1. What is a firewall in the context of computer security?
    A. A physical barrier around a computer system
    B. A software program that filters incoming and outgoing network traffic
    C. A type of virus that spreads through networks
    D. A tool that encrypts sensitive data on a computer
    Correct Answer: B. A software program that filters incoming and outgoing network traffic
    Explanation: Firewalls are commonly used to prevent unauthorized access to a network or computer system by monitoring and filtering network traffic based on predefined rules.
  2. Which of the following is an example of two-factor authentication?
    A. A username and password
    B. A fingerprint scan and a password
    C. A passphrase
    D. A security question
    Correct Answer: B. A fingerprint scan and a password
    Explanation: Two-factor authentication requires users to provide two types of identification to access a system or network, typically a password or PIN plus a physical token, such as a fingerprint, smart card, or token-generating device.
  3. What is a phishing attack?
    A. A type of firewall that blocks incoming email
    B. A type of malware that encrypts a computer’s files and demands payment for their release
    C. A social engineering tactic that attempts to trick people into revealing sensitive information or installing malware
    D. A type of denial-of-service attack that overwhelms a website or network with traffic
    Correct Answer: C. A social engineering tactic that attempts to trick people into revealing sensitive information or installing malware
    Explanation: Phishing attacks are a type of social engineering tactic that involves tricking people into providing sensitive information or installing malware by disguising the attack as a legitimate request or communication, such as an email or website.
  4. What is encryption?
    A. A process that hides sensitive information in plain sight
    B. A way to prevent unauthorized access to a computer system by physically securing it
    C. A method of scrambling data so that it can only be read by someone with the proper decryption key
    D. A tool that scans for malware and viruses on a computer system
    Correct Answer: C. A method of scrambling data so that it can only be read by someone with the proper decryption key
    Explanation: Encryption is commonly used to protect sensitive data during transmission over a network or while stored on a computer system by converting plaintext data into ciphertext using a mathematical algorithm and a secret key, making the data unreadable to anyone who does not have the key.
  5. What is the objective of the “National Digital Health Mission” launched in India in August 2020?
    A. To provide free healthcare services to all citizens.
    B. To establish a single electronic health record for each citizen.
    C. To offer financial assistance to private hospitals.
    D. To focus only on urban areas.
    Correct Answer: B. To establish a single electronic health record for each citizen.
    Explanation: The National Digital Health Mission launched in August 2020 aims to establish a single electronic health record for each citizen, which can be accessed by authorized healthcare providers across India.
  6. What is the objective of the “Startup India Seed Fund” launched by the Government of India in 2021?
    A. To provide funding to startups in their growth phase.
    B. To support startups with research and development.
    C. To provide seed funding to startups at the ideation stage.
    D. To encourage startups to go public.
    Correct Answer: C. To provide seed funding to startups at the ideation stage.
    Explanation: The Startup India Seed Fund, launched in January 2021, aims to provide seed funding to startups at the ideation stage to help them develop and commercialize their products or services.
  7. What is the purpose of the “One Nation, One Ration Card” scheme launched by the Indian government in 2020?
    A. To provide free rations to all citizens.
    B. To establish a single national database of ration card holders.
    C. To allow portability of ration cards across states.
    D. To digitize the ration card system.
    Correct Answer: C. To allow portability of ration cards across states.
    Explanation: The “One Nation, One Ration Card” scheme launched in June 2020 aims to allow portability of ration cards across states, enabling beneficiaries to avail of subsidized food grains from any Fair Price Shop (FPS) across the country.
  8. What is the aim of the “Pradhan Mantri Matsya Sampada Yojana” launched by the Indian government in 2020?
    A. To provide financial assistance to farmers.
    B. To promote entrepreneurship in the fisheries sector.
    C. To increase fish production and productivity.
    D. To establish a national database of fishermen.
    Correct Answer: B. To promote entrepreneurship in the fisheries sector.
    Explanation: The “Pradhan Mantri Matsya Sampada Yojana” launched in May 2020 aims to promote entrepreneurship in the fisheries sector by providing financial assistance and infrastructure development. The scheme aims to increase fish production and productivity, and thereby increase the income of fish farmers and other stakeholders in the fisheries value chain.
  9. What is the purpose of a transmitter in a communication system?
    A. To amplify the received signal
    B. To convert digital signals into analog signals
    C. To convert analog signals into digital signals
    D. To transmit the signal over a communication channel
    Correct Answer: D. To transmit the signal over a communication channel
    Explanation: The purpose of a transmitter is to convert the information signal into a form suitable for transmission over a communication channel.
  10. What is the function of the modulation process in a transmitter?
    A. To convert the signal into a form suitable for transmission
    B. To amplify the signal
    C. To demodulate the signal
    D. To decode the signal
    Correct Answer: A. To convert the signal into a form suitable for transmission
    Explanation: Modulation is the process of modifying a signal in such a way that it can be transmitted efficiently over a communication channel.
  11. What is the purpose of a transmitter in a communication system?
    A. To amplify the received signal
    B. To convert digital signals into analog signals
    C. To convert analog signals into digital signals
    D. To transmit the signal over a communication channel
    Correct Answer: D. To transmit the signal over a communication channel
    Explanation: The purpose of a transmitter is to convert the information signal into a form suitable for transmission over a communication channel.
  12. Which of the following is an example of a decoding barrier in communication?
    A. Poor transmission quality
    B. Lack of feedback
    C. Lack of common language
    D. All of the above
    Correct Answer: D. All of the above.
    Explanation: Decoding barriers can include anything that interferes with the receiver’s ability to understand the message, such as poor transmission quality, lack of feedback, or lack of a common language.
  13. In communication, what is the relationship between encoding and decoding?
    A. They are the same thing
    B. Encoding comes before decoding
    C. Decoding comes before encoding
    D. They happen simultaneously
    Correct Answer: B. Encoding comes before decoding.
    Explanation: In communication, the sender encodes a message and the receiver decodes it.
  14. Which of the following is an example of a decoding error in communication?
    A. The receiver misunderstands a message due to language barriers
    B. The receiver correctly interprets a message but does not respond
    C. The receiver responds but uses a different communication medium
    D. None of the above
    Correct Answer: A. The receiver misunderstands a message due to language barriers.
    Explanation: Decoding errors occur when the receiver misinterprets or misunderstands a message, such as due to language barriers, cultural differences, or other factors. Option B and C may be considered as errors in feedback or medium, respectively.
  15. What is an Anti-Gravity Hill in India?
    A. A hill where objects appear to roll upwards
    B. A hill where objects appear to roll downwards
    C. A hill where objects remain stationary
    D. A hill where objects disappear
    Correct Answer: A. A hill where objects appear to roll upwards
    Explanation: Anti-Gravity Hills, also known as Magnetic Hills or Gravity Hills, are natural or man-made slopes where the layout of the surrounding land produces an optical illusion, making a downhill slope appear as an uphill slope. Objects, including cars, water, and balls, appear to roll upwards on these hills, defying the laws of gravity.
  16. What is the cause of the Anti-Gravity effect on these hills?
    A. Strong magnetic fields in the area
    B. The curvature of the Earth
    C. The density of the surrounding air
    D. A trick of the light
    Correct Answer: A. Strong magnetic fields in the area
    Explanation: The Anti-Gravity effect on these hills is caused by the presence of strong magnetic fields in the area, which can distort the gravitational pull and cause objects to appear to roll uphill.
  17. What is the most commonly used protocol for sending and receiving emails over the internet?
    A. FTP
    B. HTTP
    C. SMTP
    D. SSH
    Correct Answer: C. SMTP
    Explanation: SMTP (Simple Mail Transfer Protocol) is the most commonly used protocol for sending and receiving emails over the internet. FTP is used for transferring files between computers, HTTP is used for accessing websites, and SSH is used for remote access to computers.
  18. What is the purpose of a DNS server in a computer network?
    A. To protect the network from malware attacks
    B. To manage network resources
    C. To translate domain names to IP addresses
    D. To provide secure access to the network
    Correct Answer: C. To translate domain names to IP addresses
    Explanation: DNS (Domain Name System) servers are responsible for translating human-readable domain names (such as www.example.com) into IP addresses that computers use to identify each other on the network. This is essential for communication between devices on the internet. DNS servers do not protect the network from malware attacks, manage network resources, or provide secure access to the network.

Loading