Computer Information Technology Part-5

Total Questions: 50

31. What is the name of the Air India's a Generative AI virtual agent powered by Microsoft's Azure Open AI service? [Chhattisgarh P.C.S.(Pre) 2023]

Correct Answer: (a) Maharaja
Solution:

In 2023, Air India has become the world's first airline to have successfully deployed a Generative AI virtual agent,called Maharaja', powered by Microsoft's Azure Open AI service. Air India's Maharaja AI Agent manages an extensive spectrum of customer queries across 1,300 areas related to flight status, baggage allowances, packing restrictions,check-in, frequent flyer awards, airport lounge access, flight changes, refunds and more.

32. ChatGPT was developed by : [M.P.P.C.S.(Pre) 2023]

Correct Answer: (b) OpenAI
Solution:

ChatGPT (Chat Generative Pre-trained Transformer) is a AI-based chatbot developed by OpenAI and launched on November 30, 2022. Based on a large language model, it enables users to refine and steer a conversation towards a desired length, format, style, level of detail, and language. ChatGPT is a form of generative AI - a tool that lets users enter prompts to receive humanlike images, text or videos that are created by AI.

33. In computer terminology, U.S.B. stands for โ€” [Uttarakhand U.D.A./L.D.A. (Pre) 2007]

Correct Answer: (a) Universal Serial Bus
Solution:

USB (Universal Serial Bus) is the most popular connection used to connect a computer to devices such as digital cameras, printers, scanners, and external hard drives.

34. The place where accessories are connected in the computer is known as โ€” [M.P.P.C.S. (Pre) 2015]

Correct Answer: (a) Port
Solution:

The port works as an interface between the computer and other computer or peripheral. Monitor, keyboard, mouse, and other parts of the computer are connected to the computer through the port. These ports are found in the motherboard.

35. 'Password' in computers protects โ€” [Uttarakhand P.C.S. (Mains) 2002]

Correct Answer: (c) Unauthorized access of the system
Solution:

The port works as an interface between the computer and other computer or peripheral. Monitor, keyboard, mouse and other parts of the computer are connected to the computer through the port. These ports are found in the motherboard.

36. Which infotech terminology is used to find out the User's E-mail address? [U.P. U.D.A./L.D.A. (Spl.) (Pre) 2010]

Correct Answer: (c) Finger
Solution:

'Finger' protocol is used to find out the user's E-mail address.

37. In India, the term "Public Key Infrastructure" is used in the context of: [I.A.S. (Pre) 2020]

Correct Answer: (a) Digital security infrastructure
Solution:

In India, the term 'Public Key Infrastructure' (PKI) is used in the context of digital security infrastructure. PKI is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. It is part of digital security infrastructure as its purpose is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking, and confidential email. It authenticates users and devices in the digital world. PKIs are the foundation that enables the use of technologies, such as digital signatures and encryption, across large user populations.

38. Consider the following statements: [I.A.S. (Pre) 2019]

A digital signature is

  1. an electronic record that identifies the certifying authority issuing it.
  2. used to serve as a proof of identity of an individual to access information or server on Internet.
  3. an electronic method of signing an electronic document and ensuring that the original content is unchanged.

Which of the statements given above is/are correct?

Correct Answer: (c) 3 only
Solution:

A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document and also ensure that the original content of the message or document that has been sent is unchanged. Thus, statement 3 is correct. While statement 1 and 2 are related to digital signature certificates, which differ in a literal sense from digital signatures. A digital signature is an electronic method of signing an electronic document, whereas a digital signature certificate is a computer-based record that identifies the certifying authority issuing it and has the name and other details that can identify the subscriber. Digital signature certificates can be presented electronically to prove one's identity, to access information or services on the internet, or to sign certain documents digitally.

39. Important concept(s) introduced in IT Act, 2000: [M.P. P.C.S. (Pre) 2021]

Correct Answer: (d) All of the above
Solution:

Electronic Record, Digital Signature, and Certifying Authority are among some important concepts used in the Information Technology Act, 2000. As per the definitions given in Section 2 of this act:

'Electronic Record' means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer-generated microfiche.

'Digital Signature' means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3.

'Certifying Authority' means a person who has been granted a license to issue a Digital Signature Certificate under section 24.

40. With reference to digital payments, consider the following statements: [I.A.S. (Pre) 2018]

  1. BHIM app allows the user to transfer money to anyone with a UPI-enabled bank account.
  2. While a chip-pin debit card has four factors of authentication, BHIM app has only two factors of authentication.

Which of the statements given above is/are correct?

Correct Answer: (a) 1 only
Solution:

Bharat Interface for Money (BHIM) is a mobile payment app, developed by the National Payments Corporation of India (NPCI), based on the Unified Payments Interface (UPI). It was launched in December 2016, and it allows the user to transfer money to anyone with a UPI-enabled bank account via an Aadhar-enabled payment system. Thus, statement 1 is correct. Statement 2 is not correct because the BHIM app has three factors of authentication. For one, the app binds with a device's ID and mobile number, second a user needs to sync the account to conduct a transaction, and third, when a user sets up the app they are asked to create a pin which is needed to log in to the app.