1. Identify the correct order of following different types of storage/memory components in a computer on the basis of price per bytes of storage from most expensive to least expensive
(A) DDR4 RAM
(D) CPU Cache
(1) (A), (D). (C). (B)
(2) (D). (A). (C). (B)
(3) (A). (B). (C). (D)
(4) (D). (A). (B). (C)
Explanation: As per hierarchy it ranges from top most are most expensive to bottom least expensive from Registers, cache, Main memory: RAM, ROM here its can be its type: Double Data Rate 4 Random-Access Memory, Secondary memory: solid state drive, Hard disk drive
> magnetic disc (HDD) manufacturing is much less expensive than flash chip production (SDD).
2. Match List I with List II :
(Digital Initiative) (Objective)
(A) NAD (I) Utilization of satellite communication technologies for transmission of education e-contents through National channels
(B) SWAYAM PRABHA (II) All-digital library that stores information (metadata) about different types of digital contents. (C) NDL (III) 24×7 online storehouse of all academic awards viz. Certificates, degrees, etc.
(D) SWAYAM (IV) Offers various online courses for school education and higher education.
1. (A)-(II). (B)-(I), (C)-(III), (D)-(IV)
2. (A)-(III). (B)-(I), (C)-(II), (D)-(IV)
3. (A)-(IV), (B)-(I), (C)-(II), (D)-(III)
4. (A)-(III), (B)-(IV), (C)-(II), (D)-(I)
Explanation: > Candidates can store all academic awards like Certificates, degrees etc at NAD national academic depository
> SWAYAM PRABHA DTH TV channel for educational courses
> NDL National Digital Library repository of learning resources convert and provides content in e form
> SWAYAM offers Massive Open online courses from school to higher education
3. Ankur receives an email informing him that his credit card is going to be canceled. The email advises him to click on the provided link and sign into his online banking account to prevent this from happening, which he does. A week later. Ankur notices that 10,000 has been withdrawn from his bank account. What has Ankur fallen victim to?
1. A phishing scam
2. A Trojan horse
3. Online blackmail
4. A virus
Explanation: Phishing are similar looking email, telephone or text message from fake identify, Pretending to be a legitimate organisation in order to obtain confidential information such as personally identifiable information, banking and credit card information, and passwords.
4. Microsoft Access, Oracle & SQL are examples of
A. File Database
B. Relational Database
Explanation: For storing, manipulating, and preserving data, a relational database employs SQL.
5. Statement I: The purpose of ICT interventions in classroom teaching is to promote and optimize learning outcomes.
Statement II: Most of the online methods like Swayam and MOOCs etc. have the potential to become effective supplements to conventional teaching-learning systems.
A. Both Statement I and Statement II are true
B. Both Statement I and Statement II are false
C. Statement I is correct but Statement II is false
D. statement I is incorrect but Statement II is true
Explanation: Both are correct as > The aim of using ICT in the classroom is to improve and encourage learning outcomes.
> The majority of online tools, such as Swayam and MOOCs, have the potential to be useful supplements to traditional teaching-learning systems.
6. Operating system is an interface between
A. Compiler and hardware
B. Software and hardware
C. User and Computer
D. Program and software
Explanation: An operating system (OS) is a software programme that connects a computer user to its hardware. File management, memory management, process management, managing input and output, and controlling peripheral devices such as disc drives and printers are all performed by an operating system.
7. Which technology is used for cryptocurrency?
Explanation: Blockchain is the infrastructure that allows cryptocurrency to function (among other things).
A blockchain registers all peer-to-peer transactions. Participants can validate transactions without the need for a central clearing authority using this technology. Fund transfers, trade settlement, voting, and a variety of other topics are all possible applications.
8. Statement I: In a peer-to-peer network, there is no central server instead each computer can act as a server as well as a client.
Statement II: LAN is a computer network created for individual person.
1. Both Statement I and Statement II are true
2. Both Statement I and Statement II are false
3. Statement I is correct but Statement II is false
4. Statement I is incorrect but Statement II is true
Explanation: Peer-to-Peer Network (P2P) is a form of peer-to-peer
> The nodes or computer systems that are linked to each other are referred to as ‘peers.’ Each node in this network is linked to every other node in the network.
> Each node in a peer-to-peer network will act as both a server and a client. The client and server are not distinguished in this network. Depending on whether the node is requesting or delivering the service, each node will act as both a client and a server
9. Which of the following keys of the keyboard are called modifier keys?
Choose the correct option from those given below:
1. a), b) and c)
2. a), b) and d)
3. a), c) and d)
4. b), c) and d)
Explanation: Modifier key on a computer keyboard changes the usual operation of another key when we press them together. Modifier keys alone do not have any effect they work in combination; for example, pressing the Shift, Alt, or Ctrl keys does not cause the machine to perform any action.
10. Full form of the abbreviation CPS is :
A. Computer Program Software
B. Control Process Software
C. Cyber-Physical Software
D. Cyber-Physical System
Explanation: CPS integrates digital/ cyber elements with physical objects (e.g. computers, autonomous vehicles) and data with communication, data collection & analysis, computation, decision making, and action capabilities. Organizations may use Cyber-Physical Systems to make prompt and effective interventions and actions.
> Union Cabinet chaired by Prime Minister Shri Narendra Modi has approved the launching of National Mission on Interdisciplinary Cyber-Physical Systems (NM-ICPS) on 1st February 2018
> Cyber-Physical Systems (CPS) should be made a national task, according to Vigyan 2030, which notes that “CPS will resolve the threat to employment, stability, and strategic requirements that the new industrial revolution poses.” By generating new directions and preparation, the aim is to ensure opportunity.