In an e-Office system, a confidential file is sent digitally from a section officer to a higher authority. The department wants to ensure that only the intended officer can read the file during transmission. Which of the following ensures confidentiality during transmission?
The correct answer is B) Encrypting the file using the recipient's public key.
In the context of Public Key Infrastructure (PKI) and digital security, different tools serve different purposes. To ensure confidentiality (making sure only the intended recipient can read it), encryption is required.
Describe the issue with this question. Our team will review it.
Question ID: 11067
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following is incorrect regarding the use of modern computer applications in field operations of a Forest Department?
The incorrect statement is C) Forest apps replace the need for physical field inspections completely.
Modern computer applications significantly enhance the efficiency of Forest Department operations, but they do not eliminate the necessity for on-ground presence.
A) Mobile apps for photographs (Correct): Field staff use specialized apps to document tree health, illegal felling, or wildlife sightings. These photos often serve as legal evidence in "damage cases."
B) GIS-enabled apps (Correct): Geographic Information Systems (GIS) allow officers to overlay GPS coordinates of their current location with satellite imagery to monitor forest cover changes, boundary encroachments, and fire hotspots in real-time.
C) Replacing physical inspections (Incorrect): While apps streamline data collection, physical inspections are still mandatory for verifying ground realities, interacting with local communities, and performing tasks that sensors or cameras cannot (like manual soil testing or marking trees for silvicultural operations).
D) Working without network (Correct): Many professional field apps (like QField or ArcGIS Field Maps) are designed for offline use. Since forests often have poor connectivity, data is stored locally on the device and synchronized with the central server once the staff returns to a network zone.
Describe the issue with this question. Our team will review it.
Question ID: 11066
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following statements is correct regarding computer viruses and modern antivirus systems?
The correct answer is B) Signature-based antivirus detects only previously identified malware patterns.
Here is a detailed look at why this statement is true and why the others are misconceptions:
Signature-based Detection (True): This traditional method works like a "Most Wanted" list. The antivirus compares the code of files on your computer against a database of known malware "signatures" (unique strings of bits). If it hasn't seen that specific pattern before, it won't flag it.
A) Execution (False): By definition, a computer virus usually requires a host program to be executed or some form of user action (like opening an attachment or running an infected .exe) to begin its spread. In contrast, a Worm is the type of malware that can self-replicate and spread across networks automatically without user intervention.
C) Zero-day Attacks (False): A Zero-day attack exploits a vulnerability that is unknown to the software vendor or antivirus company. Since there is no "patch" or "signature" yet, online registration or standard antivirus updates cannot guarantee protection against them. Only advanced Heuristic/Behavioral analysis can help mitigate these.
D) Firewall vs. Antivirus (False): They are distinct layers of security. A Firewall acts as a barrier for network traffic (checking "who" is coming in and out of your internet connection), while an Antivirus scans and monitors the "files" and "programs" already on or entering your system to find malicious code.
Describe the issue with this question. Our team will review it.
Question ID: 11065
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following statements is true regarding KMZ files and geo-tagged photos?
The correct answer is B) Geo-tagging embeds latitude and longitude inside image metadata.
Here is the technical breakdown of how these technologies work:
Geo-tagging (True): When you take a photo with a GPS-enabled device, the coordinates (latitude, longitude, and often altitude) are written into the EXIF (Exchangeable Image File Format) metadata of the image. This data travels with the file, allowing mapping software to pin the photo to a specific location.
KMZ Files (A & C are False): A KMZ file is a compressed (zipped) version of a KML (Keyhole Markup Language) file. It is specifically designed to store geographic data, including coordinates, 3D models, and images. Because it is a zip file, it can "bundle" images together with their corresponding location data so they can be viewed in applications like Google Earth.
Automatic Creation (D is False): Simply uploading a geo-tagged photo does not automatically generate a KMZ file. A KMZ must be specifically created or "saved as" using GIS (Geographic Information System) software or mapping tools to package the image and its coordinates into that specific format.
Describe the issue with this question. Our team will review it.
Question ID: 11064
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A student uploads a PDF file to an online PDF-to-JPG converter website. After conversion, he downloads the JPG files but later notices:
The images are blurred
File size is much larger than expected
Text cannot be copied anymore
Which of the following is the most accurate reason?
The correct answer is A) The PDF was converted into raster images.
This scenario highlights the fundamental difference between Vector and Raster formats:
Rasterization: A PDF often contains vector data (like text and shapes) which is mathematically defined and infinitely scalable. When you convert it to a JPG, the website "rasterizes" the content, turning it into a fixed grid of pixels.
Blurriness: Because JPGs are raster images, if the conversion resolution (DPI) is low, the images will appear blurred or pixelated when viewed at full size.
Larger File Size: Unlike text in a PDF, which takes up very little space, a JPG must store color information for every single pixel in the image. This often leads to a larger file size than the original text-based PDF.
Text Selection: Since the JPG is now just a "picture" of the text, the computer no longer recognizes individual characters. You cannot highlight or copy text unless you use OCR (Optical Character Recognition) software.
Describe the issue with this question. Our team will review it.
Question ID: 11063
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A government launches a system where:
Citizens apply for documents online
Applications are automatically verified using databases
SMS/email updates are sent automatically
Officials approve requests digitally
Data is stored centrally and accessed across departments
Which of the following best explains the real contribution of Information Technology (IT) in this system
The correct answer is C) IT integrates communication, data processing, storage, and automation.
This scenario perfectly illustrates a comprehensive E-governance framework. Information Technology is not just a single tool here; it acts as an integrated system that transforms the entire workflow:
Communication: Automated SMS/email updates keep the citizen informed without manual intervention.
Data Processing: Automatic verification against databases ensures accuracy and speed that a human could not match manually.
Storage: Centralized data storage allows different departments to access the same information, eliminating the need for a citizen to submit the same document multiple times (the "Once-Only" principle).
Automation: The system handles routine tasks (routing applications, checking records), allowing officials to focus only on the final digital approval.
Describe the issue with this question. Our team will review it.
Question ID: 11062
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A student is using a computer with 8 GB RAM. He opens:
A web browser with 25 tabs
A video editing software
A music player
A code editor
After some time, the system becomes slow, but it does NOT crash. The hard disk activity light keeps blinking continuously even though he is not saving or opening files. Which of the following is the most accurate explanation?
The correct answer is C) The operating system is using virtual memory and swapping data between RAM and disk.
This scenario describes a classic case of Thrashing. Here is why:
Memory Overload: The student has opened several heavy applications (video editing, many browser tabs) that collectively require more than the available 8 GB of RAM.
Virtual Memory & Swapping: When RAM is full, the Operating System uses a portion of the hard disk (the Page File or Swap Space) as "Virtual Memory." It moves (swaps) data currently not in use from the RAM to the disk to make room for active tasks.
The "Slow" Effect: Hard disks (even SSDs) are significantly slower than RAM. The continuous blinking of the disk light indicates that the OS is frantically moving data back and forth between the RAM and the disk. This process is called Swapping.
Why it doesn't crash: The system remains functional because Virtual Memory allows it to handle more data than the physical RAM permits, though performance drops drastically.
Describe the issue with this question. Our team will review it.
Question ID: 11061
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Match the following:
Column -I --- Column - II
i. Firmware --- a. Translates high-level language into machine code
ii. Utility Software --- b. Controls communication between the operating system and the hardware device
iii. Device Driver --- c. Stored permanently in ROM to initialize hardware
iv. Compiler --- d. Performs system maintenance tasks like disk cleanup
Choose the correct option:
i. Firmware (i - c): This is a specific type of software "baked" into the hardware. It is stored permanently in ROM (Read-Only Memory) and provides the necessary instructions on how a device communicates with other computer hardware.
ii. Utility Software (ii - d): This software is designed to help analyze, configure, optimize, or maintain a computer. Examples include disk cleanup, antivirus, and file compression tools.
iii. Device Driver (iii - b): A specialized program that allows the operating system to communicate with a specific hardware device (like a printer or graphics card). Without the driver, the OS wouldn't know how to "talk" to the hardware.
iv. Compiler (iv - a): A language processor that translates an entire program written in high-level language (like C++ or Java) into machine code (binary) at once before execution.
Describe the issue with this question. Our team will review it.
Question ID: 11060
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following statements is true regarding applications of Information Technology?
A) E-governance (False): While E-governance makes services more efficient and accessible online, it does not entirely eliminate the need for physical offices. Many administrative tasks, legal verifications, and physical infrastructure management still require on-site government presence.
B) E-commerce (False): E-commerce is not limited to physical goods. It also includes the sale of digital products (e-books, software) and services (streaming subscriptions, travel bookings, and online consultations).
C) Telemedicine (True): This is a core application of IT in healthcare. It enables healthcare professionals to evaluate, diagnose, and treat patients at a distance using telecommunications technology like video calls and remote monitoring.
D) Online education (False): The primary benefit of online education is that students do not need to be physically present. They can access lectures and materials from any location with an internet connection.
Describe the issue with this question. Our team will review it.
Question ID: 11059
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A computer uses 8-bit 2's complement representation. Which of the following operations will cause overflow?
Note: Options A,B, C cause overflow but As per the Provisional Answer Key Option C is Correct
In 8-bit 2's complement representation, the range of representable integers is -128 to +127. An overflow occurs when the result of an addition falls outside this range. This happens if:
Two positive numbers are added and the result is negative (MSB is 1).
Two negative numbers are added and the result is positive (MSB is 0).
Based on the calculations, Options A, B, and C all cause an overflow.
Option A: $01010101 + 00110011$
Decimal: $85 + 51 = 136$.
$136$ is greater than the maximum limit of $127$.
Binary result: $10001000$ (The MSB is 1, interpreting two positive numbers as a negative result).
Result: Overflow.
Option B: $10011001 + 10101010$
Decimal: $-103 + (-86) = -189$.
$-189$ is less than the minimum limit of $-128$.
Binary result: $01000011$ (The MSB is 0, interpreting two negative numbers as a positive result).
Result: Overflow.
Option C: $01111111 + 00000001$
Decimal: $127 + 1 = 128$.
$128$ is greater than the maximum limit of $127$.
Binary result: $10000000$ (The largest positive number plus one yields the smallest negative number).
Result: Overflow.
Option D: $11110000 + 00010000$
Decimal: $-16 + 16 = 0$.
$0$ is within the range $[-128, 127]$.
Binary result: $00000000$.
Result: No Overflow.
Describe the issue with this question. Our team will review it.
Question ID: 11058
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ F5
Explanation:
In Microsoft PowerPoint, pressing F5 starts the slide show from the beginning.
F1 → Help
F7 → Spelling check
F9 → Refresh/other functions
✔️ So, the correct key is F5.
Describe the issue with this question. Our team will review it.
Question ID: 10762
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ Select Query
Explanation:
A Select Query retrieves data from a database and can apply conditions (using WHERE clause) to filter records.
Other queries:
Update Query → Modifies existing data
Append Query → Adds records to a table
Delete Query → Removes records
✔️ So, data based on a condition is retrieved using a Select Query.
Describe the issue with this question. Our team will review it.
Question ID: 10761
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ =
Explanation:
In Microsoft Excel, every formula must start with the equals sign (=) so Excel knows you’re entering a formula and not plain text.
✔️ So, the symbol used to start a formula in Excel is =
Describe the issue with this question. Our team will review it.
Question ID: 10760
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ Mail Merge
Explanation:
Mail Merge in MS Word allows you to combine a standard letter with a database of addresses or other data (like names, addresses) to create personalized documents.
Other options:
Track Changes → Tracks edits
Header & Footer → Adds info at top/bottom
AutoCorrect → Corrects spelling automatically
✔️ So, the correct feature is Mail Merge.
Describe the issue with this question. Our team will review it.
Question ID: 10759
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ SSL/TLS
Explanation:
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) encrypt email data, ensuring secure transmission and protecting it from interception.
Why others are not correct:
FTP → File transfer, not secure email
HTTP → Web browsing (not secure by default)
TCP → Data transport protocol, no encryption
✔️ So, secure email transmission is ensured by SSL/TLS.
Describe the issue with this question. Our team will review it.
Question ID: 10758
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ User Name and Domain Name
Explanation:
In an email address (for example, user@gmail.com):
user → User name
@ → Separator
gmail.com → Domain name
So, the "@" symbol separates the user name and the domain name ✔️
Describe the issue with this question. Our team will review it.
Question ID: 10757
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ Internet Service Provider
Explanation:
An ISP (Internet Service Provider) is a company or organization that provides users access to the internet (like Jio, Airtel, BSNL, etc.).
The other options are incorrect expansions of ISP.
✔️ So, the full form of ISP is Internet Service Provider.
Describe the issue with this question. Our team will review it.
Question ID: 10756
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ 1010
Explanation:
Decimal 10 in binary is:
10 ÷ 2 = 5 → remainder 0
5 ÷ 2 = 2 → remainder 1
2 ÷ 2 = 1 → remainder 0
1 ÷ 2 = 0 → remainder 1
Reading remainders from bottom to top → 1010
✔️ So, the binary equivalent of decimal 10 is 1010.
Describe the issue with this question. Our team will review it.
Question ID: 10755
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ Bit
Explanation:
A bit (binary digit) is the smallest unit of data in a computer and can have a value of 0 or 1.
Byte = 8 bits
Word = A group of bits processed together
Block = A collection of data units
So, the smallest unit is Bit ✔️
Describe the issue with this question. Our team will review it.
Question ID: 10754
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The correct answer is:
✅ Third generation
Explanation:
First generation → Vacuum tubes
Second generation → Transistors
Third generation → Integrated Circuits (ICs)
Fourth generation → Microprocessors
So, integrated circuits were introduced in the third generation of computers 👍
Describe the issue with this question. Our team will review it.
Question ID: 10753
Message must be at least 5 characters.
Message must not exceed 2000 characters.
MICR stands for Magnetic Ink Character Recognition. It is a technology used primarily by the banking industry to facilitate the processing and clearance of cheques and other documents.
How it works: Characters are printed using a special ink or toner that contains iron oxide (magnetic) particles. The MICR reader magnetizes the ink and then translates the magnetic signal into characters.
Why the others are incorrect:
OCR (Optical Character Recognition): Uses light/optics to read regular printed or handwritten text and convert it into machine-encoded text.
OMR (Optical Mark Recognition): Detects the presence or absence of a mark in a specific position, such as on bubbles in objective-type exam sheets.
Bar Code Reader: Uses a laser beam or light to read the widths of dark and light parallel lines (bars) to identify products.
Describe the issue with this question. Our team will review it.
Question ID: 10752
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A Plotter is a specialized output device designed to print high-quality vector graphics on very large sheets of paper.
Why it is most appropriate: Unlike standard printers that use dots (raster images) to form characters, plotters use pens or robotic arms to draw continuous, precise lines. This makes them ideal for technical documents like engineering blueprints, architectural plans, and CAD drawings where scale and precision are critical.
Limitations of others: Laser and Inkjet printers are generally limited to standard paper sizes (A4/A3) and can lose detail when scaling up very large technical schematics. Dot matrix printers are far too low-resolution for modern engineering requirements.
Describe the issue with this question. Our team will review it.
Question ID: 10751
Message must be at least 5 characters.
Message must not exceed 2000 characters.
The BIOS (Basic Input/Output System) is the firmware embedded on a computer's motherboard. Its primary job is to perform the POST (Power-On Self-Test), which initializes and tests the hardware components (like RAM, keyboard, and storage) before handing over control to the Boot Loader to load the Operating System.
Why the others are incorrect:
Device driver: This is software that allows the OS to communicate with a specific piece of hardware after the system has already started.
Compiler: This is a tool used by developers to translate source code (high-level language) into machine code; it has no role in the boot process.
Kernel: The kernel is the core part of the operating system itself. It is loaded by the BIOS/Boot Loader, rather than being the component that initializes the hardware.
Describe the issue with this question. Our team will review it.
Question ID: 10750
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Among the options listed, the Solid State Drive (SSD) provides the highest data transfer rates because it uses flash memory and has no moving parts.
Why it is faster: Unlike Hard Disk Drives (HDDs), Magnetic Tapes, or Optical Disks—all of which rely on physical spinning or mechanical movement to read/write data—SSDs access data electronically. This results in significantly lower latency and much higher read/write speeds.
Comparison: While a standard HDD might transfer data at around 150 MB/s, modern SSDs can reach speeds of 500 MB/s (SATA) to over 7,000 MB/s (NVMe).
Describe the issue with this question. Our team will review it.
Question ID: 10749
Message must be at least 5 characters.
Message must not exceed 2000 characters.
An Open-source license (like the GPL or Apache License) provides the legal framework that allows users to access the original source code, modify it to suit their needs, and redistribute those versions to others.
Why the others are incorrect:
Proprietary license: The source code is a trade secret; users are typically only given the right to run the software, not to see or change the code.
Freeware license: The software is free to use, but the source code remains closed and protected by the developer.
Shareware license: This is "try before you buy" software. It is usually proprietary and closed-source, offered for a limited time or with limited features to encourage a purchase.
Describe the issue with this question. Our team will review it.
Question ID: 10748
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which component of the CPU is responsible for controlling the sequence of operations and managing the flow of data?
The Control Unit (CU) acts as the "brain" or coordinator of the CPU. It decodes instructions from memory and generates signals that tell the other components (like the ALU and Registers) what to do and when to do it.
Why the others are incorrect:
Register: These are small, high-speed storage locations used to hold data temporarily during processing; they don't control the sequence.
Cache: This is high-speed volatile memory used to store frequently accessed data to speed up retrieval; it is a storage component, not a control component.
ALU (Arithmetic Logic Unit): This component performs the actual mathematical calculations and logical comparisons, but it only does so when directed by the Control Unit.
Describe the issue with this question. Our team will review it.
Question ID: 10747
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Android is based on the Linux kernel and is released under open-source licenses (primarily the Apache License). This allows developers and manufacturers to modify and distribute the software freely.
iOS, Windows Phone, and BlackBerry OS are all closed-source (proprietary) operating systems. This means the source code is kept private by the companies that own them (Apple, Microsoft, and BlackBerry, respectively), and only they can legally modify or distribute the software
Describe the issue with this question. Our team will review it.
Question ID: 10746
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Multitasking is the ability of an operating system to execute multiple tasks (programs) seemingly at the same time. It does this by rapidly switching the CPU's attention between different processes.
Describe the issue with this question. Our team will review it.
Question ID: 10745
Message must be at least 5 characters.
Message must not exceed 2000 characters.
When a computer is powered on, the Operating System (OS) is loaded from the hard drive (secondary storage) into the RAM (Random Access Memory), which is known as Primary Storage.
Why it stays there: The CPU can only access instructions and data that are stored in primary memory. For the OS to manage hardware, run applications, and respond to your commands in real-time, its core components must remain in the RAM as long as the computer is running.
Volatile nature: This is also why, when you restart or turn off the computer, the RAM is cleared, and the OS must be "booted" (reloaded) again from the disk drive.
Describe the issue with this question. Our team will review it.
Question ID: 10744
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Links a program with subordinate interferences: This is technically the job of a Linker or Loader, which are system utilities, though they often work within the OS environment.
Enables the programmer to draw a flowchart: This is the function of Application Software (like Lucidchart, Visio, or even MS Paint), not the Operating System itself.
Provides a layer, user-friendly interface: This is a core function. The OS provides the GUI (Graphical User Interface) or CLI (Command Line Interface) that allows users to interact with the hardware without needing to speak binary.
Describe the issue with this question. Our team will review it.
Question ID: 10743
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Login to view more questions
Login to Continue