Computer and Information Technology (Physics) Part-VI

Total Questions: 50

1. Consider the following statements: A digital signature is [I.A.S. (Pre) 2019]

1. an electronic record that identifies the certifying authority issuing it.

2. used to serve as a proof of identity of an individual to access information or server on Internet.

3. an electronic method of signing an electronic document and ensuring that the original content is unchanged.

Which of the statements given above is/are correct?

Correct Answer: (c) 3 only
Solution:

A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and also ensure that the original content of the message or document that has been sent is unchanged. Thus, statement 3 is correct.

While statement 1 and 2 are related to digital signature certificate which differs in literal sense to digital signature. A digital signature is an electronic method of signing an electronic document whereas a digital signature certificate is a computer based record that identifies the certifying authority issuing it and has the name and other details that can identify the subscriber.

Digital signature certificates can be presented electronically to prove one's identity, to access information or services on the internet or to sign certain documents digitally.

2. Important concept(s) introduced in IT Act, 2000: [M.P.P.C.S. (Pre) 2021]

Correct Answer: (d) All of the above
Solution:

Electronic Record, Digital signature and Certifying Authority are among some important concepts used in the Information Technology Act, 2000. As per the definitions given in the Section 2 of this act:

'Electronic Record' means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche;

'Digital Signature' means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3; and 'Certifying Authority' means a person who has been granted a licence to issue a Digital Signature Certificate under section 24.

3. With reference to digital payments, consider the following statements: [I.A.S. (Pre) 2018]

1. BHIM app allows the user to transfer money to anyone with a UPI-enabled bank account.

2. While a chip-pin debit card has four factors of authentication. BHIM app has only two factors of authentication.

Which of the statements given above is/are correct?

Correct Answer: (a) 1 only
Solution:

Bharat Interface for Money (BHIM) is a mobile payment app, developed by the National Payments Corporation of India (NPCI), based on the Unified Payments Interface (UPI). It was launched in December, 2016 and it allows the user to transfer money to anyone with a UPI - enabled bank account via Aadhar-enabled payment system.

Thus, statement 1 is correct. Statement 2 is not correct because the BHIM app has three factors of authentication. For one, the app binds with a device's ID and mobile number, second a user needs to syne account in order to the conduct transaction and third when a user sets up the app they are asked to create a pin which is needed to log in the app.

4. Which of the following is/are the aim/aims of 'Digital India' Plan of the Government of India? [I.A.S. (Pre) 2018]

1. Formation of India's own Internet companies like China did.

2. Establish a policy framework to encourage overseas multinational corporations that collect Big Data to build their large data centres within our national geographical boundaries.

3. Connect many of our villages to the Internet and bring Wi-Fi to many of our schools, public places and major tourist centres.

Select the correct answer using the code given below:

Correct Answer: (b) 3 only
Solution:

The objective of Digital India is to transform the country into a digitally empowered society and knowledge economy. It would ensure that government services are made available to citizens electronically.

This programme was launched on 1" July, 2015 by Prime Minister Narendra Modi. The initiative includes plans to connect rural areas with high-speed internet networks and improving digital literacy.

5. Consider the following: [I.A.S. (Pre) 2022]

1. Aarogya Setu

2. COWIN

3. DigiLocker

4. DIKSHA

Which of the above are built on top of open-source digital platforms?

Correct Answer: (d) 1, 2, 3 and 4
Solution:

An open-source platform is any platform that allows access to its source code to any other users or developers. In contrast with closed-source software, which is a type of proprietary software that reserves rights only to authorized individuals, open-source software aims to allow equal access to anyone and everyone.

Unlike proprietary software, everyone has the freedom to edit, modify and reuse open-source code. This results in many benefits reduced costs, no vendor lock-in, the ability to customise for local context, and greater innovation through wider collaboration.

Many solutions launched by the Government of India including Digilocker, Diksha, Aarogya Setu, the Covid-19 vaccination platform CoWIN are built on top of open-source digital platforms.

6. Consider the following statements: [I.A.S. (Pre) 2018]

1. Aadhaar card can be used as a proof of citizenship or domicile.

2. Once issued, Aadhaar number cannot be deactivated or omitted by the Issuing Authority.

Which of the statements given above is/are correct?

Correct Answer: (d) Neither 1 nor 2
Solution:

Aadhaar is a 12-digit unique identity number issued by the UIDAI to the residents of India after satisfying the verification process. Any individual, irrespective of age, gender, who is a resident of India, may voluntarily enrol to obtain Aadhaar number.

Person willing to enrol has to provide his biometric and demographic data which is collected by the UIDAI According to Section 9 of the Aadhaar Act, 2016, the Aadhaar card is only a proof of identity and cannot be used as proof of citizenship or domicile.

Also as per Section 23 (g) of the Act, once issued, the Aadhaar number can be deactivated or omitted by the issuing authority in such a manner as may be specified by the regulations.

7. The identity platform 'Aadhaar' provides open 'Application Programming Interfaces (APIs)'. What does it imply? [I.A.S. (Pre) 2018]

1. It can be integrated into any electronic device.

2. Online authentication using iris is possible.

Which of the statements given above is/are correct?

Correct Answer: (c) Both 1 and 2
Solution:

Aadhaar provides open Application Progamming Interfaces (APIs), which can be integrated easily into any electronic device. These APIs enable online authentication using a fingerprint or iris. At the beginning fingerprint scan is the only biometric modality which was chosen for Aadhaar.

Since the majority of the Indian population is manual labours and farmers with damaged fingerprints, UIDAI later decided to include iris recognition as a primary biometric modality which was proven to perform with higher accuracy and inclusion than fingerprint.

8. With reference to "Blockchain Technology", consider the following statements: [I.A.S. (Pre) 2020]

1. It is a public ledger that everyone can inspect, but which no single user controls.

2. The structure and design of blockchain is such that all the data in it are about cryptocurrency only.

3. Applications that depend on basic features of blockchain can be developed without anybody's permission.

Which of the statements given above is/are correct?

Correct Answer: (d) 1 and 3 only
Solution:

A blockchain is a growing list of records called blocks which are interconnected by utilizing cryptography. Each block contains a cryptographic hash of the previous block, a timestamp and transaction data. Utilizing blockchain, we can safely store information over the shared system (as a public ledger), where everyone can see or inspect but cannot do any alteration.

A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. The blockchain technology can be utilized for various purposes including cryptocurrencies, safe exchange of things like cash, property, contracts, etc. and for storing of data from land records to vehicle ownership.

There is no need to require a third-party intermediary like bank or government in blockchain to verify or transfer ownership. Blockchain applications can be developed without taking permission from anybody like any government or central bank. Hence, statement 1 and 3 are correct, while statement 2 is incorrect.

9. With reference to Web 3.0, consider the following statements: [I.A.S. (Pre) 2022]

1. Web 3.0 technology enables people to control their own data.

2. In Web 3.0 world, there can be blockchain based social networks.

3. Web 3.0 is operated by users collectively rather than a corporation.

Which of the statements given above are correct?

Correct Answer: (d) 1, 2 and 3
Solution:

Web 3.0 (Web3) is the third generation of the Internet currently being built. There is broad consensus amongst experts that blockchain-powered applications (including social networks) will be key to its success in order to ensure adequate decentralization, while technologies like artificial intelligence (AI), machine learning (ML), Big Data, decentralized ledger technology (DLT), and more will help automate and scale it as required in order to become a semantic web.

The Web 3.0 definition can be expanded as follows: data will be interconnected in a decentralized way, which would be a huge leap forward for our current generation of the Internet (Web 2.0), where data is mostly stored in centralized repositories and therefore subject to manipulation or worse.

Web 3.0 will be operated by users collectively, rather than a corporation. Furthermore, users and machines will be able to interact with data and people will be able to control their own data.

10. Consider the following pairs: [I.A.S. (Pre) 2018]

Terms sometimes seen in newsContext/Topic
1. Belle II experimentArtificial Intelligence
2. Blockchain technologyDigital/Cryptocurrency
3. CRISPR-Cas9Particle Physics

Which of the pairs given above is/are correctly matched?

Correct Answer: (b) 2 only
Solution:

Belle II experiment is a particle physics experiment designed to study the properties of B-mesons. It is not related to artificial intelligence. Blockchain technology is related to cryptocurrency hence this pair is correctly matched.

Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) - Cas 9 is a genome-editing tool, which allows scientists to edit genomes with unprecedented precision. It is not associated with particle physics.