You are on page 1of 226

U N I T- 8 INFORMATION & COMMUNICATION TECHNOLOGY

Previous Year Exam Questions

Exam Year – 2004


[December-2004] [December-2004]
1. ICT stands for: 5. Which of the following statement is NOT correct?
(1) International Communication Technology (1) Computer is capable of processing only digital
(2) Intera Common Terminology signal
(3) Information and Communication Technology (2) Computer is capable of analysing both
(4) Inter connected Terminals quantitative and qualitative data
[December-2004] (3) Appropriate software is required for processing
2. Which of the following is the appropriate the data
definition of Information Technology? (4) Computer is capable of processing digital as well
(1) Information Technology refers to the use of as analog signals
hardware and software for processing
information Exam Year – 2005
(2) Information Technology refers to the use of
hardware and software for distribution of useful [June-2005]
information 6. The acronym RAM Used in computer terminology
(3) Information Technology refers to the use of stands for
hardware and software for storage, retrieval, (1) Random Access Memory
processing and distributing information of many (2) Research Aptitude Model
kinds. (3) Read Access Memory
(4) Information Technology refers to the use of (4) None of the choices
principles of Physical sciences and Social [June-2005]
sciences for processing of information of many 7. The acronym INSAT stands for:
kinds. (1) India Satellite
[December-2004] (2) Indian National Satellite
3. Which of the following is correct statement? (3) Indian National Satellite training
(1) Computers can be used for diagnosing the (4) None of the choices
difficulty of a student in learning a subject [June-2005]
(2) Psychological testing can be done with the help 8. Which one of the following is not a computer
of computer provided a software is available language?
(3) A set of instructions is called a programme (1) COBOL (2) FORTRAN
(4) All the above (3) IUM (4) PASCAL
[December-2004] [June-2005]
4. Which of the following statement is correct? 9. Virus in computer is related with
(1) Virus improves the speed of processing (1) Dust Particles (2) Hardware
information through computer (3) Malware (4) All of the choices
(2) Internet does not allow the virus to spread [December-2005]
(3) Virus is a part of software 10. Which of the following is not the characteristic of
(4) Virus is an operating system a computer?
(1) computer is an electrical machine
(2) computer cannot think at its own
(3) computer processes information error free
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 2

(4) computer can hold data for any length of time (3) Computer is an electronic device that can store,
retrieve and quickly process only quantitative
data.
[December-2005] (4) Computer is a machine that can store, retrieve
11. In the hypermedia database, information bits are and process quickly and accurately only
stored in the form of: qualitative information
(1) signals (2) cubes [December-2006]
(3) nodes (4) symbols 19. LAN stands for:
[December-2005] (1) Local And National
12. Line access and avoidance of collision are the (2) Local Area Network
main functions of: (3) Large Area Network
(1) the CPU (2) the monitor (4) Live Area Network
(3) network protocols (4) wide area networks [December-2006]
20. Which of the following is the appropriate format
Exam Year – 2006 of URL of e-mail?
[June-2006] (1) www_mail.com (2) www@mail.com
13. In web search, finding a large number of (3) www@mailcom (4) www.mail.com
documents with very little relevant information
is termed: Exam Year – 2007
(1) poor recall (2) web crawl
(3) poor precision rate (4) poor web response [June-2007]
[June-2006] 21. “Dpi” stands for:
14. Using websites to pour out one's grievances is (1) Dots per inch (2) Digits per unit
called: (3) Dots pixel inch (4) Diagrams per inch
(1) cyber venting (2) cyber ranting [June-2007]
(3) web hate (4) web plea 22. On the keyboard of computer each character has
[June-2006] an “ASCII” value which stands for:
15. The concept of connect intelligence is derived (1) American Stock Code for Information
from: Interchange
(1) virtual reality (2) American Standard Code for Information
(2) fuzzy logic Interchange
(3) Bluetooth technology (3) African Standard Code for Information
(4) value added networks Interchange
[June-2006] (4) Adaptable Standard Code for Information
16. Use of an ordinary telephone as an Internet
Change
applicance is called:
[June-2007]
(1) voice net (2) voice telephone
23. Transfer of data from one application to another
(3) voice line (4) voice portal
line is known as:
[June-2006]
(1) Dynamic Disk Exchange
17. Video transmission over the Internet that looks
(2) Dodgy Data Exchange
like delayed live casting is called:
(3) Dogmatic Data Exchange
(1) virtual video (2) direct broadcast
(4) Dynamic Data Exchange
(3) video shift (4) real-time video
[June-2007]
[December-2006]
18. Which of the following is the appropriate 24. Which part of the Central Processing Unit (CPU)
definition of a computer? performs calculation and makes decisions:
(1) Computer is a machine that can process (1) Arithematic Logic Unit
information. (2) Alternating Logic Unit
(2) Computer is an electronic device that can store, (3) Alternate Local Unit
retrieve and process both qualitative and (4) American Logic Unit
quantitative data quickly and accurately. [December-2007]
25. RAM means:
(1) Random Access Memory
(2) Rigid Access Memory

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 3

(3) Rapid Access Memory (1) PASCAL (2) UNIX


(4) Revolving Access Memory (3) FORTRAN (4) COBOL
[June-2008]
[December-2007] 34. Corel Draw is a popular:
26. Data can be saved on backing storage medium (1) Illustration programme
known as: (2) Programming language
(1) Compact Disk Recordable (3) Text programme
(2) Computer Disk Rewritable (4) None of these
(3) Compact Disk Rewritable [December-2008]
(4) Computer Data Rewritable 35. Errors in computer programmes are called:
[December-2007] (1) Follies (2) Mistakes
27. The ‘brain’ of a computer which keeps (3) Bugs (4) Spam
peripherals under its control is called: [December-2008]
(1) Common Power Unit 36. Which of the following is the appropriate
(2) Common Processing Unit definition of a computer?
(3) Central Power Unit (1) Computer is a machine that can process
(4) Central Processing Unit information.
[December-2007] (2) Computer is an electronic device that can store,
28. CD ROM stands for: retrieve and process both qualitative and
(1) Computer Disk Read Only Memory quantitative data quickly and accurately.
(2) Compact Disk Read Over Memory (3) Computer is an electronic device that can store,
(3) Compact Disk Read Only Memory retrieve and quickly process only quantitative
(4) Computer Disk Read Over Memory data.
[December-2007] (4) Computer is a machine that can store, retrieve
29. WWW represents: and process quickly and accurately only
(1) who what and where qualitative information
(2) weird wide web [December-2008]
(3) word wide web 37. ‘Micro Processing’ is made for:
(4) world wide web (1) Computer (2) Digital System
(3) Calculator (4) Electronic Goods
[December-2008]
Exam Year – 2008 38. HTML is basically used to design:
[June-2008] (1) Web-page (2) Web-site
30. WYSIWYG - describes the display of a document (3) Graphics (4) Tables and Frames
on screen as it will actually print: [December-2008]
(1) What you state is what you get 39. The accounting software ‘Tally’ was developed by:
(2) What you see is what you get (1) HCL (2) TCS
(3) What you save is what you get (3) Infosys (4) Wipro
(4) What you suggest is what you get [December-2008]
[June-2008] 40. Information, a combination of graphics, text,
31. An E-mail address is composed of: sound, video and animation is called:
(1) two parts (1) Multiprogramme (2) Multifacet
(2) three parts (3) Multimedia (4) Multiprocess
(3) four parts
(4) five parts Exam Year – 2009
[June-2008]
32. A key-board has at least: [June-2009]
(1) 91 keys (2) 101 keys 41. Which was the first company to launch mobile
(3) 111 keys (4) 121 keys phone services in India?
[June-2008] (1) Essar (2) BPL
33. Which of the following is not a Computer (3) Hutchison (4) Airtel
language?
[June-2009]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 4

42. What do you need to put your web pages on the 51. Which one of the following is an example of
www? Operating System?
(1) a connection to internet (2) a web browser (1) Microsoft Word (2) Microsoft Excel
(3) a web server (4) all of the above (3) Microsoft Access (4) Microsoft
[December-2009] Windows
43. A compiler is used to convert the following to [June-2010]
object code which can be executed 52. Computers on an internet are identified by
(1) High-level language (2) Low-level language (1) e-mail address (2) street address
(3) Assembly language (4) Natural language (3) IP address (4) None of the above
[December-2009] [December-2010]
44. Which one of the following is not a network 53. S/MIME in Internet technology stands for
device? (1) Secure Multipurpose Internet Mail Extension
(1) Router (2) Switch (2) Secure Multimedia Internet Mail Extension
(3) Hub (4) CPU (3) Simple Multipurpose Internet Mail Extension
[December-2009] (4) Simple Multimedia Internet Mail Extension
45. Which one of the following is not a linear data [December-2010]
structure? 54. The set of computer programs that manage the
(1) Array (2) Binary Tree hardware/ software of a computer is called
(3) Queue (4) Stack (1) Compiler system (2) Operation system
[December-2009] (3) Operating system (4) None of these
46. Bit stands for [December-2010]
(1) binary information term (2) binary digit 55. 1 GB is equal to
(3) binary tree (4) Bivariate Theory (1) 230 bits (2) 230 bytes
20
[December-2009] (3) 2 bits (4) 220 bytes
47. Which is the largest unit of storage among the [December-2010]
following? 56. The binary equivalent of (-15) 10 is (2’s
(1) Terabyte (2) Megabyte complement system is used)
(3) Kilobyte (4) Gigabyte (1) 11110001 (2) 11110000
[December-2009] (3) 10001111 (4) None of these
48. Which of the following is not related to [December-2010]
information security on the Internet? 57. The hexadecimal number system consists of the
(1) Data Encryption symbols
(2) Water marking (1) 0-7 (2) 0-9, A-F
(3) Data Hiding (3) 0-7, A-F (4) None of
(4) Information Retrieval these
[December-2010]
58. Which one of the following is not an Internet
Exam Year – 2010 Service Provider (ISP)?
[June-2010] (1) MTNL
49. Where does a computer add and compare its (2) BSNL
data? (3) ERNET India
(1) CPU (4) Infotech India Ltd.
(2) Memory
(3) Hard disk Exam Year – 2011
(4) Floppy disk
[June-2010] [June-2011]
50. Which one of the following is different from other 59. HTML stands for
members? (1) Hyper Text Markup Language
(1) Google (2) Windows (2) Hyper Text Manipulation Language
(3) Linux (4) Mac (3) Hyper Text Managing Links
(4) Hyper Text Manipulating Links
[June-2010] [June-2011]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 5

60. DNS in internet technology stands for (2) Photo placement


(1) Dynamic Name System (3) Photo cutting
(2) Domain Name System (4) Photo colour adjustment
(3) Distributed Name System [December-2011]
(4) None of these 69. HTML is used to create
[June-2011] (1) machine language program
61. The binary equivalent of (-19) 10
in signed (2) high level program
magnitude system is (3) web page
(1) 11101100 (2) 11101101 (4) web server
(3) 10010011 (4) None of these [December-2011]
[June-2011] 70. High level programming language can be
62. The octal number system consists of the following converted to machine language using which of
symbols: the following?
(1) 0-7 (2) 0-9 (1) Oracle
(3) 0-9, A-F (4) None of the (2) Compiler
above (3) Mat lab
[June-2011] (4) Assembler
63. Which of the following is type of LAN?
(1) Ethernet
Exam Year – 2012
(2) Token Ring
(3) FDDI [June-2012]
(4) All of the above 71. Minimum number of bits required to store any 3
[December-2011] digit decimal number is equal to
64. IPv4 and IPv6 are addresses used to identify (1) 3 (2) 5
computers on the internet. Find the correct (3) 8 (4) 10
statement out of the following: [June-2012]
(1) Number of bits required for IPv4 address is more 72. Which of the following is not a programming
than number of bits required for IPv6 address. language?
(2) Number of bits required for IPv4 address is same (1) Pascal
as number of bits required for IPv6 address. (2) Microsoft Office
(3) Number of bits required for IPv4 address is less (3) Java
than number of bits required for IPv6 address. (4) C++
(4) Number of bits required for IPv4 address is 64. [June-2012]
[December-2011] 73. Each character on the keyboard of computer has
65. The term DNS stands for an ASCII value which stands for
(1) Domain Name System (1) American Stock Code for Information
(2) Defense Nuclear System Interchange
(3) Downloadable New Software (2) American Standard Code for Information
(4) Dependent Name Server Interchange
[December-2011] (3) African Standard Code for Information
66. If (y)x represents a number y in base x, then Interchange
which of the following numbers is smallest of all? (4) Adaptable Standard Code for Information
(1) (1111) 2 (2) (1111) 8 Change
(3) (1111) 10 (4) (1111) 16 [June-2012]
[December-2011] 74. Conferences are meant for
67. The term ‘SITE’ stands for (1) Multiple target groups
(1) Satellite Indian Television Experiment (2) Group discussions
(2) Satellite International Television Experiment (3) Show-casing new Research
(3) Satellite Instructional Television Experiment (4) All the above
(4) Satellite Instructional Teachers Education [June-2012]
[December-2011] 75. Video-Conferencing can be classified as one of the
68. Photo bleeding means following types of communication:
(1) Photo cropping

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 6

(1) Visual one way (4) a type of memory used in super computers.
(2) Audio-Visual one way [September-2013]
(3) Audio-Visual two way 85. CLASS stands for
(4) Visual two way (1) Complete Literacy and Studies in Schools
[December-2012] (2) Computer Literates and Students in Schools
76. A Personal Computer uses a number of chips (3) Computer Literacy and Studies in Schools
mounted on a circuit board called (4) Centre for Literacy and Studies in Schools
(1) Microprocessor (2) System Board [September-2013]
(3) Daughter Board (4) Mother Board 86. GIF stands for
[December-2012] (1) Global Information Format
77. ALU stands for (2) Graphics Information Format
(1) American Logic Unit (3) Graphics Interchange File
(2) Alternate Local Unit (4) Graphics Interchange Format
(3) Alternating Logic Unit [September-2013]
(4) Arithmetic Logic Unit 87. Which one of the following is not an Operating
[December-2012] System?
78. __________ is a protocol used by e-mail clients to (1) IBM AIX (2) Linux
download e-mails to your computer. (3) Sun Solaris (4) Firefox
(1) TCP (2) FTP [September-2013]
(3) SMTP (4) POP 88. Commercial messages on the net are identified as
[December-2012] (1) Net ads
79. The file extension of MS-Word document in Office (2) Internet commercials
2007 is _________ (3) Webmercials
(4) Viral advertisements
(1) .pdf (2) .doc
(3) .docx (4) .txt
Exam Year – 2014
[December-2012]
80. Computer Virus is a [June-2014]
(1) Hardware (2) Bacteria 89. The acronym FTP stands for
(3) Software (4) None of these (1) File Transfer Protocol
(2) Fast Transfer Protocol
Exam Year – 2013 (3) File Tracking Protocol
(4) File Transfer Procedure
[June-2013] [June-2014]
81. A Gigabyte is equal to 90. Identify the IP address from the following:
(1) 1024 Megabytes (2) 1024 Kilobytes (1) 300.215.317.3
(3) 1024 Terabytes (4) 1024 Bytes (2) 302.215 @ 417.5
[June-2013] (3) 202.50.20.148
82. A hard disk is divided into tracks which is further (4) 202.50.20.148
subdivided into [June-2014]
(1) Clusters (2) Sectors 91. Which one of the following is not the same as the
(3) Vectors (4) Heads other three?
[June-2013] (1) MAC address (2) Hardware address
83. ‘www’ stands for (3) Physical address (4) IP address
(1) work with web (2) word wide web
(3) world wide web (4) worth while web [June-2014]
92. When a computer is booting, BIOS is loaded to the
[June-2013] memory by
84. Virtual memory is (1) RAM (2) ROM
(1) an extremely large main memory. (3) CD-ROM (4) TCP
(2) an extremely large secondary memory. [June-2014]
(3) an illusion of extremely large main memory. 93. The first web browser is
(1) Internet Explorer (2) Netscape

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 7

(3) World Wide Web(4) Firefox (1) Printer (2) Speaker


[June-2014] (3) Monitor (4) Keyboard
94. Which one of the following is not a/an [June-2015]
image/graphic file format? 104. Encoding or scrambling data for transmission
(1) PNG (2) GIF across a network is known as:
(3) BMP (4) GUI (1) Protection (2) Detection
[June-2014] (3) Encryption (4) Decryption
95. Photographs are not easy to [December-2015]
(1) publish (2) secure 105. Which of the following is not an input device?
(3) decode (4) change (1) Microphone (2) Keyboard
[December-2014] (3) Joystick (4) Monitor
96. gif, jpg, bmp, png are used as extensions for files [December-2015]
which store 106. In a Computer a byte generally consists of:
(1) Audio data (2) Image data (1) 4 bits (2) 8 bits
(3) Video data (4) Text data (3) 16 bits (4) 10 bits
[December-2014] [December-2015]
97. CSS stands for
107. NMEICT stands for:
(1) Cascading Style Sheets
(1) National Mission on Education through ICT
(2) Collecting Style Sheets
(2) National Mission on E-governance through ICT
(3) Comparative Style Sheets
(3) National Mission on E-commerce through ICT
(4) Comprehensive Style Sheets
(4) National Mission on E-learning through ICT
[December-2014]
[December-2015]
98. Symbols A-F are used in which one of the
108. A definition that has a meaning that is
following?
deliberately assigned to some symbol is called:
(1) Binary number system
(1) Lexical (2) Precising
(2) Decimal number system
(3) Stipulative (4) Persuasive
(3) Hexadecimal number system
[December-2015]
(4) Octal number system
109. Which of the following enables us to send the
same letter to different persons in MS Word?
Exam Year – 2015 (1) Mail join (2) Mail copy
[June-2015] (3) Mail insert (4) Mail merge
99. Which one of the following represents the binary [December-2015]
equivalent of the decimal number 25? 110. Which of the following is an instant messaging
(1) 10101 (2) 01101 application?
(3) 11001 (4) 11011 (A) Whats App
[June-2015] (B) Google Talk
100. Which is an instant messenger that is used for (C) Viber
chatting? Select the correct answer from the codes given
(1) Altavista (2) MAC below:
(3) Microsoft Office (4) Google Talk (1) (A) and (B) only
[June-2015] (2) (B) and (C) only
101. Which of the following is not open source (3) (A) only
software? (4) (A), (B) and (C)
(1) Internet explorer (2) Fedora Linux [December-2015]
(3) Open office (4) Apache HTTP 111. Which of the following is an open source
server software?
[June-2015] (1) MS Word (2) Windows
102. Which of the following represents one billion (3) Mozilla Firefox (4) Acrobat Reader
characters? [December-2015]
(1) Kilobyte (2) Megabyte 112. As Chairman of an independent commission on
(3) Gigabyte (4) Terabyte education, Jacques Delors report to UNESCO was
[June-2015] titled:
103. Which of the following is not an output device? (1) International Commission on Education Report

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 8

(2) Millennium Development Report 118. The process of copying files to a CD-ROM is known
(3) Learning: The Treasure Within as
(4) World Declaration on Education for All (1) Burning (2) Zipping
(3) Digitizing (4) Ripping
Exam Year – 2016 [August-2016]
119. In Computer Networking, HTTP is referred to as
[July-2016] a stateless protocol as servers do not maintain
113. The statement “the study, design, development, any information about past client requests. HTTP
implementation, support or management of is an acronym for
computer-based information systems, (1) Hyper Text Translation Protocol
particularly software applications and computer (2) Hyper Text Transfer Protocol
Hardware” refers to (3) High TeraByte Transfer Protocol
(1) Information Technology (IT) (4) Hypervisor Test Translation Protocol
(2) Information and Collaborative Technology [August-2016]
(ICT) 120. Random Access Memory (RAM), a form of
(3) Information and Data Technology (IDT) computer storage, is a ……… memory.
(4) Artificial Intelligence (AI) (1) Non-volatile (2) Volatile
[July-2016] (3) Permanent (4) Secondary
114. An ASCII is a character-encoding scheme that is [August-2016]
employed by personal computers in order to 121. The software used to navigate through the web is
represent various characters, numbers and known as
control keys that the computer user selects on (1) Website (2) Web Browser
the keyboard. ASCII is an acronym for (3) Internet (4) World Wide Web
(1) American Standard Code for Information [August-2016]
Interchange 122. If one GigaByte is equal to 2 Bytes of data
30

(2) American Standard Code for Intelligent storage, then 1024 TeraBytes is equal to ………….
Information bits of data storage.
(3) American Standard Code for Information (1) 250 (2) 253
40
Integrity (3) 2 (4) 256
(4) American Standard Code for Isolated [August-2016]
Information 123. With regard to e-mail, what does Bcc: mean?
[July-2016] (1) Blind Computer Communication: The users
115. Is a type of memory circuitry that holds the specified in the Bcc: field will get the e-mail and
computer’s start-up routine. see the addresses in the to: and cc: fields.
(1) RIM (Read Initial Memory) (2) Blind Carbon Copy: - The users specified in the
(2) RAM (Random Access Memory) Bcc: field will get the email and see the addresses
(3) ROM (Read Only Memory) in the to: and cc: fields.
(4) Cache Memory (3) Blind Computer Communication:- The users
[July-2016] specified in the Bcc: field will get the e-mail but
116. If the binary equivalent of the decimal number 48 it will be an audio file because this is how blind
is 110000, then the binary equivalent of the people get e-mail.
decimal number 51 is given by (4) Blind Carbon Copy: The users specified in the
(1) 110011 (2) 110010 Bcc: field will get the email but will not see the
(3) 110001 (4) 110100 addresses in the to: and cc: fields.

[July-2016] [August-2016]
117. An unsolicited e-mail message sent to many 124. Which of the following statements regarding the
recipients at once is a features of Information and Communication
(1) Worm (2) Virus Technology (ICT) is/are true?
(3) Threat (4) Spam I. ICT are the main instruments for the creation of
[July-2016] computer networks and the applications based on
them.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 9

II. ICT support the spread of information and (2) Web2.0 applications are focused on the ability for
knowledge, separating the content from the place people to collaborate and share information
where it belongs physically. online.
III. The digital and virtual nature of most of ICT (3) Web2.0 applications provide users with content
products allow the expenditure for them to be rather than facilitating users to create it.
maximized. (4) Web2.0 applications use only static pages.
(1) I and II only (2) I and III only [January-2017]
(3) II and III only (4) I, II and III 130. Read the following two statements:
I: Information and Communication Technology (ICT)
Exam Year – 2017 is considered a subset of Information Technology
(IT).
[January-2017] II: The ‘right to use’ a piece of software is termed as
125. DVD technology uses an optical media to store copyright.
the digital data. DVD is an acronym for Which of the above statement(s) is/are CORRECT?
(1) Digital Vector Disc (1) Both I and II (2) Neither I nor II
(2) Digital Volume Disc (3) II only (4) I only
(3) Digital Versatile Disc [November-2017]
(4) Digital Visualization Disc 131. Which of the following represents billion
[January-2017] characters?
126. Which of the following correctly lists computer (1) Terabytes (2) Megabytes
memory types from highest to lowest speed? (3) Kilobytes (4) Gigabytes
(1) Secondary Storage; Main Memory (RAM); [November-2017]
Cache Memory; CPU Registers 132. What is the full form of USB as used in computer
(2) CPU Registers; Cache Memory; Secondary related activities?
Storage; Main Memory (RAM) (1) Ultra Security Block
(3) CPU Registers; Cache Memory; Main Memory (2) Universal Security Block
(RAM); Secondary Storage (3) Universal Serial Bus
(4) Cache Memory; CPU Registers; Main Memory (4) United Serial Bus
(RAM); Secondary Storage [November-2017]
[January-2017] 133. Which of the following domains is used for –
127. Which of the following statement (s) is/are profit businesses?
TRUE? (1) .org (2) .net
SI: The decimal number 11 is larger than the (3) .edu (4) .com
hexadecimal number 11. [November-2017]
S2: In the binary number 1110.101, the 134. What is the name for a webpage address?
fractional part has the decimal value as 0.625. (1) Domain (2) Directory
(1) SI only (2) S2 only (3) Protocol (4) URL
(3) Both S1 and S2 (4) Neither S1 nor S2 [November-2017]
[January-2017] 135. The data storage hierarchy consists of:
128. With regard to a word processing software, the (1) Bytes, bits, fields, records, files and databases
process of combining static information in a (2) Bits, bytes, fields, records, files and databases
publication together with variable information in (3) Bits, bytes, records, fields, files and databases
a data source to create one merged publication is (4) Bits, bytes, fields, files, records and databases
called
(1) Electronic mail (2) Data sourcing Exam Year – 2018
(3) Mail merge (4) Spam mail
[January-2017] [July-2018]
129. Which of the following is a characteristic of 136. Which of the following statements, regarding the
Web2.0 applications? term ICT is/are TRUE?
(1) Multiple users schedule their time to use Web2.0 P: ICT is an acronym that stands for Indian Classical
applications one by one. Technology.
Q: Converging technologies that exemplify ICT
include the merging of audio-visual, telephone and

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 10

computer networks through a common cabling (2) Subscriber Information Module


system. (3) System Information Module
(1) P only (2) Q only (4) Special Identity Module
(3) P and Q (4) Neither P nor Q [December-2018]
[July-2018] 142. A message beneath a message is labelled as
137. Given the following email fields, which of the (1) embedded text (2) internal text
email addresses will ‘swami’ be able to see when (3) inter-text (4) sub-text
he receives the message? [December-2018]
To...ram@test.com 143. Which of the following printers use dry ink
Cc... raj@test.com; ravi@test.com powder?
Bcc... swami@test.com; rama@test.com (1) Ink Jet Printer (2) Dot Matrix Printer
(1) ram@test.com (3) Laser Printer (4) Thermal Printer
(2) ram@test.com; raj@test.com; ravi@test.com [December-2018]
(3) ram@test.com; rama@test.com 144. Internet Explorer, Mozilla Firefox and Opera are
(4) ram@test.com; rama@test.com; raj@test.com; referred to as:
ravi@test.com (1) Application Software (2) Web Servers
[July-2018] (3) Browsers (4) System Software
138. Put the following units of storage into the correct [December-2018]
order, starting with the smallest unit first and 145. Firewalls are used to protect a computer on a
going down to the largest unit: network against:
(A) Kilobyte (1) Fire attacks
(B) Byte (2) Unauthorized attacks
(C) Megabyte (3) Internal attacks
(D) Terabyte (4) Authorized attacks
(E) Gigabyte [December-2018]
(F) Bit 146. In comparison to secondary storage, the primary
Give your answer from the following code: storage is:
(1) (F), (B), (A), (C), (D), (E) (1) Faster and more expensive
(2) (F), (B), (A), (D), (E), (C) (2) Slower and more expensive
(3) (F), (B), (A), (C), (E), (D) (3) Faster and lesser expensive
(4) (F), (B), (A), (D), (C), (E) (4) Slower and lesser expensive
[July-2018] [December-2018]
139. With regard to computer memory, which of the 147. Which one of the following is correct?
following statement(s) is/are TRUE? (1) (17)10 = (17)16
P: Read Only Memory (ROM) is ‘volatile’ memory. (2) (17)10 = (17)8
Q: Random Access Memory (RAM) is ‘volatile’ (3) (17)10 = (10111)2
memory. (4) (17)10 = (10001)2
R: Secondary Memory is ‘volatile’ memory.
(1) P only (2) Q only
(3) P and Q only (4) P and R only
Exam Year – 2019
[20th June 2019 (Shift II)]
[July-2018] 148. Jatin’s laptop bas a LCD screen. The acronym LCD
140. A new Laptop has been produced that weighs less, stands for:
is smaller and uses less power than previous (1) Light Crystal Display
Laptop models. Which of the following (2) Liquid Compact Display
technologies has been used to accomplish this? (3) Light Compact Display
(1) Universal Serial Bus Mouse (4) Liquid Crystal Display
(2) Faster Random Access Memory [20th June 2019 (Shift II)]
(3) Blu Ray Drive 149. A computer network which is used within a
(4) Solid State Hard Drive building is called a:
[December-2018] (1) WAN (2) MAN
141. SIM means (3) LAN (4) SAN
(1) Subscriber Identity Module [21st June 2019 (Shift I)]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 11

150. Anjali’s teacher uses VLE, a software tool (4) RAM is volatile and the amount of RAM in a
designed to deliver courses online. The acronym computer system can affect its performance
VLE stand for: [24th June 2019-IInd Shift]
(1) Video Learning Environment 157. Match the following
(2) Visual Learning Environment Set-I Set-II
(3) Virtual Learning Environment (A) First Generation (i) Transistor
(4) Visual Local Environment (B) Second Generation (ii) VLSI
[21st June 2019 (Shift II)] microprocessor
151. In the context of IT/ICT, which one of the (C) Third Generation (iii) Vacuum tube
following statements about spamming is true? (D) Fourth Generation (iv) Integrated
(1) Spamming is posting or e-mailing unsolicited Choose the correct option from those given below:
advertising messages to a wide audience (1) (A)-(iii), (B)-(iv), (C)-(i), (D)-(ii)
(2) Spamming is sending lines of nonsensical (2) (A)-(iii), (B)-(i), (C)-(iv), (D)-(ii)
garbage in a chat conversation (3) (A)-(iii), (B)-(i), (C)-(ii), (D)-(iv)
(3) Spamming is posting a message that contain (4) (A)-(i), (B)-(iii), (C)-(iv), (D)-(ii)
graphic description of something offensive [20th June 2019-Ist Shift]
(4) Spamming is an attempt to acquire sensitive
158. Which one of the following computer compoents
information for malicious reasons, by
is fastest in terms of speed of access?
masquerading as trustworthy entity
(1) USB Drive
[24th June 2019 (Shift I)]
(2) Solid State Drive
152. Which one of the following pairs LEAST matches
(3) RAM
in respect of computers?
(4) Hard Disk Drive
(1) 1 Giga Byte: (1024) × (1024) × (1024) × 8 bits
[20th June 2019-1st Shift]
(2) CRT: Cathode Ray tube
159. While sending an e-mail, to differentiate among
(3) ROM: Rapid Online Memory
To: Cc: and Bcc: fields, which one of the following
(4) CPU: Central Processing Unit
statements is True?
[25th June 2019 (Shift II)]
(1) Recipients in the To: field can see the email
153. What is meant by the term RAM?
addresses that are in the Bcc: and Cc: fields.
(1) Memory which can only be read
(2) Recipients in the Cc: field can see the email
(2) Memory which can only be written to
addresses that are in the To: and Bcc: fields.
(3) Memory which is used for permanent storage
(3) Recipients in the Bcc: field can see the email
(4) Memory which can be both read and written to
addresses that are in the To: and Cc: fields.
[26th June 2019 (Shift I)]
(4) Only the recipients in the Cc: field can see the
154. Which of the following file format is not a video
other email addresses in the Bcc: field.
file format?
(1) AVI (2) MOV
[20th June 2019-1st Shift]
(3) MP4 (4) JPEG
160. Software that you can download for free, but have
[26th June 2019 (Shift II)]
to pay to continue its use after a trial period is
155. Which of the following is not considered as a
called:
form of secondary storage?
(1) public domain software
(1) RAM
(2) freeware
(2) Floppy Disk
(3) open-source software
(3) Optical Disk
(4) shareware
(4) Flash Drive
[20th June 2019-1st Shift]
[21st June 2019 (Shift II)]
161. In Internet terminology, what does the acronym
156. Which statement is true about Random Access
WYSIWYG stand for?
Memory (RAM) in a computer system?
(1) Why You Saw Is What You Got
(1) RAM is non-volatile and the amount of RAM in
(2) What You See Is What You Get
a computer system cannot affect its performance
(3) Where You See Is Where You Got
(2) RAM is non-volatile and the amount of RAM in
(4) What You See Is What You Got
a computer system can affect its performance
[21st June 2019-IInd Shift]
(3) RAM is volatile and the amount of RAM in a
computer cannot affect its performance

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 12

162. A virus type that is capable of transferring from [24th June 2019-1st Shift]
one computer to another without any 'user 168. Which of the following statements(s) is/are true
interaction' is known as in respect of wireless technology?
(1) Worm P: Bluetooth is a wireless technology which can be
(2) Trojan used to connect a headset to a mobile phone.
(3) Key logging Q: Bluetooth is a long-range wireless technology and
(4) Boot sector virus is a low cost means of data transfer.
[21st June 2019-1st Shift] (1) P only (2) Q only
163. What is the decimal equivalent of binary number (3) Both P and Q (4) Neither P nor Q
1100110? [24th June 2019-Ist Shift]
(1) 102 (2) 204 169. Which of the following is a type of malware
(3) 153 (4) 51 intentionally inserted into a software system that
[20th June 2019-IInd Shift] will setoff a malicious function when specified
164. Why would BCC: be used in an e-mail? conditions are met?
(1) BCC: allows the recipient to identify all the other (1) Worm (2) Trojan
recipients in the list when a group email address (3) Spyware (4) Logic bomb
is used. [24th June 2019-1st Shift]
(2) BCC: allows the sender to indicate who the email 170. Select the option that shows the storage devices in
is for if there is more than one recipient. order of capacity from lowest to highest.
(3) BCC: allows the sender of a message to conceal (1) CD-ROM, DVD-ROM, Blu-ray
the recipient entered in the BCC: field from the (2) Blu-ray, CD-ROM, DVD-ROM
other recipients. (3) DVD-ROM, Blu-ray, CD-ROM
(4) BCC: allows recipients to be visible to all other (4) DVD-ROM, CD-ROM, Blu-ray
recipients of the message. [24th June 2019-IInd Shift]
[20th June 2019-IInd Shift] 171. In Audio and Video compression, the term RGB
165. Which of the following is an example of means:
proprietary system software? (1) Red, Grey, Blue (2) Red, Green,
(1) Linux Blue
(2) Microsoft Internet explorer (3) Red, Green, Black (4) Red, Grey, Black
(3) Microsoft office [24th June 2019-IInd Shift]
172. One Terabyte (TB) of memory is equal to:
(4) Microsoft windows
(1) 1024 KB
(2) 1024 × 1024 KB
(3) 1024 × 1024 × 1024 KB
(4) 1024 × 1024 × 1024 Bytes
[21st June 2019-1st Shift] [24th June 2019-IInd Shift]
166. What is spyware in respect of computer software? 173. Mailed questionnaire, observation, interview and
(1) Software that aims to gather information about a collective questionnaire are instances of
person without his/her knowledge, and that may (1) Secondary sources (2) Personal sources
send such information to another entity. (3) Primary sources (4) Tertiary sources
(2) Legitimate software that allows companies to [25th June 2019-IInd Shift]
monitor and supervise the computers of their 174. Computer uses which number system to store
employees from a central location. data and perform calculations
(3) Software used to disrupt computer operation or (1) Binary (2) Octal
gain access to private computer systems. (3) image (4) Hexadecimal
(4) A computer program hidden within another [25th June 2019-1st Shift]
seemingly harmless program that produces 175. Joint Photographic Experts Group (JPEG) is used
copies of itself into another programs or files. to compress ___________
[21st June 2019-IInd Shift] (1) Music (2) Video
167. What is the binary equivalent of decimal number (3) Decimal (4) Frame
75? [25th June 2019-1st Shift]
(1) 1101001 (2) 101001 176. The main two components of CPU are __________
(3) 100101 (4) 1001011 (1) Control unit and ALU

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 13

(2) ALU and BUS (3) An OS controls peripheral, and allocates memory
(3) Control unit and registers and processor time.
(4) Registers and main memory (4) An OS controls the processor and peripherals and
[26th June 2019-1st Shift] allows the user to connect to the internet.
177. A computer has main memory of 960 Kbytes. [20th June 2019-IInd Shift]
What is the exact number of bytes contained in 185. With respect to computers, which one of the
this memory? following best describes phishing?
(1) 960 × 8 (1) A malicious program installed on a system that
(2) 960 × 1000 stays concealed to avoid detection.
(3) 960 × 1024 (2) A method of bypassing normal authentication
procedures over a connection to a network.
(4) 960 × 1024 × 1024
(3) A type of unsolicited bulk email of identical
[26th June 2019-Ist Shift]
message sent to numerous recipients.
178. The convenient place to store contact information
(4) An attempt to acquire sensitive information for
for quick retrieval in e-mail is:
malicious reasons, by masquerading as a
(1) Address box (2) Message box
trustworthy entity.
(3) Address book (4) Message book
[20th June 2019 Shift I]
[26th June 2019-IInd Shift]
186. A group’s access to digital technology and
179. Which of the following devices enables a
another group’s lack of access to it, will cause a
computer to transmit data over telephone lines?
disparity known as:
(1) CPU (2) Hub
(1) Internet inequality
(3) Switch (4) Modem
(2) Web inequality
[24th June 2019-IInd Shift]
(3) Technological imbalance
180. A/An __________ is a computer program that
(4) Digital divide
spreads by inserting copies of itself into other
[20th June 2019 Shift I]
executable code or documents.
187. Which one of the following is an educational FM
(1) Operating system
radio network?
(2) Computer Virus
(1) Gyan Darshan
(3) Firewall
(2) Gyan Vani
(4) Anti-virus
(3) Gyan Dhara
[24th June 2019-IInd Shift]
(4) GIAN
181. Which of the following is not a/an web browser?
(1) Internet Explorer (2) Mozilla Firefox
(3) Google Chrome (4) Yahoo
[21st June 2019 Shift I]
[25th June 2019-1st Shift] 188. Which of the following best describes a wiki?
182. Which of the following is used to create web (1) A system that allows users to add information
pages? onto a website but does not change andy pre-
(1) HTTP existing information.
(2) URL (2) A system that allows collaborative modification
(3) FTP of its content and structure directly from the web
(4) HTML browser.
[25th June 2019-Ist Shift] (3) A system that serves as a publically personal
183. Which of the following is a search Engine? journal for an individual.
(1) Flash (2) Fire fox (4) A system that monitors the modification of
(3) internet explorer (4) Google content within a blog.
[24th June 2019-Ist Shift] [21st June 2019 Shift I]
184. Select the true statement about an operating 189. Which of the following statements(s) is/are True
system (OS)? respect to ICT?
(1) An OS controls peripheral, allocates memory and P: ICT is an acronym that stands for information
organises data into fields and records. and competitive technology.
(2) An OS provides protection against viruses and Q: The effective use of ICT to support learning in
controls peripherals. the inclusive education exemplifies good
teaching for all learners.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 14

(1) P only (2) Q only [4th Dec. 2019 (Shift I)]


(3) Both P and Q (4) Neither P nor Q 198. Database WOS stands for
[21st June 2019 Shift II] (1) Web of Science
190. You need to use automatic calculations in (2) Web of Sources
preparing a budget. Which software application (3) World of Science
should be used? (4) Web of Service
(1) Spreadsheet (2) Presentation [4th Dec. 2019 (Shift I)]
(3) Word processing (4) Desktop publishing 199. _________ is a wireless technology built in
[25th June 2019 Shift I] electronic gadgets for transferring data over
191. The use of Information Technology (IT) to short distance
improve the ability of Government to address the (1) WiFi
needs of society is known as ____________. (2) Bluetooth
(1) E – Business (2) E-Administration (3) Modem
(3) E-Governance (4) E-Marketing (4) USB
[25th June 2019 Shift II] [4th Dec. 2019 (Shift I)]
192. Which of the following mobile payment 200. PCI stands for
application is developed by the National (1) Partial Component Interconnect
Payments Corporation of India based on UPI? (2) Partial Component Interaction
(1) MYGOV (2) BHIM (3) Peripheral Component Interconnect
(3) UMANG (4) PhonePe (4) Peripheral Component Interaction
[26th June 2019 Shift II] [5th Dec. 2019 (Shift II)]
193. Identify the encompassing term that involves the 201. Which of the following statements are correct?
use of electronic platforms to conduct a (A) Google's web browser is called
company’s business. ‘Chrome’
(1) E-Business (2) E-Commerce (B) Apples web browser is called ‘Safari’
(3) E-Marketing (4) E-Governance (C) “Mozilla firefox” is an open source web
[2nd Dec. 2019 (Shift I)] browsing software
194. In computer related activities, what is the full Choose the correct option:
form of 'WORM'? (1) (A) and (B) only
(1) Write On Random Memory (2) (A) and (C) only
(2) Write On Real Memory (3) (B) and (C) only
(3) Write Once Read Many (4) (A), (B) and (C)
(4) Write Once Read Memory [6th Dec. 2019 (Shift II)]
[3rd Dec. 2019 (Shift II)] 202. Match List-I with List-II
195. Which of the following storage devices stores List-I (Software) List-II (Description)
maximum amount of data? A. Web browser (i) Prepare written documents
(1) Compact disc B. Word processor (ii) Create and edit web pages
(2) Floppy disc C. Spreadsheet (iii) Connect to websites and
(3) Hard disc display web pages
(4) Magnetic optic disc
D. Web authoring (iv) Analyze and summarize
[3rd Dec.2019 (Shift II)]
numerical data
196. _________________ represents raw facts. Whereas
Choose the correct answer from the options given
___________ is processed meaningful data.
below:
(1) Information. Bits
(1) A-(ii); B-(iv); C-(i); D-(iii)
(2) Records. Bytes
(2) A-(i); B-(i); C-(iv); D-(ii)
(3) Data, Information
(3) A-(iii); B-(i); C-(ii); D-(iv)
(4) Information, Reporting
(4) A-(i); B-(); C-(iv); D-(iii)
[3rd Dec. 2019 (Shift II)]
[2nd Dec. 2019 (Shift II)]
197. VDU stands for
203. Which of the following is a search engine?
(1) Virtual Display Unit
(1) Internet (2) Bing
(2) Virtual Detection Unit
(3) Skype (4) Acrobat Reader
(3) Visual Display Unit
[6th Dec. 2019-Ist Shift]
(4) Visual Detection Unit

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 15

204. Which of the following communication (2) Geographical Information System


technologies employ only asynchronous (3) Geographic System
communication? (4) Software System
A. Video conferencing [2nd Dec. 2019-Ist Shift]
B. Email 208. Consider the following storage devices:
C. Forums (A) Hard disc
D. Instant messaging (B) CD-ROM
Choose the correct option: (C) DVD-ROM
(1) (A) and (C) only (2) (B) and (D) Arrange these in ascending order of storage capacity
only and select the correct option:
(3) (B) and (C) only (4) (A) and (D) only (1) (B), (C), (A) (2) (B), (A), (C)
[6th Dec. 2019-Ist Shift] (3) (C), (B), (A) (4) (A), (C), (B)
205. Match List-I with List-II in the context of computer [2nd Dec. 2019-Ist Shift]
networking: 209. Which number system in usually followed in a
List-I List-II typical 32-bit computer?
(A) VOIP (i) Makes use of light pulses (1) 2 (2) 8
to transmit data (3) 10 (4) 16
(B) Fibre-optic (ii) Use of internet to make [2nd Dec. 2019-Ist Shift]
cable phone calls 210. A dialogue between a human-being and a
(C) URL (iii) Most appropriate to computer programme that occurs simultaneously
connect computers in in various forms in described as:
a small building (1) man-machine speak (2) binary chat
(D) UTP cable (iv) Text used by web (3) digital talk (4) interactivity
browsers to locate a [2nd Dec. 2019-Ist Shift]
web address on the 211. Which of the following is NOT suitable in the
Internet. context of E-mail?
(1) It is a letter sent over a computer network
Choose the correct option:
(2) It can be used to send unsolicited messages
(1) (A)-(iv), (B)-(i), (C)-(ii), (D)-(iii)
(3) E-mail is snail-mail
(2) (A)-(ii), (B)-(i), (C)-(iv), (D)-(iii)
(4) E-mail address includes domain name
(3) (A)-(ii), (B)-(iii), (C)-(iv), (D)-(i)
(4) (A)-(iv), (B)-(iii), (C)-(ii), (D)-(i)
[2nd Dec. 2019-IInd Shift]
[6th Dec. 2019-Ist Shift]
212. Which of the following is a type of LAN?
206. Match List-I with List-II
(1) Ethernet (2) Token Ring
List-I List-II
(3) FDDI (4) All of the above
(A) 50 in decimal (i) 0110010 in binary
[4th Dec. 2019-IInd Shift
(B) 102 in decimal (ii) 1100110 in 213. Which of the following statements is/are correct?
binary (A) Software is loaded into secondary storage
(C) Real-Time video (iii) Synchronous from RAM and is then executed by the CPU.
conferencing communication (B) A search engine is a software system that
(D) SMS texting (iv) Asynchronous is designed to search for information on the
communication WWW.
Choose the correct option from those given below: Choose the correct option:
(1) (A)-(ii), (B)-(i), (C)-(iii), (D)-(iv) (1) (A) only (2) (B) only
(2) (A)-(ii), (B)-(i), (C)-(iv), (D)-(iii) (3) Both (A) and (B) (4) Neither (A)
(3) (A)-(i), (B)-(ii), (C)-(iii), (D)-(iv) nor (B)
(1) (A)-(ii), (B)-(ii), (C)-(iv), (D)-(iii) [4th Dec. 2019-IInd Shift]
[6rd Dec. 2019-IInd Shift] 214. Select the option that lists components for a
207. Which of the following is a computer based cyberspace address (URL) in the correct order
system that stores and manipulates data which from beginning to end?
are viewed from a geographical point of (1) Protocol, domain name of the host, path/file
reference? (2) Path I file, protocol, domain name of the host
(1) Database system (3) Protocol, path /file, domain name of the host

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 16

(4) Domain name of the host, protocol, path/file B. Bluetooth technology consumes more power than
[5th Dec. 2019-1st Shift] Wi-Fi technology
215. Which of the following statements is/are correct? Choose the correct answer from the options given
(A) WWW is a network of networks that first below:
started with four computer nodes. (1) A only (2) B only
(B) WWW is a service that runs on the (3) Both A and B (4) Neither A nor B
Internet. [6th Dec. 2019-1st Shift]
Choose the correct option: 220. Select the option that includes le formats suitable
(1) (A) only (2) (B) only for distributing sound les across the internet.
(3) Both (A) and (B) (4) Neither (A) (1) Wmv, mp4, wma, mp3
nor (B) (2) Avi, midi, wav, mp3
[5th Dec. 2019-IInd Shift] (3) Avi, mov, wmv, mp3
216. Which of the following statements is/are correct? (4) Midi, wav, wma, mp3
(A) It is usually faster to access data stored in [6th Dec. 2019-IInd Shift]
RAM than that in hard drive 221. Which of the following statements is/are correct?
(B) The hexadecimal number 99 is the same A. A Local Area Network (LAN) is usually located
as the decimal number 99 on one brand of computer
Choose the correct option: B. The acronym 'ISP stands for Internet Standard
(1) (A) only (2) (B) only Provider
(3) Both (A) and (B) (4) Neither (A) Choose the correct answer from the options given
not (B) below:
[6th Dec. 2019-IInd Shift] (1) A only (2) B only
217. Given below are two statements, one is labelled
(3) Both A and B (4) Neither A nor B
Assertion (A) and the other is labelled as Reason [4th Dec. 2019-Ist Shift]
(R). 222. Which one of the following tasks is associated
Assertion (A): The clock speed of CPUs has not
with changing appearance of a document in word
increased significantly in recent years.
processing?
Reason (R): Software now being used is faster and
(1) Editing (2) Formatting
therefore processors do not have to be faster.
(3) Writing (4) Printing
In the light of the above two statements, choose the
[5th Dec. 2019-1st Shift]
correct option from those given below:
223. Select the option that contains only optical storage
(1) Both (A) and (R) are true and (R) is the correct
media
explanation of (A)
(1) USB memory stick, Blu-Ray disk, CD-ROM,
(2) Both (A) and (R) are true and (R) is NOT the
DVD
correct explanation of (A)
(2) DVD, CD-ROM, USB memory stick, CD-RW
(3) (A) is true but (R) is false
(3) Hard disk, USB memory stick, CD-ROM, DVD
(4) (A) is true but (R) is true
(4) DVD, CD-R, Blu-Ray Disk, CD-RW
[6th Dec. 2019-Ist Shift]
[5th Dec. 2019-IInd Shift]
218. Which of the following is/are major issues arising
224. Select the option that contains only computer
out of the growing reliance on information
input devices
technology?
(1) Keyboard, Mouse, Joystick, Printer
A. Protability
(2) Mouse, Monitor, Joystick, Keyboard
B. Security threats
(3) Joystick, Keyboard, Digitiser, Monitor
C. Privacy concerns
(4) Joystick, Keyboard, Mouse, Digitiser
Choose the correct option:
[6th Dec. 2019-IInd Shift]
(1) (A) and (B) only (2) (A) and (C)
225. Select the option that contains exclusively the text
only
file formats
(3) (B) and (C) only (4) (A), (B)
(1) JPEG, MP3, RTF (2) CSV, RTF,
and (C)
TXT
[6th Dec. 2019-IInd Shift]
(3) GIF, JPEG, MP3 (4) CSV, MP3,
219. Which of the following statements is/are correct?
PDF
A. The clock speed of a CPU is measured in hertz
[6th Dec. 2019-Ist Shift]
(Hz)
226. Which of the following statements is/are correct?

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 17

A. For the sequence of integers represented in binary hardware. In the light of the above two statements,
as 00111, 01001, 01011, P.... the next integer P choose the correct option:
would be represented as 01101 (1) Both (A) and (R) are true and (R) is the correct
B. A byte is a binary number consisting of exactly 8 explanation of (A)
bits (2) Both (A) and (R) are true but (R) is not the
Choose the correct option: correct explanation of (A)
(1) (A) only (2) (B) only (3) (A) is true, but (R) is false
(3) Both (A) and (B) (4) Neither (A) (4) (A) is false, but (R) is true
and (B)
[3rd Dec. 2019 Shift I]
227. Which of the following terms is related to the
Exam Year – 2020
digital learning environment for design? [ICT 2020]
(1) e-Vidwan (2) e-Acharya 232. Given below are two statements, one is labelled
(3) e-Kalpa (4) e-Yantra as Assertion A and the other is labelled as Reason
[3rd Dec. 2019 Shift I] R
228. The purpose of ICT use in education is to Assertion A: Total number of mobile users in India
(1) attract students is increasing rapidly
(2) make teaching interesting Reason R: The cost of the mobile is decreasing
(3) optimise learning outcomes In light of the above statements, choose the most
(4) promote technology culture in teaching appropriate answer from the options given below:
[3rd Dec. 2019 Shift I] (1) Both A and R are correct and R is the correct
229. Given below are two statements one is labelled explanation of A.
as Assertion (A) and the other as Reason (R): (2) Both A and R are correct but R is NOT the
Assertion (A): Sniffing may be used to steal data or correct explanation of A.
information over a network. (3) A is correct but R is not correct.
Reason (R) Sniffing is a process of monitoring and (4) A is not correct but R is correct.
capturing all data packets passing through given [ICT 2020]
network. 233. The file extension of Microsoft (MS) Word
In the light of the above stated two statements, document in office 2007 is
choose the correct option from the choices given (1) .docx (2) .png
below: (3) .doc (4) .jpg
(1) Both (A) and (R) are true and (R) is the correct [ICT 2020]
explanation of (A) 234. What is the full form of the abbreviation lot?
(2) Both (A) and (R) are true but (R) is not the (1) International Office of Tourism
correct explanation of (A) (2) Internet of Things
(3) (A) is true, but (R) is false (3) Internet of Think
(4) (A) is false, but (R) is true (4) Instrument of Telecommunication
[4th Dec. 2019 Shift I] [ICT 2020]
230. The national agency for responding to computer 235. What is the binary number for decimal number
security incidents as and when they occur, is 9?
(1) CAT (1) 1100 (2) 1001
(2) CDAC (3) 0111 (4) 1011
(3) CCA [ICT 2020]
(4) ICERT 236. Which type of memory holds the computer
[5th Dec. 2019 Shift I] startup routine?
231. Given below are two statements-one labelled as (1) RAM (2) WAN
Assertion (A) and the other labelled as Reason (3) ROM (4) Cache
(R). [ICT 2020]
Assertion (A): Information Technology is fast 237. Identify the correct order of the following
becoming a very important field of activity in India. computer memories on the basis of increasing
Reason (R): Software is one of the major exports of memory access time (from low to high).
India and further India has a very strong base in (A) Registers

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 18

(B) Main Memory Choose the correct answer from the options given
(C) Secondary Memory below:
(D) Cache Memory (1) (A) only (2) (A) and (B)
Choose the correct answer from the options given only
below: (3) (B) and (C) only (4) (A) and (C)
(1) (A), (C), (D), (B) only
(2) (A), (D), (B), (C) [ICT 2020]
(3) (C), (B), (D), (A) 242. Given below are two statements:
(4) (B), (D), (A), (C) Statement I: Search engines are also known as web
[ICT 2020] browsers.
238. With regard to computer memory, which of the Statement II: 189.365.250.2 is an example of a
following statement(s) is/are TRUE? valid IP address.
(A) Cache memory is 'volatile' memory In the light of the above statements. choose the
(B) Magnetic memory is 'volatile' memory correct answer from the options given below:
(C) Flash memory is 'volatile' memory (1) Both Statement and Statement II are true
(D) RAM is 'volatile' memory (2) Both Statement and Statement I are false
Choose the correct answer from the options given (3) Statement I is correct but Statement II is false
below: (4) Statement I is incorrect but Statement II is true
(1) (A) and (B) only [ICT 2020]
(2) (D) only 243. Consider the following incomplete sentences:
(3) (A) and (D) only 3G is a ______ range wireless technology. Some
(4) (C) and (D) only activities that require _______ bandwidth cannot be
[ICT 2020] carried out by using 3G.
239. In computers, a DVD-ROM is: Bluetooth is a ________ range wireless technology
(1) an optical storage media and it can be written which is used to connect devices together for data
many times. transfer. Bluetooth is a ______ cost means of data
(2) a magnetic storage media and it can be written transfer.
only once. Complete the above sentences by choosing the
(3) an optical storage media and it can be written correct words in order from the following list:
only once. (A) Long (B) Low
(4) a magnetic storage media and it can be written (C) Short (D) High
many times. Choose the correct answer from the options given
below:
(1) (A), (D), (C), (B) (2) (C), (D),
(A), (B)
(3) (C). (B), (A), (D) (4) (A), (B),
[ICT 2020] (C), (D)
240. Given below are two statements [ICT 2020]
Statement I: Minimum number of bits required to 244. Given below are two statements: One is labelled
store aby 3-digit decimal number is 10. as Assertion (A) and the other is labelled as
Reason (R):
Statement II: The data in a digital computer is
Assertion (A): Use of ICT in research facilitates
stored in terms of bits/bytes where one PetaByte is access and accuracy of research findings.
equal to 250 bits Reason (R): A researcher has to follow various
In light of the above statements, choose the most styles of referencing and format while writing a
appropriate answer the options given below thesis with an intent for deriving support from ICT.
(1) Both Statement I and Statement II are true. In the light of the above statements. choose the
(2) Both Statement and Statement I are false. most appropriate answer from the options given
below:
(3) Statement I is correct but Statement II is false.
(1) Both (A) and (R) are correct and (R) is the
(4) Statement I is incorrect but Statement II is true.
correct explanation of (A).
[ICT 2020]
(2) Both (A) and (R) are correct but (R) is NOT the
241. The Recycle Bin is an area in Windows OS that
correct explanation of (A)
contains files deleted from the:
(3) (A) is true but (R) is not correct.
(A) Hard drive (B) Pen drive (C) CD-ROM

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 19

(4) (A) is false but (R) is correct In the light of the above statements, choose the
[ICT 2020] correct answer from the options given below:
245. Online platforms make teaching and learning a (1) Both Statement I and Statement I are true.
sub-type of: (2) Both Statement I and Statement II are false.
(1) Technology-induced diversion (3) Statement I is correct but Statement II is false.
(2) Complex learning culture (4) Statement I is incorrect but Statement II is true.
(3) Commercial collaboration [ICT 2020]
(4) Alternative education 250. Match List I with List II:
[ICT 2020] List I List II
246. To differentiate a primary storage from a (A) Input device (I) Chrome
secondary storage in a computer system. which (B) Output (II) MS-
of the following statements is correct? device office
(1) Primary storage is slower, more expensive and (C) Software (III) Mouse
persistent. (D) Web browser (IV) Monitor
(2) Primary storage is faster, more expensive and Choose the correct answer from the options given
persistent. below:
(3) Primary storage is faster, less expensive and not (1) (A)-(II), (B)-(III), (C)-(I). (D)-(IV)
persistent. (2) (A)-(III), (B)-(IV), (C)-(II), (D)-(I)
(4) Primary storage is faster, more expensive and (3) (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
not persistent. (4) (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
[ICT 2020] [ICT 2020]
247. Match List I with List II: 251. Radha receives an email claiming that her credit
List I List II card account is about to be suspended unless she
(Computer (Description) emails her credit card details and personal
Components) identification number (PIN) immediately. What is
(A) RAM (I) Brain of the Computer this an example of ?
(B) DVD- (II) Performs all computations
(1) Spamming (2) Phishing
ROM and comparison operations
(C) ALU (III) Can be written only once (3) Virus Signing (4) Scanning
(D) CPU (IV) Holds programmes [ICT 2020]
currently being run on the 252. Which one of following is NOT used to avail
computer internet connectivity?
Choose the correct answer from the options given (1) Wi-Fi (2) 3G
below: (3) Scanner (4) 4G
(1) (A)-(II), (B)-(IV), (C)-(I), (D)-(II) [ICT 2020]
(2) (A)-(I), (B)-(IV), (C)-(II), (D)-(III) 253. What is the name for a web page address?
(3) (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
(1) Directory (2) Folder
(A) (A)-(III) (B)-(IV) (C)-(II) (D)-(I)
[ICT 2020] (3) Domain (4) URL
248. Consider the following sizes of computer [ICT 2020]
memory. Choose the correct ascending order 254. Which of the following is NOT a system software?
A. MB (1) Compiler (2) Operating System
B. GB (3) Application Software (4) Editor
C. KB [ICT 2020]
D. TB 255. Which of the following is excluded from the
Choose the correct answer from the options given domain of Artificial Intelligence?
below (1) Computer Vision (2) Machine Learning
(1) B, D, A, C (2) D, B, A, C (3) Deep_Learning (4) Text
(3) A, B, C, D (4) C, A, B, D [ICT 2020]
[ICT 2020] 256. What is the full form of the abbreviation ISP?
249. Given below are two statements: (1) International Service Provider
Statements I: Printed output from a computer (2) Internet Service Provider
system is called soft copy (3) Internet Software Provider
Statements II: RAM is a read/write memory (4) Internet Service Product
[ICT 2020]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 20

257. Given below are two statements, one is labelled (1) (A), (C), (B), (E), (D)
as Assertion A and the other is labelled as Reason (2) (B), (D), (C), (A), (E)
R (3) (C), (D), (E), (A), (B)
Assertion A: Privacy and security of user data is at (4) (D), (E), (A), (B), (C)
stake on the Internet [ICT 2020]
Reason R: No steps are being taken by the user for 261. Given below are two statements:
the security and privacy of data Statement I: The value of hexadecimal number 21
In light of the above statements, choose the correct is 33 in decimal number system.
answer from the options given below: Statement II: The value of binary number 1110 is
(1) Both A and R are correct and R is the correct 14 in decimal number system.
explanation of A. In the light of the above statements, choose the
(2) Both A and Rare correct but R is NOT the correct answer from the options given below:
correct explanation of A (1) Both Statement I and Statement II are true
(3) A is correct but R is not correct. (2) Both Statement I and Statement II are false
(4) A is not correct but R is correct. (3) Statement I is correct but Statement II is false
[ICT 2020] (4) Statement I is incorrect but Statement II is true
258. Given below are two statements: [ICT 2020]
Statement I: A company-wide network, closed to 262. Full form of the abbreviation OCR is:
public access. which uses internet-type technology (1) Optical Character Recognition
is called World Wide Web. (2) Online Computer Reader
Statement II: MODEM is a device that enables a (3) Optical Computer Recognition
computer to communicate over telephone lines. (4) Optical Control Reader
In the light of the above statements. choose the [ICT 2020]
correct answer from the options given below: 263. An unsolicited e-mail message sent to many
(1) Both Statement and Statement I are true recipients at once is a
(2) Both Statement I and Statement II are false (1) Inbox (2) Spam
(3) Statement is correct but Statement II is false (3) Virus (4) Attack
(4) Statement I is incorrect but Statement II is true. [ICT 2020]
[ICT 2020] 264. A computer network enables two or more
259. Identify the correct order of following different computers to
types of storage/memory components in a (1) Increase the speed
computer on the basis of price per bytes of (2) Share data and hardware resources
storage from most expensive to least expensive: (3) Increase the work
(A) DDR4 RAM (4) Monitor the software
(B) HDD [ICT 2020]
(C) SSD 265. Given below are two statements.
(D) CPU Cache Statement (I): In peer-to-peer networks, there is no
Choose the correct answer from the options given central server instead each computer can act as a
below: server as well as a client.
(1) (A), (D), (C), (B) (2) (D), (A), Statement (II): LAN is a computer network created
(C), (B) for individual person.
(3) (A), (B), (C), (D) (4) (D), (A), In the light of the above statements, choose the
(B), (C) most appropriate answer from the options given
[ICT 2020] below:
260. Find out the correct sequence of the following (1) Both Statement (I) and Statement (II) are true.
transmissions: (2) Both Statement (I) and Statement (II) are false.
(A) Narrowcasting (3) Statement (I) is correct but Statement (II) is
(B) Telegraph false.
(C) Broadcasting (4) Statement (I) is incorrect but Statement (II) is
(D) Telephone true.
(E) Podcasting [ICT 2020]
Choose the correct answer from the options given 266. Given below are two statements.
below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 21

Statement (I): Operators are special symbols that (1) Both Statement I and Statement I are true.
are used to perform calculations, make comparisons (2) Both Statement I and Statement II are false.
and check logical condition. (3) Statement I is correct but Statement II is false
Statement (II): Relational operators are used for (4) Statement I is incorrect but Statement II is true
arithmetic operations. [ICT 2020]
In the light of the above statements, choose the 272. Extra browser window of commercials that open
most appropriate answer from the options given automatically on browsing web pages in called
below: (1) Spam (2) Virus
(1) Both Statement (I) and Statement (II) are true. (3) Phishing (4) Pop-up
(2) Both Statement (I) and Statement (II) are false. [ICT 2020]
(3) Statement (I) is correct but Statement (II) is 273. Consider the following technologies:
false. (A) Microprocessor
(4) Statement (I) is incorrect but Statement (II) is (B) Transistor
true. (C) Vaccum Tube
[ICT 2020] (D) Artificial Intelligence
267. Given below are two statements Arrange the above technologies of different
Statement I: Cache memory is faster than random computer generations in the order they have been
used. Start from the technology that was used in
access memory
first generation.
Statement II: Random access memory is closer to Choose the correct answer from the options given
the processor than cache memory below:
In light of the above statements, choose the most (1) (C), (A), (B), (D) (2) (C), (B),
appropriate answer from the options given below (A), (D)
(1) Both Statement and Statement I are correct. (3) (B), (C), (A), (D) (4) (C), (B),
(2) Both Statement I and Statement I are incorrect. (D). (A)
(3) Statement I is correct but Statement II is [ICT 2020]
incorrect. 274. Match List I with List II
(4) Statement I is incorrect but Statement II is List I List II
correct. A. Search engine I www.gmail.com
[ICT 2020] B. Job openings Il www.amazon.in
268. Which one of the following is NOT a web C. E-mail Ill www.google.com
browser? D. E-commerce IV www.naukri.com
(1) Firefox Choose the correct answer from the options given
below:
(2) Facebook
(1) A-III, B-IV, C-I, D-II (2) A-IV, B-III, C-I, D-
(3) Chrome
II
(4) Safari
(3) A-1, B-II, C-III, D-IV (4) A-I, B-III, C-II, D-
[ICT 2020]
IV
269. URL stands for
[ICT 2020]
(1) Universal Resource Location
275. Given below are two statements
(2) Universal Response Locator
Statement I: Compilers are software
(3) Unified Response Location
Statement II: Touch screen monitors are
(4) Uniform Resource Locator
input/output devices
[ICT 2020]
In light of the above statements, choose the most
270. RAM is placed on
appropriate answer the options given below
(1) Hard Disk (2) Extension board
(1) Both Statement I and Statement I are true
(3) Motherboard (4) USB
(2) Both Statement I and Statement I are false
[ICT 2020]
271. Given below are two statements: (3) Statement I is correct but Statement II is false.
Statement I: World Wide Web is not an example of (4) Statement 1 is incorrect but Statement II is true.
client-server technology. [ICT 2020]
276. Given below are two statements
Statement II: FTP is a service available on the
Statement I: Operating systems are hardware
Internet.
Statement II: Algorithm is a step by step procedure
In the light of the above statements, choose the
to solve a problem
correct answer from the options given below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 22

In light of the above statements, choose the most (1) JAVA (2) Block chain
appropriate answer the options given below (3) Block code (4) Python
(1) Both Statement and Statement I are true [ICT 2020]
(2) Both Statement I and Statement I are false 283. Operating system is an interface between
(3) Statement I is correct but Statement II is false (1) Software and hardware
(4) Statement I is incorrect but Statement II is true (2) Compiler and hardware
[ICT 2020] (3) User and Computer
277. GUI stands for (4) Program and Software
(1) Graphical Usage Interaction [ICT 2020]
(2) Gaming User Interface 284. Given below are two statements.
(3) Graphical User Interface Statement I: Internet is the largest information base
(4) Graphical User Interaction and has become a vital part of our lives.
[ICT 2020] Statement II: HTML is an incomplete code
278. Match List I with List II package that allows a user to create web pages.
List I List II In the light of the above statements, choose the
A Image I.doc correct answer from the options given below:
B Video II.mp3
(1) Both Statement I and Statement II are true
C Audio III.jpeg
(2) Both Statement I and Statement II are false
D Word processing IV .mpeg
Choose the correct answer from the options given (3) Statement I is correct but Statement II is false
below: (4) Statement I is incorrect but Statement II is true
(1) A-I, B-II, C-III, D-IV [ICT 2020]
(2) A-III, B-IV, C-II, D-I 285. Computer hardware consists of
(3) A-II, B-III, C-IV, D-I (1) Computer table (2) Monitor and CPU
(4) A-I, B-IV, C-III, D-II (3) Software (4) Google
[ICT 2020] [ICT 2020]
279. Microsoft Access, Oracle and SQL are example of 286. Which of the following is a data visualization
(1) File Data Base (2) Relational Data method?
Base (1) Line (2) Circle and Triangle
(3) Template (4) Attribute (3) Pie Chart and Bar Chart (4) Pentagon
[ICT 2020] [ICT 2020]
280. Full form of the abbreviation CPS is: 287. A-F system is used in which of the following
(1) Computer Program Software number system?
(2) Control Process Software (1) Binary (2) Octal
(3) Cyber Physical Software (3) Hexa-Decimal (4) Decimal
(4) Cyber Physical System [ICT 2020]
[ICT 2020] 288. What is the full form of abbreviation BIOS?
281. Given below are two statements. (1) Big Information Online System
Statement I: The purpose of ICT interventions in (2) Binary Input Output System
classroom teaching is to promote and optimize (3) Basic Input Output System
learning outcomes. (4) Binary Inner Open Software
Statement II: Most of the on-line methods like [ICT 2020]
Swayam and MOOCs etc. have the potential to 289. Given below are two statements, one is labelled
become effective supplements to conventional as Assertion A and the other is labelled as Reason
teaching-learning systems. R
In the light of the above statements, choose the Assertion A: Nowadays many online courses are
correct answer from the options given below: available and their popularity is increasing
(1) Both Statement I and Statement II are true Reason R: Selecting the right course from many
(2) Both Statement I and Statement II are false such, is a big challenge
(3) Statement I is correct but Statement II is false In light of the above statements, choose the most
(4) Statement I is incorrect but Statement II is true appropriate answer from the options given below:
[ICT 2020] (1) Both Aand Rare correct and R is the correct
282. Which technology is used for crypto currency? explanation of A

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 23

(2) Both A and Rare correct but R is NOT the (C) Fire
correct explanation of A (D) Individual Computer
(3) A is correct but R is not correct Choose the correct answer from the options given
(4) A is not correct but R is correct below:
[ICT 2020] (1) (A), (C) only (2) (B), (C) only
290. The word blog is derived from the word (3) (A), (B), (C) only (4) (A), (B),
(1) My log (2) Weblog (D) only
(3) E blog (4) Blogger [ICT 2020]
[ICT 2020] 295. Given below are two statements:
291. Match List I with List II: Statement I: External hard disk is a primary
List I List II memory.
(A) Input (1) Mouse Statement II: In general. Pen drives have more
(B) Output (II) Monitor storage capacity than external hard disks.
(C) Memory (III) Cache In the light of the above statements, choose the
(D) Software (IV) Python correct answer from the options given below:
Choose the correct answer from the options given (1) Both Statement I and Statement II are correct
below: (2) Both Statement I and Statement II are incorrect
(1) (A)-(I), (B)-(II), (C)-(IV), (D)-(III) (3) Statement I is correct but Statement II is
(2) (A)-(I), (B)-(III), (C)-(II). (D)-(IV) incorrect
(3) (A)-(III), (B)-(II), (C)-(I), (D)-(IV) (4) Statement I is incorrect but Statement II is
(4) (A)-(I), (B)-(II), (C)-(III), (D)-(IV) correct
[ICT 2020] [ICT 2020]
292. Type of memory that holds the computer startup 296. Which of the following statements are true?
routine is A. An algorithm may produce no output
(1) Cache B. An algorithm expressed in a programming
(2) RAM language is called a computer program.
(3) DRAM C. An algorithm is expressed in a graphical form
(4) ROM known as flowchart
D. An algorithm can have infinite sequence of
instructions.
(1) (A) and (B) only
(2) (A) (B) and (D) only
(3) (C) and (D) only
[ICT 2020] (4) (B) and (C) only
293. Cloud computing has the following distinct [ICT 2020]
characteristics: 297. Given below are two statements: One is labelled
(A) The service is hosted on the internet. as Assertion (A) and the other is labelled as
(B) It is made available by a service Reason (R):
provider. Assertion (A): The use of ICT has a great potential
(C) It computes and predicts rain when the for optimising learning outcomes.
weather is cloudy. Reason (R): ICT promotes scope for variety,
(D) The service is fully managed by the flexibility and attractiveness.
provider In the light of the above statements, choose the
Choose the correct answer from the options given correct answer from the options given below:
below: (1) Both (A) and (R) are true and (R) is the correct
(1) (A), (B) only explanation of (A)
(2) (A), (B), (C) only (2) Both (A) and (R) are true but (R) is NOT the
(3) (A), (D) only correct explanation of (A)
(4) (A), (B), (D) only (3) (A) is true but (R) is not correct
[ICT 2020] (4) (A) is false but (R) is correct
294. A firewall is a software tool that protects [ICT 2020]
(A) Server 298. Match List I with List II: List II contains examples
(B) Network of the items Listed of List I

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 24

List I List II [ICT 2020]


A. Web 2.0 (I) windows 8, i-OS 303. What type of device is a joystick?
Applications (1) Input (2) Output
B. Search Engines (II) C++, Java (3) Memory (4) Processor
C. System Softwares (III) Blogs, Twitter [ICT 2020]
D. High level language (IV) Google, Yahoo 304. Which of the following is an application
software?
(1) (A)-(IV), (B)-(III),(C)-((1), (D)-(II) (1) Android (2) ios
(2) (A)-(III), (B) - (IV), (C) - (I), (D) (II) (3) Linux (4) MS Word
(3) (A)-((1), (B)-(III), (C) - (IV), (D) (II) [ICT 2020]
(4) (A)-(IV), (B) - (I), (C) - (III), (D) - (II) 305. Match List I with List II
[ICT 2020] List II List I
299. CDMA stands for I Step by step procedure to A Software
(1) Code Division Multiplexed Access solve a problem
(2) Code Division Multiple Access II Raw facts and figures B Hardware
(3) Code Division Mobile Access III Hard Disk C Algorithm
(4) Code Division Mobile Adapter IV Linux D Data
[ICT 2020] Choose the correct answer from the options given
300. Match List I with List II: below:
List (type of media) List II (Example) (1) A-III, B-I, C-II, D-IV (2) A-III, B-II, C-I, D-
A. Synchronous media (I) application of multi- IV
media (3) A-IV, B-I, C-II, D-III (4) A-IV, B-III, C-I, D-
B. Asynchronous (II) interactive multi- II
media media [ICT 2020]
C. Rich media (III) E-mail 306. Match List I with List II
D. Hyper media (IV) Telephone List I List II
(1) (A)-(I), (B) (II),(C) – (III), (D)-(IV) A. Programming I. Wide Area
(2) (A)-(IV), (B) - (III), (C) - (II), (D) - (I) Language Network
B. Operating System II. MS PowerPoint
(3) (A)-(II), (B) (IV), (C) - (I), (D) - (III)
C. Internet III. Windows XP
(4) (A)-(III), (B) (I), (C) - (IV), (D)-(II) D. Application Software IV. C++
Choose the correct answer from the options given
below:
[ICT 2020] (1) A-I, B-II, C-III, D-IV (2) A-IV, B-III, C-I, D-
301. In display technology, CRT Stands for II
(1) Cathode Ray Transmission (3) A-IV, B-II, C-III, D-I (4) A-II. B-III, C-I. D-
(2) Computer Ray Transmission IV
(3) Cathode Ray Tube [ICT 2020]
(4) Cathode Ray Transducer 307. Which of the following is related to National
[ICT 2020] Super Computing Mission of Government of
302. Match List I with List II India?
List I List II (1) Param 8000 (2) Param 10000
A Web browser I Hard Disk (3) Param Dhavak (4) Param Shivay
B Operating system II Chrome [ICT 2020]
C Secondary memory III III software 308. Given below are two statements
MS-Word Statement I: ALU stands for Arithmetic Logic Unit
D Application IV DOS Statement II: UPS stands for Uniform Power
Choose the correct answer from the options given Sources
below: In light of the above statements, choose the most
(1) A-III, B-II, C-I, D-IV (2) A-II, B-IV, C-I, D- appropriate answer the options given below
III (1) Both Statement I and Statement II are true
(3) A-III, B-I, C-II, D-IV (4) A-III, B-I, C-IV, D- (2) Both Statement I and Statement II are false
II (3) Statement I is correct but Statement II is false

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 25

(4) Statement I is incorrect but Statement II is true Assertion A: E-commerce companies require
[ICT 2020] personal data to serve the stakeholders better
309. Which of the following statements are correct? Reason R: In this process, privacy may get
A. Internet is larger than intranet compromised.
B. Intranet is larger than internet In the light of the above statements, choose the
C. Internet and Intranet are same most appropriate answer from the options given
D. Intranet is a network of networks below
E. World Wide Web is an example of intranet (1) Both A and R are correct and R is the correct
Choose the correct answer from the options given explanation of A
below: (2) Both A and Rare correct but R is NOT the
(1) B and E only (2) A and D only correct explanation of A
(3) C and E only (4) B and C only (3) A is correct but R is not correct
[ICT 2020] (4) A is not correct but R is correct
310. Given below are two statements [ICT 2020]
Statement I: Example of primary memory is RAM. 315. Asynchronous communication takes place
Statement II: Example of secondary memory is Pen through which of the following technologies?
drive A. Teleconferencing B. Virtual
In light of the above statements, choose the most classroom
appropriate answer the options given below C. Video chat D. Blogs
(1) Both Statement I and Statement II are true E. Discussion boards F. Vlog
(2) Both Statement I and Statement II are false Choose the correct answer from the options given
(3) Statement I is correct but Statement II is false below:
(4) Statement I is incorrect but Statement II is true (1) A, B and C only (2) B, C and D only
[ICT 2020] (3) D, E and F only (4) C, D and E only
311. Python is a [ICT 2020]
A. Programming language 316. Information and Communication Technology
B. Operating system (ICT) comprises of
C. Search engine A. Online learning
D. Snake B. Learning through Mobile Application
Choose the correct answer from the options given C. Web based learning
below: D. All of the above
Choose the correct answer from the options given
(1) B only (2) A only below:
(3) B and C only (4) C and D only (1) A and B only (2) A and C only
(3) D only (4) A only

[ICT 2020] [ICT 2020]


312. What is the full form of the abbreviation CD- 317. Match List I with List II:
ROM? List I (computer List II (Description)
(1) Count Disk Random Only Memory Terms)
(2) Compact Disk Run Only Memory A. Operating (I) A service that runs on the
(3) Compact Disk Read Only Memory System(OS) internet
(4) Count Disk Raw Only Memory B. www (II) Software that helps on
[ICT 2020] OS to control a piece of
313. Multimedia comprises of hardware
(1) Text and Audio C. Device driver (III) Software that controls
(2) Video and Audio peripherals and
(3) Video only allocates memory and
(4) Text, Audio and Video processor items
[ICT 2020] D. IP (IV) defines network
314. Given below are two statements, one is labelled addresses and is used
as Assertion A and other is labelled as Reason R. for routing packets
(1) (A)-(II), (B) - (IV),(C) - (III), (D)-(I)

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 26

(2) (A)-(III), (B)-(I), (C)-(II), (D)-(IV) 323. Speed of Internet is measured in


(2) (A)-(IV), (B)-(I), (C)-(II), (D)-(III) (1) GHz (2) Gbps
(4) (A)-(III), (B) - (IV), (C)-(II), (D)-(I) (3) GB (4) dpi
[ICT 2020] [ICT 2020]
318. Given below are two statements: One is labelled 324. Ankur receives an email informing him that his
as Assertion (A) and the other is labelled as credit card is going to be cancelled. The email
Reason (R): advises him to click on the provided link and sign
Assertion (A): Random Access Memory (RAM) is into his online banking account to prevent this
volatile and stores data/programs currently in use. from happening, which he does. A week later,
Reason (R): RAM is a storage medium that retains Ankur notices that Rs. 10,000 has been
its contents even after the supply of electricity has withdrawn from his bank account. What has
been turned off. Ankur fallen victim to?
(1) Both (A) and (R) are true and (R) is the correct (1) A phishing scam (2) A Trojan horse
explanation of (A) (3) Online blackmail (4) A virus
(2) Both (A) and (R) are true but (R) is NOT the [ICT 2020]
correct explanation of (A) 325. A 'De-novo' institution is characterized by
(3) (A) is true but (R) is not correct (1) ICT enabled pedagogy
(4) (A) is false but (R) is correct (2) Focus on teaching and research in unique and
[ICT 2020] emerging areas of knowledge
319. Consider the following incomplete sentence: (3) Focus on teaching and research on foreign
WiFi is short for Wireless Fidelity and it is a set languages and their literature
of _______ for computing to connect to a LAN or to (4) State of art infrastructure
the Internet for using short range _________ to [ICT 2020]
allow ________. 326. Identify the correct pair from the following
Complete the above sentence by choosing the (1) AVI-File Transfer Protocol
correct words in order from the following list: (2) Excel- Word Processing Software
A. Standards (3) HDD- Cloud Storage Facility
B. Waves (4) Ubuntu- Operating System
C. Devices [ICT 2020]
(1) (C) (B) (A) only (2) (C) (A) (B) only 327. BCD stands for
(3) (A) (C) (B) only (4) (A) (B) (C) only (1) Binary Coded Decimal
[ICT 2020] (2) Binary Coded Digit
320. Using a websites to pour out one's grievances is (3) Bit Coded Decimal
called (4) Bit Coded Digit
(1) Cyber venting (2) Web hate [ICT 2020]
(3) Web anger (4) Cyber abuse 328. Which one of the following allows a phone call to
[ICT 2020] be routed over network wires?
321. What is the full form of abbreviation GIF? (1) Video Conferencing (2) Teleconferencing
(1) Graphics Interchange Format (3) Optical Fibre (4) VOIP
(2) Graphics Interchange File [ICT 2020]
(3) Global Interchange Format 329. Which one of the following represents one billion
(4) Graphics Input Format characters?
[ICT 2020] (1) 1 Kilobyte (2) 1 Megabyte
322. Which of the following correctly lists computer (3) 1 Gigabyte (4) 1 Terabyte
memory types from lowest to highest speed? [ICT 2020]
(1) Main Memory, Cache Memory, Secondary 330. Scrambling of data before transmission across a
Memory network to avoid manipulation by a third party is
(2) Cache Memory, Secondary Memory, Main known as
Memory (1) Protection (2) Permutation
(3) Secondary Storage, Main Memory, Cache (3) Detection (4) Encryption
Memory [ICT 2020]
(4) Secondary Stage, Cache Memory, Main Memory
[ICT 2020]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 27

331. Which of the following number systems uses two 338. Which of the following devices allows a user to
numbers to represent data in computer? copy an external document and save it in
(1) Bicentennial (2) Biometric electronic form onto a computer?
(3) Binary (4) Byte (1) Spammer (2) Scanner
[ICT 2020] (3) Printer (4) Plotter
332. Satellite communication works through [ICT 2020]
(1) Radar (2) Receptor 339. E-commerce involves buying and selling of:
(3) Transmitter (4) Transponder (1) International goods
[ICT 2020] (2) Electronic goods
333. Which of the following is the binary equivalent of (3) Products related to computers
the decimal number 35? (4) Products and services over the Internet
(1) 100001 (2) 100101 [ICT 2020]
(3) 100011 (4) 101001 340. Which of the following is correct with respect to
[ICT 2020] the size of the storage units?
334. In banking system, ATM means (1) Terabyte < Petabyte < Exabyte < Zettabyte
(1) Automatic Transfer Money (2) Petabyte < Exabyte < Zettabyte < Terabyte
(2) Automatic Time Money (3) Exabyte < Zettabyte < Terabyte < Petabyte
(3) Automatic Teller Machine (4) Zettabyte < Exabyte < Petabyte < Terabyte
(4) Automatic Tele Money [ICT 2020]
[ICT 2020] 341. Match List I with List II: List I consists
335. In IT Act 2000, which section deals with components of computer system and List II is
punishment for cyber terrorism? their examples.
(1) 45 (F) (2) 66 (B) List I List II
(3) 66 (F) (4) 67 (B) (A) Output Device (I) Operating
[ICT 2020] System
336. The term Plotter is best described as: (B) System Software (II) Printer
(1) An input device to produce good quality (c) Storage Device (III) MS-Office
graphics (D) Application (IV) RAM
(2) An output device to produce drawings and Software
graphics Choose the correct answer from the options given
(3) A fast storage device for storing good quality below:
graphics (1) (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
(4) A multipurpose device for taking inputs as well (2) (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
as outputs (3) (A)-(II), (B)-(I), (C)-(IV), (D)-(III)
[ICT 2020] (4) (A)-(III), (B)-(I), (C)-(II), (D)-(IV)
337. Given below are two statements, one is labelled [ICT 2020]
Assertion (A) and the other is labelled Reason 342. Methodology for the delivery of voice and
(R) multimedia sessions over the internet is called:
Assertion (A): An Intranet is a private network for (1) TCP/IP (2) UDP
sharing computing resources and information within (3) VoIP (4) Chat
an organization. [ICT 2020]
Reason (R): Intranet is private version of the 343. What is the full form of the abbreviation ISP?
Internet. (1) International Software Product
In the light of the above, choose the correct answer (2) Internet Service Provider
from the options given below (3) Internet Server Product
(1) Both (A) and (R) are true and (R) is the correct (4) Internet Software Provider
explanation of (A) [ICT 2020]
(2) Both (A) and (R) are true but (R) is NOT the 344. Which of the following is true about the wireless
correct explanation of (A) networking
(3) (A) is true but (R) is false (A) It is easier to expand the network
(4) (A) is false but (R) is true (B) Data is less secured than wired system
[ICT 2020] (C) Reliability is more than wired

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 28

(D) Faster than wired network (1) a), b), and c) (2) a), b) and d)
Choose the correct answer from the options given (3) a), c) and d) (4) b), c), and d)
below: [ICT 2020]
(1) (A), (B), (D) only 350. One aspect of E-governance deals with the flow
(2) (A), (B) only of information between the Government and
(3) (B), (C) only citizens. Which of the following are Government
(4) (A), (B), (C) only to Citizens (G2C) initiative?
[ICT 2020] a) e-Help
345. What is bit rate? b) e-Health
(1) Number of bits stored in computer c) e-Tendering
(2) Number of bits per second that can be d) e-Feedback
transmitted over a network Choose the correct answer from the options given
(3) Number of bits per hour stored in a computer below:
over a network (1) a) and b) only (2) a) and d) only
(4) Binary digit converted to hexa decimal number (3) b) and d) only (4) b) and c) only
[ICT 2020]
346. Given below are two statements: Exam Year – 2021
Statement I: Use of programmed instructional
material as supplement has the potential to optimize [20-NOVEMBER-2021 SHIFT-1]
351. Match the items of Column-I with those of
learning outcomes.
Statement II: ICT, if used, judiciously will render Column-ll:
teaching-learning systems effective and efficient. List 1. List 2.
In the light of the above statements, choose the (COMPUTER (PURPOSE)
TERMS)
most appropriate answer from the options given
A.OCR 1. Used to scan typed
below:
or
(1) Both Statement and Statement II are correct handwritten
(2) Both Statement and Statement I are incorrect documents.
(3) Statement I is correct but Statement II is B.OMR 2. Used to mark
incorrect multiple
(4) Statement I is incorrect but Statement II is choice question
correct C. Email 3. Asynchronous
Communication
D. Instant Messaging 4. synchronous
Communication
[ICT 2020]
(1) A-2, B-1, C-4, D-3 (2) A-2, B-1, C-3, D-4
347. The process through which an illegitimate
(3) A-1, B-2, C-3, D-4 (4) A-1, B-2, C-4, D-3
website pretends to be a specific legitimate
[20-NOVEMBER-2021 SHIFT-1]
website is known as:
352. An IT Company has recently produced a new
(1) Sniffing (2) Spoofing
laptop model that uses less power, is smaller in
(3) Back Doors (4) War Dialing
size and weighs less than previous laptop
[ICT 2020]
348. How many unique combinations of O's and 1's models. The technology that has been used to
can be made with 5- binary-digit code? accomplish this, is:
(1) 16 (2) 32 (1) Faster RAM
(3) 64 (4) 128 (2) Blu-Ray Drive
[ICT 2020] (3) Solid State Hard Drive
349. Which of the following keys of keyboard are (4) LCD Technology
called modifier keys? [20-NOVEMBER-2021 SHIFT-1]
a) Ctrl 353. Given below are two statements: One is labelled
b) Shift as Assertion (A) and the other is labelled as
c) End Reason (R).
d) Alt Assertion (A): Every general-purpose computer
Choose the correct answer from the options given must have an Operating System (OS) installed on it.
below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 29

Reasons (R): Man and Computer cannot (1) (D), (A), (C), (B) (2) (A), (D),
communicate directly. (C), (B)
In the light of the above statements, choose the (3) (A), (B), (C), (D) (4) (D), (C),
correct answer from the options given below: (A), (B)
(1) Both (A) and (R) are true and (R) is the correct [20-NOVEMBER-2021 SHIFT-2]
explanation of (A) 357. What is the binary equivalent of the decimal
(2) Both (A) and (R) are true but Je but (R) is NOT number 67.625?
the correct explanation of (A) (1) 1000010.110 (2) 1000011.110
(3) (A) is true but (R) is false (3) 1000010.101 (4) 1000011.101
(4) (A) is false but (R) is true [20-NOVEMBER-2021 SHIFT-2]
[20-NOVEMBER-2021 SHIFT-1] 358. Which of the following statements are related to
354. Given below are two statements regarding a the role of ICT in citizen services?
smartphone that has both Bluetooth and Wi-Fi (A) Access to public documents
technology: (B) On-line payments
Statement (I): Wi-Fi has a shorter range than (C) Better medical education across the country
Bluetooth. Choose the correct answer from the options given
Statement (II): Wi-Fi can transmit data at a faster below:
rate than Bluetooth. (1) (A), (B) and (C)
In the light of the above statements, choose the (2) (A) and (C) only
correct answer from the options given below: (3) (B) and (C) only
(1) Both Statement (I) and Statement (II) are true (4) (A) and (B) only
(2) Both Statement (I) and Statement (II) are false [20-NOVEMBER-2021 SHIFT-2]
(3) Statement (I) is true but Statement (II) is false 359. Identify the correct order of the following
(4) Statement (I) is false but Statement (II) is true different types of computer components ranked
[20-NOVEMBER-2021 SHIFT-1] from fastest to slowest in terms of access time.
355. Given below are two statements: One is labelled (A) RAM
as Assertion (A) and the other is labelled as (B) Optical Drive
Reason (R). (C) CPU Cache
Assertion (A): The more performative broadcast is (D) SSD
also more cohesive and popular, but owing to new Choose the correct answer from the options given
media its effect is decreasing. below:
Reasons (R): Internet is tending to eclipse broadcast (1) (B), (D), (A), (C)
media. (2) (C), (D), (A), (B)
In the light of the above statements, choose the (3) (A), (B), (C), (D)
most appropriate answer from the options given (4) (C), (A), (D), (B)
below:
(1) Both (A) and (R) are correct and (R) is the
correct explanation of (A) [20-NOVEMBER-2021 SHIFT-2]
(2) Both (A) and (R) are correct but (R) is NOT the 360. Match the items of Column-I with those of
correct explanation of (A) Column-II:
(3) (A) is correct but (R) is not correct LIST I LIST II
(4) (A) is not correct but (R) is correct (Computer (Description)
[20-NOVEMBER-2021 SHIFT-1] Terms)
356. Identify the correct order of the following (A) HTML (1) Semantic Web
storage capacities ranked from largest to (B) Web 2.0 (2) Use of Internet to
make phone calls
smallest capacity
(C) Web 3.0 (3) Language used to
(A) 1500 M Bytes create web pages
(B) 5 K Bytes (D) VOIP (4) Collaborative web
(C) 1 G Bytes (1) A-3, B-4, C-1, D-2 (2) A-3, B-1, C-4, D-2
(D) 2 T Bytes (3) A-2, B-4, C-1, D-3 (4) A-4, B-3, C-1, D-2
Choose the correct answer from the option given [21-NOVEMBER-2021 SHIFT-1]
below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 30

361. Identify the correct order of the following (1) (A) and (B) only (2) (B) and (C)
computer storage capacities ranked from only
smallest to largest capacity. (3) (A) and (C) only (4) (A), (B)
(A) 100 GBytes and (C)
(B) 10 000 000 000 Bytes [21-NOVEMBER-2021 SHIFT-1]
(C) 1 TBytes 365. With respect to computers, what is the main
(D) 100 000 MBytes advantage of a Graphical User Interface (GUI)
(E) 1 000 000 KBytes compared with a Command Line Interface (CLI)?
Choose the correct answer from the options given (1) Provides higher level of security and requires
below: less memory
(1) (D), (B), (E), (A), (C) (2) (E), (B), (D), (A), (2) Easier to use for non-experts
(C) (3) Performs complex tasks faster and requires less
(3) (B), (E), (D), (A), (C) (4) (E), (B), (D), (C), memory
(A) (4) Requires less processing power
[21-NOVEMBER-2021 SHIFT-1] [21-NOVEMBER-2021 SHIFT-2]
362. Match List I with List II. 366. Match List I with List II.
List I List II List 1. List 2.
(Computer (Description) (Computer (Description)
Components) Terms)
A. 1. Part that runs executable
A. HDD 1. Visual Display Unit
Processo programs
B. RAM 2. Volatile Memory r
C. ROM 3. External Memory B. RAM 2. Part that stores files
D. CRT 4. Non-Writable Memory permanently
Choose the correct answer from the options given C. Hard 3. Part that stores instructions
below: Disk and
(1) A-2, B-3, C-4, D-1 (2) A-3, B-2, C-1, D-4 data temporarily for use
D. Compiler 4. Part that translates source
(3) A-4, B-3, C-2, D-1 (4) A-3, B-2, C-4, D-1
program to executable
[21-NOVEMBER-2021 SHIFT-1]
program
363. Given below are two statements: Choose the correct answer from the options given
Statement I: A web browser is a piece of software below:
that retrieves and displays web pages. (1) A-1, B-3, C-2, D-4 (2) A-4, B-3, C-2, D-1
Statement II: A search engine is a special kind of (3) A-2, B-1, C-3, D-4 (4) A-1, B-2, C-4, D-3
website that helps people in finding web pages from [21-NOVEMBER-2021 SHIFT-2]
other web-sites. 367. Identify the correct order of the following INTEL
In the light of the above statements. Choose the processors in the increasing order of speed.
correct answer from the options given below: (A) 80486
(1) Both Statement I and Statement II are true. (B) 8085
(2) Both Statement I and Statement II are false. (C) Dual Core
(3) Statement I is true but Statement II is false. (D) Pentium-III
(4) Statement I is false but Statement II is true. Choose the correct answer from the options given
[21-NOVEMBER-2021 SHIFT-1] below:
364. With regard to computer memory, which of the (1) (A), (B), (C), (D) (2) (B), (A),
following statements are TRUE? (D), (C)
(A) Secondary storage is slower, cheaper, (3) (A), (B), (D), (C) (4) (A), (C),
and less volatile than primary storage. (D), (B)
(B) Tape drives are direct access devices. [21-NOVEMBER-2021 SHIFT-2]
(C) The contents of most forms of RAM are 368. Which of the following group of statements in the
volatile, thus making them unsuitable for long context of Information Technology (IT) is
term data storage. correct?
Choose the correct answer from the options given (A) Mouse, Keyboard, and Plotter are all
below: input devices.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 31

(B) Unix, Windows, and Linux are all (C) A wiki is designed to allow people to
operating systems. collaborate easily.
(C) Register, Cache Memory, and Hard Disk Choose the correct answer from the options given
are all memory modules. below:
(D) Monitor, Printer, and Scanner are all (1) (A) and (B) only (2) (B) and (C)
output devices. only
Choose the correct answer from the options given (3) (A) and (C) only (4) (A), (B)
below: and (C)
(1) (A) and (B) only [22-NOVEMBER-2021 SHIFT-2]
(2) (A) and (D) only 372. Identify the correct order in which the following
(3) (C) and (D) only computer memories are ranked from largest to
(4) (B) and (C) only smallest in terms of storage capacity:
[22-NOVEMBER-2021 SHIFT-1] (A) Cache
369. Given below are two statements: (B) RAM
Statement I: CPU executes software directly from (C) Hard Disk
secondary memory. (D) Register
Statement II: A software is termed as Open Source Choose the correct answer from the options given
Software if it can be downloaded from the Internet. below:
In the light of the above statements, Choose the (1) (C) (B) (D) (A) (2) (D) (A) (B) C)
correct answer from the options given below: (3) (B) (D) (C) (A) (4) (C) (B) (A) (D)
(1) Both Statement I and Statement II are true. [22-NOVEMBER-2021 SHIFT-2]
(2) Both Statement I and Statement II are false. 373. Given below are two statements
(3) Statement I is true but Statement II is false. Statement I: The largest decimal number that can be
(4) Statement I is false but Statement II is true. represented using a 7- bit binary number is 128.
[22-NOVEMBER-2021 SHIFT-1] Statement II: Minimum number of bits required to
370. Identify the correct order of following computer store largest 2-digit decimal number is 7.
memory types ranked from slowest to fastest in In the light of the above statements. choose the
terms of access time. correct answer from the options given below:
(A) Cache (1) Both Statement I and Statement II are true
(B) CDROM (2) Both Statement I and Statement II are
(C) Hard Disk (3) Statement I is true but Statement II is false
(D) RAM (4) Statement I is false but Statement II is true
(E) Register [22-NOVEMBER-2021 SHIFT-2]
Choose the correct answer from the options given 374. With respect to Computer Virus, which one of the
below: following statements is True?
(1) (C), (B), (A), (D), (E) (1) It is a kind of physical impurity which when
(2) (E), (A), (D), (C), (B) present in the CPU causes it to malfunction.
(3) (B), (C), (D), (A), (E) (2) It is a computer program that infects a computer
(4) (D), (A), (E), (B), (C) and thereby sends unsolicited bulk email.
(3) It is a computer program which copies itself to
infect a computer without the permission /
knowledge of the user.
(4) It is an accumulation of dust on the hard disk
causing it to malfunction.

[22-NOVEMBER-2021 SHIFT-1] [22-NOVEMBER-2021 SHIFT-2]


371. Which of the following statements about wikis 375. Which of the following group of statements with
are True? respect to World Wide Web (WWW) is correct?
(A) Wiki pages can be locked by moderators (A) A web server is a software used to
to prevent vandlism. access and view content on the WWW.
(B) Every change that is made to a wiki (B) A web browser is a computer system
page is logged and can be viewed in a history that makes files available on the www.
list. (C) Tim Berners-Lee created the Www.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 32

(D) Mosaic was the first widely used web 380. What is Ethernet?
browser. (1) A collision-detection protocol
Choose the correct statements from above: (2) A protocol used by many wired LAN's.
(1) (A) and (B) only (2) (C) and (D) (3) A protocol used for address translation
only (4) A security protocol
(3) (B) and (C) only (4) (A) and (D) [24-NOVEMBER-2021 SHIFT-2]
only 381. Which of the following statements are correct?
[24-NOVEMBER-2021 SHIFT-1] A. Laser printers use dry ink
376. Which of the following statements are true? B. Unlike dot matrix and inkjet printers, laser
A. Simplex data transmission is in two-directions printers do not use ink when producing a
only document
B. Half-duplex data transmission is in both C. Laser printers use the property of static
directions but not at the same time electricity
C. Full-duplex data transmission is in both D. Laser printers produce ozone gas and tiny toner
directions simultaneously particulates in the air
D. Serial data transmission is when data is sent, 8 Choose the correct answer from the options given
bit at a time, over a single wire below:
E. Parallel data transmission is when one bit of data (1) A and C only
is sent down over a single wire (2) A, B and D only
Choose the correct answer from the options given (3) A, C and D only
below: (4) B, C and D only
(1) A, B and C only (2) B and C only [24-NOVEMBER-2021 SHIFT-2]
(3) C and D only (4) B, C and D only 382. Which of the following is a disadvantage of
[24-NOVEMBER-2021 SHIFT-1] laptop computers in comparison to desktop
377. Given below are two statements computers?
Statement I: DVDs use a single spiral 'track' to store (1) It has lower power consumption
data working from the centre to the edge. (2) It has no trailing wires
Statement II: DVDs are Read-only devices (3) It is easier to break or steal
In light of the above statements, choose the correct (4) It is lightweight and self-contained
answer from the options given below: [24-NOVEMBER-2021 SHIFT-2]
(1) Both Statement I and Statement II are false 383. In electronic banking, ATM stands for:
(2) Both Statement I and Statement II are true (1) Automated Teller Machine
(3) Statement I is false but Statement II is true (2) Automated Transfer Money
(4) Statement I is true but Statement II is false (3) Automatic Transfer Machine
[24-NOVEMBER-2021 SHIFT-1] (4) Automatic Transfer Mode
378. Match List I with List II [24-NOVEMBER-2021 SHIFT-2]
List 1. List 2. 384. A spreadsheet is:
A. System Software 1. Library (1) Four-dimensional table or grid
Management System (2) One-dimensional table or grid
B. Application 2. Firewall
(3) Three-dimensional table or grid
Software
(4) Two-dimensional table or grid
C. Security Software 3. Compiler
D. Embedded Software 4. Automatic fridge
Choose the correct answer from the options given
below:
(1) A-1, B-3, C-4, D-2 (2) A-2, B-4, C-1, D-3 [24-NOVEMBER-2021 SHIFT-2]
(3) A-3, B-1, C-2, D-4 (4) A-3, B-4, C-1, D-2 385. Given below are two statements
[24-NOVEMBER-2021 SHIFT-1] Statement I: DRAM consists of a number of
379. What is the World Wide Web (www)? transistors and capacitors
(1) Collection of webpages stored on websites Statement II: DRAM needs to be constantly
(2) Hypertext processor refreshed
(3) Interconnected networks In light of the above statements, choose the correct
(4) Web browser answer from the options given below:
[24-NOVEMBER-2021 SHIFT-1] (1) Both Statement I and Statement II are false

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 33

(2) Both Statement I and Statement II are true (1) A is false but R is true
(3) Statement I is false but Statement II is true (2) A is true but R is false +1 Educator in NTA-UGC
(4) Statement I is true but Statement II is false NET
[25-NOVEMBER-2021 SHIFT-1] (3) Both A and R are true and R is the correct
386. The basic free version of 200M web meeting explanation of A
platform allows an online class to be conducted (4) Both A and R are true but R is NOT the correct
for how many minutes? explanation of A
(1) 30 minutes (2) 40 minutes [25-NOVEMBER-2021 SHIFT-1]
(3) 50 minutes (4) 60 minutes 390. Match List I with List II
[25-NOVEMBER-2021 SHIFT-1] List 1. List 2.
387. Which of the following statements about internal Description Appropriate
and external computer memory are true? Technical Term
A. A portable hard drive is an example of internal A. Numerical ID for each 1. VOIP
memory device on the
B. Magnetic tape is used to store backups of data Internet
C. RAM is an internal memory B. Unique ID for a 2. URL
D. ROM loses its data when the power is turned off Network Interface
Choose the correct answer from the options given Card (NIC)
below: C. Use of the Internet to 3. MAC Address
(1) A and C only (2) A and B only make phone calls
(3) B and C only (4) C and D only D. Text used by web 4. IP Address
[25-NOVEMBER-2021 SHIFT-1] browsers to locate a
388. Match List I with List II web address on the
List 1. List 2. Internet IV.
Content Area Integrating Technology Choose the correct answer from the options given
Application below:
A. 1. Software programs to (1) A-1, B-3, C-4, D-2 (2) A-2, B-3, C-1, D-4
Reading/Langua develop basic reading (3) A-4, B-1, C-2, D-4 (4) A-3, B-4, C-1, D-2
ge Arts skills [25-NOVEMBER-2021 SHIFT-1]
B. Mathematics 2. Simulations to explore 391. Which one of the following is a disadvantage of
distant places and times using proprietary software rather than open
C. Science 3. Graphing calculations to source software?
illustrate abstract or (1) Proprietary software can only be accessed with a
hard to-visualize password
relationship (2) Proprietary software can only be used on
D. Social Studies 4. Simulations to illustrate proprietary systems
complex relationships (3) Proprietary software can only be used with an
Choose the correct answer from the options given Internet connection
below: (4) Proprietary software is usually more expensive
(1) A-1, B-3, C-4, D-2 (2) A-2, B-4, C-1, D-3
(3) A-3, B-1, C-2, D-4 (4) A-3, B-4, C-1, D-2
[25-NOVEMBER-2021 SHIFT-1] [25-NOVEMBER-2021 SHIFT-2]
389. Given below are two statements, one is labelled 392. Match List I with List II
as Assertion A and the other is labelled as Reason LIST I LIST II
R (Computer Terms) (Examples)
Assertion A: VisiCalc, the first spreadsheet software A Operating system 1. Pentium
application, is a commonly cited example of one of B Application 2. Linux
the first killer applications. software
Reason R: VisiCalc helped in bringing PCs into the C Processor 3. Router
business realm. D Network Device 4. Anti-virus
In light of the above statements, choose the correct (1) A-1, B-4, C-2, D-3
answer from the options given below: (2) A-2, B-4, C-1, D-3

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 34

(3) A-2, B-3, C-1, D-2 (2) A, B and C only


(4) A-4, B-3, C-2, D-1 (3) A, B, C and D
[25-NOVEMBER-2021 SHIFT-2] (4) B, C and D only
393. Given below are two statements, one is labelled [26-NOVEMBER-2021 SHIFT-1]
as Assertion A and the other is labelled as Reason 397. The Post Office protocol is:
R (1) Protocol used for sending emails
Assertion A: A good computer networking solution (2) Protocol used for transfer of files from one
can be very much beneficial for your business computer to another computer
Reason R: With computer networking, you can cut (3) Protocol used to handle email attachments
back on costs and allow for efficient use of (4) Protocol used when receiving emails from the
resources email server
In light of the above statements, choose the correct [26-NOVEMBER-2021 SHIFT-1]
answer from the options given below: 398. mooKIT platform uses ________, an open source
(1) A is false but R is true content management system.
(2) A is true but R is false (1) DRUPAL
(3) Both A and R are true and R is the correct (2) JOOMLA
explanation of A (3) Moodle
(4) Both A and R are true but R is NOT the correct (4) SAKAI
explanation of A [26-NOVEMBER-2021 SHIFT-1]
[25-NOVEMBER-2021 SHIFT-2] 399. The number of characters in 8 bit ASCII code
394. Arrange the following optical storage devices in (American Standard Code for Information
increasing order of their storage capacity Interchange) is:
A. DVD (1) 128
B. CD-ROM (2) 256
C. Blu-Ray (3) 512
Choose the correct answer from the options given (4) 64
below: [26-NOVEMBER-2021 SHIFT-1]
(1) A, B, C (2) A, C, B 400. Given below are two statements regarding the
(3) B, A, C (4) B, C, A Router
[25-NOVEMBER-2021 SHIFT-2] Statement I: It enables data packets to be routed
395. Given below are two statements between different networks.
• Statement I: Tablet computers have touch screens Statement II: It works in the Data Link Layer.
• Statement II: A tablet computer has a keyboard In light of the above statements, choose the correct
• In light of the above statements, choose the correct answer from the options given below
answer from the options given below: (1) Both Statement I and Statement II are false
(1) Both Statement I and Statement II are false (2) Both Statement I and Statement II are true
(2) Both Statement I and Statement II are true (3) Statement I is false but Statement II is true
(3) Statement I is false but Statement II is true (4) Statement I is true but Statement II is false
(4) Statement I is true but Statement II is false

[26-NOVEMBER-2021 SHIFT-1]
[25-NOVEMBER-2021 SHIFT-2] 401. Following are some statements regarding File
396. Which of the following statements about desktop Transfer Protocol (FTP). Choose the correct
and laptop computers are TRUE? statements:
A. Most modern laptop computers have built-in A. It is used to access the world wide web (www)
webcams B. It is used to download data from file servers
B. Desktop computers are not very portable C. It is used for very small files
C. All desktop computers have built-in touchpad D. Files are transferred from one device to another
D. Laptop computers are rarely supplied with a Choose the correct answer from the options given
mouse below:
Choose the correct answer from the options given (1) A and B only (2) A and C only
below: (3) B and C only (4) B and D only
(1) A, B and D only [26-NOVEMBER-2021 SHIFT-1]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 35

402. Match List I with List II (3) A and D only (4) B and D only
LIST I LIST II [26-NOVEMBER-2021 SHIFT-2]
(I/O device) (Data transfer rate) 407. What is a blog?
A. Disk 1.50 bps (1) Internet
B. Mouse 2.1 Mbps (2) Online journal
C. Laser printer 3. 120 bps (3) Personal website in the form of a journal
D. Keyboard 4. 100 Mbps (4) Search engine
(1) A-1, B-2, C-3, D-4 [26-NOVEMBER-2021 SHIFT-2]
(2) A-2, B-1, C-3, D-4 408. Match List I with List II
(3) A-4, B-2, C-1, D-3 List 1. List 2.
(4) A-4, B-3, C-2, D-1 Type of memory Fabrication
[26-NOVEMBER-2021 SHIFT-2] method
403. Given below are two statements A. Dynamic Random Access 1. Flip-flops
Statement I: The MAC address identifies which Memory (DRAM)
device is connected at a given IP address B. Static Random Access 2. Floating gate
Statement II: MAC addresses are unique to each Memory (SRAM) transistors and
device capacitors
In light of the above statements, choose the correct C. Programmable Read Only 3. Transistors and
answer from the options given below: Memory (PROM) capacitors
(1) Both Statement I and Statement II are false D. Erasable Programmable 4. Matrix of fuses
(2) Both Statement I and Statement II are true Read Only Memory
(3) Statement I is false but Statement II is true (EPROM)
(4) Statement I is true but Statement II is false Choose the correct answer from the options given
[26-NOVEMBER-2021 SHIFT-2] below:
404. Which memory is used as part of the processor? (1) A-2, B-1, C-3, D-4 (2) A-3, B-1, C-4, D-2
(1) Hard disk (3) A-3, B-4, C-1, D-2 (4) A-4, B-2, C-1, D-3
(2) RAM [28-NOVEMBER-2021 SHIFT-1]
(3) Registers 409. Identify the CORRECT order of the following data
(4) ROM transfer rates measured in bits per second (bps)
[26-NOVEMBER-2021 SHIFT-2] ranked from largest to smallest
405. Which one of the following is a type of malware A. 1500 kbps
embedded in a program on a computer that will B. 1500 Mbps
set off a malicious function when certain C. 1 Mbps
conditions are met? D. 1 Gbps
(1) Logic bomb Choose the correct answer from the options given
(2) Spyware below:
(3) Trojan (1) B, A, D, C (2) B, D, A, C
(4) Worm (3) B, D, C, A (4) D, B, A, C

[26-NOVEMBER-2021 SHIFT-2] [28-NOVEMBER-2021 SHIFT-1]


406. Following are some statements regarding most of 410. Given below are two statements
the web browsers. Statement I: You can add attachments of any file
Choose the correct statements. size to an email.
A. They have a home page Statement II: You can only send emails from a
B. They do not have the ability to store users' laptop computer.
favourite pages In light of the above statements, choose the correct
C. They have hyperlinks to allow users to navigate answer from the options given below:
D. They do not keep a history of websites visited by (1) Both Statement I and Statement II are false.
the users (2) Both Statement I and Statement II are true.
Choose the correct answer from the options given (3) Statement I is false but Statement II is true.
(4) Statement I is true but Statement II is false.
below:
[28-NOVEMBER-2021 SHIFT-1]
(1) A and B only (2) A and C only
411. Match List I with List II:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 36

List 1. (Activity) List 2. (File 415. In respect of computer software, features of a


Type) typical operating system include:
A. Recording a song to play on 1. zip A. The interface-allowing communication between
an iPod the user and the computer
B. Saving a video 2. mp3 B. Memory management-allocating internal
C. Sending a photo to someone 3. mp4
memory (RAM) to programs and data in use and
using your mobile 3.mp4
D. Compressing a folder of 4. jpeg retrieving and storing data on the external
files memory devices
Choose the correct answer from the options given C. Resource handling-controlling peripheral
below: devices (input and output devices) and handling
(1) A-2, B-3, C-1, D-4 (2) A-2, B-3, C-4, D-1 user requests for peripheral devices
(3) A-3, B-2, C-4, D-1 (4) A-4, B-3, C-2, D-1 D. Internet access-providing connectivity to the
[28-NOVEMBER-2021 SHIFT-1] services on the Internet
412. Kavita uses a Wifi adapter to connect the Choose the correct answer from the options given
computer to an interactive whiteboard. Which below:
one of these statements is false? (1) A, C and D only (2) B, C and D only
(1) Bluetooth has a greater range than Wifi (3) A, B and C only (4) A, B and D only
(2) Bluetooth signals are capable of passing through [28-NOVEMBER-2021 SHIFT-2]
solid objects 416. Match List I with List II:
(3) Wifi has a greater range than Bluetooth List 1. List 2.
(4) Wifi signals are capable of passing through solid (Description) (Appropriate
objects Technical Term)
[28-NOVEMBER-2021 SHIFT-1] A. Authoring language used 1. Browser
413. Given below are two statements, one is labelled to create documents to be
as Assertion A and the other is labelled as Reason viewed on the World
R Wide Web
Assertion A: The Internet is very beneficial to B. Computer that responds 2. HTTP
students in all aspects to requests to provide
Reason R: The Internet opens doorways to a wealth information and services
of information, knowledge and educational over the Internet
resources thereby increasing opportunities for C. Defines how messages are 3. HTML
learning in and beyond the classroom transmitted and
In light of the above statements, choose the correct
formatted over the
answer from the options given below:
Internet
(1) A is false but R is true
D. Software that enables 4. Internet
(2) A is true but R is false
users to access/view Server
(3) Both A and R are true and R is the correct
documents and other
explanation of A
resources on the Internet
(4) Both A and R are true but R is NOT the correct
Choose the correct answer from the options given
explanation of A but R is NOT the correct.
below:
[28-NOVEMBER-2021 SHIFT-2]
(1) A-3, B-4, C-1, D-2
414. Given below are two statements
(2) A-1, B-4, C-2, D-3
Statement I: The base of the binary number system
(3) A-4, B-3, C-1, D-2
is 2.
(4) A-3, B-4, C-2, D-1
Statement II: Binary addition is just like decimal
[28-NOVEMBER-2021 SHIFT-2]
addition except that the rules are much simpler.
417. Arrange the following optical storage devices in
In light of the above statements, choose the correct
decreasing order of their storage capacity
answer from the options given below:
A. DVD
(1) Both Statement I and Statement II are true
B. CD-ROM
(2) Both Statement I and Statement II are false
C. Blu-Ray
(3) Statement I is true but Statement II is false
Choose the correct answer from the options given
(4) Statement I is false but Statement II is true
below:
[28-NOVEMBER-2021 SHIFT-2]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 37

(1) C, B, A (2) C, A, B (1) A text-based protocol used when sending emails


(3) B, C, A (4) A, C, B (2) Fetching an HTML document from a web server
[28-NOVEMBER-2021 SHIFT-2] (3) Protocol used to find an IP address.
418. Given below are two statements (4) Transferring file from one computer to another
Statement I: An operating system controls [29-NOVEMBER-2021 SHIFT-1]
peripherals, and allocates memory and processor 423. Which of the following statements regarding
time. Intranets are correct?
Statement II: An operating system provides Internet A. The Intranet can be accessed from anywhere by
access. anyone
In light of the above statements, choose the correct B. The Intranet has public access
answer from the options given below: C. They are more secure than internet
(1) Both Statement I and Statement II are true D. In Intranet, it is possible to control external links
(2) Both Statement I and Statement II are false Choose the correct answer from the options given
(3) Statement I is true but Statement II is false below:
(4) Statement I is false but Statement II is true (1) A, B and C only (2) A, C and D only
[28-NOVEMBER-2021 SHIFT-2] (3) B and C only (4) C and D only
419. Which of the following is the appropriate GUI [29-NOVEMBER-2021 SHIFT-1]
(Graphical User Interface) component used to 424. The World Wide Web (www) is:
select one from multiple alternatives? (1) A collection of multimedia web pages and other
(1) Scroll bar (2) Push button documents which are stored on websites
(3) Progress bar (4) Radio button (2) A company which allows a user to connect to the
[29-NOVEMBER-2021 SHIFT-1] Internet
420. Match List I with List II: (3) A massive network of networks which are made
List 1. List 2. up of various Computers
Name of Memory Number of bits (4) The Internet makes use of TCP/IP protocol
[29-NOVEMBER-2021 SHIFT-2]
Size
425. Following are some statements regarding
A. MB (Megabyte) 1. 230 software copyright. Choose the correct
B. GB (Gigabyte) 2. 250 statements.
C. TB (terabyte) 3. 220 A. Use of a product key supplied with original
software
D. PB (petabyte) 4. 240
B. Sign a license agreement
Choose the correct answer from the options given C. Use of holograms on original packaging
below: D. Use of dongles to prevent illegal use.
(1) A-2, B-1, C-3, D-4 Choose the correct answer from the options given
(2) A-2, B-3, C-1, D-4 below:
(3) A-3, B-1, C-4, D-2 (1) A, B and C only (2) A, B, C and D
(4) A-3, B-2, C-1, D-4 (3) B and C only (4) B, C and D only
[29-NOVEMBER-2021 SHIFT-2]
[29-NOVEMBER-2021 SHIFT-1] 426. Which Operating System is used by the Apple
421. Given below are two statements regarding
computer systems (an American technology
phishing.
company)?
Statement I: It is a program code that can replicate
(1) Linux (2) Mac
itself with the intention of deleting files.
(3) Solaris (4) Windows
Statement II: It can be filtered but at the Internet
[29-NOVEMBER-2021 SHIFT-2]
Service Provider's (ISP) level.
427. Match List I with List II:
In light of the above statements, choose the correct
List 1. List 2.
answer from the options given below:
ICT Tool for Purpose
(1) Both Statement I and Statement II are false. Teaching
(2) Both Statement I and Statement II are true. A. Google Classroom 1. Assesment of learning
(3) Statement I is false but Statement II is true. B. Google Meet 2. Synchronous
(4) Statement I is true but Statement II is false. interaction
[29-NOVEMBER-2021 SHIFT-1] C. Google Quiz 3. Acces to course content
422. Hypertext Transfer Protocol (HTTP) is: D. Google Jamboard 4. Colloborative tasks

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 38

Choose the correct answer from the 4options given List 1. List 2.
below: Security Meaning
(1) A-1, B-4, C-3, D-2 (2) A-2, B-1, C-4, D-3 threats
(3) A-3, B-2, C-1, D-4 (4) A-4, B-3, C-2, D-1 A. Hacking 1. 'Clog-up' a user's inbox with
[29-NOVEMBER-2021 SHIFT-2] unwanted emails
428. The term "File drawer problem" is related to: B. Phishing 2. Gives the originator access to
(1) Case history (2) Ethnography all data entered by the
(3) Experimentation (4) Meta analysis keyboard
[29-NOVEMBER-2021 SHIFT-2] C. Spyware 3. Identity fraud
429. What is Phishing? D. Spam 4. Illegal use of personal data
(1) A key logging software Choose the correct answer from the options given
(2) It uses networks to search out computers below:
(3) Re-directs the user to a fake website (1) A-1, B-3, C-2, D-4 (2) A-2, B-4, C-3, D-1
(4) Someone sends legitimate-looking emails to (3) A-4, B-1, C-3, D-2 (4) A-4, B-3, C-2, D-1
users [30-NOVEMBER-2021 SHIFT-1]
[29-NOVEMBER-2021 SHIFT-2] 434. Given below are two statements regarding the
430. Given below are two statements regarding Denial data bus in the computer system
of Service attacks Statement I: Data bus sends data between the
Statement I: It is an attempt at preventing users processor, memory unit and the I/O devices.
from accessing part of a network, notably internet
Statement II: It is uni-directional
servers.
Statement II: It can be mitigated by using email In light of the above statements, choose the correct
filters. answer from the options given below:
In light of the above statements, choose the correct (1) Both Statement I and Statement II are false
answer from the options given below: (2) Both Statement I and Statement II are true
(1) Both Statement I and Statement II are false. (3) Statement I is false but Statement II is true
(2) Both Statement I and Statement II are true. (4) Statement I is true but Statement II is false
(3) Statement I is false but Statement II is true. [30-NOVEMBER-2021 SHIFT-1]
(4) Statement I is true but Statement II is false. 435. The Trojan horses:
[30-NOVEMBER-2021 SHIFT-1] (1) A software that gathers information by
431. The Ethernet is: monitoring.
(1) A device that can communicate with another (2) Are malicious programs often disguised as
computer legitimate software
(2) A program that identities and moves traffic (3) Are viruses that can replicate themselves
across local segments. (4) Search automatically for an item on the internet
(3) A protocol designed for wireless MANS.
(4) A system that connects a number of computers [1-DECEMBER-2021 SHIFT-1]
or devices together to form a LAN 436. Which of the following statements about Anti-
[30-NOVEMBER-2021 SHIFT-1] virus software are correct?
432. Following are some statements regarding the A. Problem files/programs are quarantined and can
firewalls. Choose the correct statements be automatically removed
A. Examine traffic between computer and a network B. Check all files before being loaded or run
B. Used to verify that data comes from a secure and C. Use a database to identify potential risks
trusted source D. Used for data authenticity
C. Use the concept of digital signature Choose the correct answer from the options given
D. Keep a list of IP addresses thus preventing below:
access to certain websites (1) A, B and C only
Choose the correct answer from the options given (2) A, B and D only
below: (3) A, C and D only
(1) A and D only (2) A and C only (4) B, C and D only
(3) B and C only (4) C and D only [1-DECEMBER-2021 SHIFT-1]
[30-NOVEMBER-2021 SHIFT-1] 437. What is Anti-spyware software?
433. Match List I with List II

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 39

(1) Checks files before they are loaded on a D. Inspects data packets received over the internet
computer. Choose the correct answer from the options given
(2) It detects and removes programs installed below:
illegally on a user's computer system. (1) A and B only
(3) Makes the files non-readable (2) A, B and C only
(4) Manages the data traffic (3) B and C only
[1-DECEMBER-2021 SHIFT-1] (4) B, C and D only
438. Match List I with List II: [1-DECEMBER-2021 SHIFT-2]
List 1. List 2. 442. Given below are two statements regarding the
ICT Applications Example Hard Disk Drive (HDD)
A. Measurement 1. Simulating car Statement I: HDD use circular platters coated in
applications crashes magnetic material.
B. Control applications 2. River pollution Statement II: Access to data is faster than with
C. Modelling 3. Automatic oven RAM
applications In light of the above statements, choose the correct
D. Expert systems 4. Medical diagnosis answer from the options given below:
Choose the correct answer from the options given (1) Both Statement I and Statement II are false.
below: (2) Both Statement I and Statement II are true.
(1) A-1, B-2, C-4, D-3 (3) Statement I is false but Statement II is true.
(2) A-2, B-3, C-1, D-4 (4) Statement I is true but Statement II is false.
(3) A-2, B-3, C-4, D-1 [1-DECEMBER-2021 SHIFT-2]
(4) A-4, B-1, C-2, D-3 443. What is a disk defragmenter?
[1-DECEMBER-2021 SHIFT-1] (1) Carry out a backup procedure.
439. A device driver is: (2) Check disk drives for empty space.
(1) A port that connects a device and a system. (3) Compress data before writing it on the hard disk.
(2) A software that communicates with the operating (4) Rearrange blocks of data to store files in
system and translates data into a format contiguous sectors.
understood by the device. [1-DECEMBER-2021 SHIFT-2]
(3) A software that performs disk compression. 444. Which one of the following is a part of the
(4) A software that performs disk defragmentation processor?
(1) Address bus
(2) Cache memory
(3) Control unit
(4) Data bus
[1-DECEMBER-2021 SHIFT-1] [1-DECEMBER-2021 SHIFT-2]
440. Given below are two statements regarding the 445. Match List I with List II:
address bus in a computer system List 1. List 2.
Statement I: Address bus carries signals relating to Network Respective Layers
addresses between the processor and memory Addresses
Statement II: It is bi-directional A. IP Address 1. Application Layer
In light of the above statements, choose the correct B. MAC Address 2. Network Layer
answer from the options given below: C. Socket Address 3. Transport Layer
(1) Both Statement I and Statement II are false D. URL Address 4. Data Link Layer
(2) Both Statement I and Statement II are true Choose the correct answer from the options given
(3) Statement I is false but Statement II is true below:
(4) Statement I is true but Statement II is false (1) A-1, B-2, C-3, D-4 (2) A-1, B-4, C-2, D-3
[1-DECEMBER-2021 SHIFT-2] (3) A-2, B-4, C-3, D-1 (4) A-3, B-1, C-2, D-4
441. Which of the following statements regarding [1-DECEMBER-2021 SHIFT-2]
Modems are correct? 446. Which of the following are popular software
A. It is used to convert digital data into analogue (apps) used for conducting online conferences?
B. It also converts analogue data into digital data A. Big Blue Button
C. Sends the data packet to specific addresses B. ZOOM

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 40

C. KOHA (C) 1 TBytes


D. Microsoft Teams (D) 1 000 000 KBytes
E. Moodle Choose the correct answer from the options given
Choose the correct answer from the options given below:
below: (1) (C), (A), (D), (B) (2) (C), (A),
(1) A, B and D only (2) A, B and C only (B), (D)
(3) A, C and E only (4) C, D and E only (3) (A), (C), (D), (B) (4) (A), (C),
[3-DECEMBER-2021 SHIFT-1] (B), (D)
447. When a computer is switched on, the BIOS is [3-DECEMBER-2021 SHIFT-1]
loaded from: 451. Given below are two statements:
(1) Hard Disk (2) RAM One is labelled as Assertion (A) and the other is
(3) ROM (4) CD-ROM labelled as Reason (R):
[3-DECEMBER-2021 SHIFT-1] Assertion (A) Modern and ICT based teaching
448. Match list I with list II: support requires some technical knowledge on part
List 1. List 2. Description of the teacher and the learner.
Computer Terms Reasons (R): Both teachers and learners have to be
provided orientation in use of the various support
A. Magnetic 1. Used in digital cameras
tools and techniques in an intelligent way.
Tape photo In the light of the above statements. choose the
printers and cell phones correct answer from the options given below:
B. Memory Card 2. Uses laser beam technology (1) Both (A) and (R) are true and (R) is the correct
to read or write data explanation of A
C. Hard Disk 3. Used for data archival (2) Both (A) and (R) are true but (R) is NOT the
purposes but must be correct explanation of (A)
accessed (3) (A) is true but (R) is false
sequentially (4) (A) is false but (R) is true
D. DVD 4. A set of metal disks [3-DECEMBER-2021 SHIFT-1]
mounted 452. With respect to computers, which of the
on a spindle following are random access storage devices?
Choose the correct answer from the option given (A) Magnetic Tape (B) Hard Disk
below: (C) Pen Drive (D) CDROM
(1) A-3, B-1, C-4, D-2 Choose the correct answer from the options given
(2) A-4, B-1, C-3, D-2 below:
(3) A-3, B-4, C-1, D-2 (1) (A), (B) and (C) only (2) (A), (C), and (D)
(4) A-2, B-3, C-1, D-4 only
(3) (B), (C) and (D) only (4) (A), (B) and (D)
[3-DECEMBER-2021 SHIFT-1] only
449. Given below are two statements: [3-DECEMBER-2021 SHIFT-2]
Statement I: Search Engines are websites that help a 453. Which of the following are software?
user to search for information on WWW. (A) Adobe
Statement II: For any search term, Search Engines (B) Web browser
provide the exact same results to all the users. (C) Compiler
In the light of the above statements, choose the (D) Device Driver
correct answer from the options given below: Choose the correct statements from above:
(1) Both Statement I and Statement II are true (1) (A), (B) and (C) only (2) (B), (C) and (D)
(2) Both Statement I and Statement II are false only
(3) Statement I is true but Statement II is false (3) (A), (C) and (D) only (4) (A), (B) and (D)
(4) Statement I is false but Statement II is true only
[3-DECEMBER-2021 SHIFT-1] [3-DECEMBER-2021 SHIFT-2]
450. Identify the correct order of the following 454. Match List I with List II:
computer storage capacities ranked from largest List 1. List 2.
to smallest capacity. A. Proprietary LMS 1. MOODLE
(A) 100 GBytes B. Open source LMS 2. Google classroom
(B) 10 000 000 000 Bytes

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 41

C. Cloud based LMS 3. Black board


D. Data collection and 4. Google form (Name of
quiz Company)
Choose the correct answer from the options given A. Apple Inc. 1. N.R. Narayana
below: Murthy
(1) A-4, B-3, C-1, D-2 (2) A-2, B-4, C-3, D-1 B. Microsoft Inc. 2. Steve Jobs
(3) A-1, B-2, C-4, D-3 (4) A-3, B-1, C-2, D-4 C. Infosys Ltd. 3. Bill Gates
[3-DECEMBER-2021 SHIFT-2] D. Airtel 4. Sunil Bharti Mittal
455. Given below are two statements: Choose the correct answer from the options given
• Statement I: In free version of Google meet below:
(through your personal Gmail / Google account: you (1) A-3, B-4, C-2, D-1
can record your session / class. (2) A-4, B-3, C-2, D-1
• Statement II: To join an online class / session (3) A-2, B-4, C-1, D-3
conducted via Google Meet you need to log in to (4) A-2, B-3, C-1, D-4
your Google account. [3-DECEMBER-2021 SHIFT-2]
• In the light of the above statements. choose the 459. With respect to Computers, which of the
correct answer from the options given below: following groups consists of volatile memory
(1) Both Statement I and Statement II are correct only?
(2) Both Statement I and Statement II are incorrect (1) RAM and Pen Drive
(3) Statement I is correct but Statement II is (2) Hard Disk and ROM
incorrect (3) RAM and Cache
(4) Statement I is incorrect but Statement II is (4) Cache and ROM
correct [4-DECEMBER-2021 SHIFT-1]
[3-DECEMBER-2021 SHIFT-2] 460. Identify the correct order of the following
456. Identify the correct order of the following INTEL computer storage capacities ranked from
processors in the decreasing order of speed. smallest to largest capacity.
(A) 80486 (A) 1500 M Bytes
(B) 8085 (B) 5 K Bytes
(C) Dual Core (C) 1 G Bytes
(D) Pentium - III (D) 2 T Bytes
Choose the correct answer from the options given Choose the correct answer from the options given
below: below:
(1) (D), (C), (B), (A) (1) (B), (C), (A), (D)
(2) (C), (D), (A), (B) (2) (B), (C), (D), (A)
(3) (C), (D), (B), (A) (3) (D), (C), (B), (A)
(4) (B), (D), (C), (A) (4) (B), (A), (C), (D)

[3-DECEMBER-2021 SHIFT-2] [4-DECEMBER-2021 SHIFT-1]


457. Given below are two statements: 461. Match List I with List II:
Statement I: USB drives are also known as flash List 1. List 2.
drives. (Computer Terms) (Description)
Statement II: Device used by banks to automatically A. Mouse 1. Input Device
read those unusual numbers on the bottom of
B. Modem 2. External Memory
cheques and deposit slips is known as MICR.
C. Pen Drive 3. Web Browser
In the light of the above statements, choose the
D. Opera 4. Network Device
correct answer from the options given below:
Choose the correct answer from the options given
(1) Both Statement I and Statement II are true
below:
(2) Both Statement I and Statement II are false
(1) A-1, B-4, C-3, D-2
(3) Statement I is true but Statement II is false
(2) A-4, B-1, C-2, D-3
(4) Statement I is false but Statement II is true
(3) A-1, B-4, C-2, D-3
[3-DECEMBER-2021 SHIFT-2]
(4) A-2, B-4, C-1, D-3
458. Match List I with List II:
[4-DECEMBER-2021 SHIFT-1]
List 1. List 2. (Founder)

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 42

462. Given below are two statements: (C) CPU Cache


• Statement I: Software programs permanently stored (D) SSD
in ROM are called ‘Malware’ Choose the correct answer from the options given
• Statement II: The use of the Internet. Cell phones or below:
other devices to send or post content intended to (1) (C), (A), (D). (B) (2) (B), (A),
hurt or embarrass another person is called Cyber (D), (C)
bullying. (3) (D), (C), (B), (A) (4) (B), (D),
• In the light of the above statements, choose the (A), (C)
correct answer from the options given below: [4-DECEMBER-2021 SHIFT-2]]
(1) Both Statement I and Statement II are true 467. With respect to computers. TFT is related to:
(2) Both Statement I and Statement II are false (1) Memory (2) Monitor
(3) Statement I is true but Statement II is false (3) Input Device (4) Serial Port
(4) Statement I is false but Statement II is true [5-DECEMBER-2021 SHIFT-1]
[4-DECEMBER-2021 SHIFT-1] 468. Which of the following is equivalent to 8 Giga
463. With respect to Computers, which of the bytes?
following are permanent storage devices? (1) 223 bytes (2) 233 bytes
(A) Pen Drive
(3) 230 bytes (4) 228 bytes
(B) Hard Disk
[5-DECEMBER-2021 SHIFT-1]
(C) Compact Disk
469. Internet Explorer and Mozilla Firefox are:
(D) RAM
(1) Web Portals (2) WWW browsers
Choose the correct answer from the options given
(3) Search Engines (4) Compilers
below:
[5-DECEMBER-2021 SHIFT-1]
(1) (A), (B) and (C) only
470. Identify the correct order of development of the
(2) (B), (C) and (D) only
following storage devices in the ascending order
(3) (A), (C) and (D) only
of their emergence.
(4) (A), (B) and (D) only
(A) DVD
[4-DECEMBER-2021 SHIFT-1]
(B) CD-ROM
464. Which of the following is a special type of
(C) Magnetic Tape
Computer Virus that fills a computer system with
(D) Floppy Disk
self-replicating information. clogging the system
Choose the correct answer from the options given
so that its operations are slowed or stopped?
below:
(1) Firewell
(1) (C), (D), (A), (B)
(2) Keystroke
(2) (D), (C), (B), (A)
(3) Worm
(3) (B), (D), (C), (A)
(4) Zombie
(4) (C), (D), (B), (A)
[4-DECEMBER-2021 SHIFT-2]]
465. Which of the following is/are main memory of a
[5-DECEMBER-2021 SHIFT-1]
computer?
471. Given below are two statements: One is labelled
(A) RAM
as Assertion (A) and the other is labelled as
(B) Hard disk
Reason (R):
(C) CDROM
Assertion (A): Internet is one of the popular
(D) Pen Drive
services offered on the World Wide Web (WWW)
Choose the correct answer from the options given
Reason (R) The WWW is the universe of network
below:
accessible information.
(1) (A) and (B) only (2) (B) only
In the light of the above statements. choose the
(3) (A) only (4) (A), (C)
correct answer from the options given below:
and (D) only
(1) Both (A) and (R) are true and (R) is the correct
[4-DECEMBER-2021 SHIFT-2]
explanation of (A)
466. Identify the correct order of following different
(2) Both (A) and (R) are true but (R) is NOT the
types of computer components ranked from
correct explanation of (A)
slowest to fastest in terms of access time:
(3) (A) is true but (R) is false
(A) RAM
(4) (A) is false but (R) is true
(B) Optical drive

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 43

[5-DECEMBER-2021 SHIFT-1] (C) JPG


472. Match List I with List II (D) CSV
List 1. List 2. (E) TXT
(Digital (Objective) Choose the correct answer from the options given
nitiative) below:
A. e-Vidwan 1. Digital-learning (1) (A), (B) and (D) only (2) (B), (D) and E only
environment for design (3) (A), (C) and D only (4) (C), (D) and E only
B. e-Kalpa 2. Subscription-based [5-DECEMBER-2021 SHIFT-2]
scholarly information (e- 477. The Campus Wide Network in a University
books and e-journals) at includes a firewall. Which one of the following is
lower rates. a firewall used for?
C. e-Yantra 3. Expert Database and (1) Deleting data from a network
National Research Network (2) Restricting access to a network
D. e-Sodh 4. Spread education in (3) Encrypting network data
(4) Collecting transactional data
Sindhu Embedded systems and
[5-DECEMBER-2021 SHIFT-2]
Robotics
478. Given below are two statements: One is labelled
(1) A-3, B-4, C-1, D-2 (2) A-2, B-1, C-4, D-3
as Assertion (A) and the other is labelled as
(3) A-3, B-1, C-4, D-2 (4) A-1, B-3, C-4, D-2
Reason (R):
[5-DECEMBER-2021 SHIFT-2]
Assertion (A): A bitmap file format (.BMP) is not
473. Which of these is not related to podcasting?
suitable for graphics on a website.
(1) Audio (2) Spotify
Reason (R): Bitmap graphics store information
(3) Microphone (4) Microsoft excel
about every individual picture element (pixel)
[5-DECEMBER-2021 SHIFT-2]
making up an image, thereby giving quite large
474. Given below are two statements:
files.
Statement I: A copy of the email is sent to a Cc
In the light of the above statements, choose the
(Carbon copy) address and other recipients can see
correct answer from the options given below:
that address.
(1) Both (A) and (R) are true and (R) is the correct
Statement II: A copy of the email is sent to a Bcc
explanation of (A)
(Blind carbon copy) address but other recipients
(2) Both (A) and (R) are true but (R) is NOT the
cannot see that address.
correct explanation of (A)
In the light of the above statements, choose the
(3) (A) is true but (R) is false
correct answer from the options given below:
(4) (A) is false but (R) is true
(1) Both Statement I and Statement II are true
(2) Both Statement I and Statement II are false
(3) Statement I is true but Statement II is false
(4) Statement I is false but Statement H is true
[24-DECEMBER-2021 SHIFT-1]
[5-DECEMBER-2021 SHIFT-2]
479. What is parity checking?
475. Identify the correct order of the following
(1) A method to check that data is in serial or
computer storage devices in order of speed of
parallel order.
data retrieval from fastest to slowest.
(2) A method to check that number is even or odd.
(A) Hard Disk
(3) A method to check whether data has been
(B) Main Memory
changed or is corrupted.
(C) CD-ROM
(4) A method used to check that data has reached the
Choose the correct answer from the options given
destination.
below:
[24-DECEMBER-2021 SHIFT-1]
(1) (B), (C), (A) (2) (C), (A), (B) 480. What is the MAC address?
(3) (A), (C), (B) (4) (B), (A), (C) (1) A unique address of a website.
[5-DECEMBER-2021 SHIFT-2] (2) A unique frame number required for error
476. Which of the following file format contains control.
exclusively the ASCII file format? (3) A unique number required for a port.
(A) PDF (4) A unique number that identifies a device
(B) RTF connected to the internet.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 44

[24-DECEMBER-2021 SHIFT-1] C. Tablet is a device with a touch screen; which has


481. Which statement is NOT true for QR (Quick a virtual keyboard which uses touch screen
Response) codes? technology
(1) QR codes can be scanned anywhere. D. Smart Watch is a device that uses CRT
(2) QR codes can store website addresses. technology so that the screen can bend around
(3) QR codes cannot hold digits. the wrist
(4) There is no need for the user to write down or E. Mainframe computer runs small application
key-in a website address where small data need to be processed
[24-DECEMBER-2021 SHIFT-1] Choose the correct answer from the options given
482. Which statement is NOT true for Universal Serial below:
Bus? (1) A and B only (2) A, B and C only
(1) Devices plugged into the computer are (3) A, B and E only (4) A, B, C, D and E
automatically detected. [24-DECEMBER-2021SHIFT-2]
(2) It is a synchronous serial data transmission 487. Given below are two statements
method. • Statement I: GPS is used to determine the exact
(3) It is a four-wire shielded cable. location of a vehicle or other forms of transport.
(4) Several different data transmission rates are • Statement II: GPS systems are not safer since the
supported drivers have to consult maps.
[24-DECEMBER-2021 SHIFT-1] • In light of the above statements, choose the correct
483. Which one of the following is NOT a sensor answer from the options given below:
device? (1) Both Statement I and Statement II are false.
(1) Antilock breaking systems on cars. (2) Both Statement I and Statement II are true.
(2) Burglar alarm system. (3) Statement I is false but Statement II is true.
(3) Control of street lighting (4) Statement I is true but Statement II is false.
(4) Microphone [24-DECEMBER-2021SHIFT-2]
[24-DECEMBER-2021 SHIFT-2] 488. Match List I with List II:
484. Match List I with List II:
List 1. List 2.
List 1. List 2.
A. Structured 1. Embedded
A. Cache 1. Integrated circuit (DRAM)
memory interview
B. Main memory 2. Laser Disk B. Email 2. Enumeration of an
C. Hard Disk 3. High speed Integrated entire population
circuit C. Census 3. Face-to-face
D. CD ROM 4. Magnetic surfaces D. Probability sample 4. Simple random
Choose the correct answer from the options given sample
below: Choose the correct answer from the options given
(1) A-1, B-3, C-2, D-4 (2) A-2, B-4, C-3, D-1 below:
(3) A-3, B-1, C-4, D-2 (4) A-4, B-1, C-2, D-3 (1) A-1, B-3, C-4, D-2 (2) A-2, B-4, C-1, D-3
[24-DECEMBER-2021SHIFT-2] (3) A-3, B-1, C-2, D-4 (4) A-4, B-2, C-3, D-1
485. URL is a: [26-DECEMBER-2021 SHIFT-1]
(1) Uniform Remote Login 489. Match List I with List II:
(2) Uniform Resource Locator
List 1. List 2.
(3) Unique Remote Login
A. Input device 1. Traffic light
(4) Unique Resource Locator
simulator
[24-DECEMBER-2021SHIFT-2]
B. Output device 2. Scanner
486. Which of the following are true?
C. Pointing Device 3. Speaker
A. Desktop computer is a general-purpose computer
D. Sensor Device 4. Trackball
made up of a separate monitor, keyboard, mouse
and processor unit Choose the correct answer from the options given
B. Laptop is where monitor, keyboard, pointing below:
device, processor unit are combined in a single (1) A-1, B-2, C-4, D-3
device (2) A-2, B-3, C-4, D-1
(3) A-2, B-4, C-3, D-1
(4) A-3, B-1, C-4, D-2

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 45

[26-DECEMBER-2021 SHIFT-1] [26-DECEMBER-2021 SHIFT-2]


490. Given below are two statements 495. Match List I with List II:
Statement I: If the sensor data is outside the List 1. List 2.
acceptable range, then the microprocessor/computer A. Measurement 1. Automatic
will take action. Application Oven
Statement II: Sensors in the control application only B. Control Application 2. Website
send data to the microprocessor/computer when
C. Modelling Application 3. Weather
something happens.
station
In light of the above statements, choose the correct
answer from the options given below: D. Communication 4. Car Crash
(1) Both Statement I and Statement II are false. Application Simulator
(2) Both Statement I and Statement II are true.
Choose the correct answer from the options given
(3) Statement I is false but Statement II is true.
below:
(4) Statement I is true but Statement II is false.
(1) A-1, B-3, C-4, D-2
[26-DECEMBER-2021 SHIFT-1]
(2) A-2, B-4, C-1, D-3
491. What is Phishing?
(3) A-3, B-1, C-4, D-2
(1) Checking the spelling of websites
(4) A-3, B-4, C-2, D-1
(2) Search automatically for an item on the internet
[26-DECEMBER-2021 SHIFT-2]
(3) Sending data to a hacker
496. Given below are two statements:
(4) Some-one sends legitimate-looking emails to
Statement I: Every time a device connects to a
users
network, it is given an IP (Internet Protocol)
[26-DECEMBER-2021 SHIFT-1]
address.
492. Which of the following statements are correct?
Statement II: Devices that never disconnect retain
A. A WLAN is a wide area network
the same IP address.
B. A hub sends an incoming data packet to the
In the light of the statements, choose the correct
correct device on a network
answer from the options given below:
C. An IP address is assigned to a device at the
(1) Both Statement I and Statement II are false.
manufacturing stage
(2) Both Statement I and Statement II are true.
D. A network Interface card is needed to allow a
(3) Statement I is false but Statement II is true.
device to connect to a network
(4) Statement I is true but Statement II is false.
E. Routers inspect data packets received over the
internet
Choose the correct answer from the options given
below:
(1) A and B only (2) B and E only
[26-DECEMBER-2021 SHIFT-2]
(3) B, C and D only (4) D and E only
497. Match List I with List II:
[26-DECEMBER-2021 SHIFT-1]
List 1. List 2.
493. What are Firewalls?
A. Network System 1. Email
(1) Hardware or software that sits between a user's
B. Operating System 2. Firewall
computer and an external computer.
C. Memory 3.Mac
(2) Used for address translation in the Network D. Communication 4. ROM
layer. Choose the correct answer from the options given
(3) Used for Network congestion control. below:
(4) Used to store the Network Interface Card. (1) A-1, B-2, C-3, D-4 (2) A-2, B-3, C-4, D-1
[26-DECEMBER-2021 SHIFT-1] (3) A-3, B-4, C-1, D-2 (4) A-4, B-1, C-2, D-3
494. What is the name of the software application that [26-DECEMBER-2021 SHIFT-2]
facilitates building an early accessible bookmark 498. Read the following statement and choose the
warehouse that becomes searchable to members CORRECT code:
or the public? A. Radio frequency identification systems use radio
(1) Database Management System waves to read and capture information
(2) Enterprise Resource Planning B. MICR (Magnetic Ink Character Recognition)
(3) Reference Management Tool characters are easy to forge and cannot be
(4) Social Bookmarking written over

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 46

C. OMR (Optical Mark Recognition) reads marks (3) Both A and R are true and R is the correct
written in pencil or pen in specific places on a explanation of A.
term. (4) Both A and R are true but R is NOT the correct
D. Optical Character Recognition (OCR) scans the explanation of A.
text and converts it into a computer-readable [27-DECEMBER-2021 SHIFT-1]
format 503. What is the full form of MODEM?
E. Barcodes can be forged or damaged (1) Mechanism of Disk Enhancing Memory
Choose the correct answer from the options given (2) Mobile Data Extranet Multicore
below: (3) Modern Electronic Microwave
(1) A, B and C only (2) A, C and E only (4) Modulator- Demodulator
(3) A, C, D and E only (4) B, C, D and E only [27-DECEMBER-2021 SHIFT-1]
[26-DECEMBER-2021 SHIFT-2] 504. Which of the following statement about
499. What is a Utility program? computer memory are true?
(1) It is a part of the operating system which carries A. Secondary storage is non-volatile storage.
out defragmentation or disk formatting. B. Video memory found in graphics cards is
(2) It makes copies of files on another storage volatile memory.
device C. Primary memory (RAM) is the fastest form of
(3) It permits the sharing and exchange of data memory in a computer.
(4) It translates data into a format understood by the Choose the correct answer from the options given
device below:
[27-DECEMBER-2021 SHIFT-1] (1) A and B only (2) A and C only
500. Arrange the following events that influenced the (3) A, B and C (4) B and C only
development of the Internet in reverse [27-DECEMBER-2021 SHIFT-1]
chronological order (that is, from most recent to 505. Match List I with List II:
oldest): List 1. List 2.
A. ARPA established Memory Device Memory Type
B. TCP/IP implemented in ARPANET A. Main Memory 1. Magnetic Memory
C. Sputnik I Launched B. Cache 2. Dynamic Random Access
D. WWW Created at CERN Memory Memory
E. DNS implemented C. Hard Disk 3. Optical Memory
Choose the correct answer from the options given
D. CD ROM 4. Static Random Access
below:
Memory
(1) A, B, C, E, D (2) B, A, C, E, D
Choose the correct answer from the options given
(3) C, D, B, E, A (4) D, E, B, A, C
below:
[27-DECEMBER-2021 SHIFT-1]
(1) A-1, B-2, C-4, D-3
501. Which one of the following electronic
(2) A-2, B-4, C-1, D-3
technologies is the key technology for making the
(3) A-2, B-4, C-3, D-1
first generation computers?
(4) A-4, B-2, C-1, D-3
(1) Dual-Core CPU (2) Integrated circuit
[27-DECEMBER-2021 SHIFT-1]
(3) Transistor (4) Vacuum Tube
506. The emergence of consumers who can control
[27-DECEMBER-2021 SHIFT-1]
and even create media of their own and of
502. Given below are two statements, one is labelled
producers who can easily track consumer
as Assertion A and the other is labelled as Reason
responses, is made possible by:
R
(1) Internet (2) Radio
Assertion A: The Internet of Things (IOT) is a
(3) Telephone (4) Television
rapidly evolving technology capable of
[27-DECEMBER-2021 SHIFT-2]
transforming numerous areas of our lives.
507. The interactive content in modern books may
Reason R: There are no issues of security,
contain a two- dimensional code (2D pattern of
compatibility and data privacy associated with IOT.
dark rectangles) called QR codes. What is the full
In light of the above statements, choose the correct
form of QR?
answer from the options given below:
(1) Quality Reader (2) Quality Record
(1) A is false but R is true.
(3) Quick Response (4) Quick Router
(2) A is true but R is false.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 47

[27-DECEMBER-2021 SHIFT-2] D. External Hard Drive


508. What type of non-volatile memory would most Choose the correct answer from the options given
likely store firmware, like a computer's BIOS? below:
(1) EEPROM (2) Hard Disk (1) A and B only (2) C and D only
(3) RAM (4) Tape Drive (3) Conly (4) D only
[27-DECEMBER-2021 SHIFT-2]
509. Given below are two statements Exam Year – 2022
Statement I: 'Twitter' is a microblogging site that is
very restricted on the size of the post. [4-JANUARY-2022 SHIFT-1]
Statement II: 'Wiki' allows readers to edit posts, and 513. A Network Interface Card (NIC) contains-
entries in it are usually not in chronological order. (1) Domain address (2) IP address
In light of the above statements, choose the correct (3) MAC address (4) Port address
answer from the options given below: [4-JANUARY-2022 SHIFT-1]
(1) Both Statement I and Statement II are false. 514. The number of bits in IPv6 addressing are:
(2) Both Statement I and Statement II are true. (1) 32 bits (2) 64 bits
(3) Statement I is false but Statement II is true. (3) 128 bits (4) 256 bits
(4) Statement I is true but Statement II is false. [4-JANUARY-2022 SHIFT-1]
[27-DECEMBER-2021 SHIFT-2] 515. Given below are two statements regarding
510. Identify the correct sequence of the following Wireless Access Points (WAPs).
storage devices in the descending order of their Statement I: WAPs are connected into the wired
emergence. network at fixed locations.
A. DVD Statement II: The WAP receives and transmits data
B. CD-ROM between the two wired LANs.
C. Magnetic Tape In light of the above statements, choose the correct
D. Floppy Disk answer from the options given below:
Choose the correct answer from the options given (1) Both Statement I and Statement II are true
below: (2) Both Statement I and Statement II are false
(1) A, B, C, D (3) Statement I is true but Statement II is false
(2) A, B, D, C (4) Statement I is false but Statement II is true
(3) A, C, D, B
(4) B, A, D, C
[27-DECEMBER-2021 SHIFT-2] [4-JANUARY-2022 SHIFT-1]
511. Match List I with List II: 516. Following are the statements regarding a
List 1. List 2. Repeater
Memory Devices Memory Types A. It distributes the data packets
A. Pen Drive 1. Optical memory B. It is added to transmission systems to boost the
B. Hard Disk 2. Flash Memory signal
C. CD ROM 3. Magnetic Memory C. It sends the data to a specific computer
D. RAM 4. Volatile Memory D. It can also be used on wireless systems
Choose the correct answer from the options given Choose the correct answer from the options given
below: below:
(1) A-2, B-3, C-1, D-4 (1) A, B and C only (2) B and D only
(2) A-2, B-3, C-4, D-1 (3) C and D only (4) A and D only
(3) A-3, B-2, C-1, D-4 [4-JANUARY-2022 SHIFT-1]
(4) A-4, B-3, C-2, D-1 517. Match List I with List II:
[27-DECEMBER-2021 SHIFT-2] List 1. List 2.
512. With respect to computer storage devices, which Devices Example
of the following is/are magnetic storage A. Input devices 1. Radio frequency
identification readers
device(s)?
B. Direct data entry 2. DVD
A. CD-R
C. Output devices 3. Joystick
B. DVD-RW D. Data backup 4. Speakers
C. Flash memory stick

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 48

Choose the correct answer from the options given In light of the above statements, choose the correct
below: answer from the options given below:
(1) A-1, B-3, C-2, D-4 (2) A-2, B-1, C-3, D-4 (1) Both Statement I and Statement II are false.
(3) A-3, B-1, C-4, D-2 (4) A-4, B-1, C-2, D-3 (2) Both Statement I and Statement II are true.
[4-JANUARY-2022 SHIFT-2] (3) Statement I is false but Statement II is true.
518. Match List I with List II: (4) Statement I is true but Statement II is false.
List 1. List 2. [4-JANUARY-2022 SHIFT-2]
Type of Software Example 523. Given below are two statements:
A. Word Processor 1. Mac Statement I: Short-term memory encompasses
B. Database 2. Open-office encoding and short-term storage and manipulation.
C. Operating system 3. Oracle Statement II: Short-term memory has a limited
D. Utilities 4. Anti-virus capacity.
Choose the correct answer from the options given In light of the above statements, choose the most
below: appropriate answer from the options given below:
(1) A-1, B-2, C-3, D-4 (2) A-2, B-3, C-1, D-4 (1) Both Statement I and Statement II are correct.
(3) A-3, B-2, C-1, D-4 (4) A-4, B-3, C-1, D-2 (2) Both Statement I and Statement II are incorrect.
[4-JANUARY-2022 SHIFT-2] (3) Statement I is correct but Statement II is
519. Bluetooth is: incorrect.
(1) Interoperability protocol. (4) Statement I is incorrect but Statement II is
(2) Peer-to-peer networking protocol. correct.
(3) Short-range data transmission protocol. [5-JANUARY-2022 SHIFT-1]
(4) Wireless LAN protocol 524. CAE stands for:
[4-JANUARY-2022 SHIFT-2] (1) Calculation Arithmetic Equation
520. What is Pixel density? (2) Calculation Aided Estimate
(1) Number of horizontal and vertical pixels that (3) Computer Aided Engineering
make up a screen display. (4) Critical Assessment for Energy
(2) Number of pixels per column and per row on a
monitor.
(3) Number of pixels per square centimetre. [5-JANUARY-2022 SHIFT-1]
(4) Number of pixels that make up an image. 525. Given below are two statements:
[4-JANUARY-2022 SHIFT-2] Statement I: Hardware represents the physical and
521. Which of the following statements are correct tangible parts of the computer.
regarding Random Access Memory (RAM)? Statement II: Operating system is tailor made
A. It is an internal chip where data is temporarily software according to user's requirements.
stored In the light of the above statements, choose the
B. It stores the part of operating system currently in correct answer from the options given below:
use (1) Both Statement I and Statement II are true
C. It is used to store the BIOS (2) Both Statement I and Statement II are false
D. It is non-volatile memory (3) Statement I is true but Statement II is false
Choose the correct answer from the options given (4) Statement I is false but Statement II is true
below: [5-JANUARY-2022 SHIFT-1]
(1) A and B only 526. Kritika is making her science project
(2) A, B and C only presentation on 'Friction' using a presentation
(3) A, C and D only software. She wants to add the phrase
(4) C and D only 'Presentation on Friction' at the bottom of each
[4-JANUARY-2022 SHIFT-2] page. Which option should she use?
522. Given below are two statements: regarding the (1) Project (2) Bullets
JPEG file (Joint Photographic Experts Group): (3) Header (4) Footer
Statement I: JPEG files use a lossy format file [5-JANUARY-2022 SHIFT-1]
compression method. 527. Given below are two statements:
Statement II: JPEG is used to store photographs as a Statement I: Data base refers to a collection of
reduced file size. logically related data.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 49

Statement II: The purpose of assembly language is (3) American Standard Control Information
to bring man and computer together. Intercharge
In the light of the above statements, choose the (4) American Standard Code for Information
correct answer from the options given below: intercharge
(1) Both Statement I and Statement II are true [9 JULY 2022 I]
(2) Both Statement I and Statement II are false 533. What is the full form of MOODLE, an open source
(3) Statement I is true but Statement II is false Learning Management System (LMS)?
(4) Statement I is false but Statement II is true (1) Modular Object Oriented Digital Learning
[5-JANUARY-2022 SHIFT-1] Environment
528. What is the purpose of Block Chain? (2) Modular Object Oriented Dynamic Learning
(1) To block the network Environment
(2) To block the data (3) MOOCs Oriented Digital Learning Environment
(3) To secure the data (4) Multiple Object Oriented Dynamic Learning
(4) To interlink the data Environment
[5-JANUARY-2022 SHIFT-2] [9 JULY 2022 I]
529. Given below are two statements: 534. To perform t-test which of the following software
Statement I: Operating system is a set of program can be utilized?
necessary to carry out operation for a specified (A) MS Excel
application. (B) Unix
Statement II: Hardware represents the physical and (C) SPSS
tangible parts of the computer. (D) MS Equations
In the light of the above statements. choose the Choose the most appropriate answer from the
correct answer from the options given below: options given below:
(1) Both Statement I and Statement II are true (1) A and B Only (2) B, C and D Only
(2) Both Statement I and Statement II are false (3) A and C Only (4) A, C and D Only
(3) Statement I is true but Statement II is false
(4) Statement I is false but Statement II is true [9 JULY 2022 I]
[5-JANUARY-2022 SHIFT-2] 535. With respect to data communication, which of
530. Multimedia files are the documents that contain the following statement is true about fibre optic
a confirmation of: cable?
(A) Text (1) Fibre optic cable carries data in pulses of light
(B) Photograph and is prone to interference
(C)Video (2) Fibre optic cable carries data as electronic
(D) Computer signals and is not prone to interference
(E) Audio (3) Fibre optic cable carries data as electronic
Choose the correct answer from the options given signals and is prone to interference
below: (4) Fibre optic cable carries data in pulses of light
(1) (A), (C), (D) only (2) (A), (B), and is not prone to interference
(C), (E) only [9 JULY 2022 I]
(3) (A), (B), (C), (D) only (4) (B), (C), (D), (E) 536. Arrange the following computer memory types
only from fastest to slowest speed:
[5-JANUARY-2022 SHIFT-2] (A) Hard Disk
531. A reputed company employed Mr. Harsh to (B) Main Memory (RAM)
manage and maintain their networking (C) CD ROM
architecture and wide area connectivity. Which of (D) CPU Registers
these best describes his job profile? (E) Cache Memory
(1) Programmer (2) Architect Choose the correct answer from the options given
(3) Networking engineer (4) Web designer below:
[5-JANUARY-2022 SHIFT-2] (1) (D), (E), (A), (B), (C) (2) (A), (C) (B), (D),
532. In computers ASCII stands for: (E)
(1) Algorithm Selection Code information (3) (E), (D), (B), (A), (C) (4) (D), (E), (B), (A),
Intercharge (C)
(2) Asympatatic Sorting Code Intermediate Interface [9 JULY 2022 I]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 50

537. Which of the following statements about 541. Given below are two statements
malware are true? Statement I: Most PCs use Dynamic RAMs for CPU
(A) A Trojan Horse is malware disguised as Cache
legitimate software Statement II: Static RAM is faster and more
(B) A virus inserts itself into another expensive than Dynamic RAM
program. It runs and spreads itself when the In light of the above statements, choose the correct
program is opened answer from the options given below:
(C) A worm is similar to a virus except that (1) Both Statement I and Statement II are false
it does not need a program in order to run. It (2) Both Statement I and Statement Il are true.
spreads by itself. (3) Statement I is false but Statement II is true.
Choose the correct answer from the options given (4) Statement I is true but Statement II is false.
below: [9 JULY 2022 II]
(1) (A) and (B) (2) (A) and (C) 542. Consider the spreadsheet given below:
(3) (B) and (C) (4) (A), (B) and (C) A B C
[9 JULY 2022 I] 1 Project Number of Days
538. Match List I with List II: 2 A 15
3 A 20
List 1. File List 2. File Format
4 B 30
A. Video 1. .xlsx 5 A 10
B. Podcast 2. .jpg 6 B 10
C. Photograph 3. .mp4 7 A 5
D. Spreadsheet 4. .mp3 What is the output of the following formula in Cell
Choose the correct answer from the options given C1?
below: = SUMIF (A2: A7, "A", B2: B7)
(1) A-3, B-2, C-4, D-1 (2) A-2, B-4, C-3, D-1 (1) 90 (2) 80
(3) A-3, B-4, C-2, D-1 (4) A-1, B-4, C-2, D-3 (3) 50 (4) 20
[9 JULY 2022 II]
543. The image, sound and video data can be created
[9 JULY 2022 II] in a number of file formats. In this context. which
539. Anil has decided to use either a DVD-RW or DVD- of the following are compressed file formats?
R. Which of the following statements are true A. JPEG
about these storage devices? B. MP3
(A) Both DVD-R and DVD-RW are read only. C. MIDI
(B) DVD-R can be written-to only once. D. AVI
(C) DVD-RW can be written-to many times. E. MP4
(D) Both DVD-R and DVD-RW can be written-to Choose the correct answer from the options given
only once. below:
Choose the correct answer from the options given (1) (A), (B) and (E) only
below: (2) (C), (D) and (E) only
(1) (A) and (D) only (2) (B) and (C) (3) (B), (C) and (D) only
only (4) (A) and (E) only
(3) (A) and (B) only (4) (D) only [9 JULY 2022 II]
[9 JULY 2022 II] 544. Which of the following is not a mobile device?
540. Match List I with List II. (1) Tablet
List I (Computer Terms) List II (Description) (2) Smartphone
A. Linux 1. Text File Editor (3) Desktop PC
B. Mozilla Firefox 2. Image File Format (4) E-reader
C. Notepad 3. Operating System [9 JULY 2022 II]
D. JPEG 4. Web Browser 545. Given below are two statements:
Choose the correct answer from the options given Statement I: Academic Bank of Credit facility is
below: meant for credit verification, accumulation, transfer,
(1) A-4, B-3, C-1, D-2 (2) A-3, B-4, C-1, D-2 redemption and degree authentication with students
(3) A-2, B-4, C-1, D-3 (4) A-3, B-4, C-2, D-1 as account holders.
[9 JULY 2022 II]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 51

Statement II: Academic Bank of Credit will be a [11 JULY 2022 I]


degree awarding organisation. 549. Consider the following information based on an
In the light of the above statements, choose the email software application in which an email
correct answer from the options given below: attachment is being sent:
(1) Both Statement I and Statement II are true From: A Cc: C,D
(2) Both Statement I and Statement II are false To: B Bcc: E
(3) Statement I is true but Statement II is false Subject: CV of Amit
(4) Statement is false but Statement II is true Message: Please find attached the CV of Amit.
with regards
[11 JULY 2022 I]
546. Given below are two statements Attach: AmitCV.docx
How many people will receive copies of the
Statement I: Most PCs use Dynamic RAMs for CPU
attachment?
Cache
(1) 2 (2) 3
Statement II: Static RAM is faster and more
(3) 4 (4) 5
expensive than Dynamic RAM
[11 JULY 2022 II]
In light of the above statements, choose the correct
550. With respect to information technology, which
answer from the options given below:
statement best describes 'Cache Memory"?
(1) Both Statement I and Statement Il are false
(1) USB memory connected to a Computer to
(2) Both Statement I and Statement Il are true.
increase its storage space.
(3) Statement I is false but Statement II is true.
(2) An area of memory that contains settings for
(4) Statement I is true but Statement II is false.
operating the computer.
(3) An area of the hard disk that is used when there
is insufficient RAM.
(4) High-speed memory that is included in devices
[11 JULY 2022 I]
547. Which of the following peripheral devices are to improve response time.
[11 JULY 2022 II]
considered as only input devices?
(A) Speaker (B) Barcode 551. If you have a storage device with a capacity of 16
Reader gigabytes, then how many 32 kilobytes files can
(C) MODEM (D) Graphic Tablet you fit in that device? ( 1 KB=1024 bytes )
(E) Microphone (1) 218 (2) 219
Choose the correct answer from the options given (3) 220 (4) 214
below:
[11 JULY 2022 II]
(1) (B), (D) and (E) only (2) (B), (C) and (D)
552. In the history of computing, Moore's Law says
only
that the number of Integrated Circuit (IC) Chips
(3) (A), (B) and (E) only (4) (C), (D) and (E)
in a Computer doubles every two years, which
only
implies that computers become twice as
[11 JULY 2022 I]
548. Given below are two statements: One is labelled powerful every two years. According to Moore's
as Assertion (A) and the other is labelled as Law, how many years from now will Computers
Reason (R): be 32 times more powerful as they are now?
Assertion (A): The Internet of Things (IOT) is a (1) 5 years (2) 10 years
rapidly evolving technology due to its wide range of (3) 12 years (4) 8 years
applications. [11 JULY 2022 II]
Reason (R): IOT is inherently immune to Cyber- 553. Which of the statements given below are correct?
attacks. An Integrated Circuit (IC) is a collection of several
In the light of the above statements, choose the circuits (transistors) packed on a single chip. The
correct answer from the options given below: invention of ICs in the history of computing led to:
(1) Both (A) and (R) are true and (R) is the correct (A) increased reliability of computers.
explanation of (A) (B) reduced cost of computers (because they
(2) Both (A) and (R) are true but (R) is NOT the could be mass manufactured).
correct explanation of (A) (C) reduced size of computers.
(3) (A) is true but (R) is false Choose the correct answer from the options given
(4) (A) is false but (R) is true below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 52

(1) (A) and (B) only (2) (B) and (C) 558. Match List I with List II:
only List 1. List 2. Definition
(3) (A) and (C) only (4) (A), (B) Computer Term
and (C) A. Spyware 1. Wireless technology used
[12 JULY 2022 I] for transmitting data over
554. Given below are two statements: One is labelled short distances
as Assertion (A) and the other is labelled as B. Firewall 2. Software that allows the
Reason (R): user to gain information
Assertion (A): In computer networking, a MODEM about another person's
is considered as both input and output device. computer activity
Reason (R): MODEM sends data (upload/output) C. Bluetooth 3. An attack on a network
and receives data (download/input) at the same time which involves flooding the
In light of the above statements, choose the correct network with useless traffic
answer from the options given below: D. Denial of 4. Hardware or software
(1) Both (A) and (R) are true and (R) is the correct service designed to protect a
explanation of (A) network by controlling what
(2) Both (A) and (R) are true but (R) is NOT the data can and cannot enter
correct explanation of (A) Choose the correct answer from the options given
(3) (A) is true but (R) is false below:
(4) (A) is false but (R) is true (1) A-3, B-4, C-1, D-2 (2) A-4, B-2, C-3, D-1
[12 JULY 2022 I] (3) A-1, B-4, C-2, D-3 (4) A-2, B-4, C-1, D-3
555. Programs that come into a computer system [12 JULY 2022 II]
disguised as something else, are called: 559. Bing is a web search engine owned and operated
(1) Trojan horses (2) Viruses by..........
(3) Web bugs (4) Zombies (1) Microsoft (2) Yahoo
[12 JULY 2022 I] (3) Alphabet Incorporation (4) Amazon
556. You have been instructed to install additional [12 JULY 2022 II]
RAM into a computer by your teacher. Identify 560. Students in a class in New Delhi have been
the correct order of the following steps A-C that communicating with a class in Chandigarh by
you should follow to install the RAM safely. videoconference. The two classes find that the
(A) Install RAM images they receive from each other occasionally
(B) Isolate computer from the power supply freeze for up to 30 seconds before the video
(C) Connect anti-static strap to wrist continues. This type of problem can most often
Choose the correct answer from the options given be solved by ___________
below: (1) increasing bandwidth
(1) (A), (B), (C) (2) (C), (A), (B) (2) upgrading cameras
(3) (B), (A), (C) (4) (B), (C), (A) (3) increasing video resolution
[12 JULY 2022 I] (4) upgrading monitors
557. Given below are two statements: [12 JULY 2022 II]
Statement I: SWAYAM initiative is a significant 561. Given below are two statements: One is labelled
step towards providing financial and technical as Assertion (A) and the other is labelled as
assistance to young start-up entrepreneurs. Reason (R):
Statement II: The tagline of Digilocker logo says Assertion (A): HTTP is an application-layer
"My Documents, Anytime, Anywhere". network protocol for transmitting hypermedia
In light of the above statements, choose the most documents.
appropriate answer from the options given below: Reason (R): HTTP was designed for
(1) Both Statement I and Statement II are correct. communication between web browsers and web
(2) Both Statement I and Statement II are incorrect. servers.
(3) Statement I is correct but Statement II is In light of the above statements, choose the correct
incorrect. answer from the options given below:
(4) Statement I is incorrect but Statement II is (1) Both (A) and (R) are true and (R) is the correct
correct. explanation of (A)
[12 JULY 2022 I]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 53

(2) Both (A) and (R) are true but (R) is NOT the 565. A movie requires 16 gigabytes of storage. How
correct explanation of (A) long will it take to download this movie, if the
(3) (A) is true but (R) is false download speed is 64 megabytes per second?
(4) (A) is false but (R) is true (1KB=1024 Bytes)
[12 JULY 2022 II] (1) 64 seconds (2) 128 seconds
562. Match List I with List II: (3) 256 seconds (4) 512 seconds
List 1. List 2. Definition [20 SEP 2022 I]
Information 566. With respect to telecommunications, which of the
Technology Term following forms of communication are
A. GPS 1. A wireless technology standard synchronous?
for exchanging data over short A. Email
distances.
B. Instagram posts
B. Intranet 2. A protocol used to send and C. Blogging
receive web pages.
D. Telephone calls
C. Bluetooth 3. A radio navigation system that
E. Instant Messaging
allows users to determine their
exact location. Choose the correct answer from the options given
below:
D. HTTP 4. A private network or website
available only to members of (1) A, B and C only
an organization. (2) D and E only
Choose the correct answer from the options given (3) A, B, D and E only
below: (4) A, B, C, D and E
(1) A-3, B-4, C-1, D-2 (2) A-2, B-4, C-1, D-3
(3) A-3, B-1, C-4, D-2 (4) A-1, B-4, C-3, D-2
[12 JULY 2022 II] [20 SEP 2022 I]
567. LMS is a software application used for the:
563. Given below are two statements about online
(1) Administration, documentation, tracking,
search:
reporting and delivery of educational courses
Statement I: 'E-Vidhyapeeth' is a Learning
(2) Authentication, documentation, transfer,
Management System and an e-learning
reporting and designing of educational courses
infrastructure product.
(3) Administration, documentation and depository of
Statement II: An HTML editor is a software
e-resources
application for creating web pages.
(4) Authentication, reporting, analysis and
In light of the above statements, choose the most
depository of e-resources
appropriate answer from the options given below:
[20 SEP 2022 I]
(1) Both Statement I and Statement II are correct.
568. Consider the following incomplete sentences
(2) Both Statement I and Statement II are incorrect.
about printers:
(3) Statement I is correct but Statement II is
A laser printer is a type of_________ printer. It
incorrect.
produces__________ quality printouts and
(4) Statement I is incorrect but Statement II is
uses_____________ to print onto paper.
correct.
A___________ printer can produce carbon copies
[20 SEP 2022 I]
because the print head makes contact with the
564. Match List I with List II:
paper.
List 1 Computer Term List 2 Software
Identify the correct order to fill in the blank spaces
Hardware
using words from the list below (A-D)
A. System Software 1. Keyboard A. High B. Dot Matrix
B. Input Device 2. Pen Drive C. Non-impact D. Toner
C. Output Device 3. Linux Choose the correct answer from the options given
D. Secondary Storage Device 4. Printer below:
Choose the correct answer from the options given (1) B, A, D, C (2) C, D, A, B
below: (3) A, B, C, D (4) C, A, D, B
(1) A-4, B-1, C-3, D-2 (2) A-2, B-1, C-4, D-3 [20 SEP 2022 I]
(3) A-3, B-4, C-1, D-2 (4) A-3, B-1, C-4, D-2 569. Arrange the following computer memory types
[20 SEP 2022 I] from the slowest to the fastest speed:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 54

A. Main memory (RAM) B. L2 Cache CARING 573. Which one of the following is not used for
C. Hard Disk D. L1 Cache checking plagiarism?
E. CD-ROM (1) Turnitin
Choose the correct answer from the options given (2) Latex
below: (3) Thenticate
(1) E, C, A, B, D (2) E, C, A, D, B (4) Urkind
(3) B, D, A, C, E (4) C, E, B, A, D [20 SEP 2022 II]
[20 SEP 2022 II] 574. Regarding wearable technology, which of the
570. You wish to save the changed version of a following tasks is/are accomplished by wearable
document that was originally located on a devices?
standard CD-ROM What is the best method to A. Providing more security compared to other
accomplish this? computing devices
(1) Read the document from the CD-ROM, modify B. Sharing of a wearable device's Internet
the document, then save it to the hard disk connection with other connected computers
(2) Read the document from the CD-ROM, modify C. Assisting hearing impaired persons
the document, then save it back to the CD-ROM Choose the correct answer from the options given
(3) Rename the document from the CD-ROM, read below:
and modify the document, then save it to the (1) A and B only
hard drive (2) B only
(4) Copy the document from the CD-ROM to the (3) B and C only
hard drive, read the document, modify it, and (4) C only
save it back to the CD-ROM
[20 SEP 2022 II] [20 SEP 2022 II]
571. Given below are two statements, one is labelled 575. A software company requires '1 GB RAM
as Assertion A and the other is labelled as Reason minimum and 2 GB RAM recommended' for its
R new Operating System (OS) software. The likely
Assertion A: MOOCs are learner-centric courses outcome of attempting to install this OS on a
Reason R: MOOCs can only be accessed by a computer with 1 GB RAM would be that:
learner in the presence of his/her teacher (1) files will fail to save
In light of the above statements, choose the most (2) peripheral devices will fail to work
appropriate answer from the options given below: (3) the OS will fail to install and therefore the
(1) Both A and R are correct and R is the correct computer will not run
explanation of A (4) the computer will not run at its optimum
(2) Both A and R are correct but R is NOT the performance
correct explanation of A [20 SEP 2022 II]
(3) A is correct but R is not correct 576. Which of the following phrases best describes
(4) A is not correct but R is correct blended learning?
[20 SEP 2022 II] (1) It involves two teachers teaching
572. Given below are two statements (2) It involves online interactions only through LMS
Statement I: 'Spam' is an attempt to acquire (3) It combines elements of face-to-face and online /
sensitive information for malicious reasons, by ICT tools for teaching learning
masquerading as a trustworthy entity (4) It involves older students teaching younger
Statement II: 'Phishing' is a type of unsolicited students through a mentoring approach
bulk email of identical messages sent to numerous [20 SEP 2022 II]
recipients 577. Which of the following peripheral devices are
In light of the above statements, choose the correct considered as only input devices?
answer from the options given below: A. Headphone
(1) Both Statement I and Statement II are true B. Optical Mark Reader (OMR)
(2) Both Statement I and Statement II are false C. Graphic Tablet
(3) Statement I is true but Statement II is false D. Light Pen
(4) Statement I is false but Statement II is true E. Projector
[20 SEP 2022 II] Choose the correct answer from the options given
below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 55

(1) B, C and D only (2) B, C and E only 582. In IPv6, an address is given by eight 16-bit
(3) A, B and C only (4) C, D and E only numbers usually written in hexadecimal. For
[20 SEP 2022 II] example, here is an IP address:
578. For effective integration of ICT in teaching- 3221 : IDE5 : CAI4 : ADIF : 1111 : 1111 : 1111 :
learning, the following should be used for 1111
providing online content, assessments, and for How many unique addresses does IPV6 support
seamless virtual interaction of teachers with overall?
learners. (1) 216 (2) 264
(1) WhatsApp (3) 65536 4 (4) 65536 8
(2) Content Management System
[21 SEP 2022 I]
(3) Learning Management System
583. In the history of computing, Moore's Law says
(4) Facebook
that the number of Integrated Circuit (IC) chips
[21 SEP 2022 I]
in a computer doubles every 2 years, which
579. In the context of computer networking, what
implies that computers become twice as
protocol is used to turn names, such as
powerful every 2 years. According to Moore's
www.abc.edu, into IP addresses?
Law, 10 years from now, computers will
(1) HTTP (2) DNS
be................ times as powerful as they are now.
(3) SMTP (4) SSH
(1) 4 (2) 8
(3) 16 (4) 32
[21 SEP 2022 I]
580. On a laptop/desktop computer, which of the
[21 SEP 2022 II]
following components (A-C)
584. Consider the URL:
(i) take care of Computing
https://example.org/index.html. Which of the
(ii) storing data temporarily, and
following are contained in the URL?
(iii) storing data permanently in that order?
(A) Browser name (B) File name
A) RAM
(C) Host name (D) Email address
B) Hard Disk Drive
(E) Protocol
C) CPU
Choose the correct answer from the options given
Choose the correct answer from the options given
below:
below:
(1) (A), (B) and (C) only (2) (A), (C) and (E)
(1) (C), (B), (A) (2) (A), (C), (B)
only
(3) (B), (A), (C) (4) (C), (A), (B)
(3) (B), (C) and (E) only (4) (C), (D) and (E)
[21 SEP 2022 I]
only
581. Given below are two statements: One is labelled
[21 SEP 2022 II]
as Assertion (A) and the other is labelled as 585. Identify the correct order of some of the words
Reason (R): A-E given below to complete the following
Assertion (A): Massive Open Online Courses paragraph which explains the role carried out by
(MOOC) are fast gaining popularity among students different parts of the CPU.
and working professionals across the world. Part of the CPU that (i) holds programs and data
Reason (R): MOOCs help them study at their own currently in use is called________ (ii) performs
convenience and delivery of quality education is calculation and logical operations is
location specific. called__________ (iii) tells input and output
In light of the above statements, choose the correct devices how to carry out instructions is
answer from the options given below: called_________.
A. Control Unit
(1) Both (A) and (R) are true and (R) is the correct
B. ASCII
explanation of (A)
C. Immediate Access Store
(2) Both (A) and (R) are true but (R) is NOT the
D. ALU
correct explanation of (A)
E. SSD
(3) (A) is true but (R) is false
Choose the correct answer from the options given
(4) (A) is false but (R) is true
below:
[21 SEP 2022 I]
(1) (D), (A), (B) (2) (C), (D), (A)

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 56

(3) (C), (E), (A) (4) (B), (D), (E) 590. Information and communication Technology
[21 SEP 2022 II] (ICT) integration with teaching and learning
586. What is the sum of the binary (base 2) number results in:
( 1100 )2 and the hexadecimal (base 16) number (A) Providing correct information in a
( 3 )16 . comprehensive manner.
(B) Replacing books with online material.
(1) ( F )16 (2) ( 15 )16
(C) Helping learners to broaden their
(3) ( 1003 )10 (4) ( 1103 )8 information base.
[21 SEP 2022 II] (D) Replacing teachers with computers.
587. Match List I with List II: (E) Assessment through online examination.
List 1. Information List 2. Definition Choose the most appropriate answer from the
Technology Term options given below:
A. Hyperlink 1. An area of a graphic that (1) A, D, E only (2) A, B, C only
when clicked will cause an (3) A, C, E only (4) B, C, E only
action on a web page
[22 SEP 2022 II]
B. Hotspot 2. The smallest area that can
be edited on a graphic 591. Which of the following best describes a computer
C. HTTP 3. An element on a web page worm?
that when clicked on will (1) Malware that does not replicate itself but spreads
take the user to another through social engineering.
website, web page or (2) Malware that replicates by attaching itself to a
document word processing document.
D. Pixel 4. A protocol used to send and
(3) Malware that replicates by attaching itself to an
receive web pages
(1) A-3, B-4, C-1, D-2 (2) A-1, B-4, C-3, D-2 executable programme.
(3) A-2, B-1, C-4, D-3 (4) A-3, B-1, C-4, D-2 (4) Malware that replicates itself as stand alone
[22 SEP 2022 I] software.
[22 SEP 2022 II]
588. Which of the following is/are not example(s) of
592. Identify the correct ascending order of the
cloud service?
(A) Google drive following numbers under A-D represented in
(B) MeghRaj different bases:
(C) Dropbox (A) (11101011): (Base - 2 binary number)
(D) Windows Explorer (B) (564)8 (Base - 8 Octal number)
Choose the correct answer from the option given (C) (614) 10 (Base - 10 decimal number)
below: (D) (489) 16 ( Base - 16 hexadecimal number)
(1) B only (2) D only Choose the correct answer from the options given
(3) C and D only (4) A, B and D only below:
[22 SEP 2022 I] (1) A, C, D, B (2) D, C, B, A
589. Match List I with List II:B (3) B, C, A, D (4) A, B, C, D
[23 SEP 2022 I]
List 1. Type of a website List 2. Website Address
593. Which of the following can be considered as
A. e-commerce (i) www.linkedin.com
illegal or unethical in the context of information
B. Building up social (ii) www.bing.com
media technology?
C. News (iii) www.amazon.com (A) A hospital reveals clinical history of a
D. Search engine (iv) www.bbc.co.uk patient without the consent of a patient.
Choose the correct answer from the options given (B) A student using proprietary software
below: without having license.
(1) A-(ii), B-(i), C-(iv), D-(iii) (C) A person stealing another person's credit
(2) A-(ii), B-(iv), C-(i), D-(iii) card number.
(3) A-(i), B-(ii), C-(iv), D-(iii) (D) A college using Linux operating system
(4) A-(iii), B-(i), C-(iv), D-(ii) (being an open-source software) on all its 200
[22 SEP 2022 I] computers on the campus.
Choose the correct answer from the options given
below:
(1) A and B Only (2) B and C Only

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 57

(3) A, B and C Only (4) C and D http://bookcom/author/indexhtml


Only The hostname 'bookcom' is converted into an IP
[23 SEP 2022 I] address by a_____________ server that has a
594. Which of the following is a way to quickly access database of matching names and addresses and is
a favourite website by saving it in your browser? queried for the address
(1) Cookie (2) Bookmark (1) SMTP
(3) Blog (4) Wiki (2) FTP
[23 SEP 2022 I] (3) DNS
595. Which of the following statements are correct (4) HTTP
regarding Centre for Development of Advanced [23 SEP 2022 II]
Computing (C-DAC) of India? 599. Identify the correct order of the following
(A) The setting up of C-DAC was to build developments (A-E) in the history of computing
Supercomputers in context of denial of import of from the oldest to the more recent:
Supercomputers by USA. A. Facebook
(B) C-DAC started building Indian B. Internet
Language Computing Solutions with setting up C. Calculator Machine
of GIST group (Graphics and Intelligence based D. Computer mouse
Script Technology) E. Programming language
(C) This Centre was started in the year 1995 (1) A, B, C, D, E
Choose the correct answer from the options given (2) C, B, E, A, D
below: (3) C, D, B, E, A
(1) A and B Only (4) C, E, D, B, A
(2) B and C Only
(3) A and C Only [23 SEP 2022 II]
(4) A, B and C 600. Given below are two statements, one is labelled
[23 SEP 2022 I] as Assertion A and the other is labelled as Reason
596. What is e-Taal? R
(1) A Web portal for dissemination of bank Assertion A: Free Wi-Fi access to every citizen is
transaction statistics of Panchayat level e one of the objectives of 'Digital India' programme
Governance projects. of the Government of India
(2) A mobile app for dissemination of information Reason R: ICT is a powerful enabler of a digitally
on fund allocation for National and state level e- empowered society
Governance projects. In light of the above statements, choose the correct
(3) A Web portal for dissemination of e-Transaction answer from the options given below:
statistics of National and State level e- (1) Both A and R are true and R is the correct
Governance Projects. explanation of A
(4) A web-based Software for composing a music. (2) Both A and R are true but R is NOT the correct
[23 SEP 2022 I] explanation of A
597. Given below are two statements: (3) A is true but R is false
Statement I: A block-chain is a growing list of (4) A is false but R is true
records. called blocks, which are linked using [23 SEP 2022 II]
Cryptography. 601. The Symbol stands for,
Statement II: Block-chains which are readable by (1) Copyright (2) Copied Component
the public are widely used by crypto currencies. (3) Creative Component (4) Creative Commons
In the light of the above statements, choose the [29 SEP 2022 I]
correct answer from the options given below: 602. A Company's word-processed daily report
(1) Both Statement I and Statement II are true contains a graph from a spreadsheet. The report
(2) Both Statement I and Statement II are false needs to display the most recent information
(3) Statement I is true but Statement Il is false from the spreadsheet. What feature should be
(4) Statement I is false but Statement II is true
used to insert the most up-to-date graph?
[23 SEP 2022 II]
(1) Copy and paste
598. Given below is a typical URL that identifies a web (2) Mail merge wizard
page:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 58

(3) Automated importing (4) All content that flows throughout the Internet
(4) Linking and embedding should not be treated equally.
[29 SEP 2022 I] [29 SEP 2022 II]
603. With respect to the Computers, what is the 608. Which of the following tools can be used for ICT
purpose of compressing a data file? enabled teaching?
(1) To encrypt the data (1) Paper charts
(2) To occupy less storage space (2) Physical models
(3) To increase transmission time over a network (3) Projector
(4) To allow the file to be read by a variety of (4) Black Board
applications [29 SEP 2022 II]
[29 SEP 2022 I] 609. Miss Reena has been appointed by the Cyber
604. Which of the following peripheral devices are Security Cell of Mumbai to break into the website
considered as only input devices? of a terrorist organisation to extract information.
A. Microphone What among the following is a suitable
B. Projector description of Reena's profile?
C. Joy Stick (1) Hactivist
D. Scanner (2) Ethical Hacker
E. Track-ball (3) Troller
Choose the correct answer from the options given (4) Black Hat Hacker
below:
(1) A, C, D and E only (2) A, B, D and E only [29 SEP 2022 II]
(3) B, C, D and E only (4) A, B, C and D only 610. Given below are two statements:
[29 SEP 2022 I] Statement 1: 8 megabytes ¿ 213 gigabytes.
605. Which type of virus or destructive software could Statement 2: The decimal equivalent of the binary
appear to be useful, but will actually cause number ( 11101.101 )2 is ( 29.625 )10
damage once installed or run by a user?
In the light of the statement, choose the true the
(1) Hoax (2) Worm
answer from the options given below:
(3) Trojan Horse (4) System Sector
(1) Both statement 1 and statement 2 are true.
[29 SEP 2022 II]
(2) Both statement 1 and statement 2 are false.
606. Which of the following statements are correct
(3) Statement 1 is true but statement 2 is false.
regarding VOLTE?
(4) Statement 1 is false but statement 2 is true.
(A) VOLTE stands for 'Voice over Long
[29 SEP 2022 II]
Term Evaluation'. 611. Which of the following statement are correct?
(B) It is a digital packet voice service Principal components of a CPU in a computer
delivery over IP via an LTE access network. include:
(C) Provides more efficient use of spectrum (a) The Solid State Drive (SSD) that stores data
than traditional voice. typically using flash memory.
(D) Eliminates the need to have voice on (b) The Arithmetic Logic Unit (ALU) that performs
one network and data on another network. arithmetic and logic operations.
Choose the correct answer from the options given (c) Processor registers that supply operands to the
below: ALU and stores the results of ALU operation.
(1) A, B, C and D only (d) The Control Unit (CU) that orchestrates the
(2) B, C and D only fetching (from memory), decoding and execution
(3) A, B and C only of instructions.
(4) A, C and D only Choose the correct answer from the options given
[29 SEP 2022 II] below:
607. What is the concept of International Net (1) A, B, C only (2) B, C, D only
Neutrality? (3) B, C only (4) A, D only
(1) Imposed limitations for end-to-end Internet [29 SEP 2022 II]
access 612. Many computer users are worried about
(2) Broadband service providers can show malware. Which of the following are two
preference to content examples of malware?
(3) Unimpeded end-to-end Internet access and usage

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 59

(A) Firewall WWW is the network infrastructure providing


(B) Worm such service.
(C) Router C. Large files such as videos which cannot be sent
(D) Virus by e-mail as attachments, can be sent to another
Choose the more appropriate answer from the computer via FTP.
options given below: Choose the correct answer from the options given
(1) (A) and (C) only (2) (A) and (B) below:
only (1) (A) and (B) only
(3) (B) and (D) only (4) (C) and (D) (2) (A) and (C) only
only (3) (B) and (C) only
[29 SEP 2022 II] (4) (A), (B), (C)
613. Which of the following are the principal [30 SEP 2022 II]
components of the CPU of a computer system? 617. Which one of the following acronyms matches
(A) ALU (Arithmetic-Logic Unit) incorrectly with their full form?
(B) CU (Control Unit) (1) HTTP-Hyper Text Transfer Protocol
(C) Processor Registers (2) FTP-File Transfer Protocol
(D) SSD (Solid-State Drive) (3) SMTP-Simple Mail Transfer Protocol
(E) VRAM (Video RAM) (4) ISP-Internet Service Protocol
Choose the correct answer from the options given
below:
(1) (A), (B) and (D) only (2) (A), (B) and (C)
only
(3) (C), (D) and (E) only (4) (B), (C) and (D)
only [30 SEP 2022 II]
[29 SEP 2022 II] 618. Given below are two statements:
614. Which of the following is not an essential Statement I: Artificial Intelligence (AI) learns from
component required for video-conferencing changing circumstances, whereas virtual reality is
system? an artificially created environment used to give a
(1) video camera feeling of being there'.
(2) Display Device Statement II: QR. a type of more sophisticated
(3) Telephone barcode which uses a matrix of dark squares on a
(4) Microphone light background, stands for Quick Reaction.
[30 SEP 2022 II] In the light of the above statements, choose
615. Which of the developments A-E given below have statements, choose the most appropriate answer
arisen because of the Internet? from the options given below:
(A) Web logs (1) Both Statement I and Statement II are correct
(B) Databases (2) Both Statement I and Statement II are incorrect
(C) Wikis (3) Statement I is correct but Statement II is
(D) DTP incorrect
(E) Social networking sites (4) Statement I is incorrect but Statement II is
Choose the correct answer from the options given correct
below: [30 SEP 2022 II]
(1) (A), (B) and (C) only 619. Match List I with List II.
(2) (B) and (D) only List I List II
(3) (A), (C) and (E) only (Input Method) (Use)
(4) (C) and (E) only A. Bar Code 1. To input text from a printed
[30 SEP 2022 II] Reader document
616. Which of the following statements are correct? B. Chip Reader 2. To input data from a bank
A. IP addresses are used to identify computers on cheque
the Internet. C. MICR 3. To input data from a bank card
B. Internet and WWW are two separate but related D. OCR 4. To input data about a product
terms: Internet is a service on the WWW while at a POS (Point of Sale)

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 60

Choose the correct answer from the options given C. Random Access 3. Stores bootstrap loader
below: Memory (RAM) and BIOS
(1) A-1, B-3, C-2, D-4 (2) A-3, B-2, C-4, D-1 D. Read Only 4. Fetches and manages
(3) A-4, B-3, C-2, D-1 (4) A-4, B-2, C-3, D-1 Memory (ROM) execution of each
[1 OCT 2022 I] instruction in turn
620. Given below are two statements about online Choose the correct answer from the options given
search: below:
Statement I: Google search results return the same (1) A-4, B-3, C-2, D-1 (2) A-3, B-4, C-1, D-2
information to anyone who enters the same (3) A-2, B-4, C-1, D-3 (4) A-2, B-1, C-4, D-3
keywords [1 OCT 2022 II]
Statement II: Search engines are gathering vast 624. Given below are two statements:
amounts of information about our searches and Statement I: The binary equivalent of decimal
ourselves. number (19) is (10101)
In light of the above statements, choose the most Statement II: (1011) + (110) = (10101)
appropriate answer from the options given below: In the light of the above statements, choose the
(1) Both Statement I and Statement II are correct. most appropriate answer from the options given
(2) Both Statement I and Statement II are incorrect. below:
(3) Statement I is correct but Statement II is (1) Both Statement I and Statement II are true
incorrect. (2) Both Statement I and Statement II are false
(4) Statement I is incorrect but Statement II is (3) Statement I is true but Statement II is false
correct. (4) Statement I is false but Statement II is true
[1 OCT 2022 I] [1 OCT 2022 II]
621. Which of the following devices from the list A-E 625. Miss Anita is excited to use a new software which
given below are output devices only? is freely available to download but she cannot
(A) Blu-Ray disc modify or change the source code. Anita is using:
(B) Buzzer (1) Freeware
(C) Web-Cam (2) Open-source Software
(D) SSD (3) Firmware
(E) Laser printer (4) Liveware
Choose the correct answer from the options the [1 OCT 2022 II]
626. World Wide Web (WWW) was invented by
options given below:
whom?
(1) (B) and (E) only (2) (A) and (D) only
(1) Alan Turing (2) Steve Jobs
(3) (C) and (E) only (4) (E) only
(3) Bill Gates (4) Tim Berners-Lee
[1 OCT 2022 I]
[1 OCT 2022 II]
622. Consider the following email fields in email
627. Miss Madhu clicks on a web link received in a
software:
message on her phone which promises her a
To: Ravi@gmail.com
complementary trip to a destination of her
Cc: Rajan@gmail.com. Raj@gmail.com
choice. She forwarded this message to her friend,
Bcc: Rakesh@gmail.com
Arun and asked him to do the same. But Arun
Which recipient(s) is/are able to see all the other
refuses and tells Madhu that her personal and
recipients?
private information, such as online account
(1) Rajan, Raj and Rakesh (2) Ravi
names, login information and passwords can be
(3) Rajan and Raj (4) Rakesh
stolen and she should be careful of
[1 OCT 2022 I]
such____________ attacks.
623. Match List I with List II:
(1) Phishing (2) Spamming
List 1. Computer List 2. Description
Term (3) Scamming (4) Plagiarism
A. Arithmetic and 1. Stores part of the [1 OCT 2022 II]
Logic unit (ALU) operating system 628. Which of the following are correct in the case of
currently in use Learning Management System (LMS)? (A) LMS is
B. Control Unit 2. Carries out operations a software
(CU) such as AND, OR, (B) LMS can be used for virtual teacher-
NOT student groups

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 61

(C) LMS is a hardware (3) Statement I is true but Statement Il is false


(D) LMS can be used for online quizzes (4) Statement I is false but Statement II is true
(E) LMS can be used for making [8 OCT 2022 II]
institutional websites 633. To receive email. you need an email provider, a
Choose the correct answer from the options given connection to your provider and an email
below: application. If your Internet Service Provider
(1) A, B and E Only (2) B, C and D Only (ISP) has a POP sever, you have a wide choice of
(3) A, B and D Only (4) A, B, D email applications.
and E Only What does the acronym POP stand for?
[8 OCT 2022 I] (1) Page Overlay Protocol (2) Post Office
629. Which of the following statements are correct Protocol
regarding CERT-IN? (3) Power Outage Protocol (4) Postal off Protocol
a) CERT-IN is the national nodal agency for [8 OCT 2022 II]
responding to computer security incidents as and 634. The Microsoft Office PowerPoint. there are two
when they occur. types of slide orientation that are supported.
b) CERT-IN is operational since January 2014. What are these orientation types?
c) Forecast and alert of cyber security incidents is (1) Portrait and Landscape
one of the functions of CERT-IN. (2) Portrait and Facedown
Choose the correct answer from the options given (3) Upright and Landscape
below: (4) Landscape and Facedown
(1) A, B and C only (2) A and B only [8 OCT 2022 II]
(3) A and C only (4) B and C only
635. What does the symbol signify?
[8 OCT 2022 I]
(1) copyrighted material (2) copyable material
630. Which of the following three numbers (A-C) in
(3) creative commons (4) copying commons
decimal, octal and hexadecimal notations,
[10 OCT 2022 I]
respectively, is/are equivalent to (11011001), in
636. An email message has been sent from A to B, C, D,
binary notation?
E and F with the fields as shown below:
A) ( 217 )10 From : A
B) ( 661 )8 To : B
C) ( D 9 )16 CC : C, D
BCC : E, F
Choose the correct answer from the e correct
Which one of the following statements is TRUE?
answer from options given below:
(1) F does not know that C was sent the message
(1) A only (2) B only
(2) C does not know that D was sent the message
(3) A and B only (4) A and C only
(3) E does not know that F was sent the message
[8 OCT 2022 I]
(4) D does not know that B was sent the message
631. Which Indian Act makes it illegal to knowingly
[10 OCT 2022 I]
spread a computer virus?
637. Which of the following are micro-blogging
(1) Data protection and Security Act. 1997
platforms?
(2) Information Security Act. 1998
(A) Pinterest
(3) Information Technology Act. 2000
(B) eBay
(4) Computer Misuse and Cyber Act. 2009
(C) Tumblr
[8 OCT 2022 I]
(D) Instagram
632. Given below are two statements:
(E) Twitter
Statement I: Cache memory is volatile memory and
Choose the correct answer from the options given
is much slower than Random Access Memory
below:
(RAM)
(1) (D) and (E)
Statement II: CDs, DVDs and Magnetic Tapes are
(2) (C), (D) and (E)
all optical media devices.
(3) (A), (C), (D) and (E)
In the light of the above statements. choose the
(4) (A), (B) and (C)
correct answer from the options given below:
[10 OCT 2022 I]
(1) Both Statement I and Statement II are true
(2) Both Statement I and Statement II are false

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 62

638. HDMI ports allow output (both audio and visual) (1) Both Statements I and Statement II are true
from a computer HDMI-enabled device. HDMI is (2) Both Statement and Statement II are false
an acronym for (3) Statement I is true but Statement II is false
(1) Highly-Digital multimedia Interface (4) Statement I is false but Statement II is true
(2) High-Definition Multimedia Interface [10 OCT 2022 II]
(3) Highly-Digitized multimedia interface 642. Which of the following broad functions of an
(4) Highly-Digital multimedia instruction Operating System in computer?
[10 OCT 2022 I] A. Handling of files and folders
639. Given below are two statements B. Converting from high-level language to low-
Statements I: A DVD or CD using letter 'R' level language
indicates that is Read only. C. Interfacing between user and hardware
Statement II: Web browsers are used to allow a D. Helping to run application software
user to gain access to the internet. Choose the correct answer from the options given
In light of the above statements, choose the answer below:
from the options given below: (1) A, C and D only (2) B, C and D only
(1) Both Statements I and Statement II are true (3) A and C only (4) A, B, C and D
(2) Both Statement I and Statement II are false [10 OCT 2022 II]
(3) Statement I is true but Statement II is false 643. Computers have evolved from the early
(4) Statement I is false but Statement II is true mainframes to the relatively small smart devices
with high computing power used today. Which of
the following inventions contributed to reduce
the physical size of computers?
(1) Vaccum tube (2) Integrated circuits
(3) Registers (4) Solid state memory
[10 OCT 2022 II] [13 OCT 2022 I]
640. Match List I with List II 644. Given below are two statements in respect of
List I List II Computers:
Ethical Issue in Description Statement (I): A DVD-ROM is an optical storage
information media and it can be written many times.
Technology Statement (II): Software is loaded into secondary
A. Privacy I. Responsibility of data storage from RAM and is then executed by CPU.
collector to ensure accuracy In the light of the above statements. Choose the
B. Accuracy II. Responsibility of data correct answer from the options given below:
collector to control access (1) Both Statement (I) and Statement (II) are true
C. Property III. Collection and use of data (2) Both Statement (I) and Statement (II) are false
about individuals (3) Statement (I) is true but Statement (II) is false
D. Accessibility IV. Data ownership and (4) Statement (I) is false but Statement (II) is true
Software Usage Rights [13 OCT 2022 I]
Choose the correct answer from the options given 645. Which of the following file formats are
below: appropriate for distributing video files across the
(1) A-III, B-I, C-IV, D-II (2) A-IV, B-I, C-II, D- internet?
III A. .FLV
(3) A-I, B-III, C-II, D-IV (4) A-III, B-I, C-II, D- B. .MP3
IV C. .WMA
[10 OCT 2022 II] D. .AIF
641. Given below are two statements E. .AVI
Statements I: The contents of most forms of Ram Choose the correct answer from the options given
are volatile, thus making them unsuitable for long below:
term data storage. (1) (B) and (C) only (2) (A) and (E)
Statement II: Hard disk has faster access of data in only
comparison to RAM as well as processor registers. (3) (D) and (E) only (4) (C) and (D)
In light of the above statements, choose the answer only
from the options given below: [13 OCT 2022 I]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 63

646. Identify the correct sequence of information [13 OCT 2022 II]
processing in communication 651. The collection of linked information residing on
A. Input computers which is accessible through Internet
B. Output is called:
C. Data entry (1) HTTP: (2) HTML
D. Processing (3) WWW (4) URL
E. Storage [13 OCT 2022 II]
Choose the correct answer from the options correct 652. Which of the following statements are correct
answer from given below: regarding Radio Frequency Identification (RFID)
(1) (A), (B), (E) (D), (C) (2) (B), (D), (E), (A), technology?
(C) A. RFID refers to a wireless system comprising two
(3) (C), (A), (D), (E), (B) (4) (A), (C), (D), (E), components: tags and readers.
(B) B. The reader is a device that has one or more
[13 OCT 2022 I] antennas that emit radio waves and receive
647. Match List I with List II: signals back from the RFID tag.
List I(File List II (File type) C. Passive RFID tags are powered by the reader and
extension) do not have a battery.
(A) mp3 (I) Image Choose the correct answer from the options given
(B) xls (II) music below:
(C) jpeg (III) database (1) A, B and C
(D) mdb (IV) spreadsheet (2) B and C only
(3) A and C only
Choose the correct answer from the options given (4) A and B only
below:
(1) A-1, B-4, C-2, D-3 (2) A-2, B-4, C-1, D-3
(3) A-2, B-4, C-3, D-1 (4) A-3, B-2, C-1, D-4 [13 OCT 2022 II]
[13 OCT 2022 I] 653. Which of the following hardware components
648. A software is termed as an open source software will lose data when the power to a computer is
if: switched off ?
(1) The developer company is open 24 × 7 A. Processor Registers
(2) its source code is available to share, study and B. Cache Memory
modify C. SSD
(3) it can be downloaded from the be Internet D. RAM
(4) it is available free of cost E. ROM
[13 OCT 2022 I] Choose the correct answer from the options given
649. Match List I with List II: below:
(1) B and D only (2) A, C and D only
List I Medium List II User vehicle
(3) A, B and C only (4) A, B and D only
A. News paper I. URSA mini pro
[13 OCT 2022 II]
B. Radio II. Satellite dishes
654. _______ are text files with small pieces of data and
C. Television III. Electro magnetic waves
are used to identify specific users and improve
D. Film IV. Rubber plate the web browsing experience.
Choose the correct answer from the options given (1) Cookies (2) Bookmarks
below: (3) Blogs (4) Wikis
(1) A-4, B-3, C-2, D-1 [14 OCT 2022 I]
(2) A-3, B-2, C-1, D-4 655. With respect to RAM and ROM, which of the
(3) A-2, B-1, C-4, D-3 following statements are true?
(4) A-1, B-2, C-3, D-4 (A) ROM is Real optical memory.
13 OCT 2022 II] (B) RAM stores the instructions you are
650. An example of a cyber-exacerbated crime is, currently working on.
(1) Cyber vandalism (2) Cyber (C) ROM stores the BIOS.
piracy (D) RAM allows the user to read and write
(3) Cyber stalking (4) Cyber trespass data.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 64

(E) Both RAM and ROM lose their data (A) MAN
when the power is turned off. (B) WAN
Choose the correct answer from the options given (C) LAN
below: Choose the correct answer from the options given
(1) (A), (D) and (E) only below:
(2) (B), (C) and (D) only (1) (C), (B), (A) (2) (A), (C), (B)
(3) (A), (B) and (C) only (3) (C), (A), (B) (4) (B), (A), (C)
(4) (C), (D) and (E) only [14 OCT 2022 II]
[14 OCT 2022 I] 660. Given below are two statements
656. Given below are two statements with regard to Statement I: ROM is temporary memory that can
websites: be written to or read from and the contents of the
Statement (I): Twitter allows users to send small memory can be changed.
posts known as tweets' up to 140 characters in Statement II: RAM is permanent memory that can
length. only be read from and contents of memory cannot
Statement (II): By default, blogs display posts in be changed.
chronological order on the home page with the In light of the above statements, choose the most
earliest post at the top. appropriate answer from the options given below:
In the light of the above statements, choose the (1) Both Statement I and Statement Il are correct
correct answer from the options given below: (2) Both Statement I and Statement II are incorrect
(1) Both Statement (I) and Statement (II) are true (3) Statement is correct but Statement II is incorrect
(2) Both Statement (I) and Statement (II) are false (4) Statement is incorrect but Statement II is correct
(3) Statement (I) is true but Statement (II) is false
(4) Statement (I) is false but Statement (II) is true [14 OCT 2022 II]
661. MIDI is associated with the storage of music files.
[14 OCT 2022 I] MIDI is an acronym for,
657. Which of the following is the act of obtaining a (1) Musical Interactive Digital Interface
password or other confidential information from (2) Musical Instructions Device Interpreter
a person within an organization by using (3) Mask Iterative Display Instance
unauthorized means such as feigning an (4) Musical Instrument Digital Interface
emergency situation? [14 OCT 2022 II]
(1) Social engineering 662. Match List I with List II.
(2) Trojan horse List I (Statement) List II
(3) Password crack (Value)
(4) Stepping-stone attack A. The number of bits that make up 1. 5
[14 OCT 2022 I] a byte
658. Match List I with List II. B. Base 10 (decimal) value of the 2. 8
List I (Computer List II (Description) binary number: 001111
terms) C. Number of minutes to upload a 3. 10
A. Hub 1. Input device 75 megabyte file at 2
B. Joystick 2. Operating system Megabits per second upload
speed
C. Notepad 3. Network device
D. If there are 2 p bytes in a 4. 15
D. Android 4. Text editor Kilobyte then what is the
Choose the correct answer from the options given Value of P?
below: Choose the correct answer from the options given
(1) A-1, B-3, C-4, D-2 below:
(2) A-3, B-1, C-2, D-4 (1) A-1, B-2, C-3, D-4 (2) A-2, B-4, C-1, D-3
(3) A-3, B-1, C-4, D-2 (3) A-3, B-4, C-1, D-2 (4) A-2, B-1, C-4, D-3
(4) A-4, B-2, C-1, D-3 [14 OCT 2022 II]
[14 OCT 2022 I]
663. Mohit has sent an email to Bobby, Danny and
659. Arrange the following different types of
Ashok as shown below:
computer networks basis of geographical area
From: Mohit@gmail.com
implied. In an ascending order on the To: Bobby@gmail.com

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 65

Cc: Danny@gmail.com (3) Spamming


Bcc: Ashok@gmail.com (4) Smishing
Subject: Important update [21 Feb 2023 I]
Dear 667. What are the main benefits of using an SSD
Colleague, rather than an HDD?
Please note that tomorrow's meeting has been A. SSD uses spinning disks and is thus more
cancelled. reliable
Regards B. SSD is considerable lighter and has a lower
Mohit power consumption.
Which of the following statements is Correct? C. SSD accesses data considerably faster.
(1) Bobby and Danny are aware that Ashok received Choose the most appropriate answer from the
the email options given below:
(2) Danny is aware that Ashok and Bobby received (1) A and B only
the email (2) A and C only
(3) Ashok is aware that Bobby and Danny received (3) B and C only
the email (4) A, B and C
(4) All recipients are aware that the others received
the email.

[14 OCT 2022 II] [21 Feb 2023 I]


664. Which of the following are web search engines? 668. Match List I with List II:
A. DuckDuckGo List 1. List 2.
B. Google (Statement) (Value)
C. Yahoo search RELD A. Number of bytes formed from 8 6
D. Bing bits
E. Pinterest B. Base-10 (denary) value of the 4
Choose the correct answer from the options given binary number: 110
below: C. If there are 2 p bytes in 1 mega 1
(1) B, C and D only
byte, then what is the value of
(2) A, B, C and D only
P?
(3) B and E only
D. An ISP company advertises its 20
(4) A, C, D and E only
broadband download speed as
128 mega bits per second. How
Exam Year – 2023 many 4-mega byte files can be
downloaded per second using
[21 Feb 2023 I] the company's broad band?
665. An Indian company designs a mobile application Choose the correct answer from the options given
to process staff records. In each record, 10 bits below:
are used to store Staff ID and 20 bytes are used (1) A-3, B-4, C-1, D-2
to store staff names. How many staff records can (2) A-2, B-1, C-4, D-2
the mobile application support? (3) A-3, B-1, C-4, D-2
(1) 210 (4) A-4, B-3, C-1, D-2
(2) 212 [21 Feb 2023 I]
(3) 222 669. Given below are two statements:
Statement I: Entries in blogs are organized from
(4) 232 most recent to least recent.
[21 Feb 2023 I] Statement II: Hits are the number of occasions
666. The action of sending text messages to where key words in a search engine match up with
fraudulently obtain another person's Bank websites/web pages.
details is called: In light of the above statements, choose the most
(1) Phishing appropriate answer from the options given below:
(2) Pharming

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 66

(1) Both Statement I and Statement II are true. [21 Feb 2023 II]
(2) Both Statement I and Statement II are false. 674. Given below are two statements:
(3) Statement I is true but Statement II is false. Statement I: CDs and DVDs are described as
(4) Statement I is false but Statement II is true. magnetic storage devices.
[21 Feb 2023 II] Statement II: Laser printers are made up of a print
670. __________ is a set of rules that must be obeyed head consisting of nozzles that sprays droplets of
when transferring files across the Internet. ink onto the paper to form characters.
(1) HTML In light of the above statements, choose the most
(2) URL appropriate answer from the options given below:
(3) FTP (1) Both Statement I and Statement II are true.
(4) ISP (2) Both Statement I and Statement II are false.
[21 Feb 2023 II] (3) Statement I is true but Statement II is false.
671. The action of sending emails to fraudulently (4) Statement I is false but Statement II is true.
obtain another person's bank details is called:
(1) Phishing
(2) Pharming [21 Feb 2023 II]
(3) Spamming 675. Which of the following applications A-C are built
(4) Smishing on top of open-source digital platforms?
[21 Feb 2023 II] A. Google Earth
672. Which of the following are the advantages in B. DIKSHA
using Solid State Drives (SSDs) rather than Hard C. MySQL
Disk Drives (HDDs) in Laptop computers? Choose the correct answer from the options given
A. SSD is much lighter than HDD. below:
B. SSD has a lower power consumption than HDD. (1) A and B only
C. SSDs are thick compared to HDDs due to no (2) A and C only
moving parts. (3) B and C only
Choose the correct answer from the options below: (4) A, B and C
(1) A and B only (2) A and C only [21 Feb 2023 II]
(3) B and C only (4) A, B and C 676. Which of the following statements (A-C) are
[21 Feb 2023 II] correct with reference to Web 3.0?
673. Match List I with List II: A. Web 3.0 technology (theoretically) puts user data
List 1. (Statement) List 2. (Value) and web content into user's hands.
A. Base-10 (denary) value of the 1. 100 B. Centralization is a core tenet of Web 3.0.
binary number: 100000 C. In Web 3.0 world, block-chain based networks,
B. Internet service provider 2.14 transactions and businesses will thrive in the
advertises a download speed of coming years.
80 megabits per second. What is Choose the correct answer from the options given
the time taken in seconds to below:
download an 80 megabyte file? (1) A and B only
C. A music file is 80 megabytes in 3.32 (2) A and C only
size and MP3 file compression (3) B and C only
reduces the size of a music file (4) A, B, and C only
by 90%. The number of MP3 [21 Feb 2023 II]
files of the size after 677. Given below are two statements:
compression that can be stored Statement I: The inventor of WWW is Bill Gates.
on an 800 MB CD. Statement II: IPv6 protocol defines an IP address
D. What is the denary (base-10) 4.8 of 128 bits.
equivalent to the hexadecimal In light of the above statements, choose the most
digit E? appropriate answer from the options given below:
Choose the correct answer from the options given (1) Both Statement I and Statement II are true.
below: (2) Both Statement I and Statement II are false.
(1) A-2, B-4, C-1, D-3 (2) A-3, B-4, C-1, D-2 (3) Statement I is true but Statement II is false.
(3) A-1, B-2, C-4, D-3 (4) A-3, B-1, C-4, D-2 (4) Statement I is false but Statement II is true.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 67

[21 Feb 2023 II] A. SaaS users can access their data from any
678. Consider the following Excel spreadsheet: Internet-Connected on mobile device.
A B C D E F B. A web-based email service such as Outlook,
1 3 5 1 2 Hotmail or Yahoo! Mail is a form of SaaS.
C. SaaS buyers can customize the user interface to
2 2 3 5 2
change the look and feel of the software, as well
3 4 5 7 2
as, modify specific areas, such as data fields.
What is the values of the formula= SUMIF(B1:B3, Choose the correct answer from the options given
">" & 3, C1:C3) below:
(1) 3 (1) A and B only (2) A and C only
(2) 5 (3) B and C only (4) A, B and C
(3) 7 [22 Feb 2023 II]
(4) 8 683. Which of the following communication
[21 Feb 2023 II] technologies A-C are considered as short-range
679. Given below are two statements:
devices/technologies?
Statement I: SWAYAM is a platform developed by
A. CCTV
Ministry of Education and AICTE to bridge the
B. RFID
digital divide among students.
C. WLAN
Statement II: UGC is a National coordinator of
Choose the correct answer from the options given
SWAYAM for non-technical Post Graduation
below:
education to ensure that best quality content is
(1) A and B only
produced and delivered.
(2) A and C only
In light of the above statements, choose the most
(3) B and C only
appropriate answer from the options given below:
(4) A, B and C
(1) Both Statement I and Statement II are true.
[22 Feb 2023 II]
(2) Both Statement I and Statement II are false.
684. In India, the term, "Public Key Infrastructure" is
(3) Statement I is true but Statement II is false.
used in the context of
(4) Statement I is false but Statement II is true.
(1) Digital security infrastructure
[22 Feb 2023 II]
(2) Food security infrastructure
680. Which of the following applications A-C are built
(3) Health care and education infrastructure
on top of open-source digital platforms?
(4) Telecommunication and transportation
A. Aadhar B. Adobe Reader C. COWIN
infrastructure
Choose the correct answer from the options given
[23 Feb 2023 I]
below:
685. A song on a CD is, on average, 4 Mbytes in size,
(1) A, B and C (2) A and B only
Amit wishes to transfer 4000 such songs on to a
(3) B and C only (4) C only
memory stick. Estimate the minimum size of
[22 Feb 2023 II]
681. Given below are two statements: memory stick, in GB, that Amit will need to use.
Statement I: IBM was the most valuable (1) 8 GB
worldwide IT brand in 2022. (2) 16 GB
Statement II: TCS and Infosys were the second and (3) 32 GB
the third most valuable Indian brands respectively (4) 24 GB
in the IT sector globally in 2022. [23 Feb 2023 I]
In light of the above statements, choose the most 686. Which of the following statements are true? 5G-
appropriate answer from the options given below: enabled technology will soon replace 4G enabled
(1) Both Statement I and Statement II are true. technology for mobile communication
(2) Both Statement I and Statement II are false. worldwide. Potential advantages of 5-G enabled
(3) Statement I is true but Statement II is false. mobile technology include:
(4) Statement I is false but Statement II is true. 1. Greater interconnectivity for Internet of things
[22 Feb 2023 II] 2. Greater download speeds
682. Which of the following statements (A-C) are 3. Less bandwidth
correct with reference to "Software as a Service 4. Greater end-to-end delay.
(SaaS)" in cloud computing? Choose the correct answer from the options given
below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 68

(1) A and B only 690. Tina has bought a 4 gigabyte MP3 player. If each
(2) B and C only song lasts 3 minutes and is recorded at 128 kilo
(3) C and D only bits per second, then how many songs can be
(4) A and D only stored on Tina's MP3 player?
(1) 1156 (2) 1256
(3) 1356 (4) 1456

[23 Feb 2023 II]


691. Which of the following statements about email
687. Given below two statements: With reference to are TRUE?
digital initiatives of Government of India. A. You can create folders to store and organise your
Statement I: BHIM is a payment app that lets you emails.
make simple, easy and quick transactions using B. Using the Cc features will hide all other
Unified Payments Interface (UPI) recipients from each other.
Statement II: Courses delivered through SWAYAM C. You can add attachments of any file size to an
platform are made available at minimal cost. email.
In the light of the above statements, choose the D. You can add signatures to your emails to give
most appropriate answer from the options given personal contact details.
below: E. You can only send emails from a laptop
(1) Both statement I and Statement II are true. computer.
(2) Both statement I and Statement II are false. Choose the correct answer from the options given
(3) Statement I is true but Statement II is false. below:
(4) Statement I is false But Statement II is true. (1) A and B only (2) A and C only
[23 Feb 2023 I] (3) A and D only (4) B, C and E only
688. Which one of the following acronyms is matched [23 Feb 2023 II]
incorrectly with its full form? 692. Given below are two statements:
(1) BIOS-Basic Input/output system Statement I: .text, .rtf and .csv are three file
(2) PDA-Personal Digital Authentication extension used for generic text files.
(3) GUI-Graphical User Interface Statement II: .rar file extension is an acronym for
(4) WWW-world wide web Roshal Archive; developed by Russian software
[23 Feb 2023 I] engineer Eugene Roshal.
689. Identify the correct order of the following terms In light of the above statements, choose the correct
A-D to complete the sentences given below about answer from the options given below:
digital still and video cameras: Cameras that (1) Both Statement I and Statement II are true.
handle a higher number of _______will be able to (2) Both Statement I and Statement II are false.
capture more details than those with a lower (3) Both Statement I true but Statement II is false.
number. Images that are stored in a _______ format (4) Statement I is false but Statement II is true.
have not been processed and will take up more [23 Feb 2023 II]
storage space than images that are stored in 693. Which one of the following acronyms matches
________ format. The _______ of your storage device incorrectly with their full form?
determines how many images you can store. (1) VoIP - Voice Over Internet Protocol
1. JPEG (2) WLAN - Wired Local Area Network
2. Raw (3) HTML - Hyper Text Markup Language
3. Megapixels (4) CMOS - Complementary Metal Oxide
4. Capacity Semiconductor
Choose the correct answer from the options given
below: 694. Identify the correct order of the following
(1) C, B, A, D memory types in decreasing order of access time.
(2) A, D, B, C A. RAM
(3) B, C, A, D B. SSD
(4) D, B, A, C C. CPU Cache
[23 Feb 2023 II] Choose the correct answer from the options the
correct answer from the options given below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 69

(1) A, C, B (2) C, A, B Choose the correct answer from the options given
(3) B, C, A (4) B, A, C below:
(1) A and B only (2) A and C only
(3) B and C only (4) A, B and C
[24 Feb 2023 I] [24 Feb 2023 I]
695. In ICT, which one of the following pairs of 699. Match List I and List II.
acronyms and its expansion is incompatible? List I List II
(1) .csv-Comma Separated Variables. (storage Device (Description)
(2) .rtf Rich Text Format. or Media)
(3) .pdf - Portable Document Format. A. Blue-ray disc 1. Non-volatile memory that can
(4) .png Portable Network Graphics. only be read from and not
[24 Feb 2023 I] written to
696. Identify the correct order of the words A-D given B. SSD 2. Optical storage media that
below to complete the following sentences about allows very high storage
College Registration Systems: _________ is a type of capacity by using blue/violet
registration system that uses finger prints or laser technology.
retina scans to register students. A type of C. ROM 3. Volatile memory that stores
registration that uses a form that has been data, programs, and the parts
completed with a pencil and is then scanned by a of the operating systems that
machine after being completed is called _________ are currently in use.
registration. A tag that uses microchips and radio D. RAM 4. Device that stores data by
signals worn by all students that register them controlling the movement of
when they enter the classroom is called _________ electrons within a microchip;
registration. _______ are made of plastic and there are no moving parts.
contain a chip that can be swiped through to Choose the correct answer from the options given
register the student. below:
A. Smart Cards (1) A-1, B-4, C-2, D-3 (2) A-3, B-1, C-4, D-2
B. OMR (3) A-4, B-2, C-1, D-3 (4) A-2, B-4, C-1, D-3
C. Biometric [24 Feb 2023 II]
D. RFID 700. Which of the following acronyms matches
Choose the correct answer from the options given incorrectly with its full form?
below: (1) SMS- short message storage.
(1) A, B, D, C (2) B, C, A, D (2) URL-Uniform resource locator
(3) D, A, C, B (4) C, B, D, A (3) Blog-web LOG
[24 Feb 2023 I] (4) VPN- virtual private network
697. Given below two statements: (1 KB 1024 bytes)
[24 Feb 2023 II]
Statement -I: 0.2 terabytes (TB) is equal to 204.8
701. Identify the correct order of the following list of
gigabytes (GB)
stage A-E when an e-mail is sent and received.
Statement -II: 1 petabyte (PB) is equal to 253 bits. 1. Sender's ISP mail sever decides how to route the
In the light of the above statements, choose the message, and the message travels over the
correct answer from the options given below: internet and arrives at recipient's IPS mail server.
(1) Both Statement I and Statement II are true. 2. Message retrieved and sent to recipient's
(2) Both Statement I and Statement ll are false. computer to be opened and read.
(3) Statement is true but Statement II is false. 3. The sender composes his message and activates
(4) Statement is false but Statement II is true. the send command.
[24 Feb 2023 I] 4. Message held in recipient's electronic mail box
698. Which of the following statements are true? and recipient logs on to read his message.
A. WWW is a collection of multimedia web pages 5. Message is sent to sender's ISP mail server and
stored on a website. this server examines address associated with
B. URLs specify the location of all web pages. message.
C. Web resources are accessed by Windows Choose the correct answer from the options given
Operating System. below:
(1) C, E, A, B, D (2) A, C, B, D, E

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 70

(3) D, B, C. E, A (4) C, E, A, D, B 705. Which statement best describes data


[24 Feb 2023 II] compression?
702. Given below are two statements: (1) The process of calculating the file size of a
Statement 1: ( 4 A 2 F )16=( 18991 )10 saved file.
(2) The process of encoding characters into more
Statement 2: ( 6940 )10 = (1 B1 c )16
than one language.
In light of the above the statement, choose the
(3) The process of encoding information to try and
correct answer from the options given below:
use fewer bits than the original data.
(1) Both statement 1 and statement 2 are true.
(4) The process of removing necessary data from a
(2) Both statement 1 and statement 2are false.
file.
(3) Statement 1 is true but statement 2 is false.
[28 Feb 2023 I]
(4) Statement 1 is false but statement 2 is true.
706. Given below are two statements:
[24 Feb 2023 II]
Statement-l: Twitter is an example of a Web 2.0
703. Which of the following memory/storage device
application.
are considered as primary storage?
Statement-II: Web 2.0 refers to static text-based
1. Removable hard disk drive
information websites.
2. RAM
In the light of the above statements, choose the
3. ROM
correct answer from the options given below:
4. DVD/CD
(1) Both Statement I and Statement II are true.
Choose the correct answer from the options given
(2) Both Statement I and Statement II are false.
below:
(3) Statement I is true but Statement II is false.
(1) A and D only (2) B and D only
(4) Statement I is false but Statement II is true.
(3) A and c only (4) B and c only
[28 Feb 2023 I]
[24 Feb 2023 II]
707. Which of the following systems use synchronous
704. Match List I and List II.
communication?
List I List II A. Skype video call
(Description) (ICT Term) B. Facebook Chat
A. Set of rules that must be I. Internet Service C. Email
obeyed when transforming Provider D. Messaging on Snap chat
files on data across the E. Telephone call
internet. Choose the correct answer from the options given
B. ID given to a device when II. Hyper Text below:
it connects to the internet; Transfer Protocol (1) A, B and E only (2) A, B, D and E only
the ID changes each time (HTTP) (3) A, C, D and E only (4) B and C only.
the device connects [28 Feb 2023 I]
C. Company that provides the III. Media Access 708. Match List I with List II.
user with access to the Control (MAC) LIST I LIST II
internet for a monthly address (Storage device) (Description)
subscription. A. Solid State 1. Optical media uses
D. ID which uniquely IV. Internet Drive (SSD) concentric tracks to allow
identifies the device Protocol (IP) simultaneous read-write
connected to the internet; Address operations.
this ID rarely changes. B. ROM 2. Volatile in nature that
Choose the correct answer from the options given stores programs and data in
below: current use.
(1) A-4, B-2, C-1, D-3 C. DVD-RAM 3. Has no moving part and is
(2) A-2, B-4, C-1, D-3 therefore a very robust and
(3) A-3, B-1, C-4, D-2 reliable technology.
(4) A-2, B-4, C-2, D-3 D. RAM 4. Non-volatile in nature that
stores firmware.
Choose the correct answer from the options given
[28 Feb 2023 I] below:
(1) A-1, B-4, C-3, D-2

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 71

(2) A-3, B-4, C-1, D-2 List 1 List 2


(3) A-2, B-3, C-1, D-4 (Feature of email (Description)
(4) A-4, B-3, C-1, D-2 software)
[28 Feb 2023 II] A. Carbon copy 1. Allows you to add personal
709. In MS-EXCEL, Cell B9 contain the value 3, and data to the email.
B10 contains the value 6. You select both the B. Email signature 2 Allows you to send the same
cells and drag the fill handle down to B13. The email to more than one
contents of the cell B11, B12 and B13 will be person at once.
_________ C. Address book 3. Allows you to send a
(1) 3, 6, 3 photograph with your email.
(2) 7, 8, 9 D. File attachment 4. Allows you to store contact
(3) 9, 12, 15 details.
(4) 6, 6, 6 Choose the correct answer from the options given
[28 Feb 2023 II] below:
710. What is the component of Web 3.0 that describe (1) A-1, B-2, C-4, D-3 (2) A-2, B-1, C-4, D-3
things in a way that computers can understand? (3) A-2, B-4, C-1, D-3 (4) A-3, B-1, C-4, D-2
(1) Social tagging [1 MARCH 2023 I]
(2) Sustaining web 714. Which of the following statements about email
(3) Social Web security best describes email encryption?
(4) Semantic Web (1) This is a self-replicating program that can spread
[28 Feb 2023 II] by email.
711. Given below are two statements about (2) This disguises the content of email messages in
internal/external computer memory: order to protect sensitive information.
Statement I: A portable hard drive is an example of (3) This consists of sending numerous duplicate
internal memory. mails to the same email address.
Statement II: Magnetic tape is used to store backup (4) The email header is changed so that the message
of data. appears to have come from someone else.
In light of the above statement, choose the most [1 MARCH 2023 I]
appropriate answer from the option given below: 715. Given below are two statements about music
(1) Both Statement I and statement II are true. files:
(2) Both statement I and statement II are false. Statement I: A music clip stored in MP3 format
(3) Statement I is true but statement II is false. would take up more memory than the same clip
(4) Statement I is false but statement II is true. stored in WAV format.
[28 Feb 2023 II] Statement II: Music files stored in MP3 format are
712. Which of the following statements are TRUE? of better quality than files stored in WAV format.
1. A standard format for compressed video files is In the light of the above statements, choose the
MPEG. correct answer from the options given below.
2. WAW files are not compressed. (1) Both Statement I and Statement II are true.
3. A compressed files will be transmitted faster (2) Both Statement I and Statement II are false.
over a network. (3) Statement I is true but Statement II is false.
Choose the correct answer from the options given (4) Statement I is false but Statement II is true.
below: [1 MARCH 2023 I]
(1) A and B only 716. Which of the following statements are accurate?
(2) A and C only A. Web 2.0 is a simple static website without any
(3) B and C only interaction with its users.
(4) A, B and C B. Web 2.0 brings people closer together with
information using machines.
C. Web 3.0 brings machines closer together using
[28 Feb 2023 II] information.
713. Match List 1 with List 2: Choose the correct answer from the options given
below:
(1) A Only (2) B Only
(3) B and C Only (4) D only

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 72

[1 MARCH 2023 I] In light of the above statements, choose the correct


717. Match List I with List II. answer from the options given below:
LIST I LIST II (1) Both Statement I and Statement II are true.
(Output Device) (Description) (2) Both Statement I and Statement II are false.
A. Inkjet printer 1. Flat panel display that uses (3) Statement I is true but Statement II is false.
the light modulating (4) Statement I is false but Statement II is true.
properties of liquid [1 MARCH 2023 II]
crystals. 721. ICT is used to control and monitor everyday
B. LCD screen 2. Flat panel display that uses activities. Which of the following activities are
an array of light-emitting most likely to use sensors?
diodes as pixels. A. Designing a master slide for presentation
C. LED screen 3. Droplets of ink are B. Activating a burglar alarm
propelled onto paper. C. Opening automatic doors
D. Laser Printer 4. Electrically charged D. Creating a spreadsheet
powdered ink is Choose the correct answer from the options given
transferred onto paper. below:
Choose the correct answer from the options given (1) A and B only (2) B and C only
below: (3) C and D only (4) A and D only
(1) A-4, B-1, C-2, D-3 1 MARCH 2023 II]
(2) A-4, B-2, C-1, D-3 722. Which of the following statements about
(3) A-2, B-1, C-3, D-4 computer networks are TRUE?
(4) A-3, B-1, C-2, D-4 A. An intranet is a public network.
[1 MARCH 2023 II] B. The internet is a group of interconnected
718. Which of the following best describes Web 3.0? networks.
(1) User generated online business C. An extranet is an internal network that can be
(2) Based on the "intelligent" web where accessed externally by authorized users.
applications use natural language processing Choose the correct answer from the options given
(3) Collaboration and social media below:
(4) Refers to static text-based information websites. (1) A and B only (2) A and C only
[1 MARCH 2023 II] (3) B and C only (4) A, B and C
719. In the context of Information and Communication [1 MARCH 2023 I]
Technologies (ICT), which of the following 723. In ICT, which one of the following pairs of
statements is/are true? acronym and its expansion is incompatible?
A. In an email system, Bcc: allows the sender of a (1) ISP-Internet Service Provider
message to conceal the recipient entered in the (2) URL-Uniform Resource Locator
Bcc: field from the other recipients. (3) Blog-weB LOGIC
B. Phishing is a malicious program installed on a (4) VPN-Virtual Private Network
system that stays concealed avoiding detection. [1 MARCH 2023 I]
C. Spamming is an attempt to acquire sensitive 724. A photograph occupies 10 MB of storage. A
information for malicious reasons, by memory stick with 4GB capacity can store
masquerading as a trustworthy entity. approximately ________ such photographs.
Choose the correct answer from the options given (1) 300 (2) 400
below: (3) 500 (4) 450
(1) B and C only (2) B only
(3) A only (4) A and C only [1 MARCH 2023 I]
725. Given below are two statements:
[1 MARCH 2023 II] Statement I: You can read from and write to RAM,
720. Given below are two statements: whereas you can read from ROM but you can't write
Statement I: Mainframe computers have smaller to ROM.
internal memories than desktop computers. Statement II: CD-RW stands for Compact Disc-
Statement II: Spreadsheets and word processors ReWritable and can be written to and modified
are examples of application software. many times, whereas CD-R stands for compact

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 73

Disc- Recordable and R here indicates that the disc (4) Statement I is false but Statement II is true.
is recordable once only. [1 MARCH 2023 II]
In light of the above statements, choose the correct 729. Given below are two statements:
answer from the options given below: Statement I: An Operating System controls
(1) Both Statement I and Statement II are true. peripherals and provides protection against viruses.
(2) Both Statement I and Statement II are false. Statement II: In word processing and desktop
(3) Statement I is true but Statement II is false. publishing, the terms portrait and landscape refer to
(4) Statement I is false but Statement II is true. Page Layout.
[1 MARCH 2023 I] In the light of the above statements, choose the
726. Using the Ribbon in MS-WORD software, the correct answer from the options given below:
Word count command/ feature displays the (1) Both Statement I and Statement II are true.
number of words as well as the number of (2) Both Statement I and Statement II are false.
____________ in the current document. (3) Statement I is true but Statement II is false.
A. Lines (4) Statement I is false but Statement II is true.
B. Characters [1 MARCH 2023 II]
C. Paragraph 730. In computers, which of the following file formats
Choose the correct answer from the options given contains exclusively the text file formats?
below: A. PDF
(1) A and B only B. CSV
(2) A and C only C. GIF
(3) B and C only D. RTF
(4) A, B and C E. TXT
[1 MARCH 2023 I] Choose the correct answer from the options given
727. Which of the following statements are correct? below:
Most web browsers: (1) A, B, and E Only (2) B, D and E
A. have a HOME page. Only
B. have the ability to store user's favourite (3) B, C and D Only (4) A and C
websites/pages. Only
C. keep a history of the websites visited by the [1 MARCH 2023 II]
731. In the context of MS-PowerPoint, a presentation
users.
software, which of the following statements are
D. give the ability to go backward and forward to
websites opened. true?
E. provide the user with access to Internet A. Objects on the slide that hold text, pictures and
Choose the correct answer from the options given more are called Placeholders.
below: B. MS-PowerPoint automatically opens with
(1) D and E only Windows Operating System
(2) A, C and D only C. A view that displays the slides of a presentation
(3) A, C and E only as miniature representations of the slides is
(4) A, B, C and D called Slide Sorter view.
Choose the correct answer from the options given
below:
(1) A and B Only (2) A and C Only
[2 MARCH 2023 II] (3) B and C Only (4) A, B and C
728. Given below are two statements: [1 MARCH 2023 II]
Statement I: ASCII, a character -encoding scheme, 732. Given below are two statements:
is an acronym for American Standard Code for Statement I: Fibre-optic cable makes use of light
Intelligent Information. pulses to transmit data and is most appropriate to
Statement II: ( 37.25 )10 =( 100101.01 )2 connect computers in a small building.
In the light of the above statements, choose the Statement II: URL is the text used by web
correct answer from the options given below: browsers to locate a web address on the Internet.
(1) Both Statement I and Statement II are true. In the light of the above statements, choose the
(2) Both Statement I and Statement II are false. correct answer from the options given below:
(3) Statement I is true but Statement II is false. (1) Both Statement I and Statement II are true.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 74

(2) Both Statement I and Statement II are false. (4) Statement I is false but Statement II is true.
(3) Statement I is true but Statement II is false. [3 MARCH 2023 I]
(4) Statement I is false but Statement II is true. 736. Which one of the following acronyms matches
[3 MARCH 2023 I] incorrectly with its full form?
733. A digital camera contains a microprocessor. (1) USB Universal Serial Bus
The camera's specification includes: (2) RFID - Radio Frequency Infrared Device
- 20 megapixel resolution (3) CRT - Cathode Ray Tube
- 32 gigabyte memory card (4) JPEG - Joint Photographic Expert Group
- autofocus facility [3 MARCH 2023 I]
If a compressed image file requires an average of 1 737. Identify the correct ascending order of the
byte per pixel, then what is the maximum number of following list of stages A-E when text, written in
photos that can be stored on the memory card? (1 magnetisable ink. is passed over a Magnetic Ink
Kilo = 1024) Character Reader (MICR).
(1) 1638 A. As each character passes over the head, it
(2) 819 produces a unique waveform.
(3) 409 B. Characters are then passed over the MICR read
(4) 732 head.
[3 MARCH 2023 I] C. Ink on the paper is first magnetised.
734. Which of the following statements about D. MICR text is passed over an MICR reader.
Bluetooth connectively are TRUE? E. The waveform is recognised by the computer
A. Bluetooth will only work over long distances. system.
B. No wires are needed when exchanging files via Choose the correct answer from the options given
Bluetooth. below:
C. Bluetooth allows you to speak hands-free on a (1) C, D, B, A, E
Mobile phone. (2) D, C, B, A, E
D. Music can be played wirelessly from your (3) B, D, C, A, E
Mobile phone to a speaker using Bluetooth. (4) A, C, B, E, D
E. Transfer speeds when sending files are faster [3 MARCH 2023 II]
than using Wi-Fi. 738. Which of the following applications (A-C) are
Choose the correct answer from the options given built on top of open-source digital platforms?
below: A. Moodle
(1) A and E Only B. Aarogya
(2) A, B and C Only C. Skype
(3) C, D, E Only Choose the correct answer from the options given
(4) B, C and D Only below:
(1) A and B only (2) A and C only
(3) B and C only (4) A, B and C

[3 MARCH 2023 II]


739. Match List I with List II.
[3 MARCH 2023 I] List I (WWW List II (Description)
735. Given below are two statements based on generic Evolution)
file type that can be opened in an appropriate A. Web 1.0 1. Democratization of the
software on most platforms: capacity of action
Statement I: A file saved in portable document and knowledge
format (.pdf) is a generic text file. B. Web 2.0 2. Emotional web
Statement II: Moving Pictures experts group layer C. Web 3.0 3. Democratization of
4 (.mp4) is an example of generic image file format. content production
In the light of the above statements, choose the D. Web 5.0 4. Democratization of
correct answer from the options given below: information access
(1) Both Statement I and Statement II are true. Choose the correct answer from the options given
(2) Both Statement I and Statement II are false. below:
(3) Statement I is true but Statement II is false.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 75

(1) A-4, B-3, C-1, D-2 (2) A-3, B-2, C-4, D-1 Choose the correct answer from the options given
(3) A-1, B-3, C-4, D-2 (4) A-4, B-2, C-1, D-3 below.
[3 MARCH 2023 II] (1) C, B, D, A, E (2) E, C, A, B, D
740. Given below are two statements: (3) D, C, A, B, E (4) B, C, A, E, D
Statement I: The National Mission on Education [4 MARCH 2023 I]
Through Information and Communication 745. Given below are two statements:
Technology (NMEICT) has been envisaged as a Statement I: Al is an artificially created
centrally sponsored scheme. environment used to give a feeling of 'being there',
Statement II: The NMEICT has produced whereas virtual reality learns from changing
wondrous benefits for young minds studying in circumstance.
primary, secondary and higher education Statement II: Unlike dot matrix and inkjet printers,
institutions. laser printers don't use ink when producing
In light of the above statements, choose the correct documents.
answer from the options given below: In the light of the above statements, choose the
(1) Both Statement I and Statement II are true correct answer from the options given below:
(2) Both Statement I and Statement II are false (1) Both Statement I and Statement II are true.
(3) Statement I is true but Statement II is false (2) Both Statement I and Statement II are false.
(4) Statement I is false but Statement II is true (3) Statement I is true but Statement II is false.
[3 MARCH 2023 II] (4) Statement I is false but Statement II is true.
741. Digital signature service that has been launched [4 MARCH 2023 I]
on Aadhar platform is called 746. Which of the following are the main benefits of
(1) Digi Sign Desk (2) e-Sign Desk networking computers and devices rather than
(3) Online Sign Desk (4) Google Signin using a number of stand-alone computers?
A. Devices, such as printers, can be shared, thus
742. The IT (Amendment) Act, 2008 aimed at reducing costs.
strengthening the law to combat cybercrime, B. Licenses to run software on networks are often
came into force in India on far cheaper than buying licenses for an
(1) 27-October-2009 (2) 27-October-2008 equivalent number of stand-alone computers.
(3) 17-October-2009 (4) 17-October-2008 C. Users cannot share files and data.
[4 MARCH 2023 I] D. Access to reliable data that comes from a central
743. Which one of the following acronyms matches source, such as a file server.
incorrectly with their full form? Choose the correct answer from the options given
(1) ATM-Automatic Teller Machine below:
(2) SIM-Subscriber Identity Module (1) A and C only (2) B, C and D only
(3) GPS-Global Positioning Sensor (3) A, B, C and D (4) A, B and D only
(4) GIS- Geographic Information System
[4 MARCH 2023 I]
[4 MARCH 2023 I] 747. Match List I with List II.
744. Identify the correct order of the following terms LIST I (Computer LIST II (Description)
A-E to complete the paragraph given below that Term)
explains how data is sent securely over the A. Disk 1. Utility that prepares a disk
Internet using the Transport Layer Security Defragmento to allow data files to be
(TLS) protocol: r stored and retrieved.
'The browser requests the _______ to identify itself B. Disk formatter 2. Storage media with no
by providing its _________. This is sent and a moving parts
check is performed to see if it is _____________. If C. Device driver 3. Utility that reorganises the
it is, the _____ sends a _____ back to the web sectors on a hard disk so
server and data transmission begins. that files can be stored in
A. authentic contiguous data blocks.
B. browser D. Solid state 4. Software that communicates
C. certificate drive with OS and translates
D. signal data into a format
E. web server

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 76

understood by the device 752. Which one of the following is the context in
Choose the correct answer from the options given which the term "qubit" is mentioned?
below: (1) Cloud Services
(1) A-2, B-1, C-3, D-4 (2) A-3, B-1, C-4, D-2 (2) Quantum Computing
(3) A-1, B-3, C-2, D-4 (4) A-4, B-2, C-1, D-3 (3) Visible Light Communication Technologies
[4 MARCH 2023 II] (4) Wireless Communication Technologies
748. Full support for Internet Explorer (IE) version 11 [5 MARCH 2023 I]
was discontinued on _________, with the 753. If one MegaByte is equal to 220 Bytes of
alternative computer data storage, then 2048 TeraBytes is
Being Microsoft Edge's IE compatibility SHARK equal to ________ bits of data storage.
mode for legacy sites that require it. (1) 251 (2) 244
(1) 15-June-2022 (2) 15-June-2021 (3) 254 (4) 257
(3) 25 June 2022 (4) 25-June-2021
[5 MARCH 2023 I]
[4 MARCH 2023 II]
754. Which of the following best describes Web 2.0?
749. According to the IT Act, 2000, penalty for breach
(1) Static websites
of confidentiality and privacy is imprisonment
(2) Intelligent websites
for a term which may extend to _________ year (s)
(3) Social media and user-generated web content
or with a fine which may extend to ______ lakh(s)
(4) Hypertext mark-up language
rupees or both.
[5 MARCH 2023 I]
(1) Two; one (2) One; two
755. Given below two statements:
(3) Two; two (4) One; four
Statement -I: Video cards and sound cards are
[4 MARCH 2023 II]
typical examples of computer software.
750. Given below are two statements:
Statement -II: Examples of software utilities
Statement I: A modem converts analog signals to
include anti-virus software, anti-spyware software
digital signals and vice versa.
and screen savers.
Statement II: In the context of computer
In the light of the above statements, choose the
SHARING security, crackers are also known as
correct answer from the options given below:
black hat hackers.
(1) Both Statement I and Statement II are true.
In light of the above statements, choose the correct
(2) Both Statement I and Statement II are false.
answer from the options given below.
(3) Statement I is true but Statement II is false.
(1) Both Statement I and Statement II are true.
(4) Statement I is false but Statement II is true.
(2) Both Statement I and Statement II are false.
(3) Statement I is true but Statement II is false.
[5 MARCH 2023 I]
(4) Statement I is false but Statement II is true.
756. Which of the following statements are true?
A. Hypertext links in the WWW are designed to be
[4 MARCH 2023 II]
unidirectional, which means that the destination of a
751. With reference to SWAYAM, which of the
link may be moved or deleted without the source
statements A-C given below are correct?
being notified, resulting in broken links.
A. The current SWAYAM platform is developed by
B. The Google search engine algorithm is secret, so the
Ministry of Education and NPTEL. IIT Madras,
general public does not know how the results of a
With the help Google Inc. and Persistent
search are being ranked when presented to a user.
Systems Ltd.
C. Web search engine collect personal data and use to
B. It facilitates hosting of all the courses, taught in
target users with customized advertising.
the classrooms from class 9th till Post
Choose the correct answer from the options given
Graduation.
below:
C. Courses and Certificates provided through
(1) A and B only (2) A and C only
SWAYAM are available free of cost to the
(3) B and C only (4) A, B and C
learners.
[5 MARCH 2023 I]
Choose the correct answer from the options given
757. Match List I with List II:
below.
List I List II (Description)
(1) A and B only (2) A and C only
(Computer
(3) B and C only (4) A, B and C
term)
[4 MARCH 2023 II]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 77

A. JPEG 1. Standard adopted by the (4) D, A, C, B


electronic music industry [5 MARCH 2023 II]
for controlling devices 760. Given below are two statements:
such as synthesizers and Statement I: ( 240 )10= (11110000 )2
sound cards.
Statement II: ( 101011111101010 )2= (57 EA )16
B. MIDI 2. This format allows the
In the light of the above statements, choose the
storage of multimedia files
most appropriate answer from the options given
rather than just sound
below:
C. MP3 format 3. File compression format
(1) Both Statement I and Statement II are correct
designed to make photo
(2) Both Statement I and Statement II are incorrect.
files smaller in size for
(3) Statement I is correct but Statement II is
storage and for
incorrect.
transmission.
(4) Statement I is incorrect but Statement Il is
D. MP4 format 4. File Compression system
correct.
for music which does not
[5 MARCH 2023 II]
noticeably affect the
761. Which of the following file types are containers
quality of the sounds.
which can hold number of files with different
Choose the correct answer from the options given
types?
below:
A. Moving Pictures Expert Group Layer 4 (.mp4)
(1) A-3, B-1, C-4, D-2
B. .mp3
(2) A-3, B-4, C-1, D-2
C. .rar
(3) A-2, B-1, C-4, D-3
D. .zip
(4) A-4, B-1, C-3, D-2
Choose the correct answer from the options given
[5 MARCH 2023 II]
below:
758. In ICT, which one of the following pair of
(1) C and D only
acronyms and its expansion incompatible?
(2) B, C and D only
(1) .gif - Graphics Interchange Format
(3) A, C and D only
(2) .css - Cascading Style Sheet
(4) A, B, C and D
(3) .rar - Readable Archive
(4) .jpeg - Joint Photographic Expert Group
[5 MARCH 2023 II]
[5 MARCH 2023 II]
762. Match list I with list II.
759. Identify the correct order of the following terms
List I (Automatic List II (Description)
A-D complete the sentences given below:
Data Captured
The action of sending emails to fraudulently obtain
Method)
another person's bank details is called ________.
A. Biometrics 1. Reading data directly from
The action of illegally installed malicious code
hard copy and converting
which redirects a person to a fraudulent website
into computer-readable
with the purpose of obtaining that person's bank
form.
details is called ___________. Unsolicited bank
B. OCR 2. Use of fingerprints scans,
emails are called ___________. The action of
retina scans, face
sending text messages to fraudulently obtain
identification etc. as a way
another person's bank details is called
of identifying a person
___________.
uniquely.
A. Pharming
C. OMR 3. Use of minute electronic
B. Smishing
devices (containing
C. Phishing
microchip and antenna)
D. Spam
that can be read from
Choose the correct answer from the options given
distances up to five meters.
below:
(1) C, A, D, B D. RFID 4. System that read pencil or
(2) A, C, B, D pen marks on a piece of
(3) B, A, D, C paper in pre-determined

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 78

positions. [6 MARCH 2023 I]


Choose the correct answer from the options given 767. Which of the following are features that allow
below: you to manage the window desktop
(1) A-2, B-1, C-3, D-4 environment?
(2) A-1, B-2, C-4, D-3 A. Creating shortcuts
(3) A-3, B-4, C-1, D-2 B. Renaming folders
(4) A-4, B-1, C-2, D-3 C. Videoconferencing
[6 MARCH 2023 I] D. Creating auto shapes
763. What exactly is cloud computing? E. Adjusting icon size
(1) A way to organize desktop computers. Choose the most appropriate answer from the
(2) Software that takes up little space on a hard options given below:
drive. (1) C and D only (2) D and E only
(3) Computing resources that can be accessed on (3) A, B and E only (4) A and B only
demand, like electricity from a utility. [6 MARCH 2023 II]
(4) The World Wide Web. 768. The website hosts videos that users can stream.
[6 MARCH 2023 I] The company uploads new videos to the website.
764. Given below are two Statements: The Videos are compressed before they are
Statement I: In an email, Bcc: allow recipients to uploaded to the website.
be visible to all other recipients of the message. Which statement is a benefit of compressing the
Statement II: VoIP is the use of Internet to make videos?
phone cells. (1) Data is encrypted.
In the light of the above statement, choose the (2) Duration of each video will be reduced.
correct answer from the options given below: (3) Less storage space on the web server is required.
(1) Both Statement I and Statement II are true. (4) More bandwidth is required when viewing the
(2) Both Statement I and Statement II are false. videos.
(3) Statement I is true but Statement II are false. [6 MARCH 2023 II]
(4) Statement I is false but Statement II are true. 769. Identify the correct chronological order of the
[6 MARCH 2023 I] following Computers based their released date,
765. Using broadband to connect to the Internet has from earliest to most recent.
many benefits. Which of the following statements A. IBM 701
are TRUE in this context? B. Altair 8800
A. This connection does not allow you to use the C. Apple Macintosh
land phone at the same time as being connected D. IBM 1620
to the internet. E. Apple iMac
B. This connection allows a wireless connection. Choose the correct answer from the options given
C. You are always connected to the internet. below:
Choose the most appropriate answer from the
(1) C, E, B, A, D (2) B, A, D, C, E
options given below:
(3) C, B, D, A, E (4) A, D, B, C, E
(1) A and B only (2) A and C only
[6 MARCH 2023 II]
(3) B and C only (4) A, B and C 770. Given below are two statements:
[6 MARCH 2023 I] Statement I: An Intranet is a private network
766. Which of the following statements about
accessible only to an organisation's staff.
networked computers are TRUE?
Statement II: The Internet is one super Computer.
A. Network users communicate by email and instant
In light of the above statements, choose the most
messenger.
appropriate answer from the options given below:
B. Files can easily be shared between users.
(1) Both Statement I and Statement II are correct.
C. Viruses cannot be spread to other computer
(2) Both Statement I and Statement II are incorrect.
throughout a computer network.
(3) Statement I is correct but Statement II is
D. It is possible for many users to access and share
incorrect.
one printer on a network.
(4) Statement I is incorrect but Statement II is
Choose the most appropriate answer from the
correct.
options given below:
[6 MARCH 2023 II]
(1) A, B and D only (2) A and C only
(3) B, C and D only (4) A and B only

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 79

771. Anita is buying a new computer that has an LED 775. The terms 'Maze, Petya and Wannacry'
display. Which of the following statements about mentioned in the news over the last few years
LED displays are True? are related to
A. It is a flat panel display. (1) Mobile Apps
B. It creates images using red, green and blue (2) Crypto-Currency
diodes. (3) Cyber Attacks
C. It is not very energy efficient and gives off heat. (4) Virtual Reality
D. It can be used in mobile devices such as smart [11 MARCH 2023 I]
phones and tablets. 776. National Coordinators of Swayam have been
E. It is a front-lit display. appointed in order to ensure that best quality
Choose the correct answer from the options given contents are developed and disseminated. In this
below: context, which two of the following are corrected
(1) A, B and D only (2) C and E only matched?
(3) B, D and E only (4) D and E only A. AICTE Engineering Education
[11 MARCH 2023 I] B. CEC-Under Graduate Education
772. Which of the following applications A-C are built
C. NCERT Teacher Training Programmes
on top of open-source digital platforms?
D. UGC - Non-technical Post Graduate Education
A. PHP
Choose the correct answer from the options given
B. WinRAR
below:
C. Digilocker
(1) A and B only
Choose the correct answer from the options given
(2) B and C only
below:
(3) A and D only
(1) A and B only (2) A and C only
(4) B and D only
(3) B and C only (4) A, B and C
[11 MARCH 2023 I]
773. Given below are two statements with reference
[11 MARCH 2023 II]
to Web 3.0:
777. The hardware address of a computer network
Statement I: Web 3.0 is an interactive web and its
device consists of 48 bits. Which of the following
greatest virtue is the democratization of content
is a valid address in hexadecimal number?
production.
(1) 00E0071944A0
Statement II: Apple's Siri, which can summarise
(2) 0A23B5
large amount of information into knowledge and
(3) IE07FG124372
useful actions for people, is an example of Web 3.0
(4) 398A7E9412110408
application.
[11 MARCH 2023 II]
In light of the above statements, choose the correct
778. The computer uses a bootstrap. Which of the
answer from the options given below:
following show the part of a computer of which
(1) Both Statement I and Statement II are true.
the bootstrap is an example?
(2) Both Statement I and Statement II are false.
(1) application software
(3) Statement I is true but Statement II is false.
(2) firmware
(4) Statement I is false but Statement II is true.
(3) hard disk drive
[11 MARCH 2023 I]
(4) IP address
774. Given below are two statements:
[11 MARCH 2023 II]
Statement I: Vivaldi is a web search engine.
779. Given below are two statement:
Statement II: Microsoft Bing is a web browser.
Statement I: one always uses CD-ROMs to save
In light of the above statements, choose the correct
data.
answer from the options given below:
Statement II: A computer has 2048 MB of RAM.
(1) Both Statement I and Statement II are true.
That means computer has 1.2 GB of RAM.
(2) Both Statement I and Statement II are false.
In the light of the above statement, choose the
(3) Statement I is true but Statement II is false.
correct answer from the options given below:
(4) Statement I is false but Statement II is true.
(1) Both statement I and statement II are correct
[11 MARCH 2023 I]
(2) Both statement I and statement II are incorrect
(3) Statement I is correct but statement II is
incorrect

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 80

(4) Statement I is incorrect but statement II is Choose the correct answer from the options given
correct below:
[11 MARCH 2023 II] (1) A-1, B-2, C-3, D-4 (2) A-4, B-2, C-3, D-1
780. Which file format are used to store music files? (3) A-2, B-4, C-1, D-3 (4) A-4, B-3, C-2, D-1
A. bmp [12 MARCH 2023 I]
B. wav 782. What is the difference between asynchronous
C. mp3 and synchronous communication?
D. htm (1) Asynchronous is real-time communication, while
E. wma synchronous is one-way technology.
Choose the correct answer from the options given (2) Asynchronous is communication that does not
below: occur at the same time, while synchronous
(1) A, B and D only communication occurs at the same time.
(2) A, D and E only (3) Asynchronous communication includes instant
(3) B, C and D only messaging, while synchronous communication
(4) B, C and E only includes email.
(4) Asynchronous communication is fast and instant
while synchronous communication is collected at
a single point in time.

[12 MARCH 2023 I]


783. Identify the correct order of the types of
secondary storage (A-C) listed below from fastest
[11 MARCH 2023 II] to slowest access time.
781. Match List 1 with List 2. A. Optical
LIST 1 List 2 (Description) B. Solid state
(Internet Term) C. Magnetic
A. Spyware 1. A. Malicious software Choose the correct answer from the options given
installed on a user's hard below:
drive or a web server; the
(1) B, A, C (2) A, C, B
software re-direct the user
to a fake website without (3) C, A, B (4) B, C, A
their consent or knowledge. [12 MARCH 2023 I]
B. Phishing 2. Website designed to promote 784. Given below are two statements:
the building of online Statement I: Encrypting data prevents it from
communities who share the being hacked.
same interest usually free of Statement II: Backing up data removes the risk of
charge, user can add friend,
post messages to each other the data being infected by viruses.
and update personal In the light of the above statement, choose the
profiles. correct answer from the options given below:
C. Social 3. Legitimate-looking email (1) Both statement I and statement II are true
networking sent to a user in the hope of (2) Both statement I and statement II are false.
sites gathering personal (3) Statement I is true but statement II is false
information, as soon as the (4) Statement I is false but statement II is true
recipient clicks on the link
[12 MARCH 2023 I]
in email (or email
attachment) they are sent to 785. Which of the following statements is/are true
a fake website. regarding RAM?
D. Pharming 4. Software that secretly A. RAM is non-volatile
gathers information by B. RAM has a slow access time relative to other
monitoring key presses on a storage devices.
user's keyboard, this
C. RAM can be static or dynamic (SRAM/DRAM)
information is relayed back
to person who sent the D. RAM holds the BIOS.
software originally. Choose the correct answer from the options given
below:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 81

(1) D only (2) A and b only (1) A and B only


(3) C only (4) C and D only (2) B and C only
[12 MARCH 2023 II] (3) C and D only
786. A computer is used to store photographs and (4) A and D only
videos. The average size of each photograph is 8 [13 MARCH 2023 I]
MB and the average size of each video is 400 MB. 791. Given below are two Statements:
How much memory (in gigabytes) is needed to Statement I: Wi-Fi, a wireless network protocol, is
store 800 photographs and 80 videos? (1 KB = an acronym for Wireless Firewire
1024 Bytes) Statement II: ( 21.125 )10= (10101.001 )2
(1) 3.75 (2) 4.75 In the light of the above statement, choose the
(3) 34.25 (4) 37.50 correct answer from the options given below:
[12 MARCH 2023 II] (1) Both Statement I and Statement II are true.
787. In about 1945, who among the following (2) Both Statement I and Statement II are false.
developed the idea of a stored program (3) Statement I is true but Statement II are false.
computer? (4) Statement I is false but Statement II are true.
(1) John Von Neumann
(2) Tim Berners lee [13 MARCH 2023 I]
(3) Blaise Pascal 792. In the context of MS-WORD, word processing
(4) N.R. Narayanamurthy software, which of the following statements are
[12 MARCH 2023 II] true?
788. Which of the following communication systems A. Different header and footer for the last page of a
provides a means of sharing and collaboration by section can be set.
allowing a group of people to enter modify and B. The ability to combine name and addresses with
contribute one or more pages of related text? a standard document and to send the same letter
(1) Wiki to different persons is called Mail Merge.
(2) Email C. Gutter Margins is the margin that is added to the
(3) Podcast binding side of a page when printing.
(4) RSS feed Choose the correct answer from the options given
[12 MARCH 2023 II] below:
789. Given below are two statements: (1) A and B only (2) A and C only
Statement I: EEPROM stands for Electronically (3) B and C only (4) A, B and C
Extendable Programmable Read Only Memory. [13 MARCH 2023 I]
Statement II: RAM is much faster to write or to 793. In the context of ICT, which of the following
read from than other types of memory; but its main statement is/are true?
drawback is its non-volatility. A. Search engines are also known as browsers.
In the light of the above statements, choose the B. Apple's web browser is called as 'Chrome'.
correct answer from the options given below: C. Micro-blogging is a practice of posting small
(1) Both Statement I and Statement II are true. pieces of content on the internet systems such as
(2) Both Statement I and Statement II are false. Twitter.
(3) Statement I is true but Statement II is false. Choose the correct answer from the options given
(4) Statement I is false but Statement II is true. below:
[12 MARCH 2023 II] (1) A only (2) B and C only
790. Which of the following statements about email (3) A and C only (4) C only
address spoofing are TRUE? [13 MARCH 2023 I]
A. E-mail address spoofing is copying an email to 794. Which of following digital communication
other staff technologies use asynchronous communication?
B. E-mail address spoofing is used for hacking. A. Forums
C. E-mail address spoofing is the forgery of an B. Video Conferencing
email header or sender information. C. Email
D. E-mail address spoofing is sending a joke email D. Instant Messaging
to other staff. Choose the correct answer from the options given
Choose the correct answer from the options given below:
below: (1) A and B only (2) A and D only

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 82

(3) A and C only (4) C and D only [13 MARCH 2023 II]
[13 MARCH 2023 II] 799. Given below are two Statements:
795. Given below are two Statements: Statement I: Sending an email will cause a
Statement I: ( 43.25 )10=( 101011.01 )2 problem if the recipient is in another time zone
Statement II: ( 1110.111 )2=( 14.625 )10 where the time difference is 12 hours.
Statement II: In an Email system, Bcc: stands for
In the light of the above statement, choose the
Black Carbon Copy.
correct answer from the options given below:
In the light of the above statement, choose the
(1) Both Statement I and Statement II are true.
correct answer from the options given below:
(2) Both Statement I and Statement II are false.
(1) Both Statement I and Statement II are true.
(3) Statement I is true but Statement II are false.
(2) Both Statement I and Statement II are false.
(4) Statement I is false but Statement II are true.
(3) Statement I is true but Statement II are false.
[13 MARCH 2023 II]
(4) Statement I is false but Statement II are true.
796. A key logger is an example of:
(1) Trojan (2) Spyware
[14 MARCH 2023 I]
(3) Worm (4) Logic Bomb
[13 MARCH 2023 II] 800. Given below are two statements::
Statement I: Trojan Horse is a malware program
797. Free online encyclopedia such as Wikipedia
designed to restrict the access to the victim's data
contains a huge number of articles. Which of the
until victim pays for it.
following statements about the online
Statement II: Google's G-Suite and GitHub are
encyclopedia are correct?
examples of SaaS Cloud Computing.
A. People can search the relevant articles for a topic
In the light of the above statements, choose the
quickly.
correct answer from the options given below:
B. The articles have no copyright.
(1) Both Statement I and Statement II are true.
C. These encyclopedias are updated frequently.
(2) Both Statement I and Statement II are false.
Choose the most appropriate answer from the
(3) Statement I is true but Statement II is false.
options given below:
(4) Statement I is false but Statement II is true.
(1) A and B only (2) A and C only
[14 MARCH 2023 I]
(3) B and C only (4) A, B and C
801. Which of the following statements about the URL
[13 MARCH 2023 II]
given below are correct?
798. Match List I with List II.
http://www.example.mygov.in/index.html
List I List II (Description)
A. http is the name of the protocol and stands for
(Storage
HyperText Transaction Protocol
Device or
B. in is a top-level domain name and represents a
Media)
website hosted in India
A.RAM 1. Optical storage media that uses a
C. mygov.is a second-level domain name in the
single spiral track and uses dual
name of the website.
layer technology, allowing high
Choose the most appropriate answer from the
data storage capacity.
options given below:
B.ROM 2. Optical storage media that uses
(1) A and B only
concentric Tracks allowing
(2) A and C only
writing and reading to take place
(3) B and C only
at the same time.
(4) A, B and C
C.DVD 3. Non-volatile semiconductor
[14 MARCH 2023 I]
memory; the contents cannot be
802. 1 yotta byte
changed.
(1) 1024 Terabytes
D.DVD- 4. Volatile semiconductor memory;
(2) 1024 Exabytes
RAM stores data and instruction the
(3) 1024 Zettabytes
user is currently working on.
(4) 1024 Petabytes
Choose the most appropriate answer from the [14 MARCH 2023 I]
options given below:
803. Identify the correct sequence in chronological
(1) A-4, B-3, C-1, D-2 (2) A-1, B-2, C-3, D-4
order of the following four major enabling
(3) A-3, B-2, C-1, D-4 (4) A-2, B-4, C-3, D-1

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 83

technological developments that have paved the (3) (1, 0, 0, 1) (4) (1, 0, 1, 0)
way for e-commerce. [15 MARCH 2023 I]
A. Invention and mass production of PC. 808. Which is the smallest of these data storage
B. Release of Netscape's Navigator browser which capacities?
introduced SSL encryption. (1) 2 KB (2) 2049 Bytes
C. Development of the Internet by ARPA. (3) 0.5 MB (4) 3 GB
D. Creation and release of www.options [15 MARCH 2023 I]
Choose the correct answer from the options given 809. Which of the following communication systems
below: would best enable a meeting to take place
(1) B. A, D, C (2) C, A, D, B between people working in different locations?
(3) A, C, D, B (4) D, A, C, B (1) VoIP (2) Email
(3) Voicemail (4) Text messaging
[14 MARCH 2023 II] [15 MARCH 2023 I]
804. Given below are two statements: 810. Given below are two statements:
Statement I: Chatbot is an example of Digital Statement I: Wireless (Wi-Fi) networks are less
Intelligence. secure than hard-wired systems.
Statement II: Amazon's 'Alexa' and Apple's 'Siri' Statement II: A series of digital media files that are
are examples of Artificial Intelligence. released at regular intervals and downloaded to the
In light of the above statements, choose the correct user's computer are known as Podcasts. These
answer from the options given below: media files are stored and maintained centrally.
(1) Both Statement I and Statement II are true. In light of the above statements, choose the correct
(2) Both Statement I and Statement II are false. answer from the options given below:
(3) Statement I is true but Statement II is false. (1) Both Statement I and Statement II are true.
(4) Statement I is false but Statement II is true. (2) Both Statement I and Statement II are false.
[14 MARCH 2023 II] (3) Statement I is true but Statement II is false.
805. Which of the following are the advantages of (4) Statement I is false but Statement II is true.
Dynamic RAMS (DRAM) over Static RAMS [15 MARCH 2023 I]
(SRAM)? 811. Which of the following are computer input
A. They are much less expensive to manufacture devices that can best support students with a
than SRAM. visual impairment?
B. They consume less power than SRAM. A. Microphone B. Foot mouse
C. They have a higher storage capacity than SRAM. C. Braille keyboard D. Joystick
D. They are much faster than SRAM when it comes E. Speaker
to data access. Choose the correct answer from the options given
Choose the correct answer from the options given below:
below: (1) A and B only (2) B and D only
(1) A, B and C only (2) A and C only (3) C, D and E only (4) A and C only
(3) B and C only (4) A and B only [15 MARCH 2023 I]
[14 MARCH 2023 II] 812. Match List I with List II.
806. In Computer networking, which type of wired List I List II (Description)
transmission medium has a core of refined glass? (Internet
(1) Optic fibre term)
(2) Coaxial cable A. Blogs 1. Include software that allows users
to create and edit web pages using
(3) Shielded twisted pair
a browser. Anyone is able to
(4) Unshielded twisted pair create or edit this information
[14 MARCH 2023 II] B. Social 2. A type of bookmarking where a
807. Two binary numbers are added as given below: Networkin user "marks" a webpage or photo
0b01 g sites using text to describe its contents.
c 11 a Anyone can view the webpages or
photos corresponding to these
10d1 "markers".
Then ( a , b , c , d )=¿ ____________. C. Tagging 3. Allow interaction of people online.
(1) (0, 0, 1, 1) (2) (0, 1, 0, 1) Users can add friends, post

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 84

messages and update their (3) A-I, B-III, C-II, D-IV (4) A-II. B-III, C-IV,
personal profiles to notify friends D-I
about their status. [JUNE 2023]
D. Wikis 4. Personal internet journals where a 815. You and your friend decided to go to Goa after you
writer enters text about a
finish your finals. however your demanding parents
particular topic or person; anyone
can comment on topic. set a couple of conditions to join your friends (see
Choose the correct answer from the options given MS-EXCEL spreadsheet below)
below:
(1) A-3, B-2, C-1, D-4 (2) A-2, B-1, C-3, D-4
(3) A-1, B-2, C-3, D-4 (4) A-4, B-3, C-2, D-1 A B C D
[JUNE 2023] 1. Category Minimal Actual Allowed
of results results (yes/No)?
813. Given below are two statements:
condition needed
Statement I: Google Meet is a pure Cloud-based
2. Hours a 2 3
Video conferencing solution. spent on
Statement II: Google Meet provides cloud storage homework
as well as the ability to open and modify documents weekly
online. 3. Midterm 70 68
In the light of the above statements, choose the score
correct answer from the options given below. 4. Final 75 77
exam
(1) Both Statement I and Statement II are true
score
(2) Both Statement I and Statement II are false Imagine your parents ask you to either meet the
(3) Statement I is true but Statement II is false final exam score condition or both if the two
(4) Statement I is false but Statement II is true remaining (homework and midterm) conditions.
[JUNE 2023] Which of the following formulas A-C can be used in
814. Match List I with List II cell D2 to answer the question: will you be able to
Computer term Defination join your friends with the results given?
A. Router I. The rules that A. = IF (C4>=B4, "Yes", IF (AND (C2=B2,
govern the division C3>=B3), "Yes", "No"))
of a file into packets B. = IF (AND (C2>= B2, C3>=B3), "Yes", IF
and subsequent (C4>=B4, "Yes", "No"))
reassembly of the C. = IF (OR (AND (C2>=B2, C3>-B3), C4>=B4),
file from those "Yes", "No")
packets Choose the correct answer from the options given
B. Firewall II. An organization below:
assigned (1) A and B only (2) A and C only
responsibility for (3) B and C only (4) none
reducing problem [JUNE 2023]
and incident related 816. Given below are two statements:
to computer security Statement I: Solid State Drives (SSDs) are
C. CERT-In III A device that considerably faster then Hard Disk Drives (HDDs)
provides perimeter when it comes to data access.
security by filtering Statement II: RAM is much faster to write to or
packets . read from in comparison to secondary memory such
D. Transmission IV A Device that uses as hard disk, but its main drawback is its volatility.
control the internet protocol In the light of the above statements, choose the
protocol (IP) to send packets correct answer from the options given below.
across network (1) Both Statement I and Statement II are true
Choose the correct answer from the options given (2) Both Statement I and Statement II are false
below: (3) Statement I is true but Statement II is false
(1) A-IV, B-II, C-III, D-I (2) A-IV, B-III, C-II, (4) Statement I is false but Statement II is true
D-I [JUNE 2023]
817. What is the name of the computing term described
below?

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 85

Software that gives the user the chance to try it out In the light of the above statements, choose the
free of charge before actually buying it. The correct answer from the options given below
software is subject to the usual copyright laws. As a (1) Both Statement I and Statement II are true.
rule, not all the features found in the full version are (2) Both Statement I and Statement II are false.
available at this stage. (3) Statement I is true but Statement II is false.
(1) Freeware (2) Shareware (4) Statement I is false but Statement II is true.
(3) Firmware (4) Malware [JUNE 2023]
[JUNE 2023] 822. Which of the following components are part of
818. Which of the following affects the downloading the central processing unit (CPU) of the Von
speed of a web page the least? Neumann model for a computer system?
(1) Number of hyperlink in the web page A. Arithmetic Logic Unit (ALU)
(2) Number and size of images in the web page B. Hard Disk Drive (HDD)
(3) Processing power of the server computer that C. Memory Address Register (MAR)
stores the web page D. Solid State Drive (SSD)
E. Control Unit (CU)
(4) The bandwidth of Internet connection which is
Choose the correct answer from the options given
used to access the web page
below:
[JUNE 2023]
(1) A & E only (2) B. C & D only
819. To calculate gross pay, hours are multiplied by the
(3) A & C only (4) A.C & E only
hourly rate. What MS.EXCEL formula would you
[JUNE 2023]
put in cell C4 and then you are able to copy that cell
823. A computer processor will operate fastest
down to the rest of the column C?
when the data that it wants is in the
A B C
(1) Cache Memory (2) Hard Disk
1. Hourly Rate (in Rs) 12.75 (3) Optical Disk (4) Main Memory
2. [JUNE 2023]
3. Name Hours Gross pay 824. What is the binary equivalent of the decimal
4. Arjun 26 number 85.125?
5. Rishi 37 (1) (100100(1)111) (2) (101010(1)101)
6. Ishan 36 (3) (110010(1)001) (4) (101010(1)001)
7. Ajay 28 [JUNE 2023]
8. Arun 30 825. Given below are two statements:
9. Nitin 30 Statement I: Shareware is a software that the users
(1) ¿ B1∗$ B $ 4 (2) ¿ $ B∗B 4 can try out for a trial period only, before being
(3) ¿ B1∗B 4 (4) ¿ $ B $ 1∗B 4 charged.
Statement II: Freeware is a software that the users
[JUNE 2023] can download free of charge, but they cannot
820. Given below are two statements: modify the source code in any way.
Statement I: Compared to word processors, simple In the light of the above statements, choose the
text-editors such as Notepad and Emacs have correct answer from the options given below
limited editing features. (1) Both Statement I and Statement II are true
Statement II: Files created with simple text editors (2) Both Statement I and Statement II are false
cannot be opened with word processors. (3) Statement I is true but Statement II is false
In the light of the above statements, choose the (4) Statement I is false but Statement II is true
correct answer from the options given below [JUNE 2023]
(1) Both Statement I and Statement II are true. 826. Danny is buying a new computer that has an LED
(2) Both Statement I and Statement II are false. display. Which of the following statements about
(3) Statement I is true but Statement II is false. LED displays are true?
(4) Statement I is false but Statement II is true. A. It is a flat panel display
B. It creates images using red, green and blue
[JUNE 2023] diodes.
821. Given below are two statements: C. It is not very energy efficient and gives off heat
Statement I: ( 167 )10= (10100111 )2 D. It can be used in mobile devices such as
smartphones and tablets
Statement II: ( 11010110 )2=( 214 )10 E. It is always a front-lit display

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 86

Choose the correct answer from the options given Choose the correct answer from the options given
below: below:
(1) A, B & D only (2) A. C & E only (1) B, E, C, A. D (2) B, E, D, C, A
(3) B. D & E only (4) A, B, D & E only (3) E, B, C, D, A (4) B, E, C, D, A
[JUNE 2023] [JUNE 2023]
827. Match List I with List II 831. Give below are two statements :
LIST I (Data LIST II (Description) Statement I: Shareware is limited - functioning
Transmission modes in freeware, and normally expires after a week or
month.
computer network)
Statement II: Shareware code can be modified and
A. Simplex I. Data can be sent and redistributed.
received at the In the light of the above statements, choose the
same time. most appropriate answer from the options given
B. Duplex II. Data can only be below:
(1) Both Statement I and Statement II are true
sent or received.
(2) Both Statement I and Statement II are false
C. Half- duplex III. Data can be sent
(3) Statement I is true but Statement II is false
and received but
(4) Statement I is false but Statement II is true
not at the same
[JUNE 2023]
time. 832. Which of the following should always be
Choose the correct answer from the options given regarded as security risks to computer systems?
below: A. Chat rooms B. Cookies
(1) A-III, B-I, C-II (2) A-I, B-III, C-II C.Pharming D. Virus
(3) A-II, B-III, C-I (4) A-II, B-I, C-III E. VOIP
[JUNE 2023] Choose the correct answer from the options given
828. Which of the following is a benefit that below:
businesses receive from using the Internet? (1) A and D Only (2) C and D Only
(1) Easier use of satellite radio (3) B and D Only (4) A, D and E Only
(2) Faster connection with suppliers [JUNE 2023]
833. Which of the following pair of acronym and its
(3) Improved methods of manufacturing
expansion is incorrectly matched?
(4) The ability to call employees on the road.
(1) GPS - Global Positioning System
[JUNE 2023]
(2) GSM - Global System for Management
829. Consider the equation L+ M =B . Where
(3) SIM - Subscriber Identity Module
L=( 100011 )2 and M =( 101000 )2 (4) Wimax - Worldwide Interoperability for
What is the value of M as represented in decimal Microwave Access
format? [JUNE 2023]
(1) 40 (2) 35 834. What does the following MS-EXCEL formula do ?
(3) 10 (4) 5 ¿ ∑ ¿ (Sheet1:Sheet4!D18)
[JUNE 2023] (1) It adds data from all D18 cells in sheet1, sheet2,
830. A web page offers a link for users to request
sheet3 and sheet4
another web page. The requested web page (2) It adds data from cell D18 of sheet1 and cell
contains HTML code and JavaScript code. In D18 of Sheet4
context, identify the correct sequence of the (3) It adds all data in the range A1:D18 in sheet1,
following statements A-E. sheet2, sheet3 and sheet4
A. The requested web page is displayed on the (4) It adds data from cell Al of Sheet1 and cell D18
client computer.
of Sheet4
B. The user clicks on the hyperlink and the web
[JUNE 2023]
page is requested from the web server.
835. Given below are two statements:
C. The requested web page content is transmitted to
the client computer.
Statement I : ( 11001000 )2=( C 8 )16 =( 200 )10
D. The client computer processes the JavaScript Statement II : ( 123 )10=( 01111011 )2=( 7 B )16
code using the web browser software. In the light of the above statements, choose the
E. The web server locates the requested web page. correct answer from the options given below:
(1) Both Statement I and Statement II are true.

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 87

(2) Both Statement I and Statement II are false. Choose the correct answer from the options given
(3) Statement I is true but Statement II is false. below:
(4) Statement I is false but Statement II is true. (1) E, D, B, C, A
[JUNE 2023] (2) D. E, B, C, A
836. Which of the following statements A-D apply to a (3) C, D, B, E, A
laser printer? (4) A, E, B, C, D
A. It uses a rotating drum to transfer the image to [JUNE 2023]
the paper. 840. Given below are two statements:
B. It uses powdered toner. Statement I: Internet is a commonly used service
C. It uses nozzles to spray droplets onto the paper. on the World Wide Web.
D. It uses a print head mechanism that moves side Statement II: HTTP is the protocol that web
to side. browsers and web servers use to communicate with
Choose the most appropriate answer from the each other over the Internet.
options given below: In the light of the above statements, choose the
(1) A and B only (2) C and D only correct answer from the options given below
(3) A and C only (4) B and D only (1) Both Statement I and Statement II are true
[JUNE 2023] (2) Both Statement I and Statement II are false
837. One component of the internal memory of a (3) Statement I is true but Statement II is false
computer is Random Access Memory (RAM). (4) Statement I is false but Statement II is true
Which of the following statements are correct [JUNE 2023]
about characteristics of RAM? 841. Which of the following statements A-C are
A. RAM can be read from and written to correct about a Hard-Disk Drive (HDD) used as a
B. RAM is volatile memory storage device in a computer?
C. RAM is temporary storage A. It has no moving parts
D. Modem PCs typically have from 2TB upto 32 B. It is non-volatile
TB of RAM C. It uses magnetic properties to store data
Choose the correct answer from the options given Choose the correct answer from the options given
below: below:
(1) C and D only (2) A, B and C only (1) A & B only
(3) A and B only (4) A, B, C and D (2) A & C only
[JUNE 2023] (3) B & C only
838. A smart home application that automates the (4) A, B & C
controlling of lighting, temperature, [JUNE 2023]
entertainment system and appliances is an 842. Given below are two statements:
example of Statement I: ( 1011101 )2=( 135 )8
(1) Evolutionary computing Statement II: ( 71 )8= (111001 )2
(2) Nature-inspired computing
In the light of the above statements, choose the
(3) Bio-inspired computing
correct answer from the options given below
(4) Ubiquitous computing
(1) Both Statement I and Statement II are true
[JUNE 2023]
(2) Both Statement I and Statement II are false
839. Identify the correct order of the term A-E given
(3) Statement I is true but Statement II is false
below that completes the paragraph describing a
(4) Statement I is false but Statement II is true
method of operation for a keyboard.
[JUNE 2023]
A computer keyboard has a key matrix underneath
843. Which of the following pairs of acronym and its
the keys when a key is pressed, it presses a switch
that completes a _______. This allows ________ to expanded form is incorrectly matched?
flow. The location of the key pressed is ________. (1) CMOS- Consistent Metal-Oxide Semiconductor
The location of the key pressed is compared to a (2) DRAM- Dynamic Random Access Memory
_________ map to find the _______ value for the (3) MICR-Magnetic Ink Character Reader
key that has been pressed (4) VLSI- Very Large Scale Integration
A. Binary B. Calculated
C. Character D. Circuit
E. Current

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 88

[JUNE 2023] 848. Which of the following pair of acronym and its
844. Given below are two statements: in the context of expansion is incorrectly matched?
MS-WORD software (1) GPS - Global Positioning System
Statement I: The tool which is used to insert (2) GSM - Global System for Management
decorative text in a document is called Clipart. (3) SIM - Subscriber Identity Module
Statement II: The purpose of using Keyboard (4) Wimax - Worldwide Interoperability for
shortcut CTRL+X followed by CTRL+V for a Microwave Access
selected text paragraph in a document is to Cut and [JUNE 2023]
Paste 849. What does the following MS-EXCEL formula do?
In the light of the above statements, choose the = SUM (Sheet1:Sheet4!D18)
correct answer from the options given below (1) It adds data from all D18 cells in sheet1, sheet2,
(1) Both Statement I and Statement II are true sheet3 and sheet4
(2) Both Statement I and Statement II are false (2) It adds data from cell D18 of sheet1 and cell
(3) Statement I is true but Statement II is false D18 of Sheet4
(4) Statement I is false but Statement II is true (3) It adds all data in the range A1:D18 in sheet1,
[JUNE 2023] sheet2, sheet3 and sheet4
845. Given below are two statements: (4) It adds data from cell A1 of Sheet1 and cell D18
of Sheet4
Statement I: ( 49 )10 =(31)16 =( 01111011)2
[JUNE 2023]
Statement II: (7 B)16 =(01111011)2=( 123 )10 850. Given below are two statements:
In the light of the above statements, choose the Statement I: ( 11001000 )2=( C 8 )16 =( 200 )10
correct answer from the options given below
Statement II: ( 123 )10 =( 01111011 )2=( 7 B )16
(1) Both Statement I and Statement II are true
In the light of the above statements, choose the
(2) Both Statement I and Statement II are false
correct answer from the options given below:
(3) Statement I is true but Statement II is false
(1) Both Statement I and Statement II are true.
(4) Statement I is false but Statement II is true
(2) Both Statement I and Statement II are false.
[JUNE 2023]
(3) Statement I is true but Statement II is false.
846. Which MS-EXCEL formulae are equivalent to each
(4) Statement I is false but Statement II is true.
other?
[JUNE 2023]
A. = A3+A4+A5+A6 851. Given below are two statements:
B. = SUM (A3:A6) Statement I: An Operating System controls
C. = SUM (A3, A6) peripherals and provides protection against viruses.
D. = SUM (A3, A4, A5, A6) Statement II: In word processing and desktop
(1) A, B and C only publishing, the terms portrait and landscape refer to
(2) A, B and D only Page Layout.
(3) B and D only In the light of the above statements, choose the
(4) C and D only correct answer from the options given below:
[JUNE 2023] (1) Both Statement I and Statement II are true.
847. Which of the following statements A-C is/are (2) Both Statement I and Statement II are false.
correct about cyber attacks? (3) Statement I is true but Statement II is false.
A. Spyware prevents access to a website (4) Statement I is false but Statement II is true.
B. Virus is self-replicating malicious code on a [JUNE 2023]
computer. 852. In computers, which of the following file formats
C. Denial-of-service (DoS) captures all data entered contains exclusively the text file formats?
using a keyboard to obtain personal data. A. PDF B. CSV
Choose the correct answer from the options given C. GIF D. RTF
E. TXT
below:
Choose the correct answer from the options given
(1) A only
below:
(2) B only
(1) A. B. and E Only (2) B, D and E
(3) C only
Only
(4) A & B only
(3) B, C and D Only (4) A and C
Only
[JUNE 2023]
[JUNE 2023]

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 89

853. In the context of MS-PowerPoint, a presentation Statement (I): An output device that creates an
software, which of the following statements are object by building a layer upon a player of material
true? is called a 3D printer. It is widely used in CAD
A. Objects on the slide that hold text, pictures and applications.
more are called Placeholders. Statement (II): Laptops can be used even when not
B. MS-PowerPoint automatically opens with plugged into an electricity socket.
Windows Operating System In light of the above statements, choose the most
C. A view that displays the slides of a presentation appropriate answer from the options given below.
(1) Both Statement (I) and Statement (II) are true
as miniature representations of the slides is
(2) Both Statement (I) and Statement (II) are false.
called Slide Sorter view.
(3) Statement (I) is true but Statement (II) is false.
Choose the correct answer from the options given
(4) Statement (I) is false but Statement (II) is true.
below:
[DEC 2023]
(1) A and B Only (2) A and C Only
858. Identify the correct sequence of the following
(3) B and C Only (4) A, B and C
technologies A-D used in first generation to fourth
[JUNE 2023]
generation of computers.
854. Given below are two statements:
(A) Integrated circuits
Statement I: Fibre-optic cable makes use of light
(B) Microprocessors
pulses to transmit data and is most appropriate to
(C) Transistors
connect computers in a small building. (D) Vacuum Tubes
Statement II: URL is the text used by web Choose the correct answer from the options given
browsers to locate a web address on the Internet. below:
In the light of the above statements, choose the (1) (D), (C), (B), (A) (2) (D), (C),
correct answer from the options given below: (A), (B)
(1) Both Statement I and Statement II are True. (3) (C), (D), (A), (B) (4) (B), (A),
(2) Both Statement I and Statement II are False. (C), (D)
(3) Statement I is true but Statement II is false. [DEC 2023]
(4) Statement I is false but Statement II is true. 859. Given below are two statements:
[JUNE 2023] Statement (I): RFID is the use of fingerprint scans,
855. Given below are two statements: retina scans, face identification, etc as a way of
Statement I: (1011101) 2 = (135) 8 identifying a person uniquely.
Statement II: (71)8 = (111001) 2 Statement (II): The website using the streaming
In the light of the above statements, choose the method to deliver video means that the video can be
played while it is being downloaded and
correct answer from the options given below
accordingly less time is required before users can
(1) Both Statement I and Statement II are true view the video
(2) Both Statement I and Statement II are false (1) Both Statement (I) and Statement (II) are true
(3) Statement I is true but Statement II is false (2) Both Statement (I) and Statement (II) are false.
(4) Statement I is false but Statement II is true (3) Statement (I) is true but Statement (II) is false.
[DEC 2023] (4) Statement (I) is false but Statement (II) is true.
856. Which of the following statements are true? [DEC 2023]
A. One of the main advantages of ROM is that the 860. Given below are two statements:
information stored on the ROM chip is not lost Statement (I): Wiki is usually in some form of
even when the power to the computer is turned chronological order and postings tend to be short in
off length
Statement (II): A mobile phone (cell phone)
B. ASCII is an acronym for American Standard
primarily uses flash memory
Code for Intelligent Information In light of the above statements, choose the most
C. Compared to desktop computers, laptop appropriate answer from the options given below.
computers are portable since all its components (1) Both Statement (I) and Statement (II) are true.
are together in one single unit (2) Both Statement (I) and Statement (II) are false.
(1) A and B only (2) A and C only (3) Statement (I) is true but Statement (II) is false.
(3) B and C only (4) A, B and C (4) Statement (I) is false but Statement (II) is true.
[DEC 2023] [DEC 2023]
857. Given below are two statements:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 90

861. A computer uses RAM and ROM to store data. (C) Flash memory (D) Hard disk
Which of the following statements describing ROM (E) RAM
is/are true? Choose the correct answer from the options given
A. It stores the programs and data that are currently below:
in use. (1) (A), (B) and (E) Only (2) (A), (C) and (D)
B. It is used to boot up the computer when power is Only
turned on. (3) (B), (C) and (E) Only (4) (B) and (E) Only
C. Its contents are retained when power is turned [DEC 2023]
off 867. Match List-I with List-II
Choose the correct answer from the options given List I List II
below: (Internet Term) (Definition)
(1) A only (2) B only A. HTTP I. A unique address given to
(3) A and B only (4) B and C only a device on a network. It
[DEC 2023] is provided by the
manufacturer.
862. Consider the base - 10 number 100. In base - 6, it
B. URL II. The main protocol that
would be represented as governs the transmission
(1) (442)6 of data using the
(2) (200)6 Internet.
(3) (242)6 C. MAC address III. An address given to each
(4) (244)6 device on a network. It is
[DEC 2023] provided by the network.
863. Anil has an MP3 file stored on his computer. Which D. IP address IV. The website address that
type of data is stored in an MP3 file? is typed into the address
bar.
(1) Video
Choose the correct answer from the options given
(2) Sound
below
(3) Image
(1) A-II, B-IV C-I, D-III (2) A-III, B-IV C-I, D-
(4) Text
II
[DEC 2023]
(3) A-I, B-III, C-II. D-IV (4) A- IV B- II, C-I, D-
864. Given below are two statements:
III
Statement I: Flip (ICT tool) allows users to record
[DEC 2023]
and share short video responses.
868. Identify the correct order of the terms A-E to
Statement II: Flip (ICT tool) is primarily used for
complete the following paragraph about computer
video discussions and presentations.
devices and technology
In light of the above statements, choose the most
An _____ allows a user to write on a surface using a
appropriate answer from the options given below
pen, and the text and drawings can then be captured
(1) Both statement I and Statement II are correct
and stored for later use. An ______ printer produces
(2) Both statement I and Statement II are incorrect
a hard copy of a document using _____ and
(3) Statement I is correct but statement II is
piezoelectric technology A ________ printer uses a
incorrect
_______ drum, and positive and negative charges,
(4) Statement I incorrect but statement II is correct
to produce a hard copy of a document.
[DEC 2023]
A. Inkjet
865. The automation element of online media has
B. Interactive whiteboard
enabled the generation of:
C. laser
(1) Limited quantity of quality information
D. rotating
(2) User specific information
E. thermal bubble
(3) Complex philosophical information
Choose the correct answer from the options given
(4) Non-specific general information
below.
(1) B, E, A, D, C (2) B, A, E, C, D
(3) A, B, E, C, D (4) E, D, C, B, A
[DEC 2023]
866. Which of the following computer memory types are
[DEC 2023]
volatile?
(A) CMOS memory (B) Cache memory

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 91

869. Alisha has agreed to send Khushi a 20-megabyte 872. Identify the correct sequence of the missing units of
file. They both have a broadband Internet data A-D that can be used to represent the size of a
connection. Allsha has to upload her file to a server file, as it changes in size. The units of data increase
and then Khushi needs to download it from the in size from smallest to largest as given below.
same server. The broadband data transfer rates Bit
(speeds) are: 1 megabit per second to upload a file -----
and 8 megabits per second to download a file. If P -----
and Q represent the time taken in seconds to upload kilo Byte (KB)
and download Allsha's file respectively then (P.Q)- -----
(1) (20, 160) -----
(2) (144, 18) tera Byte (TB)
(3) (18, 144) (A) byte
(4) (100,20) (B) gigaByte (GB)
[DEC 2023] (C) megaByte (MB)
870. Match List - I with List - II. (D) nibble
List – I List - II Choose the correct answer from the options given
(Storage Media) (Type of storage) below:
(A) Hard Disk Drive (I) Optical (1) (D), (A), (C), (B)
(HDD) (2) (A), (C), (D), (B)
(B) USB Flash Memory (II) Magnetic (3) (D), (A), (B). (C)
(C) Blu ray Disc (III) Solid state (4) (A), (D), (C), (B)
Choose the correct answer from the options given [DEC 2023]
below: 873. Which collaborative ICT tool allows user to create
(1) (A)-(II), (B)-(III), (C)-(I) digital bulletin boards to share and gather
(2) (A)-(II), (B)-(I), (C)-(III) information?
(3) (A)-(III), (B)-(II), (C)-(I) (1) X- mind
(4) (A)-(I), (B)-(III), (C)-(II) (2) Padlet
[DEC 2023] (3) Book creator
871. Which of the following statements A-E about (4) Plotagon
firewalls in computer networks are true? [DEC 2023]
(A) Firewalls are only available as hardware 874. Given below are two statements:
devices and only examine traffic entering a Statement (I): Wiki is usually represented in
network. reverse chronological order, whereas a blog has a
(B) Firewalls allow a user to set rules for structure determined by content and users.
network traffic. Statement (II): Blog is usually personal/someone's
(C) Firewalls will automatically stop all opinion, whereas a wiki is usually objective.
malicious traffic. In the light of the above statements, choose the
(D) Firewalls backup all data that is most appropriate answer from the options given
transmitted around a network. below:
(E) Firewalls can be used to block access to (1) Both Statement I and Statement II are correct
certain websites. (2) Both Statement I and Statement II are incorrect
Choose the correct answer from the options given (3) Statement I is correct but Statement II is
below: incorrect
(1) (A), (C) and (D) Only (4) Statement I is incorrect but Statement II is
(2) (B) and (E) Only correct
(3) (B), (D) and (E) Only
(4) (A) and (C) Only

[DEC 2023]
875. Match List - I with List - II.
[DEC 2023] List - I List - II
(Automatic data (Description)

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 92

capture method) Malware)


(A) OCR (I) System that reads (A). Trojan Horse (I). A program that
pencil or pen replicates itself in
marks on a piece of order to spread to
paper in pre- other computers and
determined uses a computer
positions network to spread
(B) OMR (II) System that reads itself.
characters printed (B). Worm (II). A non-self-replicating
in a special ink, for program containing
example, the malicious code that,
characters written when executed,
at the bottom of carries out actions,
Bank cheque typically causing loss
(C) RFID (III) Reading data of data.
directly from hard (C). Spyware (III). A type of malware
copy and which restricts access
converting into to computer system
computer-readable that it infects, often
form demands a fee.
(D) MICR (IV) Use of minute- (D). Ransomware (IV). A program that aids
electronic devices in gathering
(containing information about a
microchip and person or
antenna) that can organisation without
read from distances their knowledge. For
upto few minutes example, it detects
Choose the correct answer from the options given key presses of the
below: computer user.
(1) (A)-(1), (B)-(III), (C)-(II), (D)-(IV) Choose the correct answer from the options given
(2) (A)-(II), (B)-(IV), (C)-(III), (D)-(1) below:
(3) (A)-(III), (B)-(I), (C)-(IV), (D)-(II) (1) (A)-(I), (B)-(II), (C) - (IV), (D) - (III)
(4) (A)-(IV), (B)-(II), (C)-(1), (D)-(III) (2) (A)-(II), (B)-(I), (C) (IV), (D) (III)
[DEC 2023] (3) (A)-(III), (B)-(I), (C)-(IV), (D) - (II)
876. Which of the following hardware components will (4) (A)-(II), (B)-(IV), (C)(1), (D) (III)
lose data when the power to a computer is switched [DEC 2023]
off? 878. Given below are two statements:
(A). CPU Registers Statement (I): ISPs provide the user with access to
(B). Cache Memory the Internet (for a fee), whereas web browsers allow
(C). Main Memory the user to view web pages.
Choose the correct answer from the options given Statement (II): Each web page/site found matching
below: the search criteria in a web search engine is known
(1) (C) only. as a 'hit'.
(2) (A) and (C) only. In light of the above statements, choose the most
(3) (B) and (A) only. appropriate answer from the options given below.
(4) (A), (B) and (C). (1) Both Statement (I) and Statement (II) are true.
(2) Both Statement (I) and Statement (II) are false.
(3) Statement (I) is true but Statement (II) is false.
[DEC 2023] (4) Statement (I) is false but Statement (II) is true.
877. Match List-I with List-II [DEC 2023]
List-I List-II 879. In the following MS-EXCEL spreadsheet, you are
(Type of (Description) given a list of 100 customers. Column 'A' represents

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 93

their names, 'B' is for customer category; 'C' for Choose the correct answer from the options given
payment category (0 means discounted price and 1 below:
means full price); 'D' indicates price that customer (1) (A) Only (2) (B) Only
pays. The list in the example spreadsheet below is (3) (C) Only (4) (B) and (C)
not complete and simply shows different categories. Only
A B C D [DEC 2023]
1 Customer Customer Payment Price 882. Which of the following statements regarding guided
Name Category Category (₹) and unguided media in computer Networking are
2 Raman Child 0 0 correct?
3 Dinesh Adult 1 5 (A) Guided media transmission supports
higher data speeds than unguided media
4 Jashan Adult 0 2 transmission
… … … … … (B) Guided media is subjected to less
Statement (I): The formula = COUNTIFS interference than unguided media
(B2:B101,"Adult") counts all customers who are (C) Unguided media transmission is more
adults. secure than guided media transmission
Choose the correct answer from the options given
Statement (II): The formula = COUNTIFS
below:
(B2:101,"Adult") counts all customers who are (1) (A) and (B) Only (2) (A) and (C)
adults. Only
In light of the above statements, choose the most (3) (B) and (C) Only (4) (A), (B)
appropriate answer from the options given below. and (C)
(1) Both Statement (I) and Statement (II) are true [DEC 2023]
(2) Both Statement (I) and Statement (II) are false. 883. Which of the following pair of acronyms and its
(3) Statement (I) is true but Statement (II) is false. expansion are incorrectly matched?
(4) Statement (I) is false but Statement (II) is true. (1) LED-Light Emitting Diode
[DEC 2023] (2) CRT- Cathode Ray Tube
880. Match List I with List - II. (3) LCD-Liquid Control Display
List – I List - II (4) VDU - Video Display Unit
(Graphical (Description) [DEC 2023]
User Interface 884. Businesses use ICT to build positive customer
Term) relations by:
(A) Window (I) Represents a folder or a
(1) Calling customers at home
program - can be seen
within a window or free (2) Creating targeted marketing campaigns
standing on screen (3) Placing pop-up advertisements on web sites
(B) Icon (II) Contains lists of options (4) Sending unsolicited e-mails
for a certain program [DEC 2023]
(C) Menu (III) Used to select menu 885. Given below are two statements :
options/icons/close/open Statement (I): IPv6 address in computer
windows networking is 4 times larger than an IPv4 address
(D) Pointer (IV) Represents an area on Statement (II): The IP address gives the location of
the screen that displays a device on the Internet, whereas the MAC address
information for a specific identifies the device connected to the Internet
program In the light of the above statements, choose the
Choose the correct answer from the options given most appropriate answer from the options given
below: below:
(1) Both Statement I and Statement II are correct.
(1) (A)-(III), (B)-(I), (C)-(II), (D)-(IV)
(2) Both Statement I and Statement II are incorrect.
(2) (A)-(1), (B)-(IV), (C)-(II), (D)-(III)
(3) Statement I is correct but Statement II is
(3) (A)-(IV), (B)-(I), (C)-(II), (D)-(III)
incorrect.
(4) (A)-(II), (B)-(I), (C)-(IV), (D)-(III)
(4) Statement I is incorrect but Statement II is
[DEC 2023]
881. Which of the following statements is/are true? correct.
(A) BIOS is an example of Application Software [DEC 2023]
(B) A utility software is an example of firmware 886. In comparison to secondary computer storage,
(C) Spyware is an example of malware primary storage is:

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 94

(1) Slower, more expensive per unit of storage and


persistent
(2) Faster, less expensive per unit of storage and
persistent
(3) Faster more expensive per unit of storage and
not persistent
(4) Faster, less expensive per unit of storage and not
persistent
[DEC 2023]
887. A security system records video footage. One
minute of video requires 180 MegaBytes of storage.
The recording system can store several hours of
video footage. How much storage would be needed
for 2 hours of video footage? (1k = 1024):
(1) 19.2 Giga Bytes
(2) 20.3 Giga Bytes
(3) 21.1 Giga Bytes
(4) 22.4 Giga Bytes
[DEC 2023]
888. One of the four maxims of conversation, quantity
maxim, reflects the right amount of :
(1) Paradigms (2) Syntagms
(3) Similes (4) Information
[DEC 2023]
889. If (P) 8 represents the number P in base - 8, then
(144)8 + (175) 8=
(1) (225) 8
(2) (341) 8
(3) (441) 8
(4) (314) 8

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 95

ANSWER KEY
1 2 3 4 5 6 7 8 9 10
3 3 4 3 1 1 2 3 3 3
11 12 13 14 15 16 17 18 19 20
3 3 1 1 4 4 4 2 2 2
21 22 23 24 25 26 27 28 29 30
1 2 4 1 1 1 4 3 4 2
31 32 33 34 35 36 37 38 39 40
1 2 2 1 3 2 2 1 2 3
41 42 43 44 45 46 47 48 49 50
2 4 1 4 2 2 1 4 1 4
51 52 53 54 55 56 57 58 59 60
3 1 3 2 1 2 4 1 1 2
61 62 63 64 65 66 67 68 69 70
3 1 4 3 1 1 3 4 3 2
71 72 73 74 75 76 77 78 79 80
4 2 2 4 3 4 4 4 3 4
81 82 83 84 85 86 87 88 89 90
1 2 3 3 3 4 4 3 1 3
91 92 93 94 95 96 97 98 99 100
4 2 3 4 3 2 1 3 3 4
101 102 103 104 105 106 107 108 109 110
1 3 4 3 4 2 1 3 4 4
111 112 113 114 115 116 117 118 119 120
3 3 1 1 3 1 4 1 2 2
121 122 123 124 125 126 127 128 129 130
2 2 2 1 3 3 2 3 2 4
131 132 133 134 135 136 137 138 139 140
4 3 4 4 2 2 2 3 2 4
141 142 143 144 145 146 147 148 149 150
1 4 3 3 2 1 4 4 3 3
151 152 153 154 155 156 157 158 159 160
1 3 4 4 1 4 2 3 3 4
161 162 163 164 165 166 167 168 169 170
2 1 1 3 4 1 4 1 4 1
171 172 173 174 175 176 177 178 179 180
2 3 3 1 4 1 3 3 4 2
181 182 183 184 185 186 187 188 189 190
1 1 1 3 2 4 2 2 2 1
191 192 193 194 195 196 197 198 199 200
3 2 1 3 3 3 3 1 2 3
201 202 203 204 205 206 207 208 209 210
4 2 2 3 2 3 2 1 1 4
211 212 213 214 215 216 217 218 219 220
3 4 2 1 2 1 3 3 3 4
221 222 223 224 225 226 227 228 229 230

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 96

2 2 4 4 2 3 3 3 1 4
231 232 233 234 235 236 237 238 239 240
3 1 1 2 2 3 2 3 3 3
241 242 243 244 245 246 247 248 249 250
1 2 1 3 4 4 3 4 4 2
251 252 253 254 255 256 257 258 259 260
2 3 4 3 4 2 1 4 2 2
261 262 263 264 265 266 267 268 269 270
1 1 2 2 3 3 3 2 4 3
271 272 273 274 275 276 277 278 279 280
4 4 2 1 1 4 3 2 2 4
281 282 283 284 285 286 287 288 289 290
1 2 3 3 2 3 3 3 2 2
291 292 293 294 295 296 297 298 299 300
4 4 4 4 2 4 1 2 2 4
301 302 303 304 305 306 307 308 309 310
3 2 1 4 4 2 4 3 2 1
311 312 313 314 315 316 317 318 319 320
2 3 4 1 3 3 3 4 1
321 322 323 324 325 326 327 328 329 330
1 3 2 1 2 4 1 4 3 4
331 332 333 334 335 336 337 338 339 340
3 4 3 3 3 2 2 2 4 1
341 342 343 344 345 346 347 348 349 350
3 3 2 2 2 1 2 2 2 1
351 352 353 354 355 356 357 358 359 360
3 3 1 4 1 1 4 4 4 1
361 362 363 364 365 366 367 368 369 370
2 4 1 3 2 1 2 4 2 3
371 372 373 374 375 376 377 378 379 380
4 4 4 3 2 4 4 3 1 2
381 382 383 384 385 386 387 388 389 390
3 3 1 4 2 4 3 1 3 3
391 392 393 394 395 396 397 398 399 400
4 2 3 3 4 1 4 1 2 4
401 402 403 404 405 406 407 408 409 410
4 4 2 3 1 2 3 2 2 1
411 412 413 414 415 416 417 418 419 420
2 1 3 1 3 4 2 3 4 3
421 422 423 424 425 426 427 428 429 430
3 2 4 1 2 2 3 4 4 2
431 432 433 434 435 436 437 438 439 440
4 1 4 4 2 1 2 2 2 4
441 442 443 444 445 446 447 448 449 450
1 4 4 3 3 1 3 1 3 2

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 97

451 452 453 454 455 456 457 458 459 460
1 3 2 4 4 2 1 4 3 1
461 462 463 464 465 466 467 468 469 470
3 4 1 3 3 4 2 2 2 4
471 472 473 474 475 476 477 478 479 480
4 3 4 1 4 2 2 1 3 4
481 482 483 484 485 486 487 488 489 490
3 2 4 3 2 2 4 3 2 4
491 492 493 494 495 496 497 498 499 500
4 4 1 4 3 2 1 3 1 4
501 502 503 504 505 506 507 508 509 510
4 2 4 1 2 1 3 1 2 2
511 512 513 514 515 516 517 518 519 520
1 4 3 3 3 2 3 2 3 3
521 522 523 524 525 526 527 528 529 530
1 2 1 3 3 4 3 3 4 2
531 532 533 534 535 536 537 538 539 540
3 4 2 3 4 4 4 3 2 2
541 542 543 544 545 546 547 548 549 550
3 3 1 3 3 4 1 3 3 4
551 552 553 554 555 556 557 558 559 560
2 2 4 1 1 4 2 4 1 1
561 562 563 564 565 566 567 568 569 570
1 1 1 4 3 2 1 4 1 1
571 572 573 574 575 576 577 578 579 580
3 2 2 4 4 3 1 3 2 4
581 582 583 584 585 586 587 588 589 590
3 4 4 3 2 1 4 2 4 3
591 592 593 594 595 596 597 598 599 600
4 4 3 2 1 3 1 3 4 4
601 602 603 604 605 606 607 608 609 610
4 4 2 1 3 2 3 3 2 4
611 612 613 614 615 616 617 618 619 620
2 3 2 3 3 2 4 3 3 4
621 622 623 624 625 626 627 628 629 630
1 4 3 2 1 4 1 3 3 4
631 632 633 634 635 636 637 638 639 640
3 2 2 1 3 3 3 2 2 1
641 642 643 644 645 646 647 648 649 650
3 1 2 2 2 4 2 2 1 3
651 652 653 654 655 656 657 658 659 660
3 1 4 1 2 4 1 3 3 2
661 662 663 664 665 666 667 668 669 670
4 2 3 2 4 3 3 1 3
671 672 673 674 675 676 677 678 679 680
1 1 2 2 3 2 4 4 3 4

IFAS Publications www.ifasonline.com


UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY 98

681 682 683 684 685 686 687 688 689 690
1 1 4 1 2 1 1 2 1 4
691 692 693 694 695 696 697 698 699 700
3 1 2 4 1 4 1 1 4 1
701 702 703 704 705 706 707 708 709 710
4 1 4 2 3 3 2 2 3 4
711 712 713 714 715 716 717 718 719 720
4 4 2 2 2 3 4 2 3 4
721 722 723 724 725 726 727 728 729 730
2 3 3 2 1 4 4 4 1 2
731 732 733 734 735 736 737 738 739 740
2 4 1 4 2 2 2 1 1 3
741 742 743 744 745 746 747 748 749 750
2 1 3 2 2 4 2 1 1 1
751 752 753 754 755 756 757 758 759 760
1 2 3 3 4 4 1 3 1 1
761 762 763 764 765 766 767 768 769 770
1 1 3 4 3 1 3 3 4 3
771 772 773 774 775 776 777 778 779 780
1 2 1 2 3 4 1 2 2 4
781 782 783 784 785 786 787 788 789 790
4 2 4 3 3 4 1 1 2 2
791 792 793 794 795 796 797 798 799 800
4 4 4 3 3 2 2 1 2 4
801 802 803 804 805 806 807 808 809 810
3 3 2 1 1 1 2 1 1 1
811 812 813 814 815 816 817 818 819 820
4 4 3 2 3 1 2 3 4 3
821 822 823 824 825 826 827 828 829 830
1 4 1 4 1 4 4 2 1 4
831 832 833 834 835 836 837 838 839 840
3 2 2 1 1 3 4 2 4
841 842 843 844 845 846 847 848 849 850
3 1 1 4 4 2 2 2 1 1
851 852 853 854 855 856 857 858 859 860
3 2 4 1 1 2 1 2 4
861 862 863 864 865 866 867 868 869 870
2 4 2 1 2 4 3 2 1 4
871 872 873 874 875 876 877 878 879 880
2 1 2 3 1 4 3 3 3 1
881 882 883 884 885 886 887 888 889
3 1 3 2 3 3 3 4 4

SOLUTIONS

IFAS Publications www.ifasonline.com


99
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Exam Year – 2004


1. Solution: Information and Communication Technology (ICT) is a broad term that encompasses
all aspects of using technology to create, store, manage, and exchange information. ICT includes
the use of computers, software, telecommunications, and other technologies. ICT is used in a
wide variety of fields, including business, education, government, and healthcare. ICT can be
used to improve efficiency, productivity, and communication.

2. Solution: Information Technology (IT) is a broad term that encompasses all aspects of using
technology to create, store, manage, and exchange information. IT includes the use of
computers, software, telecommunications, and other technologies.
IT is used in a wide variety of fields, including business, education, government, and healthcare. IT
can be used to improve efficiency, productivity, and communication.

3. Solution: Computers can be used to diagnose learning difficulties in students by analyzing


their performance.
Psychological testing can be conducted using computer software to streamline the assessment
process.
A program is a set of instructions that guide a computer in performing specific tasks.
In summary, computers have the capability to aid in diagnosing student difficulties, conducting
psychological testing, and executing programs with a sequence of instructions.

4. Solution: Viruses are malicious software that can replicate themselves and spread from
computer to computer. Viruses are often attached to files or programs, and they can be activated
when the file or program is opened. Viruses can damage files, steal data, or even take control of a
computer.

5. Solution: The incorrect statement is (1) Computer is capable of processing only digital signal.
Computers can process both digital and analog signals. Analog signals are continuous signals, while
digital signals are discrete signals. Computers can process analog signals by converting them to digital
signals using an analog-to-digital converter (ADC).
Exam Year – 2005
6. Solution: Random Access Memory (RAM) is a type of computer memory that can be accessed
randomly. This means that any byte of memory can be accessed without having to read through
all the preceding bytes. RAM is used to store data that the computer is currently using. This
includes the operating system, applications, and data that is being processed.

7. Solution: The acronym INSAT stands for Indian National Satellite. INSAT is a series of
multipurpose geostationary satellites launched by ISRO to satisfy telecommunications,
broadcasting, meteorology, and search and rescue operations. Commissioned in 1983, INSAT is
the largest domestic communication system in the Indo-Pacific Region. It is a joint venture of
the Department of Space, Department of Telecommunications, India Meteorological
Department, All India Radio and Doordarshan. The overall coordination and management of
INSAT system rests with the Secretary-level INSAT Coordination Committee.

8. Solution: COBOL (Common Business-Oriented Language) is a programming language designed


for business applications.
FORTRAN (FORmula TRANslation) is a programming language designed for scientific and
engineering applications.
PASCAL is a general-purpose programming language that is often used for teaching programming.
IUM is not a computer language. It is a made-up term that does not have any meaning.

IFAS Publications
www.ifasonline.com
100
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

9. Solution: Malware refers to malicious software that is designed to harm or exploit computer
systems. A computer virus is a specific type of malware that spreads by inserting its code into
other programs or files. Once activated, a virus can disrupt system operations, corrupt or delete
data, and spread to other computers.

10. Solution: While computers are designed to process information accurately and efficiently, they
are not immune to errors. Various factors such as hardware malfunctions, software bugs, or
input errors can lead to incorrect processing or output. Therefore, computers are not
guaranteed to process information without any errors.
11. Solution: In a hypermedia database, information bits are stored in the form of nodes. A node is a
unit of information that can be linked to other nodes. Nodes can contain text, images, videos, or
other types of data.
The other options are incorrect.
Signals are used to transmit data in a hypermedia database, but they are not the unit of information that
is stored.
Cubes are not used to store information in a hypermedia database.
Symbols can be used to represent information in a hypermedia database, but they are not the unit of
information that is stored.

12. Solution: The main functions of line access and avoidance of collision are performed by (3)
network protocols. Network protocols are a set of rules and procedures that govern the
communication between devices in a network. They ensure efficient and reliable data
transmission by managing access to the network's communication lines and avoiding collisions
between data packets.

Exam Year – 2006


13. Solution: the term "poor recall" is used to describe the situation where a web search fails to
retrieve a significant number of relevant documents. This means that the search results do not
include a sufficient amount of the desired information, leading to a low coverage of relevant
content.

14. Solution: Cyber venting is the act of expressing one's anger, frustration, or other negative
emotions online. It can be done through blogs, social media, or even email. Cyber venting can
be a way to let off steam and feel better, but it can also be harmful if it is done in a way that is
offensive or abusive.

15. Solution: Value-added networks (VANs) refer to third-party service providers that offer
additional services and features to facilitate electronic data interchange (EDI) and other
electronic communication between businesses. These networks add value by providing
services such as data transformation, translation, security, and connectivity.

16. Solution: A voice portal refers to a technology that allows users to access and interact with
Internet-based services and information using a regular telephone. It enables users to make
phone calls to access various online resources such as websites, emails, news, weather updates,
and more, without the need for a computer or specialized equipment.

17. Solution: real-time video allows users to watch live events or broadcasts as they happen, even if
there is a slight delay in the transmission due to network latency. This type of streaming is
commonly used for live sports events, news broadcasts, and other real-time content delivery over
the Internet.

IFAS Publications
www.ifasonline.com
101
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

18. Solution: Computer is an electronic device that can store, retrieve and process both
qualitative and quantitative data quickly and accurately. This statement correctly describes the
computer.

19. Solution: LAN stands for Local Area Network. It is a computer network that connects devices
within a limited area, such as a home, office, or school. LANs can be small or large, ranging
from a home network with one user to an enterprise network with thousands of users and
devices. Regardless of size, a LAN's single defining characteristic is that it connects devices that
are in a single, limited area. In contrast, a wide area network (WAN) or metropolitan area
network (MAN) covers larger geographical areas. Some WANs and MANs connect many LANs
together.

20. Solution: The appropriate format of a URL for an email address is www@mail.com. In email
addresses, the "@" symbol is used to separate the user's name or identifier from the domain
name of the email service provider. Therefore, the correct format for an email address in a URL
would be "user@domain.com".

Exam Year – 2007


21. Solution: DPI stands for Dots Per Inch. It is a measure of spatial printing, video, or image
scanner dot density, in particular the number of individual dots that can be placed in a line
within the span of 1 inch (2.54 cm).

22. Solution: ASCII stands for American Standard Code for Information Interchange. It is a
character encoding standard for electronic communication. ASCII codes represent text in
computers, telecommunications equipment, and other devices.
23. Solution: Dynamic Data Exchange (DDE) is a technology that allows data to be shared between
applications. DDE was first introduced in Windows 2.0 and was used by many applications, such
as Microsoft Excel and Microsoft Word.
DDE works by creating a link between two applications. When the data in one application changes, the
link is updated and the data in the other application is also updated.

24. Solution: The Arithmetic Logic Unit (ALU) is a part of the Central Processing Unit (CPU) that
performs calculations and makes decisions. The ALU is responsible for performing all of the basic
arithmetic operations, such as addition, subtraction, multiplication, and division. The ALU is also
responsible for performing logical operations, such as AND, OR, and NOT.

25. Solution: RAM stands for Random Access Memory. It is the main memory in a computer, where
the operating system (OS), application programs and data in current use are kept so they can
be quickly reached by the device's processor. RAM is much faster to read from and write to than
other kinds of storage, such as a hard disk drive (HDD), solid-state drive (SSD) or optical drive.

26. Solution: A Compact Disk Recordable (CD-R) is a type of backing storage medium commonly
used for saving data. It is a write-once optical disc that can be used to permanently store data.
Once data is written to a CD-R, it cannot be erased or modified. The data on a CD-R is recorded
using a laser beam, which creates permanent marks on the disc's surface.

27. Solution: CPU stands for Central Processing Unit. It is the brain of a computer, responsible for
carrying out instructions that are given to it. The CPU is made up of a few different parts,
including the control unit, the arithmetic logic unit, and the registers.

IFAS Publications
www.ifasonline.com
102
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

28. Solution: CD-ROM stands for Compact Disc Read-Only Memory. It is a type of optical disc that
can store digital data. CD-ROMs were first introduced in 1982 and were originally used for
storing audio data. However, they quickly became popular for storing software and data as
well.

29. Solution: WWW stands for World Wide Web. It is a global information system that uses the
internet to link documents and other resources. The WWW was invented in 1989 by Tim
Berners-Lee, a British computer scientist.

Exam Year – 2008


30. Solution: WYSIWYG stands for "What You See Is What You Get." It is a term used to describe
the display of a document on a screen exactly as it will appear when printed. In other words,
the formatting, fonts, images, and overall layout of the document are displayed in real-time,
allowing the user to have an accurate representation of how the final printed document will
look.

31. Solution: An email address is composed of (2) two parts: the local part and the domain part. The
local part is the username or mailbox identifier, and it is followed by the "@" symbol. The domain
part indicates the domain name of the email service provider or organization. The two parts are
separated by the "@" symbol, such as "username@example.com."

32. Solution: The number of keys on a keyboard can vary depending on the specific type and layout
of the keyboard. The most common keyboard layout is the QWERTY layout, which typically has
101 keys. This includes alphanumeric keys, function keys, navigation keys, and various special
keys.

33. Solution: UNIX is an operating system, not a programming language.


An operating system is a software that manages the hardware and software resources of a computer.
It is responsible for tasks such as memory management, file management, and process management.

34. Solution: Corel Draw is a popular illustration programme. It is a graphic designing software
developed by Corel Corporation to create vector graphics, such as logos, posters, flyers,
brochures, etc. It is part of the CorelDRAW Graphics Suite, which also includes other
applications for photo editing, web design, animation, and more.

35. Solution: Follies and mistakes are general terms for errors, while spam is unsolicited
electronic messages. Bugs are specifically errors in computer programs. The term "bug"
originated in 1947 when a moth was found to have gotten into the circuitry of a Harvard Mark
II computer, causing errors in the computations.

36. Solution: A computer is an electronic device that can store, retrieve and process both
qualitative and quantitative data quickly and accurately.

37. Solution: 'Micro Processing' is made for Digital System. Microprocessors are integrated circuits
designed to perform the functions of a central processing unit (CPU) in a computer. They are
responsible for executing instructions and performing calculations in computer systems.
Microprocessors are the key components in computers and play a vital role in processing and
controlling data.

IFAS Publications
www.ifasonline.com
103
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

38. Solution: HTML is primarily used to design web pages. It is a markup language that is used to
structure the content and layout of a web page. With HTML, you can define the structure of the
page, create headings, paragraphs, lists, insert images, links, and format text. HTML provides the
basic building blocks for creating web pages and is the foundation of the World Wide Web. While
HTML can be used to design entire websites, it is mainly focused on creating the individual pages
that make up a website.

39. Solution: Tally, an accounting software was developed by the multinational company TCS - Tata
Consultancy Services.
Bharat Goenka, son of Shyam Sundar Goenka, founded Tally Solutions in 1986 to simplify his father's
business of supplying raw materials and machine parts to plants and textile mills in southern and
eastern India. The software he developed, Tally, has since become extremely popular in India and
many parts of the world.

40. Solution: Information that combines graphics, text, sound, video, and animation is referred to as
multimedia. The term "multimedia" represents the integration of different media elements to
deliver a rich and interactive user experience. It allows for the presentation and communication
of information using various formats and modalities, enhancing the overall engagement and
understanding for the audience.

Exam Year – 2009


41. Solution: The first company to launch mobile phone services in India was BPL Mobile. BPL
Mobile, now known as Loop Mobile, started its mobile services in Mumbai (formerly known as
Bombay) in 1995. It was the first company to introduce mobile telecommunications services in
the country, marking the beginning of the mobile revolution in India.

42. Solution: In order to put your web pages on the World Wide Web (WWW), you need to have a
connection to the internet, a web browser, and a web server.
A connection to the internet is required so that your web pages can be accessed by people all over the
world.
A web browser is a software program that allows you to view web pages.
A web server is a computer that stores your web pages and makes them available to people who visit
your website.
Without all three of these things, you cannot put your web pages on the WWW.

43. Solution: A compiler is a software tool that is used to convert high-level language programs
into object code or machine code that can be directly executed by the computer's hardware.
High-level languages such as C, C++, Java, and Python are designed to be more human-readable
and programmer-friendly. The compiler takes the source code written in a high-level language
and translates it into a low-level language, which is usually in the form of machine code specific
to the target computer architecture.

44. Solution: A CPU, or central processing unit, is a processor that is responsible for carrying out
instructions and performing calculations. It is not a network device, as it does not connect
computers to each other.
Routers, switches, and hubs are all network devices that connect computers to each other. They
allow computers to share data and resources.

45. Solution: A binary tree is not a linear data structure because it does not follow a linear
arrangement of elements. In a binary tree, each node can have at most two children, referred to
as the left child and the right child. The structure of a binary tree resembles a hierarchical

IFAS Publications
www.ifasonline.com
104
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

organization, where nodes are connected in a branching pattern. This is in contrast to linear
data structures like arrays, queues, and stacks, where elements are arranged sequentially in a
linear fashion.

46. Solution: The term bit stands for binary digit. It is the smallest unit of data in a computer. A
bit can have one of two values: 0 or 1.
Bits are used to represent data in computers. For example, a byte is a group of 8 bits, and it can
represent a character, such as a letter or a number.

47. Solution: Among the given options, a terabyte (TB) is the largest unit of storage. The storage
capacity hierarchy is typically represented as follows, from smallest to largest:
1 bit (b) < 1 byte (B) < 1 kilobyte (KB) < 1 megabyte (MB) < 1 gigabyte (GB) < 1 terabyte (TB)

48. Solution: Information retrieval is a process of obtaining information from a collection of data
or documents. It involves searching, indexing, and retrieving relevant information based on
user queries. While information retrieval systems can have security measures in place to
protect the confidentiality and integrity of the data, it is not directly related to information
security on the Internet.
On the other hand, options (1) Data Encryption, (2) Watermarking, and (3) Data Hiding are all
techniques related to information security on the Internet.

49.

Exam Year – 2010


50. Solution: Google is a search engine and a company known for its search engine and online
services. It is not an operating system like Windows, Linux, or Mac. Windows, Linux, and Mac are
all operating systems used on computers.

51. Solution: An operating system (OS) is a software that manages computer hardware and software
resources and provides common services for computer programs. It is a vital component of a
computer system, without an operating system, a computer would not be able to function.
Microsoft Windows is a popular operating system developed by Microsoft. It is used on a wide range
of personal computers (PCs) and servers. Windows provides a graphical user interface (GUI) that
allows users to interact with the computer using icons, menus, and dialog boxes.

52. Solution: An IP address (Internet Protocol address) is a unique identifier assigned to each
device on a network. It is a 32-bit (IPv4) or 128-bit (IPv6) number that is used to route data
packets across the internet.

53. Solution: S/MIME stands for Secure Multipurpose Internet Mail Extension. It is a security
protocol used in Internet technology to provide encryption and digital signing of email
messages. S/MIME ensures the confidentiality, integrity, and authentication of email
communications by encrypting the content and attaching digital signatures to verify the
sender's identity and the integrity of the message.

54. Solution: An operating system (OS) is a software program that manages the hardware and
software of a computer. It is responsible for tasks such as:
Managing the memory: The operating system allocates memory to different programs and ensures
that no program uses more memory than it needs.
Managing the processor: The operating system decides which program gets to use the processor and
for how long.

IFAS Publications
www.ifasonline.com
105
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Managing the files: The operating system keeps track of where files are stored on the disk and how
they are named.
Managing the input and output devices: The operating system allows users to interact with the
computer through the keyboard, mouse, and other input devices.
Managing the system resources: The operating system ensures that all of the computer's resources,
such as memory, processor, and storage, are used efficiently.

55. Solution: The prefix "giga" represents a factor of 1024 (2^10), so a gigabyte consists of 1024
megabytes (MB) or 1024^2 kilobytes (KB). Each kilobyte consists of 1024 bytes. Therefore, 1
gigabyte is equal to 1024 megabytes, 1024^2 kilobytes, or 1024^3 bytes.
Hence, 1 GB is equal to 1,073,741,824 bytes, or more precisely, 2^30 bytes.
56. Solution: To find the binary equivalent of (-15) in the 2's complement system, we follow these
steps:
Convert the positive value of the number (15) into binary:
15 (decimal) = 00001111 (binary)
Invert all the bits of the binary representation:
Inverting 00001111 gives 11110000.
Add 1 to the inverted binary representation:
11110000 + 1 = 11110001
Therefore, the binary equivalent of (-15)10 in the 2's complement system is 11110001. Hence, the
correct answer is option (1) - 11110001.

57. Solution: The hexadecimal number system is a base-16 number system, which means that it
uses 16 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. The hexadecimal number system is often
used in computer programming because it is a convenient way to represent binary numbers.

58. Solution: Infotech India Ltd. is not an Internet Service Provider (ISP). It is a software company
that provides IT solutions.
The other options are all ISPs.
MTNL (Mahanagar Telephone Nigam Limited) is a state-owned telecommunications company that
provides internet services in India.
BSNL (Bharat Sanchar Nigam Limited) is a state-owned telecommunications company that provides
internet services in India.
ERNET India (Educational and Research Network India) is a non-profit organization that provides
internet services to educational and research institutions in India.

Exam Year – 2011


59. Solution: HTML stands for Hypertext Markup Language. It is the standard markup language
used for creating and structuring web pages on the internet. HTML uses a set of tags to define
the structure and presentation of content on a web page, such as headings, paragraphs, links,
images, and more.
60. Solution: DNS stands for Domain Name System. It is a system used to translate domain names
into IP addresses. When you type a domain name into a web browser, the DNS system is
responsible for resolving that domain name into the corresponding IP address of the server
where the website is hosted. This allows you to access websites by their easy-to-remember
domain names instead of typing the numerical IP addresses.

61. Solution: In signed magnitude representation, the leftmost bit represents the sign of the
number. If it is 0, the number is positive, and if it is 1, the number is negative. The remaining bits
represent the magnitude of the number.

IFAS Publications
www.ifasonline.com
106
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

To find the binary equivalent of (-19)10 in signed magnitude representation, we follow these steps:
Convert the absolute value of the number (19) to binary: 10011.
Determine the sign of the number: Since it is negative, the leftmost bit will be 1.
Combine the sign bit and the magnitude: 10010011.
Therefore, the binary equivalent of (-19)10 in signed magnitude system is (3) 10010011.

62. Solution: The octal number system is a base-8 number system, which means that it uses 8 digits:
0, 1, 2, 3, 4, 5, 6, and 7. The octal number system is often used in computer programming because
it is a convenient way to represent binary numbers.

63. Solution: Ethernet, Token Ring, and FDDI are all types of LANs.
Ethernet is the most common type of LAN. It uses a bus topology and CSMA/CD (Carrier Sense
Multiple Access with Collision Detection) to control access to the network.
Token Ring uses a ring topology and token passing to control access to the network.
FDDI (Fiber Distributed Data Interface) is a high-speed LAN that uses fiber optic cables. It is often
used in enterprise networks.

64. Solution: IPv4 addresses are 32 bits long, while IPv6 addresses are 128 bits long. This means
that IPv6 addresses can represent a much larger number of devices than IPv4 addresses.

65. Solution: DNS stands for Domain Name System. It is a hierarchical naming system for
computers, services, and other resources connected to the Internet or other networks. It
associates various information with domain names assigned to each of the participating
entities.

66. Solution: lets convert all the number to decimal number system
(1) (1111) 2 = 15
(2) (1111) 8 = 585
(3) (1111) 10 = 1111
(4) (1111) 16 = 4369
So (1111) 2 is the smallest number.

67. Solution: The term 'SITE' stands for Satellite Instructional Television Experiment. It refers to
a project that was initiated in India in 1975 to provide educational television programs via
satellite to remote and rural areas of the country. The aim of the project was to use television
as a medium for delivering instructional content and promoting education in areas where
traditional methods of education were not easily accessible.

68. Solution: The term "photo bleeding" typically refers to a printing issue rather than a specific
action or adjustment related to photos. It occurs when ink or color from a printed photo
extends beyond its intended boundaries, causing smudging or blurring of the image. This can
happen when the printer's settings are not properly calibrated or when the image resolution is
low, leading to poor print quality.

69. Solution: HTML (Hypertext Markup Language) is a markup language used for creating the
structure and content of web pages. It is the standard language for building websites and is
supported by all web browsers. HTML allows you to define the elements and formatting of a web
page, such as headings, paragraphs, links, images, tables, and more.

IFAS Publications
www.ifasonline.com
107
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

70. Solution: A compiler is a software tool that translates the source code written in a high-level
programming language into machine code, which is the low-level language understood by the
computer's hardware. The compiler analyzes the code, performs optimizations, and generates
an executable program that can be executed directly by the computer.

Exam Year – 2012


71. Solution: To store any 3-digit decimal number, a minimum of 10 bits is required.
In decimal representation, the maximum value of a 3-digit number is 999, which can be represented
as 1111100111 in binary.
Since the binary system uses a base of 2, each bit can represent two values (0 or 1). Therefore, to
represent a maximum value of 999, we need 10 bits.

72. Solution: Microsoft Office is not a programming language, but a suite of productivity
applications that includes programs like Word, Excel, PowerPoint, and others. These programs
are used for creating documents, spreadsheets, presentations, and other office-related tasks.
Programming languages like Pascal, Java, and C++ are used for writing code and developing
software applications.

73. Solution: ASCII stands for American Standard Code for Information Interchange. It is a
character encoding standard that assigns a unique number to each character. ASCII is used to
represent text in computers, telecommunications equipment, and other devices.

74. Solution: Conferences are meant for multiple target groups, group discussions, and
showcasing new research. They are a great way to share ideas, learn from others, and network
with people who share your interests.

75. Solution:

76. Solution: A personal computer (PC) consists of various components, including the central
processing unit (CPU), memory, storage devices, input/output devices, and more. These
components are connected together and mounted on a circuit board called the motherboard.

77. Solution: ALU stands for Arithmetic Logic Unit. It is a digital circuit that performs arithmetic
and logic operations on binary numbers. ALUs are a fundamental part of most computers, and
they are used in a wide variety of applications.

78. Solution:

79. Solution: In Microsoft Office 2007 and later versions, the default file extension for MS-Word
documents is .docx. The "x" in .docx signifies that the document is saved in the XML-based file
format introduced in Office 2007. This new file format offers several advantages over the
previous .doc format, including improved data recovery, smaller file sizes, and better
compatibility with other software applications.

80. Solution: A computer virus is a type of malicious software that can replicate itself and spread
from computer to computer. Viruses are often attached to files or programs, and they can be
activated when the file or program is opened. Viruses can damage files, steal data, or even take
control of a computer.

Exam Year – 2013


IFAS Publications
www.ifasonline.com
108
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

81. Solution: A Gigabyte (GB) is equal to 1024 Megabytes (MB) = 2 10 MB = 2 20 KB = 2 30 Bytes

82. Solution: A hard disk is divided into tracks, which are further subdivided into sectors. A sector
is the smallest unit of storage on a hard disk. Each sector is 512 bytes in size.

83. Solution: The acronym www stands for World Wide Web. It is a global information system
that is accessed via the Internet. The World Wide Web was invented in 1989 by Tim Berners-
Lee at CERN, Geneva, Switzerland.
The World Wide Web is a system of interlinked hypertext documents accessed via the Internet.
Hypertext is a way of linking documents together so that users can jump from one document to
another by clicking on links.

84. Solution: Virtual memory is a memory management technique used by operating systems to
provide the illusion of having more memory than is physically available. It is a combination of the
computer's physical memory (RAM) and secondary storage (usually a hard disk). The operating
system uses virtual memory to allocate and manage memory resources for running programs.

85. Solution: CLASS stands for "Computer Literacy and Studies in Schools."
CLASS is a term used to describe a program or initiative focused on promoting computer literacy
and integrating computer studies into school curricula. It aims to provide students with essential
computer skills and knowledge necessary for the digital age.

86. Solution: GIF stands for Graphics Interchange Format. It is a bitmap image format that was
developed by CompuServe in 1987. GIFs are popular because they can be compressed to a
small size without losing too much quality. This makes them ideal for sharing on the internet.

87. Solution: Firefox is not an operating system. It is a popular web browser developed by Mozilla
Foundation. Web browsers like Firefox are software applications that allow users to access and
view websites on the internet, but they are not operating systems.

88. Solution:

Exam Year – 2014


89. Solution: FTP stands for File Transfer Protocol. It is a standard network protocol used to
transfer files between computers over a network, such as the internet. FTP is a reliable and
efficient way to transfer files, and it is supported by most operating systems.

90. Solution: "202.50.20.148" is a valid IP address format. It consists of four sets of numbers
separated by periods. Each set can have a value between 0 and 255, representing the specific
address of a device on a network.

91. Solution: IP addresses are logical addresses, while MAC addresses are physical addresses. MAC
addresses are assigned to network interfaces by the manufacturer, while IP addresses are
assigned by a network administrator.
The other options are all physical addresses.

92. Solution: The BIOS is a firmware stored on a ROM chip on the computer's motherboard. It
contains the basic instructions necessary to initialize hardware components and start the booting
process of the computer. During the boot process, the BIOS is loaded from the ROM into the
computer's memory (RAM) to be executed.

IFAS Publications
www.ifasonline.com
109
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

93. Solution: The first web browser is called WorldWideWeb, later renamed Nexus. It was developed
by Sir Tim Berners-Lee and introduced in 1990. The browser was created to access and navigate
the World Wide Web, which was also invented by Sir Tim Berners-Lee. WorldWideWeb was a
text-based browser that allowed users to view and follow hyperlinks, accessing different web
pages hosted on the internet. It laid the foundation for modern web browsing and the
development of subsequent web browsers.

94. Solution: GUI stands for Graphical User Interface, which is a user interface that allows users to
interact with electronic devices through graphical elements such as icons, windows, and menus.
It is not a file format but rather a concept or interface design.

95. Solution: Although publishing, securing, and changing a photograph are relatively easy tasks,
decoding a photograph is not as straightforward. This is because photographs are made up of
numerous pixels, each with its own unique characteristics.

96. Solution: GIF stands for Graphics Interchange Format. GIFs are used to store images that are
made up of a limited number of colors. GIFs are often used for animated images, such as those
used on websites.
JPG stands for Joint Photographic Experts Group. JPGs are used to store images that have a large
number of colors. JPGs are often used for photographs and other images that need to be displayed with
a high degree of accuracy.
BMP stands for Bitmap. BMPs are used to store images that are made up of pixels. BMPs are often
used for images that need to be displayed with a high degree of accuracy, such as those used in
computer graphics.
PNG stands for Portable Network Graphics. PNGs are used to store images that have a large number of
colors and that need to be displayed with a high degree of accuracy. PNGs are often used for images
that are used on the web, as they can be compressed without losing quality.

97. Solution: CSS stands for Cascading Style Sheets. It is a stylesheet language used to describe the
presentation and formatting of a document written in HTML (Hypertext Markup Language). CSS
allows web developers to separate the content of a web page from its visual presentation, making
it easier to style and control the layout of web pages.

98. Solution: The hexadecimal number system is a type of number system that represents
numbers using a base of 16. It uses 16 symbols to represent the values from 0 to 15. These
symbols are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F.

Exam Year – 2015


99. Solution: To find the binary equivalent of the decimal number 25, we can use the process of
division by 2.
Step 1: Divide 25 by 2:
25 ÷ 2 = 12 remainder 1
Step 2: Divide the quotient from the previous step (12) by 2:
12 ÷ 2 = 6 remainder 0
Step 3: Divide the new quotient (6) by 2:
6 ÷ 2 = 3 remainder 0
Step 4: Divide the new quotient (3) by 2:
3 ÷ 2 = 1 remainder 1
Step 5: Divide the final quotient (1) by 2:
1 ÷ 2 = 0 remainder 1
Now, read the remainders from the last to the first to obtain the binary equivalent.

IFAS Publications
www.ifasonline.com
110
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Therefore, the binary equivalent of the decimal number 25 is 11001.

100. Solution: Google Talk, also known as Google Chat, was an instant messaging service developed
by Google. It allowed users to send instant messages, have voice and video calls, and share files
with other users. However, it is important to note that Google Talk has been discontinued and
replaced by Google Hangouts. Google Hangouts provides similar instant messaging and video call
functionality.

101. Solution: Internet Explorer is a proprietary software developed and distributed by Microsoft.
Proprietary software is software that is owned by a single company and is not available for free
or for modification by the public.
The other options are open source software. Open source software is software that is developed and
distributed under an open source license. Open source licenses allow anyone to use, modify, and
redistribute the software.

102. Solution: A kilobyte is approximately 1,000 bytes, a megabyte is approximately 1 million bytes, a
gigabyte is approximately 1 billion bytes, and a terabyte is approximately 1 trillion bytes.

103. Solution: A keyboard is an input device, not an output device. Input devices are used to enter
data into a computer, while output devices are used to display data from a computer.
The other options are output devices. Printers, speakers, and monitors are all used to display data from
a computer.

104. Solution: Encryption is the process of encoding data so that it cannot be read by unauthorized
parties. The encoded data is called ciphertext. Encryption is often used to protect data that is
transmitted over a network, such as credit card numbers and passwords.

105. Solution: A monitor is an output device, not an input device. Input devices are used to enter
data into a computer, while output devices are used to display data from a computer.

106. Solution: A bit is the basic unit of information in computing and can have two possible values:
0 or 1. A byte, on the other hand, is a group of 8 bits, and it is the fundamental unit of storage in
computer systems.

107. Solution: The National Mission on Education through Information and Communication
Technology (NMEICT) is a centrally sponsored scheme by the Government of India to leverage
the potential of ICT, in the teaching and learning process for the benefit of all the learners in
Higher Education Institutions in any time any where mode. It was launched in 2011.

108. Solution: A stipulative definition is a definition that deliberately assigns a meaning to some
symbol. This type of definition is often used in mathematics and logic, where it is important to
have precise definitions.

109. Solution: Mail merge is a feature in Microsoft Word that enables you to create personalized
letters, emails, envelopes, or labels by combining a single document template with a data source.
It allows you to send the same letter to different recipients while customizing specific
information, such as names, addresses, and other details.

110. Solution: WhatsApp, Google Talk, and Viber are all instant messaging applications. They allow
users to send and receive messages, photos, videos, and other files in real time.
Instant messaging applications are a popular way to communicate with friends and family. They are
also often used for business purposes, such as customer service and collaboration.

IFAS Publications
www.ifasonline.com
111
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

111. Solution: The answer is (3) Mozilla Firefox.


Mozilla Firefox is an open source web browser developed by the Mozilla Foundation and its
community. It is available for free download and use.
The other options are not open source software.
MS Word is a proprietary word processing software developed and distributed by Microsoft.
Windows is a proprietary operating system developed and distributed by Microsoft.
Acrobat Reader is a proprietary PDF reader developed and distributed by Adobe Systems.

112. Solution: The report was published in 1996 and is considered a landmark document in the
field of education. It was commissioned by UNESCO and chaired by Jacques Delors, a former
French Prime Minister. The report outlined four pillars of learning that are essential for lifelong
learning:
Learning to know: This involves acquiring knowledge and skills that are essential for participating
in society.
Learning to do: This involves developing the skills and abilities that are needed for employment.
Learning to live together: This involves developing the skills and understanding that are needed to
live and work together in a diverse society.
Learning to be: This involves developing the individual's personality and sense of self-worth.

Exam Year – 2016


113. Solution: The statement "the study, design, development, implementation, support or
management of computer-based information systems, particularly software applications and
computer hardware" refers to Information Technology (IT).

114. Solution: ASCII stands for American Standard Code for Information Interchange. It is a
character encoding standard that assigns unique numeric codes to represent characters used in
electronic communication and computing. ASCII uses 7 bits to represent a character, allowing
for a total of 128 different characters.

115. Solution: ROM stands for Read Only Memory, and it is a type of memory circuitry that holds
the computer's start-up routine or firmware. It contains pre-programmed data that cannot be
modified or erased by normal computer operations.
HTTP is a protocol that allows communication and transfer of data over the internet. It is the
foundation of data communication for the World Wide Web. When you enter a URL (Uniform
Resource Locator) in a web browser, it sends an HTTP request to the server hosting the website you
want to access.

116. Solution: To find the binary equivalent of the decimal number 51, we can use the process of
division by 2.
Step 1: Divide 51 by 2:
51 ÷ 2 = 25 remainder 1
Step 2: Divide the quotient from the previous step (25) by 2:
25 ÷ 2 = 12 remainder 1
Step 3: Divide the new quotient (12) by 2:
12 ÷ 2 = 6 remainder 0
Step 4: Divide the new quotient (6) by 2:
6 ÷ 2 = 3 remainder 0
Step 5: Divide the final quotient (3) by 2:
3 ÷ 2 = 1 remainder 1
Step 6: Divide the last quotient (1) by 2:

IFAS Publications
www.ifasonline.com
112
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

1 ÷ 2 = 0 remainder 1
Now, read the remainders from the last to the first to obtain the binary equivalent.
Therefore, the binary equivalent of the decimal number 51 is 110011.

117. Solution: Worm is a type of malware that can replicate itself and spread from computer to
computer.
Virus is a type of malware that can attach itself to a file and spread when the file is opened.
Threat is a general term that can refer to any malware, including worms, viruses, and other types of
malicious software.
Spam is an unsolicited email message sent to many recipients at once.

118. Solution: Burning is the process of copying files to a CD-ROM. The files are written to the CD-
ROM using a laser, which creates permanent pits and lands on the disc. Burning is a common way
to distribute software, music, and other data.

119. Solution: HTTP stands for Hypertext Transfer Protocol.

120. Solution: Volatile memory refers to a type of computer memory that requires power to retain
stored data. When the power supply is turned off or interrupted, the data stored in volatile
memory is lost. RAM is an example of volatile memory as it temporarily holds data that can be
read from or written to by the computer's processor.

121. Solution:
The answer is (2) Web Browser.
A web browser is a software application that allows users to access and view web pages. Web browsers
are used to navigate through the World Wide Web (WWW), which is a collection of websites that are
linked together.
Some popular web browsers include:
Google Chrome
Mozilla Firefox
Apple Safari
Microsoft Edge … etc.

122. Solution: 1024 TB = 1024 * (2^40) bytes


= (2^10) * (2^40) bytes
= 2^(10+40) bytes
= 2^50 bytes
To convert the result to bits, we multiply the number of bytes by 8:
2^50 bytes * 8 bits/byte = 2^50 * 8 bits
= 2^53 bits

123. Solution: In the context of email, "Bcc" stands for "Blind Carbon Copy." When you send an email
using the Bcc field, the recipients in the "To" and "Cc" fields will not be able to see the email
addresses of the recipients in the Bcc field. It allows you to send a copy of the email to multiple
recipients without revealing their identities to each other.

124. Solution:
I. ICT are the main instruments for the creation of computer networks and the applications based on
them. ICT encompasses a wide range of technologies, including computers, software, and
networking infrastructure, which are essential for establishing and maintaining computer networks
and developing applications that rely on them.

IFAS Publications
www.ifasonline.com
113
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

II. ICT support the spread of information and knowledge, separating the content from the place where it
belongs physically. ICT enables the storage, retrieval, and dissemination of information and
knowledge in digital formats, allowing them to be accessed and shared remotely without being tied
to a specific physical location.

Exam Year – 2017


125. Solution: The acronym DVD stands for Digital Versatile Disc.
A DVD is a digital optical disc data storage format. The medium can store any kind of digital data
and has been widely used for video programs (watched using DVD players) or formerly for storing
software and other computer files as well. DVDs offer significantly higher storage capacity than
compact discs (CD) while having the same dimensions. A standard DVD can store up to 4.7 GB of
storage, while variants can store up to a maximum of 17.08 GB.
126. Solution: The computer memory types in order of highest to lowest speed are: CPU Registers,
Cache Memory, Main Memory (RAM), and Secondary Storage. CPU registers is the fastest and
closest to the CPU, followed by Cache memory. Main memory (RAM) is slower but has a larger
capacity, and secondary storage is the slowest and used for long-term storage.

127. Solution: Statement S1 is false. In the hexadecimal system, the number 11 represents the
decimal value 17, while in the decimal system, 11 represents the decimal value 11. Therefore,
11 in decimal is smaller than 11 in hexadecimal.
Statement S2 is also true. In the binary number 1110.101, the fractional part can be converted to
decimal by adding up the decimal values of each binary digit. In this case, the fractional part can be
calculated as follows:
1/2 + 0 + 1/8 = 0.5 + 0 + 0.125 = 0.625

128. Solution: Mail merge is a feature in word processing software that allows you to combine static
information in a publication with variable information in a data source to create one merged
publication. The static information is the text that does not change, such as the name of the
company or the address of the recipient. The variable information is the text that changes, such
as the name of the recipient or the amount of their order.

129. Solution: Web2.0 applications are a second generation of web applications that emphasize user-
generated content, ease of use, and participatory culture. They are often built on open standards
and allow users to interact with each other and with the application itself in new ways.

130. Solution: Statement I states that Information and Communication Technology (ICT) is
considered a subset of Information Technology (IT). This statement is correct as ICT is a
broader term that encompasses the use of technology for communication and information
management, while IT specifically refers to the use of technology for managing and processing
information.
Statement II states that the 'right to use' a piece of software is termed as copyright. This statement
is incorrect. Copyright refers to the legal protection of creative works, such as software, against
unauthorized copying and distribution. The 'right to use' a piece of software is typically governed by
software licenses, which may include terms and conditions for usage but are not equivalent to
copyright.

131. Solution: Gigabytes (GB) is a unit of digital storage commonly used to measure the capacity of
computer systems, storage devices, and files. One gigabyte is equivalent to 1,073,741,824 bytes.
Since one character typically occupies one byte of storage, a gigabyte can hold approximately
one billion characters.

IFAS Publications
www.ifasonline.com
114
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

132. Solution: The full form of USB as used in computer related activities is Universal Serial Bus.
USB is a standard that defines the physical and electrical interface between computers and
peripheral devices. It is a serial bus, which means that data is transferred one bit at a time. USB is a
very versatile standard and is used to connect a wide variety of devices to computers, including
keyboards, mice, printers, scanners, and external hard drives.

133. Solution: The .com domain is the most popular domain extension for commercial businesses.
It is short for "commercial" and is used by businesses of all sizes, from small startups to large
corporations.

134. Solution: A URL stands for Uniform Resource Locator. It is the address of a webpage on the
Internet. A URL typically includes the following components:

135. Solution: Bits: The basic unit of information in computing, representing a binary digit (0 or 1).
Bytes: A group of 8 bits, which is the fundamental unit of storage in most computer systems.
Fields: A collection of related data elements or attributes that make up a unit of information.
Records: A collection of related fields that represent a complete set of information about an entity or
object.
Files: A collection of related records grouped together for storage and retrieval purposes.
Databases: A collection of related files that are organized and managed using a database management
system (DBMS).

Exam Year – 2018


136. Solution: ICT stands for Information and Communication Technology. It is a broad term that
encompasses all aspects of using technology to create, store, manage, and exchange
information. ICT includes the use of computers, software, telecommunications, and other
technologies.
The merging of audio-visual, telephone and computer networks through a common cabling system is
an example of converging technologies that exemplify ICT. This convergence of technologies has
led to the development of new applications and services, such as video conferencing, online gaming,
and cloud computing.
The statement P is false because ICT does not stand for Indian Classical Technology. ICT is a global
term that is used to describe the use of technology to communicate and share information.

137. Solution: To: ram@test.com (Swami will be able to see this email address as it is in the "To"
field.)
Cc: raj@test.com; ravi@test.com (Swami will also be able to see these email addresses as they are in
the "Cc" field.)
Bcc: The email addresses in the Bcc field, which are swami@test.com and rama@test.com, will not be
visible to Swami. Bcc stands for "Blind Carbon Copy," and it is designed to hide the email addresses
from recipients in the To and Cc fields. Recipients in the Bcc field will receive the email, but they will
not be able to see the other recipients' email addresses.
Therefore, Swami will be able to see the email addresses in the To and Cc fields but not the ones in the
Bcc field.

138. Solution: Bit (short for binary digit) is the smallest unit of storage, representing a single binary
value of either 0 or 1.
Byte is the basic unit of storage in most computer systems, consisting of 8 bits.
Kilobyte (KB) is equal to 1024 bytes.
Megabyte (MB) is equal to 1024 kilobytes.
Gigabyte (GB) is equal to 1024 megabytes.

IFAS Publications
www.ifasonline.com
115
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Terabyte (TB) is equal to 1024 gigabytes.

139. Solution: Volatile memory is memory that loses its contents when the power is turned off.
Read Only Memory (ROM) is memory that can only be read from, not written to. It is used to store the
computer's BIOS (Basic Input/Output System).
Random Access Memory (RAM) is memory that can be read from and written to. It is used to store the
data and instructions that the computer is currently using.
Secondary Memory is memory that is not directly accessible by the CPU. It is used to store data and
instructions that are not currently being used by the computer.
Statement P is FALSE because ROM is non-volatile memory. Statement R is FALSE because
secondary memory is non-volatile memory.

140. Solution: Solid State Drives (SSDs) are a type of storage device that uses flash memory to store
data. Flash memory is much faster and more power-efficient than traditional hard drives, which
are made up of spinning disks and magnetic heads.

141. Solution: A SIM card, or Subscriber Identity Module card, is a small, removable smart card
used in mobile phones and other cellular devices. It serves as the unique identifier for a
subscriber on a mobile network. SIM cards store important information such as the user's
mobile number, network authentication details, contact lists, and other data.

142. Solution: A message beneath a message is called sub-text. It is a message that is hidden within
another message. The sub-text may be intended for a specific audience, or it may be hidden for
other reasons.
For example, a politician may give a speech that has a clear message, but the sub-text of the speech
may be intended for a specific group of people. The sub-text may be more subtle than the main
message, and it may be hidden in the way that the politician uses language.

143. Solution: Laser printers use dry ink powder, also known as toner, to create images on paper. The
toner is heated and then transferred to the paper, where it bonds to the paper's surface.
Inkjet printers use liquid ink, while dot matrix printers use a print head that strikes an inked ribbon
against the paper. Thermal printers use heat to create images on paper.

144. Solution: Application software is software that is designed to perform a specific task. For
example, a word processor is an application software.
Web servers are computers that host websites. They store the files that make up a website and deliver
them to users when they request them.
System software is software that is essential for the operation of a computer. It includes the operating
system, drivers, and utilities.
Browsers are application software that allow users to view web pages. They are used to navigate the
internet and access websites.
Internet Explorer, Mozilla Firefox, and Opera are all browsers. They are used to view web pages on the
internet.

145. Solution: Firewalls are network security devices or software applications that monitor and
control incoming and outgoing network traffic. They act as a barrier between a trusted internal
network and an untrusted external network, such as the internet. The primary purpose of a
firewall is to filter and block unauthorized access to a computer or network.

146. Solution: Primary storage is the main memory of a computer. It is used to store data and
instructions that are currently being used by the CPU. Secondary storage is used to store data and
instructions that are not currently being used by the CPU.

IFAS Publications
www.ifasonline.com
116
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Primary storage is faster than secondary storage because it is located closer to the CPU. Secondary
storage is less expensive than primary storage because it provides slower access.

147. Solution: To convert the decimal number 17 into its binary equivalent, we can use the process of
division by 2.
Step 1: Divide 17 by 2:
17 ÷ 2 = 8 remainder 1
Step 2: Divide the quotient from the previous step (8) by 2:
8 ÷ 2 = 4 remainder 0
Step 3: Divide the new quotient (4) by 2:
4 ÷ 2 = 2 remainder 0
Step 4: Divide the new quotient (2) by 2:
2 ÷ 2 = 1 remainder 0
Step 5: Divide the final quotient (1) by 2:
1 ÷ 2 = 0 remainder 1
Now, read the remainders from the last to the first to obtain the binary equivalent.
Therefore, the binary equivalent of the decimal number 17 is 10001.

Exam Year – 2019


148. Solution: LCD technology is commonly used in electronic devices such as laptops,
smartphones, and televisions. It refers to a display technology that utilizes liquid crystals to
produce images or text on a flat panel.

149. Solution: A LAN is a network that covers a small geographical area, typically within a building
or a group of buildings. It connects computers and devices in close proximity to facilitate
communication and resource sharing. LANs are commonly used in homes, offices, schools, and
other similar environments.

150. Solution: A Virtual Learning Environment (VLE) is a software tool that is used to deliver
courses online. VLEs typically include features such as:
Course management: VLEs allow teachers to create and manage courses, including adding content,
assignments, and quizzes.
Communication: VLEs allow students and teachers to communicate with each other, either
synchronously or asynchronously.
Collaboration: VLEs allow students to collaborate on projects and assignments.
Assessment: VLEs allow teachers to assess student progress.

151. Solution: Spamming refers to the practice of sending unsolicited and unwanted messages,
typically in large volumes, to a large number of recipients. These messages are usually sent via
email, but can also occur through other forms of electronic communication such as instant
messaging, social media, or online forums.

152. Solution: ROM stands for Read-Only Memory. It's a type of computer memory that can only be
read, not written to. This means that the data stored in ROM is permanent and cannot be
changed.

153. Solution: RAM stands for Random Access Memory. It is a type of computer memory that can
be both read and written to. This means that the data stored in RAM can be changed or updated
as needed.

IFAS Publications
www.ifasonline.com
117
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

154. Solution: PEG is a file format commonly used for storing digital images, particularly
photographs. It is not a video file format.
AVI (Audio Video Interleave), MOV (QuickTime Movie), and MP4 (MPEG-4 Part 14) are all video
file formats. They are used to store and play video content on various devices and platforms.

155. Solution: RAM stands for Random Access Memory. It is a type of computer memory that is
used to store data that the computer is currently using. RAM is volatile memory, which means
that it loses its contents when the power is turned off. This means that RAM is not considered a
form of secondary storage.

156. Solution: RAM (Random Access Memory) is a type of computer memory that is volatile,
meaning its contents are lost when the power is turned off or the computer is restarted. RAM is
used to store data that is actively being used by the computer, including running programs and
open files.

157. Solution: In the evolution of computer generations:


(A) First Generation computers used vacuum tubes.
(B) Second Generation computers replaced vacuum tubes with transistors.
(C) Third Generation computers introduced VLSI microprocessors.
(D) Fourth Generation computers utilized integrated circuits.
These advancements marked significant progress in terms of size, reliability, computing power, and
cost-effectiveness as computer technology evolved over time.

158. Solution: RAM, or random access memory, is the fastest computer component in terms of speed
of access. This is because RAM is located directly on the motherboard and is directly accessible
by the CPU.
USB drives, solid state drives, and hard disk drives are all slower than RAM in terms of speed of
access. This is because they are all external storage devices that must be accessed through the SATA or
PCIe bus.

159. Solution: To: field is used to specify the primary recipients of an email message. These are the
people who will receive the message directly.
Cc: field is used to specify additional recipients who should receive a copy of the message. These
people will receive the message, but their email addresses will be visible to the primary recipients.
Bcc: field is used to specify additional recipients who should receive a blind carbon copy of the
message. These people will receive the message, but their email addresses will not be visible to any of
the other recipients.
The main difference between the Cc: field and the Bcc: field is that the recipients of the Cc: field can
see the email addresses of the other recipients, while the recipients of the Bcc: field cannot see the
email addresses of the other recipients.

160. Solution: Shareware is software that is freely distributed to users on a trial basis. It usually
comes with a time limit and when the time limit expires, the user is asked to pay for the
continued services.
Public domain software is software that is not copyrighted and is therefore free to use and distribute.
Freeware is software that is free to use and distribute, but there is no requirement to pay for it. Open-
source software is software that is distributed with its source code, which means that users can modify
and improve the software.

161. Solution: WYSIWYG refers to a user interface or editor that allows users to see a document or
content exactly as it will appear when it is published or printed. With WYSIWYG, users can edit
and format text, images, and other elements directly on the screen, and the displayed content

IFAS Publications
www.ifasonline.com
118
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

closely resembles the final output. It aims to provide a visual representation of the final
document or content during the editing process.

162. Solution: A worm is a type of computer virus that can replicate itself and spread from one
computer to another over a network or through various communication channels without
requiring any user interaction. Worms are designed to exploit vulnerabilities in computer
systems and use automated methods to propagate themselves. They can spread rapidly and
independently, often causing harm by consuming network resources, compromising data, or
carrying out malicious activities on infected machines.

163. Solution: The binary number 1100110 is equivalent to 12^7 + 12^5 + 02^4 + 02^3 + 12^2 +
12^1 + 0*2^0 = 128 + 32 + 0 + 0 + 4 + 2 + 0 = 102.

164. Solution: Cc: field is used to specify additional recipients who should receive a copy of the
message. These people will receive the message, but their email addresses will be visible to the
primary recipients.
Bcc: field is used to specify additional recipients who should receive a blind carbon copy of the
message. These people will receive the message, but their email addresses will not be visible to any of
the other recipients.

165. Solution: Proprietary system software refers to software that is owned and controlled by a
specific company or organization, and its source code is not publicly available. Microsoft
Windows is an example of proprietary system software as it is developed, licensed, and owned by
Microsoft Corporation. It is a widely used operating system for personal computers and provides
the underlying software framework for managing computer hardware, running applications, and
providing a user interface.

166. Solution: Spyware is a type of malicious software that is designed to collect information about a
person or organization without their knowledge or consent. It is often installed on a computer
without the user's awareness and operates covertly in the background. Spyware can monitor and
track a user's online activities, capture sensitive information such as login credentials or financial
data, and transmit this information to third parties, typically for malicious purposes like identity
theft or targeted advertising.

167. Solution: To convert a decimal number to binary, we divide the number by 2 repeatedly and
write down the remainders in reverse order. For example, to convert 75 to binary, we would do
the following:
75 / 2 = 37, remainder = 1
37 / 2 = 18, remainder = 1
18 / 2 = 9, remainder = 0
9 / 2 = 4, remainder = 1
4 / 2 = 2, remainder = 0
2 / 2 = 1, remainder = 0
The binary equivalent of 75 is therefore 1001011

168. Solution: Bluetooth is a wireless communication technology commonly used for short-range
connections between devices. It is frequently used to connect devices like headsets, smartphones,
tablets, and other peripherals wirelessly. Statement P correctly describes one of the applications
of Bluetooth technology.

169. Solution: A logic bomb is a piece of code that is intentionally inserted into a software system.
The logic bomb will only execute when certain conditions are met. These conditions can be

IFAS Publications
www.ifasonline.com
119
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

anything from a specific date and time to a certain number of login attempts. When the
conditions are met, the logic bomb will execute a malicious function. This malicious function can
be anything from deleting files to crashing the system.

170. Solution: CD-ROM: CD-ROM stands for Compact Disc Read-Only Memory. It has the lowest
storage capacity among the three options mentioned.
DVD-ROM: DVD-ROM stands for Digital Versatile Disc Read-Only Memory. DVDs generally have a
higher storage capacity compared to CDs, making them the medium-capacity option.
Blu-ray: Blu-ray discs have the highest storage capacity among the three options. They are capable of
storing significantly more data compared to CDs and DVDs.
Therefore, the correct order is CD-ROM, DVD-ROM, and Blu-ray in terms of increasing storage
capacity.

171. Solution: In audio and video compression, the term RGB stands for Red, Green, and Blue. These
are the three primary colors that are used to create all other colors. By varying the intensity of
each of these colors, we can create a wide range of colors.

172. Solution: A kilobyte (KB) is equal to 1024 bytes. A megabyte (MB) is equal to 1024 kilobytes. A
gigabyte (GB) is equal to 1024 megabytes. A terabyte (TB) is equal to 1024 gigabytes.

173. Solution: Primary sources are original documents or materials that were created during the time
period that the researcher is studying. They can include things like letters, diaries, photographs,
newspaper articles, and government documents. Primary sources are considered to be the most
reliable sources of information because they provide firsthand accounts of events.

174. Solution: Computers internally store and process data using the binary number system. Binary is
a base-2 number system, meaning it uses only two digits, 0 and 1. In a computer's digital
circuitry, these binary digits, called bits, represent the fundamental units of information.
Computers use binary representation to store and manipulate data, performing calculations
using binary arithmetic operations.

175. Solution: JPEG is a commonly used image compression method developed by the Joint
Photographic Experts Group. It is specifically designed to compress and encode digital images,
representing each frame of an image. JPEG compression reduces the file size of images by
removing redundant or unnecessary information while retaining a visually acceptable level of
image quality. It is widely used for compressing and storing photographic images on computers,
websites, and other digital platforms.

176. Solution: Control Unit: Manages and coordinates the activities of the CPU. It fetches instructions,
decodes them, and directs the flow of data and instructions within the CPU and with other
components.
ALU (Arithmetic Logic Unit): Performs arithmetic and logical operations required for data processing.
It carries out mathematical calculations and logical operations specified by the instructions.
The control unit and ALU work together to process instructions and manipulate data, forming the core
components of the CPU.

177. Solution: 1 KB = 1024 Bytes


960 KB = 960 x 1024 Bytes.

178. Solution: An address book is a database that stores contact information, such as names,
addresses, phone numbers, and email addresses. Address books are typically used to store

IFAS Publications
www.ifasonline.com
120
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

contact information for people that you frequently communicate with, such as friends, family, and
business associates.

179. Solution: A modem (short for modulator-demodulator) is a device that enables a computer to
transmit data over telephone lines. It converts digital signals from the computer into analog
signals that can be transmitted over telephone lines. On the receiving end, the modem converts
the analog signals back into digital signals that the computer can understand. Modems are used
for various purposes, such as connecting to the internet via dial-up connections or establishing
communication between computers over telephone lines.

180. Solution: A computer virus is a computer program that spreads by inserting copies of itself into
other executable code or documents. It is a malicious software that can replicate and spread from
one computer to another, often without the user's knowledge or consent. Viruses can cause
various harmful effects, such as damaging files, disrupting computer operations, and stealing or
manipulating data. They typically attach themselves to legitimate files or programs, and when
those files or programs are executed, the virus is activated and can replicate itself to infect other
files or computers.

181. Solution: Yahoo is not a web browser. Yahoo is an internet company that provides various online
services, including search engine, email, news, and more. While Yahoo does offer a web portal
that includes a search engine and other services, it is not a dedicated web browser like Internet
Explorer, Mozilla Firefox, or Google Chrome. Web browsers are software applications specifically
designed to access and display websites and web content on the internet.

182. Solution: HTTP (HyperText Transfer Protocol) is the protocol that is used to transfer web pages
over the internet. URL (Uniform Resource Locator) is the address of a web page on the internet.
FTP (File Transfer Protocol) is a protocol that is used to transfer files between computers.

183. Solution: A search engine is a software program that allows users to find information on the
internet. Search engines work by crawling the internet and indexing websites. When a user
enters a search query, the search engine returns a list of websites that match the query.

184. Solution: An operating system (OS) is a software that acts as an interface between the user and
the computer hardware. It provides essential functions and services to manage the computer
system efficiently. While the exact features and functionalities of an OS may vary, the statement in
option (3) correctly describes some of the core responsibilities of an operating system.

185. Solution: Phishing is a cybercrime technique where attackers try to deceive individuals or
organizations into providing sensitive information such as passwords, credit card details, or
personal information by pretending to be a trustworthy entity. This is typically done through
fraudulent emails, instant messages, or websites that appear to be from a legitimate source, such
as a bank, social media platform, or online service.

186. Solution: Digital divide is the gap between those who have access to digital technology and
those who do not. It can be caused by a variety of factors, including income, education, and
location.
The digital divide can have a significant impact on people's lives. Those who do not have access to
digital technology may be excluded from opportunities in education, employment, and social
participation.

187. Solution: Gyan Vani is an educational FM radio network in India. It is operated by Indira
Gandhi National Open University (IGNOU) and is dedicated to broadcasting educational content

IFAS Publications
www.ifasonline.com
121
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

and promoting distance education. Gyan Vani radio stations are available in various cities
across India and offer educational programs and resources for students and learners.

188. Solution: A wiki is a system or website that allows users to collaboratively create, edit, and
modify its content and structure. It enables multiple users to contribute and edit the content of
web pages using a web browser interface. Wikis are designed to facilitate collaboration and
knowledge sharing among a group of users.

189. Solution: ICT is an acronym that stands for information and communication technology. So
statement I is false where statement II regarding the support of ICT in learning system is true.

190. Solution: Spreadsheets, such as Microsoft Excel or Google Sheets, are specifically designed for
managing numerical data and performing calculations. They provide built-in formulas and
functions that allow for automatic calculations and analysis of data. Spreadsheets are
commonly used for budgeting, financial planning, and data analysis tasks.

191. Solution: E-governance is the use of information technology (IT) to improve the delivery of
government services to citizens. It can also be used to improve the transparency and
accountability of government.

192. Solution: BHIM (Bharat Interface for Money) is a mobile payment application developed by
NPCI. It allows users to make secure and instant money transfers using UPI. BHIM is widely
used for digital payments in India.

193. Solution: E-business is the use of electronic platforms to conduct a company's business. It
includes all aspects of a business that are conducted online, such as:
E-commerce: The buying and selling of goods and services online.
E-marketing: The use of online platforms to market products and services.
E-procurement: The use of online platforms to purchase goods and services.
E-learning: The use of online platforms to deliver training and education.
E-government: The use of online platforms to deliver government services to citizens.

194. Solution: WORM is a type of optical disc storage that allows data to be written to the disc
once, but can be read many times. WORM discs are often used for archival purposes, as they
can store large amounts of data and are relatively resistant to damage.

195. Solution: Among the given options, the hard disc is the storage device that can store the
maximum amount of data. Hard discs, also known as hard disk drives (HDD), are magnetic
storage devices used in computers and other electronic devices. They consist of multiple
rotating disks coated with magnetic material, and data is stored and retrieved using magnetic
read/write heads.

196. Solution: Data represents raw facts, while Information is processed meaningful data. Data is
unprocessed and does not have any meaning on its own. Information, on the other hand, is data
that has been processed and given meaning.

197. Solution: VDU stands for Visual Display Unit, which refers to the display device or monitor
used to visually present information from a computer. It is also commonly known as a Visual
Display Terminal (VDT) or a monitor.

IFAS Publications
www.ifasonline.com
122
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

198. Solution: WOS stands for Web of Science. It is a citation indexing service that provides access
to bibliographic information and citation data for scientific publications. WOS was originally
produced by Institute for Scientific Information (ISI). It is currently owned by Clarivate.

199. Solution: Bluetooth is a wireless technology that allows electronic devices to communicate
and transfer data over short distances. It operates on radio waves within the frequency range
of 2.4 to 2.485 GHz. Bluetooth technology is commonly built into electronic gadgets such as
smartphones, tablets, laptops, headphones, speakers, and various other devices.

200. Solution: PCI stands for Peripheral Component Interconnect, which is a computer bus
standard used for connecting peripheral devices to a computer's motherboard. It is a high-
speed data transfer interface that allows various components, such as graphics cards, sound
cards, network adapters, and storage devices, to communicate with the computer's CPU and
memory.

201. Solution: Google's web browser is called Chrome. It is the most popular web browser in the
world, with over 65% of the market share. Chrome is a Chromium-based web browser, which
means that it is open source and can be modified by anyone.
Apple's web browser is called Safari. It is the default web browser on Apple's macOS, iOS, and
iPadOS operating systems. Safari is a WebKit-based web browser, which means that it is based on
the open source WebKit rendering engine.
Mozilla Firefox is an open source web browsing software. It is the second most popular web
browser in the world, with over 10% of the market share. Firefox is a Gecko-based web browser,
which means that it is based on the open source Gecko rendering engine.

202. Solution: A web browser is used to connect to websites and display web pages.
A word processor is used to prepare written documents, such as letters, reports, and essays.
A spreadsheet is used to analyze and summarize numerical data, perform calculations, and create
charts.
Web authoring software is used to create and edit web pages, which includes coding and designing
the layout and content of websites.

203. Solution: Bing is a search engine developed by Microsoft. It allows users to search for
information on the internet by entering keywords or queries. Bing provides search results from
a wide range of sources, including web pages, images, videos, news articles, and more. It offers
various features and search enhancements, such as image search, video search, maps, and a
voice search option.

204. Solution: Asynchronous communication is a type of communication where messages or


information are sent and received at different times, eliminating the need for an immediate
response.
Video conferencing, and instant messaging are all examples of synchronous communication, as they
require both parties to be online at the same time in order to communicate.

205. Solution: In the context of computer networking:


(A) VOIP is the use of the internet to make phone calls.
(B) Fibre-optic cable transmits data using light pulses.
(C) URL is the text used by web browsers to locate web addresses on the Internet.
(D) UTP cable is commonly used to connect computers in small buildings.

206. Solution:

IFAS Publications
www.ifasonline.com
123
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(A) 50 in decimal matches with (ii) 1100110 in binary. This is because the decimal number 50 is
equivalent to the binary number 1100110.
(B) 102 in decimal matches with (i) 0110010 in binary. The decimal number 102 is equivalent to the
binary number 0110010.
(C) Real-Time video conferencing matches with (iii) Synchronous communication. Real-time video
conferencing refers to a communication method where participants can interact with each other
instantly, in sync, without any significant delay. Synchronous communication refers to communication
that happens in real-time, where all participants are actively involved at the same time.
(D) SMS texting matches with (iv) Asynchronous communication. SMS texting refers to the exchange
of short text messages using mobile devices. Asynchronous communication refers to communication
that does not happen in real-time and does not require immediate responses. In SMS texting,
participants can send messages at their convenience, and the recipient can respond whenever they are
available.

207. Solution: A GIS is a computer-based system that stores and manipulates data which are viewed
from a geographical point of reference. It is used to analyze spatial data and to create maps and
other visualizations.

208. Solution: The storage capacity of a hard disk is typically much larger than that of a CD-ROM or
DVD-ROM. A typical hard disk can store up to several terabytes of data, while a CD-ROM can store
up to 700 megabytes of data and a DVD-ROM can store up to 4.7 gigabytes of data.

209. Solution: A 32-bit computer uses a binary number system, which means that it uses only two
digits: 0 and 1. This is because the binary number system is the most efficient way to represent
data in a computer.

210. Solution: Interactivity refers to the ability of a system or program to respond to user input in
real-time, creating a dynamic and interactive experience. In the context of a dialogue between a
human-being and a computer program, interactivity means that both parties can exchange
information and respond to each other's messages or actions.

211. Solution: Snail mail is a physical letter that is sent through the postal service. E-mail, on the
other hand, is a digital message that is sent over a computer network.

212. Solution: Ethernet is the most common type of LAN. It uses a shared-media architecture, which
means that all devices on the network share the same transmission medium. Ethernet can be
used over a variety of media, including twisted-pair cable, coaxial cable, and fiber optic cable.
Token Ring is a type of LAN that uses a token-passing architecture. In a token-passing architecture, a
token is passed from device to device on the network. Only the device that holds the token can
transmit data. Token Ring is less common than Ethernet, but it is still used in some businesses.
FDDI is a type of LAN that uses a fiber optic cable. FDDI is a high-speed LAN that can be used to
transmit data over long distances. FDDI is typically used in enterprise networks.

213. Solution: Statement (B) is accurate. A search engine is a specialized software system that is
designed to index and search for information on the World Wide Web. Examples of popular
search engines include Google, Bing, and Yahoo. These search engines crawl web pages, index
their content, and provide users with search results based on their queries.
Statement (A) is incorrect. Software is typically loaded into primary storage (RAM) from secondary
storage (such as a hard drive or solid-state drive) before being executed by the CPU.

214. Solution: The correct order of the components of a URL is protocol, domain name of the host,
path/file.

IFAS Publications
www.ifasonline.com
124
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

A URL (Uniform Resource Locator) is a unique address that identifies a resource on the internet. It is
made up of several components, including the protocol, the domain name of the host, and the path/file.
The protocol is the first part of the URL. It tells the browser what type of resource is being accessed.
The most common protocols are HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer
Protocol Secure).
The domain name of the host is the second part of the URL. It identifies the website or organization
that hosts the resource. Domain names are typically made up of two parts: the top-level domain (TLD)
and the second-level domain (SLD). For example, the domain name for Google is www.google.com.
The TLD is "com," which stands for "commercial," and the SLD is "google."
The path/file is the third part of the URL. It identifies the specific resource on the website or
organization. The path is a directory structure that tells the browser where to find the resource. The file
is the name of the resource. For example, the path/file for the Google homepage is "/".

215. Solution:

216. Solution: Statement (A): RAM (Random Access Memory) is a type of computer memory that
allows for fast access to data. Hard drives, on the other hand, are a type of storage device that is
typically slower than RAM. This is because RAM is volatile memory, which means that it loses its
contents when the power is turned off. Hard drives, on the other hand, are non-volatile memory,
which means that they retain their contents even when the power is turned off.
Statement (B): The hexadecimal number 99 is equivalent to the decimal number 99. Hexadecimal
numbers are base-16 numbers, while decimal numbers are base-10 numbers. This means that each digit
in a hexadecimal number represents a power of 16, while each digit in a decimal number represents a
power of 10. In the case of the hexadecimal number 99, the first digit (9) represents 9 x 16^1 = 144,
and the second digit (9) represents 9 x 16^0 = 9. The sum of these two values is 153.

217. Solution: The clock speed of CPUs has not seen significant increases in recent years due to
technical limitations such as power consumption and heat dissipation. However, the assertion
that software being used is faster and therefore processors do not need to be faster is incorrect.
While software optimization has improved performance, newer software often requires more
processing power to handle increased computational demands. Therefore, faster processors are
still necessary to deliver better performance despite software advancements.

218. Solution: The growing reliance on information technology has led to several major issues, two of
which are security threats and privacy concerns.
B. Security threats: With the increasing use of information technology, the risk of security threats such as
hacking, malware, data breaches, and cyber-attacks has also grown. Organizations and individuals face
challenges in protecting their systems, networks, and sensitive information from unauthorized access
or malicious activities.
C. Privacy concerns: The widespread use of information technology has raised concerns about privacy.
Personal data collected and stored by organizations can be at risk of unauthorized access or misuse.
Privacy concerns arise in various areas, including online activities, data sharing, surveillance, and the
use of personal information by companies and government entities.

219. Solution: Statement (A): The World Wide Web (WWW) is a network of networks that first
started with four computer nodes. The first four computer nodes on the WWW were all located at
the European Organization for Nuclear Research (CERN) in Switzerland. These four nodes were
connected to each other using the Transmission Control Protocol/Internet Protocol (TCP/IP)
protocol.
Statement (B): The WWW is a service that runs on the Internet. The Internet is a global network of
interconnected computer networks. The WWW is a service that allows users to access and share

IFAS Publications
www.ifasonline.com
125
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

information on the Internet. The WWW uses the Hypertext Transfer Protocol (HTTP) protocol to
transfer information between computers.
Therefore, both statements (A) and (B) are correct.

220. Solution: Midi, wav, wma, mp3 are all file formats suitable for distributing sound files across the
internet.
MIDI (Musical Instrument Digital Interface) is a file format that stores digital music data. MIDI files
are typically small in size, making them ideal for distributing sound files over the internet.
WAV (Waveform Audio File Format) is a file format that stores uncompressed digital audio data. WAV
files are typically larger in size than MIDI files, but they offer better sound quality.
WMA (Windows Media Audio) is a file format that stores compressed digital audio data. WMA files
are typically smaller in size than WAV files, but they offer slightly lower sound quality.
MP3 (MPEG-1 Audio Layer III) is a file format that stores compressed digital audio data. MP3 files
are the most common file format for distributing sound files over the internet. They offer a good
balance of sound quality and file size.

221. Solution: Statement A is incorrect. A Local Area Network (LAN) is not usually located on one
brand of computer. A LAN refers to a network of computers and devices that are connected
within a limited geographical area, such as an office building or a home. A LAN can consist of
computers from different brands and operating systems, all connected together to share
resources and communicate.
Statement B is correct. The acronym 'ISP' stands for Internet Service Provider. An ISP is a company or
organization that provides access to the internet for individuals and businesses. ISPs offer various
services, including internet connectivity, email accounts, web hosting, and other related services. They
serve as the bridge between users and the internet, enabling them to connect to and access online
resources.

222. Solution: Formatting is the task associated with changing the appearance of a document in word
processing.
Editing is the task of making changes to the content of a document. This includes tasks such as
correcting spelling and grammar errors, adding or removing text, and rearranging the order of text.
Writing is the task of creating a new document. This includes tasks such as brainstorming ideas,
drafting text, and revising text.
Printing is the task of creating a physical copy of a document. This includes tasks such as selecting the
printer, setting the print settings, and sending the document to the printer.

223. Solution: DVD (Digital Versatile Disc) is a optical disc storage medium designed to store large
amounts of data. DVDs can store up to 4.7 GB of data.
CD-R (Compact Disc-Recordable) is an optical disc that can be written once. CD-Rs can store up to
700 MB of data.
Blu-Ray Disc (BD) is an optical disc that can store up to 25 GB of data. BDs are commonly used for
storing high-definition video.
CD-RW (Compact Disc-ReWritable) is an optical disc that can be written to and erased multiple times.
CD-RWs can store up to 700 MB of data.
The other options contain other types of storage media, such as USB memory sticks and hard disks.

224. Solution: Input devices are devices that allow users to interact with a computer. The options that
contain only computer input devices are:
Keyboard is an input device that allows users to input text and numbers.
Mouse is an input device that allows users to point and click on objects on a computer screen.
Joystick is an input device that allows users to control the movement of an object on a computer
screen.

IFAS Publications
www.ifasonline.com
126
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Digitiser is an input device that allows users to input images and drawings into a computer.

225. Solution: CSV (Comma-Separated Values) is a file format used for storing tabular data, where
each value is separated by a comma. It is commonly used for data exchange between different
applications.
RTF (Rich Text Format) is a file format that allows formatting and styling of text, such as bold, italics,
and underlining. It is widely used for creating and sharing formatted documents.
TXT (Plain Text) is a simple and unformatted text file format. It contains plain text without any special
formatting or styling.

226. Solution: Statement A is correct. The sequence of integers represented in binary as 00111,
01001, 01011, P... is a sequence of increasing binary numbers. The next integer P would be
represented as 01101.
Statement B is also correct. A byte is a binary number consisting of exactly 8 bits. A bit is a single
binary digit, which can have a value of 0 or 1. A byte can represent a value of 0 to 255.

227. Solution: The term "e-Kalpa" is associated with the digital learning environment in the field of
design. The Information and Library Network Centre (INFLIBNET), supported by the National
Mission on Education through ICT (NMEICT), has launched an initiative called "Vidwan: Expert
Database and National Researcher's Network."

228. Solution: While attracting students, making teaching interesting, and promoting technology
culture in teaching are potential benefits of ICT use, the primary objective is to enhance
learning outcomes. ICT tools and technologies can facilitate effective instruction, provide
access to diverse learning resources, foster interactive and engaging learning experiences, and
support personalized learning approaches. By leveraging ICT, educators aim to optimize the
learning process and help students acquire knowledge and skills more efficiently and
effectively.

229. Solution: The assertion (A) states that sniffing may be used to steal data or information over a
network, which is true. Sniffing refers to the process of monitoring and capturing data packets
passing through a network.
The reason (R) provides an accurate Solution by stating that sniffing is indeed the process of
monitoring and capturing all data packets passing through a given network.
Therefore, both the assertion and the reason are true, and the reason correctly explains the assertion.

230. Solution: The Indian Computer Emergency Response Team (CERT-In) is the national agency for
responding to computer security incidents as and when they occur. It is a part of the Ministry
of Electronics and Information Technology (MeitY) of the Government of India.

231. Solution: Assertion (A) is true. Information Technology is indeed becoming a very important
field of activity in India. The IT industry accounted for 7.4% of India’s GDP in FY22, and it is
expected to contribute 10% to India’s GDP by 2025. The IT & BPM sector has become one of the
most significant growth catalysts for the Indian economy, contributing significantly to the
country’s GDP and public welfare.
Reason is partially true. Software is one of the major exports of India, with software services exports
estimated at $156.7 billion during 2021-222. However, India does not have a very strong base in
hardware. While there are hardware companies in India, the country’s hardware industry is not as
developed as its software industry.

Exam Year – 2020

IFAS Publications
www.ifasonline.com
127
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

232. Solution: Assertion A states that the total number of mobile users in India is increasing
rapidly. This is a factual statement based on the growth and adoption of mobile technology in
India. Over the years, the number of mobile users in India has indeed witnessed a significant
increase due to factors such as improved affordability, accessibility, and advancements in
mobile technology.
Reason R states that the cost of mobile phones is decreasing. This is a valid reason that supports Assertion
A. The decreasing cost of mobile phones has played a crucial role in driving the increase in mobile
phone adoption in India.

233. Solution: In Microsoft Office 2007 and onwards, the default file format for Word documents
was changed to .docx. This format is based on XML (Extensible Markup Language) and offers
improved file size compression and enhanced features compared to the older .doc format used
in previous versions of Microsoft Word.

234. Solution: The full form of "IoT" is: Internet of Things IoT refers to a network of interconnected
physical devices, vehicles, appliances, and other objects embedded with sensors, software, and
network connectivity that enables them to collect and exchange data. The Internet of Things
allows these devices to communicate and interact with each other, often through the internet,
to provide automation, control, and advanced data analytics for various applications and
industries.

235. Solution: To convert the decimal number 9 to binary:


Divide 9 by 2 and note the remainder: 1
Divide the quotient (4) by 2 and note the remainder: 0
Repeat the division process with the new quotient (2) until the quotient becomes 0, noting the
remainders: 0, 1
Write the remainders obtained in reverse order: 1001
Therefore, the binary representation of the decimal number 9 is 1001.

236. Solution: ROM (Read-Only Memory) : ROM is a type of computer memory that retains its
contents even when the power is turned off. It contains pre-programmed instructions or data
that cannot be modified or written to by normal computer operations. The computer startup
routine, also known as the firmware or BIOS (Basic Input/Output System), is typically stored in
ROM.

237. Solution: Registers - Registers are the fastest type of memory in a computer.
Cache Memory - Cache memory is faster than main memory.
Main Memory - Main memory (RAM) is slower than cache memory.
Secondary Memory - Secondary memory (e.g., hard disk drives) is the slowest compared to the other
memory types.
So, the sorted order from low to high memory access time is:
Registers
Cache Memory
Main Memory
Secondary Memory

238. Solution: (A) Cache memory is 'volatile' memory.


(D) RAM is 'volatile' memory.
In summary:
Cache memory and RAM are examples of volatile memory, which means they lose their stored data
when the power is turned off. But magnetic memory and Flash memory are not volatile.

IFAS Publications
www.ifasonline.com
128
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

239. Solution: DVD-ROM stands for Digital Versatile Disc Read-Only Memory. It is an optical storage
media that is used for reading data and content. The term "Read-Only" indicates that the data
on a DVD-ROM cannot be modified or written to by normal computer operations. It is designed
to be written once during the manufacturing process and can only be read multiple times
afterwards.

240. Solution: Statement I is correct. The minimum number of bits required to store any 3-digit
decimal number is 10 bits.
Statement II is incorrect. One PetaByte (PB) is equal to 2^50 bits, not 250 bits. The prefix "Peta"
denotes a quantity of 10^15, so one PetaByte is equal to 1,125,899,906,842,624 bits.

241. Solution: The Recycle Bin in Windows OS is a temporary storage location for files and folders
that have been deleted from the hard drive of a computer. When a file is deleted, it is moved to
the Recycle Bin instead of being permanently erased from the system. The Recycle Bin is
specific to the hard drive of the computer and does not include files deleted from external
storage devices such as pen drives or CD-ROMs.

242. Solution: Statement I: Search engines are also known as web browsers.
This statement is not accurate. Search engines and web browsers are two different things with
distinct functionalities. A search engine is a software program or online service that allows users to
search for information on the internet by entering keywords or queries. Examples of search engines
include Google, Bing, and Yahoo. On the other hand, a web browser is a software application used
to access and view websites and web pages. Examples of web browsers include Chrome, Firefox,
and Safari. While search engines are often accessed through web browsers, they are not synonymous
terms.
Statement II is false as an IP address consists of four sets of numbers separated by periods (dots),
with each set ranging from 0 to 255. In the given example, the second set of numbers is "365,"
which is outside the valid range of 0 to 255. Therefore, 189.365.250.2 is not a valid IP address.

243. Solution: 3G is a long range wireless technology. Some activities that require high bandwidth
cannot be carried out by using 3G.
Bluetooth is a sort range wireless technology which is used to connect devices together for data
transfer. Bluetooth is a low cost means of data transfer.
244. Solution: The Assertion (A) is true as ICT enhances access to information and improves the
accuracy of research findings. However, the Reason (R) provided is not directly related to the
assertion and does not offer a valid explanation.

245. Solution: Online platforms have significantly influenced the field of education, leading to the
emergence of alternative forms of learning. These platforms provide a new and distinct way of
delivering educational content, which is different from traditional classroom-based instruction.
Online platforms offer flexibility in terms of time, location, and pace of learning, making
education more accessible and adaptable to individual needs.

246. Solution: In a computer system, primary storage, also known as main memory or RAM, is a
high-speed storage medium that holds data and instructions that the CPU actively uses during
program execution. It provides fast access to data, making it essential for the efficient
operation of the system. Primary storage is typically volatile, meaning that its contents are lost
when power is removed or the system is restarted. And it is more expensive than secondary
storage.

247. Solution:

IFAS Publications
www.ifasonline.com
129
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(A) RAM (Random Access Memory) is a type of computer memory that holds programs and
data that are currently being used by the CPU. It is volatile memory and its contents are lost
when the power is turned off.
(B) DVD-ROM (Digital Versatile Disc - Read-Only Memory) is an optical storage medium
that can be read from but not written to. It is used for storing large amounts of data, such as
software installations or media files.
(C)ALU (Arithmetic Logic Unit) is a component of the CPU that performs arithmetic and logical
operations, such as addition, subtraction, multiplication, division, and comparisons.
(D)CPU (Central Processing Unit) is often referred to as the brain of the computer. It is responsible
for executing instructions, performing calculations, and coordinating the activities of other
hardware components.

248. Solution:
C. KB (Kilobyte)
A. MB (Megabyte)
B. GB (Gigabyte)
D. TB (Terabyte)
The sizes of computer memory increase from smallest to largest, starting with Kilobytes (KB), then
progressing to Megabytes (MB), Gigabytes (GB), and finally Terabytes (TB).

249. Solution: Printed output from a computer system is referred to as a hard copy, not a soft copy.
A soft copy typically refers to electronic or digital data that is displayed or accessed on a
computer screen or other digital devices.
RAM is a read/write memory & RAM is a type of computer memory that is volatile and used for
temporary storage. It is called "random access" because it allows for quick and direct access to any
memory location.

250. Solution:
(A) Input device: An input device is used to enter data or commands into a computer system.
The mouse is an example of an input device.
(B) Output device: An output device is used to display or present data processed by a
computer system. The monitor is an example of an output device.
(C) Software: Software refers to programs and applications that run on a computer system.
MS Office is an example of software that includes various productivity applications like Word,
Excel, and PowerPoint.
(D) Web browser: A web browser is a software application used to access and view websites
on the internet. Chrome is an example of a web browser.

251. Solution: Phishing is a fraudulent attempt to obtain sensitive information, such as credit card
details, usernames, passwords, or personal identification numbers (PINs), by disguising as a
trustworthy entity in electronic communication. In this case, the email is designed to deceive
Radha into providing her credit card details and PIN under the false pretense of preventing her
account from being suspended.

252. Solution: A scanner is not used to avail internet connectivity. It is a device used for converting
physical documents or images into digital format, but it does not provide internet connectivity
itself. On the other hand, the options 1, 2, and 4 are all related to internet connectivity.

253. Solution: A web page address is commonly referred to as a URL, which stands for Uniform
Resource Locator. A URL is the unique address or identifier that specifies the location of a
specific webpage or resource on the internet. It is composed of different components, including

IFAS Publications
www.ifasonline.com
130
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

the protocol (such as HTTP or HTTPS), the domain name (or IP address), the path, and
potentially other parameters.

254. Solution: Among the options provided, application software is not considered a system
software. System software refers to the foundational software that manages and controls the
overall functioning of a computer system. It provides an environment for running applications
and facilitates communication between hardware and software components.
While an editor can refer to different types of software tools, such as text editors or image editors,
they are typically classified as application software. Text editors, for example, are used for creating
and modifying text files and are part of the application software category.

255. Solution: Computer Vision, Machine Learning, and Deep Learning are all subfields within the
domain of Artificial Intelligence excluding TEXT. They are techniques and approaches used to
enable machines to perform tasks that typically require human intelligence.

256. Solution: ISP stands for Internet Service Provider. It refers to a company or organization that
provides individuals, businesses, and other entities with access to the internet. ISPs offer
various types of internet connections, such as broadband, DSL, cable, fiber optic, or satellite,
allowing users to connect to the internet and access online services, websites, and other
internet resources.

257. Solution: The privacy and security of user data on the internet are indeed at stake. With the
increasing prevalence of digital services, online transactions, and data sharing, there are
potential risks to the privacy and security of user data. Cyberattacks, data breaches,
unauthorized access, and surveillance are some of the concerns that pose threats to user data
on the internet. And no steps are being taken by the user for the security and privacy of data.
258. Solution: The World Wide Web (WWW) refers to the global system of interconnected
documents and resources that are accessed through the internet. It is not limited to a company-
wide network closed to public access. The World Wide Web is a part of the internet, but it is
not synonymous with it.
A MODEM (Modulator-Demodulator) is a device that allows a computer to send and receive data
over telephone lines or other communication channels. It modulates digital data from the computer
into analog signals for transmission over the telephone lines and demodulates incoming analog
signals back into digital data for the computer to process.

259. Solution:
(D) CPU Cache - CPU cache is the fastest but also the most expensive type of storage in a computer.
It is built directly into the CPU and provides extremely fast access to frequently used instructions
and data.
(A) DDR4 RAM - DDR4 RAM (Random Access Memory) is the main memory in a computer and is
faster and more expensive than storage devices like HDD and SSD. It provides temporary storage
for data and instructions that are actively being used by the CPU.
(C) SSD - SSD (Solid-State Drive) is a type of storage device that uses flash memory to store data.
SSDs are faster and more expensive than traditional HDDs. They offer faster data access and
retrieval speeds, making them a popular choice for both system and data storage.
(B) HDD - HDD (Hard Disk Drive) is a traditional storage device that uses spinning magnetic disks
to store data. HDDs are slower and less expensive than SSDs. They provide larger storage capacities
at a lower cost per byte but have slower data access speeds compared to SSDs.

260. Solution:
Telegraph: An early long-distance communication system that transmitted coded messages through
electrical signals over telegraph wires.

IFAS Publications
www.ifasonline.com
131
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Telephone: A device enabling real-time voice communication over long distances, revolutionizing
direct conversations between individuals.
Broadcasting: The transmission of audio or video content to a wide audience through radio waves or
television networks.
Narrowcasting: Communication targeted at a specific, smaller audience or niche, delivering content
to specialized groups.
Podcasting: Digital distribution of episodic audio or video content, allowing users to subscribe and
download episodes for offline listening or viewing.
Therefore, the correct sequence of the given transmissions is:
(B) Telegraph
(D) Telephone
(C) Broadcasting
(A) Narrowcasting
(E) Podcasting

261. Solution: Hexadecimal numbers use a base-16 system, where the digits range from 0 to 15. In
this case, the "2" represents the value of 2 (16^1) and the "1" represents the value of 1 (16^0),
resulting in a total value of 33. So statement 1 is true.
Statement II: The value of binary number 1110 is 14 in the decimal number system.
This statement is correct. In the binary system, the digit "1110" represents the value of 14 in the
decimal system. Binary numbers use a base-2 system, where the digits can only be 0 or 1. In this
case, the leftmost digit (MSB) represents the value of 1 (2^3), followed by three 1s representing the
value of 7 (2^2 + 2^1 + 2^0), resulting in a total value of 14.

262. Solution: OCR stands for Optical Character Recognition. It is a technology used to convert
different types of documents, such as scanned paper documents, PDF files, or images, into
editable and searchable data. OCR uses advanced algorithms to recognize and extract text from
the document images or scans, allowing the computer to interpret and understand the content
as actual text rather than just an image.

263. Solution: Spam refers to unsolicited and unwanted messages or content that is typically sent
in bulk through electronic communication channels, such as emails, instant messages, or social
media platforms. Spam is often sent for commercial purposes, promoting products or services,
but it can also include malicious content, scams, or fraudulent activities.

264. Solution: A computer network allows multiple computers to connect and communicate with
each other, enabling the sharing of data and hardware resources. Through a network,
computers can share files, printers, scanners, and other peripheral devices. They can also
exchange information, collaborate on projects, and access shared databases or servers.

265. Solution: Statement I is correct. In a peer-to-peer (P2P) network, there is no centralized


server. Instead, each computer in the network can act as both a server and a client, allowing
users to share resources directly between their computers.
Statement II is incorrect. LAN (Local Area Network) is not created for an individual person but
rather for a group of computers within a limited geographical area such as a home, office, or school.
A LAN connects computers and devices in close proximity to each other, allowing them to share
resources, such as files, printers, and internet access.

266. Solution: Statement I is correct. Operators in programming languages are symbols that carry
out specific operations on operands. These operations can include mathematical calculations
(e.g., addition, subtraction), comparisons (e.g., equal to, greater than), logical operations (e.g.,

IFAS Publications
www.ifasonline.com
132
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

AND, OR), and more. Operators are fundamental for manipulating data and controlling program
flow.
Statement II is incorrect. Relational operators are used for making comparisons between values and
determining the relationship between them. Examples of relational operators include less than (<),
greater than (>), equal to (==), and not equal to (!=). These operators are not used for performing
arithmetic operations but rather for evaluating conditions or making logical comparisons.

267. Solution: Cache memory is a smaller and faster type of memory that is located closer to the
processor than random access memory (RAM). Cache memory stores frequently accessed data
and instructions to provide quick access to the CPU, reducing the time needed to fetch data
from slower RAM or storage.

268. Solution: Facebook is not a web browser. It is a social media platform that allows users to
connect, share content, and interact with others online. On the other hand, Firefox, Chrome,
and Safari are all popular web browsers that enable users to access and navigate websites on
the internet.

269. Solution: URL stands for Uniform Resource Locator. It is the address used to locate a resource,
such as a web page, on the internet. A URL consists of several components that specify the
protocol, domain name or IP address, and the path to the specific resource.

270. Solution: The motherboard is the main circuit board that connects all the components of a
computer, including the CPU, RAM, storage devices, and other peripherals. RAM modules are
inserted into slots on the motherboard, specifically designed to accommodate them.

271. Solution: Statement I: Incorrect. The World Wide Web (WWW) is an example of client-server
technology, where web browsers act as clients and web servers respond to their requests by
delivering web content.
Statement II: Correct. FTP (File Transfer Protocol) is a service available on the internet that
facilitates the transfer of files between local computers and remote servers.

272. Solution: An extra browser window of commercials that opens automatically while browsing
web pages is called a pop-up. Pop-ups are typically used for advertising purposes and can be
considered intrusive or annoying to users. They often appear as separate windows or tabs and
can disrupt the browsing experience. Pop-up blockers and browser settings can be used to
prevent or control the display of pop-up windows.

273. Solution:
(C) Vacuum Tube: Vacuum tubes were used in the first generation of computers. They were large,
fragile, and inefficient electronic devices that served as the main building blocks of early computer
systems.
(B) Transistor: Transistors replaced vacuum tubes in the second generation of computers. Transistors
were smaller, more reliable, and more energy-efficient electronic components, enabling the
development of smaller and faster computers.
(A) Microprocessor: Microprocessors were introduced in the fourth generation of computers. They
combined thousands or millions of transistors on a single chip, allowing for significant
advancements in processing power and computer miniaturization.
(D) Artificial Intelligence: Artificial Intelligence (AI) is not specific to any particular computer
generation. AI technologies and concepts have been developed and applied across multiple
generations of computers. AI involves the simulation of intelligent behavior by machines and has
seen significant advancements and applications in recent years.
Therefore, the correct arrangement is:

IFAS Publications
www.ifasonline.com
133
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(C) Vacuum Tube → (B) Transistor → (A) Microprocessor → (D) Artificial Intelligence.

274. Solution:
A Search engine is correctly matched with III www.google.com as Google is a popular search engine.
B Job openings are correctly matched with IV www.naukri.com as Naukri.com is a popular job portal.
C E-mail is correctly matched with I www.gmail.com as Gmail is a widely used email service.
D E-commerce is correctly matched with II www.amazon.in as Amazon is a well-known e-commerce
platform.

275. Solution: Compilers are software programs that translate high-level programming code into
machine code that can be executed by a computer. They play a crucial role in the software
development process by converting human-readable code into instructions that can be
understood and executed by the computer's hardware.
Touch screen monitors can function as both input and output devices. As input devices, they allow
users to interact with the computer by touching the screen and providing input through gestures,
taps, or swipes.

276. Solution: Operating systems are software, not hardware. An operating system is a collection of
programs and software components that manage and control the computer hardware, enabling
the execution of applications and providing an interface for users to interact with the computer
system. Examples of operating systems include Windows, macOS, Linux, and Android.
Statement II is generally correct, as algorithms are indeed step-by-step procedures used to solve
problems.

277. Solution: GUI stands for Graphical User Interface. It refers to a visual interface that allows
users to interact with electronic devices or software using graphical elements such as icons,
buttons, windows, and menus, rather than text-based commands.

278. Solution:
A - Image matches with III.jpeg: An image file is represented by the file extension ".jpeg".
B - Video matches with IV .mpeg: A video file is represented by the file extension ".mpeg".
C - Audio matches with II.mp3: An audio file is represented by the file extension ".mp3".
D - Word processing matches with I.doc: A word processing document is represented by the file
extension ".doc".

279. Solution: Microsoft Access, Oracle, and SQL are examples of relational databases. Relational
databases organize and store data in a structured manner using tables, rows, and columns.
They establish relationships between tables based on common data attributes. The data in a
relational database can be accessed and manipulated using SQL (Structured Query Language)
commands.

280. Solution: The abbreviation CPS stands for Cyber Physical System. A CPS refers to a system that
integrates physical components with computational and communication capabilities. These
systems interact with the physical world, gather data through sensors, and use computational
algorithms to analyze and control physical processes.

281. Solution: Statement I is generally true, as ICT interventions in classroom teaching aim to
promote and optimize learning outcomes. Statement II is generally true as well since online
methods like Swayam and MOOCs have the potential to serve as effective supplements to
conventional teaching-learning systems.

IFAS Publications
www.ifasonline.com
134
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

282. Solution: Blockchain technology is used for cryptocurrencies. A blockchain is a decentralized


and distributed digital ledger that records transactions across multiple computers or nodes. It
provides a secure and transparent way of recording and verifying transactions without the
need for a central authority. Cryptocurrencies, such as Bitcoin and Ethereum, utilize blockchain
technology to enable secure and decentralized digital transactions.

283. Solution: An operating system serves as an interface between the user and the computer. It
enables users to interact with the computer system by providing a user interface through
which they can give commands, access files and applications, and perform various tasks. The
operating system manages the resources of the computer system and provides services to the
user and software applications.

284. Solution: Statement I is generally true, as the Internet is indeed a vast information base and
has become an integral part of our lives. Statement II is false, as HTML is not an incomplete
code package but rather a markup language that serves as a foundation for creating web pages,
often complemented by CSS and JavaScript to achieve desired functionality and interactivity.

285. Solution: Computer hardware refers to the physical components of a computer system. This
includes devices such as the monitor (display), CPU (Central Processing Unit), keyboard,
mouse, memory (RAM), storage devices (hard drive, solid-state drive), motherboard, graphics
card, power supply, and other peripheral devices. These components are tangible and make up
the physical structure of a computer.

286. Solution: Both pie charts and bar charts are common data visualization methods. Pie charts
are circular graphs divided into sectors, where each sector represents a proportion of a whole.
They are used to show the composition or distribution of different categories within a dataset.

287. Solution: Hexadecimal, often abbreviated as "hex," is a numeral system with a base of 16. It is
commonly used in computing and digital systems as a way to represent and work with binary
data more conveniently. Hexadecimal digits range from 0 to 9, and then continue with the
letters A to F, where A represents 10, B represents 11, and so on up to F representing 15.

288. Solution: BIOS stands for Basic Input/Output System. It is a firmware program that is built
into the motherboard of a computer. The BIOS is responsible for initializing and configuring
hardware components during the boot process of the computer, before the operating system
takes control.

289. Solution: Assertion A is true, as there has been a proliferation of online courses with
increasing popularity. Reason R is also true, as selecting the right course from the multitude of
available options can indeed be a considerable challenge. But the reason don’t justify the
assertion.

290. Solution: The word "blog" is derived from the term "weblog." In the early days of the internet,
"weblog" was used to describe websites where individuals would regularly post entries or logs
about their personal thoughts, opinions, and experiences.

291. Solution:
(A) Input devices such as a mouse are used to provide input to a computer system.
(B) Output devices like a monitor display information or output from the computer system.
(C) Memory includes various types of storage in a computer system, and cache is a type of
memory used for faster data access.

IFAS Publications
www.ifasonline.com
135
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(D) Software refers to programs and applications that run on a computer system, and Python
is a popular programming language used for software development.

292. Solution: The type of memory that holds the computer startup routine is ROM. ROM is a non-
volatile memory that stores permanent instructions or data that cannot be modified or erased
by normal computer operations. It contains firmware or software instructions that are
essential for the computer's initial booting process, including the startup routine.

293. Solution: Cloud computing refers to the delivery of computing services over the internet. It
allows users to access and utilize computing resources, such as servers, storage, databases,
software applications, and more, without needing to have physical infrastructure or hardware
on-site.
But Cloud computing is not related to weather forecasting or rain prediction.

294. Solution: A firewall is a software or hardware-based security tool primarily designed to


protect networks from unauthorized access and threats. It acts as a barrier between internal
and external networks, monitoring and controlling incoming and outgoing network traffic. It
protects personal computer, server as well but it is not related to fire control.

295. Solution: Statement I is incorrect as an external hard disk is not primary memory, and
Statement II is also incorrect as external hard disks generally have larger storage capacities
compared to pen drives.

296. Solution: An algorithm is designed to solve a specific problem or task, and it typically
produces some form of output or result.
An algorithm is designed to solve a specific problem or task within a finite number of steps. It must
have a termination condition or a stopping point to ensure that it completes in a reasonable amount
of time.
Rest of the statements related to algorithm are correct.

297. Solution: The use of ICT (information and communication technology) in education has the
potential to optimize learning outcomes. This is supported by the fact that ICT promotes
variety, flexibility, and attractiveness in the learning process. It offers a range of tools and
resources that cater to different learning styles, allows for learning anytime and anywhere, and
engages students through interactive and visually appealing methods. Overall, ICT has the
capacity to enhance the effectiveness and engagement of education, leading to improved
learning outcomes.

298. Solution:
A. Web 2.0 Applications: Examples of Web 2.0 applications include blogs and Twitter, allowing users
to create and share content online. (III) corresponds to Blogs, Twitter.
B. Search Engines: Google and Yahoo are examples of search engines that help users find information
on the internet. (IV) corresponds to Google, Yahoo.
C. System Software: Windows 8 and iOS are operating systems used in computers and mobile devices.
(I) corresponds to Windows 8, iOS.
D. High-level language: C++ and Java are examples of high-level programming languages used for
software development. (II) corresponds to C++, Java.

299. Solution: CDMA stands for Code Division Multiple Access. It is a digital cellular technology
used for wireless communication. In CDMA, multiple users share the same frequency band
simultaneously by assigning unique codes to each user.

IFAS Publications
www.ifasonline.com
136
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

300. Solution: synchronous media involves real-time communication, with the telephone being an
example. Asynchronous media refers to communication that does not require simultaneous
participation, such as email. Rich media includes interactive elements, with interactive
multimedia being an example. Hypermedia involves non-linear navigation with hyperlinks, and
its application is seen in the broader use of multimedia.

301. Solution: CRT stands for Cathode Ray Tube. It is a display technology that was widely used in
older computer monitors and television sets. In a CRT, an electron beam is generated at the
back of the tube and directed towards a phosphor-coated screen. The beam scans across the
screen horizontally, line by line, and illuminates the phosphor dots, creating the visual image.

302. Solution:
A. Web browser: A web browser is software used to access and view websites on the internet. Chrome
is an example of a web browser. (II) corresponds to Chrome.
B. Operating system: An operating system is software that manages computer hardware and software
resources, providing a platform for other applications to run. DOS (Disk Operating System) is an
example of an operating system. (IV) corresponds to DOS.
C. Secondary memory: Secondary memory refers to storage devices that retain data even when the
power is turned off. A hard disk is an example of secondary memory. (I) corresponds to Hard Disk.
D. Application: An application, also known as software or program, refers to specific programs
designed to perform specific tasks on a computer. MS-Word is an example of an application used for
word processing. (III) corresponds to MS-Word.

303. Solution: Joystick is a input device used for controlling the movement or actions of a
computer or video game. It typically consists of a handheld stick or lever that can be moved in
different directions and buttons or triggers for additional input.

304. Solution: Among the options provided, MS Word is the application software. Android and iOS
are operating systems used in mobile devices, while Linux is an operating system widely used
in various computing environments. MS Word, developed by Microsoft, is a word processing
application used for creating, editing, and formatting text documents.

305. Solution:
I. Step by step procedure to solve a problem: This refers to an algorithm, which is a step-by-step
procedure or set of instructions to solve a specific problem. (C) corresponds to Algorithm.
II. Raw facts and figures: Raw facts and figures are data, which are unprocessed and unorganized
information. (D) corresponds to Data.
III. Hard Disk: A hard disk is a hardware component used for data storage. (B) corresponds to
Hardware.
IV. Linux: Linux is an operating system, which is a type of software that manages computer
hardware and software resources. (A) corresponds to Software.

306. Solution:
A. Programming Language corresponds to C++
B. Operating System corresponds to Windows XP
C. Internet corresponds to Wide Area Network
D. Application Software corresponds to MS PowerPoint.

307. Solution: Param Shivay is a supercomputer developed under the National Super Computing
Mission (NSM) of the Government of India. The NSM aims to establish a network of
supercomputers across the country and promote high-performance computing research and

IFAS Publications
www.ifasonline.com
137
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

applications in various fields. Param Shivay is one of the supercomputers deployed as part of
this mission, contributing to scientific and technological advancements in India.

308. Solution: ALU stands for Arithmetic Logic Unit - This statement is correct. ALU refers to the
component in a computer processor that performs arithmetic and logical operations on data.
UPS stands for Uninterruptible Power Supply. It is a device that provides backup power to electronic
devices during power outages or fluctuations.

309. Solution:
A. Internet is larger than intranet: This statement is correct. The internet is a global network that
connects millions of computers and networks worldwide.
B. Intranet is larger than internet: This statement is incorrect. The internet is a much larger network
compared to an intranet, which is limited to a specific organization or group.
C. Internet and Intranet are the same: This statement is incorrect. The internet and intranet are distinct
networks with different characteristics. The internet is a public network, while an intranet is a
private network confined to a specific organization.
D. Intranet is a network of networks: This statement is correct. An intranet is a private network that can
be considered as a network of networks within a specific organization.
E. World Wide Web is an example of intranet: This statement is incorrect. The World Wide Web
(WWW) is an example of a system that operates over the internet, not an intranet. The WWW is a
collection of interconnected documents and resources accessible globally through the internet.

310. Solution: Example of primary memory is RAM - This statement is correct. RAM (Random
Access Memory) is a type of primary memory in a computer system. It is used for temporary
storage of data that is actively being processed by the CPU.
Statement II: Example of secondary memory is Pen drive - This statement is correct. A pen drive,
also known as a USB flash drive, is an example of secondary memory. Secondary memory is non-
volatile storage that retains data even when the power is turned off.

311. Solution: Python is a popular high-level programming language known for its simplicity and
readability. It is widely used for various purposes, including web development, data analysis,
scientific computing, artificial intelligence, and more. Python is not an operating system, search
engine, or a reference to a snake, but a versatile programming language.

312. Solution: CD-ROM stands for Compact Disc Read-Only Memory. It is a type of optical storage
medium that was widely used for distributing software, multimedia content, and data. CD-
ROMs are read-only, meaning that the data on them cannot be modified or erased. They have a
large storage capacity, typically ranging from 650 MB to 700 MB, and are accessed using a CD-
ROM drive or CD/DVD drive in a computer or other compatible device.

313. Solution: Multimedia refers to the combination of different media elements to create a rich
and interactive experience. It includes text, images, audio, video, animation, interactivity, and
visual effects. These elements are combined to create engaging content that can be delivered
through various platforms like websites, presentations, videos, games, and interactive
applications.

314. Solution: Assertion A suggests that personal data is required by e-commerce companies for
better service, while the Reason R acknowledges the possibility of privacy compromise in the
process of collecting and utilizing personal data. So Both A and R are correct and R is the
correct explanation of A

IFAS Publications
www.ifasonline.com
138
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

315. Solution:
D. Blogs: Blogs are online platforms where individuals or organizations can publish articles, opinions,
or updates. Users can read and comment on blog posts at their convenience, without requiring real-
time interaction.
E. Discussion boards: Discussion boards are online platforms where users can post messages and
engage in discussions on specific topics. Participants can read and respond to messages at different
times, allowing for asynchronous communication.
F. Vlog: A vlog refers to a video blog, where individuals or content creators share videos on various
topics. Viewers can watch and comment on the videos at any time, making it an asynchronous form
of communication.
Therefore, the technologies associated with asynchronous communication are: Blogs, Discussion
boards, and Vlog.

316. Solution: Information and Communication Technology (ICT) comprises all of the mentioned
options. ICT refers to the use of technology, specifically computer-based technologies, for
gathering, storing, retrieving, processing, and transmitting information. It includes various
forms of digital communication and tools that enable information sharing and collaboration.
Online learning, learning through mobile applications, and web-based learning are all examples
of how ICT is utilized in the field of education.

317. Solution: An Operating System (OS) is software that manages computer hardware and
software resources and provides common services for computer programs. A device driver is a
specific type of computer software that helps the OS to control a piece of hardware. An IP
address is a numerical label assigned to each device connected to a computer network that
uses the Internet Protocol for communication. The World Wide Web (www) is an information
system where documents and other web resources are identified by Uniform Resource Locators
(URLs), which may be interlinked by hypertext, and are accessible over the Internet.

318. Solution: Assertion (A) correctly states that RAM is volatile and stores data/programs
currently in use. However, the Reason (R) is incorrect as RAM does not retain its contents after
the power supply is turned off because RAM is a volatile memory.
319. Solution: The completed sentence would be: WiFi is short for Wireless Fidelity and it is a set
of standards for computing devices to connect to a LAN or to the Internet using short-range
waves to allow devices to communicate without cables.

320. Solution: Using a website to pour out one’s grievances is called Cyber Venting. Cyber-venting
is the act of bad-mouthing about one’s employer, senior executives, colleagues, etc. with the
intention of letting off steam, using websites, and making such comments public for all to see
them.

321. Solution: GIF stands for Graphics Interchange Format. It is a file format commonly used for
images and animations on the internet. GIF files are known for their support of both static and
animated images, often used for short animations, memes, and simple graphics with limited
colors. GIFs use lossless compression, meaning they preserve image quality without sacrificing
file size.

322. Solution: Secondary Storage: This refers to non-volatile storage devices such as hard disk
drives (HDDs), solid-state drives (SSDs), and optical discs. It has the slowest access speed
compared to other memory types.
Main Memory: Main memory, also known as primary memory or RAM (Random Access Memory),
is faster than secondary storage. It is used for temporary storage of data and instructions that are
actively being accessed by the computer's processor.

IFAS Publications
www.ifasonline.com
139
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Cache Memory: Cache memory is faster than main memory and is used to store frequently accessed
data and instructions to improve the overall performance of the system. It acts as a buffer between
the CPU and main memory, providing faster access to frequently used information.

323. Solution: Gbps (Gigabits per second): This unit represents the data transfer rate in billions of
bits per second. It is commonly used to measure internet connection speeds, especially for
high-speed broadband connections.

324. Solution: Phishing is a type of online scam where criminals send fraudulent emails or text
messages, or create fake websites, in an attempt to trick people into providing sensitive
information such as usernames, passwords, and credit card details.

325. Solution: ocus on teaching and research in unique and emerging areas of knowledge: A 'De-
novo' institution refers to a newly established institution that focuses on innovative and
emerging fields of knowledge. It emphasizes teaching and research in new and unique areas
that may not be traditionally covered by established institutions.

326. Solution: Ubuntu- Operating System. Ubuntu is a free and open-source operating system and
Linux distribution based on Debian.

327. Solution: BCD stands for Binary Coded Decimal. It is a form of binary encoding where each
digit in a decimal number is represented in the form of bits. This encoding can be done in
either 4-bit or 8-bit (usually 4-bit is preferred)

328. Solution: VOIP (Voice over Internet Protocol) allows a phone call to be routed over network
wires. VOIP is a technology that allows voice calls to be made using a broadband internet
connection instead of a regular phone line.

329. Solution: 1 Gigabyte represents one billion characters. A gigabyte is a unit of measurement for
data storage capacity and is equivalent to 1 billion bytes or 1,000 megabytes. Each character is
typically stored using one byte of data, so one gigabyte can store approximately one billion
characters.

330. Solution: Encryption is the process of encoding data in such a way that only authorized
parties can access and understand it. By encrypting data, it becomes unreadable to anyone
without the corresponding decryption key. This ensures the confidentiality and integrity of the
transmitted data, preventing unauthorized access or manipulation by third parties.

331. Solution: Binary is the number system that uses two numbers (0 and 1) to represent data in a
computer. The binary system is the basis of all modern computing and is used to represent data
in digital electronics and computers.

332. Solution: A transponder is a device used in satellite communication that receives an incoming
signal, amplifies it, and retransmits it back to Earth. It plays a crucial role in satellite
communication by receiving signals from ground-based transmitters, amplifying them, and
then retransmitting them to a different location on Earth. The transponder ensures that the
signal can be transmitted over long distances and to multiple locations.

IFAS Publications
www.ifasonline.com
140
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

333. Solution: To convert a decimal number to binary, you can divide the decimal number by 2
repeatedly and record the remainders. The binary representation is obtained by reading the
remainders in reverse order.
For the decimal number 35:
35 divided by 2 is 17 with a remainder of 1.
17 divided by 2 is 8 with a remainder of 1.
8 divided by 2 is 4 with a remainder of 0.
4 divided by 2 is 2 with a remainder of 0.
2 divided by 2 is 1 with a remainder of 0.
1 divided by 2 is 0 with a remainder of 1.
Reading the remainders in reverse order, we get 100011, which is the binary equivalent of the
decimal number 35.

334. Solution: In the banking system, ATM stands for Automatic Teller Machine. An ATM is an
electronic banking outlet that allows customers to complete basic transactions without the aid
of a branch representative or teller.

335. Solution: Section 66(F) of the Information Technology (IT) Act 2000 in India specifically
addresses the punishment for cyber terrorism. This section outlines the provisions and
penalties for offenses related to cyber terrorism, which involve any act of unauthorized access
to computer systems, causing damage to computer systems, or disrupting critical information
infrastructure with the intention of threatening the unity, integrity, sovereignty, or security of
the nation.

336. Solution: A plotter is best described as an output device to produce drawings and graphics. A
plotter is a computer hardware device that is used to produce vector graphics or line drawings,
such as blueprints, maps, and technical drawings.

337. Solution: The assertion (A) states that an intranet is a private network for sharing computing
resources and information within an organization. This is a true statement. An intranet is a
network that is privately owned and is used for internal communication and collaboration
within an organization.
The reason (R) states that the intranet is a private version of the internet. This is also true. An
intranet is built using similar technologies and protocols as the internet, but it is limited to a specific
organization and is not accessible to the public.

338. Solution: Scanner is a device that allows a user to copy an external document and save it in
electronic form onto a computer. A scanner is an input device that captures images of
documents, photos, or other objects and converts them into digital files that can be stored,
edited, and shared on a computer.

339. Solution: E-commerce involves the buying and selling of Products and services over the
Internet. E-commerce, or electronic commerce, refers to the buying and selling of goods or
services using the internet, and the transfer of money and data to execute these transactions.

340. Solution: The correct order with respect to the size of the storage units is Terabyte < Petabyte
< Exabyte < Zettabyte. A terabyte is smaller than a petabyte, which is smaller than an exabyte,
which is smaller than a zettabyte. Each unit is 1,000 times larger than the previous one.

341. Solution:
(A) Output Device - An example of an output device is a printer. Output devices are used to display
or produce information from a computer system.

IFAS Publications
www.ifasonline.com
141
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(B) System Software - An example of system software is an operating system. System software
manages and controls the operation of a computer system.
(C) Storage Device - An example of a storage device is RAM (Random Access Memory). RAM is a
type of storage used for temporary data storage in a computer system.
(D) Application Software - An example of application software is MS-Office. Application software is
designed for specific tasks or applications, such as word processing, spreadsheet creation, and
presentation design.

342. Solution: The methodology for the delivery of voice and multimedia sessions over the internet
is called VoIP (Voice over Internet Protocol). VoIP is a technology that allows voice calls and
multimedia sessions to be transmitted over the internet using packet-switched networks.

343. Solution: The full form of the abbreviation ISP is Internet Service Provider. An ISP is a
company that provides internet access to customers by providing a connection to the internet
via a wired or wireless network.

344. Solution: Wireless networking allows for easy expansion of the network because it eliminates
the need for physical cables. New devices can be added to the network without the
requirement of running additional cables or making changes to the existing infrastructure.
Wireless networks, by their nature, can be more susceptible to security threats such as unauthorized
access or eavesdropping compared to wired systems. Without proper security measures, wireless
signals can be intercepted by unauthorized users.

345. Solution: Bit rate refers to the number of bits per second that can be transmitted over a
network. It is a measure of the speed of data transfer and is typically expressed in bits per
second (bps).

346. Solution: The use of instructional technology, such as programmed instructional material and
ICT, has the potential to optimize learning outcomes and make teaching-learning systems more
effective and efficient. Incorporating technology-based resources as supplements can enhance
learning experiences and allow students to progress at their own pace. When ICT is used
judiciously, it can provide access to a wide range of educational content, promote interactive
learning, facilitate collaboration, and improve communication between teachers and students.
Overall, the integration of instructional technology has positive implications for improving
education and achieving better learning outcomes.

347. Solution: Spoofing refers to the act of falsifying or imitating information to deceive or trick
individuals or systems. In the context of websites, spoofing involves creating a website that
appears to be a genuine or legitimate site, typically by replicating its design, layout, and
content. The intention behind website spoofing can vary, but it often aims to deceive users into
sharing sensitive information such as login credentials, personal data, or financial details.

348. Solution: The number of unique combinations of 0's and 1's that can be made with a 5-bit
binary code can be calculated using the formula 2^n, where n is the number of bits.
In this case, with a 5-bit binary code, the number of unique combinations would be 2^5 = 32.

349. Solution: The keys on a keyboard that are called modifier keys are a) Ctrl, b) Shift, and d) Alt.
Modifier keys are special keys on a computer keyboard that are used in combination with other
keys to perform specific actions. For example, holding down the Ctrl key while pressing the C
key performs the Copy command.

IFAS Publications
www.ifasonline.com
142
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

350. Solution: Among the options provided, the following initiatives fall under Government to
Citizens (G2C) e-governance:
a) e-Help: This initiative aims to provide online assistance and support to citizens for accessing
government services, obtaining information, and resolving queries or issues.
b) e-Health: This initiative focuses on the use of information and communication technology in the
healthcare sector to enhance access to healthcare services, facilitate telemedicine consultations, enable
online appointment booking, and provide health-related information to citizens.

Exam Year – 2021


351. Solution:
A. OCR is used to scan typed or handwritten documents.
B. OMR is used to mark multiple-choice questions.
C. Email is an example of asynchronous communication.
D. Instant Messaging is an example of synchronous communication.

352. Solution: Solid State Drives (SSDs) are storage devices that use integrated circuit assemblies to
store data persistently, unlike traditional Hard Disk Drives (HDDs) that use spinning disks.
SSDs offer several advantages over HDDs, including faster data access, improved power
efficiency, smaller form factor, and lighter weight.

353. Solution: An operating system (OS) is a fundamental software component that manages
computer hardware and software resources and provides services for user applications. It acts
as an intermediary between the user and the computer hardware, enabling communication and
interaction.
The reason (R) states that "Man and Computer cannot communicate directly." This is true because
computers primarily operate using machine language, which consists of low-level binary
instructions that are difficult for humans to understand and interact with directly. To bridge this gap
and facilitate communication, an operating system is necessary.

354. Solution: Wi-Fi Range: Wi-Fi networks generally have a range of around 30 meters (100 feet)
indoors, but this can be affected by walls, floors, and other physical barriers. In open outdoor
spaces, Wi-Fi signals can reach distances of up to 120 meters (400 feet) or more, especially
with the latest Wi-Fi standards like Wi-Fi 6.
Bluetooth: The range of Bluetooth technology is generally shorter compared to Wi-Fi. The typical
range for Bluetooth devices is approximately 33 feet (10 meters). However, newer versions of
Bluetooth, such as Bluetooth 5.0, may offer extended range capabilities of up to 100 or 200 feet (30
to 60 meters) in certain scenarios with minimal interference.

355. Solution: The Assertion (A) states that more performative broadcasts are more cohesive and
popular, but their effect is decreasing due to new media. This suggests a relationship between
performance and popularity, as well as the impact of new media on broadcast effectiveness.
The Reason (R) states that the internet is tending to eclipse broadcast media. this statement is true
and it explains the assertion.

356. Solution:
(D) 2 T Bytes - 2 terabytes is the largest capacity among the given options. A terabyte is a unit of
storage equal to 1,000 gigabytes.
(A) 1500 M Bytes - 1,500 megabytes is about 1.5 GB so it will come next.
(C) 1 G Bytes - 1 gigabyte is the next largest capacity.
(B) 5 K Bytes - 5 kilobytes is the smallest capacity among the given options.

IFAS Publications
www.ifasonline.com
143
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

357. Solution: Convert the whole number part (67) into binary:
Divide the whole number by 2.
Write down the remainder (0 or 1).
Continue dividing the quotient by 2 and writing down the remainders until the quotient becomes 0.
The sequence of remainders, read in reverse order, gives the binary representation of the whole
number part.
67 divided by 2 gives a quotient of 33 and a remainder of 1.
33 divided by 2 gives a quotient of 16 and a remainder of 1.
16 divided by 2 gives a quotient of 8 and a remainder of 0.
8 divided by 2 gives a quotient of 4 and a remainder of 0.
4 divided by 2 gives a quotient of 2 and a remainder of 0.
2 divided by 2 gives a quotient of 1 and a remainder of 0.
1 divided by 2 gives a quotient of 0 and a remainder of 1.
Reading the remainders in reverse order gives the binary representation of the whole number part:
1000011.
Convert the fractional part (0.625) into binary:
Multiply the fractional part by 2.
Write down the integer part of the result (0 or 1).
Take the fractional part of the result and repeat the multiplication by 2.
Continue this process until the fractional part becomes 0 or until you have the desired level of
precision.
The sequence of integers obtained represents the binary representation of the fractional part.
0.625 multiplied by 2 gives an integer part of 1.
0.25 multiplied by 2 gives an integer part of 0.
0.5 multiplied by 2 gives an integer part of 1.
Continuing this process until the desired precision is reached, the binary representation of the
fractional part is 101.

358. Solution:
(A) Access to public documents: ICT can play a significant role in providing access to public
documents through digital platforms. This allows citizens to easily retrieve information, such as
government reports, legal documents, and public records, electronically.
(B) On-line payments: ICT enables online payment systems, which streamline and facilitate
financial transactions between citizens and government agencies or service providers. This can
include online payment of taxes, utility bills, fines, fees, and other services, making transactions
more convenient and efficient for citizens.

359. Solution: The CPU Cache is the fastest component among the given options. It is a small, high-
speed memory located on the processor chip. The CPU cache stores frequently accessed data
and instructions, providing quick access for the processor.
RAM (Random Access Memory) is the next fastest component after the CPU Cache. RAM serves as
the main memory for a computer, providing temporary storage for data and instructions that the
processor needs to access quickly.
SSD (Solid State Drive) is faster than traditional hard disk drives (HDDs) but slower than RAM.
SSDs use flash memory technology to store data and offer faster read and write speeds compared to
HDDs.
The Optical Drive, which includes CD/DVD drives, is the slowest component among the given
options. Optical drives read and write data using lasers and rotating discs, and they typically have
slower access times compared to other storage devices like SSDs.

360. Solution:
(A) HTML is a language used to create web pages.

IFAS Publications
www.ifasonline.com
144
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(B) Web 2.0 refers to the collaborative web.


(C) Web 3.0 relates to the concept of the semantic web.
(D) VOIP stands for Voice over Internet Protocol, which is the use of the internet to make
phone calls.

361. Solution:
(E) 1,000,000 KBytes - 1,000,000 kilobytes is the smallest capacity among the given
options.
(B) 10,000,000,000 Bytes - 10,000,000,000 bytes is the next larger capacity.
(D) 100,000 MBytes - 100,000 megabytes is larger than 10,000,000,000 bytes.
(A) 100 GBytes - 100 gigabytes is larger than 100,000 MB
(C) 1 TBytes - 1 terabyte is 1000 Gb which is the larget among all.

362. Solution:
A. HDD (Hard Disk Drive) is an external memory storage device.
B. RAM (Random Access Memory) is volatile memory that stores data temporarily.
C. ROM (Read-Only Memory) is non-writable memory that stores permanent data.
D. CRT (Cathode Ray Tube) is a visual display unit that was commonly used in older computer
monitors and televisions.

363. Solution: Statement I correctly states that a web browser is a piece of software that retrieves
and displays web pages. Web browsers are used to access and view websites on the internet.
Statement II correctly states that a search engine is a special kind of website that helps people find
web pages from other websites. Search engines index and organize web pages, allowing users to
search for specific information or websites by entering relevant keywords.

364. Solution: Statement (A) is true. Secondary storage, such as hard disk drives or solid-state
drives, is indeed slower, cheaper, and less volatile than primary storage (RAM). Secondary
storage is used for long-term data storage, while primary storage is faster but more expensive
and volatile, meaning it loses its contents when power is removed.
Statement (B) is false. Tape drives are not direct access devices. They are sequential access devices,
meaning data is accessed sequentially from the beginning of the tape to the desired location.
Random access is not possible with tape drives.
Statement (C) is true. The contents of most forms of RAM (Random Access Memory) are volatile,
which means the data is lost when power is removed. RAM is used for temporary storage and data
manipulation during computer operations, but it is not suitable for long-term data storage.

365. Solution: A GUI provides a visual and intuitive interface with icons, menus, buttons, and
graphical elements that make it easier for non-experts or novice users to interact with a
computer system. It allows users to perform tasks by simply pointing and clicking, without the
need to remember and type complex commands.

366. Solution:
A. Processor - The processor is responsible for running executable programs. It executes the
instructions and performs the calculations required by the software.
B. RAM - RAM stands for Random Access Memory. It is a part of the computer where instructions and
data are temporarily stored for quick access by the processor. It provides fast and temporary storage
while the computer is running.
C. Hard Disk - The hard disk is a storage device that stores files permanently. It retains data even when
the computer is powered off. It has a larger storage capacity compared to RAM and is used for long-
term data storage.

IFAS Publications
www.ifasonline.com
145
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

D. Compiler - A compiler is a software program that translates a source program written in a high-level
programming language into an executable program that can be directly executed by the processor. It
converts the human-readable code into machine-readable code.

367. Solution:
(B) 8085 - The 8085 is an older processor that was released in 1976. It has a lower processing speed
compared to the others on the list.
(A) 80486 - The 80486, also known as the 486, is an older processor released in 1989. It has a faster
processing speed compared to the 8085 but is slower than the more modern processors.
(D) Pentium-III - The Pentium-III was released in 1999 and is faster than the 80486. It offers
improved performance and speed compared to its predecessor.
(C) Dual Core - Dual Core is a more modern processor architecture that refers to the presence of two
processor cores on a single chip. It is generally faster and more efficient than the previous
processors mentioned.
Therefore, the correct order from the slowest to the fastest would be: 8085, 80486, Pentium-III, Dual
Core.

368. Solution: in statement (A) Mouse and keyboard are input device but plotter is an output device
so this statement is incorrect.
In statement (D) Monitor and printer are output devices but Scanner is an input device so this
statement is also false.
While statement (B) & (C) are true.
369. Solution: Statement I is incorrect. The CPU does not directly execute software from secondary
memory. Instead, the software is loaded into primary memory (RAM) from secondary memory
before the CPU can execute it.
Statement II is incorrect. Open Source Software refers to software that is made available with its
source code, allowing users to view, modify, and distribute the code. Not every software available
on internet are open source.

370. Solution:
(B) CDROM (Compact Disc Read-Only Memory) - Slowest access time
(C) Hard Disk - Slower access time than CDROM
(D) RAM (Random Access Memory) - Moderate access time
(A) Cache - Faster access time than RAM
(E) Register - Fastest access time

371. Solution: All the statements written about wiki are true.
"Wiki" refers to a type of collaborative website that allows users to create, edit, and organize content
collectively. A wiki typically consists of web pages interconnected through hyperlinks. Users can
create new pages, edit existing ones, and link related pages together. The content within a wiki is
typically written using a simple markup language that facilitates easy editing and formatting.

372. Solution: Hard Disk typically has the largest storage capacity among these options and is used
for long-term storage of data in a computer system. RAM (Random Access Memory) comes
next, providing temporary storage for data that the computer is actively using. Cache memory
is smaller in size but faster than RAM, and it is used to store frequently accessed data for faster
retrieval. Registers are the smallest and fastest memory units directly integrated into the CPU,
used for storing small amounts of data for immediate processing.

373. Solution: The maximum decimal value that can be represented using 7 bits is 127

IFAS Publications
www.ifasonline.com
146
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

The largest 2-digit decimal number is 99. To represent 99 in binary, we need a minimum of 7 bits. In
binary, 99 is represented as 1100011. Therefore, to store the largest 2-digit decimal number (99), we
require at least 7 bits.

374. Solution: A computer virus is a type of malicious software or malware that is designed to
replicate itself and spread from one computer to another, often without the user's knowledge
or consent. It can cause various harmful effects on a computer system, such as disrupting
normal operations, corrupting or deleting data, and even compromising the security of the
system.

375. Solution: Tim Berners-Lee, a British computer scientist, is credited with inventing the World
Wide Web in 1989. He developed the necessary technologies and protocols, such as HTML,
HTTP and the first web browser, to enable the sharing and retrieval of information over the
internet. And Mosaic was not the first widely used web browser.

376. Solution: True statements are


B. Half-duplex data transmission allows communication in both directions, but not simultaneously.
It alternates between sending and receiving data.
C. Full-duplex data transmission enables simultaneous communication in both directions, allowing
for faster and more efficient data transfer.
D. Serial data transmission sends data bit by bit over a single wire or channel, typically using
packets of 8 bits (bytes) transmitted sequentially.

377. Solution: DVDs use a single spiral 'track' to store data working from the centre to the edge is
true but the second statement that DVDs are Read-only devices is false because Rewriteable
DVDs (DVD-RW, DVD+RW, DVD-RAM) are also available, which allow users to write and erase
data multiple times on the same disc.

378. Solution:
A. System Software - Compiler: A compiler is a type of system software that translates high-level
programming code into machine code.
B. Application Software - Library Management System: A library management system is an example of
application software that helps manage and organize library resources.
C. Security Software - Firewall: A firewall is a type of security software that monitors and controls
network traffic to protect against unauthorized access.
D. Embedded Software - Automatic fridge: An automatic fridge is an example of a device that uses
embedded software, which is software specifically designed to control the functioning of embedded
systems like household appliances.

379. Solution: The World Wide Web (WWW) is a system of interlinked hypertext documents and
other resources, connected by the internet.

380. Solution: Ethernet is a widely used networking technology for wired local area networks
(LANs). It defines a set of rules and protocols for devices within a local network to
communicate with each other and share resources.

381. Solution: Unlike dot matrix and inkjet printers, laser printers do not use ink when producing a
document: This statement is incorrect. Laser printers do not use liquid ink like inkjet printers,
but they do use dry ink in the form of toner particles.
Rest of the statements written regarding laser printer are correct.

IFAS Publications
www.ifasonline.com
147
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

382. Solution: It is easier to break or steal: Due to their portable nature, laptops are more
susceptible to damage from accidental drops or mishandling. They are also more prone to theft
because of their size and mobility.

383. Solution: ATM stands for Automated Teller Machine. An ATM is an electronic banking device
that allows individuals to perform various financial transactions without the need for human
assistance.

384. Solution: A spreadsheet is a two-dimensional table or grid consisting of rows and columns. It
is a software application used for organizing, analyzing, and manipulating data in a structured
format.

385. Solution: DRAM is composed of millions or billions of transistors and capacitors that store and
retrieve data and it needs constant refreshing to retain the stored data.

386. Solution: The basic free version of the 200M web meeting platform allows an online class to be
conducted for up to 40 minutes. This means that the meeting duration is limited to 40 minutes
before it may be automatically ended or require an upgrade to a paid version for extended
usage.

387. Solution: A portable hard drive is an example of external memory and ROM in non-volatile so
it will not lose data even the power is turned off.

388. Solution:
A. Reading/Language Arts - 1. Software programs to develop basic reading skills
B. Mathematics - 3. Graphing calculations to illustrate abstract or hard-to-visualize relationships
C. Science - 4. Simulations to illustrate complex relationships
D. Social Studies - 2. Simulations to explore distant places and times

389. Solution: VisiCalc, released in 1979, was a groundbreaking application that introduced the
concept of electronic spreadsheets and revolutionized the way businesses and individuals
managed and analyzed data. It was widely regarded as a killer application, a term used to
describe software that is so useful or innovative that it drives the adoption of a particular
technology platform.
Before the introduction of VisiCalc, PCs were primarily used for personal productivity tasks, but
they were not widely adopted in business environments. VisiCalc changed that by offering a
powerful tool for financial analysis, budgeting, and data management.

390. Solution:
A. Numerical ID for each device on the Internet - 4. IP Address:
An IP address is a numerical identifier assigned to each device on the Internet. It serves as a unique
identification for devices to communicate with each other over the network.
B. Unique ID for a Network Interface Card (NIC) - 3. MAC Address:
A MAC address (Media Access Control address) is a unique identifier assigned to a network
interface card (NIC) of a device. It is a hardware-based identifier that remains fixed for the lifetime
of the NIC.
C. Use of the Internet to make phone calls - 1. VOIP:
VOIP (Voice over Internet Protocol) refers to the use of the Internet to make phone calls. It is a
technology that allows voice communication over IP networks, enabling individuals to make calls
using the Internet instead of traditional telephone networks.
D. Text used by web browsers to locate a web address on the Internet - 2. URL:

IFAS Publications
www.ifasonline.com
148
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

A URL (Uniform Resource Locator) is a text-based address used by web browsers to locate and
access resources on the Internet. It specifies the protocol, domain name or IP address, and specific
path to the desired resource.

391. Solution: Proprietary software is developed and owned by a specific company or individual,
and they typically charge a licensing fee or require a purchase for its use. This can make
proprietary software more expensive compared to open source software, which is often
available for free or at a significantly lower cost.

392. Solution:
A - Operating system: An operating system is a software that manages computer hardware and software
resources. An example of an operating system is Linux.
B - Application software: Application software refers to programs designed to perform specific tasks
for users. An example of application software is Pentium, which is actually a type of microprocessor
commonly used in computers.
C - Processor: The processor, also known as the central processing unit (CPU), is the main component
of a computer that carries out instructions and performs calculations. No specific example is
provided in List II for the processor.
D - Network Device: Network devices are hardware components used to connect and communicate
within computer networks. An example of a network device is a router, which directs and forwards
data packets between different networks.

393. Solution: Assertion A states that a good computer networking solution can be highly beneficial
for a business. This statement is generally true. Computer networking allows for the sharing of
resources, communication, and collaboration among employees, which can greatly enhance
productivity and efficiency in a business environment.
Reason R supports Assertion A by explaining one of the key benefits of computer networking. It
states that by implementing computer networking, a business can cut back on costs and utilize
resources more efficiently.

394. Solution: CD-ROM: Compact Disc - Read-Only Memory, with a capacity of around 700 MB to
900 MB.
DVD: Digital Versatile Disc, with a standard single-layer capacity of 4.7 GB and dual-layer capacity
of 8.5 GB.
Blu-Ray: High-definition optical disc with a single-layer capacity of 25 GB and dual-layer capacity
of 50 GB.

395. Solution: Statement I: True - Tablet computers typically have touch screens, enabling direct
interaction with the device using fingers or a stylus.
Statement II: False - A tablet computer typically does not have a physical keyboard as its primary
input method. While some tablets may offer detachable or optional keyboards, it is not a standard
feature of tablet design.

396. Solution: All desktop computers have a built-in touchpad: This statement is false. Desktop
computers typically do not have built-in touchpads. Touchpads are commonly found on laptops
as an alternative to using a mouse, but for desktop computers, a separate mouse is usually used
for navigation.
Rest of the statements are true.

397. Solution: Post Office Protocol (POP) is an Internet standard protocol used for retrieving email
from a remote mail server. It is one of the most widely used email retrieval protocols.

IFAS Publications
www.ifasonline.com
149
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

POP operates on the client-server model, where the email client (such as Outlook or Thunderbird)
connects to the mail server to download and retrieve emails. The latest version of the protocol is
POP3 (Post Office Protocol version 3).

398. Solution: Drupal is a popular open-source CMS that enables the creation and management of
various types of websites and web applications. It provides a flexible and extensible framework
for developers and offers a wide range of features for content management, user management,
and website customization. Many organizations and individuals utilize Drupal to power their
websites and online platforms.

399. Solution: The ASCII (American Standard Code for Information Interchange) character encoding
scheme uses 8 bits to represent each character. Therefore, the number of characters in the 8-bit
ASCII code is 2^8, which is equal to 256. This includes standard characters such as letters,
numbers, punctuation marks, control characters, and special symbols.

400. Solution: Statement I: True - A router is a networking device that enables data packets to be
routed between different networks. It determines the best path for data packets to reach their
destination across multiple networks.
Statement II: False - A router works at the Network Layer (Layer 3) of the OSI model, not the Data
Link Layer. It uses network layer protocols (such as IP) to make routing decisions based on
destination IP addresses.

401. Solution: FTP (File Transfer Protocol) is a standard network protocol used for transferring
files between a client and a server over a computer network. It provides a simple and reliable
method for uploading, downloading, and managing files on remote servers. It is used to
transfer files of any size.

402. Solution: Disk drives typically have a faster data transfer rate, which is represented as 100
Mbps
Laser printers require a higher data transfer rate due to processing large amounts of data, typically
around 1 Mbps.
Keyboards involve minimal data transfer, with a relatively low rate of 50 bits per second (bps).
Mouse sends data at the rate of 120 bps.

403. Solution: The MAC address serves as the physical address that uniquely identifies each device
on a given network. In order for communication to occur between two networked devices, both
an IP address and a MAC address are required.
The MAC address of a device is globally unique, meaning that no two devices can have the same
MAC address.

404. Solution: Registers are a type of memory that is integrated into the processor itself. They are
small storage units built within the processor and are used to hold instructions, data, and
intermediate results during the execution of a program. Registers are extremely fast, but they
have limited capacity.

405. Solution: A logic bomb is a type of malicious code or software program that is intentionally
inserted into a computer system with the aim of triggering a harmful action or behavior when
specific conditions are met. It is typically designed to remain dormant and undetected until a
particular event or trigger occurs, such as a specific date or time, a specific user action, or a
predefined system condition. Once the trigger condition is met, the logic bomb activates and
executes its intended malicious payload.

IFAS Publications
www.ifasonline.com
150
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

406. Solution: Most web browsers have a home page feature and include hyperlinks for easy
navigation. However, they do have the ability to store users' favorite pages through bookmarks
or favorites. Additionally, web browsers keep a history of the websites visited by users.
Therefore, the correct statements are that web browsers have a home page and hyperlinks for
navigation.

407. Solution: A blog is a type of website or online platform where individuals or groups regularly
publish content in a chronological format. The term "blog" is a shortened form of "weblog."
Blogs often contain articles or posts written in an informal or conversational style, allowing
bloggers to express their thoughts, share information, or engage with their audience on various
topics.

408. Solution:
A. Dynamic Random Access Memory (DRAM) is fabricated using transistors and capacitors.
B. Static Random Access Memory (SRAM) is fabricated using flip-flops.
C. Programmable Read Only Memory (PROM) is fabricated using a matrix of fuses.
D. Erasable Programmable Read Only Memory (EPROM) is fabricated using floating gate
transistors and capacitors.

409. Solution:
B. 1500 Mbps = 1.5 GB
D. 1 Gbps
A. 1500 kbps = 1.5 MB
C. 1 Mbps

410. Solution: Statement I: You can add attachments of any file size to an email.
This statement is false. While many email providers and clients allow users to attach files to their
emails, there are usually limitations on the file size that can be attached. Email services typically
have a maximum attachment size limit, which can vary depending on the provider or client used.
Statement II: You can only send emails from a laptop computer.
This statement is also false. Email can be sent from various devices, including laptops, desktop
computers, smartphones, tablets, and even some feature phones.

411. Solution:
A. Recording a song to play on an iPod - The corresponding file type is 2. mp3, which is a
commonly used audio file format.
B. Saving a video - The corresponding file type is 3. mp4, which is a popular video file format.
C. Sending a photo to someone using your mobile - The corresponding file type is 4. jpeg, which is
a commonly used image file format.
D. Compressing a folder of files - The corresponding file type is 1. zip, which is a file compression
format used to reduce file size and package multiple files or folders together.

412. Solution: Bluetooth and Wi-Fi are wireless communication technologies, but they operate in
different frequency ranges and have different characteristics.
Bluetooth generally has a shorter range compared to Wi-Fi. Bluetooth is designed for short-range
communication, typically up to around 10 meters (or 30 feet). It is commonly used for connecting
devices like smartphones, headphones, and speakers in close proximity.

413. Solution: The Internet indeed provides numerous benefits to students in various aspects.
Assertion A states this fact. Reason R supports Assertion A by explaining that the Internet
offers access to a vast amount of information, knowledge, and educational resources. This

IFAS Publications
www.ifasonline.com
151
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

abundance of resources extends learning opportunities beyond the traditional classroom


setting.
Therefore, both Assertion A and Reason R are true and aligned with each other.

414. Solution: Statement I: True - The base of the binary number system is indeed 2. In the binary
system, numbers are represented using only two digits: 0 and 1.
Statement II: True - Binary addition is similar to decimal addition in terms of the concept of adding
numbers together. However, the rules of binary addition are simpler since there are only two
possible digits (0 and 1) and straightforward carry-over rules.

415. Solution: An operating system (OS) is a software program that serves as the foundation for
managing computer hardware and software resources. It acts as an intermediary between the
computer's hardware and software, enabling users to interact with the computer and execute
various tasks efficiently.
The primary functions of an operating system include:
Process management
Memory management
File system management
Device management
User interface
Security and protection
An operating system does not provide internet access.

416. Solution:
A. Authoring language used to create documents to be viewed on the World Wide Web - 3. HTML
B. Computer that responds to requests to provide information and services over the Internet - 4.
Internet Server
C. Defines how messages are transmitted and formatted over the Internet - 2. HTTP
D. Software that enables users to access/view documents and other resources on the Internet - 1.
Browser

417. Solution: Blu-Ray - Blu-Ray discs have the highest storage capacity among the given options,
typically ranging from 25 GB to 128 GB, depending on the disc type.
DVD - DVDs have a lower storage capacity compared to Blu-Ray discs. They typically have a
storage capacity of 4.7 GB for single-layer discs and 8.5 GB for dual-layer discs.
CD-ROM - CD-ROMs have the lowest storage capacity among the given options. They can hold up
to 700 MB of data.

418. Solution: An operating system (OS) is a software program that serves as the foundation for
managing computer hardware and software resources. It acts as an intermediary between the
computer's hardware and software, enabling users to interact with the computer and execute
various tasks efficiently.
The primary functions of an operating system include:
Process management
Memory management
File system management
Device management
User interface
Security and protection
An operating system does not provide internet access.

IFAS Publications
www.ifasonline.com
152
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

419. Solution: A radio button is a GUI component that allows users to select only one option from a
group of mutually exclusive options. When multiple radio buttons are presented together, the
user can choose only one option at a time. Radio buttons are commonly used in forms and
dialog boxes where users need to make a single selection from a list of options.

420. Solution:
A. MB (Megabyte) - Represents 2^20 bits.
B. GB (Gigabyte) - Represents 2^30 bits.
C. TB (Terabyte) - Represents 2^40 bits.
D. PB (Petabyte) - Represents 2^50 bits.
The numbers associated with each memory size represent the number of bits in binary notation.

421. Solution: Phishing refers to a fraudulent activity where individuals or entities attempt to
deceive others into revealing sensitive information, such as passwords or credit card details.
Statement II: It can be filtered but at the Internet Service Provider's (ISP) level. - This statement is
partially correct. Phishing attempts can be filtered and blocked at the ISP level through various
security measures, such as spam filters and blacklisting known phishing websites.

422. Solution: HTTP is a protocol used for communication between web browsers and web servers.
It is primarily used for fetching and transferring hypertext documents, such as HTML files,
from a web server to a client (web browser) over the Internet.

423. Solution: Intranets are private networks that are designed to be accessible only to authorized
users within a specific organization. They are not accessible to anyone outside of the
organization's network, and access to the Intranet is typically limited to employees or
approved individuals.

424. Solution: The World Wide Web refers to a system of interconnected web pages and other
resources, such as images, videos, and documents, that are accessible over the internet. These
web pages are hosted on websites and can be accessed through web browsers. The World Wide
Web utilizes hyperlinks to connect web pages and enable users to navigate between different
websites and access information stored on various servers around the world.

425. Solution: To protect software copyright:


Software often requires a unique product key for activation.
Users are required to sign a license agreement that outlines terms and conditions.
Holograms on packaging help verify authenticity and prevent counterfeiting.
Dongles are used to prevent unauthorized use and must be present for the software to function
properly.

426. Solution: macOS is a computer operating system developed by Apple Inc. It is the primary
operating system used on Apple's Mac computers. macOS is known for its sleek and intuitive
user interface, seamless integration with Apple hardware and software, and a strong focus on
security and privacy.

427. Solution: The ICT tools for teaching and their purposes are:
A. Google Classroom - Provides access to course content.
B. Google Meet - Facilitates synchronous interaction among participants.
C. Google Quiz - Used for assessment of learning.
D. Google Jamboard - Enables collaborative tasks and activities.

IFAS Publications
www.ifasonline.com
153
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

428. Solution: The file drawer problem refers to the tendency of statistically non-significant results
to be less likely to be published in primary research and meta-analytic reviews.

429. Solution: Phishing is a type of cyber attack where fraudulent communications imitate
reputable sources to deceive individuals or organizations. Attackers aim to trick recipients into
divulging sensitive information or performing harmful actions. This is typically done through
emails, messages, or websites that appear legitimate but are designed to steal personal data,
passwords, or financial details. Phishing attacks can lead to identity theft, financial fraud, or
other malicious activities.

430. Solution: Statement I is true. Denial of Service (DoS) attacks are aimed at disrupting or
preventing legitimate users from accessing a network, particularly targeting internet servers.
These attacks overload the network or system with excessive traffic or requests, causing a
service outage.
Statement II is false. Email filters are not directly related to mitigating DoS attacks. DoS attacks
primarily target network resources rather than email systems. Mitigating DoS attacks typically
involves implementing specialized network security measures, such as firewalls, intrusion detection
systems, or rate limiting mechanisms.

431. Solution: Ethernet is a widely used technology for local area networks (LANs). It provides a
means for multiple computers or devices to be connected together within a limited geographic
area, such as an office building or campus. Ethernet defines the rules and protocols for
communication between these devices, enabling them to share data and resources. It uses a
wired connection typically using Ethernet cables, switches, and routers to create a network
infrastructure.

432. Solution: A firewall is a network security device or software application that monitors and
controls incoming and outgoing network traffic based on predetermined security rules. It also
keeps a list of IP addresses thus preventing access to certain websites.

433. Solution:
A. Hacking (2) - Unauthorized access to data entered by the keyboard.
B. Phishing (3) - Deceptive tactics used to steal personal information for identity fraud.
C. Spyware (4) - Illegally collecting personal data for malicious purposes.
D. Spam (1) - Unwanted bulk emails that clog up an inbox.

434. Solution: The data bus is a communication pathway within a computer system that is
responsible for transferring data between the processor (CPU), memory, and input/output
(I/O) devices.
The data bus can be both uni-directional and bi-directional, depending on the specific bus
architecture.

435. Solution: Trojan horses are malicious programs that are commonly disguised as legitimate or
desirable software. They may masquerade as useful applications, games, or even security
software. Users are tricked into installing them, unaware of their malicious intent.

436. Solution: Anti-virus software primarily focuses on detecting and protecting against malicious
software and threats. It does not directly address data authenticity, which pertains to verifying
the integrity and origin of data. Data authenticity is typically addressed through other means,
such as digital signatures and cryptographic techniques.

IFAS Publications
www.ifasonline.com
154
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

437. Solution: Anti-spyware software detects and removes programs installed illegally on a user's
computer system. It specifically focuses on identifying and eliminating spyware programs that
may track user behaviour, gather personal information, display unwanted advertisements, or
interfere with the normal functioning of the computer.

438. Solution:
A. Measurement applications (2) - Examples include monitoring river pollution levels.
B. Control applications (3) - Examples include controlling an automatic oven.
C. Modelling applications (1) - Examples include simulating car crashes for testing and analysis.
D. Expert systems (4) - Examples include using AI-based systems for medical diagnosis.

439. Solution: A device driver is a software component that allows communication between a
hardware device (such as a printer, keyboard, or graphics card) and the operating system. It
acts as an intermediary, translating the commands and data from the operating system into a
format that the device can understand and process.

440. Solution: The data bus is a communication pathway within a computer system that is
responsible for transferring data between the processor (CPU), memory, and input/output
(I/O) devices.
The data bus can be both uni-directional and bi-directional, depending on the specific bus
architecture.

441. Solution: A modem (short for modulator-demodulator) is a device that converts digital data
from a computer or network into analogue signals that can be transmitted over telephone lines
or other communication channels. It also perform the reverse process of converting analogue
signals received from the communication channel back into digital data that can be understood
by computers or network devices.

442. Solution: Hard Disk Drives (HDDs) consist of circular platters made of a rigid material
(usually metal or glass) that are coated with a magnetic material. These platters are the
primary storage medium where data is magnetically recorded and stored. Access to data in a
Hard Disk Drive (HDD) is generally slower compared to Random Access Memory (RAM).
443. Solution: A disk defragmenter is a software utility that is used to rearrange blocks of data on a
hard disk drive (HDD) in order to store files in contiguous (continuous) sectors. The purpose of
disk defragmentation is to optimize the performance and efficiency of the hard disk.

444. Solution: The control unit is a crucial component of the processor responsible for
coordinating and controlling the execution of instructions. It manages the flow of data between
different parts of the processor, interprets instructions, and controls the timing and sequencing
of operations.

445. Solution:
A. IP Address (2) - IP addresses are used at the Network Layer to uniquely identify devices on a
network. They play a crucial role in routing data packets across different networks.
B. MAC Address (4) - MAC addresses are used at the Data Link Layer to uniquely identify network
interfaces (NICs) of devices. They are assigned by hardware manufacturers and are embedded in the
network interface cards.
C. Socket Address (3) - Socket addresses are used at the Transport Layer to establish network
connections between applications running on different devices. They consist of an IP address and a
port number and are used to identify specific network services or processes.

IFAS Publications
www.ifasonline.com
155
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

D. URL Address (1) - URL addresses are used at the Application Layer to specify the location of
resources on the internet. They are commonly used in web browsers to access web pages and other
resources.

446. Solution: ZOOM: ZOOM is a widely used video conferencing platform that allows users to host
online meetings, webinars, and virtual conferences. It offers features like screen sharing, chat,
breakout rooms, and recording capabilities.
Microsoft Teams: Microsoft Teams is a collaboration and communication platform that includes
video conferencing functionality. It enables users to conduct online meetings, schedule conferences,
and collaborate on documents in real-time.
Big Blue Button: Big Blue Button is an open-source web conferencing system primarily used in
educational settings for virtual classrooms and webinars.
447. Solution: The BIOS is a firmware stored in a special type of memory called ROM, which stands
for Read-Only Memory. The ROM chip is typically located on the computer's motherboard. It
contains the basic instructions and settings necessary for the computer to boot up and
initialize the hardware components.

448. Solution:
A. Magnetic Tape - Used for data archival purposes but must be accessed sequentially.
B. Memory Card - Used in digital cameras, photo printers, and cell phones.
C. Hard Disk - A set of metal disks mounted on a spindle.
D. DVD - Uses laser beam technology to read or write data.

449. Solution: Search Engines are online platforms or websites designed to help users search for
information on the World Wide Web. They allow users to enter keywords or phrases related to
their search queries and then provide a list of relevant web pages, documents, images, videos,
or other online resources that match the search criteria.
Search Engines do not provide the exact same results to all users for a given search term. Search
results can vary based on several factors, including the search engine's algorithm, user preferences,
location, search history, and personalized settings.

450. Solution:
(C) 1 TBytes (1 Terabyte) - This is the largest capacity among the given options. 1 Terabyte is equal
to 1,000 Gigabytes or 1,000,000 Megabytes.
(A) 100 GBytes (100 Gigabytes) - This is the smallest capacity among the given options. 100
Gigabytes is equal to 100,000 Megabytes.
(B) 10,000,000,000 Bytes (10 Gigabytes) - This is the third-largest capacity among the given options.
10 Gigabytes is equal to 10,000 Megabytes.
(D) 1,000,000 KBytes (1 Megabyte) - This is the second-largest capacity among the given options. 1
Megabyte is equal to 1,000 Kilobytes.

451. Solution: Both the assertion and reason highlight the importance of technical knowledge and
orientation in utilizing modern teaching support tools based on ICT. The reason explains the
rationale behind the assertion, emphasizing the need for guidance and training to ensure
intelligent and effective use of these tools.
452. Solution: Random access storage devices are those that allow for direct access to data stored
on them, regardless of the location of the data within the storage medium. This means that data
can be accessed and retrieved in a non-sequential manner.

453. Solution: Software refers to the programs and applications that run on a computer or other
electronic devices. They provide functionality and perform specific tasks.

IFAS Publications
www.ifasonline.com
156
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(A) Adobe is a company that develops and distributes various software applications such as Adobe
Photoshop, Adobe Acrobat, and Adobe Illustrator.
So it is not a software but rest are.

454. Solution:
A. Proprietary LMS - Refers to a Learning Management System (LMS) that is developed and owned by
a specific company or organization. Blackboard is an example of a proprietary LMS.
B. Open source LMS - Refers to a Learning Management System (LMS) that is developed and
distributed under an open-source license. Moodle is an example of an open-source LMS.
C. Cloud-based LMS - Refers to a Learning Management System (LMS) that is hosted on the cloud and
accessed through the internet. Google Classroom is an example of a cloud-based LMS.
D. Data collection and quiz - Refers to a tool or platform used for collecting data and creating quizzes
or surveys. Google Forms is an example of a platform that allows data collection and quiz creation.

455. Solution: Recording meetings is only available to users with a paid Google Workspace
(formerly G Suite) subscription.
In order to join an online class or session conducted through Google Meet, you typically need to
have a Google account and log in using your credentials.

456. Solution: Dual Core: Dual Core processors are more advanced and faster than the other
options listed. Dual Core processors have two independent cores, allowing for better
multitasking and improved performance.
Pentium - III: Pentium III processors were released by Intel in the late 1990s. While they were
powerful for their time, they are now outdated and slower compared to modern processors.
80486: The 80486, commonly known as the 486, is an older generation processor released in the
early 1990s. It is significantly slower compared to modern processors.
8085: The 8085 is a microprocessor developed by Intel in the late 1970s. It is an early generation
processor and much slower compared to the other options listed.

457. Solution: Statement I is correct. USB drives and flash drives are interchangeable terms used to
refer to portable storage devices that use flash memory to store data.
Statement II is correct. MICR stands for Magnetic Ink Character Recognition. It is a technology
used by banks to process and read the unique set of numbers printed in magnetic ink at the bottom of
checks and deposit slips.

458. Solution:
A. Apple Inc. - Steve Jobs was one of the co-founders of Apple Inc. He played a significant role in the
development and success of the company.
B. Microsoft Inc. - Bill Gates co-founded Microsoft Inc. along with Paul Allen. Bill Gates is widely
known for his contributions to the personal computer revolution and the growth of Microsoft.
C. Infosys Ltd. - N.R. Narayana Murthy co-founded Infosys Ltd., an Indian multinational corporation
providing IT consulting and outsourcing services.
D. Airtel - Sunil Bharti Mittal is the founder and chairman of Bharti Enterprises, which is the parent
company of Airtel, one of India's largest telecommunications companies.

459. Solution: Volatile memory refers to a type of computer memory that requires power to retain
stored data. When power is removed or the computer is turned off, the data stored in volatile
memory is lost. RAM (Random Access Memory) and cache memory are examples of volatile
memory.

460. Solution:
(B) 5 K Bytes: This represents 5 kilobytes, which is the smallest capacity among the given options.

IFAS Publications
www.ifasonline.com
157
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(C) 1 G Bytes: This represents 1 gigabyte, which is larger than 1500 megabytes. It is equivalent to
1,024 megabytes
(A) 1500 M Bytes: This represents 1500 megabytes, which is larger than 1GB.
(D) 2 T Bytes: This represents 2 terabytes, which is the largest capacity among the given options. It is
equivalent to 2,048 gigabytes, 2,097,152 megabytes.

461. Solution:
A. Mouse: It is an input device used to control the movement of a cursor on a computer screen.
B. Modem: It is a network device that allows computers to connect to the internet by converting digital
signals into analog signals for transmission over telephone lines or other communication channels.
C. Pen Drive: It is an external memory device that provides portable storage for digital data. It is
commonly used to transfer and store files between computers.
D. Opera: It is a web browser, which is a software application used to access and view websites and
web content on the internet.

462. Solution: Software programs permanently stored in ROM are called firmware.
Cyberbullying refers to the act of using electronic communication platforms, such as the internet,
social media, instant messaging, or cell phones, to harass, intimidate, or humiliate someone. It
involves the deliberate and repeated use of technology to target and harm individuals by spreading
hurtful, offensive, or embarrassing content.

463. Solution: Random Access Memory (RAM) is not a permanent storage device. It is a type of
volatile memory that temporarily holds data and instructions that are actively being used by
the computer. The data in RAM is lost when the power is turned off.

464. Solution: Worm is a type of malicious software that replicates itself and spreads across
computer networks without requiring user intervention. Unlike viruses that require a host
program to spread, worms are standalone programs that can independently propagate and
infect other systems.

465. Solution: RAM is a type of main memory that stores data and instructions that are actively
being used by the computer. It allows for quick access and retrieval of information by the CPU.
RAM is volatile, meaning its contents are lost when the power is turned off.

466. Solution: Optical drive: Optical drives have slower access times due to mechanical movements
and optical reading methods used to access data from CDs or DVDs.
SSD (Solid-State Drive): SSDs offer faster access times compared to traditional hard drives because
they utilize flash memory technology, which has no moving parts.
RAM (Random Access Memory): RAM provides faster access to data compared to optical drives
and hard drives. It is used for temporary storage of actively used data and instructions.
CPU Cache: CPU cache is a small but extremely fast memory located on the CPU. It stores
frequently accessed data and instructions, enabling the CPU to retrieve them quickly.

467. Solution: With respect to computers, TFT stands for Thin Film Transistor. It is a technology
commonly used in flat-panel displays, such as computer monitors, laptops, and televisions.

468. Solution:
8 Giga bytes = 8 x 2 30 bytes = 2 33 bytes

469. Solution: Web browsers are software applications that allow users to access and navigate the
World Wide Web (WWW). They retrieve and display web pages, interpret HTML (Hypertext
Markup Language) code, and render the content of websites, including text, images, videos, and

IFAS Publications
www.ifasonline.com
158
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

interactive elements. Users can interact with web browsers by entering URLs (Uniform
Resource Locators) or search queries, bookmarking favorite websites, managing cookies, and
more. Internet Explorer and Mozilla Firefox are examples of popular web browsers used by
millions of people worldwide.

470. Solution: The correct order of development is as follows:


(C) Magnetic Tape 🡪 It was developed in Germany in 1928.
(D) Floppy Disk 🡪 It was created by IBM in 1971.
(B) CD-ROM Japanese company Denon developed CD-ROM in 1982.
(A) DVD 🡪 It was invented by two groups of companies Sony Corporation and Philips
Electronics NV in 1995.

471. Solution: The internet encompasses a wide range of services that include file transfer, World
Wide Web services, communication tools, directory assistance, information retrieval, Usenet,
and more.
The World Wide Web (WWW) is a system of interconnected hypertext documents and other
resources that are accessed over the internet.

472. Solution:
A. e-Vidwan: It aims to create an expert database and a national research network.
B. e-Kalpa: It provides subscription-based access to scholarly information such as e-books and e-
journals at lower rates.
C. e-Yantra: It focuses on spreading education in embedded systems and robotics.
D. e-Sodh Sindhu: It aims to establish a digital learning environment for design-related subjects.

473. Solution: Podcasting is primarily associated with audio content and the platforms used for
distribution, such as Spotify. A microphone is an essential tool for recording podcast episodes.
However, Microsoft Excel is a spreadsheet software and is not directly related to podcasting.

474. Solution: CC (Carbon Copy): CC stands for "Carbon Copy." When you add recipients to the CC
field, it means that you are sending a copy of the email to those recipients in addition to the
primary recipient(s) in the "To" field. The primary recipients in the "To" field can see who else
has been copied in the CC field.
BCC (Blind Carbon Copy): BCC stands for "Blind Carbon Copy." When you add recipients to the
BCC field, it means that you are sending a copy of the email to those recipients without the
knowledge of the primary and other recipients. The primary recipients cannot see who has been
included in the BCC field.

475. Solution: Main Memory: Main memory, also known as RAM (Random Access Memory), is the
fastest storage device in terms of data retrieval speed. It provides quick access to data and
instructions that the computer's processor needs to perform tasks.
Hard Disk: Hard disks are magnetic storage devices used for long-term storage of data. They are
slower than main memory but offer larger storage capacity. Data retrieval from a hard disk takes
more time compared to main memory.
CD-ROM: CD-ROMs (Compact Disc-Read Only Memory) are optical discs used for storing data.
They have slower data retrieval speeds compared to both main memory and hard disks. Reading data
from a CD-ROM involves the physical movement of the optical drive's laser to access the desired
information.

476. Solution:

IFAS Publications
www.ifasonline.com
159
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(A) PDF (Portable Document Format): PDF files can contain various elements, including
text, images, graphics, and formatting. While PDFs can contain ASCII characters, they can also
include other character encodings and non-textual content.
(B) RTF (Rich Text Format): RTF files are capable of storing formatted text, including fonts,
styles, colors, and other formatting options. While RTF can include ASCII characters, it supports
additional features beyond plain ASCII text.
(C) JPG (JPEG): JPG files are image files that store visual content in a compressed format.
They are not used for storing plain ASCII text.
(D) CSV (Comma-Separated Values): CSV files store tabular data in a plain text format,
where each value is separated by a comma. While CSV files can contain ASCII characters in the
data fields, they are not exclusively limited to ASCII text.
(E) The TXT file format is a plain text file that contains only ASCII characters. ASCII
(American Standard Code for Information Interchange) is a character encoding standard that
represents text in computers and communication devices.

477. Solution: Firewalls achieve their purpose by examining network packets and applying rules to
determine whether to allow or block specific traffic. They can restrict access to a network by
filtering incoming and outgoing traffic based on various criteria, such as IP addresses, ports,
protocols, and application-specific rules. By doing so, firewalls help prevent unauthorized
users or potentially harmful data from entering or leaving the network.

478. Solution: The assertion (A) is true because bitmap file formats, such as .BMP, are not typically
recommended for graphics on websites. This is primarily due to the reason (R) mentioned,
which states that bitmap graphics store information about every individual pixel in an image,
resulting in larger file sizes compared to other image formats.
479. Solution: Parity checking is a method used to detect errors or changes in data transmission. It
involves adding an additional bit to a group of bits being transmitted, known as a parity bit.
The parity bit is calculated based on the number of bits in the group that have a value of 1. The
parity bit can be either even or odd, depending on the desired parity scheme.

480. Solution: The MAC (Media Access Control) address, also known as the physical address or
hardware address, is a unique identifier assigned to a network interface card (NIC) or network
adapter. It is a 48-bit (6-byte) address that is typically represented as a series of six pairs of
hexadecimal digits separated by colons or hyphens.

481. Solution: QR codes can indeed hold digits. In addition to storing website addresses, QR codes
can encode various types of data, including numeric data, alphanumeric data, binary data, and
even Kanji characters. They are versatile and can encode a wide range of information beyond
just website addresses, such as contact information, product details, payment information, and
more.

482. Solution: USB is an asynchronous serial data transmission method, not synchronous. In
asynchronous transmission, data is sent in a self-contained format with start and stop bits to
delineate each data byte. This allows for flexible data transmission and synchronization
between devices.

483. Solution: A sensor is a device designed to identify and react to various inputs originating from
the physical environment. These inputs may include light, heat, motion, moisture, pressure, or
many other environmental factors. Sensors detect these phenomena and generate
corresponding outputs or signals.

IFAS Publications
www.ifasonline.com
160
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

On the other hand, a microphone is a device that converts sound vibrations in the air into electronic
signals or records them onto a recording medium. It captures audio waves and transforms them into
electrical representations that can be processed, transmitted, or stored for later playback or analysis.

484. Solution: Cache memory (List 1A) is associated with high-speed integrated circuits (List 2A).
Cache memory is a type of fast and temporary memory that stores frequently accessed data to
improve overall system performance.
Main memory (List 1B) is typically implemented using integrated circuits, specifically dynamic
random-access memory (DRAM) chips (List 2B). Main memory serves as the primary storage for
data and instructions that are actively used by the CPU.
Hard Disk (List 1C) utilizes magnetic surfaces (List 2C) for data storage. Hard disks consist of
rotating magnetic platters on which data is read from and written to using magnetic heads.
CD ROM (List 1D) refers to Compact Disc Read-Only Memory and uses laser technology (List 2D).
CD ROMs are optical discs that store data and can be read using a laser beam.

485. Solution: URL stands for Uniform Resource Locator. It is a specific type of URI (Uniform
Resource Identifier) that is used to identify and locate resources on the internet. A URL is
essentially the web address that specifies the location of a resource, such as a web page, image,
video, or file, on the World Wide Web.

486. Solution: Smartwatches do not use CRT (Cathode Ray Tube) technology, which is an older
display technology found in traditional bulky monitors. Smartwatch screens are typically based
on newer technologies such as LCD (Liquid Crystal Display) or OLED (Organic Light Emitting
Diode).
A mainframe computer is a powerful and high-performance computer system that is designed to
handle large-scale computing tasks and process vast amounts of data. It serves as a centralized
computing platform for organizations that require high reliability, security, and scalability.

487. Solution: Statement I is true. GPS (Global Positioning System) is a satellite-based navigation
system that allows users to determine their precise location on Earth. By receiving signals from
multiple satellites, GPS receivers can triangulate their position and provide accurate
coordinates, enabling users to navigate and track their location.
Statement II is false. GPS systems are designed to enhance safety and convenience in navigation.
Unlike traditional paper maps, GPS systems provide real-time guidance and turn-by-turn directions,
eliminating the need for drivers to consult physical maps while driving.

488. Solution: A structured interview (List 1A) is typically conducted in a face-to-face setting (List
2A). It involves a set of predetermined questions asked to the interviewee in a structured
manner.
Email (List 1B) is a form of communication that can be embedded or included within various
applications or platforms (List 2B). This means that email functionality can be integrated into
different software or systems.
Census (List 1C) refers to the enumeration of an entire population (List 2C). It involves collecting
data from every individual or entity within a specific geographic area or demographic group.
A probability sample (List 1D) is one of the methods used in sampling techniques, specifically
referring to a simple random sample (List 2D). In a simple random sample, each member of the
population has an equal chance of being selected.

489. Solution: An input device (List 1A) is a device used to provide data or commands to a
computer system. A scanner (List 2A) is an example of an input device that is used to convert
physical documents or images into digital data.

IFAS Publications
www.ifasonline.com
161
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

An output device (List 1B) is a device used to display or present data or information generated by a
computer system. A speaker (List 2B) is an example of an output device that is used to produce
sound or audio output.
A pointing device (List 1C) is a device used to control the movement of a cursor or pointer on a
computer screen. A trackball (List 2C) is an example of a pointing device that allows users to move
the cursor by rolling a ball with their fingers.
A sensor device (List 1D) is a device that detects and responds to physical or environmental input. A
traffic light simulator (List 2D) is an example of a sensor device that simulates the behavior of a
traffic light system.

490. Solution: statement I is true. In many control systems or applications, sensors are used to
monitor various parameters or conditions. If the sensor data indicates that a parameter or
condition is outside the acceptable range or predefined thresholds, the microprocessor or
computer controlling the system can be programmed to initiate appropriate actions or
responses. However, Statement II is not universally true, as sensor behavior in a control
application can vary and may involve continuous data transmission rather than only sending
data when something happens.

491. Solution: Phishing involves the use of fraudulent emails, messages, or websites that appear to
be from reputable sources, such as banks, online services, or trusted organizations. The
purpose of these deceptive communications is to convince recipients to provide their
confidential information or perform actions that benefit the attacker.

492. Solution:
A. This statement is incorrect. WLAN stands for Wireless Local Area Network, which is a wireless
network that covers a relatively small area, such as a home, office, or campus. It is not a wide area
network.
B. This statement is incorrect. A hub is a networking device that simply broadcasts incoming data
packets to all connected devices on a network. It does not send the packet to the correct device based
on its destination address. Switches, on the other hand, are devices that perform this task by
examining the destination MAC addresses.
C. This statement is incorrect. An IP address is typically assigned to a device dynamically through
DHCP (Dynamic Host Configuration Protocol) or manually configured by a network administrator.
It is not assigned at the manufacturing stage.
D. This statement is correct. A network Interface card (NIC) is a hardware component that enables a
device to connect to a network. It provides the necessary physical connection and communication
protocols to transmit and receive data over the network.
E. This statement is correct. Routers are network devices that operate at the network layer (Layer 3) of
the OSI model. They receive data packets from different networks and inspect their destination IP
addresses to determine the appropriate path for forwarding the packets. Routers play a crucial role in
directing network traffic across different networks, such as the internet.

493. Solution: Firewalls are security devices or software applications that act as a barrier between
a trusted internal network (such as a user's computer) and an external network (such as the
internet). They monitor and control incoming and outgoing network traffic based on
predefined security rules. By analyzing network packets and applying these rules, firewalls
determine whether to allow or block specific traffic, helping to protect the internal network
from unauthorized access, malicious attacks, and unwanted traffic.

494. Solution: Social bookmarking is a method of organizing, storing, and sharing bookmarks or
links to web pages. It allows users to save their favorite websites or online resources and
categorize them using tags or keywords. Social bookmarking platforms enable users to create a

IFAS Publications
www.ifasonline.com
162
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

bookmark warehouse or repository where they can store their bookmarks and make them
accessible to others.

495. Solution:
A. Measurement Application is matched with 3. Weather station because a weather station is used to
measure various weather parameters such as temperature, humidity, wind speed, and precipitation.
B. Control Application is matched with 1. Automatic Oven because an automatic oven is an example of
a control application where it uses sensors and algorithms to regulate temperature and cooking
times.
C. Modelling Application is matched with 4. Car Crash Simulator because a car crash simulator is a
software or hardware system that simulates vehicle collisions for research, training, or safety testing
purposes.
D. Communication Application is matched with 2. Website because a website is an example of a
communication application where information is exchanged between a server and clients over the
internet.

496. Solution: When a device connects to a network, it needs to have a unique identifier to
communicate with other devices on the network. This identifier is known as an IP address.
When a device joins a network, it is typically assigned an IP address either automatically
through a DHCP (Dynamic Host Configuration Protocol) server or manually configured.
Devices that never disconnect retain the same IP address is also true.

497. Solution:
A. Network System - This refers to the system used for networking purposes, and one of its
applications is email.
B. Operating System - This is the software that manages and controls the computer's operations, and it
is different from a firewall.
C. Memory - It refers to the storage component of a computer, and one type of memory is ROM (Read-
Only Memory).
D. Communication - This refers to the process of exchanging information, and one application of
communication is firewall, which is used to secure network communication.

498. Solution: MICR (magnetic ink character recognition) is a technology invented in the 1950s
that's used to verify the legitimacy or originality of checks and other paper documents. Special
ink, which is sensitive to magnetic fields, is used to print certain characters on the original
documents.

499. Solution: A utility program is a software application that provides useful functionality to the
user or helps in managing and maintaining the computer system. Among the options provided,
the most accurate description of a utility program is: It is a part of the operating system which
carries out defragmentation or disk formatting.

500. Solution: Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW) at CERN
in 1989. The purpose of the WWW was to facilitate information-sharing among scientists
globally.
The Domain Name System (DNS) is a decentralized naming system used to identify computers on
the Internet or IP networks. DNS associates domain names with relevant information.
The implementation of TCP/IP in ARPANET was a significant step in the development of computer
networks and the Internet. It was not the result of a single individual or organization, but rather a
progression over time.

IFAS Publications
www.ifasonline.com
163
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

The establishment of the Advanced Research Projects Agency (ARPA) led to the funding and
development of ARPANET in the late 1960s. ARPANET aimed to connect computers at research
institutions funded by the Pentagon.
Sputnik 1, launched by the Soviet Union in 1957, was the first artificial Earth satellite. It orbited the
planet for three weeks before its batteries depleted, and it continued to silently orbit for two more
months before reentering the atmosphere on January 4, 1958.

501. Solution: The first generation of computers, which emerged in the 1940s and 1950s,
predominantly used vacuum tubes as the primary electronic technology. Vacuum tubes, also
known as electron tubes or thermionic valves, were large, glass-encased devices that controlled
the flow of electrical current through a vacuum.

502. Solution: The relationship between Assertion A and Reason R is that of disagreement. While
Assertion A is true and highlights the transformative potential of IoT, Reason R is false. There
are indeed significant concerns regarding security, compatibility, and data privacy associated
with IoT.

503. Solution: A modem, short for modulator-demodulator, is a device used to modulate digital data
into analog signals for transmission over communication channels and demodulate analog
signals back into digital data for reception. Modems are primarily used to establish a
connection between a computer or network and an Internet service provider (ISP) or another
remote network.

504. Solution:
A. Secondary storage is non-volatile storage: This statement is true. Secondary storage, such as hard
disk drives (HDDs) or solid-state drives (SSDs), is non-volatile, meaning it retains data even when
power is turned off. It is commonly used for long-term storage of files and programs.
B. Video memory found in graphics cards is volatile memory: This statement is true. Video memory,
also known as VRAM (Video Random Access Memory), is a type of memory dedicated to storing
graphical data for display purposes. It is typically volatile memory, meaning its contents are lost
when power is turned off or during a system restart.
C. Primary memory (RAM) is the fastest form of memory in a computer: This statement is false as
Register and cache memory are faster than RAM.

505. Solution: Main Memory, which refers to the RAM (Random Access Memory), is a type of
dynamic random access memory (DRAM) that allows for quick access to data and instructions
by the CPU.
Cache Memory is a type of static random access memory (SRAM) that provides faster access to
frequently used data, reducing the time needed to retrieve information from the main memory.
Hard Disk is a magnetic memory device that uses rotating disks coated with magnetic material to
store and retrieve data.
CD ROM (Compact Disc Read-Only Memory) is an optical memory device that uses laser
technology to read data stored on CDs, which cannot be modified or erased.

506. Solution: The emergence of consumers who can control and create their own media, as well as
producers who can easily track consumer responses, is primarily made possible by the
Internet. The Internet has revolutionized the way media is produced, consumed, and interacted
with.

507. Solution: QR codes, short for Quick Response codes, are two-dimensional barcodes that can be
scanned and read by a smartphone or QR code reader. They were first developed in Japan in the

IFAS Publications
www.ifasonline.com
164
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

mid-1990s and have since gained widespread popularity worldwide. QR codes are capable of
storing various types of information, including text, URLs, contact information, and more.

508. Solution: EEPROM, which stands for Electrically Erasable Programmable Read-Only Memory, is
a type of non-volatile memory that retains its stored data even when the power is turned off. It
is commonly used to store firmware, such as the computer's BIOS.

509. Solution: Statement I accurately describes Twitter as a microblogging site. Twitter imposes a
character limit on each post, originally set at 140 characters but later expanded to 280
characters.
Statement II accurately describes a wiki. A wiki is a collaborative website or platform that allows
users to contribute and edit content. Entries in a wiki are typically organized and linked based on
topics rather than being presented in strict chronological order, allowing for non-linear navigation
and exploration of information.

510. Solution: The magnetic tape was one of the earliest storage devices, dating back to the mid-
20th century. It was commonly used for data storage and backup purposes.
The floppy disk, introduced in the 1970s, was a popular removable storage medium used for
personal computers. It had a flexible magnetic storage disk encased in a protective shell.
The CD-ROM (Compact Disc Read-Only Memory) emerged in the 1980s as a storage medium
capable of holding significantly more data than floppy disks. It was widely used for software
distribution, multimedia applications, and data storage.
The DVD (Digital Versatile Disc) came later, in the mid-1990s, and offered even greater storage
capacity than CD-ROMs. DVDs became the preferred medium for video content, larger software
installations, and data backup.
Therefore, the correct descending order of emergence for the storage devices is:
DVD 🡪 CD-ROM 🡪 FLOPPY DISK 🡪 MAGNETIC TAPE

511. Solution: Pen Drive is a portable storage device that uses flash memory to store data, making
it a form of non-volatile memory.
Hard Disk is a magnetic storage device that uses magnetically coated platters to store data, making it
an example of magnetic memory.
CD ROM (Compact Disc Read-Only Memory) is an optical memory device that uses laser
technology to read data stored on CDs. It is an example of optical memory.
RAM (Random Access Memory) is a form of volatile memory that provides temporary storage for
data and instructions while a computer is running. It loses its content when power is turned off.

512. Solution: A magnetic storage device is a type of storage medium that uses magnetized
particles or surfaces to store and retrieve data. It relies on the principles of magnetism to
encode and read information. Common examples of magnetic storage devices include:
Hard Disk Drive (HDD) , Magnetic Tape, Floppy Disk etc.

Exam Year – 2022


513. Solution: A MAC (Media Access Control) address is a unique identifier assigned to a network
interface controller (NIC) or network adapter. It is a hardware address that is permanently
assigned to the device by the manufacturer. The MAC address is a 48-bit (6-byte) address
typically represented in hexadecimal notation, separated into six pairs of two digits, such as
"00:1A:2B:3C:4D:5E".

514. Solution: IPv6 (Internet Protocol version 6) is the latest version of the Internet Protocol that
is designed to replace the older IPv4 addressing scheme. IPv4 addresses are 32-bit addresses,

IFAS Publications
www.ifasonline.com
165
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

while IPv6 addresses are 128 bits long. The increased address space of IPv6 allows for a much
larger number of unique addresses, which is necessary to accommodate the growing number of
devices connected to the Internet.

515. Solution: Statement I: WAPs (Wireless Access Points) are indeed connected to the wired
network, but they are not necessarily fixed in one location. WAPs can be deployed in various
locations within a wireless network to provide wireless connectivity to devices within their
coverage area. While some WAPs may be installed at fixed locations, others may be portable or
strategically placed based on the network requirements.
Statement II: WAPs primarily receive and transmit data between wired LANs (Local Area Networks)
and wireless devices, rather than between two wired LANs.

516. Solution: A repeater is a device used in communication systems to regenerate or amplify


signals. It is commonly used in transmission systems to boost the signal strength and extend
the reach of the transmission. It receives the signal, amplifies it, and retransmits it to overcome
signal degradation and ensure its integrity over long distances.
A repeater does not distribute data packets or send data to a specific computer. Its primary function
is to strengthen and propagate signals in a network. Additionally, repeaters can be used in both wired
and wireless systems to enhance signal transmission.

517. Solution: Input devices are used to provide input or send data to a computer system. A
joystick is an example of an input device.
Direct data entry refers to the process of directly entering data into a computer system using
specialized devices. Radio frequency identification (RFID) readers are an example of direct data
entry devices.
Output devices are used to display or present data from a computer system. Speakers are an example
of an output device.
Data backup refers to the process of creating copies of data for storage and protection. DVD can be
used as a storage medium for data backup purposes.

518. Solution: A word processor is a type of software used for creating, editing, and formatting
documents. OpenOffice is an example of a word processing software.
A database is a software application used for storing, managing, and retrieving structured data.
Oracle is an example of a database software.
An operating system is a software that manages computer hardware and software resources. Mac is
an example of an operating system.
Utilities are software programs that assist in managing and optimizing computer systems. Anti-virus
software is an example of a utility program that helps protect against malicious software.

519. Solution: Bluetooth is a wireless communication technology used for short-range data
transmission between devices. It allows devices to connect and communicate with each other
without the need for physical cables. Bluetooth is commonly used for connecting devices such
as smartphones, tablets, laptops, and peripherals like headphones, speakers, and keyboards. It
operates within a limited range, typically up to 10 meters, and supports various applications,
including file sharing, audio streaming, and device synchronization.

520. Solution: Pixel density is a measure of how closely packed the pixels are on a display or an
image. It is typically expressed as pixels per inch (PPI) or pixels per centimeter (PPCM). Pixel
density indicates the level of detail and clarity that can be achieved on a display. A higher pixel
density means more pixels are packed into a given area, resulting in sharper and more detailed
images.

IFAS Publications
www.ifasonline.com
166
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

521. Solution: RAM is a type of computer memory that is used to store data and program
instructions that are currently being used by the computer. It is a volatile memory, meaning
that its contents are lost when the computer is powered off or restarted. RAM is typically in the
form of integrated circuits (chips) installed on the computer's motherboard. RAM is not used to
store the Basic Input/Output System (BIOS) of the computer.

522. Solution: JPEG files use a lossy compression method, allowing for significant reduction in file
size while maintaining acceptable image quality. They are commonly used to store and transmit
photographs as smaller files, enabling faster loading and easier sharing over networks or
through various media.

523. Solution: Statement I is correct. Short-term memory refers to the temporary storage and
processing of information in the brain. It involves the encoding or initial acquisition of
information, the short-term storage of that information for a brief duration, and the ability to
manipulate or work with the stored information.
Statement II is correct. Short-term memory has a limited capacity in terms of the amount of
information it can hold at any given time. The exact capacity can vary among individuals but is
generally limited to a small number of items or chunks of information.

524. Solution: Computer-Aided Engineering (CAE) refers to the use of computer technology and
software tools to assist in the engineering analysis, design, and simulation of products and
systems. It encompasses various disciplines of engineering, such as mechanical, civil, electrical,
and aerospace engineering, among others.

525. Solution: Statement I is correct. Hardware refers to the physical components of a computer
system that can be seen and touched. It includes devices such as the central processing unit
(CPU), memory modules, hard drives, input and output devices (keyboard, mouse, monitor),
motherboard, graphics card, and other physical components that make up a computer system.
Statement II is incorrect. An operating system (OS) is not tailor-made according to individual user's
requirements. Instead, an operating system is developed by software companies or organizations to
serve the needs of a wide range of users and computing environments.

526. Solution: In a presentation software, the footer is a section located at the bottom of each slide
or page. It is commonly used to display information that remains consistent across multiple
slides or pages, such as the title, date, slide number, or in this case, a specific phrase.

527. Solution: Statement I: Database refers to a collection of logically related data. In a database,
data is organized and structured in a way that allows efficient storage, retrieval, and
manipulation. Databases are designed to store and manage large volumes of data, providing
mechanisms for data organization, indexing, querying, and maintaining data integrity.
Assembly language is a low-level programming language that serves as an intermediary between
machine code (binary instructions understood by computers) and high-level programming languages.
Assembly language uses mnemonic codes and symbols to represent the machine instructions,
making it more human-readable and understandable compared to machine code.

528. Solution: Blockchain is a decentralized and distributed digital ledger technology that provides
a secure and transparent way to record and verify transactions across multiple participants or
nodes in a network. The primary purpose of blockchain is to ensure the security and integrity
of data by employing cryptographic techniques.

529. Solution:

IFAS Publications
www.ifasonline.com
167
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement I: Operating system is not just a set of programs specific to a particular application. An
operating system is a software component that manages computer hardware and software resources
and provides essential services for running applications.
Statement II: Hardware does represent the physical and tangible parts of a computer. Hardware
refers to the physical components of a computer system, including the processor, memory, storage
devices, input/output devices, motherboard, and other electronic components.

530. Solution: Multimedia files refer to files that contain a combination of different media types,
such as text, audio, video, images, and animations. These files are designed to provide a rich
and interactive user experience by integrating various forms of media into a single entity.

531. Solution: Mr. Harsh has been employed to manage and maintain the company's networking
architecture and wide area connectivity. This indicates that his primary role is related to
networking, which involves designing, implementing, and maintaining computer networks and
their components. A networking engineer is responsible for tasks such as configuring network
devices, troubleshooting network issues, ensuring network security, optimizing network
performance, and managing network infrastructure.

532. Solution: ASCII (American Standard Code for Information Interchange) is a character
encoding standard that assigns unique numeric codes to represent characters in the English
alphabet, digits, punctuation marks, and control characters. It was developed in the 1960s as a
standardized way to represent text data in computer systems and communication protocols.

533. Solution: The full form of MOODLE is Modular Object-Oriented Dynamic Learning
Environment. MOODLE is a popular open-source learning management system (LMS) that
allows educators to create online courses and deliver content to students. It provides a
platform for organizing course materials, facilitating communication and collaboration,
tracking student progress, and conducting assessments. MOODLE is highly customizable and
used by educational institutions, businesses, and organizations worldwide.

534. Solution: To perform a t-test, we can utilize the software like MS Excel & SPSS
(A) MS Excel: MS Excel has built-in functions that allow you to calculate t-tests. You can use the
T.TEST function in Excel to perform a t-test on two independent samples or paired samples.
(C) SPSS: SPSS (Statistical Package for the Social Sciences) is a statistical software widely used in
research and data analysis. It provides a user-friendly interface for performing various statistical
tests, including t-tests.
(D) MS Equations: MS Equations is not a software specifically designed for statistical analysis. It is a
component of Microsoft Office that allows you to create and edit mathematical equations.
(B) Unix: Unix is an operating system, and it does not provide built-in statistical functions like Excel
or dedicated statistical software like SPSS.

535. Solution: Fiber optic cables use light signals to transmit data, utilizing the principle of total
internal reflection. The data is converted into light pulses, which travel through the core of the
fiber optic cable without being affected by electromagnetic interference. Unlike traditional
copper-based cables, fiber optic cables do not suffer from interference caused by electrical
signals or nearby electromagnetic fields. Therefore, fiber optic cables provide a reliable and
interference-free means of transmitting data over long distances.

536. Solution: CPU Registers are the fastest memory type in a computer, located directly on the
CPU chip itself. They provide the fastest access time as they are part of the CPU's internal
structure.

IFAS Publications
www.ifasonline.com
168
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Cache Memory is the next fastest memory type. It is a small, high-speed memory located close to
the CPU. Cache memory is designed to store frequently accessed data and instructions, providing
faster access compared to main memory.
Main Memory, also known as RAM (Random Access Memory), is slower than cache memory but
faster than other types of storage. It is used for temporary storage of data and instructions that are
actively being used by the CPU.
CD-ROM (Compact Disc Read-Only Memory) is slower than main memory. It is a type of optical
storage that uses lasers to read data from compact discs. CD-ROMs have a higher access time
compared to main memory due to the mechanical nature of disc reading.
Hard Disk is the slowest memory type among the options given. It is a non-volatile storage device
used for long-term storage of data. Hard disks have significantly higher access times compared to all
the other memory types listed here because they rely on mechanical components to read and write
data from spinning disks.

537. Solution: A Trojan Horse is malware disguised as legitimate software: This statement is true. A
Trojan Horse is a type of malware that masquerades as legitimate software or files to deceive
users into executing it. Once activated, it can perform malicious actions, such as stealing data,
damaging files, or granting unauthorized access to the attacker.
(B) A virus inserts itself into another program. It runs and spreads itself when the program is opened:
This statement is true. A computer virus is a type of malware that infects executable files or
programs. It attaches itself to a host file and replicates by inserting its own code into other files.
When an infected program is executed, the virus code also runs, allowing it to spread to other files
or systems.
(C) A worm is similar to a virus except that it does not need a program in order to run. It spreads by
itself: This statement is true. A computer worm is a self-replicating malware that does not require a
host program to spread. It can independently spread across computer networks, exploiting
vulnerabilities in operating systems, network protocols, or software applications. Worms typically
propagate by creating copies of themselves and sending them to other vulnerable systems, often
causing widespread infections and network congestion.
In summary, statements (A), (B), and (C) are all true.

538. Solution:
A. Video - 3. .mp4: Videos are commonly stored in the .mp4 file format.
B. Podcast - 4. .mp3: Podcasts are typically saved in the .mp3 file format.
C. Photograph - 2. .jpg: Digital photographs are often stored in the .jpg file format.
D. Spreadsheet - 1. .xlsx: Spreadsheets are commonly saved in the .xlsx file format, used by software
like Microsoft Excel.

539. Solution: DVD-RW is a rewritable DVD format that allows data to be erased and rewritten
multiple times. DVD-R is a write-once format for permanent storage. DVD-RW is versatile but
less compatible with DVD players, while DVD-R provides better compatibility.

540. Solution :
A. Linux - An operating system that is widely used.
B. Mozilla Firefox - A popular web browser.
C. Notepad - A simple text file editor.
D. JPEG - A commonly used image file format.

541. Solution:
Statement I: Most PCs use Dynamic RAMs for CPU Cache

IFAS Publications
www.ifasonline.com
169
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

This statement is false. Most PCs use static RAM (SRAM) for CPU cache, not dynamic RAM
(DRAM). SRAM is faster and more expensive than DRAM, which makes it suitable for cache
memory that requires fast access times.
Statement II: Static RAM is faster and more expensive than Dynamic RAM
This statement is true. Static RAM (SRAM) is indeed faster than Dynamic RAM (DRAM). SRAM
retains data as long as power is supplied to it, whereas DRAM requires constant refreshing of the
data stored in it. Due to its faster speed and simpler structure, SRAM is more expensive than
DRAM.
Therefore, the correct answer is that Statement I is false, but Statement II is true.

542. Solution:
The formula =SUMIF(A2:A7, "A", B2:B7) checks each value in column A from A2 to A7. When it
finds a match for "A", it adds the corresponding value from column B to the sum. In this case, it
will add the values 15, 20, 10, and 5 because they correspond to the rows where the project is
"A".
Therefore, the output of the formula in cell C1 would be 50, which is the sum of 15 + 20 + 10 + 5.

543. Solution:
A. JPEG: JPEG (Joint Photographic Experts Group) is a compressed image file format commonly used
for photographs and other complex images. It uses lossy compression techniques to reduce file size
while maintaining reasonable image quality.

B. MP3: MP3 (MPEG Audio Layer-3) is a compressed audio file format. It is widely used for storing
and transmitting audio files, such as music. MP3 utilizes lossy compression to significantly reduce
the file size while preserving an acceptable level of audio quality.
E. MP4: MP4 (MPEG-4 Part 14) is a multimedia container format that can contain audio, video, and
other data. MP4 is commonly used for storing and streaming video content online. It utilizes various
compression techniques for both audio and video streams, such as H.264 for video and AAC for
audio.

544. Solution: A desktop PC (personal computer) is not a mobile device. It refers to a personal
computer that is designed to be used at a fixed location, such as a desk or workstation. Unlike
tablets, smartphones, and e-readers, desktop PCs are not portable and typically have a larger
form factor.

545. Solution: The Academic Bank of Credit (ABC) is a concept that aims to provide a system for
credit verification, accumulation, transfer, redemption, and degree authentication. It is
designed to track and manage academic credits earned by students, allowing for seamless
transfer of credits between educational institutions.
The Academic Bank of Credit itself is not a degree awarding organization. Its primary function is to
facilitate credit management and transfer. Degree awarding organizations are typically educational
institutions such as universities, colleges, or schools that have the authority to grant academic
degrees.

546. Solution: CPU cache memory, especially the L1 and L2 cache, is typically implemented using
static RAM (SRAM) due to its faster access times and lower power consumption. DRAM is used
for main system memory, but not for CPU cache.
Static RAM (SRAM) is indeed faster than Dynamic RAM (DRAM). SRAM can access data much
more quickly compared to DRAM because it does not require constant refreshing like DRAM.

547. Solution:
(A) Speaker: Output device, not solely an input device.

IFAS Publications
www.ifasonline.com
170
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(B) Barcode Reader: Input device used to read barcodes.


(C) MODEM: Functions as both input and output device.
(D) Graphic Tablet: Solely an input device for drawing and writing.
(E) Microphone: Input device for capturing audio.

548. Solution: The IoT is experiencing rapid development and growth due to its diverse range of
applications. It involves connecting various physical devices and objects to the internet,
allowing for data collection, exchange, and enhanced functionality.
However, the reason provided that the IoT is inherently immune to cyber-attacks is incorrect. In
reality, the interconnected nature of IoT devices makes them potential targets for cyber-attacks.
These devices often have vulnerabilities and weaker security measures compared to traditional
computing devices, making them susceptible to exploitation. Cybercriminals can take advantage of
these vulnerabilities to gain unauthorized access, compromise data privacy, or launch malicious
activities, such as DDoS attacks.

549. Solution: The email addresses in the “To”, “CC” & “BCC” fields will receive copies of the
attachment. So 4 people B, C, D & E will receive the E-mail.

550. Solution : Cache memory is a type of high-speed memory that is used to store frequently
accessed data and instructions. It acts as a buffer between the main memory (RAM) and the
CPU, providing faster access to frequently used data and instructions. The purpose of cache
memory is to reduce the time it takes for the CPU to access data from the main memory, as
accessing data from cache memory is much faster than accessing it from RAM.

551. Solution: So to solve this we will divide 16 GB by 32 KB. To do this easily we will convert 16 GB
into KB
24 x 210 x 210 / 25
Which will give us 2 19

552. Solution:
If the current power is X then to make in 32X we need 2 5 = 32 which is 5 cycles.
One cycle takes 2 year so 5 cycle will take 2 x 5 = 10 Years.

553. Solution: All of the statements given below are correct:


(A) The invention of Integrated Circuits (ICs) did contribute to increased reliability of computers.
Before ICs, computers relied on individual discrete components such as transistors, resistors, and
capacitors, which were more prone to failures and required more complex wiring. ICs consolidated
multiple circuits, including transistors, onto a single chip, reducing the number of interconnections
and improving overall reliability.
(B) The invention of ICs also led to a significant reduction in the cost of computers. Prior to ICs,
computer components were assembled manually, which was time-consuming and expensive. ICs
allowed for the mass production of complex circuits, reducing manufacturing costs and making
computers more affordable for a wider range of users.
(C) ICs also played a crucial role in reducing the size of computers. By integrating multiple circuits
onto a single chip, the physical footprint of computer components was greatly reduced. This
miniaturization enabled the development of smaller and more portable computers, leading to
advancements in personal computing devices, laptops, smartphones, and other compact computing
systems.

554. Solution: A modem, short for Modulator-Demodulator, is a device used in computer


networking to connect computers or other devices to a network or the internet. It facilitates

IFAS Publications
www.ifasonline.com
171
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

the transmission and reception of data over communication channels such as telephone lines,
cable lines, or fiber optic lines.
A MODEM can both send (upload/output) and receive (download/input) data, it does not perform
these functions simultaneously. MODEMs typically operate in a half-duplex mode, meaning they
can either transmit or receive data at any given time, but not both concurrently. The upload and
download processes occur sequentially rather than simultaneously.

555. Solution : A Trojan horse, often referred to simply as a "Trojan," is a type of malicious software
or program that disguises itself as legitimate or desirable software to deceive users and gain
unauthorized access to their systems. It derives its name from the Greek mythological story of
the Trojan War, where the Greeks used a giant wooden horse to infiltrate and conquer the city
of Troy.
Trojan horses are designed to appear harmless or useful, enticing users to download and install them.
They may be disguised as software updates, games, multimedia files, or any other seemingly
legitimate program. Once the Trojan is executed on the victim's system, it carries out malicious
activities, often without the user's knowledge.

556. Solution : To safely install additional RAM into a computer, the correct order of the steps
should be as follows:
(B) Isolate computer from the power supply: Before working on any internal components of a
computer, it is crucial to disconnect it from the power supply. This helps prevent any electrical
accidents or damage to the computer during the installation process.
(C) Connect anti-static strap to wrist: Static electricity can damage sensitive computer components.
To avoid static discharge that could harm the RAM or other parts, it is recommended to wear an
anti-static strap and connect it to your wrist. This helps dissipate any static electricity and ensures
that you are grounded while handling the RAM.
(A) Install RAM: Once you have isolated the computer from the power supply and connected the
anti-static strap, you can proceed to install the RAM. Locate the RAM slots on the motherboard,
gently insert the RAM module into the appropriate slot, and firmly press it down until it clicks into
place. Ensure that it is properly seated and secured.

557. Solution : SWAYAM (Study Webs of Active Learning for Young Aspiring Minds) is an online
learning platform in India that provides free courses and education resources to students. It
does not specifically focus on providing financial or technical assistance to start-up
entrepreneurs.
Digilocker is a digital document storage platform in India that allows users to store and access
their official documents digitally. And the tagline in Digi locker logo is “Document Wallet to
Empower Citizens”

558. Solution :
A. Spyware: Spyware is software that allows a user to gain unauthorized access to someone else's
computer activity, collecting information without the user's knowledge.
B. Firewall: A firewall is a hardware or software-based security system that helps protect a network by
controlling and monitoring incoming and outgoing network traffic, allowing authorized data while
blocking unauthorized access.
C. Bluetooth: Bluetooth is a wireless technology that enables short-range communication between
devices, allowing the transmission of data such as files, audio, and control signals without the need
for cables.
D. Denial of service: Denial of service (DoS) refers to an attack on a network where the attacker floods
the network with excessive traffic, overwhelming its resources and making it unavailable to
legitimate users.

IFAS Publications
www.ifasonline.com
172
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

559. Solution : Bing is a web search engine owned by Microsoft. Launched in 2009, it provides
search results, image and video search, news, trending topics, visual search, maps, and
integrates with Microsoft services. While Google is dominant, Bing offers an alternative search
option with its own features and user experience.

560. Solution : To address the issue of video freezing during the videoconference between the
classes in New Delhi and Chandigarh, the most effective solution would be to improve or
increase the available bandwidth.
Bandwidth refers to the capacity of the network connection to transmit data. In this case, the
freezing of video could indicate that the available bandwidth is insufficient to handle the video
stream in real-time, causing delays in transmission.
Upgrading cameras, increasing video resolution, or upgrading monitors may enhance the overall
video quality, but they would not directly solve the problem of video freezing caused by inadequate
bandwidth.

561. Solution : HTTP (Hypertext Transfer Protocol) is an application-layer protocol used for
communication between web browsers and web servers. It facilitates the transfer of hypertext,
such as HTML documents, over the internet.

562. Solution :
A. GPS: A radio navigation system that determines precise location.
B. Intranet: A private network or website accessible to organization members.
C. Bluetooth: Wireless technology for data exchange over short distances.
D. HTTP: Protocol for sending and receiving web pages.
In summary, GPS enables precise location determination, an intranet is a private network, Bluetooth
enables wireless data exchange, and HTTP is a protocol for web page communication.

563. Solution : E-Vidhyapeeth, developed by the Ministry of Electronics and Information


Technology (MeitY), Government of India, is a Learning Management System (LMS) and e-
learning infrastructure product. It serves as a platform for the hosting, management, and
delivery of e-learning content and courses. E-Vidhyapeeth enables students to register, enroll in
courses, access digital learning resources, and complete online assessments.
An HTML editor is a software tool used for creating, editing, and formatting HTML (Hypertext
Markup Language) code. HTML is the standard markup language used for building web pages and
structuring their content. An HTML editor provides a user-friendly interface that simplifies the
process of writing HTML code and designing web pages.

564. Solution :
A. System Software: Software that includes operating systems like Linux.
B. Input Device: Hardware devices such as a keyboard used to input data.
C. Output Device: Hardware devices such as a printer used to display or produce output.
D. Secondary Storage Device: Hardware devices like a pen drive used for additional storage.

565. Solution : To calculate the time it takes to download a movie, we can use the formula:
Time = Size / Speed
Given:
Size of the movie = 16 gigabytes = 2 14 megabytes
Download speed = 2 6 megabytes per second
Substituting the values into the formula:
Time = 2 14 megabytes / 2 6 megabytes per second = 2 8 = 256 Seconds

IFAS Publications
www.ifasonline.com
173
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

566. Solution : Both telephone calls and instant messaging involve real-time communication where
participants can interact and exchange information immediately. In contrast, email, Instagram
posts, and blogging are asynchronous forms of communication, where there is a time delay
between the message being sent and received, and participants may not be actively present or
available for immediate interaction.

567. Solution : LMS stands for Learning Management System, which is a software application used
for managing, delivering, and tracking educational courses and training programs. LMS
platforms are commonly used in educational institutions, corporations, and online learning
platforms to provide a centralized system for organizing and delivering learning materials,
assessing student or employee progress, and facilitating communication and collaboration
between learners and instructors.

568. Solution:
Laser Printer: A laser printer is a type of printer that uses laser technology to produce high-quality
prints. It works by using a laser beam to create an electrostatic image on a photosensitive drum. The
drum is then coated with toner, which is transferred onto the paper and fused using heat to create the
final printout.
Dot Matrix Printer: A dot matrix printer is an impact printer that uses a matrix of small pins to
create characters or images on the paper. It works by striking an ink-soaked ribbon against the paper,
forming patterns of dots that combine to form characters.

569. Solution : CD-ROM (E): Among the options provided, CD-ROM is the slowest in terms of speed.
It utilizes optical technology for data storage.
Hard Disk (C): Hard disks are magnetic storage devices commonly used for long-term data storage.
They offer larger storage capacity but are slower compared to other memory types.
Main memory (RAM) (A): RAM (Random Access Memory) serves as the primary memory for the
computer, storing data that the CPU needs to access quickly. It is faster than hard disks and CD-
ROMs but slower than cache memory.
L2 Cache (B): L2 Cache (Level 2 Cache) is a type of cache memory positioned between the CPU
and main memory. It provides faster access to frequently accessed data compared to main memory,
thus offering increased speed.
L1 Cache (D): L1 Cache (Level 1 Cache) is the fastest cache memory integrated directly into the
CPU. It stores instructions and data that the CPU is actively processing, resulting in the highest
access speeds.

570. Solution: CD-ROMs are read-only, meaning they cannot be written or modified. Attempting to
save the modified document directly back to the CD-ROM may result in errors or data loss.
So by copying the document to the hard disk, you create a writable and more accessible location for
making modifications. Once the changes are made, saving the modified document to the hard disk
ensures that the changes are securely stored and readily accessible for future use.

571. Solution : MOOCs are designed to be accessible to a large number of learners from diverse
backgrounds. They provide online educational content and interactive activities that allow
learners to study at their own pace and convenience.
MOOCs are specifically designed to be self-paced and self-directed. Learners can access MOOCs
without the physical presence of a teacher or instructor.

572. Solution : 'Phishing' is an attempt to acquire sensitive information for malicious reasons, by
masquerading as a trustworthy entity
'Spam' is a type of unsolicited bulk email of identical messages sent to numerous recipients

IFAS Publications
www.ifasonline.com
174
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

573. Solution: LaTeX is a typesetting system commonly used for creating documents that require
complex mathematical equations, scientific notations, technical diagrams, and professional-
looking typesetting. It is widely used in academia, research, and publishing fields, particularly
in disciplines such as mathematics, physics, computer science, engineering, and other scientific
domains.
Others are plagiarism checking websites.

574. Solution : Wearable devices like hearing aids or smart hearing devices are specifically
designed to assist individuals with hearing impairments. These devices use advanced
technologies, such as digital signal processing, to amplify and enhance sounds, making it easier
for the wearer to hear and communicate effectively.

575. Solution: The limited amount of RAM would result in suboptimal performance. With only 1 GB
of RAM, the computer would struggle to handle the OS's resource requirements effectively. It
may lead to slow and sluggish performance, frequent freezes or crashes, and an overall
unsatisfactory user experience.

576. Solution : Blended learning is a learning approach that combines traditional face-to-face
instruction with online and digital methods. It merges offline and online learning to create a
flexible and comprehensive learning experience.

577. Solution: Input devices are used to provide data or commands to a computer system. They
allow users to input information and interact with the computer.
Output devices are used to display or provide output from a computer system. They present
information or results generated by the computer to the user.
So headphone and projector will be output device as they produce output and all others are only
input devices.

578. Solution: A Learning Management System (LMS) is a software application or platform that
enables the management, delivery, and tracking of online learning activities. It provides a
centralized hub where educators or trainers can create, organize, deliver, and assess various
learning materials and resources.

579. Solution: DNS stands for Domain Name System. It is a decentralized naming system used to
translate human-readable domain names, such as www.abc.edu, into the numerical IP
addresses that computers use to identify and communicate with each other over the Internet.

580. Solution:
(i) Computing: C) CPU (Central Processing Unit)
The CPU is responsible for executing instructions and performing calculations, making it the core
component for computing tasks.
(ii) Storing data temporarily: A) RAM (Random Access Memory)
RAM provides temporary storage for data and instructions that the CPU needs to access quickly
during computing operations.
(iii) Storing data permanently: B) Hard Disk Drive
The hard disk drive is used for long-term storage of data, including the operating system, software
programs, files, and other data, even when the computer is powered off.

581. Solution: Massive Open Online Courses (MOOCs) are gaining popularity among students and
working professionals worldwide. This statement is true as MOOCs have indeed gained
significant popularity in recent years due to their accessibility, flexibility, and the ability to
reach a wide audience.

IFAS Publications
www.ifasonline.com
175
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

MOOCs offer flexibility in terms of study schedules and the ability to access course materials from
anywhere with an internet connection. So it is not location specific.

582. Solution: IPv6 supports 2^128 unique addresses (approximately 4.3 billion addresses).
Calculating 65536^8 gives around same number of addresses.

583. Solution: computers become twice as powerful every 2 years. So in 10 years there will be a
power shifting of 5 times. So 10 years from now, computers will be 2 5 = 32 times as powerful as
they are now.

584. Solution: In the URL "https://example.org/index.html," the following components are


contained:
(C) Host name: The host name in this URL is "example.org." It identifies the specific
website or server that is being accessed.
(B) File name: The file name in this URL is "index.html." It represents the specific file being
requested from the server.
(E) Protocol: The protocol in this URL is "https." It indicates the communication protocol
being used for transferring data, in this case, Hypertext Transfer Protocol Secure (HTTPS).
The following components are not contained in this URL:
(A) Browser name: The URL does not contain any information about the browser name being
used to access it.
(D) Email address: The URL does not contain any email address information.

585. Solution:
A. Control Unit: Manages instruction execution and data processing within the CPU.
B. ASCII: Character encoding standard for representing text in computers.
C. Immediate Access Store: High-speed memory or cache for fast data access.
D. ALU: Performs arithmetic and logical operations in the CPU.
E. SSD: Solid-State Drive for fast, durable, and non-mechanical data storage.

586. Solution: Hexadecimal equivalent of the binary number 1100 is C which is 12. So by adding
hexadecimal number 3 to it will give us 15. Which is F in hexadecimal.

587. Solution:
A. Hyperlink - Definition 3: A hyperlink is an element on a web page that, when clicked, will take the
user to another website, web page, or document. It is typically represented as text or an image with
an underline or different color to indicate it is clickable.
B. Hotspot - Definition 1: A hotspot is an area of a graphic, such as an image, that when clicked,
triggers an action on a web page. For example, clicking on a specific part of an image may lead to a
different page or display additional information.
C. HTTP - Definition 4: HTTP stands for Hypertext Transfer Protocol. It is a protocol used for
communication between web browsers and web servers. It allows the transfer of web pages, files,
and other resources over the internet. When you enter a URL in a browser, it uses HTTP to request
and receive the web page from the server.
D. Pixel - Definition 2: A pixel is the smallest unit of a digital image or graphic. It represents a single
point of color or light on a display. Pixels are arranged in a grid pattern to form the images you see
on screens. The resolution of a display is determined by the number of pixels it can accommodate
horizontally and vertically.

588. Solution: Google Drive is a cloud storage and file synchronization service provided by Google,
MeghRaj is a cloud computing initiative by the Indian government, and Dropbox is a popular
cloud storage and file sharing service. These services allow users to store, access, and share

IFAS Publications
www.ifasonline.com
176
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

files from anywhere with an internet connection. But Windows Explorer is a file management
tool provided by the Windows operating system.

589. Solution:
A. e-commerce - (iii) www.amazon.com: Amazon is a well-known e-commerce website where users can
purchase a wide range of products online. It offers a platform for buying and selling goods.
B. Building up social media - (i) www.linkedin.com: LinkedIn is a social media platform primarily
focused on professional networking. It allows users to create profiles, connect with other
professionals, and explore job opportunities.
C. News - (iv) www.bbc.co.uk: BBC is a renowned news organization that provides news, articles, and
multimedia content on various topics. The given website address belongs to the British Broadcasting
Corporation (BBC).
D. Search engine - (ii) www.bing.com: Bing is a search engine developed by Microsoft. It allows users
to search the web for information, images, videos, and other content.

590. Solution: Information and communication Technology (ICT) integration with teaching and
learning can result in several outcomes.
ICT integration can supplement traditional learning materials such as books with online resources, it
doesn't necessarily mean a complete replacement.
ICT integration is meant to enhance teaching and learning, not replace teachers.

591. Solution: A computer worm is a type of malicious software (malware) that can self-replicate
and spread across computer networks without requiring any user intervention. Unlike viruses,
worms do not need to attach themselves to existing programs or files to propagate. They can
independently exploit vulnerabilities in operating systems, network protocols, or applications
to infect other computers.

592. Solution:
(A) (11101011) base 2 binary number:
To convert this binary number to decimal, we perform the following calculation:
1 * 2^7 + 1 * 2^6 + 1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 0 * 2^2 + 1 * 2^1 + 1 * 2^0 = 235
(B) (564) base 8 octal number:
To convert this octal number to decimal, we perform the following calculation:
5 * 8^2 + 6 * 8^1 + 4 * 8^0 = 372
(C) (614) base 10 decimal number:
This number is already in decimal form, so its value is 614.
(D) (489) base 16 hexadecimal number:
To convert this hexadecimal number to decimal, we perform the following calculation:
4 * 16^2 + 8 * 16^1 + 9 * 16^0 = 1161
Now, let's arrange the numbers in ascending order based on their decimal values:
235 < 372 < 614 < 1161
Therefore, the correct ascending order is:
(A) (11101011) base 2 binary number
(B) (564) base 8 octal number
(C) (614) base 10 decimal number
(D) (489) base 16 hexadecimal number

593. Solution:
(A) A hospital revealing the clinical history of a patient without the patient's consent. This is a
violation of patient privacy and confidentiality, and it is generally illegal and unethical.
(B) A student using proprietary software without having a license. This is considered illegal and
unethical as it violates copyright laws and software license agreements.

IFAS Publications
www.ifasonline.com
177
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(C) A person stealing another person's credit card number. This is both illegal and unethical, as it
involves identity theft, fraud, and financial harm to the victim.
(D) A college using Linux operating system (being an open-source software) on all its 200 computers
on the campus. This option does not involve any illegal or unethical action. The use of open-source
software, such as Linux, is legal and widely accepted in various contexts, including educational
institutions.

594. Solution: Bookmarks are commonly used in web browsers to save and organize favourite or
frequently visited websites. By clicking on a bookmark, the browser automatically navigates to
the associated webpage, eliminating the need to manually type or search for the URL.
Bookmarks provide convenience and time-saving benefits, allowing users to quickly access
their preferred websites with a single click.

595. Solution: C-DAC is an autonomous scientific society under the Ministry of Electronics and
Information Technology, Government of India. C-DAC has made significant contributions in the
field of supercomputing but C-DAC was actually established in the year 1988, not 1995.

596. Solution: e-Taal, also known as Electronic Transaction Aggregation & Analysis Layer, is an
initiative by the Government of India aimed at enhancing e-Governance services. It serves as a
centralized monitoring system for tracking and analyzing electronic transactions across
various government departments and applications.

597. Solution: A blockchain is a decentralized and distributed digital ledger that records
transactions across multiple computers. Each transaction is grouped into a block, and these
blocks are linked together using cryptographic hashes, forming a chain-like structure. The use
of cryptography ensures the security and integrity of the data stored in the blockchain.
And blockchain technology is widely used in cryptocurrencies. The most well-known and prominent
example is Bitcoin, which was the first cryptocurrency to leverage blockchain technology.

598. Solution: A DNS server, which stands for Domain Name System server, is a crucial component
of the internet infrastructure. Its primary function is to translate domain names, such as
www.example.com, into the corresponding IP addresses that computers and networks use to
identify and communicate with each other.

599. Solution:
C. Calculator Machine: Calculating machines, such as the abacus and mechanical calculators, were
developed long before other advancements in computing. They provided the ability to perform
mathematical calculations manually.
E. Programming Language: Programming languages, such as Fortran and COBOL, emerged in the
1950s and 1960s. They provided a means for humans to communicate instructions to computers and
write software.
D. Computer Mouse: The computer mouse was invented in the early 1960s by Douglas Engelbart. It
became a popular input device for interacting with graphical user interfaces and navigating computer
systems.
B. Internet: The development of the internet started in the late 1960s and early 1970s as a network of
interconnected computers. It allowed for communication and information sharing between
computers globally.
A. Facebook: Facebook, the social networking platform, was launched in 2004 by Mark Zuckerberg. It
is a more recent development in the history of computing, focusing on online social interactions and
networking.

IFAS Publications
www.ifasonline.com
178
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

600. Solution: Assertion A states that providing free Wi-Fi access to every citizen is one of the
objectives of the 'Digital India' program of the Government of India. This is a true statement.
Reason R states that ICT (Information and Communication Technology) is a powerful enabler of a
digitally empowered society. This is also a true statement.
Furthermore, Reason R provides a valid explanation for Assertion A. The implementation of free
Wi-Fi access aligns with the objective of the 'Digital India' program, as ICT plays a crucial role in
creating a digitally empowered society.

601. Solution: Creative Commons licenses are a set of copyright licenses that provide a
standardized way for creators to share their work with the public while granting certain
permissions and freedoms to others to use, remix, distribute, and build upon the original work.

602. Solution: By using the linking and embedding feature, you can establish a dynamic connection
between the graph in the spreadsheet and the report in the word processor. This allows the
graph to be updated automatically whenever changes are made to the spreadsheet data. The
link ensures that the graph in the report reflects the most recent information from the
spreadsheet.

603. Solution: Compressed files are beneficial in scenarios where storage space is limited or when
transferring files over networks with limited bandwidth. By reducing the file size, compression
allows for more efficient storage utilization and faster file transfer times.

604. Solution: Input Devices: Input devices are peripheral devices that allow users to provide data,
commands, or instructions to a computer or electronic device. They enable the transfer of
information from the user or the physical world into a digital format that the computer can
understand and process.
Output Devices: Output devices are peripheral devices that display or present processed data,
information, or results generated by a computer or electronic device. They convert digital
information into a format that humans can perceive and comprehend.
Input and Output Devices: Certain devices are capable of both input and output functions, allowing
for bidirectional communication between the user and the computer. These devices facilitate both
the input of data or instructions and the output of processed information or results.
So Projector is an output device but Microphone, joystick, scanner & trackball are only input
devices.

605. Solution: A Trojan Horse is a type of malicious software that disguises itself as legitimate or
desirable software, tricking users into downloading or executing it. It often appears to be
useful or harmless, such as a game, utility, or software update. However, once installed or run,
it carries out malicious activities, such as stealing sensitive information, damaging files, or
allowing unauthorized access to the infected system.

606. Solution: The correct expansion of VOLTE is "Voice over Long Term Evolution," not "Voice over
Long Term Evaluation."
And rest of the statements written regarding VOLTE are true.

607. Solution: Net neutrality is the principle that all internet traffic should be treated equally,
without any discrimination or preference based on the content, source, or destination. It
promotes the idea that all users should have equal access to the internet, and internet service
providers (ISPs) should not engage in practices that block, slow down, or prioritize certain
types of content or services over others.

IFAS Publications
www.ifasonline.com
179
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

608. Solution: A projector is a classic ICT tool that can be used to display visual content from a
computer, such as slides, videos, or interactive presentations. It allows teachers to share
information and engage students through multimedia resources.

609. Solution: An ethical hacker, also known as a white hat hacker, is a cybersecurity professional
who is authorized to identify vulnerabilities in computer systems or networks. They use their
skills to uncover security weaknesses and help organizations improve their security measures.
Ethical hackers work within legal and ethical boundaries, obtaining proper authorization to
assess and protect systems.

610. Solution: 8 megabytes = 8 x 2 10 KB = 2 13 KB not GB


(11101.101)2 = 1*2 +1*2 +1*2 + 0*2 +1*2 . 1*2 +0*2 +1*2 = 16+8+4+0.1/2+1/8 = 29.625
4 3 2 1 0 -1 -2 -3

So statement II is true but I is false.

611. Solution: The principal components of the CPU (Central Processing Unit) of a computer system
are:
(B) ALU (Arithmetic-Logic Unit): The ALU performs arithmetic operations (addition, subtraction,
multiplication, and division) and logical operations (AND, OR, NOT) on data.
(C) Processor Registers: Processor Registers are small, high-speed memory units within the CPU that
store data and instructions temporarily during processing. These include the program counter,
instruction register, and various general-purpose registers.
(D) CU (Control Unit): The Control Unit coordinates and manages the operations of the CPU. It
fetches instructions from memory, decodes them, and executes them by coordinating the activities of
other CPU components.

612. Solution: Malware, short for "malicious software," refers to any software or program
specifically designed to harm, disrupt, or gain unauthorized access to computer systems,
networks, or user devices. Malware is created with malicious intent and can include a wide
range of harmful software types, such as viruses, worms, trojans, ransomware, spyware,
adware, and more.

613. Solution: The CPU of a computer system consists of the following key components:
(A) ALU (Arithmetic-Logic Unit): The ALU performs arithmetic and logical operations on data.
(B) CU (Control Unit): The CU manages and coordinates the activities of the CPU, including
fetching, decoding, and executing instructions.
(C) Processor Registers: These small, fast memory units within the CPU temporarily store data and
instructions during processing.

614. Solution: A telephone can be used for audio communication during a video conference, it is not
considered an essential component required for a video-conferencing system. But video
camera, microphone and display device are essential component for video-conferencing.

615. Solution: On the other hand, databases (B) and desktop publishing (DTP) technologies (D) are
not specific developments that have directly arisen because of the Internet. Databases are data
storage and management systems that can exist independently of the Internet, while desktop
publishing refers to the process of creating and formatting publications using specialized
software, which can also be done offline.

616. Solution: B is incorrect as The Internet is a vast network of interconnected computer systems,
whereas the World Wide Web (WWW or Web) refers to a compilation of documents. Through
the Internet, users can utilize a web browser to access a wide range of resources, including
images, videos, and other content.

IFAS Publications
www.ifasonline.com
180
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

617. Solution: ISP – Internet Service Provider.


Rest acronyms are correct. ISP refers to a company or organization that provides access to the
internet for individuals, businesses, and other entities. ISPs offer various types of internet
connectivity, such as broadband, DSL, cable, fiber optic, satellite, or wireless connections.

618. Solution: Statement I is true regarding AI & Virtual Reality but statement II is false as the full
form of QR is Quick Response not Quick Reaction.

619. Solution: A Bar Code Reader is commonly used to input data about a product at a Point of Sale
(POS).
A Chip Reader is used to input data from a bank card.
MICR (Magnetic Ink Character Recognition) is an input method typically used to input data from a
bank cheque.
OCR (Optical Character Recognition) is used to input text from a printed document.

620. Solution: Statement I is not true as When users enter the same keywords in a search engine
like Google, personalization and regional variations occurs.
Statement II is correct as Search engines, including Google, collect data about users' searches,
browsing behaviour, and other information to personalize search results, improve user experience,
and serve targeted advertisements. This data gathering is a common practice in the field of online
search and helps search engines refine their services.

621. Solution: Input Devices: Input devices are peripheral devices that allow users to provide data,
commands, or instructions to a computer or electronic device. They enable the transfer of
information from the user or the physical world into a digital format that the computer can
understand and process.
Output Devices: Output devices are peripheral devices that display or present processed data,
information, or results generated by a computer or electronic device. They convert digital
information into a format that humans can perceive and comprehend.
Input and Output Devices: Certain devices are capable of both input and output functions, allowing
for bidirectional communication between the user and the computer. These devices facilitate both
the input of data or instructions and the output of processed information or results.
So Buzzer and Laser Printer are only output devices form the given list.

622. Solution: To: The "To" field specifies the primary recipient(s) of the email. This field is used to
address the main recipient(s) of the email. Recipients listed in the "To" field can see each
other's email addresses.
Cc (Carbon Copy): The "Cc" field is used to send a copy of the email to additional recipients who
are not the primary recipients but need to be informed. Recipients listed in the "Cc" field can see
each other's email addresses and the addresses in the "To" field.
Bcc (Blind Carbon Copy): The "Bcc" field is used to send a copy of the email to recipients without
the knowledge or visibility of other recipients. The email addresses of recipients in the "Bcc" field
are not visible to anyone else.

623. Solution: Arithmetic and Logic unit (ALU): Carries out operations such as AND, OR, NOT.
Control Unit (CU): Fetches and manages execution of each instruction in turn.
Random Access Memory (RAM): Stores part of the operating system currently in use.
Read Only Memory (ROM): Stores bootstrap loader and BIOS.

624. Solution: Statement I states that the binary equivalent of the decimal number (19) is (10101).
This statement is true since the binary representation of 19 is indeed 10101.

IFAS Publications
www.ifasonline.com
181
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement II states that the sum of (1011) and (110) is equal to (10101). However, this statement is
false. The sum of (1011) and (110) in binary is (10001), not (10101). Therefore, Statement II is
false.

625. Solution: Freeware refers to software that is available for free download and use without any
cost. However, it may have certain restrictions, such as not being able to modify or change the
source code.

626. Solution: The World Wide Web (WWW) was invented by Sir Tim Berners-Lee. He is a British
computer scientist who proposed the concept of the Web in 1989 while working at CERN
(European Organization for Nuclear Research) in Switzerland.

627. Solution: Phishing is a type of cyber attack where an attacker disguises themselves as a
trustworthy entity to trick individuals into revealing sensitive information, such as login
credentials, credit card numbers, or personal details. It typically occurs through fraudulent
emails, text messages, or websites that mimic legitimate sources.

628. Solution: Statement (C) LMS is a hardware is incorrect. LMS is not a hardware but a software
system or application that runs on hardware infrastructure.
Statement (E) LMS can be used for making institutional websites is incorrect. LMS is primarily
focused on managing and delivering educational content and courses, rather than creating or hosting
institutional websites.

629. Solution: CERT-IN is operational since January 2014 is incorrect. CERT-IN was established in
2004 and has been operational since then. It was created under the provisions of the
Information Technology Act, 2000.
Where Statement a & c are true regarding CERT-IN

630. Solution: Decimal: To convert the binary number to decimal, we calculate the decimal value of
each bit position and add them up. In this case, the calculation would be as follows:
(11011001)_2 = (1 * 2^7) + (1 * 2^6) + (0 * 2^5) + (1 * 2^4) + (1 * 2^3) + (0 * 2^2) + (0 * 2^1) +
(1 * 2^0)
= 128 + 64 + 0 + 16 + 8 + 0 + 0 + 1
= 217
So, the decimal equivalent of (11011001) is (217) 10.
Octal: To convert the binary number to octal, we group the binary digits into sets of three starting
from the rightmost bit. Then, we convert each group of three bits to its octal equivalent. In this case,
the conversion would be as follows:
(11011001)_2 = (0331) 8
So, the octal equivalent of (11011001) is (0331) 8.
Hexadecimal: To convert the binary number to hexadecimal, we group the binary digits into sets of
four starting from the rightmost bit. Then, we convert each group of four bits to its hexadecimal
equivalent. In this case, the conversion would be as follows:
(11011001)_2 = (D9) 16
So, the hexadecimal equivalent of (11011001) is (D9) 16.

631. Solution: The Indian Act that makes it illegal to knowingly spread a computer virus is the
Information Technology Act, 2000 (IT Act). Section 43 of the IT Act specifically addresses the
punishment for unauthorized access to computer systems, computer networks, or computer
resources, including spreading computer viruses.

IFAS Publications
www.ifasonline.com
182
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

632. Solution: Cache memory is a type of high-speed memory located closer to the CPU than RAM. It
is faster but smaller in capacity compared to RAM. However, cache memory is also volatile,
meaning its contents are lost when the power is turned off or during a system reset.
CDs and DVDs are indeed optical media devices that use lasers to read and write data. However,
magnetic tapes, such as magnetic tape drives, utilize magnetic technology for data storage, not
optical technology.

633. Solution: POP (Post Office Protocol) is an application-layer protocol used for retrieving email
messages from a mail server to a client device, typically an email client software. It is one of the
most widely used protocols for email retrieval.

634. Solution: Portrait Orientation: In portrait orientation, the slide is taller than it is wide. This
orientation is commonly used for slides that are intended to be viewed vertically, such as in a
typical presentation format.
Landscape Orientation: In landscape orientation, the slide is wider than it is tall. This orientation is
commonly used for slides that are intended to be viewed horizontally, such as when projecting the
presentation onto a screen or sharing it online.

635. Solution: The Creative Commons licenses allow creators to retain their copyright while
granting permissions beyond the traditional "all rights reserved" approach. The licenses
provide a standardized way for creators to communicate the permissions they grant to others,
making it easier for people to understand how they can use and share the work.

636. Solution: Since E & F both are in the BCC fields, and BCC fields maintain privacy so neither E or
F will be aware about each other that the same mail is sent to the other person.

637. Solution: Pinterest, Tumblr, Instagram, and Twitter are widely recognized as micro-blogging
platforms. These platforms allow users to share short-form content, such as text posts, images,
and videos, with their followers or the public.
Where eBay is an online marketplace where users can buy and sell a wide range of goods.

638. Solution: HDMI stands for High-Definition Multimedia Interface. It is a digital interface used
for transmitting audio and video signals between devices, such as computers, TVs, monitors,
projectors, and gaming consoles.

639. Solution: Statement I: A DVD or CD using the letter 'R' indicates that it is Read-only. This is
true. DVDs or CDs labeled with 'R' (e.g., DVD-R or CD-R) indicate that they are write-once discs,
meaning the content can be recorded or burned onto the disc once, and after that, it becomes
read-only, preventing further modifications.
Statement II: Web browsers are used to allow a user to gain access to the internet. This
statement is false. Web browsers are software applications used to access and display web
pages and other internet-based content, but they do not provide direct access to the internet.
Web browsers interpret and render HTML, CSS, and other web technologies to present
websites to users, but they rely on internet connections provided by devices like modems,
routers, or Wi-Fi to access the internet.

640. Solution:
A. Privacy - III. Collection and use of data about individuals.
This issue concerns the responsible handling of personal data, respecting individuals' privacy and
ensuring proper data collection and use.
B. Accuracy - I. Responsibility of data collector to ensure accuracy.

IFAS Publications
www.ifasonline.com
183
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

This issue focuses on the responsibility of data collectors to maintain accurate and reliable data,
preventing errors and misinformation.
C. Property - IV. Data ownership and Software Usage Rights.
This issue involves understanding data ownership, intellectual property rights, and complying with
software licensing agreements.
D. Accessibility - II. Responsibility of data collector to control access.
This issue pertains to controlling access to data, ensuring it is accessible only to authorized
individuals while implementing appropriate security measures.

641. Solution: RAM is a type of computer memory that is used for temporary storage of data that
the computer needs to access quickly. However, the data stored in RAM is lost when the power
supply to the computer is turned off or interrupted.
Hard disks, although capable of storing data for long-term use, have slower access times
compared to RAM and processor registers. RAM and processor registers are much faster in
terms of data access and retrieval.

642. Solution: The broad functions of an operating system in a computer are:


A. Handling files and folders.
C. Interfacing between users and hardware.
D. Helping to run application software.
Option B, converting from high-level language to low-level language, is not a primary function of
an operating system. It is typically done by compilers or interpreters during the software
development process.

643. Solution: Integrated circuits (ICs) revolutionized computer technology by enabling the
miniaturization of electronic components. They are tiny electronic circuits that consist of
multiple interconnected transistors, resistors, and capacitors etched onto a single chip of
semiconductor material, typically silicon.

644. Solution: Statement (I): A DVD-ROM is an optical storage media and it can be written many
times.
This statement is false. DVD-ROM is read-only and cannot be written or rewritten.
Statement (II): Software is loaded into secondary storage from RAM and is then executed by CPU.
This statement is false. Software is typically loaded into RAM from secondary storage before being
executed by the CPU.
Therefore, both Statement (I) and Statement (II) are false.

645. Solution: AVI (Audio Video Interleave) and FLV (Flash Video) are commonly used file formats
for distributing video files online.
AVI allows for good video and audio quality while maintaining reasonable file sizes, and FLV is
widely supported for streaming video content over the internet.
The other file formats mentioned are not typically used for distributing video files:
C. AIF: This is an audio file format commonly used for high-quality audio recordings, not for video
distribution.
D. MP3: This is an audio file format commonly used for music, not for video distribution.
E. WMA: This is a Windows Media Audio file format primarily used for audio, not video.

646. Solution: Input—entering data into the computer.


Data entry: This step involves entering data into the computer system.
Processing: Once the data is entered, operations and manipulations are performed on the data.
Storage: The processed data, programs, or output are saved for future use.
Output: Finally, the results are presented or displayed to the user or intended recipients.

IFAS Publications
www.ifasonline.com
184
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

647. Solution:
A. mp3: The mp3 file extension is commonly used for audio files, specifically for music (II).
B. xls: The xls file extension is associated with spreadsheet files created using Microsoft Excel, so it
represents a spreadsheet (IV).
C. jpeg: The jpeg file extension is used for image files, so it represents an image file type (I).
D. mdb: The mdb file extension is used for Microsoft Access database files, so it represents a database
file type (III).

648. Solution: Open source software refers to computer software that is released with its source
code openly available to the public. This means that anyone can view, modify, and distribute the
source code of the software. Open source software is typically developed in a collaborative and
transparent manner, where developers from around the world contribute to its improvement
and enhancement.

649. Solution:
A. News paper: News papers are printed on rubber plates (IV) for mass production.
B. Radio: Radio waves (III) are used to transmit the signals and enable communication through radio
receivers.
C. Television: Television signals are received and processed using satellite dishes (II) to provide access
to various channels and programs.
D. Film: URSA mini pro (I) is a camera commonly used in the film industry to capture high-quality
video footage.

650. Solution: Cyber stalking refers to the act of using electronic communication or digital
platforms to harass, intimidate, or stalk an individual. It involves persistent and unwanted
online behavior that causes fear, distress, or inconvenience to the victim. Cyber stalking is an
example of a cyber exacerbated crime because it utilizes digital technology and the internet to
amplify the impact of traditional stalking behaviors, such as monitoring someone's online
activities, sending threatening messages or emails, spreading false information, or invading
someone's privacy through unauthorized access to personal information.

651. Solution: WWW stands for World Wide Web. It is a system of interconnected hypertext
documents and other resources, linked by hyperlinks and URLs (Uniform Resource Locators).
The World Wide Web is a key component of the internet and allows users to access and
navigate through web pages and websites using web browsers.

652. Solution:
A. RFID technology indeed consists of two main components: tags and readers. Tags are small devices
that contain a unique identifier and can be attached to objects, while readers are devices that
transmit and receive radio signals to communicate with the tags.
B. Readers have antennas that emit radio waves to activate the RFID tags and receive the signals
transmitted by the tags. The reader then interprets the received signals to extract the information
stored on the tag.
C. Passive RFID tags do not have an internal power source or battery. Instead, they rely on the energy
transmitted by the reader's radio waves to power up and communicate. When a reader emits radio
waves, the passive RFID tag absorbs the energy and uses it to send a response back to the reader.

653. Solution: Processor Registers, Cache Memory and RAM are primary and volatile memory so
they will lose data when the power to a computer is switched off. While SSD and ROM are
permanent storage devices.

IFAS Publications
www.ifasonline.com
185
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

654. Solution: Cookies are small text files that websites store on a user's device (such as a computer
or smartphone) when they visit the website. These files contain data that the website can
retrieve and use for various purposes during subsequent visits by the user.

655. Solution:
A. ROM is not "Real optical memory." ROM stands for Read-Only Memory, which is non-volatile
memory used to store permanent data and instructions that cannot be modified or erased during
normal computer operations.
B. RAM (Random Access Memory) stores the instructions and data that the computer is currently
working on. It is volatile memory that allows for fast read and write operations, providing temporary
storage for active programs and data.
C. ROM commonly stores the BIOS (Basic Input/Output System), which contains firmware that
initializes hardware and provides the computer's basic functionality when it is powered on.
D. RAM allows the user to read and write data. It provides temporary storage for data and instructions
that can be read from and written to by the computer's processor. RAM is used for active data
manipulation and is much faster than other storage options.
E. Both RAM and ROM lose their data when the power is turned off. RAM is volatile memory,
meaning its contents are lost when the power supply is interrupted or shut down. Similarly, ROM
retains its data even without power, but it cannot be modified or written to during normal operations.

656. Solution: Twitter does indeed allow users to send small posts known as "tweets" with a
character limit of up to 280 characters.
By default, blogs typically display posts in chronological order on the home page, with the earliest
post appearing at the top. This allows readers to see the most recent content first and scroll down to
view older posts.

657. Solution: Social engineering refers to the manipulation of individuals to gain unauthorized
access to sensitive information or systems. It involves using psychological tactics and deceptive
techniques to trick people into divulging confidential information, such as passwords, personal
details, or financial data.

658. Solution:
A. Hub - A network device used to connect multiple devices together.
B. Joystick - An input device used for controlling movement in games or simulations.
C. Notepad - A text editor software for creating and editing plain text files.
D. Android - An operating system used in mobile devices developed by Google.

659. Solution: LAN: Local Area Network - Connects devices within a limited area like a home or
office.
MAN: Metropolitan Area Network - Spans a larger area, connecting multiple LANs within a city or
metropolitan region.
WAN: Wide Area Network - Covers a wide geographical area, such as multiple cities or even
continents, connecting LANs and MANs over long distances.

660. Solution:
Statement I: ROM (Read-Only Memory) is non-volatile memory that can only be read from, and its
contents are fixed and cannot be changed by normal computer operations.
Statement II: RAM (Random Access Memory) is volatile memory that can be both read from and
written to. It is a temporary storage area used by a computer to hold data and instructions that are
actively being used by the CPU (Central Processing Unit). The contents of RAM are lost when the
computer is powered off or restarted.
ROM is non-volatile and read-only memory.

IFAS Publications
www.ifasonline.com
186
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

RAM is volatile and both readable and writable memory.

661. Solution: MIDI stands for Musical Instrument Digital Interface. It is a communication protocol
used in electronic musical instruments, computers, and other devices to control and
synchronize music-related data. MIDI allows different devices, such as keyboards, synthesizers,
drum machines, and computers, to exchange musical information and instructions.

662. Solution:
1. 1 byte = 8 bits
2. 1 KB = 2 10 byte
3. The base 10 value of the binary number 001111 is:
= 0 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 1 * 2^0 = 0 + 0 + 8 + 4 + 2 + 1 = 15
4. To calculate the number of minutes it would take to upload a 75-megabyte file at a 2 Megabits per
second upload speed:
Convert the file size from megabytes to megabits: 75 MB * 8 = 600 megabits (Mb).
600 Mb / 2 Mbps = 300 seconds = 5 minuites.

663. Solution: CC (Carbon Copy): CC allows you to send a copy of an email to additional recipients.
When you add email addresses to the CC field, the original recipients and the CC recipients can
see who else received the email. This is commonly used when you want to keep someone
informed or involved in the conversation but they are not the primary recipient.
BCC (Blind Carbon Copy): BCC also allows you to send a copy of an email to additional recipients,
but unlike CC, the recipients in the BCC field are not visible to other recipients. This means that the
recipients in the BCC field remain anonymous to others.
So as Ashok is in BCC field he will not be visible to others who are in to field and cc field. But as to
and cc fields are public fields, Ashok can see them.

664. Solution: DuckDuckGo, Google, Yahoo search RELD, and Bing are all popular web search
engines. These search engines index web pages and provide users with search results based on
their queries.
Pinterest, on the other hand, is not primarily a web search engine. It is a visual discovery and
bookmarking platform where users can find and save images or "pins" related to their interests.

Exam Year - 2023


665. Solution: The mobile application designed by the Indian company has a capacity to support a
large number of staff records. It uses 10 bits to store Staff IDs and 20 bytes (equivalent to 160
bits) to store staff names. The application can handle 2^10 (1024) different Staff IDs and
2^160 possible combinations for staff names. Multiplying these two values gives us a total of
2^170 staff records that the application can support. None of the given options match the
correct answer.

666. Solution: Phishing: a cyberattack that uses misleading emails to deceive victims into giving up
valuable information, installing malware, or giving away money.
Pharming: a cyberattack that redirects users from legitimate websites to fraudulent ones that steal
their information or infect their devices with malware.
Spamming: the practice of sending unsolicited or unwanted messages to a large number of
recipients, usually for advertising or malicious purposes.
Smishing: a cyberattack that uses misleading text messages to deceive victims into giving up
valuable information, installing malware, or giving away money.

IFAS Publications
www.ifasonline.com
187
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

667. Solution: The main benefits of using an SSD over an HDD include faster data access times,
lighter weight, lower power consumption, and increased reliability. Unlike HDD, SSDs don’t use
spinning disks.

668. Solution:
1. 1 Byte = 8 bits.
2. In the binary number 110, the rightmost digit is 0, which represents 2^0 (2 to the power of 0), which
equals 1. The middle digit is 1, representing 2^1 (2 to the power of 1), which equals 2. The leftmost
digit is also 1, representing 2^2 (2 to the power of 2), which equals 4.
To calculate the base-10 value, you add up the values of each digit: 4 + 2 + 0 = 6.
3. The value of p is determined by the equation 2^p = 1,048,576, where 1 megabyte is equal to 2^p
bytes. By taking the logarithm base 2 of both sides, the value of p is found to be approximately 20.
Therefore, if there are 2^p bytes in 1 megabyte, the value of p is 20.
4. The ISP company advertises a broadband download speed of 128 megabits per second, which
translates to 16 megabytes per second. This means that the broadband connection can download 16
megabytes of data every second. If we consider that each file is 4 megabytes in size, then the
broadband connection can download 4 such files in one second, resulting in a rate of 4 files per
second.

669. Solution: Statement I is true because blogs are typically organized in reverse chronological
order, with the most recent entries appearing first. This is because blogs are designed to be a
way for people to share their thoughts and ideas in a timely manner, so it makes sense to have
the most recent entries at the top.
Statement II is also true. A hit is a term used in search engine optimization (SEO) to refer to the
number of times a website or web page is visited by a user. When a user enters a keyword into a
search engine, the search engine will return a list of websites that match the keyword. The number
of times a website appears in the search results is a measure of its popularity, and this is referred to
as the website's "hits."

670. Solution: FTP stands for File Transfer Protocol. It is a standard network protocol used for
transferring files between a client and a server over a computer network, such as the internet.
FTP operates on the client-server model, where the client initiates a connection to the server
and can perform various file operations such as uploading (putting) and downloading (getting)
files, renaming files, deleting files, creating directories, etc.

671. Solution: Phishing: a cyberattack that uses misleading emails to deceive victims into giving up
valuable information, installing malware, or giving away money.
Pharming: a cyberattack that redirects users from legitimate websites to fraudulent ones that steal
their information or infect their devices with malware.
Spamming: the practice of sending unsolicited or unwanted messages to a large number of
recipients, usually for advertising or malicious purposes.
Smishing: a cyberattack that uses misleading text messages to deceive victims into giving up
valuable information, installing malware, or giving away money.

672. Solution: The correct advantages of using Solid State Drives (SSDs) rather than Hard Disk
Drives (HDDs) in Laptop computers are:
A. SSD is much lighter than HDD.
B. SSD has lower power consumption than HDD.
C. The statement "SSDs are thick compared to HDDs due to no moving parts" is incorrect. In fact,
SSDs are generally thinner and more compact compared to HDDs. Since SSDs do not have any
moving parts, they can be designed in smaller form factors, making them ideal for slim and
lightweight laptops.

IFAS Publications
www.ifasonline.com
188
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

673. Solution: A. Base-10 (denary) value of the binary number: 100000


100000 in binary = 1 * 2^7 + 0 * 2^6 + 0 * 2^5 + 0 * 2^4 + 0 * 2^3 + 0 * 2^2 + 0 * 2^1 + 0 * 2^0 =
8
B. Internet service provider advertises a download speed of 80 megabits per second. What is the
time taken in seconds to download an 80 megabyte file?
80 megabytes = 80 * 10^6 bits
80 megabits per second = 80 * 10^6 bits per second
Time taken to download = 80 * 10^6 / 80 * 10^6 = 1 second
C. A music file is 80 megabytes in size and MP3 file compression reduces the size of a music file by
90%. The number of MP3 files of the size after compression that can be stored on an 800 MB CD.
Size of music file after compression = 80 * (1 - 90%) = 80 * 0.1 = 8 megabytes
Number of MP3 files that can be stored = 800 / 8 = 100
D. What is the denary (base-10) equivalent to the hexadecimal digit E?
E in hexadecimal = 14 in decimal

674. Solution: Statement 1: CDs and DVDs are not described as magnetic storage devices. They are
optical storage devices. CDs and DVDs store data using microscopic pits and lands on the
surface of the disc, which are read using a laser beam.
Statement 2: Laser printers do not spray droplets of ink onto the paper. Laser printers use a laser
beam to create an electrostatic image on a drum or belt, and then toner (a powdered ink) is attracted
to the charged areas and transferred onto the paper to form characters.

675. Solution:
B. DIKSHA: DIKSHA is an open-source platform for educational content and resources in India. It is
developed on an open-source digital platform.
C. MySQL: MySQL is an open-source relational database management system. It is widely used and
considered as one of the most popular open-source digital platforms for managing databases.
However, A. Google Earth is not built on top of an open-source digital platform. It is a proprietary
software developed by Google.

676. Solution: Web 3.0 technology aims to empower users by giving them control over their data
and web content. It emphasizes decentralization and user ownership. While blockchain is often
associated with Web 3.0, it is just one aspect of it. The future success of blockchain-based
networks and businesses in the Web 3.0 era depends on various factors.

677. Solution: Statement I: The inventor of the World Wide Web (WWW) is Sir Tim Berners-Lee, not
Bill Gates. Tim Berners-Lee is a British computer scientist who is credited with inventing the
WWW while working at CERN.
Statement II: IPv6 (Internet Protocol version 6) does define an IP address of 128 bits. IPv6 was
developed as the successor to IPv4 and introduced the use of 128-bit addresses to accommodate the
growing number of devices connected to the internet.

678. Solution: To determine the value of the formula = SUMIF(B1:B3, ">" & 3, C1:C3), we need to
evaluate the cells in column C that correspond to cells in column B where the value in column B
is greater than 3. Let's go through the calculation:
In cell B1, the value is 5, which is greater than 3. So, we consider the corresponding value in cell
C1, which is 1.
In cell B2, the value is 3, which is not greater than 3. So, we skip the corresponding value in cell C2.
In cell B3, the value is 5, which is greater than 3. So, we consider the corresponding value in cell
C3, which is 7.
Now, let's sum up the values we considered: 1 + 7 = 8.

IFAS Publications
www.ifasonline.com
189
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

679. Solution: Statement I: SWAYAM is indeed a platform developed by the Ministry of Education
and the All India Council for Technical Education (AICTE). It aims to provide free online
courses and study material to bridge the digital divide among students in India. This statement
is true.
Statement II: The University Grants Commission (UGC) is not the national coordinator of SWAYAM
for non-technical Post Graduation education. While the UGC does play a role in promoting online
education and e-learning initiatives in India, it is not specifically mentioned as the coordinator for
SWAYAM in the given statement. Therefore, this statement is false.

680. Solution: Aadhar is not built on top of an open-source digital platform. It is a proprietary
software developed by the Unique Identification Authority of India (UIDAI).
Adobe Reader is not built on top of an open-source digital platform. It is a proprietary software
developed by Adobe Systems.
COWIN is built on top of the open-source digital platform called Django. Django is a Python-based
web framework that is used to develop web applications. COWIN uses Django to develop its web
application, which allows users to register for COVID-19 vaccination slots.

681. Solution: According to the 2022 Brand Finance Global 500 report, IBM was the most valuable
worldwide IT brand with a brand value of \$96.8 billion.
Here are the top 5 most valuable worldwide IT brands in 2022:
IBM (US) - \$96.8 billion
Microsoft (US) - \$84.2 billion
Amazon (US) - \$79.1 billion
Apple (US) - \$76.8 billion
Alphabet (US) - \$71.5 billion
TCS and Infosys were the second and third most valuable global IT brands in 2022, according to the
2022 Brand Finance IT Services 25 report.
Here are the top 5 most valuable global IT brands in 2022:
Accenture (Ireland) - \$102.5 billion
Tata Consultancy Services (India) - \$17.2 billion
Infosys (India) - \$13 billion
NTT Data (Japan) - \$11.8 billion
DXC Technology (US) - \$10.6 billion

682. Solution: Statement A: SaaS users can access their data from any Internet-Connected device.
This is because SaaS applications are hosted on remote servers, and users can access them
through a web browser. This means that users can access their data from any device that has an
internet connection, including laptops, desktops, tablets, and smartphones.
Statement B: A web-based email service such as Outlook, Hotmail or Yahoo! Mail is a form of SaaS.
This is because these email services are hosted on remote servers, and users can access them through
a web browser. This means that users do not need to install any software on their devices to use
these email services.
Statement C: SaaS buyers cannot customize the user interface to change the look and feel of the
software, as well as, modify specific areas, such as data fields. This is because SaaS applications are
typically delivered as a "black box" solution. This means that users cannot modify the underlying
code of the application. However, users may be able to customize the user interface through a
limited set of options that are provided by the SaaS provider.

683. Solution:

IFAS Publications
www.ifasonline.com
190
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

A. CCTV (Closed-Circuit Television) is a video surveillance technology used for security and
monitoring. It typically involves the use of cameras and video recording devices connected by wires
or cables.
B. RFID (Radio Frequency Identification) is a technology that uses radio waves to identify and track
objects or individuals. RFID operates over short to moderate ranges, typically a few meters, and is
used for applications like inventory management, access control, and asset tracking.
C. WLAN (Wireless Local Area Network) is a wireless communication technology that allows devices
to connect to a local network and access the internet without the need for wired connections. WLAN
operates over short distances, typically within a specific area or building, and is commonly used for
wireless internet access in homes, offices, and public spaces.

684. Solution: In India, the term "Public Key Infrastructure" (PKI) is primarily used in the context of
digital security infrastructure. PKI refers to a set of technologies, policies, and procedures that
enable the secure exchange of information over digital networks. It provides a framework for
managing digital certificates, digital signatures, and encryption keys to ensure the
confidentiality, integrity, and authenticity of electronic transactions and communications.

685. Solution: Given that each song is approximately 4 Mbytes in size, the total size of the 4000
songs can be calculated as follows:
Total Size = 4000 songs × 4 Mbytes/song
Converting Mbytes to Gigabytes (GB):
Total Size = (4000 songs × 4 Mbytes/song) ÷ 1024 Mbytes/GB
Total Size = 16000 Mbytes ÷ 1024 Mbytes/GB
Total Size ≈ 15.625 GB
Therefore, Amit will need to use a memory stick of at least 16 GB (option 2) to accommodate the
4000 songs.

686. Solution: 5G-enabled technology is expected to replace 4G technology for mobile


communication worldwide. The potential advantages of 5G include greater interconnectivity
for the Internet of Things (IoT) and faster download speeds. However, the statements claiming
less bandwidth and greater end-to-end delay for 5G are not true. 5G offers increased
bandwidth and aims to reduce latency for improved responsiveness.

687. Solution: BHIM (Bharat Interface for Money) is a digital payment app developed by the
National Payments Corporation of India (NPCI). It allows users to make seamless and instant
transactions using the Unified Payments Interface (UPI) platform. BHIM simplifies the process
of digital payments and enables users to make secure and quick transactions using their mobile
devices.
Statement II: Courses delivered through SWAYAM platform are made available at minimal cost.
This is also true. SWAYAM is a digital learning platform developed by the Ministry of Human
Resource Development (MHRD) of the Government of India. It offers a wide range of courses at all
levels, from undergraduate to postgraduate. The courses are delivered through a variety of modes,
including video lectures, interactive exercises, and quizzes. The courses are available at minimal
cost, and some of them are even free.

688. Solution: The correct full form of PDA is Personal Digital Assistant.
A Personal Digital Assistant (PDA) is a portable device that functions as a personal information
manager. PDAs are used for a variety of tasks, including:
Keeping track of appointments and contacts
Taking notes
Reading and writing emails
Surfing the web

IFAS Publications
www.ifasonline.com
191
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Playing games

689. Solution: Cameras that handle a higher number of Megapixels will be able to capture more
details than those with a lower number.
Images that are stored in a Raw format have not been processed and will take up more storage space
than images that are stored in JPEG format.
The Capacity of your storage device determines how many images you can store.

690. Solution: 128 kilobits per second (kbps) is equal to 128/8 = 16 kilobytes per second (KB/s).
(Since 1 byte = 8 bits)
Lets calculate the file size for a 3-minute song:
File size = 16 KB/s * 180 seconds = 2,880 kilobytes (KB)
Now, let's determine the number of songs that can be stored on the 4-gigabyte MP3 player:
4 gigabytes (GB) = 4 * 1024 * 1024 KB = 4194304 KB
Number of songs = 4194304 KB / 2,880 KB (per song) = 1,456.35 songs (approximately).
Therefore, Tina can store approximately 1,456 songs on her 4-gigabyte MP3 player.

691. Solution:
A. You can create folders to store and organize your emails. This is a common feature in most email
services or clients, allowing users to create folders or labels to categorize and manage their emails
efficiently.
D. You can add signatures to your emails to give personal contact details. Email clients typically offer
the option to include a signature at the end of outgoing emails. Signatures often contain personal
contact details, such as name, job title, phone number, and email address.
Regarding the other statements:
B. Using the Cc feature will hide all other recipients from each other. This statement is false. When
using the "Cc" (Carbon Copy) feature in an email, all recipients can see the list of other recipients.
To hide recipients from each other, the "Bcc" (Blind Carbon Copy) feature should be used.
C. You can add attachments of any file size to an email. This statement is false. Most email services
and clients impose limitations on attachment sizes. The exact size limit varies depending on the
service or client, but there is typically a maximum file size allowed for attachments.
E. You can only send emails from a laptop computer. This statement is false. Emails can be sent from
various devices, including laptops, desktop computers, smartphones, tablets, and other internet-
connected devices. As long as the device has access to an email service or client, it can be used to
send emails.

692. Solution: Statement I is correct. While .text and .csv are indeed file extensions commonly used
for generic text files, .rtf (Rich Text Format) is a file extension used for text files that can
contain formatting and other rich text elements.
Statement II is correct. The .rar file extension is indeed an acronym for Roshal Archive, which refers
to a compressed file format developed by Eugene Roshal, a Russian software engineer. The .rar
format is commonly used for compressing and archiving files, similar to the .zip format.

693. Solution: WLAN stands for Wireless Local Area Network. It is a type of wireless network that
allows devices to connect and communicate with each other using radio waves instead of
physical cables. WLANs are commonly used for providing internet access to devices such as
laptops, smartphones, tablets, and other wireless-enabled devices within a limited area, such
as a home, office, or public hotspot.

694. Solution: The order of memory types in decreasing order of access time is as follows: CPU
Cache is the fastest and has the shortest access time, followed by RAM (Random Access

IFAS Publications
www.ifasonline.com
192
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Memory), and finally SSD (Solid State Drive), which has the slowest access time among the
three.

695. Solution: CSV stands for Comma-Separated Values. It is a file format commonly used for
storing and exchanging tabular data, such as spreadsheets or databases. In a CSV file, each line
represents a row of data, and within each line, the values are separated by commas (hence the
name "comma-separated").

696. Solution: Biometric is a type of registration system that uses fingerprints or retina scans to
register students.
A type of registration that uses a form that has been completed with a pencil and is then scanned by
a machine after being completed is called OMR (Optical Mark Recognition) registration.
A tag that uses microchips and radio signals worn by all students that register them when they enter
the classroom is called RFID (Radio Frequency Identification) registration.
Smart Cards are made of plastic and contain a chip that can be swiped through to register the
student.

697. Solution: Statement - I: 0.2 terabytes (TB) is equal to 204.8 gigabytes (GB).
This statement is true. In the context of digital storage, 1 terabyte (TB) is equal to 1024 gigabytes
(GB). Therefore, to convert 0.2 terabytes to gigabytes, we multiply it by 1024:
0.2 TB * 1024 GB/TB = 204.8 GB.
Statement - II: 1 petabyte (PB) is equal to 2^53 bits.
This statement is true. In the context of digital storage, 1 petabyte (PB) is equal to 1024 terabytes
(TB) or 2^50 bytes. However, the statement claims that 1 petabyte is equal to 2^53 bits, which is
correct. The correct conversion would be:
1 PB = 1024 TB = 1024 * 1024 GB = 1024 * 1024 * 1024 MB = 1024 * 1024 * 1024 * 1024 KB =
1024 * 1024 * 1024 * 1024 * 1024 bytes = 2^50 * 2^3 Bits = 2 53 bits

698. Solution: Statement A is true because the World Wide Web (WWW) is a collection of websites,
which are in turn collections of web pages. Web pages are multimedia documents that can
contain text, images, videos, and other forms of media.
Statement B is true because Uniform Resource Locators (URLs) are unique addresses that identify
web pages on the WWW. URLs specify the location of a web page on a web server, as well as the
protocol that should be used to access the page.
Statement C is false because web resources can be accessed by any operating system that has a web
browser installed. For example, web resources can be accessed by Windows, macOS, Linux, and
Android operating systems.

699. Solution:
A. matches with 2 because a blue-ray disc is an optical storage media that uses blue/violet laser
technology to store data.
B matches with 4 because an SSD is a solid-state drive that stores data by controlling the movement of
electrons within a microchip.
C matches with 1 because ROM is read-only memory that cannot be written to.
D matches with 3 because RAM is random-access memory that stores data that is currently in use.

700. Solution: SMS stands for Short Message Service. It is a text messaging service that allows users
to send and receive short text messages (up to 160 characters) between mobile phones and
other mobile devices. SMS messages are sent and received using cellular networks, so they do
not require an internet connection.

701. Solution: The correct order of the stages A-E when an email is sent and received is as follows:

IFAS Publications
www.ifasonline.com
193
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

1. The sender composes his message and activates the send command.
2. Message is sent to sender's ISP mail server, and this server examines the address associated with the
message.
3. Sender's ISP mail server decides how to route the message, and the message travels over the internet
and arrives at the recipient's ISP mail server.
4. Message is held in the recipient's electronic mail (email) box, and the recipient logs on to read his
message.
5. The message is retrieved and sent to the recipient's computer to be opened and read.

702. Solution: Statement 1: (4A2F)_16 = (18991)_10


To evaluate this statement, we need to convert the hexadecimal number (4A2F) to decimal.
(4A2F)_16 = (4 * 16^3) + (10 * 16^2) + (2 * 16^1) + (15 * 16^0) = 18991
Therefore, Statement 1 is true. (4A2F) in hexadecimal is equal to (18991) in decimal.
Statement 2: (6940)_10 = (1B1C)_16
To evaluate this statement, we need to convert the decimal number (6940) to hexadecimal.
(6940)_10 = (1 * 16^3) + (11 * 16^2) + (1 * 16^1) + (12 * 16^0) = 1B1C
Therefore, Statement 2 is true. (6940) in decimal is equal to (1B1C) in hexadecimal.
In conclusion, both Statement 1 and Statement 2 are true.

703. Solution: The following are the three types of primary storage:
RAM (Random Access Memory): RAM is the most common type of primary storage. It is volatile,
meaning that it loses its contents when the power is turned off. RAM is used to store data and
instructions that are currently in use.
ROM (Read-Only Memory): ROM is a type of non-volatile memory that can only be read from.
ROM is used to store firmware, which is the software that controls the hardware of the computer.
Cache Memory: Cache memory is a type of high-speed memory that is used to store frequently
accessed data. Cache memory is located between the CPU and the main memory (RAM).

704. Solution:
A. Set of rules that must be obeyed when transforming files on data across the internet. - II. Hyper
Text Transfer Protocol (HTTP)
B. ID given to a device when it connects to the internet; the ID changes each time the device
connects - IV. Internet Protocol (IP) Address
C. Company that provides the user with access to the internet for a monthly subscription. - I.
Internet Service Provider
D. ID which uniquely identifies the device connected to the internet; this ID rarely changes. - III.
Media Access Control (MAC) address

705. Solution: Data compression involves reducing the size of a file or data by encoding the
information in a more efficient way. The goal is to represent the same information using fewer
bits, thereby reducing the storage space required and improving transmission efficiency.
Various compression algorithms and techniques are used to achieve this, such as removing
redundant information, encoding patterns, or using mathematical algorithms to compress the
data.

706. Solution: Statement-l: Twitter is an example of a Web 2.0 application.


This statement is true. Twitter is considered an example of a Web 2.0 application. Web 2.0 refers to a
second generation of the World Wide Web that emphasizes user-generated content, interactivity, and
collaboration. Twitter allows users to create and share content, interact with others through tweets
and messages, and participate in real-time conversations, which aligns with the characteristics of
Web 2.0.
Statement-II: Web 2.0 refers to static text-based information websites.

IFAS Publications
www.ifasonline.com
194
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

This statement is false. Web 2.0 is not limited to static text-based information websites. In fact, Web
2.0 represents a shift from static, one-way communication to dynamic, interactive platforms. It
encompasses a wide range of websites and applications that facilitate user participation, content
creation, and social interactions.

707. Solution: Synchronous communication is a type of communication where two or more people
are communicating at the same time. This means that they can see each other's messages and
respond immediately.
The following systems use synchronous communication:
Skype video call: Skype is a video calling software that allows users to make video calls to each
other.
Facebook Chat: Facebook Chat is a chat feature on Facebook that allows users to chat with each
other in real time.
Messaging on Snapchat: Messaging on Snapchat is a chat feature on Snapchat that allows users to
send messages to each other that disappear after a certain amount of time.
Telephone call: A telephone call is a call that is made over a telephone line.

708. Solution: A. Solid State Drive (SSD) - 3. Has no moving part and is therefore a very robust and
reliable technology.
B. ROM - 4. Non-volatile in nature that stores firmware.
C. DVD-RAM - 1. Optical media uses concentric tracks to allow simultaneous read-write operations.
D. RAM - 2. Volatile in nature that stores programs and data in current use.

709. Solution: In this case, the pattern is adding 3 to the previous value in each cell. So, the contents
of the cells B11, B12, and B13 will be:
B11: 9 (6 + 3)
B12: 12 (9 + 3)
B13: 15 (12 + 3)

710. Solution: The Semantic Web is a key aspect of Web 3.0, where information is structured and
tagged in a way that allows machines to understand and interpret its meaning. It involves
adding metadata, ontologies, and semantic annotations to web content, enabling computers to
comprehend and process the data more intelligently.

711. Solution:
Statement I is false. A portable hard drive is an external storage device, not an internal memory.
Internal memory is the memory that is directly accessible by the CPU. It is used to store data and
instructions that are currently in use. External memory is the memory that is not directly accessible
by the CPU. It is used to store data that is not currently in use.
Statement II is true. Magnetic tape is a type of storage media that is used to store backup data. It is a
reliable and cost-effective way to store large amounts of data.

712. Solution: A standard format for compressed video files is MPEG.


This statement is true. MPEG (Moving Picture Experts Group) is a standard format for compressing
video files. It is widely used for video compression and allows for efficient storage and transmission
of video content.
WAV files are not compressed.
This statement is true. WAV (Waveform Audio File Format) files are typically uncompressed audio
files. They store audio data in a raw and uncompressed format, resulting in larger file sizes
compared to compressed audio formats like MP3.
A compressed file will be transmitted faster over a network.

IFAS Publications
www.ifasonline.com
195
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

This statement is generally true. Compressed files tend to have smaller file sizes compared to their
uncompressed counterparts. This smaller file size can result in faster transmission over a network
since less data needs to be transferred.

713. Solution:
A. Carbon copy - 2. Allows you to send the same email to more than one person at once.
B. Email signature - 1. Allows you to add personal data to the email.
C. Address book - 4. Allows you to store contact details.
D. File attachment - 3. Allows you to send a photograph with your email.

714. Solution: Email encryption is a way of scrambling the content of an email message so that it
can only be read by the intended recipient. This is done by using a cryptographic algorithm to
convert the message into a format that is unreadable by anyone who does not have the key to
decrypt it.

715. Solution: The statements provided about music files are both false. Contrary to Statement I, a
music clip stored in MP3 format takes up less memory than the same clip stored in WAV format
because MP3 files are compressed. Additionally, Statement II is false as well since music files
stored in MP3 format are generally of lower quality compared to files stored in WAV format, as
MP3 is a lossy compression format.

716. Solution: Statement B is accurate: Web 2.0 brings people closer together with information
using machines. Web 2.0 refers to the second generation of the World Wide Web, which
introduced interactive and user-generated content, social media platforms, and collaborative
tools.
Statement C is accurate: Web 3.0, also known as the Semantic Web, aims to bring machines closer
together using information. It focuses on the intelligent understanding and processing of data by
machines to provide more meaningful and personalized experiences.
Statement A is not accurate: Web 2.0 is not a simple static website without any interaction with
users. It is characterized by user participation, dynamic content, and interactive features.

717. Solution:
A. Inkjet printer - 3. Droplets of ink are propelled onto paper.
B. LCD screen - 1. Flat panel display that uses the light modulating properties of liquid crystals.
C. LED screen - 2. Flat panel display that uses an array of light-emitting diodes as pixels.
D. Laser Printer - 4. Electrically charged powdered ink is transferred onto paper.

718. Solution: Web 3.0 is an idea for a new iteration of the World Wide Web which incorporates
concepts such as decentralization, blockchain technologies, and token-based economics. Web
3.0 is also sometimes referred to as the Semantic Web, which is a vision of Tim Berners-Lee,
the inventor of the World Wide Web, for an intelligent, self-sufficient, and open Internet that
employed AI and machine learning to function as a "global brain" and interpret content
conceptually and contextually.

719. Solution: Bcc (Blind Carbon Copy) in an email system allows the sender to conceal recipients'
email addresses from other recipients.
Phishing is a form of cyber attack where individuals are deceived into revealing sensitive
information by impersonating a trustworthy entity.
Spamming refers to the unsolicited sending of bulk messages, usually advertisements, to a large
number of recipients. It is not necessarily an attempt to acquire sensitive information.

IFAS Publications
www.ifasonline.com
196
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

720. Solution: Statement I is False. Mainframe computers typically have much larger internal
memories than desktop computers. For example, a mainframe computer might have a memory
capacity of several terabytes, while a desktop computer might have a memory capacity of only
a few gigabytes.
Statement II is True. Spreadsheets and word processors are both examples of application software.
Application software is software that is designed to help users perform specific tasks, such as
creating spreadsheets, word processing documents, or managing databases.

721. Solution: Sensors are commonly used in activities such as activating a burglar alarm and
opening automatic doors. These tasks require the detection of specific events or conditions,
which can be achieved through the use of sensors. For example, a burglar alarm may be
equipped with motion sensors or door/window sensors to detect unauthorized entry. Similarly,
automatic doors rely on sensors to detect the presence of individuals or objects and trigger the
opening mechanism. In both cases, sensors play a crucial role in controlling and monitoring the
respective activities.

722. Solution: Statement B: The internet is a group of interconnected networks. This is a true
statement because the internet is made up of millions of smaller networks, all of which are
connected together.
Statement C: An extranet is an internal network that can be accessed externally by authorized users.
This is also a true statement because an extranet is a type of network that is designed to allow
authorized users outside of an organization to access certain resources on the organization's internal
network.
Statement A is false. An intranet is a private network that is used within an organization. It is not a
public network.

723. Solution: The pair of acronym and its expansion that is incompatible is "3. Blog - weB LOGIC."
The expansion "weB LOGIC" does not accurately represent the meaning of the term "Blog,"
which refers to a web-based platform or website where individuals or groups share
information, opinions, and experiences.

724. Solution: To calculate the approximate number of photographs that can be stored on a memory
stick with a 4GB capacity, we need to divide the total capacity (4GB) by the size of each
photograph (10 MB).
First, we need to convert the capacity from GB to MB:
4GB = 4,000 MB
Then, we divide the total capacity by the size of each photograph:
4,000 MB / 10 MB = 400
Therefore, a memory stick with a 4GB capacity can store approximately 400 photographs.

725. Solution: Statement I: RAM is writable, ROM is read-only.


Statement II: CD-RW can be rewritten, CD-R is write-once.

726. Solution: The Word Count command in Microsoft Word displays the number of words,
characters, paragraphs, and lines in the current document.
Words: A word is a sequence of characters that is separated by spaces or punctuation marks.
Characters: A character is any symbol that can be typed on a keyboard, including letters, numbers,
punctuation marks, and spaces.
Paragraphs: A paragraph is a group of sentences that are indented together.
Lines: A line is a single row of text in a document.

IFAS Publications
www.ifasonline.com
197
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

727. Solution: Statement E is not correct as Internet Service Providers (ISPs) provide users with
access to the Internet. But rest of the statements regarding web browser are true.

728. Solution: Statement I: ASCII, a character-encoding scheme, is an acronym for American


Standard Code for Intelligent Information.
This statement is incorrect. The acronym "ASCII" stands for American Standard Code for
Information Interchange, not "Intelligent Information."
Statement II: (37.25)_10 = (100101.01)_2
This statement is correct. It represents the conversion of the decimal number 37.25 to binary, where
(37.25)_10 is equal to (100101.01)_2.

729. Solution:
Statement I: An Operating System controls peripherals and provides protection against viruses.
True. An operating system (OS) is a software program that controls the hardware and software of a
computer. It is responsible for tasks such as managing files, running programs, and controlling
peripherals. The OS also provides protection against viruses by scanning files for malicious code
and blocking access to infected files.
Statement II: In word processing and desktop publishing, the terms portrait and landscape refer to
Page Layout.
True. In word processing and desktop publishing, the terms portrait and landscape refer to the
orientation of a page. A portrait page is taller than it is wide, while a landscape page is wider than it
is tall. The default orientation for a word processing document is portrait, but the user can change
the orientation to landscape if they want.
Therefore, both statements are true.

730. Solution:
PDF: PDF stands for Portable Document Format. It is a file format that is used to represent
documents in a format that is independent of the software used to create or view the document. PDF
files can contain text, images, and other elements, but they cannot contain formatting information
such as fonts, font sizes, or paragraph styles.
CSV: CSV stands for comma-separated values. It is a file format that is used to store tabular data.
CSV files are typically used to exchange data between different applications. CSV files can contain
text, numbers, and dates, but they cannot contain formatting information.
GIF: GIF stands for Graphics Interchange Format. It is a file format that is used to store images. GIF
files can contain text, but they cannot contain formatting information.
RTF: RTF stands for Rich Text Format. It is a file format that is used to store documents that contain
formatting information. RTF files can contain text, images, and other elements, and they can also
contain formatting information such as fonts, font sizes, and paragraph styles.
TXT: TXT stands for plain text. It is a file format that is used to store text without any formatting
information. TXT files can only contain text, and they cannot contain images or other elements.

731. Solution:
A. Objects on the slide that hold text, pictures, and more are called Placeholders.
This statement is true. Placeholders in MS PowerPoint are predefined areas on a slide where you can
insert text, images, charts, or other content.
B. MS-PowerPoint automatically opens with Windows Operating System.
This statement is false. MS PowerPoint is not automatically opened with the Windows Operating
System. It needs to be launched separately by the user.
C. A view that displays the slides of a presentation as miniature representations of the slides is called
Slide Sorter view.

IFAS Publications
www.ifasonline.com
198
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

This statement is true. Slide Sorter view in MS PowerPoint displays the slides as miniature
representations, allowing you to easily rearrange, delete, or modify the order of the slides in a
presentation.

732. Solution: Statement I: Fibre-optic cable makes use of light pulses to transmit data and is most
appropriate to connect computers in a small building.
This statement is false. While it is true that fibre-optic cables use light pulses to transmit data, they
are suitable for various network environments, including both small and large buildings. Fibre-optic
cables are known for their high bandwidth and long-distance capabilities, making them ideal for
long-range communication and high-speed data transmission.
Statement II: URL is the text used by web browsers to locate a web address on the Internet.
This statement is true. URL stands for Uniform Resource Locator and is the address used to identify
and locate resources (such as web pages, files, or services) on the Internet. Web browsers use URLs
to retrieve the requested resources from web servers.

733. Solution: The camera's memory card has a capacity of 32 gigabytes. To determine the
maximum number of photos that can be stored on the memory card, we need to calculate the
total storage space available on the card and divide it by the size of each compressed image file.
The camera's resolution is given as 20 megapixels. Since each pixel requires an average of 1 byte in
a compressed image file, the size of each image file can be calculated as follows:
Size of each image file = Resolution in megapixels * Size per pixel
= 20 megapixels * 1 byte per pixel
= 20 megabytes
Since 1 kilobyte is equal to 1024 bytes, we can convert the memory card's capacity from gigabytes
to megabytes:
32 gigabytes = 32 * 1024 megabytes = 32768 megabytes
Now we can calculate the maximum number of photos that can be stored on the memory card:
Maximum number of photos = Memory card capacity / Size of each image file
= 32768 megabytes / 20 megabytes
= 1638.4
Rounding down to the nearest whole number, the maximum number of photos that can be stored on
the memory card is 1638.
Therefore, the correct answer is option 1: 1638.

734. Solution: The statements B, C, and D are true about Bluetooth connectivity.
B. No wires are needed when exchanging files via Bluetooth. Bluetooth is a wireless technology, so no
wires are needed to connect two devices.
C. Bluetooth allows you to speak hands-free on a Mobile phone. Bluetooth headsets allow you to make
and receive calls without having to hold your phone to your ear.
D. Music can be played wirelessly from your Mobile phone to a speaker using Bluetooth. Bluetooth
speakers allow you to play music from your phone without having to connect it to a wired speaker.
The statements A and E are false about Bluetooth connectivity.
A. Bluetooth will only work over long distances. Bluetooth has a maximum range of about 30 feet, so it
is not a good choice for transferring files over long distances.
E. Transfer speeds when sending files are faster than using Wi-Fi. Wi-Fi is a much faster wireless
technology than Bluetooth, so transfer speeds when sending files are typically faster over Wi-Fi.
Therefore, the correct answers are B, C, and D.

735. Solution: Statement I: A file saved in portable document format (.pdf ) is a generic text file.
False. PDF stands for Portable Document Format. It is a file format that is used to represent
documents in a format that is independent of the software used to create or view the document. PDF

IFAS Publications
www.ifasonline.com
199
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

files can contain text, images, and other elements, but they cannot contain formatting information
such as fonts, font sizes, or paragraph styles. Therefore, PDF files are not generic text files.
Statement II: Moving Pictures experts group layer 4 (.mp4) is an example of generic image file
format.
False. MP4 stands for MPEG-4 Part 14. It is a file format that is used to store audio and video data.
MP4 files can contain images, but they are not typically used to store images. Therefore, MP4 files
are not generic image file formats.
Therefore, both statements are false.

736. Solution: The full form of RFID is Radio Frequency Identification. It is a technology that uses
radio waves to identify objects. Infrared is a form of light that is invisible to the human eye. It is
not used in RFID technology.

737. Solution: the process of magnetic ink character recognition (MICR) involves the following
steps:
MICR text is passed over an MICR reader.
Ink on the paper is first magnetised.
Characters are then passed over the MICR read head.
As each character passes over the head, it produces a unique waveform.
The waveform is recognised by the computer system.

738. Solution: Moodle is an open-source learning management system (LMS) that is used to create
and deliver online courses. Aarogya Setu is an open-source contact tracing app that is used to
track the spread of COVID-19. Skype is a proprietary peer-to-peer communication platform
that is not built on an open-source platform.
Therefore, the only applications that are built on top of open-source digital platforms are Moodle
and Aarogya Setu.

739. Solution: Web 1.0 was the first generation of the World Wide Web. It was a read-only web,
where users could only view content that was created by others.
Web 2.0 was the second generation of the World Wide Web. It was a read-write web, where users
could create and share their own content.
Web 3.0 is the third generation of the World Wide Web. It is a semantic web, where data is
structured in a way that can be understood by machines.
Web 5.0 is the fifth generation of the World Wide Web. It is an emotional web, where the focus is on
the user's emotional experience.

740. Solution: Statement I: The National Mission on Education Through Information and
Communication Technology (NMEICT) has been envisaged as a centrally sponsored scheme.
This statement is true. The NMEICT is a centrally sponsored scheme that was launched by the
Government of India in 2009. It aims to provide ICT infrastructure and resources to educational
institutions across the country.
Statement II: The NMEICT has produced wondrous benefits for young minds studying in primary,
secondary and higher education institutions.
This statement is false. There are a number of factors that could affect the benefits of the NMEICT,
such as the quality of the ICT infrastructure, the training of teachers, and the availability of
educational resources. It is also important to consider the needs of different types of students, as the
benefits of the NMEICT may not be the same for all students.

741. Solution: The digital signature service that has been launched on Aadhar platform is called e-
Sign Desk. This service allows Aadhar card holders to sign a document online using their
Aadhar number and biometric or one-time password authentication. The e-Sign Desk is

IFAS Publications
www.ifasonline.com
200
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

provided by qualified companies that are empanelled by the controller of Certifying


Authorities.

742. Solution: The IT (Amendment) Act, 2008 came into force in India on 27-October-2009 to
strengthen the law against cybercrime.

743. Solution: The acronym GPS stands for Global Positioning System, not Global Positioning
Sensor. So the answer is 3. GPS-Global Positioning Sensor.
The other acronyms are matched correctly with their full forms

744. Solution: 'The browser requests the webserver to identify itself by providing its certificate.
This is sent and a check is performed to see if it is authentic. If it is, the browser sends a signal
back to the web server and data transmission begins.

745. Solution: Statement I: Virtual reality is an artificially created environment used to give a
feeling of 'being there', not Al (Artificial Intelligence). Virtual reality does not learn from
changing circumstances.
Statement II: Laser printers also use ink, but in a different form. They use toner, which is a
powdered ink, to produce documents.

746. Solution: By networking computers and devices, resources like printers can be shared among
multiple users, leading to cost reduction. Additionally, software licenses for networked
computers are often more cost-effective. Furthermore, a central file server allows for reliable
data access and management. However, option C is incorrect as networking enables users to
share files and data.

747. Solution: Disk Defragmentor is a utility that is used to reorganise the sectors on a hard disk so
that files can be stored in contiguous data blocks. This can improve the performance of the
hard disk, as files can be read and written more quickly.
Disk formatter is a utility that is used to prepare a disk to allow data files to be stored and retrieved.
This involves formatting the disk, which means creating a file system on the disk. The file system is
a way of organizing the data on the disk so that it can be easily accessed.
Device driver is a software program that allows a computer to communicate with a device. The
device driver translates data between the computer and the device, so that the device can be used by
the computer.
Solid state drive (SSD) is a type of storage device that uses flash memory to store data. SSDs have
no moving parts, which makes them more durable than traditional hard disks. SSDs are also faster
than traditional hard disks, as they do not have to wait for the read/write heads to move to the
correct location on the disk.

748. Solution: Microsoft has announced that it will stop supporting Internet Explorer 11 on June
15, 2022. This means that the Internet Explorer 11 desktop application will no longer receive
security updates or technical support on certain versions of Windows 10. Customers are
encouraged to move to Microsoft Edge, which provides support for legacy and modern websites
and apps, and includes an Internet Explorer mode for sites that require it.
749. Solution: According to the IT Act, 2000, the penalty for breach of confidentiality and privacy is
imprisonment for a term which may extend to two years or with a fine which may extend to
one lakh rupees or both.

750. Solution: Statement I is true. A modem is a device that modulates and demodulates signals,
converting analog signals to digital signals for transmission and vice versa for reception.

IFAS Publications
www.ifasonline.com
201
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement II is also true. In the context of computer security, "crackers" refer to individuals who
break into computer systems with malicious intent, often for personal gain. They are commonly
known as black hat hackers.

751. Solution: Statement III is not completely true courses and certificates provided through
SWAYAM are available free of cost to the learners. However, there are a few exceptions. For
example, some courses may require a small fee to cover the cost of materials or assessments.
Additionally, some certificates may require a fee to be issued.
Other statements related to SWAYAM are true.

752. Solution: A qubit is a unit of computing information that is represented by a state of an atom
or elementary particle (such as the spin) and can store multiple values at once due to the
principles of quantum mechanics. A qubit is the basic unit of information in quantum
computing, which is a field of computer science that uses quantum phenomena to perform
operations on data.

753. Solution: One byte is equal to eight bits, which are the smallest units of information in binary
systems.
One kilobyte (KB) is equal to 2^10 bytes, or 1024 bytes.
One megabyte (MB) is equal to 2^20 bytes, or 1024 KB.
One gigabyte (GB) is equal to 2^30 bytes, or 1024 MB.
One terabyte (TB) is equal to 2^40 bytes, or 1024 GB.
Using these facts, we can convert 2048 TB to bits as follows:
2048 TB = 2048 x 2^40 bytes = 2048 x 2^40 x 8 bits = 2^11 x 2^40 x 2^3 bits = 2^54 bits
Therefore, the correct answer from the options given below is 3. 2^54.

754. Solution: Web 2.0 is a term used to describe the second generation of the World Wide Web. It
is characterized by user-generated content, social media, and interactivity. Web 2.0 sites allow
users to create and share content, collaborate with others, and participate in online
communities.

755. Solution: Statement -I: Video cards and sound cards are NOT examples of computer software.
They are hardware components that are responsible for processing and generating video and
audio signals.
Statement -II: Examples of software utilities do include anti-virus software, anti-spyware software,
and screen savers. Software utilities are programs designed to perform specific tasks or provide
additional functionalities to the computer system.

756. Solution: Statement A: Hypertext links in the WWW are designed to be unidirectional, which
means that the destination of a link may be moved or deleted without the source being notified,
resulting in broken links. This is because hypertext links are simply pointers to other
documents, and they do not contain any information about the location of the destination
document. If the destination document is moved or deleted, the link will still point to the old
location, resulting in a broken link.
Statement B: The Google search engine algorithm is secret, so the general public does not know how
the results of a search are being ranked when presented to a user. Google has never revealed the
exact details of its search algorithm, but it is known to use a variety of factors to rank search results,
including the number of times a page has been linked to, the quality of the links, and the content of
the page.
Statement C: Web search engines collect personal data and use it to target users with customized
advertising. This data can include things like the user's search history, the websites they visit, and

IFAS Publications
www.ifasonline.com
202
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

the ads they click on. Web search engines use this data to create profiles of users, which they then
use to show them ads that are more likely to be relevant to their interests.

757. Solution:
A. JPEG 3. File compression format designed to make photo files smaller in size for storage and for
transmission.
B. MIDI 1. Standard adopted by the electronic music industry for controlling devices such as
synthesizers and sound cards.
C. MP3 format 4. File compression system for music which does not noticeably affect the quality of the
sounds.
D. MP4 format 2. This format allows the storage of multimedia files rather than just sound.

758. Solution: The full form of RAR is Roshal ARchive. It is a file format for data compression and
archiving created by Russian software engineer Eugene Roshal. The name RAR is a combination
of Roshal's surname and the word "archive".

759. Solution:

760. Solution: Both statements are true.


Statement I: 240 in decimal can be represented as 11110000 in binary. This is because 240 is the sum
of the powers of 2 that have a 1 in the binary representation of 11110000. For example, 240 = 128 +
64 + 32 + 16 + 0 + 0 + 0 + 0.
Statement II: 101011111101010 in binary can be represented as 57EA in hexadecimal. This is
because the hexadecimal digits 5, 7, and EA correspond to the binary digits 101, 111, and 1101010,
respectively.

761. Solution: Both RAR and ZIP file formats are commonly used as file compression and archiving
formats that can store multiple files of different types within a single archive file.

762. Solution:
A. Biometrics is a method of identifying a person based on their physical characteristics, such as
fingerprints, retina scans, or facial features. This method is often used for security purposes,
such as to grant access to a building or computer system.
B. OCR stands for Optical Character Recognition. It is a technology that allows computers to read and
understand text that is printed on paper. OCR is often used to digitize documents, such as scanned
images of invoices or contracts.
C. OMR stands for Optical Mark Recognition. It is a technology that allows computers to read and
understand pencil or pen marks on a piece of paper. OMR is often used to grade multiple-choice
tests or to collect data from surveys.
D. RFID stands for Radio Frequency Identification. It is a technology that uses radio waves to identify
objects. RFID tags are small electronic devices that contain a microchip and an antenna. When the
tag is within range of an RFID reader, the reader can read the information on the tag. RFID is often
used to track inventory or to control access to a building.

763. Solution: cloud computing is the on-demand availability of computing resources as services
over the internet. Cloud computing eliminates the need for enterprises to procure, configure, or
manage resources themselves, and they only pay for what they use. Cloud computing offers
several benefits, such as cost savings, speed, scalability, performance, reliability, and security

764. Solution: Statement I: In an email, Bcc: (Blind Carbon Copy) allows recipients to be concealed
from all other recipients of the message. It is used to send a copy of the email to additional
recipients without revealing their email addresses to other recipients.

IFAS Publications
www.ifasonline.com
203
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement II: VoIP (Voice over Internet Protocol) is the technology that enables phone calls to be
made over the internet, not "phone cells." It allows voice communication using internet networks
rather than traditional telephone lines.

765. Solution:
B. This connection allows a wireless connection. Broadband connections can be used to establish
wireless connections, allowing devices to connect to the internet without the need for physical
cables.
C. You are always connected to the internet. Unlike dial-up connections, broadband connections
provide an "always-on" connection, meaning you don't need to dial in or establish a connection each
time you want to access the internet. The connection remains active and available for use at any
time.

766. Solution: Statement A is true because email and instant messenger are two common ways for
network users to communicate with each other.
Statement B is true because networked computers can share files using a variety of methods, such as
file sharing protocols, cloud storage, and network drives.
Statement C is false because viruses can be spread to other computers throughout a computer
network. This is because viruses are often attached to files that are shared over a network.
Statement D is true because it is possible for many users to access and share one printer on a
network. This is done by connecting the printer to the network and then configuring the printer to
share its resources.

767. Solution: Creating shortcuts allows you to create a link to a file or folder on your desktop. This
makes it easy to access the file or folder without having to navigate to its location in the file
system.
Renaming folders allows you to change the name of a folder on your desktop. This can be useful if
you want to organize your files and folders in a way that makes sense to you.
Adjusting icon size allows you to change the size of the icons on your desktop. This can be useful if
you want to make it easier to see the icons or if you want to save space on your desktop.

768. Solution: The benefit of compressing videos is that it reduces the storage space required on
the web server. This is because compression removes redundant data from the videos, which
makes them smaller in size.

769. Solution: he correct chronological order of the computers released, from earliest to most
recent is:
IBM 701 (1952)
IBM 1620 (1959)
Altair 8800 (1975)
Apple Macintosh (1984)
Apple iMac (1998)

770. Solution: Statement I is true. An intranet is a private network that is accessible only to the
employees of an organization. It is a secure network that is used for internal communication
and collaboration.
Statement II is false. The internet is a global network of interconnected computers. It is not a single
computer, but rather a collection of computers that are connected together.

771. Solution: The true statements about LED displays are:


A. It is a flat panel display.
B. It creates images using red, green, and blue diodes.

IFAS Publications
www.ifasonline.com
204
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

D. It can be used in mobile devices such as smartphones and tablets.


LED displays are known for their energy efficiency compared to other display technologies, and
they generally produce less heat. As for statement E, LED displays can be either front-lit or backlit
depending on the specific design and application.

772. Solution: DigiLocker is built on top of open-source digital platforms. PHP is an open-source
scripting language used for web development. WinRAR is a proprietary file archiver utility.

773. Solution: Statement I: Web 3.0 is an interactive web and its greatest virtue is the
democratization of content production.
Statement II: Apple's Siri, which can summarize a large amount of information into knowledge and
useful actions for people, is an example of a Web 3.0 application.

774. Solution: Statement I is incorrect. Vivaldi is a web browser. Statement II is also incorrect.
Microsoft Bing is a web search engine.

775. Solution:
The terms Maze, Petya, and Wannacry are all related to Cyber Attacks.
Maze is a ransomware that was first discovered in 2019. It encrypts files on a victim's computer and
demands a ransom payment in order to decrypt them.
Petya is a ransomware that was first discovered in 2016. It is a more destructive form of ransomware
than Maze, and it can also encrypt the Master Boot Record (MBR) of a victim's computer, making it
impossible to boot the computer.
Wannacry is a ransomware that was first discovered in 2017. It is one of the most destructive
ransomware attacks in history, and it affected over 200,000 computers in over 150 countries.

776. Solution: The correct matches for the National Coordinators of SWAYAM are:
B. CEC-Under Graduate Education
D. UGC - Non-technical Post Graduate Education
The CEC (Consortium for Educational Communication) is responsible for coordinating the
development and dissemination of SWAYAM courses related to Under Graduate Education.
Similarly, the UGC (University Grants Commission) is responsible for coordinating the development
and dissemination of SWAYAM courses related to Non-technical Post Graduate Education.

777. Solution: A valid hexadecimal number consists of digits from 0 to 9 and letters from A to F.
Each digit in a hexadecimal number represents 4 bits.
00E0071944A0: This is a valid hexadecimal address as it contains only valid hexadecimal digits.

778. Solution: The bootstrap is an example of firmware.


Firmware is a type of software that is stored on a computer's ROM (read-only memory). It is used to
boot the computer and to initialize the hardware. The bootstrap is a small piece of firmware that is
responsible for loading the operating system into memory.

779. Solution: Statement I: This statement is incorrect because only CD-ROMs are not used for
saving or writing data. There are so many other options as well like a HDD, SSD, Pen drive, DVD
etc.
Statement II: This statement is incorrect because 2048 MB is equal to 2 GB, not 1.2 GB.

780. Solution: The file formats WAV, MP3, WMA are used to store music files.
WAV (Waveform Audio File Format) is a lossless audio format that stores audio data in its original
form. It is a good choice for storing high-quality audio files.

IFAS Publications
www.ifasonline.com
205
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

MP3 (MPEG-1 Audio Layer III) is a lossy audio format that compresses audio data without losing
too much quality. It is a popular choice for storing music files because it is smaller than WAV files
and it can be played on most devices.
WMA (Windows Media Audio) is a lossy audio format that is similar to MP3. It is a popular choice
for storing music files on Windows devices.

781. Solution:
A. Spyware - 4. Software that secretly gathers information by monitoring key presses on a user's
keyboard, this information is relayed back to the person who sent the software originally.
B. Phishing - 3. Legitimate-looking email sent to a user in the hope of gathering personal information,
as soon as the recipient clicks on the link in email (or email attachment) they are sent to a fake
website.
C. Social networking sites - 2. Website designed to promote the building of online communities who
share the same interest usually free of charge, user can add friend, post messages to each other and
update personal profiles.
D. Pharming - 1. A. Malicious software installed on a user's hard drive or a web server; the software
redirects the user to a fake website without their consent or knowledge.

782. Solution: The main difference between asynchronous and synchronous communication is the
time at which the communication takes place.
Asynchronous communication is communication that does not occur at the same time. This means
that the sender and receiver of the message do not need to be online at the same time. Examples of
asynchronous communication include email, forums, and social media.
Synchronous communication is communication that occurs at the same time. This means that the
sender and receiver of the message need to be online at the same time. Examples of synchronous
communication include instant messaging, video conferencing, and phone calls.

783. Solution: The correct order of the types of secondary storage from fastest to slowest access
time is:
B. Solid state
C. Magnetic
A. Optical

784. Solution: Statement I is true: Encrypting data provides protection by converting it into a
secure form that can only be accessed with the correct decryption key, making it difficult for
hackers to understand the information.
Statement II is false: While backing up data is important for protecting against data loss, it does not
necessarily remove the risk of data being infected by viruses. Viruses can still spread to backup files
if the infected data is copied before the infection is detected and removed.

785. Solution: The correct statement regarding RAM is:


C. RAM can be static or dynamic (SRAM/DRAM)
The other statements are incorrect:
A. RAM is volatile, meaning it loses its data when power is turned off.
B. RAM has a fast access time compared to other storage devices.
D. RAM does not hold the BIOS. The BIOS is typically stored in non-volatile memory such as ROM
or flash memory.

786. Solution: The size of each photograph is 8 MB = 8 * 1024 * 1024 = 8388608 Bytes.
The size of each video is 400 MB = 400 * 1024 * 1024 = 41943040 Bytes.
The total size of the photographs is 800 * 8388608 = 671040640 Bytes.
The total size of the videos is 80 * 41943040 = 3355241600 Bytes.

IFAS Publications
www.ifasonline.com
206
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

The total size of the photographs and videos is 671040640 + 3355241600 = 4026282240 Bytes.
The total size in gigabytes is 4026282240 / (1024 * 1024 * 1024) = 37.50 GB.

787. Solution: John Von Neumann developed the idea of a stored program computer in about 1945.
A stored program computer is a computer that stores instructions in its memory to enable it to
perform a variety of tasks in sequence or intermittently.

788. Solution: The communication system that provides a means of sharing and collaboration by
allowing a group of people to enter, modify, and contribute one or more pages of related text is
Wiki.
Wikis are websites that allow users to create and edit web pages collaboratively. They are a popular
tool for sharing and collaborating on information, and they are often used in the workplace, in
education, and in open source software development.

789. Solution: Statement I: EEPROM stands for Electronically Erasable Programmable Read Only
Memory, not "Electronically Extendable Programmable Read Only Memory." EEPROM is a type
of non-volatile memory that can be electrically erased and reprogrammed.
Statement II: RAM (Random Access Memory) is indeed faster to read from and write to compared to
other types of memory. However, its main drawback is not non-volatility. RAM is volatile memory,
meaning it loses its data when the power is turned off or interrupted. The main drawback of RAM is
its limited capacity and the fact that it requires constant power to retain data.

790. Solution: The correct answer is 2. B and C only.


Email address spoofing is the forgery of an email header or sender information. This means that the
sender's email address can be changed to make it appear as if the email is from someone else. Email
address spoofing is often used for hacking, phishing, and other malicious activities.
Statement A is incorrect because email address spoofing is not the same as copying an email to other
staff.
Statement B is correct because email address spoofing is used for hacking. Hackers can use email
address spoofing to trick people into clicking on malicious links or opening infected attachments.
Statement C is correct because email address spoofing is the forgery of an email header or sender
information. This means that the sender's email address can be changed to make it appear as if the
email is from someone else.
Statement D is incorrect because email address spoofing is not the same as sending a joke email to
other staff.

791. Solution: Statement I: Wi-Fi, a wireless network protocol, is not an acronym for "Wireless
Firewire." Wi-Fi stands for "Wireless Fidelity" and is a technology that allows devices to
connect to a wireless network and access the internet.
Statement II: The decimal number (21.125)_10 can indeed be represented as the binary number
(10101.001)_2. In binary representation, the whole number part is converted to binary digits, and the
fractional part is represented by placing a binary point and converting the fractional digits.

792. Solution: The correct answer is 4. A, B and C.


Statement A is true. You can set different headers and footers for the last page of a section in MS-
Word. This is useful if you want to have a different footer on the last page, for example, with your
contact information.
Statement B is also true. Mail Merge is a feature in MS-Word that allows you to combine a standard
document with a list of names and addresses. This allows you to send the same letter to multiple
people, with each letter personalized with the recipient's name and address.

IFAS Publications
www.ifasonline.com
207
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement C is also true. Gutter margins are the margins that are added to the binding side of a page
when printing. This is useful if you are printing on a sheet of paper that will be bound, as it will
ensure that the text does not get cut off when the paper is bound.
Therefore, all three statements are true.

793. Solution: Statement A is false. Search engines and browsers are two different things. Search
engines allow you to find information on the internet, while browsers allow you to view web
pages.
Statement B is false. Apple's web browser is called Safari. Chrome is a web browser developed by
Google.
Statement C is true. Micro-blogging is a practice of posting small pieces of content on the internet,
such as Twitter. These pieces of content are typically limited to 280 characters or less.

794. Solution: Asynchronous communication refers to a method of communication where the


participants do not need to be online or available at the same time. They can send messages or
engage in communication at their own convenience.
Forums, email, and instant messaging are examples of digital communication technologies that use
asynchronous communication. In forums, users can post messages and engage in discussions that
can be viewed and responded to by others at any time. Email allows users to send and receive
messages that can be read and replied to later. Instant messaging platforms also allow users to send
and receive messages in real-time, but the messages can be viewed and responded to at any time,
unlike synchronous communication methods like video conferencing where participants need to be
online simultaneously for real-time interaction.

795. Solution: Statement I: Converting (43.25)_10 to binary:


Integer part: Divide 43 by 2 repeatedly and note the remainders: 43/2 = 21 remainder 1, 21/2 = 10
remainder 1, 10/2 = 5 remainder 0, 5/2 = 2 remainder 1, 2/2 = 1 remainder 0, 1/2 = 0 remainder 1.
Reading the remainders in reverse order gives us the binary representation of the integer part:
101011.
Fractional part: Multiply the fractional part 0.25 by 2 repeatedly and note the integer parts: 0.25 * 2
= 0.5, 0.5 * 2 = 1. Reading the integer parts gives us the binary representation of the fractional part:
0.01.
Combining the integer and fractional parts gives us the binary representation of (43.25)_10 as
101011.01.
Statement II: Converting (1110.111)_2 to decimal:
Integer part: Read the integer part 1110 in binary as it is.
Fractional part: Convert the fractional part 0.111 to decimal by multiplying each digit by the
corresponding power of 2: 1 * (1/2^1) + 1 * (1/2^2) + 1 * (1/2^3) = 0.5 + 0.25 + 0.125 = 0.875.
Combining the integer and fractional parts gives us the decimal representation of (1110.111)_2 as
14.625.
Therefore, the conversions of the numbers are:
Statement I: (43.25)_10 = (101011.01)_2
Statement II: (1110.111)_2 = (14.625)_10

796. Solution: A keylogger is an example of 2. Spyware.


Trojan is a type of malware that disguises itself as a legitimate program. Once it is installed, it can
steal personal information, such as passwords and credit card numbers.
Spyware is a type of malware that secretly collects information about a user's computer activities.
This information can then be used to track the user's online activities or to display targeted
advertising.
Worm is a type of malware that can replicate itself and spread from computer to computer. Worms
often use email or file sharing to spread.

IFAS Publications
www.ifasonline.com
208
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Logic bomb is a type of malware that is triggered by a specific event. For example, a logic bomb
could be set to delete all of the files on a computer on a certain date.

797. Solution:
A. People can search the relevant articles for a topic quickly: This statement is correct. Online
encyclopedias such as Wikipedia provide a search functionality that allows users to quickly find
relevant articles on various topics.
B. The articles have no copyright: This statement is incorrect. Articles on online encyclopedias like
Wikipedia are protected by copyright. However, they are typically published under licenses that
allow users to freely access, distribute, and modify the content under certain conditions.
C. These encyclopedias are updated frequently: This statement is correct. Online encyclopedias like
Wikipedia are constantly updated by a large community of contributors. New information is added,
existing content is edited, and articles are improved over time to ensure the accuracy and relevance
of the information.
Therefore, the correct answer is 2. A and C only.

798. Solution: RAM (Random Access Memory) is a volatile memory that stores data and
instructions that the computer is currently using. It is a temporary memory that is erased when
the computer is turned off.
ROM (Read Only Memory) is a non-volatile memory that stores data and instructions that cannot be
changed. It is a permanent memory that is used to store the computer's BIOS (Basic Input/Output
System).
DVD-RAM (Digital Versatile Disc - Random Access Memory) is an optical disc that can store data,
music, and video. It uses concentric tracks to store data, which allows for both writing and reading
to take place at the same time.
DVD (Digital Versatile Disc) is a type of DVD that uses a single spiral track to store data. It uses
dual layer technology, which allows for twice the data storage capacity of a regular DVD.

799. Solution:
Statement I: Sending an email will not cause a problem if the recipient is in another time zone
where the time difference is 12 hours.
The time at which an email is received depends on the recipient's email server, not on the time zone
of the sender. If the recipient's email server is set to deliver emails at the same time that they are
sent, then the recipient will receive the email at the same time regardless of the time difference
between the sender's and recipient's time zones.
Statement II: In an Email system, Bcc: stands for Blind Carbon Copy.
Bcc: is a field in an email message that allows you to send a copy of the message to other recipients
without their names or email addresses being visible to the main recipients. This is useful if you
want to send a message to a group of people without them knowing who else has received the
message.

800. Solution: Statement I: The statement is incorrect. A Trojan Horse is a type of malware that
disguises itself as a legitimate program but actually contains malicious code. Its main purpose
is to gain unauthorized access to a computer system or to damage or steal data, not specifically
to restrict access until a payment is made. Ransomware, on the other hand, is a type of malware
that encrypts the victim's data and demands a ransom for its release.
Statement II: The statement is correct. Google's G-Suite and GitHub are examples of Software as a
Service (SaaS) in cloud computing. SaaS refers to the delivery of software applications over the
internet, allowing users to access and use the software without the need for installation or
maintenance on their own devices.

IFAS Publications
www.ifasonline.com
209
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

801. Solution: Statement A: The statement is incorrect. The correct name of the protocol is
Hypertext Transfer Protocol, not HyperText Transaction Protocol. The HTTP protocol is used
for transmitting hypertext over the internet.
.in is a top-level domain name and represents a website hosted in India. Top-level domain names are
the last part of a URL, and they are used to identify the country or region where a website is hosted.
.mygov.in is a second-level domain name in the name of the website. Second-level domain names
are the part of a URL that comes after the top-level domain name and before the rest of the URL.
They are used to identify the website's owner or organization.

802. Solution: A yottabyte (YB) is a unit of information or computer storage that is equal to 10^24
bytes. It is the largest unit of data storage currently in use.
1 Yottabyte = 1024 Zettabytes
1 Zettabyte = 1024 Exabytes
1 Exabyte = 1024 Petabytes
1 Petabyte = 1024 Terabytes

803. Solution: The correct sequence in chronological order of the four major enabling technological
developments that have paved the way for e-commerce is:
Development of the Internet by ARPA.
Invention and mass production of PC.
Creation and release of www.options.
Release of Netscape's Navigator browser which introduced SSL encryption.

804. Solution: Statement I: Chatbot is a computer program designed to simulate human


conversation. It uses natural language processing and machine learning algorithms to
understand and respond to user queries. Chatbots are considered examples of Digital
Intelligence because they mimic human intelligence in their ability to interact and
communicate with users.
Statement II: Amazon's 'Alexa' and Apple's 'Siri' are virtual assistant technologies that use artificial
intelligence techniques to understand and respond to user commands and queries. These virtual
assistants leverage AI algorithms and machine learning to interpret voice commands, perform tasks,
and provide information to users. Therefore, they are examples of Artificial Intelligence.

805. Solution: Dynamic RAM (DRAM) is a type of random-access memory (RAM) that uses
capacitors to store data. DRAM is much less expensive to manufacture than static RAM (SRAM),
and it has a higher storage capacity. However, DRAM is slower than SRAM when it comes to
data access, and it requires periodic refreshing to maintain the data stored in the capacitors.
Static RAM (SRAM) is a type of RAM that uses flip-flops to store data. SRAM is much faster than
DRAM, but it is also more expensive to manufacture and has a lower storage capacity.

806. Solution: Optic fibre is a type of wired transmission medium used in computer networking
that has a core made of refined glass. It is a thin, transparent strand of glass that is designed to
transmit data using light signals. The core of the optic fibre acts as a waveguide, allowing light
to be transmitted through it.

807. Solution:
0101
0 1 10
1 0 11

808. Solution: 2 KB = 2 * 1024 Bytes = 2048 Bytes which is the smallest one.

IFAS Publications
www.ifasonline.com
210
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

2KB < 2049 Bytes < 0.5 MB < 3 GB

809. Solution: VoIP (Voice over Internet Protocol) is a technology that allows people to make phone
calls over the internet. VoIP is a real-time communication system, which means that the people
who are talking can hear each other at the same time. This makes VoIP ideal for meetings, as it
allows people to collaborate and discuss things in real time.

810. Solution: Statement I: Wireless (Wi-Fi) networks are less secure than hard-wired systems.
This statement is generally true. Wireless networks are more susceptible to security breaches
compared to hard-wired systems. This is because wireless signals can be intercepted by unauthorized
users if not properly secured, whereas hard-wired systems have physical connections that are less
vulnerable to unauthorized access.
Statement II: A series of digital media files that are released at regular intervals and downloaded to
the user's computer are known as Podcasts. These media files are stored and maintained centrally.
This statement is also true. Podcasts are indeed a series of digital media files released at regular
intervals, typically in an audio format, that users can download and listen to.

811. Solution:
A. Microphone: A microphone can be used for voice input, allowing students to interact with the
computer through speech recognition.
C. Braille keyboard: A Braille keyboard enables students to input information using Braille characters,
which can be read using a refreshable Braille display.

812. Solution: Blogs (Web logs) are personal journals that are published online. Anyone can create
a blog, and anyone can comment on a blog.
Social networking sites (SNS) are websites that allow people to connect with each other. Users can
add friends, post messages, and update their personal profiles on SNS.
Tagging is a way of organizing information by adding keywords to it. Tags can be used to describe
webpages, photos, or other types of content.
Wikis are websites that allow users to collaborate on creating and editing content. Anyone can create
or edit a wiki page, and the changes are automatically saved.

813. Solution: The correct answer is 3. Statement I is true but Statement II is false.
Statement I is correct. Google Meet is a cloud-based video conferencing solution, meaning that all
of its data and functionality are stored and processed on Google's servers. This allows users to
access Google Meet from anywhere with an internet connection and without the need for any
software installations.
Statement II is false. Google Meet does not provide cloud storage or the ability to open and modify
documents online. While Google Meet can be integrated with other Google Workspace applications,
such as Google Docs, Google Sheets, and Google Slides, it does not have these capabilities built-in.

814. Solution:
Computer Term Definition
A. Router IV. A Device that uses the
internet protocol (IP) to
send packets across
network
B. Firewall III. A device that provides
perimeter security by
filtering packets.
C. CERT-In II. An organization assigned

IFAS Publications
www.ifasonline.com
211
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

responsibility for
reducing problem and
incident related to
computer security
D. Transmission I. The rules that govern the
control division of a file into
protocol packets and subsequent
reassembly of the file
from those packets

815. Solution: Certainly! The correct formula is


`=IF(AND(C2>=B2, C3>=B3), "Yes", IF(C4>=B4, "Yes", "No"))`
This formula checks if both the homework and midterm conditions are met. If they are, it returns
"Yes." If not, it checks the final exam condition. If the final exam condition is met, it returns "Yes";
otherwise, it returns "No."
Options A doesn't consider the homework and midterm conditions together, Therefore, the correct
answer is 3. B and C only.

816. Solution: The correct answer is 1. Both Statement I and Statement II are true.
Statement I is correct. Solid State Drives (SSDs) are considerably faster than Hard Disk Drives
(HDDs) when it comes to data access. This is because SSDs use flash memory to store data, which is
much faster than the spinning discs used in HDDs. SSDs can read and write data much faster than
HDDs, and they also have lower latency, which means that there is less of a delay between when a
request is made to read or write data and when the data is actually accessed.
Statement II is also correct. RAM (Random Access Memory) is much faster to write to or read from
in comparison to secondary memory such as hard disks. This is because RAM is a type of volatile
memory, which means that it loses its contents when power is lost. As a result, RAM is typically
used to store data that needs to be accessed quickly, such as the operating system and currently
running applications. Secondary memory, such as hard disks, is non-volatile, which means that it
retains its contents even when power is lost. As a result, secondary memory is typically used to store
data that does not need to be accessed as quickly, such as user files and applications.

817. Solution: The correct answer is 2. Shareware.


Shareware is a type of software that is distributed for free, but with the expectation that users will
eventually pay for it if they find it useful. Shareware is typically subject to the usual copyright laws,
and users are not allowed to distribute or copy it without permission from the copyright holder. As a
rule, not all the features found in the full version are available in the shareware version.

818. Solution: The processing power of the server computer is less critical for the downloading
speed, as it primarily involves the server's ability to process requests and generate responses.
Factors such as the bandwidth of the Internet connection (option 4) and the number and size of
images on the web page (option 2) typically have a more direct impact on the downloading
speed. The number of hyperlinks (option 1) can affect navigation within the page but may not
significantly impact the initial downloading speed.

819. Solution: =$B$1 * B4


This formula will calculate the gross pay for each employee in column C based on the hours worked
(column B) and the fixed hourly rate (cell B1). You can then copy this formula down the column for
other employees. The use of absolute reference ($B$1) ensures that the hourly rate remains constant
for all calculations.

820. Solution: The correct answer is 3. Statement I is true but Statement II is false.

IFAS Publications
www.ifasonline.com
212
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement I is correct. Simple text editors such as Notepad and Emacs are designed for basic text
editing tasks, such as creating, opening, editing, and saving plain text files. They have limited
editing features compared to word processors, which offer a wide range of formatting options, spell
checking, and other advanced features.
Statement II is false. Files created with simple text editors can be opened with word processors.
Plain text files are universally compatible, and any program that can handle text files can open them.
Word processors are specifically designed to open and display plain text files, so they will have no
problem opening files created with simple text editors.
Therefore, the correct answer is option 3.

821. Solution:

822. Solution: The correct answer is 4. A, C & E only.


The central processing unit (CPU) is the heart of a computer system and is responsible for executing
instructions. The Von Neumann model is a classic architecture for a computer system that consists of
four main components:
● Arithmetic Logic Unit (ALU): The ALU performs arithmetic and logical operations.
Control Unit (CU): The CU controls the flow of information within the CPU and coordinates the
actions of the other components.
● Memory Address Register (MAR): The MAR stores the address of the memory location that the
CPU is currently accessing.
● Memory Unit: The Memory Unit stores the program instructions and data that the CPU needs to
access.
The Hard Disk Drive (HDD) and Solid State Drive (SSD) are both types of storage devices that are
used to store data, but they are not part of the CPU.
Therefore, the only components that are part of the CPU of the Von Neumann model are the ALU,
CU, and MAR.

823. Solution: The correct answer is 1. Cache Memory.


Cache memory is a small, high-speed memory that stores frequently accessed data. This allows the
processor to access data quickly without having to retrieve it from the slower main memory or hard
disk. As a result, the processor will operate fastest when the data it wants is in the cache memory.

824. Solution:

825. Solution: The correct answer is 1. Both Statement I and Statement II are true.
Statement I is correct. Shareware is a type of software that users can try out for a free trial period
before having to pay for it. If users find the software useful after the trial period, they are expected
to pay for it.
Statement II is also correct. Freeware is a type of software that users can download and use free of
charge. However, freeware is typically closed-source software, which means that users cannot
modify the source code. This is in contrast to open-source software, which allows users to modify
and distribute the source code.
Therefore, both statements are true, and the correct answer is option 1.

826. Solution: The correct answer is 4. A, B, D & E only.


Statement A: LED displays are indeed flat panel displays. They consist of a panel of light-emitting
diodes (LEDs) that are arranged in a grid pattern. Each LED can emit light of a specific color, and
by varying the brightness of each LED, the display can create a wide range of colors and images.
Statement B: LED displays create images using red, green, and blue diodes. These three colors are
the primary colors of light, and by combining them in different proportions, any color can be
created.

IFAS Publications
www.ifasonline.com
213
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement C: LED displays are actually very energy efficient. They use much less energy than
traditional cathode-ray tube (CRT) displays, and they also produce less heat.
Statement D: LED displays are widely used in mobile devices such as smartphones and tablets.
They are thin, lightweight, and energy-efficient, making them ideal for portable devices.
Statement E: LED displays can be both front-lit and back-lit. Front-lit displays have the LEDs
embedded in the front of the panel, while back-lit displays have the LEDs embedded in the back of
the panel and a diffuser layer in front of them.
Therefore, all statements are true, and the correct answer is option 4.

827. Solution:

828. Solution: The correct answer is 2. Faster connection with suppliers.


The Internet has revolutionized the way businesses communicate with their suppliers. In the past,
businesses would have to rely on phone calls, faxes, and mail to communicate with their suppliers.
This was a slow and inefficient process that often resulted in delays and misunderstandings.
With the Internet, businesses can now communicate with their suppliers in real time. This allows
them to place orders, track shipments, and resolve problems much faster than ever before. As a
result, businesses can improve their efficiency and reduce their costs.

829. Solution:

830. Solution: The correct answer is 4. B, E, C, D, A.


Explanation:
● B. The user clicks on the hyperlink, and the web page is requested from the web server.
● E. The web server locates the requested web page.
● C. T requested web page content is transmitted to the client computer.
● D. The client computer processes the JavaScript code using the web browser software.
● A. The requested web page is displayed on the client computer.
Therefore, the correct answer is:
4. B, E, C, D, A

831. Solution: The answer is 3. Statement I is true but Statement II is false.


Statement I is correct. Shareware is a type of software that users can try out for a free trial period
before having to pay for it. After the trial period expires, users will typically be prompted to
purchase the software if they want to continue using it.
Statement II is false. Shareware code is typically copyrighted, and users are not allowed to modify
or redistribute it without the permission of the copyright holder. Some shareware licenses may allow
users to make minor modifications for personal use, but they will still be required to obtain
permission before redistributing the code.
Therefore, Statement I is true but Statement II is false, and the correct answer is option 3.

832. Solution: The correct answer is 2. C and D Only.


Chat rooms, cookies, and VOIP (Voice over IP) are not always security risks to computer systems.
However, pharming and viruses are always security risks.
● Pharming is a type of cyberattack that redirects users to a fake website that looks like the legitimate
website they are trying to visit. Once the user enters their personal information on the fake website,
the attacker can steal it.
● Viruses are malicious programs that can infect and damage computer systems. They can spread
through a variety of ways, such as email attachments, infected websites, and USB drives.
Therefore, the only options that should always be regarded as security risks to computer systems are
pharming and viruses. The correct answer is option 2.

IFAS Publications
www.ifasonline.com
214
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

833. Solution: The incorrectly matched acronym and its expansion is 2. GSM - Global System for
Management.
The correct expansion for GSM is Global System for Mobile Communications. Therefore, the
correct answer is option 2.

834. Solution:

835. Solution:
Statement I : ( 11001000 )2 ⇒(1100is12∈decimal∧1000 is8 ∈decimal)
10 ⇒ A
11 ⇒ B
12 ⇒ C
13 ⇒ D
14 ⇒ E
15 ⇒ F
⇒ so we can write ( 11001000 )2 = ( C 8 )16
Statement 2: (7B) 16 ⇒ (0111 1011) 2 ⇒ (123)10 Therefore statement II is correct.

836. Solution: The correct answer is 1. A and B only.


A. It uses a rotating drum to transfer the image to the paper. This statement is correct. Laser
printers use a rotating drum that is coated with a photoconductive material. A laser beam is used to
create an electrostatic image on the drum, and then powdered toner is applied to the drum. The toner
sticks to the areas of the drum that have been charged by the laser beam, and then the toner is
transferred to the paper.
B. It uses powdered toner. This statement is also correct. Laser printers use powdered toner, which is
a fine powder that is made up of small particles of plastic and pigment. The toner particles are
attracted to the areas of the drum that have been charged by the laser beam, and then the toner is
transferred to the paper.
C. It uses nozzles to spray droplets onto the paper. This statement is incorrect. This is a
characteristic of inkjet printers, not laser printers. Inkjet printers use nozzles to spray tiny droplets
of ink onto the paper to create the image.
D. It uses a print head mechanism that moves side to side. This statement is also incorrect. This is a
characteristic of inkjet printers, not laser printers. Inkjet printers use a print head that moves side to
side to spray the ink onto the paper.
Therefore, the only statements that apply to a laser printer are A and B, and the correct answer is
option 1.

837. Solution: The correct answer is 3. A and B only.


● A. RAM can be read from and written to. This statement is correct. RAM is a type of memory that
can be read from and written to by the CPU. This means that the CPU can access and modify the
data stored in RAM.
● B. RAM is volatile memory. This statement is also correct. RAM is volatile memory, which means
that the data stored in RAM is lost when the computer is turned off. This is because RAM is
powered by electricity, and when the power is turned off, the electrical charge that stores the data is
lost.
● C. RAM is temporary storage. This statement is incorrect. RAM is not temporary storage in the
sense that it is only used for a short period of time. RAM is used to store the data that the CPU is
currently working on, and this data can be stored in RAM for a long period of time.
● D. Modem PCs typically have from 2TB upto 32 TB of RAM. This statement is incorrect. The
typical amount of RAM in a modern PC is 8GB to 32GB. 2TB and 32TB are amounts of storage, not
RAM.

IFAS Publications
www.ifasonline.com
215
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Therefore, the only statements that are correct about the characteristics of RAM are A and B, and the
correct answer is option 3.

838. Solution: The correct answer is 4. Ubiquitous computing.


Ubiquitous computing, also known as pervasive computing, is a concept that describes the seamless
integration of computing technology into everyday objects and environments. This type of
computing is often characterized by its invisibility, meaning that it is embedded within the
surroundings and does not require explicit user interaction.
A smart home application that automates the controlling of lighting, temperature, entertainment
system, and appliances is an example of ubiquitous computing because it integrates technology into
the home environment to provide a seamless and automated user experience. The application can be
controlled remotely or through voice commands, and it can learn user preferences to personalize the
home environment.
The other options are not as relevant to the concept of smart home applications. Evolutionary
computing is a type of artificial intelligence that is inspired by the process of natural selection.
Nature-inspired computing is a broader term that encompasses a variety of computational techniques
that are inspired by natural systems. Bio-inspired computing is a more specific term that refers to
computational techniques that are inspired by biological systems, such as the human brain or the
immune system.
Therefore, the correct answer is option 4.

839. Solution: The correct order is 2. D. E, B, C, A.


Here is the paragraph with the terms in the correct order:
A computer keyboard has a key matrix underneath the keys. When a key is pressed, it presses a
switch that completes a circuit. This allows current to flow. The location of the key pressed is
calculated. The location of the key pressed is compared to a character map to find the character
value for the key that has been pressed.
The other options are incorrect because they do not match the way that a keyboard works. For
example, option 1 is incorrect because the location of the key pressed is not calculated before the
current flows. Option 3 is incorrect because the character value for the key is not found before the
location of the key pressed is calculated. Option 4 is incorrect because the binary value for the key is
not found before the character value for the key is found.

840. Solution:
Statement 1: It is false, World wide web and Internet are not the same things but are related to each
other. The world wide web is one set of software services running on the internet. The Internet itself
is a global interconnected network of various computing devices.
Statement 2: The correct answer is HTTP. The protocol used between a web server and a web
browser to transfer HTML pages is called HTTP. The Hypertext Transfer Protocol (HTTP) is an
application layer protocol in the Internet protocol suite model for distributed, collaborative,
hypermedia information systems.

841. Solution:
A. It has no moving parts: This statement is false. Hard-disk drives (HDDs) have several moving parts,
including a spinning platter and a read/write head that moves back and forth across the platter. The
movement of these parts is what allows the HDD to store and retrieve data.
B. It is non-volatile: This statement is true. Hard-disk drives are non-volatile, meaning that the data
they store is retained even when the power is turned off. This is because the data is stored on
magnetic platters, and the magnetic properties of the platters are not affected by the power being
turned off.
C. It uses magnetic properties to store data: This statement is true. Hard-disk drives use magnetic
properties to store data on platters coated with magnetic material. The read/write head can

IFAS Publications
www.ifasonline.com
216
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

magnetize or demagnetize small areas of the platter, and these magnetic areas represent the stored
data.
Therefore, the only statements that are correct about a hard-disk drive (HDD) are B and C, and the
correct answer is option 3.

842. Solution: To convert binary to octal we just need to group 3 bits from right side to left side
then write values of these groups
(001 011 101) 2 ⇒ ( 135 ) 8
( 71 )8 ⇒ ( 111 001) 2
Both are correct

843. Solution: CMOS stands for Complementary Metal Oxide Semiconductor. This is a memory chip
powered by the battery. CMOS is normally featured on PCB (Printed Circuit Board). This item
stocked the start-up information of your computer. The moment you turn on your computer
BIOS will use the information from CMOS during the booting process.
DRAM Stands for Dynamic random access memory , DRAM is a type of semiconductor memory
that is typically used for the data or program code needed by a computer processor to function.
DRAM is a common type of random access memory (RAM) that is used in personal computers
(PCs), workstations and servers. Random access allows the PC processor to access any part of the
memory directly rather than having to proceed sequentially from a starting place. RAM is located
close to a computer's processor and enables faster access to data than storage media such as hard
disk drives and solid-state drives.
MICR stands for Magnetic Ink Character Recognition. MICR is a technology that was invented to
identify the authenticity and individuality of a document using special ink and characters. The MICR
is a convenient and human-friendly pattern recognition system. MICR readers can directly scan and
read the information into a data collection device. Hence, the use of MICR technology ensured a
more well-organized way of document processing.
VLSI Stands for Very Large-Scale Integration.
● (VLSI) is the process of making an integrated circuit ( IC ) by combining many MOS transistors
onto one chip.
● VLSI began within the 1970s when MOS integrated circuit chips were widely adopted, enabling
complex semiconductor and telecommunication technologies to be developed.
● The microprocessor and memory chips are VLSI devices. Before the introduction of VLSI
technology, most ICs had a limited set of functions they might perform.
● An electronic circuit might contain a CPU, ROM , RAM and other glue logic. VLSI lets IC
designers add all of those into one chip.

844. Solution: The correct answer is 4. Statement I is false but Statement II is true.
Statement I: The tool which is used to insert decorative text in a document is called Clipart.
This statement is false. Clipart is a collection of pre-made images that can be inserted into a
document. Decorative text, on the other hand, is text that has been formatted to look different from
the surrounding text. This can be done using a variety of formatting tools, such as changing the font,
size, or color of the text.
Statement II: The purpose of using Keyboard shortcut CTRL+X followed by CTRL+V for a
selected text paragraph in a document is to Cut and Paste.
This statement is true. The shortcut CTRL+X cuts the selected text, and the shortcut CTRL+V
pastes the cut text. This is a common way to move text from one place to another in a document.
Therefore, Statement I is false but Statement II is true, and the correct answer is option 4.

845. Solution:

IFAS Publications
www.ifasonline.com
217
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Statement I : Binary value of decimal number 49 is “ 110001” and its Hexadecimal value is (31) 8 so
statement 1 is false
Statement 2: (7B) 16 ⇒ (0111 1011) 2 ⇒ (123)10 Therefore statement II is correct.

846. Solution: Correct ways to add values in multiple cells are


● A3+A4+A5+A6
● SUM (A3:A6)
● SUM (A3, A4, A5, A6)

847. Solution: The correct answer is 2. B only.


● Statement A: Spyware prevents access to a website: This statement is false. Spyware is a type of
software that is installed on a computer without the user's knowledge or consent. Spyware can track
the user's online activity, steal personal information, and install other malicious software. Spyware
does not typically prevent access to a website, but it can be used to redirect the user to a malicious
website.
● Statement B: Virus is self-replicating malicious code on a computer: This statement is true. A
virus is a type of malicious software that can replicate itself and spread to other computers. Viruses
can cause a variety of damage, including deleting files, corrupting data, and stealing personal
information.
● Statement C: Denial-of-service (DoS) captures all data entered using a keyboard to obtain
personal data: This statement is false. A denial-of-service (DoS) attack is an attempt to make a
computer or network resource unavailable to legitimate users. DoS attacks are typically carried out
by flooding a computer or network with traffic, making it unable to respond to legitimate requests.
DoS attacks are not typically used to capture personal data.
Therefore, the only statement that is correct about cyber attacks is Statement B, and the correct
answer is option 2.

848. Solution: The incorrectly matched acronym and its expansion is 2. GSM - Global System for
Management. The correct expansion for GSM is Global System for Mobile Communications.
Therefore, the correct answer is option 2.

849. Solution:

850. Solution: Statement I :( 11001000 )2 ⇒(1100is12∈decimal∧1000 is8 ∈decimal)


10 ⇒ A
11 ⇒ B
12 ⇒ C
13 ⇒ D
14 ⇒ E
15 ⇒ F
⇒ so we can write ( 11001000 )2 = ( C 8 )16
Statement 2: (7B) 16 ⇒ (0111 1011) 2 ⇒ (123)10 Therefore statement II is correct.

851. Solution: The correct answer is 3. Statement I is true but Statement II is false.
Statement I: An Operating System controls peripherals and provides protection against viruses.
This statement is true. An operating system is a software that manages the computer hardware and
software resources. It controls peripherals, such as the keyboard, mouse, and printer, and it provides
protection against viruses by running antivirus software.
Statement II: In word processing and desktop publishing, the terms portrait and landscape refer to
Print Orientation. This statement is false. Portrait and landscape are terms that refer to the
orientation of a page or document. In portrait orientation, the page is taller than it is wide. In

IFAS Publications
www.ifasonline.com
218
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

landscape orientation, the page is wider than it is tall. Print orientation is the setting that determines
how a document will be printed.
Therefore, Statement I is true but Statement II is false, and the correct answer is option 3.

852. Solution: The correct answer is 2. B, D and E Only.


Option B, CSV, stands for Comma Separated Values, which is a text file format commonly used to
store tabular data. Option D, RTF, stands for Rich Text Format, which is a text file format that
supports basic formatting, such as bold and italics. Option E, TXT, is a plain text file format that
does not support any formatting.
Options A, PDF, and C, GIF, are not text file formats. PDF stands for Portable Document Format,
which is a file format that can contain text, images, and other content. GIF stands for Graphics
Interchange Format, which is an image file format.
Therefore, the only file formats that exclusively contain text file formats are CSV, RTF, and TXT,
and the correct answer is option 2.
853. Solution:
A. Objects on the slide that hold text, pictures and more are called Placeholders.
B. MS-PowerPoint automatically opens with Windows Operating System
C. A view that displays the slides of a presentation as miniature representations of the slides is called
Slide Sorter view.

854. Solution: Fibre optic cable transmit signal in the form of light pulses . They can transmit
data at higher speed than copper cables and these are lighter than copper cables. Also, fibre
optic cable have higher bandwidth.
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the
Internet. It is also referred to as a web address. URLs consist of multiple parts -- including a
protocol and domain name -- that tell a web browser how and where to retrieve a resource.

855. Solution:

856. Solution:
1. ROM Stands for Read Only Memory. ROM is a non-volatile memory. Non-volatile memory stores
information even when there is a power supply failed/ interrupted/stopped. ROM is used to store
information that is used to operate the system. As its name refers to read-only memory, we can only
read the programs and data that is stored on it.
2. ASCII Stands American Standard Code for Information Interchange. ASCII assigns standard
numeric values to letters, numerals, punctuation marks, and other characters used in computers.
3. Desktop computers have different parts like CPU, Monitor, Keyboard, Mouse, etc., and they are
connected together via cables and wires. On the other hand, laptop computers are portable devices
and all parts are assembled in a single unit. That's why they are easy to carry out anywhere.

857. Solution:
Statement1- Yes, that’s correct! A 3D printer is indeed an output device that creates physical
objects by building layers of material. This process is known as additive manufacturing. However,
the term "CAD applications" refers to Computer-Aided Design, which is a software rather than a
physical output device.
Statement2- Yes, that's correct! Laptops are designed to be portable and have a built-in battery that
allows them to operate without being plugged into an electrical socket. The battery provides power
to the laptop's components, such as the processor, memory, and display, allowing you to use the
laptop in various locations without the need for a constant power source.

858. Solution:

IFAS Publications
www.ifasonline.com
219
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

 First generation computer uses Vacuum tubes, Magnetic tape drives and magnetic core
memories were developed.
 Second generation computer uses a new electronic device called Transistor in the place of
Vacuum tube. Storage capacity of computer also increase during this generation. Second
generation computers also started showing the characteristics of modern day computers with
utilities such as printers, disk storage and operating systems.
 In third generation computer transistor were replaced with Integrated Circuit (IC) which is a
combination of number of transistor and other electronic components fused together on single
crystal. This generation machine uses magnetic tape and magnetic disk as secondary storage
device.
 In fourth generation computer IC were replaced with Microprocessors. A microprocessor chip
consists of entire central processing unit in a single chip. Computing speed increased. Due to
the reduction of cost and the availability of the computers power at a small place allowed
everyday user to benefit.

859. Solution:
Statements 1. Incorrect. Radio-Frequency Identification (RFID) is a technology used for
identifying and tracking items or people using radio waves. It typically involves tags or chips that
emit radio frequency signals, which can be read by RFID readers.
Statement 2. Yes, that's correct. Streaming is a method of delivering multimedia content, such as
video or audio, in a way that allows users to start playback before the entire file has been completely
downloaded. This is in contrast to traditional downloading, where the entire file must be
downloaded before it can be played.

860. Solution:
Statements1- Incorrect - A wiki is a collaborative website that allows users to create, edit, and
organize content collaboratively. Wikipedia, one of the most well-known wikis, does not typically
present information in a strictly chronological order. Instead, it follows an encyclopedic structure
with articles organized by topics, and the content within an article is generally structured for clarity
and relevance.
Statements2- Yes, that's correct. Mobile phones (cell phones) typically use flash memory for
storage. Flash memory is a type of non-volatile storage that retains data even when power is turned
off. It is well-suited for mobile devices because it is compact, durable, and has no moving parts.

861. Solution:
B. One of the primary functions of ROM is to store the firmware or the BIOS (Basic Input/Output
System) of a computer. When you turn on the computer, the BIOS is responsible for the initial
startup processes, including the hardware initialization and loading the operating system. This
process is known as booting up, and it involves the use of ROM.
C. Unlike RAM (Random Access Memory), which is volatile and loses its contents when power is
turned off, ROM is non-volatile. The contents of ROM are retained even when the power is turned
off. This characteristic makes ROM suitable for storing essential system instructions and firmware
that are needed every time the computer is powered on.

862. Solution: To convert the base-10 number 100 to base-6, you can repeatedly divide the number by 6
and record the remainders. Here's the process:
100 ÷ 6 = 16 with a remainder of 4
100 ÷ 6 = 2 with a remainder of 4
2 ÷ 6 = 0 with a remainder of 2

IFAS Publications
www.ifasonline.com
220
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Reading the remainders from bottom to top, the base-6 representation of 100 is 244. Therefore, in
base-6, the number 100 is represented as 244.

863. Solution: An MP3 file stores compressed audio data. MP3, which stands for MPEG Audio Layer
III, is a popular audio compression format that reduces the file size of audio recordings while
retaining a reasonably high level of sound quality.

864. Solution:
Statement I: Flip indeed allows users to record and share short video responses
Statement II: Flip is primarily used for video discussions and presentations, making this statement
correct as well.

865. Solution:
Answer. (2) User specific information
Automation in online media, especially through algorithms and data-driven processes, allows for the
customization and personalization of information. This often results in the generation of user-
specific content, tailoring information based on individual preferences, behaviors, and interactions.
Personalized recommendations, targeted advertisements, and content curation are examples of how
automation contributes to delivering user-specific information in the online media landscape.

866. Solution:
Volatile memory is the type of memory that loses its contents when the power is turned off. From the
given options, the volatile memory types are:
(B) Cache memory
(E) RAM - Random Access Memory
These two types of memory are volatile because the data stored in them is temporary and is lost
when the power is disconnected or the computer is turned off. The other options (A) CMOS memory,
(C) Flash memory, and (D) Hard disk are non-volatile, meaning they retain data even when the
power is off.

867. Solution:
A. HTTP - II. The main protocol that governs the transmission of data using the Internet.
B. URL - IV. The website address that is typed into the address bar.
C. MAC address - I. A unique address given to a device on a network. It is provided by the
manufacturer.
D. IP address - III. An address given to each device on a network. It is provided by the network

868. Solution: An Interactive whiteboard allows a user to write on a surface using a pen, and the text
and drawings can then be captured and stored for later use. An Inkjet printer produces a hard copy
of a document Thermal bubble using and piezoelectric technology. A Laser printer uses a Rotating
drum, and positive and negative charges, to produce a hard copy of a document.
So, the correct answer is
B. Interactive whiteboard. A. Inkjet, E. Thermal bubble, C. Laser, D. Rotating

869. Solution: Let's calculate the time taken for both the upload and download processes separately, and
then find the product (P * Q).
File size = 20 megabytes
Upload speed = 1 megabit per second
Convert file size to megabits (1 byte = 8 bits):
20 megabytes * 8 bits/byte = 160 megabits
Time taken for upload (P) = File size / Upload speed

IFAS Publications
www.ifasonline.com
221
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

= 160 megabits / 1 megabit per second


= 160 seconds
Time taken for download (Q):
Download speed = 8 megabits per second
Time taken for download (Q) = File size / Download speed
= 160 megabits / 8 megabits per second
= 20 seconds
Now, find the product (P * Q) = 160 seconds × 20 seconds = 3200 seconds2
So, the expression (P * Q) is 3200 seconds squared.

870. Solution:
(A) Hard Disk Drive (HDD) - (II) Magnetic
(B) USB Flash Memory - (III) Solid state
(C) Blu-ray Disc - (I) Optical

871. Solution:
Only option B and E are Correct.
(B) Firewalls indeed allow users to set rules and configurations for how network traffic is managed
and filtered. Users can define rules based on various criteria to control the flow of data.
(E) Firewalls can be configured to block access to specific websites or types of content, providing a
level of control over the websites that users can access.
The other statements are not accurate:
(A)Firewalls can exist as both hardware and software solutions. Additionally, they can examine both
incoming and outgoing network traffic.
(C) While firewalls are designed to prevent unauthorized access, they do not automatically stop all
malicious traffic. They rely on predefined rules and configurations.
(D) Firewalls do not typically function as data backup systems. Their primary role is to control and
monitor network traffic for security purposes.

872. Solution:
Unit Conversion is given below, its arranging according to the size.
Unit Conversion Table
4 bit = I nibble
8 bit = 1 byte
1 KB (Kilobyte) = 1024 byte
1 MB (Megabyte) =1024 KB
1 GB (Gigabyte) = 1024 MB
1 TB (Terabyte) = 1024 GB
1 PT (Petabyte) = 1024 TB
1 XB (Exabyte) = 1024 PB
1 ZB (Zettabyte) = 1024 XB
1 YB (Yottabyte) = 1024 ZB

873. Solution: The collaborative ICT tool that allows users to create digital bulletin boards to share and
gather information is Padlet. Padlet is a versatile online platform that enables users to create virtual
bulletin boards where they can add various types of content such as text, images, links, and
documents. It is commonly used for collaborative projects, brainstorming sessions, and information
sharing in an interactive and visually appealing way.

874. Solution:
Statement (I): Incorrect

IFAS Publications
www.ifasonline.com
222
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

Wikis are not usually represented in reverse chronological order. They are collaborative platforms
where users can create, edit, and organize content non-linearly.
Statement (II): Correct Blogs are often personal and may contain someone's opinions, experiences,
or updates. On the other hand, wikis aim to provide objective information and are collaboratively
edited.

875. Solution:

List - I List - II
(A) OCR (III) Reading data directly from hard
copy and converting into
computer-readable form
(B) OMR (I) System that reads pencil or pen
marks on a piece of paper in pre-
determined positions
(C) RFID (IV) Use of minute-electronic devices
(containing microchip and
antenna) that can read from
distances up to a few meters
(D) MICR (II) System that reads characters printed
in a special ink, for example, the
characters written at the bottom of
a bank cheque
OCR stands for Optical Character Recognition. It is a technology that converts different types of
documents, such as scanned paper documents, PDFs, or images captured by a digital camera, into
editable and searchable data. OCR software analyzes the shapes, patterns, and structures of
characters in a document and translates them into machine-encoded text. This allows users to extract
text information from physical or electronic documents, making it editable, searchable, and suitable
for various applications.
OMR stands for Optical Mark Recognition. It is a technology used to detect and interpret human-
marked data on documents. OMR is commonly used for collecting data from multiple-choice
questions, surveys, and assessments where respondents mark their answers by darkening circles or
rectangles on a pre-printed form.
RFID stands for Radio-Frequency Identification. It is a technology that uses radio waves to transmit
data wirelessly for the purpose of identifying, tracking, and managing various objects. RFID systems
consist of two main components: RFID tags and RFID readers.
RFID Tags: These are small electronic devices that contain a unique identifier and, in some cases,
additional data. RFID tags can be attached to or embedded in objects, products, or animals.
RFID Readers: These devices use radio-frequency signals to communicate with RFID tags. They
read the information stored on the tags and can transmit it to a computer or control system

MICR stands for Magnetic Ink Character Recognition. It is a technology used in the banking
industry for the processing of cheques and other financial documents. MICR involves the printing of
specific characters using magnetic ink, which can then be easily read and processed by magnetic ink
character recognition systems.

IFAS Publications
www.ifasonline.com
223
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

876. Solution:
The hardware components that will lose data when the power to a computer is switched off are:
All Option are Correct.
Main memory, often referred to as RAM (Random Access Memory), is volatile memory. This means
that it loses its contents when the power is turned off. CPU registers and cache memory are also
types of volatile memory, so they would also lose data when the power is switched off.

877. Solution:
The correct matching of types of malwares with their descriptions is as follows:
List-I List-II
(A). Trojan (II). A non-self-replicating program
Horse containing malicious code that,
when executed, carries out
actions, typically causing loss
of data.
(B). Worm (1). A program that replicates itself
in order to spread to other
computers and uses a computer
network to spread itself.
(C). Spyware (IV). A program that aids in
gathering information about a
person or organization without
their knowledge. For example,
it detects key presses of the
computer user.
(D). (III). A type of malware that
Ransomw restricts access to the computer
are system that it infects, often
demands a fee.
A Trojan Horse is a type of malware that is disguised as legitimate software or files to trick users
into downloading and installing it on their computer. Unlike viruses or worms, Trojan Horses do not
replicate themselves. Instead, they rely on social engineering to convince users to execute them.
Once activated, a Trojan Horse can perform various malicious actions without the user's knowledge,
such as stealing sensitive information, providing unauthorized access to the system, or causing other
forms of damage.
A worm is a type of malware that is capable of self-replication and spreading across computer
networks without requiring any user intervention. Unlike viruses, worms do not need to attach
themselves to other programs or files to propagate. Instead, they exploit vulnerabilities in network
protocols or operating systems to spread from one computer to another.
Spyware is a type of malicious software designed to secretly observe and collect information about a
user's activities on a computer or device without their knowledge or consent. The collected data is
often sent to third parties for various purposes, such as advertising, identity theft, or espionage.
Spyware can be installed on a system through deceptive practices, often bundled with seemingly
legitimate software or disguised as a useful utility.
Ransomware is a type of malicious software that encrypts a user's files or locks them out of their
system, and then demands a ransom (usually in cryptocurrency) in exchange for restoring access or
providing a decryption key. It is a form of extortion and a significant cybersecurity threat.

878. Solution:
Statement (I): Correct

IFAS Publications
www.ifasonline.com
224
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

ISPs (Internet Service Providers) indeed provide users with access to the internet in exchange for a
fee. They offer the infrastructure and services needed for users to connect to the internet.
Statement (II): Incorrect
Each web page or site found matching the search criteria in a web search engine is generally referred
to as a 'result' or a 'search result,' not a 'hit.' A 'hit' is often used in the context of web analytics to
denote a request made to a web server for a particular file or resource.

879. Solution:
The correct answer is:
Statement (I) is true but Statement (II) is false.
Statement (I) is true. The formula = COUNTIFS(B2:B101, "Adult") counts all customers who are
adults by specifying the condition in the Customer Category column (B).
Statement (II) is false. The formula = COUNTIFS(B2:101, "Adult") is not a valid formula for
counting customers who are adults. The correct range should be specified for the criteria range, and
in this case, it's only the Customer Category column (B).

880. Solution: The correct matching of Graphical User Interface (GUI) terms with their descriptions is as
follows:

List - I List - II
(A) Window (IV) Represents an area on the screen
that displays information for a
specific program
(B) Icon (I) Represents a folder or a program -
can be seen within a window or
free-standing on the screen
(C) Menu (II) Contains lists of options for a
certain program
(D) Pointer (III) Used to select menu
options/icons/close/open windows
A "Window" in the context of a Graphical User Interface (GUI) refers to a visual area on the screen
that displays the graphical user interface of a program or system. Windows are used to separate
different tasks or programs, allowing users to interact with multiple applications simultaneously.
Each window typically has its own set of controls, such as minimize, maximize, and close buttons,
and can be resized and moved around the screen.
An "Icon" in the context of a Graphical User Interface (GUI) refers to a small graphical
representation or symbol that represents a file, folder, program, or function on a computer system.
Icons are used to provide a visual and intuitive way for users to interact with and identify different
elements of the operating system and applications.
In the context of a Graphical User Interface (GUI), a "Menu" is a graphical representation of a list of
options or commands that a user can choose from. Menus provide a way for users to interact with
software applications by selecting various actions or settings.
In the context of a Graphical User Interface (GUI), a "Pointer" refers to a graphical symbol, often an
arrow, that is controlled by a physical input device such as a mouse or touchpad. The pointer is used
to interact with elements on the screen, making it a fundamental part of the user interface.

881. Solution:
(A) BIOS (Basic Input/Output System) is not an example of application software. It is a type of
firmware that is essential for the initial hardware bootstrapping of a computer system.
(B) Utility software is not an example of firmware. Utility software is a type of system software that
performs specific tasks to aid in the management and optimization of computer resources.

IFAS Publications
www.ifasonline.com
225
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

(C) Spyware is indeed an example of malware. Spyware is malicious software designed to gather
information about a person or organization without their knowledge, often for the purpose of
unauthorized access or information theft.
Therefore, the correct answer is (C) Spyware is an example of malware.

882. Solution:
The correct statement(s) are A and B.
(A) Guided media, which includes cables like copper wires and optical fibers, typically supports higher
data speeds than unguided media, which includes wireless communication methods. This is because
guided media offers a more controlled environment, less susceptibility to interference, and the
ability to use more advanced modulation and encoding techniques.
(B) Guided media is often less susceptible to interference compared to unguided media. Unguided
media, such as wireless communication, can be affected by environmental factors, interference from
other devices, and obstacles in the transmission path.
(C) Unguided media transmission is not inherently more secure than guided media transmission. Both
guided and unguided media can have security measures implemented to protect data during
transmission.

883. Solution:
The correct expansions for the given acronyms are as follows:
LED - Light Emitting Diode
CRT - Cathode Ray Tube
LCD - Liquid Crystal Display
VDU - Video Display Unit

884. Solution:
Option B is Correct.
Building positive customer relations in a business context is typically achieved through ethical and
targeted approaches. While calling customers at home, placing pop-up advertisements on websites,
and sending unsolicited emails (spam) may be intrusive and often result in negative customer
experiences, creating targeted marketing campaigns allows businesses to tailor their messages and
promotions to specific customer segments. This approach is more likely to be well-received by
customers, as it demonstrates an understanding of their needs and preferences.

885. Solution:
Statement (I) is true, and Statement (II) is false.
Statement (I): IPv6 addresses are indeed larger than IPv4 addresses. IPv4 addresses are 32 bits long,
while IPv6 addresses are 128 bits long. Therefore, an IPv6 address is 4 times larger than an IPv4
address in terms of the number of bits.
Statement (II): The IP address identifies the location of a device on the Internet, but the MAC
(Media Access Control) address identifies a device on a local network. The MAC address is used at
the data link layer of the OSI model and is not typically used for addressing devices on the Internet.

886. Solution:
The correct option is:
(3) Faster, more expensive per unit of storage, and not persistent
Primary storage (or main memory) is faster than secondary storage (like hard drives or SSDs).
However, it is more expensive per unit of storage compared to secondary storage.
Primary storage is volatile, meaning it loses its contents when the power is turned off. This lack of
persistence contrasts with secondary storage, which is non-volatile and retains data even when the
power is off.

IFAS Publications
www.ifasonline.com
226
UNIT-8 INFORMATION & COMMUNICATION TECHNOLOGY

887. Solution:
To calculate the storage needed for 2 hours of video footage, we can use the following steps:
1. Determine the storage needed for 1 minute of video.
2. Multiply the storage needed for 1 minute by the number of minutes in 2 hours.
3. Convert the result to gigabytes.
Let's calculate:
Storage needed for 1 minute of video = 180 Megabytes.
Storage needed for 2 hours of video:
180 MB/minute×120 minutes=21,600 Megabytes.
Convert Megabytes to Gigabytes:
21,600 MB÷1024 MB/GB≈21.09375 GB
So, the correct answer is approximately 21.1 Gigabytes. Therefore, the correct option is (3) 21.1
Gigabytes.

888. Solution:
The quantity maxim in the context of the four maxims of conversation does not specifically relate to
paradigms. The quantity maxim is concerned with providing an appropriate amount of information
in a conversation to avoid both excess and insufficiency. Paradigms, on the other hand, refer to a set
of examples or patterns.
The quantity maxim in the four maxims of conversation pertains to the right amount of information.
Therefore, the correct answer is: (4) Information

889. Solution:
To add two numbers represented in base-8 (octal), you can perform the addition in a similar way as
you do in base-10, but considering the base-8 place values.
Let's add (144) ₈ and (175) ₈:
(1x8^2+4x8^1+4x8^0) + (1x8^2+7x8^1+5x8^0) = (321) ₈.
Now , converting (321) ₈. To Octal then getting (341) ₈.
So Option 4 is correct.

IFAS Publications
www.ifasonline.com

You might also like