{"id":40807,"date":"2024-05-04T08:14:32","date_gmt":"2024-05-04T08:14:32","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=40807"},"modified":"2024-05-04T08:14:33","modified_gmt":"2024-05-04T08:14:33","slug":"upsc-prelims-topic-wise-questions-science-technology-computer-knowledge","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/","title":{"rendered":"UPSC Prelims Topic Wise Questions &#8211; Science &#038; Technology &#8211; Computer Knowledge"},"content":{"rendered":"\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69fe83619f09c\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69fe83619f09c\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q1_The_worlds_fastest_computer_as_of_December_1996\" title=\"Q1. The world&#8217;s fastest computer, as of December 1996:\">Q1. The world&#8217;s fastest computer, as of December 1996:<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_a\" title=\"Ans. (a)\">Ans. (a)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q2_Assertion_A_Information_technology_is_fast_becoming_a_very_important_field_of_activity_in_India_Reason_R_Software_is_one_of_the_major_exports_of_the_country_and_India_has_a_very_strong_base_in_hardware_1997\" title=\"Q2. Assertion (A): Information technology is fast becoming a very important field of activity in India. Reason (R): Software is one of the major exports of the country, and India has a very strong base in hardware. (1997)\">Q2. Assertion (A): Information technology is fast becoming a very important field of activity in India. Reason (R): Software is one of the major exports of the country, and India has a very strong base in hardware. (1997)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q3_The_memory_of_a_computer_is_commonly_expressed_in_terms_of_kilobytes_or_megabytes_A_byte_is_made_up_of_2000\" title=\"Q3. The memory of a computer is commonly expressed in terms of kilobytes or megabytes. A byte is made up of (2000)\">Q3. The memory of a computer is commonly expressed in terms of kilobytes or megabytes. A byte is made up of (2000)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_a-2\" title=\"Ans. (a)\">Ans. (a)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q4_In_which_of_the_following_areas_can_GPS_technology_be_used_2018\" title=\"Q4. In which of the following areas can GPS technology be used? (2018)\">Q4. In which of the following areas can GPS technology be used? (2018)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_d\" title=\"Ans. (d)\">Ans. (d)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q5_The_terms_WannaCry_Petya_and_Eternal_Blue_sometimes_mentioned_in_the_news_recently_are_related_to_2018\" title=\"Q5. The terms WannaCry, Petya, and Eternal Blue sometimes mentioned in the news recently are related to (2018)\">Q5. The terms WannaCry, Petya, and Eternal Blue sometimes mentioned in the news recently are related to (2018)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-2\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q6_The_identity_platform_Aadhaar_provides_open_Application_Programming_Interfaces_APIs_What_does_it_imply_2018\" title=\"Q6. The identity platform Aadhaar provides open Application Programming Interfaces (APIs). What does it imply? (2018)\">Q6. The identity platform Aadhaar provides open Application Programming Interfaces (APIs). What does it imply? (2018)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-3\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q7_In_the_context_of_digital_technologies_for_consider_the_following_statements_entertainment_2019\" title=\"Q7. In the context of digital technologies for consider the following statements. entertainment (2019)\">Q7. In the context of digital technologies for consider the following statements. entertainment (2019)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_b\" title=\"Ans. (b)\">Ans. (b)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q8_Consider_the_following_statements_2019\" title=\"Q8. Consider the following statements. (2019)\">Q8. Consider the following statements. (2019)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-4\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q9_Which_of_the_statements_given_above_isare_correct\" title=\"Q9. Which of the statement(s) given above is\/are correct?\">Q9. Which of the statement(s) given above is\/are correct?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_b-2\" title=\"Ans. (b)\">Ans. (b)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q10_reference_ear_Field_Communication_NFC_Technology_which_of_the_following_statements_isare_correct_2015\" title=\"Q10. reference ear Field Communication (NFC) Technology&#8217;, which of the following statements is\/are correct? (2015)\">Q10. reference ear Field Communication (NFC) Technology&#8217;, which of the following statements is\/are correct? (2015)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-5\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q11_In_India_it_is_legally_mandatory_for_which_of_the_following_to_report_on_cyber_security_incidents_2016\" title=\"Q11. In India, it is legally mandatory for which of the following to report on cyber security incidents? (2016)\">Q11. In India, it is legally mandatory for which of the following to report on cyber security incidents? (2016)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-6\" title=\"Ans (c)\">Ans (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q12_%E2%80%983D_Printing_has_applications_in_which_of_the_following_2018\" title=\"Q12. &#8216;3D Printing&#8217; has applications in which of the following? (2018)\">Q12. &#8216;3D Printing&#8217; has applications in which of the following? (2018)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Answer_d\" title=\"Answer: (d)\">Answer: (d)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q13_When_the_alarm_of_your_smartphone_rings_in_the_morning_you_wake_up_and_tap_it_to_stop_the_alarm_which_causes_your_geyser_to_be_switched_on_automatically_The_smart_mirror_in_your_bathroom_shows_the_days_weather_and_also_indicates_the_level_of_water_in_your_overhead_tank_After_you_take_some_groceries_from_your_refrigerator_for_making_breakfast_it_recognizes_the_shortage_of_stock_in_it_and_places_an_order_for_the_supply_of_fresh_grocery_items_When_you_step_out_of_your_house_and_lock_the_door_all_lights_fans_geysers_and_AC_machines_get_switched_off_automatically_On_your_way_to_the_office_your_car_warns_you_about_traffic_congestion_ahead_and_suggests_an_alternative_route_and_if_you_are_late_for_a_meeting_it_sends_a_message_to_your_office_accordingly\" title=\"Q13. When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day&#8217;s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognizes the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers, and AC machines get switched off automatically. On your way to the office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly.\">Q13. When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day&#8217;s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognizes the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers, and AC machines get switched off automatically. On your way to the office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly.<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Answer_b\" title=\"Answer: (b)\">Answer: (b)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q14_For_reproducing_sound_a_CD_Compact_Disc_audio_player_uses_a_2000\" title=\"Q14. For reproducing sound, a CD (Compact Disc) audio player uses a (2000)\">Q14. For reproducing sound, a CD (Compact Disc) audio player uses a (2000)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-7\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q15_Which_one_of_the_following_pairs_is_not_correctly_matched_2005\" title=\"Q15. Which one of the following pairs is not correctly matched? (2005)\">Q15. Which one of the following pairs is not correctly matched? (2005)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-8\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q16_Who_among_the_following_is_considered_as_the_inventor_of_the_World_Wide_Web_WWW_2007\" title=\"Q16. Who among the following is considered as the inventor of the World Wide Web (WWW)? (2007)\">Q16. Who among the following is considered as the inventor of the World Wide Web (WWW)? (2007)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-9\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q17_WiMAX_is_related_to_which_one_of_the_following_2009\" title=\"Q17. WiMAX is related to which one of the following? (2009)\">Q17. WiMAX is related to which one of the following? (2009)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_d-2\" title=\"Ans. (d)\">Ans. (d)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q18_Which_among_the_following_do_not_belong_to_the_GSM_family_of_wireless_technologies_2010\" title=\"Q18. Which among the following do not belong to the GSM family of wireless technologies? (2010)\">Q18. Which among the following do not belong to the GSM family of wireless technologies? (2010)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_c-10\" title=\"Ans. (c)\">Ans. (c)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q19_What_is_the_difference_between_Bluetooth_and_Wi-Fi_devices_2011\" title=\"Q19. What is the difference between Bluetooth and Wi-Fi devices? (2011)\">Q19. What is the difference between Bluetooth and Wi-Fi devices? (2011)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_a-3\" title=\"Ans. (a)\">Ans. (a)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Q20_What_is_a_%E2%80%98Virtual_Private_Network_2012\" title=\"Q20. What is a &#8216;Virtual Private Network&#8217;? (2012)\">Q20. What is a &#8216;Virtual Private Network&#8217;? (2012)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Ans_b-3\" title=\"Ans. (b)\">Ans. (b)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/edukemy.com\/blog\/upsc-prelims-topic-wise-questions-science-technology-computer-knowledge\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q1_The_worlds_fastest_computer_as_of_December_1996\"><\/span>Q1. The world&#8217;s fastest computer, as of December 1996:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) 10^6 operations per second has been able to<br>(b) 10^9 operations per second<br>(c) 10^12 operations per second<br>(d) 10^15 operations per second<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_a\"><\/span>Ans. (a)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. As of 1996, the world&#8217;s fastest computer has been able to perform 10^6 operations per second. As of 2022, the world&#8217;s fastest supercomputer is U.S. Frontier.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q2_Assertion_A_Information_technology_is_fast_becoming_a_very_important_field_of_activity_in_India_Reason_R_Software_is_one_of_the_major_exports_of_the_country_and_India_has_a_very_strong_base_in_hardware_1997\"><\/span>Q2. Assertion (A): Information technology is fast becoming a very important field of activity in India.<br>Reason (R): Software is one of the major exports of the country, and India has a very strong base in hardware. (1997)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) Both A and R are true and R is the correct explanation of A.<br>(b) Both A and R are true, but R is not the correct explanation of A.<br>(c) A is true, but R is false.<br>(d) A is false, but R is true.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c\"><\/span>Ans. (c)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. A is true, but R is false. Information technology is fast becoming a very important field of activity in India because nowadays it is used everywhere in the development of every sector. It is applied in the fields of medicine, healthcare, banking, etc. It is also true that software is one of the major exports of the country, but India does not have a strong base in hardware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q3_The_memory_of_a_computer_is_commonly_expressed_in_terms_of_kilobytes_or_megabytes_A_byte_is_made_up_of_2000\"><\/span>Q3. The memory of a computer is commonly expressed in terms of kilobytes or megabytes. A byte is made up of (2000)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) eight binary digits<br>(b) eight decimal digits<br>(c) two binary digits<br>(d) two decimal digits<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_a-2\"><\/span>Ans. (a)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. Computer memory is expressed in kilobytes or megabytes or gigabytes. One byte is made of eight binary digits (1 byte = 8 binary digits).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q4_In_which_of_the_following_areas_can_GPS_technology_be_used_2018\"><\/span>Q4. In which of the following areas can GPS technology be used? (2018)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) Mobile phone operations<\/p>\n\n\n\n<p>(b) Banking operations<\/p>\n\n\n\n<p>(c)Controlling the power grids<\/p>\n\n\n\n<p>Select the correct answer using the codes given below.<\/p>\n\n\n\n<p>(a) Only 1 (b) 2 and 3<br>(c) 1 and 3 (d) 1, 2, and 3<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_d\"><\/span>Ans. (d)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. GPS technology can be used in mobile phone operations, banking operations, and controlling the power grids. GPS is widely used in mobile phone operations. It is a satellite navigation system used to determine the ground position of an object. Global financial systems increasingly need precise timing systems to schedule and prioritize local and international money transfers, settlements, and trades, and to provide an audit trail for financial transactions. For example, the time signal provided by the atomic clocks on the GPS satellites is used by financial institutions worldwide for providing date and time stamps for Electronic Fund Transfers. There are reports of GPS spoofing attacks on power grids.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q5_The_terms_WannaCry_Petya_and_Eternal_Blue_sometimes_mentioned_in_the_news_recently_are_related_to_2018\"><\/span>Q5. The terms WannaCry, Petya, and Eternal Blue sometimes mentioned in the news recently are related to (2018)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) exoplanets, (b) cryptocurrency<br>(c) cyber attack (d) mini satellites<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-2\"><\/span>Ans. (c)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. The terms &#8216;WannaCry,&#8217; &#8216;Petya,&#8217; and &#8216;Eternal Blue&#8217; are related to cyber attacks. WannaCry is a ransomware worm that spread rapidly across a number of computer networks in May 2017. Petya is a family of encrypting ransomware that was first discovered in 2016. Eternal Blue is the name given to a software vulnerability in Microsoft&#8217;s Windows Operating System. Exoplanets are planets beyond our solar system; thousands have been discovered in the past two decades, mostly with the Kepler space telescope.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q6_The_identity_platform_Aadhaar_provides_open_Application_Programming_Interfaces_APIs_What_does_it_imply_2018\"><\/span>Q6. The identity platform Aadhaar provides open Application Programming Interfaces (APIs). What does it imply? (2018)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(1) It is integrated into an electronic device.<\/p>\n\n\n\n<p>(2) Online authentication using iris is possible.<\/p>\n\n\n\n<p>Which of the statements given above is\/are correct?<\/p>\n\n\n\n<p>(a) Only 1 (b) Only 2<br>(c) Both 1 and 2 (d) Neither 1 nor 2<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-3\"><\/span>Ans. (c)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. Both the statements (1) and (2) are correct. Aadhaar authentication provides several ways in which an Aadhaar holder can authenticate himself using the system. At a high level, authentication can be done using demographic data and\/or biometric data. Online authentication using iris is currently not supported, but it is proposed to start from July 2018. The APIs provided can be integrated into any electronic device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q7_In_the_context_of_digital_technologies_for_consider_the_following_statements_entertainment_2019\"><\/span>Q7. In the context of digital technologies for consider the following statements. entertainment (2019)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) In Augmented Reality (AR), a simulated environment is created and the physical world completely shut out.<\/p>\n\n\n\n<p>(b) In Virtual Reality (VR), images generated froma computer are projected onto real life objectu surroundings.<\/p>\n\n\n\n<p>(c) AR allows individuals to be present in the world and the experience using the smartphone or PC. camera of<\/p>\n\n\n\n<p>(d) VR closes the world and transposes an individual, providing complete immersion experience. <\/p>\n\n\n\n<p>Which of the statements given above is\/are correct?<\/p>\n\n\n\n<p>(a) 1 and 2<br>(b) 3 and 4<br>(c) 1,2 and 3<br>(d) Only 4<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_b\"><\/span>Ans. (b)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. Statements (3) and (4) are correct.<br>Augmented Reality (AR) is technology that presents us with virtual objects and information in our field of vision. It augments our surroundings by adding digital elements to a live view, after by using the camera on a smart phone. Virtual Reality (VR) is a completely immersive experience that replaces a real life environment with a simulated on There are three main types of VR- non-immersive, semi-immersive and fully immersive simulations.<br>Statements (1) and (2) are not correct.<br>Digital world never fully replace the physical world. Virtual Reality (VR) is the use of computer technology to creale a simulated environment VR is most immediately recognisable component is the head-mounted display.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q8_Consider_the_following_statements_2019\"><\/span>Q8. Consider the following statements. (2019)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A digital signature is<\/p>\n\n\n\n<p>(1) an electronic record that identifies the certifying authority issuing it.<\/p>\n\n\n\n<p>(2) used to serve as a proof of identity of an individual to access information or server on Internet.<\/p>\n\n\n\n<p>(3) an electronic method of signing an electronic document and ensuring that the original content is unchanged.<\/p>\n\n\n\n<p>Which of the statements given above is\/are correct?<\/p>\n\n\n\n<p>(a) Only 1<br>(b) 2 and 3<br>(c) Only 3<br>(d) 1, 2 and 3<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-4\"><\/span>Ans. (c)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. Statement (3) is correct as a digital signature is an electronic method of signing an electronic document. It ensures that the original content is unchanged. It identifies the certifying authority issuing it. It is also used to serve as a proof of identity of an individual to access information on internet. It is a process that guarantees that the contents of a message have not been altered in transit. Once a digital signature has been placed the document can not be altered<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q9_Which_of_the_statements_given_above_isare_correct\"><\/span>Q9. Which of the statement(s) given above is\/are correct?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) Only 1<br>(b) 1 and 2<br>(c)2 and 3<br>(d) 1, 2 and 3<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_b-2\"><\/span>Ans. (b)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. Both the statements (1) and (2) are correct. The Blu-ray Disc supersede the DVD format, in that it is capable of storing high-definition video resolution.<br>Statement (3) is incorrect as the plastic disc is 120 mm in dameter and 1.2 mm thick, the same size as DVDs and CDs Blu-ray Disc is associated with a set of multimedia farmats. The thickness of Blu-ray disc is actually small than the DVD.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q10_reference_ear_Field_Communication_NFC_Technology_which_of_the_following_statements_isare_correct_2015\"><\/span>Q10. reference ear Field Communication (NFC) Technology&#8217;, which of the following statements is\/are correct? (2015)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>1. It is a contactlens communication technology tha uses electromagnetic radio fields.<\/p>\n\n\n\n<p>2.NFC is designed for use by devices which can be at a distance of even a metre from each other.<\/p>\n\n\n\n<p>3.NFC can use encryption when sending sensitive information.<\/p>\n\n\n\n<p>Select the correct answer using the codes given below.<\/p>\n\n\n\n<p>(a) 1 and 2<br>(b) Only 3<br>(c) 1 and 3<br>(d) 1, 2 and 3<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-5\"><\/span>Ans. (c)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. Both the statements 1 and 3 are correct. &#8216;Near Field Communication (NFC) technology&#8217; is a contactless communication technology that uses electromagnetic radio belds. It utilises electromagnetic radio fields while technologies such as Bluetooth and Wi-Fi focus on radio transmissions instead. NFC can use encryption when sending sensitive information. It allows secure data exchange by using encryption and a special processor. Statement 2 is incorrect because it is a short-range (10cm or less) wireless connectivity technology that lets NPC-enabled devices communicate with each other.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q11_In_India_it_is_legally_mandatory_for_which_of_the_following_to_report_on_cyber_security_incidents_2016\"><\/span>Q11. In India, it is legally mandatory for which of the following to report on cyber security incidents? (2016)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(1) Service providers<\/p>\n\n\n\n<p>(2) Body corporate<\/p>\n\n\n\n<p>(3) Data centres<\/p>\n\n\n\n<p>Select the correct answer using the codes given below.<br>(a) Only 1<br>(b) 1 and 2<br>(c) 1,2 and 3<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-6\"><\/span>Ans (c)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Exp. In India, it is legally mandatory for service providers, data centres and body corporate to report on cyber security incidents.<br>Cyber security incidents mean any real and suspected adverse event in relation to cybersecurity that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of services, unauthorised used of computer resources for processing or storage of data or changes in data without authorisation.<br>In India, section 70-B of the Information Technology Act, 2000 (the &#8220;IT Act&#8221;) gives the Central Government the power to appoint an agency of the government to be called the Indian Computer Emergency Response Team (CERT) to report such incidents. The CERT rules also impose an obligation on service providers, intermediaries, data centres and body corporates to report cyber incidents within a reasonable time so that CERT-In may have scope for timely action.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q12_%E2%80%983D_Printing_has_applications_in_which_of_the_following_2018\"><\/span>Q12. <strong>&#8216;3D Printing&#8217; has applications in which of the following? (2018)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Select the correct answer using the codes given below.<\/p>\n\n\n\n<p>(a) 1, 3, and 4<br>(b) 2, 3, and 4<br>(c) 1 and 4<br>(d) 1, 2, 3, 4, and 5<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer_d\"><\/span><strong>Answer:<\/strong> (d)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> All of the above are correct regarding &#8216;3D printing&#8217;. 3D Printing is one of the various processes in which material is joined or solidified under computer control to create a three-dimensional object, with material being added together, such as liquid molecules or powder grains being fused together. In simple words, 3D printing is an additive manufacturing process that creates a physical object from a digital design. In the current scenario, 3D printing has been used in manufacturing, confectioneries, conducting medical surgeries, developing artificial tissues and organs, data processing industry, automobile industry, and socio-cultural sectors, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q13_When_the_alarm_of_your_smartphone_rings_in_the_morning_you_wake_up_and_tap_it_to_stop_the_alarm_which_causes_your_geyser_to_be_switched_on_automatically_The_smart_mirror_in_your_bathroom_shows_the_days_weather_and_also_indicates_the_level_of_water_in_your_overhead_tank_After_you_take_some_groceries_from_your_refrigerator_for_making_breakfast_it_recognizes_the_shortage_of_stock_in_it_and_places_an_order_for_the_supply_of_fresh_grocery_items_When_you_step_out_of_your_house_and_lock_the_door_all_lights_fans_geysers_and_AC_machines_get_switched_off_automatically_On_your_way_to_the_office_your_car_warns_you_about_traffic_congestion_ahead_and_suggests_an_alternative_route_and_if_you_are_late_for_a_meeting_it_sends_a_message_to_your_office_accordingly\"><\/span>Q13. When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day&#8217;s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognizes the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers, and AC machines get switched off automatically. On your way to the office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>In the context of emerging communication technologies, which one of the following terms best applies to the above scenario? (2018)<\/strong><\/p>\n\n\n\n<p>(a) Border Gateway Protocol<br>(b) Internet of Things<br>(c) Internet Protocol<br>(d) Visual Private Network<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer_b\"><\/span><strong>Answer:<\/strong> (b)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> Internet of Things best applies to the above scenario. The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity. They enable these devices to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human intervention.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q14_For_reproducing_sound_a_CD_Compact_Disc_audio_player_uses_a_2000\"><\/span>Q14. For reproducing sound, a CD (Compact Disc) audio player uses a (2000)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) quartz crystal<br>(b) titanium needle<br>(c) laser beam<br>(d) barium titanate ceramic<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-7\"><\/span><strong>Ans. (c)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> For reproducing sound, a CD (Compact Disc) audio player uses a laser beam. A Compact Disc (CD) is a molded plastic disc containing digital data that is scanned by a laser beam for the reproduction of recorded sound and other information. Compact discs replaced floppy discs because they were faster and could hold more information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q15_Which_one_of_the_following_pairs_is_not_correctly_matched_2005\"><\/span>Q15. Which one of the following pairs is not correctly matched? (2005)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><div class=\"pcrstb-wrap\"><table><thead><tr><th>Well-known Companies<\/th><th>Major Area of Work<\/th><\/tr><\/thead><tbody><tr><td>(a) Adobe Systems<\/td><td>Software<\/td><\/tr><tr><td>(b) Suken Technology<\/td><td>Communication<\/td><\/tr><tr><td>(c) Genpact<\/td><td>Power generation<\/td><\/tr><tr><td>(d) Synthite<\/td><td>Export of spices<\/td><\/tr><\/tbody><\/table><\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-8\"><\/span><strong>Ans. (c)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> The pair (c) is not correctly matched. Genpact is related to information and technology services. Genpact is a global professional services firm delivering digital transformation by putting digital and data to work to create competitive advantage. Genpact began in 1997 as a business unit within General Electric. In January 2006, Genpact became an independent company.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q16_Who_among_the_following_is_considered_as_the_inventor_of_the_World_Wide_Web_WWW_2007\"><\/span>Q16. Who among the following is considered as the inventor of the World Wide Web (WWW)? (2007)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) Edward Kuner<br>(b) Bill Gates<br>(c) Tim Berners-Lee<br>(d) Vinod Dham<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-9\"><\/span><strong>Ans. (c)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> The World Wide Web (WWW) was created around 1990 by the Englishman Tim Berners-Lee and the Belgian Robert Cailliau working at CERN in Geneva, Switzerland. Tim Berners-Lee received the Millennium Technology Prize for conceiving of the World Wide Web. The World Wide Web is a system of interlinked, hypertext documents accessed via the internet. With a web browser, a user views web pages that may contain texts, images, and other multimedia and navigates between them using hyperlinks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q17_WiMAX_is_related_to_which_one_of_the_following_2009\"><\/span>Q17. WiMAX is related to which one of the following? (2009)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) Biotechnology<br>(b) Space technology<br>(c) Missile technology<br>(d) Communication technology<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_d-2\"><\/span><strong>Ans. (d)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> WiMAX is related to communication technology. It is an emerging technology for broadband wireless access. It promises very high data rates, high reliability, good efficiency, and low cost. WiMAX enjoys strong industry support and standardization. Because of its low cost, WiMAX can be used to provide broadband internet access to suburban, rural areas and thus bridge the digital divide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q18_Which_among_the_following_do_not_belong_to_the_GSM_family_of_wireless_technologies_2010\"><\/span>Q18. Which among the following do not belong to the GSM family of wireless technologies? (2010)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) EDGE<br>(b) LTE<br>(c) DSL<br>(d) Both EDGE and LTE<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_c-10\"><\/span><strong>Ans. (c)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> DSL does not belong to the GSM family of wireless technologies. Digital Subscriber Line (DSL) is a family technology that provides digital data transmission over the wires of a local telephone network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q19_What_is_the_difference_between_Bluetooth_and_Wi-Fi_devices_2011\"><\/span>Q19. What is the difference between Bluetooth and Wi-Fi devices? (2011)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) Bluetooth uses the 2.4 GHz radio frequency band whereas Wi-Fi can use 2.4 GHz or 5 GHz frequency band.<br>(b) Bluetooth is used for Wireless Local Area Networks (WLAN) only, whereas Wi-Fi is used for Wireless Wide Area Networks (WWAN) only.<br>(c) When information is transmitted between two devices using Bluetooth technology, the devices have to be in the line of sight of each other, but when Wi-Fi technology is used the devices need not be in the line of sight of each other.<br>(d) The statements (a) and (b) given above are correct in this context.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_a-3\"><\/span><strong>Ans. (a)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> The difference between Bluetooth and Wi-Fi is that Bluetooth is a wireless technology standard for exchanging data over short distances using the 2.4 to 2.485 GHz band. It uses Personal Area Networks (PANs). Wi-Fi, on the other hand, is a local area wireless technology that allows electronic devices to exchange data or connect to the internet using 2.4 GHz UHF and 5 GHz SHF radios. The term Wi-Fi is used in general English as a synonym for WLAN.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q20_What_is_a_%E2%80%98Virtual_Private_Network_2012\"><\/span>Q20. What is a &#8216;Virtual Private Network&#8217;? (2012)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>(a) It is a private computer network of an organization where the remote users can transmit encrypted information through the server of the organization.<br>(b) It is a computer network over a public internet that provides users access to their organization&#8217;s network while maintaining the security of the information transmitted.<br>(c) It is a computer network in which users can access a shared pool of computing resources through a service provider.<br>(d) None of the statements (a), (b), and (c) given above is a correct description of &#8216;Virtual Private Network&#8217;.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ans_b-3\"><\/span><strong>Ans. (b)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Explanation:<\/strong> &#8216;Virtual Private Network&#8217; is a computer network over a public internet that provides users access to their organization&#8217;s network while maintaining the security of the information transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688\" width=\"781\" height=\"182\"\/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-c6ab63ae-7083-4831-b519-cb89dacafb18\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p id=\"block-52c5a91b-6ed6-46e3-b781-7cc0c63a0b76\">For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p id=\"block-d014fe86-d628-49d8-82ce-6c60dc6e7a73\">For Daily Updates and Study Material:<\/p>\n\n\n\n<p id=\"block-38177954-e668-4d8d-b250-d0fbd5a09390\">Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\" id=\"block-49ca2fe3-109f-4a88-b72e-9df49c3d328e\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"block-43ccddc1-5348-445f-ab6b-7baaf29fe58d\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@EduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Prepare for the UPSC Prelims with comprehensive topic-wise questions in Science &#038; Technology, focusing on Computer Knowledge. <\/p>\n","protected":false},"author":23,"featured_media":40815,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1644],"tags":[232,231,179,140],"class_list":["post-40807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upsc-prelims","tag-upsc","tag-upsc-prelims","tag-upsc-prelims-strategy","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/40807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=40807"}],"version-history":[{"count":1,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/40807\/revisions"}],"predecessor-version":[{"id":40816,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/40807\/revisions\/40816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/40815"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=40807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=40807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=40807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}