In an e-Office system, a confidential file is sent digitally from a section officer to a higher authority. The department wants to ensure that only the intended officer can read the file during transmission. Which of the following ensures confidentiality during transmission?
The correct answer is B) Encrypting the file using the recipient's public key.
In the context of Public Key Infrastructure (PKI) and digital security, different tools serve different purposes. To ensure confidentiality (making sure only the intended recipient can read it), encryption is required.
Describe the issue with this question. Our team will review it.
Question ID: 11067
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following is incorrect regarding the use of modern computer applications in field operations of a Forest Department?
The incorrect statement is C) Forest apps replace the need for physical field inspections completely.
Modern computer applications significantly enhance the efficiency of Forest Department operations, but they do not eliminate the necessity for on-ground presence.
A) Mobile apps for photographs (Correct): Field staff use specialized apps to document tree health, illegal felling, or wildlife sightings. These photos often serve as legal evidence in "damage cases."
B) GIS-enabled apps (Correct): Geographic Information Systems (GIS) allow officers to overlay GPS coordinates of their current location with satellite imagery to monitor forest cover changes, boundary encroachments, and fire hotspots in real-time.
C) Replacing physical inspections (Incorrect): While apps streamline data collection, physical inspections are still mandatory for verifying ground realities, interacting with local communities, and performing tasks that sensors or cameras cannot (like manual soil testing or marking trees for silvicultural operations).
D) Working without network (Correct): Many professional field apps (like QField or ArcGIS Field Maps) are designed for offline use. Since forests often have poor connectivity, data is stored locally on the device and synchronized with the central server once the staff returns to a network zone.
Describe the issue with this question. Our team will review it.
Question ID: 11066
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following statements is correct regarding computer viruses and modern antivirus systems?
The correct answer is B) Signature-based antivirus detects only previously identified malware patterns.
Here is a detailed look at why this statement is true and why the others are misconceptions:
Signature-based Detection (True): This traditional method works like a "Most Wanted" list. The antivirus compares the code of files on your computer against a database of known malware "signatures" (unique strings of bits). If it hasn't seen that specific pattern before, it won't flag it.
A) Execution (False): By definition, a computer virus usually requires a host program to be executed or some form of user action (like opening an attachment or running an infected .exe) to begin its spread. In contrast, a Worm is the type of malware that can self-replicate and spread across networks automatically without user intervention.
C) Zero-day Attacks (False): A Zero-day attack exploits a vulnerability that is unknown to the software vendor or antivirus company. Since there is no "patch" or "signature" yet, online registration or standard antivirus updates cannot guarantee protection against them. Only advanced Heuristic/Behavioral analysis can help mitigate these.
D) Firewall vs. Antivirus (False): They are distinct layers of security. A Firewall acts as a barrier for network traffic (checking "who" is coming in and out of your internet connection), while an Antivirus scans and monitors the "files" and "programs" already on or entering your system to find malicious code.
Describe the issue with this question. Our team will review it.
Question ID: 11065
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following statements is true regarding KMZ files and geo-tagged photos?
The correct answer is B) Geo-tagging embeds latitude and longitude inside image metadata.
Here is the technical breakdown of how these technologies work:
Geo-tagging (True): When you take a photo with a GPS-enabled device, the coordinates (latitude, longitude, and often altitude) are written into the EXIF (Exchangeable Image File Format) metadata of the image. This data travels with the file, allowing mapping software to pin the photo to a specific location.
KMZ Files (A & C are False): A KMZ file is a compressed (zipped) version of a KML (Keyhole Markup Language) file. It is specifically designed to store geographic data, including coordinates, 3D models, and images. Because it is a zip file, it can "bundle" images together with their corresponding location data so they can be viewed in applications like Google Earth.
Automatic Creation (D is False): Simply uploading a geo-tagged photo does not automatically generate a KMZ file. A KMZ must be specifically created or "saved as" using GIS (Geographic Information System) software or mapping tools to package the image and its coordinates into that specific format.
Describe the issue with this question. Our team will review it.
Question ID: 11064
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A student uploads a PDF file to an online PDF-to-JPG converter website. After conversion, he downloads the JPG files but later notices:
The images are blurred
File size is much larger than expected
Text cannot be copied anymore
Which of the following is the most accurate reason?
The correct answer is A) The PDF was converted into raster images.
This scenario highlights the fundamental difference between Vector and Raster formats:
Rasterization: A PDF often contains vector data (like text and shapes) which is mathematically defined and infinitely scalable. When you convert it to a JPG, the website "rasterizes" the content, turning it into a fixed grid of pixels.
Blurriness: Because JPGs are raster images, if the conversion resolution (DPI) is low, the images will appear blurred or pixelated when viewed at full size.
Larger File Size: Unlike text in a PDF, which takes up very little space, a JPG must store color information for every single pixel in the image. This often leads to a larger file size than the original text-based PDF.
Text Selection: Since the JPG is now just a "picture" of the text, the computer no longer recognizes individual characters. You cannot highlight or copy text unless you use OCR (Optical Character Recognition) software.
Describe the issue with this question. Our team will review it.
Question ID: 11063
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A government launches a system where:
Citizens apply for documents online
Applications are automatically verified using databases
SMS/email updates are sent automatically
Officials approve requests digitally
Data is stored centrally and accessed across departments
Which of the following best explains the real contribution of Information Technology (IT) in this system
The correct answer is C) IT integrates communication, data processing, storage, and automation.
This scenario perfectly illustrates a comprehensive E-governance framework. Information Technology is not just a single tool here; it acts as an integrated system that transforms the entire workflow:
Communication: Automated SMS/email updates keep the citizen informed without manual intervention.
Data Processing: Automatic verification against databases ensures accuracy and speed that a human could not match manually.
Storage: Centralized data storage allows different departments to access the same information, eliminating the need for a citizen to submit the same document multiple times (the "Once-Only" principle).
Automation: The system handles routine tasks (routing applications, checking records), allowing officials to focus only on the final digital approval.
Describe the issue with this question. Our team will review it.
Question ID: 11062
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A student is using a computer with 8 GB RAM. He opens:
A web browser with 25 tabs
A video editing software
A music player
A code editor
After some time, the system becomes slow, but it does NOT crash. The hard disk activity light keeps blinking continuously even though he is not saving or opening files. Which of the following is the most accurate explanation?
The correct answer is C) The operating system is using virtual memory and swapping data between RAM and disk.
This scenario describes a classic case of Thrashing. Here is why:
Memory Overload: The student has opened several heavy applications (video editing, many browser tabs) that collectively require more than the available 8 GB of RAM.
Virtual Memory & Swapping: When RAM is full, the Operating System uses a portion of the hard disk (the Page File or Swap Space) as "Virtual Memory." It moves (swaps) data currently not in use from the RAM to the disk to make room for active tasks.
The "Slow" Effect: Hard disks (even SSDs) are significantly slower than RAM. The continuous blinking of the disk light indicates that the OS is frantically moving data back and forth between the RAM and the disk. This process is called Swapping.
Why it doesn't crash: The system remains functional because Virtual Memory allows it to handle more data than the physical RAM permits, though performance drops drastically.
Describe the issue with this question. Our team will review it.
Question ID: 11061
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Match the following:
Column -I --- Column - II
i. Firmware --- a. Translates high-level language into machine code
ii. Utility Software --- b. Controls communication between the operating system and the hardware device
iii. Device Driver --- c. Stored permanently in ROM to initialize hardware
iv. Compiler --- d. Performs system maintenance tasks like disk cleanup
Choose the correct option:
i. Firmware (i - c): This is a specific type of software "baked" into the hardware. It is stored permanently in ROM (Read-Only Memory) and provides the necessary instructions on how a device communicates with other computer hardware.
ii. Utility Software (ii - d): This software is designed to help analyze, configure, optimize, or maintain a computer. Examples include disk cleanup, antivirus, and file compression tools.
iii. Device Driver (iii - b): A specialized program that allows the operating system to communicate with a specific hardware device (like a printer or graphics card). Without the driver, the OS wouldn't know how to "talk" to the hardware.
iv. Compiler (iv - a): A language processor that translates an entire program written in high-level language (like C++ or Java) into machine code (binary) at once before execution.
Describe the issue with this question. Our team will review it.
Question ID: 11060
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Which of the following statements is true regarding applications of Information Technology?
A) E-governance (False): While E-governance makes services more efficient and accessible online, it does not entirely eliminate the need for physical offices. Many administrative tasks, legal verifications, and physical infrastructure management still require on-site government presence.
B) E-commerce (False): E-commerce is not limited to physical goods. It also includes the sale of digital products (e-books, software) and services (streaming subscriptions, travel bookings, and online consultations).
C) Telemedicine (True): This is a core application of IT in healthcare. It enables healthcare professionals to evaluate, diagnose, and treat patients at a distance using telecommunications technology like video calls and remote monitoring.
D) Online education (False): The primary benefit of online education is that students do not need to be physically present. They can access lectures and materials from any location with an internet connection.
Describe the issue with this question. Our team will review it.
Question ID: 11059
Message must be at least 5 characters.
Message must not exceed 2000 characters.
A computer uses 8-bit 2's complement representation. Which of the following operations will cause overflow?
Note: Options A,B, C cause overflow but As per the Provisional Answer Key Option C is Correct
In 8-bit 2's complement representation, the range of representable integers is -128 to +127. An overflow occurs when the result of an addition falls outside this range. This happens if:
Two positive numbers are added and the result is negative (MSB is 1).
Two negative numbers are added and the result is positive (MSB is 0).
Based on the calculations, Options A, B, and C all cause an overflow.
Option A: $01010101 + 00110011$
Decimal: $85 + 51 = 136$.
$136$ is greater than the maximum limit of $127$.
Binary result: $10001000$ (The MSB is 1, interpreting two positive numbers as a negative result).
Result: Overflow.
Option B: $10011001 + 10101010$
Decimal: $-103 + (-86) = -189$.
$-189$ is less than the minimum limit of $-128$.
Binary result: $01000011$ (The MSB is 0, interpreting two negative numbers as a positive result).
Result: Overflow.
Option C: $01111111 + 00000001$
Decimal: $127 + 1 = 128$.
$128$ is greater than the maximum limit of $127$.
Binary result: $10000000$ (The largest positive number plus one yields the smallest negative number).
Result: Overflow.
Option D: $11110000 + 00010000$
Decimal: $-16 + 16 = 0$.
$0$ is within the range $[-128, 127]$.
Binary result: $00000000$.
Result: No Overflow.
Describe the issue with this question. Our team will review it.
Question ID: 11058
Message must be at least 5 characters.
Message must not exceed 2000 characters.
Login to view more questions
Login to Continue