices use electronic conduction in the solid state,
while vacuum tubes use thermionic emission in a high vacuum.
65. What are the two main configurations of bipolar junction transistors?
Ans. p-n-p or n-p-n
Explanation.Bipolar junction transistors are formed by two p-n junctions, in either
p-n-p or n-p-n configuration.
66. What is the middle region between the junctions in a bipolar junction
transistor called?
Ans. Base
Explanation.The middle or base, the region between the junctions in a bipolar
junction transistor is typically very narrow.
67. What are the two main types of transistor configurations in digital circuits?
Ans. n-channel and p-channel
Explanation. Transistors in digital circuits can be n-channel (for electrons) or p-
channel (for holes) MOSFETs, depending on the type of carrier in the channel.
68. Which semiconductor material is difficult to form large-diameter bowls,
limiting wafer diameter sizes?
Ans. Gallium arsenide (GaAs)
Explanation. Gallium arsenide (GaAs) is difficult to form large-diameter bowls of,
limiting wafer diameter sizes significantly smaller than silicon wafers.
69. Why is germanium (Ge) less useful than silicon in semiconductor devices?
Ans. Thermal sensitivity
Explanation.Germanium is less useful than silicon in semiconductor devices due to
its thermal sensitivity.
70. What is the main function of a diode?
Ans. Rectification
Explanation. Diodes are used to convert alternating current (AC) to direct current
(DC) by allowing current to flow in only one direction.
71. What does the arrow in the diode symbol represent?
Ans. Direction of conventional current flow

©Civil Services Club Bhopal-7747068666 Page 27


Explanation.The arrow points in the direction of the flow of positive charge
carriers, indicating the forward bias direction.
72. Which type of diode produces light when a sufficient amount of current
passes through it?
Ans. Light Emitting Diode (LED)
Explanation.LEDs emit light when forward current passes through them, making
them useful for display and lighting purposes.
73. Which diode operates using the avalanche effect?
Ans. Avalanche diode
Explanation.Avalanche diodes operate in the reverse bias region and use the
avalanche effect for their operation.
74. What are the three main types of biasing in a diode?
Ans. Forward-biased, reverse-biased, and zero-biased
Explanation.These types of biasing determine how a diode conducts current under
different voltage conditions.
75. Which diode has a lower forward voltage than other silicon PN junction
diodes?
Ans. Schottky diode
Explanation. Schottky diodes have a lower forward voltage drop compared to
standard silicon PN junction diodes.
76. What is the main function of diodes in clamping circuits?
Ans. Voltage regulation
Explanation.Diodes in clamping circuits are used to regulate the voltage level of the
output signal.
77. What does IT stand for?
Ans. Information Technology
Explanation.IT refers to the use of computers to store, retrieve, transmit, and
manipulate data or information.
78. What is ICT?
Ans. Information and Communication Technology
Explanation.ICT is an extensional term for information technology (IT) that stresses
the role of unified communications and the integration of telecommunications,
computers, and necessary enterprise software.
79. Which generation of mobile technology is currently in use?
Ans. 5G

©Civil Services Club Bhopal-7747068666 Page 28


Explanation.Mobile technology has evolved from 1G to 5G, offering features like
portability, internet connectivity, and voice communication in one device.
80. What is the 'BASH' bug?
Ans. A bug in the UNIX operating system
Explanation. The bug can bypass security measures and allow attackers to gain
control over a computer system, making data vulnerable to theft.
81. What is the 'Heartbleed' bug?
Ans. A bug in OpenSSL
Explanation.The bug exposes secret keys, certificates, and other confidential
information, but does not allow attackers to take over the system.
82. What are QR codes used for?
Ans. Quick Response
Explanation.QR codes are 2-dimensional codes that can store more information
than traditional barcodes, and are used for various purposes including marketing
and information sharing.
83. What is the Semantic Web?
Ans. A standard developed by W3C
Explanation.The Semantic Web aims to make Internet data machine-readable by
using a common language like XML to define data on the web.
84. Which organization developed the standard for the Semantic Web?
Ans. World Wide Web Consortium (W3C)
Explanation.W3C developed the standard to define data on the web and make it
machine-readable.
85. What is the main goal of the Semantic Web?
Ans. To make Internet data machine-readable
Explanation.The Semantic Web aims to improve the exchange of information on the
web by making data machine-readable.
86. What is another name for Web 4.0?
Ans. Symbiotic web
Explanation.The symbiotic web is another name for Web 4.0. It dreams of an
interaction between people and robots in symbiosis.
87. What is the aim of Web 5.0?
Ans. Decentralization
Explanation.Web 5.0 is aimed at building an extra decentralized web that puts one
in control of one’s data and identity.

©Civil Services Club Bhopal-7747068666 Page 29


88. What does holography enable?
Ans. Three-dimensional images
Explanation.Holography refers to a technique that enables the creation of three-
dimensional images.
89. What is a DNA Supercomputer specialized in?
Ans. Genome sequencing
Explanation.A DNA Supercomputer is a supercomputer that is specialized in
genome sequencing.
90. What is the nature of communication in Wi-Fi Backscatter technology?
Ans. Half duplex
Explanation.Wi-Fi Backscatter technology differs from other wireless
communications since the communication is a half duplex in nature, i.e., both the
sender and receiver cannot transmit simultaneously.
91. What is the main objective of Ambient Intelligence (AmI)?
Ans. Broaden interaction between human beings and digital information
technology.
Explanation.Ambient Intelligence aims to create a seamless and intelligent
interaction between humans and the digital world by integrating electronic devices
into the environment to enhance user experience.
92. What is the technology used in Hawk-Eye to track the trajectory of the ball?
Ans. High-performance cameras.
Explanation. Hawk-Eye uses a system of high-performance cameras positioned
around the stadium to track the movement of the ball and create a three-
dimensional representation of its trajectory.
93. What is the advantage of Ferroelectric Liquid Crystal Display (FLCD) over
LCD?
Ans. Faster switching time.
Explanation.FLCDs have a faster switching time compared to LCDs, making them
more suitable for applications where fast response times are required.
94. What is the Neurobridge technology used for?
Ans. To bypass the spinal cord and produce movement based on a patient's
thoughts.
Explanation.Neurobridge technology uses a sleeve on the forearm to communicate
with a chip implanted in the brain, allowing patients to control movement through
their thoughts.
95. What is the primary application of Spintronics?
Ans. Quantum computing and neuromorphic computing.

©Civil Services Club Bhopal-7747068666 Page 30


Explanation.Spintronics is an emerging technology that exploits the spin of
electrons for computing, particularly in the fields of quantum computing and
neuromorphic computing.
96. What is RoboEarth?
Ans. A Cloud Robotics infrastructure.
Explanation.RoboEarth is a platform that allows robots to share knowledge and
access cloud services, creating a world wide web for robots.
97. What is the purpose of the 'Code Free for India' initiative?
Ans. To develop solutions using free software to address local and global
needs.
Explanation.The initiative aims to encourage the development of software tools and
applications to address local and global challenges using free software technology.
98. How does GIS help in city planning?
Ans. By providing a tool for analyzing spatial information efficiently.
Explanation.GIS allows city planners to overlay various types of information on a
single map, enabling them to analyze and plan city infrastructure more effectively.
99. What is the purpose of the E-Eye pilot project in India?
Ans. E-surveillance in National parks.
Explanation.The E-Eye project aims to use surveillance cameras with night vision
features to monitor and record movement in National parks, specifically to track
animal movement and prevent poaching.
100. How does Telemedicine facilitate interaction between patients and
doctors?
Ans. Through IT and telecommunication networks.
Explanation.Telemedicine uses IT and telecommunication networks to enable
patients and doctors to communicate and exchange information remotely.

Test-63
Robotics, Artificial Intelligence and Cyber Security

1. Who is known as the ‘Grandfather of Robotics’?


Ans. George Devol
Explanation.In 1954, George Devol known as the ‘Grandfather of Robotics’ was
awarded with the first industrial robotics patent.
2. What is the First Law of Robotics as conceptualised by Isaac Asimov?
Ans. Non-injury to humans.

©Civil Services Club Bhopal-7747068666 Page 31


Explanation. The First Law states that a robot may not injure a human being, or,
through inaction, allow a human being to come to harm.
3. What is the Second Law of Robotics as conceptualised by Isaac Asimov?
Ans. Obedience to humans
Explanation. The Second Law states that a robot must obey orders given to it by
human beings, except where such orders would conflict with the First Law.
4. What is the Third Law of Robotics as conceptualised by Isaac Asimov?
Ans. Self-preservation
Explanation.The Third Law states that a robot must protect its existence as long as
such protection does not conflict with the First or Second Law.
5. When was the first known industrial robot built?
Ans. 1937.
Explanation.The first known industrial robot dates back to 1937 when Griffith
Taylor built a crane-like device capable of automating the stacking of wooden blocks
from pre-programmed patterns.
6. What development in the 1930s paved the way for industrial robots?
Ans. Numerically Controlled machines.
Explanation. In the 1930s, the popularity of computers fueled the development of
Numerically Controlled (NC) machines, paving the way for industrial robots.
7. What type of robot navigates autonomously using sensors, cameras, or
laser systems, often employed in logistics for goods transportation in
dynamic environments?
Ans. Autonomous Mobile Robots (AMRs)
Explanation.AMRs navigate autonomously, using sensors, cameras, or laser systems,
and are often used in logistics for goods transportation in dynamic environments.
8. Which type of robot relies on tracks or predefined paths and frequently
requires operator supervision, commonly used in controlled environments
such as storage facilities and factory floors?
Ans. Automated Guided Vehicles (AGVs)
Explanation. AGVs rely on tracks or predefined paths and frequently require
operator supervision, commonly used in controlled environments such as storage
facilities and factory floors.
9. What are articulated robots, designed to perform functions similar to those
of a human arm, typically made up of two to ten rotary joints?
Ans. Robotic arms

©Civil Services Club Bhopal-7747068666 Page 32


Explanation.Articulated robots, also known as robotic arms, are designed to
perform functions similar to those of a human arm, typically made up of two to ten
rotary joints.
10. Which type of robot resembles human-like features and may mimic human
movements and actions, often used in research, entertainment, or as
companions for the elderly or individuals with disabilities?
Ans. Humanoid robots
Explanation.Humanoid robots resemble human-like features and may mimic
human movements and actions, often used in research, entertainment, or as
companions for the elderly or individuals with disabilities.
11. What are collaborative robotsintended to work alongside or directly with
humans, often used to eliminate manual, hazardous, or strenuous tasks
from daily workflows?
Ans. Cobots
Explanation.Collaborative robots, or Cobots, are intended to work alongside or
directly with humans, often used to eliminate manual, hazardous, or strenuous tasks
from daily workflows.
12. Which humanoid robot, considered the most famous and advanced, was
granted Saudi Arabian citizenship in 2017?
Ans. Sophia
Explanation.Sophia is considered the most famous and advanced humanoid robot,
granted Saudi Arabian citizenship in 2017.
13. What type of robot is specifically intended for the assembly of small
electronic devices, and is a popular cobot from leading robot manufacturer
ABB?
Ans. YuMi
Explanation.YuMi is a popular cobot from leading robot manufacturer ABB,
specifically intended for the assembly of small electronic devices.
14. Which type of robot is created by combining various types of robots to
perform more complex tasks?
Ans. Hybrids
Explanation.Hybrids are created by combining various types of robots to perform
more complex tasks.
15. What could be an example of a hybrid robot created by combining an AMR
with a robotic arm?
Ans. Package-handling robot in a warehouse
Explanation. An example of a hybrid robot created by combining an AMR with a
robotic arm could be a package-handling robot in a warehouse

©Civil Services Club Bhopal-7747068666 Page 33


16. What is the role of actuators in a robot?
Ans. Motion
Explanation.Actuators are like a robot’s muscles. They convert energy into motion,
moving the robot’s limbs, wheels, or other parts.
17. What type of energy do actuators typically use?
Ans. Electricity
Explanation.Actuators are typically powered by electricity, although some may also
use hydraulics or pneumatics.
18. What is the function of sensors in a robot?
Ans. Information
Explanation. Sensors act as the robot’s eyes and ears, providing information about
its surroundings.
19. What powers a robot?
Ans. Batteries
Explanation. Robots typically need a power source, like batteries or electricity, to
work.
20. What is the role of a controller in a robot?
Ans. Decision-making
Explanation.The controller acts as the robot’s brain, interpreting data from sensors,
making decisions, and controlling movements.
21. What is included in the programming of a robot?
Ans. Algorithms
Explanation.The programming of a robot includes algorithms, AI, and software for
decision-making, movement, and interactions.
22. What allows a robot to interact with its environment?
Ans. End effectors
Explanation.End effectors, such as grippers, welding arms, or sensors, allow the
robot to interact with its environment.
23. What is DAKSHA?
Ans. An automated mobile platform for multi-purpose payloads.
Explanation.DAKSHA is an automated mobile platform developed in India for
handling various tasks, including handling Improvised Explosive Devices (IEDs).
24. What is Vyommitra?
Ans. A spacefaring humanoid robot.

©Civil Services Club Bhopal-7747068666 Page 34


Explanation.Vyommitra is being developed by ISRO to function onboard the
Gaganyaan spacecraft, showcasing India's progress in space robotics.
25. What is MANAV?

Ans. India’s first 3D-printed humanoid robot.


Explanation.MANAV has inbuilt vision and sound processing capabilities, allowing it
to walk, talk, and dance in response to human commands.
26. What is the purpose of NASA's Curiosity rover?

©Civil Services Club Bhopal-7747068666 Page 35


Ans. To explore planetary surfaces.
Explanation.NASA's Curiosity rover explores Mars, collecting data and samples to
understand the planet's geology and past environment.
27. What cybersecurity risk are robots vulnerable to?
Ans. Cyber-attacks.
Explanation.Increased connectivity makes robots vulnerable to cyber-attacks,
which can compromise their functionality and safety.
28. What was India’s global rank in terms of annual industrial installations as
per the World Robotics Report, 2022?
Ans. 10
Explanation.According to the World Robotics Report, 2022, India was globally
ranked 10 in terms of annual industrial installations.
29. Which organization established the Artificial Intelligence and Robotics
Technology Park (ARTPARK)?
Ans. Government of India
Explanation.The Government of India established the Artificial Intelligence and
Robotics Technology Park (ARTPARK) under the National Mission on
Interdisciplinary Cyber-Physical Systems (NM-ICPS).
30. Which organization is working on the development of robotic platforms for
defence applications?
Ans. DRDO
Explanation. The Defence Research & Development Organisation (DRDO) is
working on the development of robotic platforms for defence applications.
31. What is the e-YANTRA program?
Ans. Robotics Outreach
Explanation. e-YANTRA is a Robotics outreach program funded by the Ministry of
Education to harness the talent of young engineers to solve problems in agriculture,
manufacturing, defence, etc.
32. What is the main focus of the Center for Advanced Manufacturing for
Robotics and Autonomous Systems (CAMRAS)?
Ans. Import Reduction
Explanation.CAMRAS has been established to reduce the import of robotics and
autonomous systems.
33. What is the history of the term "robotics"
Ans. Coined by Josef Coper and first used by Isaac Asimov in 1941.

©Civil Services Club Bhopal-7747068666 Page 36


Explanation. The term "robotics" was first used by Isaac Asimov in 1941, based on
the word "robot" coined by Josef Coper. Asimov also introduced the three laws of
robotics in his works.
34. What is an Internet bot?
Ans. A software application that runs automated tasks over the Internet.
Explanation. Internet bots are software applications that perform automated tasks
over the Internet, often performing simple and repetitive tasks at a much higher rate
than humans.
35. What is a chatterbot?
Ans. A program that can simulate talk with a human being.
Explanation.A chatterbot is a program designed to simulate conversation with
human users, often used for customer service or entertainment purposes.
36. What is a shopbot?
Ans. A program that shops around the Web on your behalf and locates the best
price for a product.
Explanation.A shopbot is a program that searches the internet for the best prices of
a product on behalf of the user.
37. What is the primary role of Daksh, a robot developed by DRDO?
Ans. Bomb recovery.
Explanation.Daksh is a battery-operated remote-controlled robot on wheels
primarily designed for bomb recovery.
38. Which branch of DRDO developed the Nishant UAV?
Ans. ADE (Aeronautical Development Establishment).
Explanation.Nishant is an Unmanned Aerial Vehicle (UAV) developed by India’s
ADE, a branch of DRDO, for the Indian Armed Forces.
39. What is the purpose of utility fog in nanorobotics?
Ans. To replicate a physical structure.
Explanation.Utility fog is a hypothetical collection of tiny robots that can replicate a
physical structure, and it is a possible application of nanorobotics.
40. What is Pawan, developed by ADE, classified as?
Ans. Unmanned aerial vehicle (UAV).
Explanation.Pawan is an unmanned aerial vehicle (UAV) developed by ADE for the
Indian Armed Forces.
41. Who are the present users of the Netra UAV?
Ans. CRPF and BSF.

©Civil Services Club Bhopal-7747068666 Page 37


Explanation.Netra is an Indian lightweight autonomous UAV jointly developed by
DRDO’s R&DE and IdeaForge, and it is currently used by CRPF and BSF for
surveillance and reconnaissance operations.
42. What is the primary task of AURA, an autonomous unmanned combat air
vehicle (UCAV) developed by DRDO?
Ans. Releasing missiles, bombs, and precision-guided munitions.
Explanation. AURA is being developed by DRDO for the Indian Air Force and Indian
Navy, and it will be capable of releasing missiles, bombs, and precision-guided
munitions.
43. What is the field of study that deals with the simulation of human
intelligence processes by machines?
Ans. Artificial Intelligence
Explanation.Artificial Intelligence (AI) deals with the simulation of human
intelligence processes by machines, especially computer systems.
44. Who originated the phrase “Artificial Intelligence”?
Ans. John McCarthy
Explanation.John McCarthy, an emeritus professor of computer science at Stanford,
originated the phrase “artificial intelligence.”
45. When was the phrase “Artificial Intelligence (AI)” first used?
Ans. 1956
Explanation. The phrase “Artificial Intelligence (AI)” was first used in 1956.
46. Which agency sponsored street mapping projects in the 1970s?
Ans. DARPA
Explanation.The Defense Advanced Research Programs Agency (DARPA) sponsored
street mapping projects in the 1970s.
47. When was Shakey, the first all-purpose mobile robot, created?
Ans. 1969
Explanation.Shakey, the first all-purpose mobile robot, was created in 1969 and was
capable of accomplishing tasks with a purpose rather than just following a set of
instructions.
48. In which year did Deep Blue, a supercomputer, defeat the world champion
chess player?
Ans. 1997
Explanation.Deep Blue, a supercomputer created by IBM, defeated the world
champion chess player in 1997, marking a significant milestone in AI development.
49. What was invented in 2002 that became the first commercially viable
robotic product?

©Civil Services Club Bhopal-7747068666 Page 38


Ans. Robotic vacuum cleaner
Explanation.The first commercially viable robotic vacuum cleaner was invented in
2002, revolutionizing household cleaning.
50. In 2020, what AI algorithm was made available by Baidu during the early
stages of the COVID-19 epidemic?
Ans. LinearFold
Explanation.Baidu made the LinearFold AI algorithm available to organizations
working on a vaccine for COVID-19. The algorithm can predict the virus's RNA
sequence quickly, aiding in vaccine development.
51. What is Deep Learning?
Ans. Neural Networks
Explanation.Deep Learning is a subset of Machine Learning that uses Neural
Networks to simulate human brain-like behavior for pattern recognition and data
analysis.
52. What is India's vision for AI?
Ans. Antyodaya
Explanation.India aims to become a global AI superpower by integrating ICT and AI
in all sectors, focusing on the development of underprivileged populations
53. What is the purpose of the AIRAWAT initiative?
Ans. AI Research
Explanation.AIRAWAT (AI research, analytics, and knowledge assimilation
platform) is a cloud platform for Big Data Analytics and Assimilation, aimed at
fostering the advancement of AI-based improvements in image identification, speech
recognition, and natural language processing for research and development.
54. Which organization created the AskDISHA bot?
Ans. IRCTC
Explanation.The Indian Railway Catering and Tourism Corporation (IRCTC) created
an Intelligent Virtual Assistant using AI and Natural Language Processing (NLP). The
AskDISHA bot is accessible on the IRCTC website and mobile app, providing
travelers with quick replies and information in a variety of languages via voice and
text.
55. With which company does the Ministry of Electronics and Information
Technology (MeitY) intend to establish a Quantum Computing Applications
Lab?
Ans.AWS
Explanation.The Ministry of Electronics and Information Technology (MeitY)
intends to establish a Quantum Computing Applications Lab in collaboration with
Amazon Web Services (AWS).

©Civil Services Club Bhopal-7747068666 Page 39


56. What is the focus of the CORE initiative?
Ans. AI Research
Explanation. COREs (Centres of Research Excellence in Artificial Intelligence) will
focus on core AI research and will be accountable for carrying out the IM-ICPS
framework’s duties to both ICON and CROSS.
57. What is the role of ICTAI?
Ans. AI Implementation
Explanation. ICTAI (International Centre for Transformational Artificial
Intelligence) will provide an environment for the development and implementation
of application-based technologies, as well as carry out the obligations of the IM-ICPS
framework.
58. What kind of platform is AIRAWAT?
Ans. Cloud
Explanation.AIRAWAT is a cloud platform for Big Data Analytics and Assimilation,
featuring a massive, power-optimized AI Computing infrastructure with powerful AI
processing.
59. What kind of assistant is AskDISHA?
Ans. Virtual
Explanation. AskDISHA is an Intelligent Virtual Assistant created by the Indian
Railway Catering and Tourism Corporation (IRCTC) using AI and Natural Language
Processing (NLP).
60. What are the duties of COREs?
Ans. IM-ICPS Framework
Explanation.COREs (Centres of Research Excellence in Artificial Intelligence) will be
accountable for carrying out the IM-ICPS framework’s duties to both ICON and
CROSS.
61. What kind of centre is ICTAI?
Ans. AI Transformation
Explanation.ICTAI (International Centre for Transformational Artificial Intelligence)
is a centre that provides an environment for the development and implementation of
application-based technologies.
62. What is the real-life use case example of Google Lens and OCR?
Ans. Visual detection
Explanation.Google Lens is an AI-based Google service that uses cutting-edge
technology for quick and precise visual detection. It recognizes objects and provides
detailed information about them in seconds.
63. What is the main goal of using AI in healthcare?

©Civil Services Club Bhopal-7747068666 Page 40


Ans. Predicting outcomes
Explanation.AI in healthcare aims to use machines to assess and act on medical
data, with the goal of predicting certain outcomes and improving diagnosis and
treatment recommendations.
64. Which company is known for developing the Roomba, a smart vacuum that
uses AI for cleaning?
Ans. iRobot
Explanation.iRobot is best known for developing the Roomba, a smart vacuum that
uses AI to scan room size, identify obstacles, remember efficient cleaning routes, and
determine the amount of vacuuming needed without human assistance.
65. What is the key feature of Hanson Robotics' humanoid robot Sophia?
Ans. Social learning
Explanation.Hanson Robotics is building humanoid robots with AI, including
Sophia, an advanced social-learning robot. Through AI, Sophia can efficiently
communicate using natural language and convey human-like emotions through facial
expressions.
66. What unique feature does Softbank Robotics' humanoid robot Pepper
possess?
Ans. Emotion recognition
Explanation.Softbank Robotics developed Pepper, a humanoid robot equipped with
an "emotion engine" capable of recognizing faces and basic human emotions. Pepper
can operate in multiple languages and has a touch screen for communication.
67. What is the primary function of Miso Robotics' Flippy 2 robot?
Ans. Kitchen automation
Explanation.Miso Robotics builds robotic kitchen assistants like Flippy 2, which
helps with kitchen automation for tasks like frying food. They also offer systems for
monitoring grilling and coffee brewing, as well as an autonomous drink dispenser.
68. Which company developed Siri, a digital assistant integrated into Apple
devices?
Ans. Apple
Explanation. Apple's Siri has been integrated into the company's operating systems
since 2011, providing users with a digital assistant for various tasks on Apple
devices.
69. What is a unique feature of Softbank Robotics' NAO robot?
Ans. Educational and research applications
Explanation.Softbank Robotics' NAO robot is a bipedal robot used in educational
and research settings, showcasing AI's role in advancing robotics for learning and
experimentation.

©Civil Services Club Bhopal-7747068666 Page 41


70. Which company's product has become a hub for smart homes, allowing
users to perform various tasks through voice commands?
Ans. Amazon
Explanation.Amazon's Alexa has gained popularity for its ability to control smart
home devices and perform tasks like shopping, scheduling, and searching the web
through voice commands.
71. Which car company is known for its self-driving features and predictive
capabilities, continually improving through over-the-air updates?
Ans. Tesla
Explanation.Tesla cars are known for their advanced features, including self-driving
capabilities and predictive technology, which are continually improved through
software updates.
72. Boxever is a company that uses machine learning to enhance the customer
experience in which industry?
Ans. Travel industry
Explanation.Boxever uses machine learning to improve the customer experience in
the travel industry by providing personalized recommendations and experiences.
73. Netflix uses highly accurate predictive technology to suggest films based on
what?
Ans. Customers' reactions to films
Explanation.Netflix analyzes customers' reactions to films to suggest movies they
might like, using highly accurate predictive technology.
74. Nest, acquired by Google, uses behavioral algorithms to predictively learn
from users' heating and cooling needs in what type of environment?
Ans. Home or office
Explanation.Nest's learning thermostat uses behavioral algorithms to predictively
learn from users' heating and cooling needs in their homes or offices, adjusting the
temperature accordingly.
75. What is the only form of AI currently on the market?
Ans. ANI
Explanation.Artificial Narrow Intelligence (ANI) is the only form of AI currently on
the market. It can solve a single problem and perform one task to satisfaction, such
as suggesting a related product for a shopper.
76. Which form of AI mimics human reasoning?
Ans. AGI
Explanation.Artificial General Intelligence (AGI) is a form of artificial intelligence
that mimics how a human reasons. However, it is still only a theoretical concept to
date.

©Civil Services Club Bhopal-7747068666 Page 42


77. What is the conceptual form of AI that is capable of reasoning beyond
human capabilities?
Ans. ASI
Explanation.Artificial Super Intelligence (ASI) is a conceptual form of AI that is
capable of reasoning beyond human capabilities and has the ability to build
emotional relationships.
78. Which platform has AI deeply embedded in it, with features like Messenger
chatbots, algorithmic newsfeeds, photo tagging suggestions, or ad
targeting?
Ans. Meta
Explanation.AI is deeply embedded in Meta’s Facebook platform. It is already using
a combination of AI and human moderation to combat spam and abuse.
79. What was X formerly known as?
Ans. Twitter
Explanation.X, located in San Francisco, California, was formerly known as Twitter.
It uses AI to direct users to people to follow, tweets, and news based on a user’s
individual preferences.
80. Which country’s hacker groups recently targeted various Indian power
centres?
Ans. China
Explanation.Recently, few “State-sponsored” Chinese hacker groups targeted
various Indian power centres.
81. What was the major cyberattack at the end of 2020 believed to have been
sponsored from Russia?
Ans. SolarWinds
Explanation.Towards the end of 2020, a major cyberattack headlined ‘SolarWinds’
was believed to have been sponsored from Russia. It involved data breaches across
several wings of the U.S. government, including defence, energy and state.
82. Which Chinese group exploited serious flaws in Microsoft’s software in
early 2021?
Ans. Hafnium
Explanation. Thousands of U.S. organisations were hacked in early 2021 in an
unusually aggressive cyberattack, by a Chinese group Hafnium, which had exploited
serious flaws in Microsoft’s software, thus gaining remote control over affected
systems.
83. What is the term for computer- or network-based conflict involving
politically motivated attacks by a nation-state on another nation-state?
Ans. Cyber warfare

©Civil Services Club Bhopal-7747068666 Page 43


Explanation.Cyber warfare is computer- or network-based conflict involving
politically motivated attacks by a nation-state on another nation-state. In these types
of attacks, nation-state actors attempt to disrupt the activities of organizations or
nation-states, especially for strategic or military purposes and cyber espionage.
84. Which malware was exposed by the US department of defence (DoD) in
2020 that was being used to launch cyberattacks against targets in several
countries?
Ans. SlothfulMedia
Explanation.In 2020, the United States (US) department of defence (DoD) exposed
an information-stealing malware, SlothfulMedia, which they said was being used to
launch cyberattacks against targets in India, Kazakhstan, Kyrgyzstan, Malaysia,
Russia and Ukraine.
85. Which country conducted a misinformation campaign during the 2016 US
presidential elections?
Ans. Russia
Explanation. The most notorious example is that of the misinformation campaign
conducted by Russian bots during the 2016 US presidential elections.
86. Which group associated with Russian intelligence has conducted attacks on
government sectors in the US, Ukraine, Poland, and on the European Union
and NATO?
Ans. Sandworm Team
Explanation.Military cyberattacks are perhaps the most associated with
cyberwarfare — the “Sandworm Team”, a group associated with Russian intelligence,
has conducted attacks on government sectors in the US, Ukraine, Poland, and on the
European Union and NATO.
87. Which malware was designed to damage Iran’s nuclear capability in 2010?
Ans. Stuxnet
Explanation.A well-documented cyberattack occurred in 2010 when a malware
“Stuxnet” that was designed to damage Iran’s nuclear capability by making Iranian
scientists and government think there were a series of internal engineering mishaps
at their enrichment facility.
88. Which country was found to be the target of a sophisticated supply chain
cyber-attack in the last week of 2020?
Ans. Vietnam
Explanation. In the last week of 2020, news came in that Vietnam had been found
to be the target of a sophisticated supply chain cyber-attack.
89. What is malware?
Ans. Unwanted software

©Civil Services Club Bhopal-7747068666 Page 44


Explanation.Malware is defined as a software designed to perform an unwanted
illegal act via the computer network. It could be also defined as software with
malicious intent.
90. What is a virus in the context of cybersecurity?
Ans. Infectious program
Explanation. A virus is a program that can infect other programs by modifying them
to include a possible evolved copy of itself.
91. How do computer worms spread?
Ans. Through networks
Explanation.Worms are disseminated through computer networks, unlike viruses,
computer worms are malicious programs that copy themselves from system to
system, rather than infiltrating legitimate files.
92. What is the purpose of a Trojan in cybersecurity?
Ans. Impair security
Explanation.Trojan or trojan horse is a program that generally impairs the security
of a system. Trojans are used to create back-doors on computers belonging to a
secure network so that a hacker can have access to the secure network.
93. What is a hoax in the context of cybersecurity?
Ans. Deceptive email
Explanation. A hoax is an e-mail that warns the user of a certain system that is
harming the computer. The message thereafter instructs the user to run a procedure
to correct the harming system. When this program is run, it invades the system and
deletes an important file.
94. How is spyware typically spread?
Ans. Through emails
Explanation. Spywares are usually forwarded through unsuspecting e-mails with
bonafide e-mail i.ds.
95. In which year did banks announce a leak of personal information of 3.2
million debit cards in India?
Ans. 2016
Explanation.In 2016, banks in India had reportedly announced a leak of personal
information of 3.2 million debit cards.
96. What incident circulated obscene images of under-age girls via leaked
chats from an exclusive group in India?
Ans. 'Bois locker room'
Explanation.The 'Bois locker room' incident in India circulated obscene images of
under-age girls via leaked chats from an exclusive group.

©Civil Services Club Bhopal-7747068666 Page 45


97. Which act gives legal recognition to e-commerce and e-governance in India?
Ans. Information Technology Act, 2000
Explanation.The Information Technology Act, 2000 intends to give legal recognition
to e-commerce and e-governance and facilitate its development as an alternate to
paper-based traditional methods.
98. Which agency in India is responsible for monitoring Indian cyberspace and
coordinating alerts and warnings of imminent cyber-attacks?

Ans. Indian Computer Emergency Response Team (CERT-In)

Explanation.CERT-In monitors Indian cyberspace and coordinates alerts and


warnings of imminent cyber-attacks among public and private cyber users and
organizations in the country.

99. What is the main objective of the National Information Board (NIB) in
India?

Ans. To ensure the security and integrity of the critical minimum information
infrastructure in the country.

Explanation.NIB is an apex agency with representatives from relevant departments


and agencies that form part of the critical minimum information infrastructure in
the country, aiming to ensure its security and integrity.

100. Which international treaty addresses crimes committed using or


against network and information systems (computers)?

Ans. Budapest Convention on Cybercrime

Explanation.The Budapest Convention on Cybercrime was adopted on 8 November


2001 as the first international treaty addressing crimes committed using or against
network and information systems (computers).

Test-64
E-Governance

©Civil Services Club Bhopal-7747068666 Page 46


1. What does the “e” in “e-Governance” stand for?
Ans. Electronic
Explanation.The “e” in “e-Governance” refers to “electronic,” indicating that
governance services are provided through electronic means.
2. What is the main purpose of e-Governance?
Ans. Services
Explanation.e-Governance is the use of information and communication technology
(ICT) to provide government services, exchange information, conduct transactions,
and integrate previously existing services and information portals.
3. Name one initiative by the Government of India that promotes e-
Governance
Ans. Digital India
Explanation.The Government of India’s Mission e-Governance, in combination with
Digital India, aims to promote e-Governance and improve the distribution of public
services to its citizens.
4. What are the main pillars of e-Governance in India?
Ans. People, processes, technology, resources
Explanation.The main pillars of e-Governance in India have been people, processes,
technology, and resources.
5. What is one of the initiatives included in e-governance in India?
Ans. Aadhaar
Explanation.Aadhaar is one of the initiatives included in e-governance in India,
along with the Digital India initiative, the National Portal of India, the Prime Minister
of India’s portal, online tax filing and payment, digital land management systems, the
Common Entrance Test, and so on.
6. What is the purpose of the Sugamya Bharat app?
Ans. Health Accessibility
Explanation.The Sugamya Bharat app is a part of the government’s health initiatives
to make health services more accessible to the public.
7. Which portal is specifically designed for women?
Ans. NARI
Explanation. The NARI portal is a government initiative designed to empower
women by providing them with access to various services and resources.
8. What is the aim of the DIKSHA portal?
Ans. Education

©Civil Services Club Bhopal-7747068666 Page 47


Explanation.The DIKSHA portal is a part of the government’s education initiatives,
providing a platform for teachers to learn and grow.
9. What service does the AGMARKNET provide?
Ans. Agriculture
Explanation.AGMARKNET is a part of the government’s agriculture initiatives,
providing a platform for the dissemination of information related to the agricultural
market.
10. What is the purpose of the Digital India initiative?
Ans. Digitization
Explanation. The Digital India initiative is a government service aimed at
transforming India into a digitally empowered society and knowledge economy.
11. What is the purpose of the Aadhar initiative?
Ans. Identification
Explanation.Aadhar is a government initiative that provides a unique identification
number to Indian residents, serving as a proof of identity and address anywhere in
India.
12. What is the purpose of the Digi Locker initiative?
Ans. Storage
Explanation. Digi Locker is a part of the government’s service and monitoring
initiatives, providing citizens with a secure dedicated personal electronic space for
storing documents.
13. What is the purpose of the UMANG initiative?
Ans. Unification
Explanation.UMANG (Unified Mobile Application for New-age Governance) is a
government service that provides a single platform for all Indian citizens to access
pan India e-Gov services.
14. What is the purpose of the PRAGATI initiative?
Ans. Monitoring
Explanation.PRAGATI (Pro-Active Governance And Timely Implementation) is a
unique integrating and interactive platform aimed at addressing common man’s
grievances and simultaneously monitoring important programs and projects of the
Indian Government.
15. What is the purpose of the e KRANTI initiative?
Ans. Transformation
Explanation.e KRANTI is an initiative under the Digital India program, aimed at
transforming e-Governance for transforming Governance. It ensures wider
transparency, efficiency, and promptness in the government processes.

©Civil Services Club Bhopal-7747068666 Page 48


16. When was the National e-Governance Plan (NeGP) formulated?
Ans. 2006
Explanation.The NeGP was formulated in 2006 by the Department of
Administrative Reforms & Public Grievances (DARPG), Ministry of Electronics &
Information Technology (ME&IT), and Ministry of Personnel, Public Grievances &
Pensions.
17. Which mobile application made the implementation of NeGP possible?
Ans. UMANG
Explanation.UMANG (Unified Mobile Application for New-age Governance) is the
project that made the implementation of NeGP possible.
18. What is the aim of the MyGov initiative under NeGP?
Ans. Citizen Engagement
Explanation.MyGov aims at establishing a link between Government and Citizens.
19. What does the e-Hospital Online Registration Framework (ORF) initiative
provide?
Ans. OPD Appointments
Explanation.The e-Hospital ORF initiative allows patients to avail online OPD
appointments with government hospitals.
20. What is the aim of the PRAGATI system under NeGP?
Ans. e-Accountability
Explanation.PRAGATI (Pro-Active Governance and Timely Implementation) is a
system that aims at establishing e-accountability and implementing e-transparency.
21. What is the National Scholarships Portal (NSP) under NeGP?
Ans. Scholarships
Explanation.The National Scholarships Portal (NSP) is a centralized platform for
students to apply and receive scholarships.
22. Which initiative aims to make all government services available to the
citizens of India via electronic media?
Ans. National e-Governance Plan
Explanation.The National e-Governance Plan is an initiative of the Government of
India to make all government services available to the citizens of India via electronic
media.
23. Under which division does the National Center of Geo-informatics operate?
Ans. National e-Governance Division

©Civil Services Club Bhopal-7747068666 Page 49


Explanation.The National Center of Geo-informatics is a Geographic Information
System (GIS) based decision support system platform, under National e-Governance
Division (NeGD) of Ministry of Electronics and Information Technology (MeitY).
24. What is the main function of the Darpan Portal?
Ans. Information Interchange
Explanation.The Darpan Portal is an initiative started by the National Informatics
Centre and NITI Aayog. It facilitates an interchange of information between NGOs,
Voluntary Organisations (VOs) and government departments, ministries and bodies.
25. Which initiative was started by the National Informatics Centre and NITI
Aayog?
Ans. Darpan Portal
Explanation.The Darpan Portal is an initiative started by the National Informatics
Centre and NITI Aayog.
26. Which platform facilitates an interchange of information between NGOs,
Voluntary Organisations (VOs) and government departments, ministries
and bodies?
Ans. Darpan Portal
Explanation.The Darpan Portal facilitates an interchange of information between
NGOs, Voluntary Organisations (VOs) and government departments, ministries and
bodies.
27. Which e-governance model does the Karnataka government’s Khajane
Project fall under?
Ans. G2G
Explanation. The Khajane Project, which computerises the Karnataka government’s
treasury online, is an example of the Government to Government (G2G) model.
28. Which e-governance model does the Digilocker fall under?
Ans. G2C
Explanation. Digilocker, which provides a platform for issuance and verification of
documents & certificates digitally, is an example of the Government to Citizens (G2C)
model.
29. What is the purpose of Rajasthan’s e-Mitra initiative?
Ans. Citizen Services
Explanation. Rajasthan’s e-Mitra is an integrated platform for providing various
services quickly and conveniently to the citizens. It is an example of the G2C model.
30. Which e-governance model does the MCA 21 database fall under?
Ans. G2B

©Civil Services Club Bhopal-7747068666 Page 50


Explanation. The MCA 21 database, which is managed by the Corporate Affairs
Ministry, is an example of the Government to Business (G2B) model.
31. What is the purpose of the iGoT platform?
Ans. Training
Explanation. The iGoT platform is used to train employees and equip them to
handle emerging challenges in governance. It is an example of the Government to
Employee (G2E) model.
32. Which initiative designated 2,50,000 panchayatiraj institutions to provide
rural e-government services?
Ans. Gyandoot
Explanation.The Gyandoot project, initiated by the Madhya Pradesh government, is
a Mission Mode Project that designated 2,50,000 panchayatiraj institutions to
provide rural e-government services. It is an example of the G2C model.
33. Which e-governance model does the CoWin App fall under?
Ans. G2C
Explanation.The CoWin App, which was developed for managing the COVID-19
vaccination drive in India, is an example of the G2C model.
34. Which initiative by the Andhra Pradesh government is aimed at improving
efficiency through workflow automation and knowledge management?
Ans. SmartGov
Explanation.The SmartGov initiative by the Andhra Pradesh government
streamlines processes and improves efficiency through workflow automation and
knowledge management. It is an example of the G2G model.
35. Which e-governance model is the iGoT platform an example of?
Ans. G2E
Explanation.The iGoT platform, which is used to train employees and equip them to
handle emerging challenges in governance, is an example of the Government to
Employee (G2E) model.
36. What is the main function of the Broadcasting Model in e-governance?
Ans. Dissemination
Explanation.The Broadcasting Model in e-governance is based on the dissemination
or broadcasting of useful Governance information. It provides people with correct
information.
37. What is the purpose of the Critical Flow Model in e-governance?
Ans. Channeling

©Civil Services Club Bhopal-7747068666 Page 51


Explanation.The Critical Flow Model is based on disseminating or channeling
information of critical value to the targeted audience or into the wider public
domain.
38. What does the Comparative Analysis Model in e-governance do?
Ans. Assimilates
Explanation. The Comparative Analysis Model continuously assimilates best
practices in the area of governance and uses them as a benchmark to evaluate other
governance practices.
39. Who does the e-advocacy Model in e-governance help?
Ans. Civil society
Explanation. The e-advocacy Model helps the global civil society to impact the
global decision-making process.
40. What is the Interactive Service Model in e-governance?
Ans. Services
Explanation.The Interactive Service Model refers to the various services offered by
the government that are directly available to its citizens in an interactive manner.
41. What is the percentage of internet accessibility in urban India according to
the India Inequality Report 2022?
Ans. 44 percent
Explanation.According to the India Inequality Report 2022: Digital Divide by Oxfam,
access to the internet through any kind of device was found to be far better in urban
India at 44 percent.
42. What is the percentage of digital literacy in Indian households?
Ans. 38 percent
Explanation.Only 38 percent of households in the country are digitally literate.
43. What percentage of Indians reported being able to speak some English
according to the 2011 census?
Ans. 10 percent
Explanation. Between mother tongue, second and third language, the 2011 census
records that over 10% of Indians reported being able to speak some English.
44. What is one of the barriers in the adoption of e-Governance in India?
Ans. Accessibility
Explanation.One of the barriers in the adoption of e-Governance in India is
accessibility. Internet access is far better in urban India at 44 percent than in rural
areas at 17 percent.
45. What should the government do to improve e-services in terms of
language?

©Civil Services Club Bhopal-7747068666 Page 52


Ans. Translate
Explanation. To improve e-services, the government should translate the language
into regional languages.

46. What was the average data consumption per user in India in 2022
according to a Nokia report?
Ans. 19.5GB
Explanation.According to a Nokia report, the average data consumption per user in
India reached 19.5GB per user a month in 2022.
47. How many active internet users is India likely to have by 2025?

©Civil Services Club Bhopal-7747068666 Page 53


Ans. 900 million
Explanation.Due to the rising availability and falling cost of high-speed broadband
and smartphones, India is likely to have 900 million active internet users by 2025.
48. What is the goal of the Digital India programme?
Ans. Connectivity
Explanation.The Digital India programme aims to help millions connect online by
providing broadband internet to 250,000 gram panchayats.
49. How much might India’s digital economy generate in 2025?
Ans. $1 trillion
Explanation. India’s digital economy might generate $1 trillion in 2025 as new
digital applications permeate sector after sector.
50. How many Indians are enlisted in the government’s biometric digital
identity initiative?
Ans. 1.21 billion
Explanation.1.21 billion Indians are enlisted in the government’s biometric digital
identity initiative as part of the JAM trinity.
51. What does G2C stand for in the context of e-governance?
Ans. Government-to-Citizens
Explanation.In the context of e-governance, G2C refers to the interactions and
exchange of information between Government and Citizens.
52. Who developed the Five Stage E-Governance Model?
Ans. Hiller, Belanger, and Moon
Explanation.Hiller, Belanger, and Moon developed a Framework for Electronic
Government in 2001 and 2002, which consists of five stages of e-Governance.
53. What is the first stage in the UN’s Five Stages Model for e-governance
development?
Ans. Emerging presence
Explanation. The first stage, ‘Emerging presence’, is identified by a small number of
static web pages with very little published information.
54. What does the ‘Integration’ stage entail in Hiller, Belanger’s, Moon’s Five
Stage E-Governance Model?
Ans. Service Integration
Explanation. The ‘Integration’ stage involves the integration of government services,
usually done through a single portal regardless of which agencies provide them.
55. What is the final stage in the UN’s Five Stages Model for e-governance
development?

©Civil Services Club Bhopal-7747068666 Page 54


Ans. Seamless or fully integrated presence
Explanation.The final stage, ‘Seamless or fully integrated presence’, involves the
creation of a “one-stop shop”, a single universal website where users can view and
perform all of the government’s services.
56. What is the term for the use of information and communication technology
to deliver government services and exchange information between
Government-to-Citizens (G2C), Government-to-Government (G2G),
Government-to-Business (G2B), Government-to-Agencies (G2A), and
Government to Employees (G2E)?
Ans. E-governance
Explanation.E-governance refers to the use of information and communication
technology to deliver government services and exchange information between
various entities, including citizens, businesses, agencies, and employees.
57. According to Hiller, Belanger, and Moon's Five Stage E-Governance Model, at
which stage do governments disseminate information via their websites?
Ans. Information
Explanation.In the Information stage, governments disseminate information via
their websites, providing citizens with access to basic information about government
services and activities.
58. Which stage of the UN's Five Stages Model of e-governance development
allows users to access a wealth of information at specialized websites?
Ans. Enhanced presence
Explanation. In the Enhanced presence stage, government agency websites are
dynamic, and information is up to date, allowing users to access a wealth of
information at specialized websites.
59. What is the highest stage of e-governance according to the UN's Five Stages
Model, where governments create a single universal website for users to
view and perform all government services?
Ans. Seamless or fully integrated presence
Explanation.The Seamless or fully integrated presence stage is the highest stage of
e-governance, where governments create a single universal website, also known as a
"one-stop shop," for users to view and perform all government services.
60. In which stage of the Five Stage E-Governance Model do governments
permit online transactions to be completed?
Ans. Transaction
Explanation.In the Transaction stage, governments permit online transactions to be
completed, allowing citizens to conduct various transactions online without visiting
government offices.

©Civil Services Club Bhopal-7747068666 Page 55


61. At which stage of the UN's Five Stages Model do interactive portals allow
information to flow in both directions, enabling users to send feedback or
"read and write" data?
Ans. Interactive presence
Explanation.The Interactive presence stage is characterized by interactive portals
that allow information to flow in both directions, enabling users to send feedback or
"read and write" data.
62. According to Hiller, Belanger, and Moon's model, which stage of e-
governance development includes online voting, online public forums, and
opinion polls for more direct interaction with the government?
Ans. Political participation
Explanation.The Political participation stage includes online voting, online public
forums, and opinion polls, enabling more direct and broad interaction with the
government.
63. In the UN's Five Stages Model, which stage is identified by a small number
of static web pages with very little published information?
Ans. Emerging presence
Explanation.The Emerging presence stage is identified by a small number of static
web pages with very little published information, indicating the initial presence of e-
governance.
64. According to the World Bank's three-stage model, at which stage of e-
governance are governments publishing information online through
websites, which is considered one-way communication?
Ans. Publish
Explanation. In the Publish stage, governments are publishing information online
through websites, providing citizens with access to rules, regulations, documents,
and forms, but it is one-way communication.
65. In the World Bank's model, which stage of e-governance allows citizens to
interact with government officials at all levels, helping to build public trust
in government?
Ans. Interact
Explanation.The Interact stage of e-governance allows citizens to interact with
government officials at all levels, contributing to building public trust in government.
66. At which stage of the World Bank's model can users access services and
carry out tasks via web-based e-government interfaces?
Ans. Transact
Explanation.The Transact stage of e-governance allows users of government
services to access services and carry out tasks via web-based e-government
interfaces.

©Civil Services Club Bhopal-7747068666 Page 56


67. According to Gartner's four-stage model, at which stage do agencies
maintain a website where the public can access basic information?
Ans. Presence
Explanation.In the Presence stage of Gartner's model, agencies maintain a website
where the public can access basic information, similar to the Information stage in
other models.
68. In Gartner's model, which stage allows users to contact agencies via
websites (e.g., e-mail) or self-service (e.g., download documents)?
Ans. Interaction
Explanation.The Interaction stage of Gartner's model allows users to contact
agencies via websites (e.g., e-mail) or self-service (e.g., download documents),
enabling more direct communication.
69. At which stage of Gartner's model can users complete transactions such as
license applications and procurement online?
Ans. Transaction
Explanation.The Transaction stage of Gartner's model allows users to complete
transactions such as license applications and procurement online, improving
efficiency and convenience.
70. What is the final stage in Gartner's model, where governments should
prioritize the transformation of existing operational processes to provide
more efficient, integrated, unified, and personalized service?
Ans. Transformation
Explanation.The Transformation stage in Gartner's model emphasizes the need for
governments to transform existing operational processes to provide more efficient,
integrated, unified, and personalized service.
71. According to Andersen and Henriksen, which model sees e-government as
G2C e-commerce?
Ans. World Bank's three-stage model
Explanation.Andersen and Henriksen supported the World Bank's three-stage
model, which sees e-government as G2C e-commerce, aligning it with the stages of e-
commerce development.
72. How is the Publish stage of the World Bank's model comparable to web 1.0
in terms of web evolution?
Ans. "Read-only"
Explanation. The Publish stage of the World Bank's model is comparable to web 1.0,
where websites are "read-only," meaning users can only read information rather
than interact or contribute.
73. What is the key benefit of the Interact stage in the World Bank's model,
according to its proponents?

©Civil Services Club Bhopal-7747068666 Page 57


Ans. Building public trust in government
Explanation.The Interact stage in the World Bank's model allows citizens to interact
with government officials, contributing to building public trust in government.
74. What is the name of the model apart from Gartner that categorizes e-
governance initiatives into four stages: Presence, Interaction, Transaction,
and Transformation?
Ans. Jefrey’s Four Stage Model
Explanation.Jefrey’s Four Stage Model categorizes e-governance initiatives into four
stages based on the extent to which information technology features have been used
to enable electronic service delivery.
75. According to Jefrey’s Four Stage Model, at which stage of evolution do e-
governance efforts involve the presence of basic information online?
Ans. Presence
Explanation.In the Presence stage of Jefrey’s model, e-governance efforts involve
the presence of basic information online, similar to maintaining a website with static
information.
76. In the context of Jefrey’s model, which stage involves the interaction
between citizens and government officials through online platforms?
Ans. Interaction
Explanation.The Interaction stage of Jefrey’s model involves the interaction
between citizens and government officials through online platforms, fostering more
direct communication.
77. At which stage of Jefrey’s model can users complete transactions online,
such as applying for licenses or accessing government services?
Ans. Transaction
Explanation. The Transaction stage of Jefrey’s model allows users to complete
transactions online, streamlining processes and improving efficiency.
78. According to Jefrey’s model, what is the final stage of evolution for e-
governance initiatives, where existing operational processes are
transformed for more efficient and personalized services?
Ans. Transformation
Explanation.The Transformation stage of Jefrey’s model emphasizes the
transformation of existing operational processes to provide more efficient,
integrated, unified, and personalized services.
79. What is the name of the program started by the National Informatics Centre
(NIC) in India in 1977 to computerize district offices nationwide?
Ans. District Information System programme

©Civil Services Club Bhopal-7747068666 Page 58


Explanation.The District Information System programme was started by the
National Informatics Centre (NIC) in 1977 to computerize district offices nationwide,
marking the beginning of e-Governance initiatives in India.
80. In 1987, what national program was launched in India to provide satellite-
based computer networking?
Ans. National Satellite-Based Computer Network (NICENET)
Explanation.The National Satellite-Based Computer Network (NICENET) was
launched in India in 1987 to provide satellite-based computer networking,
expanding the reach of information technology
81. What is the main objective of the National e-Governance Plan (NeGP) in
India?
Ans. To integrate e-Government initiatives across the country
Explanation.The main objective of the National e-Governance Plan (NeGP) in India
is to integrate e-Government initiatives across the country, improving accessibility
and efficiency.
82. What is the name of the initiative launched in 2015 to empower India
digitally in the field of technology?
Ans. Digital India
Explanation.Digital India was launched in 2015 with the primary objectives of
creating a secure digital infrastructure, digitally delivering government services, and
achieving universal digital literacy.
83. What is Aadhaar and what is its purpose?
Ans. Unique identification number
Explanation.Aadhaar is a UIDAI-issued unique identification number that serves as
proof of identity and address based on biometric data, serving as a single point for
offline and online identity verification.
84. When was the MyGov platform introduced, and what is its purpose?
Ans. July 2014
Explanation.The MyGov platform was introduced in July 2014 to encourage Indian
citizens to actively participate in the governance and development of their nation
through citizen engagement.
85. What is the UMANG platform, and when was it launched?
Ans. November 2017
Explanation.The UMANG platform, launched in November 2017, provides a single
platform for all Indian citizens to access pan-India e-Gov services, promoting digital
empowerment.
86. What is the purpose of DigiLocker, and when was it launched?
Ans. July 2015

©Civil Services Club Bhopal-7747068666 Page 59


Explanation.DigiLocker, launched in July 2015, aims to transform India into a
digitally empowered society by allowing citizens to digitally store important
documents securely.
87. What does the digitisation of land records ensure for landowners?
Ans. Receive digital and up-to-date copies of documents
Explanation.Digitisation of land records ensures that landowners receive digital
and up-to-date copies of documents relating to their property, improving
accessibility and transparency.
88. What is the major e-Governance initiative of the Karnataka government to
digitalize the state’s treasury system?
Ans. Khajane
Explanation.Khajane is a major e-Governance initiative of the Karnataka
government aimed at digitalizing the state’s treasury system, improving state
financial management.
89. What is the Andhra Pradesh E-seva initiative, and what services does it
offer?
Ans. Government to Citizen and e-Business to Citizen services
Explanation.The Andhra Pradesh E-seva initiative offers both Government to
Citizen and e-Business to Citizen services, including payment of utility bills and
issuance of certificates, licenses, and permits
90. What is Bhoomi, and what is its purpose?
Ans. An e-Government portal for the computerised delivery of rural land
records
Explanation.Bhoomi is an e-Government portal in Karnataka that delivers 20
million rural land records to 6.7 million farmers, promoting transparency and
efficiency.
91. What is the goal of the e-Office initiative?
Ans. Make all government offices more efficient, responsive, effective, and
transparent
Explanation.The goal of the e-Office initiative is to make all government offices
more efficient, responsive, effective, and transparent by integrating independent
systems into a single framework.
92. What is the e-District project?
Ans. Government-to-Consumer
Explanation.The e-District project is one of the State’s Mission Mode Projects and
Government-to-Consumer initiatives under the National eGovernance Plan. It aims
to deliver identified high volumes of citizen-centric services electronically via
Common Service Centers (CSCs).

©Civil Services Club Bhopal-7747068666 Page 60


93. What is the National eDistrict Service Tracker?
Ans. Mobile App
Explanation.The National eDistrict Service Tracker is a mobile App that allows
citizens to interact with the e-District Application via hand-held devices.
94. What is DARPAN? (Full form)
Ans. Dashboard for the Analytical Review of Projects Across the Nation
Explanation. It transforms complex government data into visually appealing visuals
and provides real-time, dynamic project monitoring.
95. What is the function of e-Pramaan?
Ans. e-Authentication
Explanation.e-Pramaan is a framework for the e-authentication of users who access
online services through the web or mobile phones. It fully incorporates and uses the
Aadhaar authentication mechanism provided by the Unique Identification Authority
of India.
96. What is the aim of the Mobile Seva platform?
Ans. Mobile governance
Explanation.The Mobile Seva platform is aimed at mainstreaming mobile
governance in the country by providing all possible mobile-based channels for
service delivery.
97. What is the main function of the MeghRaj project?
Ans. Cloud computing
Explanation.MeghRaj, the Government of India’s cloud, enables departments and
agencies at the central and state levels to leverage cloud computing for the effective
delivery of e-services.
98. What service does PayGov India provide?
Ans. Payment gateway
Explanation.PayGov India is an online national payment gateway that allows
citizens to pay fees for availing any government services.
99. Who can cast their vote electronically through the E-Postal Ballot system?
Ans. Registered voters
Explanation. The E-Postal Ballot system allows certain sections of the electorate,
such as members of the armed forces, supplementary forces, certain government
employees deployed in remote/inaccessible areas, and those posted abroad, to cast
their vote electronically, provided they are registered with the electoral authorities
as registered voters.
100. Which state implemented the FRIENDS project?
Ans. Kerala

©Civil Services Club Bhopal-7747068666 Page 61


Explanation.The FRIENDS project, which stands for Fast, Reliable, Instant, Efficient
Network for the Disbursement of Services, is a Single Window Facility providing
citizens the means to pay taxes and other financial dues to the State Government of
Kerala.
Test-65
Internet and Social Networking Platforms

1. When was the term ‘internetted’ first used and what does it mean?
Ans. 1849
Explanation. The term ‘internetted’ was first used in 1849, and it means
interconnected or interwoven.
2. In which year was the term ‘Internet’ used by the United States War
Department?
Ans. 1945
Explanation.The term ‘Internet’ was used in a radio operator’s manual by the
United States War Department in 1945.
3. What does the term ‘Internet’ most commonly refer to today?
Ans. Global system of interconnected computer networks
Explanation. Today, the term ‘Internet’ most commonly refers to the global system
of interconnected computer networks.
4. What is the ‘World Wide Web’?
Ans. Service
Explanation.The ‘World Wide Web’, or the ‘Web’, is a service that operates over the
Internet. It is a collection of documents (web pages) and other web resources linked
by hyperlinks and URLs.
5. What is the shorthand form of ‘Internetwork’?
Ans. Internet
Explanation.The term ‘Internet’ is used as the shorthand form of ‘Internetwork’.
6. What protocol suite is used by the Internet for communication between
networks and devices?
Ans. TCP/IP (Transmission Control Protocol/Internet Protocol).
Explanation.TCP/IP is the set of rules that enables internetworking on the Internet,
allowing different networks to communicate with each other.
7. Which agency of the United States Department of Defense played a key role
in the development of the Internet?
Ans. Defense Advanced Research Projects Agency (DARPA).

©Civil Services Club Bhopal-7747068666 Page 62


Explanation.DARPA commissioned research and development in the 1970s that led
to the creation of the Internet's communication protocols.
8. What was the role of the ARPANET in the early development of the Internet?
Ans. ARPANET served as a backbone for connecting regional academic and
military networks in the United States.
Explanation.ARPANET was the first network to use the Internet Protocol Suite and
laid the foundation for the modern Internet.
9. Which organization oversees the management of the Internet's principal
name spaces?
Ans. Internet Corporation for Assigned Names and Numbers (ICANN).
Explanation.ICANN is responsible for coordinating the maintenance and procedures
of several databases related to the namespaces of the Internet, ensuring the
network's stable and secure operation.
10. What technological development in the 1960s contributed to the origins of
the Internet?
Ans. Research to enable time-sharing of computer resources.
Explanation. Time-sharing allowed multiple users to access a computer
simultaneously, laying the groundwork for networked computing.
11. What organization is responsible for the technical standardization of core
Internet protocols?
Ans. Internet Engineering Task Force (IETF).
Explanation.IETF is a non-profit organization that develops and promotes voluntary
Internet standards, ensuring the smooth operation of the Internet.
12. What recognition did the Internet receive in November 2006?
Ans. It was included on USA Today's list of the New Seven Wonders.
Explanation.This recognition highlights the global significance and impact of the
Internet on modern society.
13. Who proposed the idea of a universal network while working at Bolt
Beranek & Newman and later leading the Information Processing
Techniques Office (IPTO) at the Advanced Research Projects Agency (ARPA)
of the United States Department of Defense (DoD)?
Ans. J. C. R. Licklider
Explanation.J. C. R. Licklider proposed the idea of a universal network while
working at Bolt Beranek & Newman and later leading the Information Processing
Techniques Office (IPTO) at ARPA.
14. What were the two fundamental Internet technologies researched in the
1960s?
Ans. Time-sharing of computer resources and packet switching

©Civil Services Club Bhopal-7747068666 Page 63


Explanation.Computer scientists in the 1960s began developing systems for time-
sharing of computer resources and researching packet switching, which are
fundamental Internet technologies.
15. Which two individuals independently worked on the concept of packet
switching in the early 1960s?
Ans. Paul Baran and Donald Davies
Explanation.Paul Baran and Donald Davies independently worked on the concept of
packet switching in the early 1960s, which later became a fundamental Internet
technology.
16. When did ARPANET development begin with the interconnection of two
network nodes?
Ans. 29 October 1969
Explanation.ARPANET development began with the interconnection of two network
nodes between the University of California, Los Angeles (UCLA) and SRI
International (SRI) on 29 October 1969.
17. Which university was the third site to be connected to ARPANET after UCLA
and SRI?
Ans. University of California, Santa Barbara
Explanation.The University of California, Santa Barbara, was the third site to be
connected to ARPANET after UCLA and SRI.
18. In what year were connections made to the Norwegian Seismic Array
(NORSAR) and Peter Kirstein's research group at University College
London, forming the first internetwork for resource sharing?
Ans. 1973
Explanation.Connections were made in 1973 to the Norwegian Seismic Array
(NORSAR) and Peter Kirstein's research group at University College London, forming
the first internetwork for resource sharing.
19. Who published a proposal for "A Protocol for Packet Network
Intercommunication" in 1974?
Ans. Vint Cerf and Bob Kahn
Explanation.Vint Cerf at Stanford University and Bob Kahn at DARPA published a
proposal for "A Protocol for Packet Network Intercommunication" in 1974.
20. What term did Vint Cerf and Bob Kahn use as a shorthand for internetwork
in RFC 675?
Ans. Internet
Explanation.Vint Cerf and Bob Kahn used the term internet as a shorthand for
internetwork in RFC 675.

©Civil Services Club Bhopal-7747068666 Page 64


21. Who is credited with important influences on the TCP/IP design, according
to Cerf and Kahn?
Ans. Louis Pouzin
Explanation. Cerf and Kahn credit Louis Pouzin with important influences on the
resulting TCP/IP design.
22. When was access to the ARPANET expanded and by whom?
Ans. 1981, NSF
Explanation.Access to the ARPANET was expanded in 1981 when the National
Science Foundation (NSF) funded the Computer Science Network (CSNET).
23. When was the Internet Protocol Suite (TCP/IP) standardized?
Ans. 1982
Explanation.The Internet Protocol Suite (TCP/IP) was standardized in 1982, which
facilitated worldwide proliferation of interconnected networks.
24. When was the ARPANET decommissioned?
Ans. 1990
Explanation.The ARPANET was decommissioned in 1990.
25. Who began writing the first web browser and when?
Ans. Tim Berners-Lee, 1990
Explanation.Six months after the first high-speed T1 (1.5 Mbit/s) link between the
NSFNET and Europe was installed, Tim Berners-Lee began writing WorldWideWeb,
the first web browser.
26. When was the Commercial Internet eXchange founded?
Ans. 1991
Explanation.In 1991 the Commercial Internet eXchange was founded, allowing
PSInet to communicate with the other commercial networks CERFnet and Alternet.
27. Which organization is responsible for the technical underpinning and
standardization of the core protocols of the Internet?
Ans. IETF (Internet Engineering Task Force)
Explanation.The IETF is a non-profit organization of international participants that
anyone may associate with by contributing technical expertise, responsible for the
technical underpinning and standardization of the core protocols (IPv4 and IPv6) of
the Internet.
28. What is the mission of the Internet Society (ISOC)?
Ans. To assure the open development, evolution, and use of the Internet for the
benefit of all people throughout the world

©Civil Services Club Bhopal-7747068666 Page 65


Explanation.The ISOC was founded in 1992 with a mission to "assure the open
development, evolution, and use of the Internet for the benefit of all people
throughout the world".
29. What is the term for the major traffic exchanges with physical connections
to multiple ISPs?
Ans. Internet exchange points
Explanation.Internet exchange points are major traffic exchanges with physical
connections to multiple ISPs.
30. What is the term for the practice of Internet service providers allowing
users free connectivity to access specific content or applications without
cost?
Ans. Zero-rating
Explanation.Zero-rating is the practice of Internet service providers allowing users
free connectivity to access specific content or applications without cost.
31. What is the top layer of the Internet Protocol Suite?
Ans. Application
Explanation.The top layer of the Internet Protocol Suite is the Application layer. It is
where communication is described in terms of the objects or data structures most
appropriate for each application.
32. Which protocol provides ordered, reliable delivery in the Transport layer?
Ans. TCP
Explanation.The Transport Control Protocol (TCP) provides ordered, reliable
delivery in the Transport layer.
33. What does the Internet layer implement in the Internet Protocol Suite?
Ans. IP
Explanation.The Internet layer implements the Internet Protocol (IP) which enables
computers to identify and locate each other by IP address.
34. What connects nodes on the same physical link in the Internet Protocol
Suite?
Ans. Link layer
Explanation.The Link layer connects nodes on the same physical link in the Internet
Protocol Suite.
35. What is added at each abstraction layer as user data is processed through
the protocol stack?
Ans. Encapsulation information
Explanation. Each abstraction layer adds encapsulation information at the sending
host as user data is processed through the protocol stack.

©Civil Services Club Bhopal-7747068666 Page 66


36. What is the most prominent component of the Internet model?
Ans. IP
Explanation.The most prominent component of the Internet model is the Internet
Protocol (IP).
37. How many versions of the Internet Protocol exist?
Ans. Two
Explanation.Two versions of the Internet Protocol exist, IPv4 and IPv6.
38. What does a DNS resolver do?
Ans. Resolves domain names
Explanation.A DNS resolver consults name servers to resolve the domain name to
determine the IP Address.
39. What is the suite of protocols in the Internet Protocol Suite also called?
Ans. TCP/IP
Explanation.The suite of protocols in the Internet Protocol Suite is also called
TCP/IP, based on the first two components.
40. What does the transport layer provide apart from ordered, reliable
delivery?
Ans. Unreliable datagram service
Explanation.Apart from ordered, reliable delivery (TCP), the transport layer also
provides an unreliable datagram service (UDP).
41. What is the principal internetworking protocol that lends its name to voice
over Internet Protocol (VoIP)?
Ans. Internet Protocol (IP)
Explanation.The Internet Protocol (IP) lends its name to voice over Internet
Protocol (VoIP), which is a common communications service realized with the
Internet.
42. What is the main benefit of VoIP systems over traditional telephone calls?
Ans. Substantial cost savings
Explanation.VoIP systems offer substantial cost savings over traditional telephone
calls, especially over long distances.
43. What are the main methods of transferring large amounts of data across
the Internet?
Ans. File sharing, uploading to websites or FTP servers, and using peer-to-peer
networks

©Civil Services Club Bhopal-7747068666 Page 67


Explanation.File sharing, uploading to websites or FTP servers, and using peer-to-
peer networks are common methods of transferring large amounts of data across the
Internet.
44. How is the load of bulk downloads to many users eased?
Ans. By using "mirror" servers or peer-to-peer networks
Explanation.The load of bulk downloads to many users can be eased by using
"mirror" servers or peer-to-peer networks.
45. What is the term for the real-time delivery of digital media for immediate
consumption or enjoyment by end users?
Ans. Streaming media
Explanation.Streaming media refers to the real-time delivery of digital media for
immediate consumption or enjoyment by end users.
46. What is the bandwidth requirement for standard image quality streaming
at SD 480p?
Ans. 1 Mbit/s
Explanation.Standard image quality streaming at SD 480p requires a 1 Mbit/s link
speed.
47. What popular website is the leading platform for free streaming video with
more than two billion users?
Ans. YouTube
Explanation.YouTube, founded on 15 February 2005, is the leading website for free
streaming video with more than two billion users.
48. What is the term for the variation of streaming media where material is
downloaded and played back on a computer or portable media player?
Ans. Podcasting
Explanation.Podcasting is the variation of streaming media where material is
downloaded and played back on a computer or portable media player.
49. What is the term for the low-cost extension of streaming media
phenomenon that allows users to watch live video feeds from various
locations worldwide?
Ans. Webcams
Explanation.Webcams are a low-cost extension of the streaming media
phenomenon that allows users to watch live video feeds from various locations
worldwide.
50. Who used the NeXT Computer at CERN that became the world’s first Web
server?
Ans. Tim Berners-Lee

©Civil Services Club Bhopal-7747068666 Page 68


Explanation. The NeXT Computer was used by Tim Berners-Lee at CERN and it
became the world’s first Web server.
51. What is the main access protocol of the World Wide Web?
Ans. HTTP
Explanation.Hypertext Transfer Protocol (HTTP) is the main access protocol of the
World Wide Web.
52. What does the World Wide Web enable individuals and organizations to do
at greatly reduced expense and time delay?
Ans. Publish
Explanation. The Web has enabled individuals and organizations to publish ideas
and information to a potentially large audience online at greatly reduced expense
and time delay.
53. What is the form of marketing and advertising which uses the Internet to
deliver promotional marketing messages to consumers?
Ans. Online advertising
Explanation.Online advertising is a form of marketing and advertising which uses
the Internet to deliver promotional marketing messages to consumers.
54. What has the World Wide Web enabled compared to printed media, books,
encyclopedias, and traditional libraries?
Ans. Decentralization of information
Explanation.Compared to printed media, books, encyclopedias and traditional
libraries, the World Wide Web has enabled the decentralization of information on a
large scale.
55. What is the sale of products and services directly via the Web called?
Ans. E-commerce
Explanation.E-commerce is the sale of products and services directly via the Web.
56. What are websites often created using?
Ans. Content management software
Explanation.Websites are often created using content management software with,
initially, very little content.
57. What is a subnet?
Ans. Logical subdivision of an IP network
Explanation. A subnet is a logical subdivision of an IP network, created by dividing a
network into two or more networks, known as subnetting.
58. How is traffic exchanged between subnetworks?
Ans. Through routers

©Civil Services Club Bhopal-7747068666 Page 69


Explanation.Traffic is exchanged between subnetworks through routers when the
routing prefixes of the source and destination addresses differ.
59. What is the default route used by end-nodes to reach nodes on different
subnetworks?
Ans. Default gateway
Explanation.End-nodes typically use a default gateway that points toward an ISP
providing transit to reach nodes on different subnetworks.
60. Which social media platform operates under the umbrella of Meta, Inc.?
Ans. Facebook (Whatsapp + Instagram)
Explanation.Meta, Inc. owns platforms like Instagram, WhatsApp, and Threads in
addition to Facebook.
61. What is the monthly active user count for Facebook?
Ans. 3 billion
Explanation.As of November 2023, Facebook has 3 billion monthly active users.
62. In which year was Facebook launched?
Ans. 2004
63. Name one of the founders of Facebook.
Ans. Mark Zuckerberg
64. Which company owns platforms like Instagram, WhatsApp, and Threads?
Ans. Meta, Inc.
65. Which social media platform has the highest number of Monthly Active
Users (MAU)?
Ans. Facebook
Explanation.Facebook has the highest number of MAU at 3 billion.
66. Which social media platform was launched in 2003?
Ans. Twitter
Explanation. According to the data, Twitter was launched in the year 2003.
67. Which social media platform was launched most recently?
Ans. Threads
Explanation.Threads was launched in 2023, which is the most recent launch year.
68. What is the headquarters location of YouTube?
Ans. San Bruno, California
69. Name one of the founders of YouTube.

©Civil Services Club Bhopal-7747068666 Page 70


Ans. Jawed Karim
70. What is the monthly active user count for YouTube?
Ans. 2.5 billion
Explanation.As of November 2023, YouTube has 2.5 billion monthly active users.
71. Which platform is YouTube's TikTok rival?
Ans. YouTube Shorts
Explanation.YouTube Shorts is YouTube's short-form video feature, similar to
TikTok.
72. Who are the founders of Snapchat?
Ans. Evan Spiegel, Bobby Murphy, Daniel Smith, David Kravitz, Leo Noah Katz
Explanation. Snapchat was founded by Evan Spiegel, Bobby Murphy, Daniel Smith,
David Kravitz, and Leo Noah Katz.
73. Which social media platform was rebranded as “X”?
Ans. Twitter
Explanation.Twitter was rebranded as “X”.
74. Who purchased Twitter and rebranded it as “X”?
Ans. Elon Musk
Explanation. Elon Musk, the CEO of Tesla, purchased Twitter and rebranded it as
“X”.
75. Who are the founders of X (formerly Twitter)?
Ans. Jack Dorsey, Evan Williams, Biz Stone, Noah Glass
76. In which year was X (formerly Twitter) launched?
Ans. 2006
77. Where are the headquarters of X (formerly Twitter) located?
Ans. San Francisco, CA
78. What is Reddit often referred to as?
Ans. The front page of the internet.
Explanation.Reddit is known as "the front page of the internet" due to its vast and
diverse range of content.
79. What is LinkedIn known for in terms of its user base?
Ans. It has a vast community of professionals, including over 180 million users
holding senior roles.
Explanation.LinkedIn is popular among professionals, with a large number of users
in influential positions.

©Civil Services Club Bhopal-7747068666 Page 71


80. Which social media platform did Mark Zuckerberg found last year?
Ans. Threads.
Explanation.Mark Zuckerberg, the founder of Facebook, also founded Threads, a
text-based app launched in 2023.
81. What distinguishes Threads from other social media platforms like X
(formerly Twitter)?
Ans. Threads focuses on creating a positive community space
Explanation.Threads aims to differentiate itself by providing a more positive
community environment compared to other platforms.
82. What is the requirement to sign up for Threads?
Ans. You need to have an Instagram account.
Explanation.Threads requires users to have an Instagram account in order to sign
up, as it is integrated with Instagram.
83. What milestone did Threads achieve shortly after its launch?
Ans. It surpassed 150 million downloads, becoming the most successful social
media platform launch in history.
Explanation.Threads gained significant traction shortly after its launch, surpassing
150 million downloads.
84. What is WeChat's main function?
Ans. Messaging.
Explanation.WeChat was originally a messaging app but has evolved into an all-in-
one platform offering various services like shopping, payments, and more.
85. Which social media platform recently overtook Google as the most visited
internet site?
Ans. TikTok
Explanation.TikTok, also known as Douyin in China, recently overtook Google as the
most visited internet site, despite launching in 2017.
86. What is Telegram's distinctive feature regarding security?
Ans. End-to-end encryption for all activities.
Explanation. Telegram offers end-to-end encryption for all activities, including
chats, groups, and media shared between participants.
87. What does "Weibo" mean in Chinese?
Ans. Micro-blog.
Explanation."Weibo" means "micro-blog" in Chinese, and Sina Weibo is a
microblogging platform similar to Twitter and Instagram.

©Civil Services Club Bhopal-7747068666 Page 72


88. How does Pinterest drive traffic to websites?
Ans. Users "pin" photos that link to websites, product pages, blog posts, and
other content across the internet.
Explanation.Pinterest allows users to pin photos that link to external content,
driving traffic to websites and other online resources.
89. What is the main function of QQ?
Ans. Messaging.
Explanation.QQ is a messaging app with 571 million monthly active users, offering
messaging services across multiple devices with no limits on media sizes.
90. What is the number of Monthly Active Users (MAUs) on Quora?
Ans. 300 million
Explanation. Quora is a community-based Q&A website and app with 300 million
MAUs.
91. What is the primary user base of Discord?
Ans. Gamers
Explanation.Discord is a communication platform primarily designed for gamers.
92. Which live-streaming platform has become a central hub for the gaming
and esports communities?
Ans. Twitch
Explanation.Twitch is a live-streaming platform for gamers and has become a
central hub for the gaming and esports communities.
93. Which social media platform hit app stores in 2023 with a record-breaking
rise to 100 million sign-ups in a matter of days?
Ans. Threads by Instagram
Explanation. Instagram’s Twitter alternative, Threads, hit app stores in 2023 with a
record-breaking rise to 100 million sign-ups in a matter of days.
94. Who created the social networkBluesky?
Ans. Jack Dorsey
Explanation.Bluesky was created by former Twitter CEO Jack Dorsey while he was
still in the role.
95. What is the primary function of Baidu Tieba?
Ans. Internet forum.
Explanation.Baidu Tieba is an internet forum offered by China's Baidu, based on
keyword searches from the Baidu search engine.
96. What is the key feature of Academia?

©Civil Services Club Bhopal-7747068666 Page 73


Ans. Allows researchers to share their papers and monitor their impact.
Explanation.Academia is a platform for academics and researchers to share
academic research, with a key feature of sharing papers and monitoring their
impact.
97. Which social media platform was founded by Tencent in 2011?
Ans. WeChat.
Explanation.WeChat was founded by Tencent in 2011 and has since become one of
China's most popular social media platforms.
98. Which social media platform is owned by Alphabet?
Ans. YouTube
Explanation. YouTube, which was launched in 2005, is owned by Alphabet.
99. When was Koo launched?
Ans. 2020.
Explanation.Koo was launched in early 2020 as a microblogging and social
networking service.
100. Who are the founders of Koo?
Ans. Aprameya Radhakrishna and Mayank Bidawatka.
Explanation.Aprameya Radhakrishna and Mayank Bidawatka are the co-founders of
Koo, an Indian microblogging and social networking service.

©Civil Services Club Bhopal-7747068666 Page 74


©Civil Services Club Bhopal-7747068666
7747068666 Page 75

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy