Computer Information Technology Part-5

Total Questions: 50

41. Which of the following is/are the aim/aims of 'Digital India' Plan of the Government of India? [I.A.S. (Pre) 2018]

  1. Formation of India's own Internet companies like China did.
  2. Establish a policy framework to encourage overseas multinational corporations that collect Big Data to build their large data centres within our national geographical boundaries.
  3. Connect many of our villages to the Internet and bring Wi-Fi to many of our schools, public places, and major tourist centres.
    Select the correct answer using the code given below:
Correct Answer: (b) 3 only
Solution:

The objective of Digital India is to transform the country into a digitally empowered society and knowledge economy. It would ensure that government services are made available to citizens electronically. This programme was launched in July, 2015 by Prime Minister Narendra Modi. The initiative includes plans to connect rural areas with high-speed internet networks and improving digital literacy.

42. Consider the following: [I.A.S. (Pre) 2022]

  1. Aarogya Setu
  2. CoWIN
  3. DigiLocker
  4. DIKSHA

Which of the above are built on top of open-source digital platforms?

Correct Answer: (d) 1, 2, 3 and 4
Solution:

An open-source platform is any platform that allows access to its source code to any other users or developers. Unlike proprietary software, everyone has the freedom to edit, modify, and reuse open-source code. Many solutions launched by the Government of India, including DigiLocker, Diksha, Aarogya Setu, and the Covid-19 vaccination platform CoWIN, are built on top of open-source digital platforms.

43. Consider the following statements: [I.A.S. (Pre) 2018]

  1. Aadhaar card can be used as a proof of citizenship or domicile.
  2. Once issued, Aadhaar number cannot be deactivated or omitted by the Issuing Authority.

Which of the statements given above is/are correct?

Correct Answer: (d) Neither 1 nor 2
Solution:

Aadhaar is a 12-digit unique identity number issued by the UIDAI to the residents of India after satisfying the verification process. Any individual, irrespective of age, gender, who is resident of India, may voluntarily enrol to obtain Aadhaar number. Person willing to enrol has to provide his biometrio and demographic data which is collected by the UIDAI.According to Section 9 of the Aadhaar Act, 2016, the Aadhaar card is only a proof of identity and cannot be used as proof of citizenship or domicile. Also as per Section 23 (g) of the Act, once issued, the Aadhaar number can be deactivated 0r omitted by the issuing authority in such a manner as may be specified by the regulations.

44. The identity platform 'Aadhaar' provides open 'Application Programming Interfaces (APIs)'. What does it imply? [I.A.S. (Pre) 2022]

  1. It can be integrated into any electronic device.
  2. Online authentication using iris is possible.

Which of the statements given above is/are correct?

Correct Answer: (c) Both 1 and 2
Solution:

Aadhaar provides open Application Programming Interfaces (APIs), which can be integrated easily into any electronic device. These APIs enable online authentication using a fingerprint or iris.

45. With reference to "Blockchain Technology," consider the following statements: [I.A.S. (Pre) 2018]

  1. It is a public ledger that everyone can inspect, but which no single user controls.
  2. The structure and design of blockchain is such that all the data in it are about cryptocurrency only.
  3. Applications that depend on basic features of blockchain can be developed without anybody's permission.

Which of the statements given above is/are correct?

Correct Answer: (a) 1 only
Solution:

A blockchain is a growing list of records called blocks that are interconnected by utilizing cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. Utilizing blockchain, we can safely store information over the shared system (as a public ledger), where everyone can see or inspect but cannot do any alteration. A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. The blockchain technology can be utilized for various purposes, including cryptocurrencies, safe exchange of things like cash, property, contracts, etc., and for storing data from land records to vehicle ownership. There is no need to require a third-party intermediary like a bank or government in blockchain to verify or transfer ownership. Blockchain applications can be developed without taking permission from anybody, like any government or central bank. Hence, statement 1 and 3 are correct, while statement 2 is incorrect.

46. With reference to Web 3.0, consider the following statements: [I.A.S. (Pre) 2022]

  1. Web 3.0 technology enables people to control their own data.
  2. In Web 3.0 world, there can be blockchain-based social networks.
  3. Web 3.0 is operated by users collectively rather than a corporation.

Which of the statements given above are correct?

Correct Answer: (d) 1, 2 and 3
Solution:

Web 3.0 (Web3) is the third generation of the Internet currently being built. There is broad consensus amongst experts that blockchain-powered applications (including social networks) will be key to its success in order to ensure adequate decentralization, while technologies like artificial intelligence (AI), machine learning (ML), Big Data, decentralized ledger technology (DLT), and more will help automate and scale it as required to become a semantic web. The Web 3.0 definition can be expanded as follows: data will be interconnected in a decentralized way, which would be a huge leap forward for our current generation of the Internet (Web 2.0), where data is mostly stored in centralized repositories and therefore subject to manipulation or worse. Web 3.0 will be operated by users collectively, rather than a corporation. Furthermore, users and machines will be able to interact with data and people will be able to control their own data.

47. Consider the following pairs: [I.A.S. (Pre) 2018]

Terms sometimes seen in newsContext/Topic
1. Belle II experimentArtificial Intelligence
2.Blockchain technologyDigital/Cryptocurrency
3. CRISPR - Cas9Particle Physics

Which of the pairs given above is/are correctly matched?

Correct Answer: (b) 2 only
Solution:

Belle II experiment is a particle physics experiment designed to study the properties of B-mesons. It is not related to artificial intelligence. Blockchain technology is related to cryptocurrency; hence, this pair is correctly matched. Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) - Cas 9 is a genome-editing tool, which allows scientists to edit genomes with unprecedented precision. It is not associated with particle physics.

48. Blowfish is a type of: [M.P. P.C.S. (Pre) 2020]

Correct Answer: (a) Symmetric Encryption Algorithm
Solution:

Blowfish is a symmetric encryption technique designed by Bruce Schneier in 1993 as an alternative to the DES Encryption Technique. It is significantly faster than DES and provides a good encryption rate with no effective cryptanalysis technique found to date. It is one of the first, secure block ciphers not subject to any patents and hence freely available for anyone to use.

49. Which work is not done by a computer? [M.P.P.C.S. (Pre) 2015]

Correct Answer: (c) Understanding
Solution:The computer provides information after analyzing the input given by the user. It happens in a phased manner-
(i) Input, (ii) Processing, (iii) Computing, (iv) Outputting.
It is clear that the work of understanding is not done by a computer.

50. Which one of the following expresses error in computer data [U.P.P.C.S. (GIC) 2010]

Correct Answer: (c) Bug
Solution:

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in an unintended way. Most bugs arise from mistakes and errors made by people either in the program's source code or its design.