Q 7. Quantum Computing and Machine Learning (Science and Technology)
Q7. Consider the following statements:
I. It is expected that Majorana 1 chip will enable quantum computing.
II. Majorana 1 chip has been introduced by Amazon Web Services (AWS).
III. Deep learning is a subset of machine learning.
Which of the statements given above are correct?
1. Correct Answer: C: I and III only
2. Explanation:
● Statement I is correct:
○ The Majorana 1 chip is indeed expected to enable advancements in quantum computing.
○ Quantum computing utilizes principles of quantum mechanics to process information in ways that classical computers cannot.
○ Majorana particles, which the chip is named after, are theorized to be useful in creating stable qubits for quantum computing.
○ The development of such chips is a significant step towards practical quantum computing applications.
● Statement II is incorrect:
○ The Majorana 1 chip has not been introduced by Amazon Web Services (AWS), but by Microsoft.
○ AWS is known for its cloud computing services and has been involved in quantum computing through its AWS Braket service, but it has not introduced a chip named Majorana 1.
○ The Majorana 1 chip is more likely associated with research institutions or companies specializing in quantum computing hardware.
● Statement III is correct:
○ Deep learning is indeed a subset of machine learning.
○ Machine learning is a broader field that involves algorithms and statistical models to enable computers to perform tasks without explicit instructions.
○ Deep learning is a specific approach within machine learning that uses neural networks with many layers (hence "deep") to model complex patterns in data.
○ It has been particularly successful in areas such as image and speech recognition.
Q 62. IT, Computers and Cyber Security
Consider the following statements:
I. Indian Railways have prepared a National Rail Plan (NRP) to create a future ready railway system by 2028.
II. Kavach is an Automatic Train Protection system developed in collaboration with Germany.
III. 'Kavach' system consists of RFID tags fitted on track in station section.
Which of the statements given above are not correct?
2. Explanation of the statements:
• Statement I is correct.
• The Indian Railways has indeed prepared a National Rail Plan (NRP).
• The objective of the NRP is to create a future-ready railway system by the year 2028.
• This plan aims to address the infrastructure needs and enhance the capacity of the railways to meet future demands.
• It is part of a broader strategy to modernize and improve the efficiency of the Indian Railways.
• Statement II is incorrect.
• Kavach is an Automatic Train Protection (ATP) system, but it is not developed in collaboration with Germany.
• It is an indigenous technology developed by Indian Railways.
• The system is designed to enhance safety by preventing train collisions through automatic braking and other safety measures.
• It is part of the Indian Railways' efforts to improve safety and operational efficiency.
• Statement III is incorrect.
• The 'Kavach' system does involve the use of RFID technology, but it is not limited to RFID tags fitted on tracks in station sections.
• RFID tags are used for various purposes, including train tracking and ensuring the correct operation of the Kavach system.
• The system includes multiple components such as onboard equipment, trackside devices, and centralized control systems to ensure comprehensive train protection.
• The primary function of Kavach is to prevent train collisions and ensure safe train operations through automatic control mechanisms.
Q . IT, Computers and Cyber Security
Which one of the following words/phrases is most appropriately used to denote "an interoperable network of 3D virtual worlds that can be accessed simultaneously by millions of users, who can exert property rights over virtual items"?
- Big data analytics: It refers to the process of examining large and varied data sets to uncover hidden patterns, unknown correlations, market trends, customer preferences, and other useful information.
- Cryptography: It is the practice and study of techniques for secure communication in the presence of third parties.
- Metaverse: It is the most appropriate term to denote "an interoperable network of 3D virtual worlds that can be accessed simultaneously by millions of users, who can exert property rights over virtual items."
- This term captures the idea of a network or system that connects multiple virtual worlds and allows users to have ownership and control over virtual items within those worlds.
- Virtual matrix: It does not accurately describe the concept of an interoperable network of 3D virtual worlds where users can exert property rights over virtual items.
Q . IT, Computers and Cyber Security
With reference to Non-Fungible Tokens (NFTs), consider the following statements: 1. They enable the digital representation of physical assets. 2. They are unique cryptographic tokens that exist on a blockchain. 3. They can be traded or exchanged at equivalency and therefore can be used as a medium of commercial transactions. Which of the statements given above are correct?
Q . IT, Computers and Cyber Security
Consider the following communication technologies: 1. Closed-circuit Television 2. Radio Frequency Identification 3. Wireless Local Area Network Which of the above are considered Short-Range devices/technologies ?
Q . IT, Computers and Cyber Security
Which one of the following is the context in which the term “qubit” is mentioned?
Q . IT, Computers and Cyber Security
Consider the following: 1. Aarogya Setu 2. CoWIN 3. DigiLocker 4. DIKSHA Which of the above are built on top of open-source digital platforms?
Q . IT, Computers and Cyber Security
With reference to Web 3.0, consider the following statements: 1. Web 3.0 technology enables people to control their own data. 2. In Web 3.0 world, there can be blockchain-based social networks. 3. Web 3.0 is operated by users collectively rather than a corporation. Which of the statements given above are correct?
Q . IT, Computers and Cyber Security
With reference to “Software as a Service (SaaS)”, consider the following statements: 1. SaaS buyers can customise the user interface and can change data fields. 2. SaaS users can access their data through their mobile devices. 3. Outlook, Hotmail and Yahoo! Mail are forms of SaaS. Which of the statements given above are correct?
Q . IT, Computers and Cyber Security
In India, the term “Public Key Infrastructure” is used in the context of
Q . IT, Computers and Cyber Security
With the present state of development, Artificial Intelligence can effectively do which of the following? 1. Bring down electricity consumption in industrial units 2. Create meaningful short stories and songs 3. Disease diagnosis 4. Text-to-speech conversion 5. Wireless transmission of electrical energy Select the correct answer using the code given below:
Q . IT, Computers and Cyber Security
For the measurement/estimation of which of the following are satellite images/remote sensing data used? 1. Chlorophyll content in the vegetation of a specific location 2. Greenhouse gas emissions from rice paddies of a specific location 3. Land surface temperatures of a specific location Select the correct answer using the code given below.
Q . IT, Computers and Cyber Security
With reference to communication technologies, what is/are the difference/differences between LTE (Long-Term Evolution) and VoLTE (Voice over Long-Term Evolution)? 1. LTE is commonly marketed as 3G and VoLTE is commonly marketed as advanced 3G. 2. LTE is data-only technology and VoLTE is voice-only technology. Select the correct answer using the code given below.
Q . IT, Computers and Cyber Security
In the context of digital technologies for entertainment, consider the following statements: 1. In Augmented Reality (AR), a simulated environment is created, and the physical world is completely shut out. 2. In Virtual Reality (VR), images generated from a computer are projected onto real-life objects or surroundings. 3. AR allows individuals to be present in the world and improves the experience using the camera of smart-phone or PC. 4. VR closes the world, and transposes an individual, providing complete immersion experience. Which of the statements given above is/are correct?
Q . IT, Computers and Cyber Security
Consider the following statements: A digital signature is 1. an electronic record that identifies the certifying authority issuing it 2. used to serve as a proof of identity of an individual to access information or server on Internet 3. an electronic method of signing an electronic document and ensuring that the original content is unchanged Which of the statements given above is/are correct?
Q . IT, Computers and Cyber Security
In the context of wearable technology, which of the following tasks is/are accomplished by wearable devices? 1. Location identification of a person 2. Sleep monitoring of a person 3. Assisting the hearing-impaired person Select the correct answer using the code given below:
Q . IT, Computers and Cyber Security
The identity platform ‘Aadhaar’ provides open Application Programming Interfaces (APIs)”. What does it imply? 1. It can be integrated into any electronic device. 2. Online authentication using iris is possible. Which of the statements given above is/are correct?
Q . IT, Computers and Cyber Security
In which of the following areas can GPS technology be used? (2018) 1. Mobile phone operations 2. Banking operations 3. Controlling the power grids Select the correct answer using the code given below:
Q . IT, Computers and Cyber Security
The terms ‘Wanna Cry, Petya and Eternal Blue’ sometimes mentioned in the news recently are related to
Q . IT, Computers and Cyber Security
When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day’s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognises the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers and AC machines get switched off automatically. On your way to office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly. In the context of emerging communication technologies, which one of the following terms best applies to the above scenario?
Q . IT, Computers and Cyber Security
“3D printing” has applications in which of the following? 1. Preparation of confectionery items 2. Manufacture of bionic ears 3. Automotive industry 4. Reconstructive surgeries 5. Data processing technologies Select the correct answer using the code given below:
Q . IT, Computers and Cyber Security
In India, it is legally mandatory for which of the following to report on cyber security incidents? 1. Service providers 2. Data centers 3. Body corporate Select the correct answer using the code given below:
Q . IT, Computers and Cyber Security
With reference to ‘Bitcoins’, sometimes seen in the news, which of the following statements is/are correct? 1. Bitcoins are tracked by the Central Banks of the countries. 2. Anyone with a Bitcoin address can send and receive Bitcoins from anyone else with a Bitcoin address. 3. Online payments can be sent without either side knowing the identity of the other. Select the correct answer using the code given below.
Q . IT, Computers and Cyber Security
A new optical disc format known as the Blu-ray disc (BD) is becoming popular. In what way is it different from the traditional DVD? 1. DVD supports standard definition video while BD supports high-definition video. 2. Compared to a DVD, the BD format has several times more storage capacity. 3. Thickness of BD is 2.4 mm while that of DVD is 1.2 mm. Which of the statements given above is/are correct?
Q . IT, Computers and Cyber Security
What is “virtual private network”?
Q . IT, Computers and Cyber Security
What is the difference between blue-tooth and Wi-Fi devices?
Q . IT, Computers and Cyber Security
Which among the following do/does not belong/belongs to the GSM family of wireless technologies? A. EDGE B. LTE C. DSL D. Both EDGE and LTE
Q . IT, Computers and Cyber Security
Consider the following: 1. Bluetooth device 2. Cordless phone 3. Microwave oven 4. Wi-Fi device Which of the above can operate between 2.4 and 2.5 GHz range of radio frequency band?
Q . IT, Computers and Cyber Security
WiMAX is related to which one of the following.
Q . IT, Computers and Cyber Security
Q . IT, Computers and Cyber Security
MCA-21 is a major initiative taken up by the Government of India in which one of the following areas?
Q . IT, Computers and Cyber Security
Consider the following statements: 1. Adam Osborne produced the first portable computer 2. Ian Wilmut created the first cloned sheep. Which of the statements given above is/are correct?
- Adam Osborne created the first commercially available portable computer, the Osborne 1, released in April 1981. It weighed 24.5 pounds (12 kg), cost US$1795—just over half the cost of a computer from other manufacturers with comparable features—and ran the popular CP/M 2.2 operating system.
- Sir Ian Wilmut, British developmental biologist was the first to use nuclear transfer of differentiated adult cells to generate a mammalian clone, a Finn Dorset sheep named Dolly, born in 1996.
Q . IT, Computers and Cyber Security
Param Padma, which was in news recently, is
Q . IT, Computers and Cyber Security
Consider the following statements: 1. Smart Card is a plastic card with an embedded microchip. 2. Digital Technology is primarily used with new physical communication medium such as satellite and fibre optics transmission. 3. A digital library is a collection of documents in an organized electronic form available on the Internet only. Which of these statements given above is/are correct?
Q . IT, Computers and Cyber Security
Which of the following pairs is not correctly matched?
- Reinhold Andreas Messner is an Italian mountaineer, explorer, and author from South Tyrol.
- He made the first solo ascent of Mount Everest and, along with Peter Habeler, the first ascent of Everest without supplemental oxygen.
- He was the first climber to ascend all fourteen peaks over 8,000 metres above sea level.
- All others are correct.
Q . IT, Computers and Cyber Security
Consider the following statements: 1. Smart Card is a plastic card with an embedded microchip 2. Digital technology is primarily used with new physical communication medium such as satellite and fibre optics transmission 3. A digital library is a collection of documents in an organized electronic form available on the Internet only Which of the statements given above is/are correct?
Q . IT, Computers and Cyber Security
Q . IT, Computers and Cyber Security
The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of
Q . IT, Computers and Cyber Security
For reproducing sound, a CD (Compact Disc) audio player uses a
Q . IT, Computers and Cyber Security
With reference to 'Near Field Communication (NFC) Technology', which of the following statements is/are correct? 1. It is a contactless communication technology that uses electromagnetic radio fields. 2. NFC is designed for use by devices which can be at a distance of even a meter from each other 3. NFC can use encryption when sending sensitive information. Select the correct answer using the code given below.