Computer and Information Technology (Physics) Part-II

Total Questions: 50

21. Computerization of a system needs - [Uttarakhand P.C.S. (Pre) 2005]

(1) a will to do it

(2) related financial resources

(3) training of manpower

(4) an ultra-modern structure

Select the correct answer from the code given below:

Code:

Correct Answer: (d) All the four
Solution:

In computerization of a system, there is a need of will power to do it along with financial resources and ultra-modern structure. There is also need to train manpower.

22. Which one of the following is not infotech terminology- [U.P.P.C.S.(Pre) 2001]

Correct Answer: (c) Optical storage
Solution:

Cyberspace, Upload and Modem terminology are related to information technology but optical storage is related to the computer engineering.

23. Which one of the following is not an infotech terminology? [U.P.P.C.S. (Mains) 2002]

Correct Answer: (d) Pinaka
Solution:

Among the given options, Pinaka is not related to infotech terminology. It is a multiple rocket launcher produced in India and developed by the Defence Research and Development Organization (DRDO) for the Indian Army.

24. Which one of the following is a part of Infotech terminology? [U.P.P.C.S (Pre) 2011]

Correct Answer: (d) All of the above
Solution:

In information technology, a protocol is the special set of rules, used by telecommunication connection when they communicate. A login is a set of credentials used to access to an area that requires proper authorization.

Archie is a program that allows you to search the files of all the Internet FTP servers that offer anonymous FTP (File Transfer Protocol).

25. A set of rules that governs data communication is called: [U.P. Lower Sub. (Mains) 2015]

Correct Answer: (a) Protocols
Solution:

A protocol is a set of rules that governs data communication. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating with each other.

26. The set of protocols, which defines all transmission exchanges across the internet is called [Uttarakhand P.C.S. (Pre) 2016]

Correct Answer: (b) TCP/IP
Solution:

Transmission Control Protocol (TCP) is a routing protocol while Internet Protocol (IP) is a routed protocol. Information on the internet is in the form of packets.

The task of TCP is to create such packets, put them into systematic work and ensure that no packet is missing, whenever a packet is sent it is given an IP address. Thus IP is a process that places every information to its right place.

27. IP addresses are used on which layer of OSI reference model? [Uttarakhand P.C.S. (Pre) 2021]

Correct Answer: (a) Network Layer
Solution:

The Internet Layer of the TCP/IP model aligns with the Layer 3 (Network) layer of the OSI reference model. This is where IP addresses and routing live. When data is transmitted from a node on one LAN to a node on a different LAN, the Internet Layer is used.

Hence, IP Address works at the network layer of OSI model (actually the IP layer of TCP/IP model). This is a logical address (and not the embedded hardware address) which is assigned by the Network administrator or Internet service provider.

28. The layer between Physical and network layer is known as? [U.P. Lower Sub. (Mains) 2013]

Correct Answer: (a) Data Link Layer
Solution:

The Open Systems Interconnection (OSI) reference model has been an essential element of computer network design since its ratification in 1984. The OSI model divides the complex task of computer-to-computer communications, traditionally called internetworking into a series of stages known as layers.

The ISO-OSI model consists of seven-layer architecture. The physical layer or layer 1 is the first (lowest) layer. The data link layer or layer 2 is the second layer and the network layer is layer 3. So it is clear that data link layer exists between physical and network layer.

29. In a network environment, which is not server? [M.P.P.C.S. (Pre) 2021]

Correct Answer: (d) Network Server
Solution:

In a network environment, network server is not server. Network servers are high-powered computers used as a central repository for data and various programs shared by users within a network.

A few examples of the types of servers in a network environment are as follows: Web server, Application server, Proxy server, Mail server, File server, Database server, Print server etc.

30. Junk e-mail is also called - [M.P.P.C.S. (Pre) 2013]

Correct Answer: (d) Spam
Solution:

Junk email messages are 'spam' messages which are unsolicited (and typically unwanted) email messages that are filtered by the service. By default, the service rejects the spam message based on the reputation of the sending IP address.