Q 7. Quantum Computing and Machine Learning (Science and Technology)

Q7. Consider the following statements:
I. It is expected that Majorana 1 chip will enable quantum computing.
II. Majorana 1 chip has been introduced by Amazon Web Services (AWS).
III. Deep learning is a subset of machine learning.
Which of the statements given above are correct?

a) I and II only
b) II and III only
c) I and III only
d) I, II and III
Answer: c
Practice This Question in Exam Mode

1. Correct Answer: C: I and III only
 
 2. Explanation:
 
     ● Statement I is correct:  
           ○ The Majorana 1 chip is indeed expected to enable advancements in quantum computing.
           ○ Quantum computing utilizes principles of quantum mechanics to process information in ways that classical computers cannot.
           ○ Majorana particles, which the chip is named after, are theorized to be useful in creating stable qubits for quantum computing.
           ○ The development of such chips is a significant step towards practical quantum computing applications.
 
     ● Statement II is incorrect:  
           ○ The Majorana 1 chip has not been introduced by Amazon Web Services (AWS), but by Microsoft.
           ○ AWS is known for its cloud computing services and has been involved in quantum computing through its AWS Braket service, but it has not introduced a chip named Majorana 1.
           ○ The Majorana 1 chip is more likely associated with research institutions or companies specializing in quantum computing hardware.
 
     ● Statement III is correct:  
           ○ Deep learning is indeed a subset of machine learning.
           ○ Machine learning is a broader field that involves algorithms and statistical models to enable computers to perform tasks without explicit instructions.
           ○ Deep learning is a specific approach within machine learning that uses neural networks with many layers (hence "deep") to model complex patterns in data.
           ○ It has been particularly successful in areas such as image and speech recognition.

Click to Read Full Explanation and All the Options Explained

Q 62. IT, Computers and Cyber Security

Consider the following statements:

I. Indian Railways have prepared a National Rail Plan (NRP) to create a future ready railway system by 2028.

II. Kavach is an Automatic Train Protection system developed in collaboration with Germany.

III. 'Kavach' system consists of RFID tags fitted on track in station section.

Which of the statements given above are not correct?

a) I and II only
b) II and III only
c) I and III only
d) I, II and III
Answer: a
Practice This Question in Exam Mode

1. Correct Answer: Statements II and III are not correct.

2. Explanation of the statements:

 • Statement I is correct.  
 • The Indian Railways has indeed prepared a National Rail Plan (NRP).
 • The objective of the NRP is to create a future-ready railway system by the year 2028.
 • This plan aims to address the infrastructure needs and enhance the capacity of the railways to meet future demands.
 • It is part of a broader strategy to modernize and improve the efficiency of the Indian Railways.

 • Statement II is incorrect.  
 • Kavach is an Automatic Train Protection (ATP) system, but it is not developed in collaboration with Germany.
 • It is an indigenous technology developed by Indian Railways.
 • The system is designed to enhance safety by preventing train collisions through automatic braking and other safety measures.
 • It is part of the Indian Railways' efforts to improve safety and operational efficiency.

 • Statement III is incorrect.  
 • The 'Kavach' system does involve the use of RFID technology, but it is not limited to RFID tags fitted on tracks in station sections.
 • RFID tags are used for various purposes, including train tracking and ensuring the correct operation of the Kavach system.
 • The system includes multiple components such as onboard equipment, trackside devices, and centralized control systems to ensure comprehensive train protection.
 • The primary function of Kavach is to prevent train collisions and ensure safe train operations through automatic control mechanisms.
Click to Read Full Explanation and All the Options Explained

Q . IT, Computers and Cyber Security

Which one of the following words/phrases is most appropriately used to denote "an interoperable network of 3D virtual worlds that can be accessed simultaneously by millions of users, who can exert property rights over virtual items"?

a) Big data analytics
b) Cryptography
c) Metaverse
d) Virtual matrix
Answer: c
Practice This Question in Exam Mode

  • Big data analytics: It refers to the process of examining large and varied data sets to uncover hidden patterns, unknown correlations, market trends, customer preferences, and other useful information.
  • Cryptography: It is the practice and study of techniques for secure communication in the presence of third parties.
  • Metaverse: It is the most appropriate term to denote "an interoperable network of 3D virtual worlds that can be accessed simultaneously by millions of users, who can exert property rights over virtual items."
  • This term captures the idea of a network or system that connects multiple virtual worlds and allows users to have ownership and control over virtual items within those worlds.
  • Virtual matrix: It does not accurately describe the concept of an interoperable network of 3D virtual worlds where users can exert property rights over virtual items.
Click to Read Full Explanation and All the Options Explained

Q . IT, Computers and Cyber Security

With reference to Non-Fungible Tokens (NFTs), consider the following statements: 1. They enable the digital representation of physical assets. 2. They are unique cryptographic tokens that exist on a blockchain. 3. They can be traded or exchanged at equivalency and therefore can be used as a medium of commercial transactions. Which of the statements given above are correct?

a) 1 and 2 only
b) 2 and 3 only
c) 1 and 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Consider the following communication technologies: 1. Closed-circuit Television 2. Radio Frequency Identification 3. Wireless Local Area Network Which of the above are considered Short-Range devices/technologies ?

a) 1 and 2 only
b) 2 and 3 only
c) 1 and 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Which one of the following is the context in which the term “qubit” is mentioned?

a) Cloud Services
b) Quantum Computing
c) Visible Light Communication Technologies
d) Wireless Communication Technologies
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Consider the following: 1. Aarogya Setu 2. CoWIN 3. DigiLocker 4. DIKSHA Which of the above are built on top of open-source digital platforms?

a) 1 and 2 only
b) 2, 3 and 4 only
c) 1, 3 and 4 only
d) 1, 2, 3 and 4
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

With reference to Web 3.0, consider the following statements: 1. Web 3.0 technology enables people to control their own data. 2. In Web 3.0 world, there can be blockchain-based social networks. 3. Web 3.0 is operated by users collectively rather than a corporation. Which of the statements given above are correct?

a) 1 and 2 only
b) 2 and 3 only
c) 1 and 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

With reference to “Software as a Service (SaaS)”, consider the following statements: 1. SaaS buyers can customise the user interface and can change data fields. 2. SaaS users can access their data through their mobile devices. 3. Outlook, Hotmail and Yahoo! Mail are forms of SaaS. Which of the statements given above are correct?

a) 1 and 2 only
b) 2 and 3 only
c) 1 and 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

In India, the term “Public Key Infrastructure” is used in the context of

a) Digital security infrastructure
b) Food security infrastructure
c) Health care and education infrastructure
d) Telecommunication and transportation infrastructure
Answer: a
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

With the present state of development, Artificial Intelligence can effectively do which of the following? 1. Bring down electricity consumption in industrial units 2. Create meaningful short stories and songs 3. Disease diagnosis 4. Text-to-speech conversion 5. Wireless transmission of electrical energy Select the correct answer using the code given below:

a) 1, 2, 3 and 5 only
b) 1, 3, and 4 only
c) 2, 4, and 5 only
d) 1, 2, 3, 4 and 5
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

For the measurement/estimation of which of the following are satellite images/remote sensing data used? 1. Chlorophyll content in the vegetation of a specific location 2. Greenhouse gas emissions from rice paddies of a specific location 3. Land surface temperatures of a specific location Select the correct answer using the code given below.

a) 1 Only
b) 2 and 3 only
c) 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

With reference to communication technologies, what is/are the difference/differences between LTE (Long-Term Evolution) and VoLTE (Voice over Long-Term Evolution)? 1. LTE is commonly marketed as 3G and VoLTE is commonly marketed as advanced 3G. 2. LTE is data-only technology and VoLTE is voice-only technology. Select the correct answer using the code given below.

a) 1 only
b) 2 only
c) Both 1 and 2
d) Neither 1 nor 2
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

In the context of digital technologies for entertainment, consider the following statements: 1. In Augmented Reality (AR), a simulated environment is created, and the physical world is completely shut out. 2. In Virtual Reality (VR), images generated from a computer are projected onto real-life objects or surroundings. 3. AR allows individuals to be present in the world and improves the experience using the camera of smart-phone or PC. 4. VR closes the world, and transposes an individual, providing complete immersion experience. Which of the statements given above is/are correct?

a) 1 and 2 only
b) 3 and 4
c) 1, 2 and 3
d) 4 only
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Consider the following statements: A digital signature is 1. an electronic record that identifies the certifying authority issuing it 2. used to serve as a proof of identity of an individual to access information or server on Internet 3. an electronic method of signing an electronic document and ensuring that the original content is unchanged Which of the statements given above is/are correct?

a) 1 only
b) 2 and 3 only
c) 3 only
d) 1, 2 and 3
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

In the context of wearable technology, which of the following tasks is/are accomplished by wearable devices? 1. Location identification of a person 2. Sleep monitoring of a person 3. Assisting the hearing-impaired person Select the correct answer using the code given below:

a) 1 only
b) 2 and 3 only
c) 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

The identity platform ‘Aadhaar’ provides open Application Programming Interfaces (APIs)”. What does it imply? 1. It can be integrated into any electronic device. 2. Online authentication using iris is possible. Which of the statements given above is/are correct?

a) 1 only
b) 2 only
c) Both 1 and 2
d) Neither 1 nor 2
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

In which of the following areas can GPS technology be used? (2018) 1. Mobile phone operations 2. Banking operations 3. Controlling the power grids Select the correct answer using the code given below:

a) 1 only
b) 2 and 3 only
c) 1 and 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

The terms ‘Wanna Cry, Petya and Eternal Blue’ sometimes mentioned in the news recently are related to

a) Exoplanets
b) Crypto currency
c) Cyber attacks
d) Mini satellites
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day’s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognises the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers and AC machines get switched off automatically. On your way to office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly. In the context of emerging communication technologies, which one of the following terms best applies to the above scenario?

a) Border Gateway Protocol
b) Internet of Things
c) Internet Protocol
d) Virtual Private Network
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

“3D printing” has applications in which of the following? 1. Preparation of confectionery items 2. Manufacture of bionic ears 3. Automotive industry 4. Reconstructive surgeries 5. Data processing technologies Select the correct answer using the code given below:

a) 1, 3 and 4 only
b) 2, 3 and 5 only
c) 1 and 4 only
d) 1, 2, 3, 4 and 5
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

In India, it is legally mandatory for which of the following to report on cyber security incidents? 1. Service providers 2. Data centers 3. Body corporate Select the correct answer using the code given below:

a) 1 only
b) 1 and 2 only
c) 3 only
d) 1, 2 and 3
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

With reference to ‘Bitcoins’, sometimes seen in the news, which of the following statements is/are correct? 1. Bitcoins are tracked by the Central Banks of the countries. 2. Anyone with a Bitcoin address can send and receive Bitcoins from anyone else with a Bitcoin address. 3. Online payments can be sent without either side knowing the identity of the other. Select the correct answer using the code given below.

a) 1 and 2 only
b) 2 and 3 only
c) 3 only
d) 1, 2 and 3
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

A new optical disc format known as the Blu-ray disc (BD) is becoming popular. In what way is it different from the traditional DVD? 1. DVD supports standard definition video while BD supports high-definition video. 2. Compared to a DVD, the BD format has several times more storage capacity. 3. Thickness of BD is 2.4 mm while that of DVD is 1.2 mm. Which of the statements given above is/are correct?

a) 1 only
b) 1 and 2 only
c) 2 and 3 only
d) 1, 2 and 3
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

What is “virtual private network”?

a) It is a private computer network of an organization where the remote users can transmit encrypted information through the server of the organization.
b) It is a computer network across a public internet the provides users access to their organizations network while maintaining the security of the information transmitted.
c) It is a computer network in which users can access a shared pool of computing resources through a service provider.
d) None of the statements (a), (b) and (c) given above is correct description of virtual private network.
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

What is the difference between blue-tooth and Wi-Fi devices?

a) Bluetooth uses 2.4 GHz radio frequency band, whereas Wi-Fi can use 2.4 GHz or 5 GHz frequency band.
b) Bluetooth is used for wireless local area networks (WLAN) only, whereas Wi-Fi is used for wireless wide area networks (WWAN) only.
c) When information is transmitted between two devices using blue-tooth technology, the devices have to be in the line of sight of each other, but when Wi-Fi technology is used the devices need not be in the line of sight of each other.
d) The statements (a) and (b) given above are correct in this context.
Answer: a
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Which among the following do/does not belong/belongs to the GSM family of wireless technologies? A. EDGE B. LTE C. DSL D. Both EDGE and LTE

a) EDGE
b) LTE
c) DSL
d) Both EDGE and LTE
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Consider the following: 1. Bluetooth device 2. Cordless phone 3. Microwave oven 4. Wi-Fi device Which of the above can operate between 2.4 and 2.5 GHz range of radio frequency band?

a) 1 and 2 only
b) 1 and 4 only
c) 1, 2 and 4 only
d) 1, 2, 3 and 4
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

WiMAX is related to which one of the following.

a) Biotechnology
b) Space technology
c) Missile technology
d) Communication technology
Answer: d
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Match List I with List II and select the correct answer using the code given below the lists: List I (Company) A. Chevron B. AT&T C. AMD D. Enercon GmbH List II (Major Area/Product) 1. Wind energy 2. Oil 3. Telephone, internet 4. Microprocessor Codes: A B C D
a) 2 1 4 3
b) 4 3 2 1
c) 2 3 4 1
d) 4 1 2 3
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

MCA-21 is a major initiative taken up by the Government of India in which one of the following areas?

a) Foreign direct investment in India
b) Attracting international tourists
c) E-governance
d) Modernization of airports
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Consider the following statements: 1. Adam Osborne produced the first portable computer 2. Ian Wilmut created the first cloned sheep. Which of the statements given above is/are correct?

a) 1 only
b) 2 only
c) Both 1 and 2
d) Neither 1 nor 2
Answer: c
Practice This Question in Exam Mode

  •   Adam Osborne created the first commercially available portable computer, the Osborne 1, released in April 1981. It weighed 24.5 pounds (12 kg), cost US$1795—just over half the cost of a computer from other manufacturers with comparable features—and ran the popular CP/M 2.2 operating system.
  •   Sir Ian Wilmut, British developmental biologist was the first to use nuclear transfer of differentiated adult cells to generate a mammalian clone, a Finn Dorset sheep named Dolly, born in 1996.
Click to Read Full Explanation and All the Options Explained

Q . IT, Computers and Cyber Security

Param Padma, which was in news recently, is

a) A new Civilian Award instituted by the Govt of India
b) The name of a supercomputer developed by India
c) The name given to a proposed network of canals linking north
d) A software programme to facilitate e-governance in Madhya Pradesh
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Consider the following statements: 1. Smart Card is a plastic card with an embedded microchip. 2. Digital Technology is primarily used with new physical communication medium such as satellite and fibre optics transmission. 3. A digital library is a collection of documents in an organized electronic form available on the Internet only. Which of these statements given above is/are correct?

a) 3 only
b) 1 and 2
c) 2 and 3
d) 1, 2 and 3
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

Which of the following pairs is not correctly matched?

a) Reinhold Messner - Computer Technology
b) Harlow Shapley - Astronomy
c) Gregor Mendel - Hereditary Theory
d) Godfrey Hounsfield - CT Scan
Answer: a
Practice This Question in Exam Mode

  •   Reinhold Andreas Messner is an Italian mountaineer, explorer, and author from South Tyrol.
  •   He made the first solo ascent of Mount Everest and, along with Peter Habeler, the first ascent of Everest without supplemental oxygen.
  •   He was the first climber to ascend all fourteen peaks over 8,000 metres above sea level.
  •   All others are correct.
Click to Read Full Explanation and All the Options Explained

Q . IT, Computers and Cyber Security

Consider the following statements: 1. Smart Card is a plastic card with an embedded microchip 2. Digital technology is primarily used with new physical communication medium such as satellite and fibre optics transmission 3. A digital library is a collection of documents in an organized electronic form available on the Internet only Which of the statements given above is/are correct?

a) 3 only
b) 1 and 2
c) 2 and 3
d) 1, 2 and 3
Answer: b
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

For reproducing sound, a CD (Compact Disc) audio player uses a
a) quartz crystal
b) titanium needle
c) laser beam
d) barium titanate ceramic
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of

a) eight binary digits
b) eight decimal digits
c) two binary digits
d) two decimal digits
Answer: a
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

For reproducing sound, a CD (Compact Disc) audio player uses a

a) quartz crystal
b) titanium needle
c) laser beam
d) barium titanate ceramic
Answer: c
Practice This Question in Exam Mode

Q . IT, Computers and Cyber Security

With reference to 'Near Field Communication (NFC) Technology', which of the following statements is/are correct? 1. It is a contactless communication technology that uses electromagnetic radio fields. 2. NFC is designed for use by devices which can be at a distance of even a meter from each other 3. NFC can use encryption when sending sensitive information. Select the correct answer using the code given below.

a) 1 and 2 only
b) 3 only
c) 1 and 3 only
d) 1, 2 and 3
Answer: c
Practice This Question in Exam Mode