UGC NET & SET - Paper 1
UGC NET & SET - Paper 1
PAPER 1
PART - I
Professor Academy
Copyright © 2021 by Professor Academy
Year : 2021
Published by :
Professor Academy
No:42, Railway Border Road,
Kodambakkam,
Chennai- 600 024.
7550100920, 81244 08794
[email protected]
professoracademy.in
Swapnit Pradhan Karunya Janaky Stephy Monisha.P Aasha John Vageeswari. U Ajay Mukund
99.99 Percentile 99.96 98.92 99.57 99.65 99.57
JRF JRF JRF JRF JRF JRF
¡¦¤£ª¡££¡£¤¢£¤££¤¤¡¤¤
§£¤ £¡¤£¡¤ ¬န££¦¡¦£¤§Ŋ
¤¡¦¡¤£¡¤£ª¡¡¡ၹထª¤ ¤££¤ထ¤
ထ¡£¦¡§¤¤န¡£¤£££¡Ťª¤¡¤££
¬¦£¤¡£¡¤¤¡¡¤¤¤£¦£န¬¡¦¤£
¦¡¡££¡ထª¢¤¨¤¤¡£¡£¦¤£ထ¨
ª¤£££¦¡¤¤¤£ £¡¤££ª£
£¤¬ထª¨န ¤¤¤£ª¤¡¦¤£
¤¡¡¡¤£ª Ŋ¤ Ч¤§£¤¨¡£¤¤¡¦¤£¦£
ၼ¡¥£ထª¤¦¤ª£¤¢££¦ª£ဖ¦£¤£¤¤
¡Ś¤¤£¤¡¤¬န£¤¢¨¤£ª¦¨¦¡
¡£¦¤£¤¬¦¡£¡ၹန¤ဠ£¦¡¤ဘ¤¨¡®£¤ဘ
Saravana Perumal M
Director, Professor Academy
CONTENT
1. Communication 1.1
» Communication – An Introductory Part 1.2
» Effective Communication 1.14
» Barriers to Communication 1.26
» Communication Model and Theories 1.31
» Mass Media 1.41
Why does NET exam demand aspirants to skill application oriented (situation based) questions falls
in Communication? from these mentioned modules. The newly added module
mass media gained importance in the recent exams held.
Brilliant communication skill is the key to overall
This clearly portrays that the pattern of exam shifts
development of students, Research scholars, Professors
towards the factual based questions and terminologies
besides academic success. The communication skill
º¿ ¾²ÄÄ ¾¶µº² ²¿µ À´º¶ÅÊ ²½À¿¸ ȺŹ ·¶È ö²½ʉź¾¶
ºÄ Æ¿µ¶¿º²³½Ê ʶ ȱ¿¶ÄŠļº½½ À· ² Ŷ²´¹¶Ã ʲŠº¿ÄÁºÃ¶Ä
questions from classroom communication and its
and brings out the latent potential of the learners.
barrier. Therefore, much importance, it is to concentrate
Irrespective of the subject, the seamless communication
on Emergence of mass media, its elements, very minute
is the quintessential element of success. This unit of the
µºȮ¶Ã¶¿´¶³¶Åȶ¶¿Å¹¶Å¶Ã¾º¿À½À¸º¶ÄÄÆ´¹²ÄǽÀ¸ȹ³½À¸ʁ
³ÀÀ¼ºÄ²¿¶ȮÀÃÅÅÀĶ¿ÄºÅºË¶Å¹¶Å¶²´¹¶ÃIJ³ÀÆÅʶ¶Ç¶Ãʉ
¿¶È¾¶µº²ȹÄÀ´º²½¾¶µº²ʁ¶Å´ʇʁȹº´¹¹²Ä³¶¶¿µºÄ´ÆÄ͵
growing importance of communication skills that will
in our material after analysing recent previous year
help carve out themselves and their potential students as
question papers thoroughly by the team of specialised
well. Candidates preparing for the NET exam can start
faculties.
their preparation with this unit because communication
is one of the simplest units ever and it takes very less Blueprint of communication unit
time to read. Generally, 5 questions are asked from this Dear aspirants, understanding the fundamental
unit. Áú¿´ºÁ½¶Ä²Äȶ½½²Äʶ²ÃÅÀ·¶Ȯ¶´ÅºÇ¶´À¾¾Æ¿º´²ÅºÀ¿
Syllabus with the aid of media is needed to score full marks in this
subject. After a complete and detailed analysis syllabus
• Communication: Meaning, types and characteristics
and recent exam questions, the entire communication
of communication.
content has been made as modules in accordance with
• Ȯ¶´ÅºÇ¶ ´À¾¾Æ¿º´²ÅºÀ¿ʃ ¶Ã³²½ ²¿µ À¿ʉǶó²½ʁ the same and the modules are
¿Å¶ÃʉÆ½ÅÆÃ²½ ²¿µ ¸ÃÀÆÁ ´À¾¾Æ¿º´²ÅºÀ¿Äʁ
➢ Communication – an introductory part
Classroom communication.
➢ Ȯ¶´ÅºÇ¶´À¾¾Æ¿º´²ÅºÀ¿
• ²Ãú¶ÃÄÅÀ¶Ȯ¶´ÅºÇ¶´À¾¾Æ¿º´²ÅºÀ¿ʇ
➢ Barriers to communication
• ²ÄÄʉ¶µº²²¿µÀ´º¶ÅÊʇ
➢ Communication model and Theories
Trend Analysis
➢ Mass Media
There is an evident shift from mere factual questions to
ö²½ʉź¾¶ ²¿µ ²ÁÁ½º´²ÅºÀ¿ʉÀú¶¿Å¶µ À¿¶Äʇ ¹¶ ²ÄÁºÃ²¿ÅÄ After each module level 1 questions which are
are expected to possess a good understanding about memory based questions assessing recollecting ability of
communication concepts and theories, right from its ʶ²ÄÁºÃ²¿ÅIJ¿µ½¶Ç¶½ЄÂƶÄźÀ¿Äȹº´¹²Ã¶²ÁÁ½º´²ÅºÀ¿ʉ
origin to its incredible peaks in the modern world such based questions assessing the conceptual understanding
as social media and new media. Familiarity in human of the aspirants has been given with the answer key,
ÁÄÊ´¹À½À¸Ê º¿ ʶ ÁÃÀ´¶ÄÄ À· ¶Ȯ¶´ÅºÇ¶ ´À¾¾Æ¿º´²ÅºÀ¿ which the candidate can practice to bench mark their
along with the awareness of probable barriers which preparation.
are required to be eliminated from the process of
ŷŤŵŷŨŤŧŬűŪʁŶŦŲŵŨťŨŷŷŨŵʋ
communication would help score better in this unit as
Professor Academy
objective is accomplished. In communication
Communication - an Introduction
interpretation of a message depends upon the
Communication can be defined as, “ the context. Sometimes communication stimuli are used
process of understanding and sharing meaning”. to convey the messages are known as codes.
Communication
Transmission Channel
Elements of communication
Communication is a process of sending and Noise
receiving a message through verbal or non-verbal
means, which may be speech or oral communication, Encoding “How are you” = Message Decoding
writing and graphical representations, signs, signals Channel
below:
Psychological context
Sender/ Source: The Sender is a person who initiates, Feedback Channel
generates and sends the message. The sender is the
source of message. The communication process begins Transmission/ medium/ Channel: Transmission
when the sender develops an idea (usually with a involves selecting the medium or channel of
thought in his mind) or message he wants to transmit. communication. Once decided that the message
He must arrange the ideas in a manner that can be has to be sent in writing, the sender may select the
understood by the receiver. For instance, a lecturer electronic channel and the medium of e-mail or fax.
Short messages can be transmitted through telephone
delivering a lecture in the classroom is the sender of the
but lengthy messages can be sent through letters or
message or a manager addressing his team in a meeting circulars. Choice of the channel depends upon;
is sender of the message.
• The message to be conveyed
Message: The Message is the idea or information that
• Personal biases of the sender
the sender wants to convey. He may convey it verbally • Nature of information
(by writing or speaking) or non-verbally (through
gestures or body language). Whatever be the form, Short messages are generally sent through
the message should be clearly formed so that desired telephone whereas drawings, charts and illustrations
1.2
Professor Academy
form part of the message, it should be sent in writing. when everybody has read and signed the notice.
Personal biases include the sender’s preference Subordinates will give feedback on the notice and
for a particular channel. Some senders prefer to recommend changes, if required. Managers can
communicate in writing, howsoever short the implement the notice only if it is accepted by the
Communication
message may be and, therefore, prefer the written subordinates, unless it is an order.
channel of transmission. Nature of information refers • Feedback plays important role in two-way
to immediacy and confidentiality of information. communication. In one-way communication,
Confidential information where immediate feedback sender communicates with the receiver
is required is generally transmitted orally. without getting any feedback but in two-way
Receiver: The Receiver is the person or a group communication, receiver provides feedback to
of people to whom the message is conveyed. In the sender. Though one-way communication
case of telephonic conversation, the sender can takes less time and is more orderly (it avoids noise
send a message to one receiver but in case of group and chaos), feedback in two-way commnication
discussions, seminars and conferences, receivers can makes it more accurate and precise.
be more than one. The message must be designed,
encoded and transmitted in a manner that a receiver
Process of communication
can understand it easily. Use of technical words, Communication process is a sequence of
jargons and complicated symbols should be avoided. activities where the message is created, encoded,
Depending on the channel selected, receiver may be a sent and message sent is decoded understood by
listener, viewer or a reader. the receiver in its intended meaning. A process is “a
Decoding: Decoding is a process of giving systematic series of actions, operations or series of
meaningful interpretation to the message. On changes directed to some end.” The stages of message
receiving the message, the receiver translates the processing involves perception, understanding
symbols into meaningful information to the best selection internalization, action. However, in real life
of his ability. Communication is effective if the situations, communication process is more complex
receiver understands the message in the same way as than it sounds. It consists of a series of elements
intended by the sender. The receiver must, therefore, which results in sharing of meaning by sender and
be familiar with the codes and symbols used by the receiver, the Process of Communication are of two
sender. phases. They are transmission Phase and Feedback
phase.
Feedback:
• Feedback is the receiver’s response to sender’s ➢ Transmission Phase - The message is transmitted
message. The receiver communicates his reaction from Sender to Receiver. It consists of elements
to the sender through words, symbols or gestures. such as sender(source), message, channel, receiver.
It is the reversal of communication process where ➢ Feedback Phase – The Response or Feedback re-
receiver becomes the sender and sender becomes ceived by the sender from the Receiver. So, here
the receiver. Unless the receiver responds to the
receiver sends the message. It consists of elements
message, communication process is incomplete.
• Feedback helps the sender to transform his such as feedback, environment or ambiance from
message, if needed. It also allows the receiver to which it is received, context of feedback and also
clear doubts about the message, ask questions interpretation of feedback.
to build his confidence and enable the sender
to know the efficiency of the message. Feedback Goffman´s Theory of Communication
makes the communication process complete. Constraints
• In face-to-face communication, the sender can The systematic framework for the analysis
immediately receive the feedback but in written of discourse is provided by Goffman´s theory
communication, it takes time for the sender to of communication constraints. It claims that
receive feedback on the message. A written notice certain characteristics of verbal communication
sent by manager to the employees to work six are systematically controlled by the nature of
days a week instead of five can be implemented
Communication
SCRATCHES
Engraved pieces of understanding Of the origins While Chinese inscriptions
ochre in South Africa’s of human expression. To in tortoise shells, also known
Blombos Cave date date, the oldest known cave as oracle bones, can be traced
as far back as 100,000 painting is a 40,800-year-old back to as early as 6600 B.C.E.,
years ago, providing red disk found in El Castillo, the bulk of these inscriptions
some of the earliest Spain, followed closely by were made during the Shang
evidence of the human 35,000-year-old works in Dynasty, between 1300 and
ability to create Sulawesi, Indonesia and 1100 B.C.E.
symbols. Chauvet Cave, France.
3500 B.C.E. 3200 B.C.E. -2150 B.C.E.
CUNEIFORM HIEROGLYPHICS THE EPIC OF
Cuneiform, a system Egyptian hieroglyphs, dating GILGAMESH
of making wedge- to 3200 B.C.E., contain While the real Gilgamesh ruled
shaped impressions different types of characters the ancient city-state of Uruk in
into a tablet of clay, that represent either words or 2700 B.C.E., Sumerians wrote
was developed be- sounds. “Hieroglyph” means tales about his adventures for
tween 3500 and 3000 “holy writing” in Greek; the centuries in what is considered
B. C.E. by the Sume- Egyptians called the symbols one of the first works of
rians in Mesopotamia “medunetjer,” or “the gods’ literature. The most complete
and is one of the earli- words.” version of this epic poem is
est forms of writing. recorded in the Akkadian
language on 12 clay tablets.
-1900-1700 B.C.E. A.D. 600 1824
PROTO-SINAITIC PRINTING BRAILLE
ALPHABET Around A.D. 600, the Chinese Louis Braille’s invention
Sometime between developed woodblock of Braille in 1824 brought
1900 and 1700 B.C.E, printing, an early printing reading and writing to the
Semitic-speaking technique that carved wood visually impaired. Originally
peoples adapted into stamps. In the mid- featuring a series of dot patterns
Egyptian hieroglyphs 1400s, Johannes Gutenberg representing the French
into Proto-Sinaitic expedited the process with language, Braille today serves
script, the world’s mechanical movable type almost every language.
first alphabet. More and the printing press, which
than 1,000 years later, gaverise to mass printing.
the Latin alphabet
emerged.
1958 1969 1999
PEACE SYMBOL DIGITAL EMOJIS
& SMILEY FACE COMMUNICATION In 1999, the Japanese cell phone
In 1958, British In 1969, UCLA student company NTT DOCOMO
artist Gerald Holtom Charles Kline set off a released the first emojis, a set
designed the famous revolution in communication of 176 characters designed by
peace sign for a when he sent the incomplete Shigetaka Kurita. Twelve years
nuclear disarmament word ‘‘10” to a computer later, Apple released its widely
c a m p a i g n , at Stanford University over popular set of emojis.
creating a form of ARPANET. More digital
communication both communication followed: the
portable and truly first mobile phone call (1973),
international. Harvey the invention of the World
Ball repeated the Wide Web (1989), and the
symbolic success with first text message (1992).
the iconic smiley face
in 1963.
INTERESTING FACTS!
The Acta diurna (before 59 B.C) also called Acta populi or Acta publica is a recorded official business and matters of
Th
public interest. The Acta diurna constituted a type of daily gazette and thus it was, in a sense, the prototype of the
modern newspaper.
1.5
Professor Academy
Non-Verbal Communication
Open communication system (Theory of
Verbal communication) In this type of communication, messages
are relayed without the transmission of words. The
Verbal communication is a subsystem of
Communication
1.6
Professor Academy
Face to face
Oral
Communication
Verbal Distance
Written
Based on
Media/Expression/
Channel Visual
Non-Verbal Gesture
Audio
b) Types based on Direction of flow two person in the similar levels of the organization.
• Vertical: The information or data flows up and • Diagonal: This is the communication across the
down in the organizational structure. This can cross-functional levels of employees from various
departments of the organization. The other form
be either upward (from subordinate to boss) or
is the informal or casual communication which
downward (from boss to subordinate)
is the general communication between random
• Horizontal: This is the communication between people of the organizations.
Upward Downward
c) Types based on Organisational relations rules, processes, system, formalities and chain of
command.
• Formal communication refers to interchange
of information officially (systematic flow of d) Types based on Agents on Communication
information). The flow of communication is
Interpersonal communications:
controlled and is a deliberate effort. Hence formal
communication are slow and rigid. This makes it • Interpersonal communication refers to the type
possible for the information to reach the desired of communication where two people are provided
place without any hindrance and in a proper way. with the means of interaction with one another
Formal Communication involves Hierarchy. and are able to exchange information.
• The Informal Communication (grapevine • Interpersonal communication can be direct or
communication) is the casual and unofficial form mediated, depending on whether the sender and
of communication where in the information is the receiver of the information in the process of
exchanged spontaneously between two or more communication use media, such as telephone or
persons without conforming the prescribed official email.
1.7
Professor Academy
Based on Agents on
Communication
Communication
Communication
forming, storming, norming, performing. social media and print. The sender of the message
Mass communication is usually a professional communicator who often
represents an organization. Mass communication
Mass communication is a process in which a is an expensive process. Unlike interpersonal
person, group of people or an organization sends a communication, feedback for mass communication is
message through a channel of communication to a usually slow and indirect.
large group of anonymous and heterogeneous people
Ask Distinguish
Questions Perspectives
Intercultural Communication:
Think Builf Self Intercultural communication (or cross –
Twice Awareness cultural communication) is a discipline
Ten Strategies that studies communication across different
Be for Effective Recognize cultures and social groups or how culture
Flexible Cross - Cultural the
Complexity affects communication. It describes the
Communication wide range of communication processes and
problems that naturally appears within an
Be Avoid Stereo organization or social context made up of
Honest typing
individuals from different religious, social,
Listen Respect ethnic and educational backgrounds.
Actively Differences
by the receiver in the desired sense. carrying out directions and activities and facilitates
10. Goal-oriented: control.
Communication is goal-oriented. Unless the Management functions can be performed
receiver and sender know the purpose they intend successfully when managers communicate face-
to achieve through communication, it has little to-face, telephonically or electronically with their
practical utility. superiors, peers, subordinates, customers, suppliers,
11. Foundation of management: competitors etc. Even when they are not talking,
Though communication is a directing they are busy reading or writing reports, memos and
function, it is important for other managerial letters which are different forms of communication.
functions also. Designing plans and organisation Communication has reduced geographical distances
structures, motivating people to accomplish goals into storable and confidential forms and has facilitated
and controlling organisational activities; all require a large number of people to interact with each other.
communication amongst managers at various levels. It is important that communication should
12. Communication A means, not an end: be effective. Effective communication is transfer of
Communication is not an end. Effective information along with transfer of understanding. It
communication is a means towards achieving the means transfer of messages, ideas and information
end, that is, goal accomplishment. It smoothens in a manner that the sender and receiver understand
managerial operations by facilitating planning, the subject in the same sense.
organising, staffing, directing and controlling
functions. “It is the process of sending a message in
such a way that the message received is as close
13. Human activity: in meaning as possible to the message intended.”
Communication makes accomplishment Effective communication, thus, takes place when
of organisational goals possible, it is essential that receiver understands the message in the same sense
people understand and like each other. If people do as the sender wants to convey.
not understand each others’ viewpoint, there cannot
be effective communication. Communication is the foundation for human
interaction that develops common understanding
14. Inter-disciplinary: amongst two or more persons. This promotes
Communication is the art of how common objectives through coordinated efforts
communicators use knowledge of different fields amongst people belonging to different functional
of study like anthropology, psychology and departments.
sociology. Making best use of these disciplines
makes communication effective. It is, thus, an inter- Important factors in Communication:
disciplinary area of management. Framing is the thought process people use to define a
situation and decide how they are going to deal with it.
Role of Communication: Reframing is doing this over again in a different way:
Right from the time a child is born, – for example, deciding a conflict can be approached
communication plays an important role in his life. in a positive (or “win-win”) way, rather than a
Speaking, listening and writing are the common negative (or “win-lose”) way. Reframing is seeing the
forms of communication. A large part of our time is current situation from a different perspective, which
devoted to communication as we share our thoughts can be tremendously helpful in problem solving,
and feelings with individuals and groups of people. decision making and learning. Reframing is helping
Communication helps to develop an organised person to constructively move on from a situation in
society with defined roles for each individual. which the person feels stuck or confused.
1.10
Professor Academy
Framing and reframing can be differentiated using 4. Commitment to organisational objectives:
the language devices like; Managers who follow an effective system of
communication understand employees’ needs, adopt
• Simile: A simile is a poetic device in which two dif- suitable motivators to satisfy them, appraise their
Communication
ferent things are compared using the words “like” performance and provide them regular feedback.
or “as” or “so”. Eg. She fought as brave as a lion. The employees also work with commitment towards
• Metaphor: A metaphor is a poetic device in organisational objectives.
which two different things are compared with- 5. Coordination:
out using the words “like”, “as” or “so”. Eg. She Communication coordinates organisational
has a heart of lion. resources (human and non- human), individual goals
• Hyperbole: A hyperbole is a poetic device that with organisational goals and internal environment
is used for exaggeration. with external environment. Coordination is the key
to organisational success and communication is an
Importance of Communication: active contributor to coordination.
The desire to socialize and get formed 6. Adaptability to external environment:
into organised groups necessitates the need for In order to survive in the changing,
communication. In the fast changing world, dynamic environment, managers continuously
managers communicate changes in technology, interact with external parties like government,
structure or people to the subordinates. If the suppliers, customers, etc. This requires effective
communication system is well organised, it becomes communication system in the organisation.
easier for subordinates to understand and act upon
the message. Communication plays important role 7. Internal functioning of an enterprise:
in the lives of individuals and organisations. Managers interact with parties internal to
business enterprises. They constantly obtain and
1. Basis for planning: provide information to them. More effective the
Planning is the basic function of management. communication system, more accurate will be the
If plans are well designed and communicated for information.
their implementation, it leads to organisational
success. Planning requires extensive environmental 8. Healthy industrial relations:
scanning and information about internal and Satisfied workers contribute to healthy
external organisation elements. An effective system of organisations. Communication brings managers and
communication helps in obtaining this information. trade unions closer, develops mutual understanding
Implementing the plans requires communicating them and promotes industrial peace and harmony. This
to everybody in the organisation. Communication is, increases industrial production.
thus, the basis of planning.
9. Helps in performing managerial roles:
2. Motivation to work: According to Henry Mintzberg, managers
Employees are motivated to work if perform three major roles – interpersonal,
their needs are satisfied. Communication helps informational and decisional. Communication helps
managers know needs of their employees so that managers in performing these roles effectively. In
they can adopt suitable motivators and inspire interpersonal roles, managers interact with superiors,
them to develop positive attitude towards the work peers and subordinates; in informational roles they
environment. receive and give information to people inside and
outside the organization and in decisional roles,
3. Job satisfaction: they take important decisions and communicate
Exchange of information develops trust, them to organisational members for their effective
confidence and faith amongst managers and implementation.
subordinates. They understand their job positions
better and, thus, perform better. People are 10. Facilitates leadership:
committed to organisational objectives which Effective leaders interact with followers,
promotes job satisfaction. guide and inspire them to perform the individual and
1.11
Professor Academy
organisational goals. Effective communication process 12. Training and development:
facilitates leaders to carry out the leadership functions. Imparting training and development facilities
to employees depends upon how well their superiors
11. Facilitates control: communicate with them. Trainers with good
Communication
Planning is effective if accompanied by communication skills are better than those who have
an effective control system. Control is possible poor communication skills.
when managers assess subordinates’ performance,
13. Substance to organisational existence:
correct and prevent deviations and provide them Obtaining information to make plans,
regular feedback of performance. Control function making members aware of authority-responsibility
largely depends upon communication system of structure, position in the organisational hierarchy,
the organisation. How effectively managers control coordinating their activities is the essence of
organisational activities depends upon how effective organisational survival and growth. This is possible
is the communication system. through effective communication.
Self Evaluation
LEVEL 1
1. The word communication is derived from b) Aesthetic phase
__________ verb. c) Noise phase
a) Latin b) French c) German d) England d) Feedback Phase
2. The English word ‘Communication’ is derived from 8. ` In the process of communication, which one of the
the words following is in the chronological order?
a) Communis and Communicare a) Communicator, medium, receiver, effect message
b) Communist and Commune b) Medium, communicator, message, receiver, effect
c) Communism and Communalism c) Communicator, message, medium, receiver, effect
d) Communion and Common sense d) Message, communicator, medium, receiver, effect
3. Encoding means _________ 9. Dyadic Communication involves ________ persons
a) Translating the message a) Two b) Group c) One d) Three
b) Speaking to receiver 10. Chronological order of non-verbal communications is
c) Written message a) Signs, symbols, codes, colours
d) Meaningful interpretation b) Symbols, codes, signs, colours
4. Communication stimuli used to convey the message c) Colours, signs, codes, symbols
is known as [Sept-2020] d) Codes, colours, symbols, signs
a) Process b) Power 11. Which of these does not comes under communica-
c) Channel d) Codes tion based on the channel?
5. The type of communication in which the sender im- a) Verbal b) Non – verbal
mediately receives the feedback is ___________ c) Written d) Formal
a) Written b) Spoken 12. The term ‘grapevine’ is also known as
c) Face –to-face d) Mass communication a) Downward communication
6. In transmission phase, the message is transmitted b) Informal communication
from ________ c) Upward communication
a) Encoding to Medium d) Horizontal communication
b) Receiver to Sender 13. Mass communication takes place among a large
c) Medium to Encoding group of anonymous and ___________ people.
d) Sender to Receiver [Nov-2020]
7. In which phase does the receiver send the message? a) Homogeneous b) Heterogeneous
a) Transmission phase [Nov-2020] c) Group d) Two
1.12
Professor Academy
14. The concept of entropy as used in communication is (A) Environment (B) Feedback
related to [Nov-2020] (C) Context (D) Interference
a) Virtual reality b) Marketplace Choose the correct answer from the the following:
c) Order d) Communicative language a) (A), (B), (C), (D) b) (B), (C), (D), (A)
Communication
15. The break-down in verbal communication is de- c) (C), (D), (A), (B) d) (B), (A), (C), (D)
scribed as 6. Identify the correct sequence of the following:
a) Short circuit b) Contradiction a) Source, channel, message, receiver
c) Unevenness d) Entropy b) Source, receiver, channel, message
c) Source, message, receiver, channel
Answer Key d) Source, message, channel, receiver
1 2 3 4 5 6 7 8 9 10 7. Which of the following are true in respect of com-
a a a d c d d c a a munication? It is a [Oct-2020]
(A) Filtering process (B) Barrier less process
11 12 13 14 15 (C) Life-long process (D) Universal process
d b b c d (E) Collective process
Choose the correct answer from the following:
LEVEL 2 a) (A), (B), (C) only b) (B), (C), (D) only
c) (C), (D), (E) only d) (D), (E), (A) only
1. The sequence of cultural institutions in communica-
8. The chronological sequence in the development of
tion is [Oct-2020]
communication system is [Sept-2020]
A. Family B. School
A. Emergence of language
C. Religion D. Mass media B. Cave paintings
Choose the correct answer from the following: C. Interpersonal communication (verbal)
a) A, B, C, D b) B, C, D, A D. Appearance of printing technology
c) C, D, A, B d) D, A, B, C E. Telecommunication system
2. Identify the correct sequence of phases in communi- Choose the correct answer from the the following:
cation development: [Nov-2020] a) A, B, C, E, D b) B, E, D, C, A
(A) Acta Diurna c) C, D, E, A, B d) B, A, C, D, E
(B) Cave paintings
9. Match List II with List I [Oct-2020]
(C) Wooden blocks for printing
LIST I
(D) Development of languages
A. Prayer in silence
(E) Metal printing
B. Teacher talking to students outside the classroom.
Choose the correct answer from the following:
C. The CEO of a company issues a circular to his
a) (A), (B), (D), (C), (E) b) (B), (D), (C), (A), (E)
subordinates
c) (C), (D), (E), (A), (B) d) (D), (E), (A), (B), (C)
D. Rumour mongering among employees of an orga-
3. Communication begins usually with [Sept-2020] nization.
a) Confused ideas b) Semantic noise
c) Apprehension d) Pictures in the mind LIST II
I. Vertical communication
4. Efficacy of written communication depends upon II. Grapevine
A. Lengthy presentation [Sep-2020] III. Intrapersonal communication.
B. Complex sentence structure IV. Group communication.
C. Editing after writing Choose the correct answer from the following:
D. Brevity in sentences a) A-II, B-IV, C-I, D-III b) A-III, B-IV, C-I, D-II
E. Use of strong words c) A-IV, B- III, C-II, D-I d) A-I, B-II,C- III, D- IV
F. Effective use of words
Choose the correct answer from the the following: Answer Key
a) A, B and C only b) B, C and D only
c) C, D and F only d) D, E and F only 1 2 3 4 5 6 7 8 9
5. Identify the correct sequence of the following a b d c d d c d b
elements in the latter part of the communication
process after decoding: [Nov-2020]
1.13
Professor Academy
information is missing and no additional cost
Effective communication
is incurred in conveying extra message if the
communication is complete.
Effective communication occurs when there is
• A complete communication always gives
Communication
Communication
• Complete clarity of thoughts and ideas Sincerity Shortness
enhances the meaning of message.
• Clear message makes use of exact, appropriate
and concrete words. 4S’ of
5. Concreteness - Concrete communication Communication
implies being particular and clear rather than
fuzzy and general. Concreteness strengthens Strength Simplicity
the confidence. Concrete message has following
features:
• It is supported with specific facts and figures.
• It makes use of words that are clear and that 1 Shortness - It is often said that “Brevity is the soul
build the reputation. of wit.” The same can be said about communication.
• Concrete messages are not misinterpreted. If the message can be made brief, then transmission
and comprehension of messages is going to be faster
6. Courtesy - Courtesy in message implies the and more effective. Flooding messages with high
message should show the sender’s expression as sounding words does not create an impact. The same
well as should respect the receiver. The sender of message, when repeated will not make it important
the message should be sincerely polite, judicious, and hence it is not advised to use two words with
reflective and enthusiastic. Courteous message same meaning or any word twice.
has following features: 2 Simplicity - Simplicity both in the usage of words
and ideas reveals clarity in the thinking process.
• Courtesy implies taking into consideration Using simple terminology and equally simple
both viewpoints as well as feelings of the concepts would help in delivering the concept while
receiver of the message. teaching.
• Courteous message is positive and focused at 3 Strength - The strength of a message emanates from
the audience. the credibility of the sender. If the sender himself
believes in, a message that he is about to transmit,
• It makes use of terms showing respect for the there is bound to be strength and conviction in
receiver of message. whatever he tries to state. Half-hearted statements
• It is not at all biased. or utterances that the sender himself does not
believe in, adds a touch of falsehood to the entire
7. Correctness - Correctness in communication communication process.
implies that there are no grammatical errors in 4 Sincerity - A sincere approach to an issue is clearly
communication. Correct communication has evident to the receiver. If the sender is genuine, it will
following features: be reflected in the manner in which he communicates.
• The message is exact, correct and well-timed. Characteristics of Effective Communication
• If the communication is correct, it boosts up The real meaning of communication is getting the
the confidence level. receiver and the sender tuned together for a particular
message. Communication takes place when one person
• Correct message has greater impact on the transfers some understandable data to another person.
audience/readers. It also includes the exchange of thoughts, opinions,
• It checks for the precision and accurateness of sentiments, facts, and information between two or
facts and figures used in the message. more persons. The important motive of characteristics
of communication is to create response from audience.
• It makes use of appropriate and correct The feedback is very important as it assures that message
language in the message. should be properly conveyed to the receiver.
1.15
Professor Academy
The essential features of an effective communication 1. Vertical Network:
system are keys for productive communication. The The vertical network is usually between the
chief principles or characteristics of an effective superior and subordinate and vice versa. It is two-
communication system are as follows: - way communication. The immediate feedback is
Communication
Transmitter
Receiver 4. Wheel Network:
In Wheel Network subordinates receive
commands from one superior. This is highly
centralized type of communication network where
1.16
Professor Academy
each subordinate receives commands or instructions digital, nonverbal codes tend rather to analogical
from a single authority or superior ‘A’ and wants the than digital. According to Mirela-Ioana Borchin
immediate feedback. difference between linguistics and languages, is as
equivalence to difference between nonverbal and
Communication
verbal codes.
The fundamental function of communication
is communization of significations, that is called
code. The codes are natural or artificial. The codes
are named also languages. The most important
human linguistic is language that constitutes the
verbal code. The communicators use both verbal
codes (linguistics) and nonverbal code.
5. Star Network:
a) Verbal code
In star communication network all members
of the group communicate with each other and The code named language has universal character
exchange information. This network is a must and offers models to another communization
for group communication or where teamwork is codes. According to Denis McQuail, quality of
involved. This network channel of communication communication code has five charecteristics. They
is open to all members of the group. The members are:
communicate with each other without hesitation. • linear character or sequential
• Systematic character (its situating under lexi-
cal rules empire, grammar; systemic excludes
aleatory).
• Systemic character (language is a system that
keeps the differences and contrasts).
• Arbitrary character (does not exist a com-
pulsory relation between word and ap-
pointed object).
• conventional character (its function is funda-
mental on implicit convention of users).
The effectiveness of the above networks of
Communicative functions of language
communication channels depend upon their users
i.e. the managers at all levels, their subordinates and Depending on which component of the
other members of the organisation and above all the communication network is fore fronted, we identify
seriousness with which all these human resources six communicative functions of language .
make use of the facilities provided to them by the 1. Referential focuses on various aspects of a
organisation to accomplish its objectives. message and is primarily related to its content
and context .
Communication Code:
2. Metalingual is employed when the object
Communication system presents a structural and
of communication is the language (code)
functional unity. Two persons can communicate in
itself; here language is used to discuss
better way if they have a common language, common
language and organize a message (e.g., in
values in order to communize significations it is
metacommunication remarks, such as First,
necessary to communize first a common language,
I want to establish some basic points in
a code.
scholarly writing,) or clarification request
Non verbal codes and verbal codes are Could you explain that please in conversation.
part of an indivisible communication system. The microexpression make communication
Burgoon shows while verbal codes are definite positive and effective.
1.17
Professor Academy
3. Expressive. directs attention of the audience c. Physical Appearance- Communication code
towards the senders self expression. elements that belong to physical appearance are
4. Conative emphasizes the sender´s intention to those constructs which consist in the modification
of aspect through: clothing, cosmetics, hairstyle or
Communication
1.18
Professor Academy
• Oculesics represents communication modality SPOKEN / ORAL
to use a code of sight. Basically elements of this
code are grouped on two constituents: pupil dil- Face to face communication e.g., direct verbal talk
atation and eyecontact. in discussions, lecture or exposition
Communication
• Olfatics is one of less intellective codes. Its ele- Participatory Entertainment modes e.g., TfD,
ments consist in smells categories through which songs, narratives
it is communicated.
Distance verbal communication e.g., telephone,
calls, Radio, Video, film
Communication Modes:
b) The Graphic mode
There are three main modes of The graphic mode involves written words
communication as the phonic mode (spoken/ and is mainly used by the NGOs and development
verbalized), the graphic mode (written) and the consultants to keep records such as progress reports,
multimodal channel (the use of two or more modes correspondences, or to advertise themselves promote
or semiotic codes in a single communicative episode. their activities through brochures, newsletters,
posters, leaflets, writings on T-shirts, banners, caps,
Mode wrappers, murals and any other forms of writing.
1.19
Professor Academy
Nature of classroom communication their difficulties explicit which need to be effectively
responded to and addressed by the teacher.
Communication is an integral part of
the teaching-learning process. Teaching is a The strength of this approach lies in
Communication
social activity that involves both the teacher and facilitating immediate feedback, warmth and
the learners. It is therefore important, that two interaction it is important that teacher has to use
way communication exists between them in appropriate words, to increase the acceptance of
order to trigger learning learning, since two way concept by student (credence). The limitation
communication is always effective Moreover direct in the feedback or delayed feedback happen due
communication between a teacher and learners to semantic noise (a communicative barrier).
allows the teacher to get immediate feedback that In teacher-centered approach is based on the
can help him/ her gauge learners’ understanding of principle of ‘teaching by telling’ and ‘learning
what has been taught. Two way communication is by listening’ in which the onus of ‘teaching lies
always effective. In classroom communication, the on the teacher. It may be noted that despite the
teacher (encoder) will also be an decoder, if the presence of a teacher, learners may remain passive
communication is circular. Based on such feedback recipients of information. It is the responsibility of
the teacher can improve his/her communication. the teacher to make students active listeners with
Due to rapid changes taking place in our social the help of different interactive techniques. Since,
system; teaching-learning environment is the teacher-centric communication, students tend
also changing at a fast pace. The information to become passive listeners. If they express their
explosion due to increased access to different mass disinterest or passivity, an alert teacher can still
communication media has increased the awareness control it by using various interactive techniques
level of learners. in arousing and sustaining the interest of the
students.
As a result they have higher expectations
from their teachers than ever before. The role and Hyperbole is the use of exaggeration as a
profile of a teacher is also changing and she has to rhetorical device or figure of speech. In rhetoric, it
undertake varied roles. While on the one hand the is also sometimes known as auxesis. In poetry and
teacher has to fulfil the task of being the source oratory, it emphasizes, evokes strong feelings, and
of information on the other hand, she has to act creates strong impressions. As a figure of speech,
as a counsellor, mentor and guide. The teacher it is usually not meant to be taken literally.
has to coordinate assignments and fulfil many
managerial functions and also use technology However, the problem may become acute
for educational purposes. Thus pedagogy, when despite a student’s apparent interest in the
social interaction, management and technology lecture/lesson through appropriate facial expressions
comprise crucial activities of a teacher and the and body language, his/her mind may wander
role of communication is paramount in all these elsewhere without following what is being discussed
activities. in the class. Speaking and listening start in the early
stages of our lives. We are constantly updating our
Classroom communication, is purposive, vocabulary, improvising your expressions and
positive and pragmatic in nature. In classroom refining our thinking processes. Speaking as well as
communication the exchange of ideas and listening are two very important skills required in
information occurs between teacher and learners, the classroom.
among learners both in formal as well as informal
situations. It involves speaking, lecturing, describing, A teacher has to be a good speaker and at the
explaining, illustrating on the part of the teacher same time has to be a patient and attentive listener
and engaging the students in debate, dialogue and for his/ her learners. Active listening is different
discussion. The important element of classroom from just hearing and requires activities such as
communication is fields of experience and advocacy. hearing, understanding i.e. attaching meaning to
Learners raise questions, doubts and queries to make what is heard and judging and thinking about it.
1.20
Professor Academy
deliver instructions, as for instance, computer
based learning, the instruction gets individualized
FILIBUSTER- A filibuster is a political pro- as a learner works and learns on computer.
cedure where one or more members of par-
liament debate over a proposed piece of leg- When instruction given to distant education or
Communication
islation so as to delay or entirely prevent a online participation of study, the student regulate
decision being made on the proposal. It is some- themselves based on the instruction received.
times referred to as “talking a bill to death”
or “talking out a bill” and is characterized as D. Small group instruction:
a form of obstruction in a legislature or other
decision-making body. In class room communica-
Small groups consisting of 15-20 learners are
tions filibustering should be avoided. more conducive for teaching and skill development.
ADVOCACY - The advocacy is the act of speak- In small group instruction, teachers can identify
ing on the behalf of or in support of another the learners, remember as well as use their names
person, place, or thing. An example of an ad- for developing a rapport with them. It becomes
vocacy is a non-profit organization that works
to help women of domestic abuse who feel too
relatively easier to address individual learning needs
afraid to speak for themselves. of learners.
Small group instruction may follow the
A. Teaching and learning direct teaching format or it may use different modes
Teaching–learning happens to be a process of teaching -learning. In addition to lecture format,
in which two way communication is important various other methods of teaching such as seminars,
for transferring information from the teacher to discussions, debates, tutorials, brain storming,
the learners. It was also stated that interpersonal problem solving, etc. can be effectively adapted and
communication allows greater scope for feedback utilized in small groups.
as both sender and receiver can decipher the facial
E. Large group instruction:
expressions, body movements and cross question
If the number comprising a group is large,
each other to resolve their doubts/queries. Feedback
it may place certain constraints in the process of
gets diminished when the number of participants
communication and reduce the level of interactivity
in the communication activity increases posing a
between the source and the receivers. The physical
challenge for the teacher.
setting may also provide less scope for the source
B. Class size and communication to be visible or audible. Lecture method is generally
Interpersonal communication between two used for providing instructions to large groups.
persons offers maximum interactivity. This is also Information and Communication Technology is
present to a great extent in group communication being increasingly used to meet the needs of large
particularly in small groups. However, as the number and dispersed classes in same or different locations.
of participants in a group increases, the level of The element of noise may place barriers in
communication gets affected. the process of communication. Noise in this respect
C. Individual instruction: could be due to indiscipline, failure to grasp the
The word ‘class’ itself takes into account a content, content overload, difficulty level, language,
number of students. Nonetheless, some students physical conditions of the classroom, etc.
require individual attention to address their specific Planning Class Room Communication
educational needs. Individual instruction is generally
between two persons and thus can be placed under Educational communication is purposive,
interpersonal communication. It allows the sender positive and pragmatic and it is a systematic and
and receiver to use various sensory channels and planned activity. It has certain specific objectives
watch facial expressions, gestures, body language that are directly related with acquiring knowledge or
of each other, etc. It facilitates clarifying one’s development of new skills in some kind of permanent
views, persuading or motivating another person way. In classroom, teacher enhances interaction
more effectively in which there is less scope for of learner that approach is called as psychological
misunderstanding. When technology is used to approach.
1.21
Professor Academy
going to raise readers. If we maintain in the form of lectures, presentations, speeches, etc.
(in the home and in the classroom) strong Written message includes published information in
Reward factors and lower the Effort the form of books, research papers, slides,handouts,
factors, reading Frequency will be high. etc. Pictorial message includes drawings, graphs,
The higher that frequency number is for etc. while symbolic messages are used in subjects
students, the higher will be their chances like Mathematics, Chemistry, Physics, etc. At times
of success in school and life. rhetorical messages are also used in classroom
Expectation communication. Rhetoric means the art of oration
of reward which includes skills in speaking at length with wit,
Frequency
humour, force and strength.
Effort of activity
required The message presented should be simple,
lucid, and clear and delivered in an interesting
manner. It should be relevant, updated and pitched at
A. The Role of Teacher the right level. It is often seen that in our effort to share
The role of teacher is paramount in planning our knowledge and expertise, we pitch our message at
classroom communication. Since the prime objective a very high level which may confuse the learner. The
of teaching is to develop academic and intellectual message should be credible and persuasive enough
skills among students, the teacher has to be well to facilitate learner participation, free from any type
equipped with facts and should analyse the subject of bias. During monotonous lecture, teacher make
to be taught. In addition to meeting the needs of efforts to keep student alert using appropriate voice
average learners she has also to satisfy the intellectual modulation, facial expressions, body language have
needs of bright students and for that she has to to be used in facilitating communication.
be well prepared. She has to encourage creativity C. Developing Classroom Culture
and innovative approaches so that students bring Although each class is distinct in its own way,
forth their arguments with appropriate reasoning there are certain norms and patterns which teachers
in contrast with rote learning. She also needs to and students of a particular class formulate. They
inculcate proper values among the students to work out how students would address the teacher,
enable them to face the economic, social and cultural how much degree of familiarity is acceptable in
challenges lying ahead and all these call upon the communication, what will be the accepted level of
skills of communication of the teacher. Persuasive noise in the class, and so on. This may vary from
communication by a teacher in the classroom is one institution to another-whether it is a private or
intended to make his/her version of information public and also governed by the society in which
acceptable to students(credence). Teacher does this we are place as classrooms are a part of the larger
at the institutional level for the purpose of image societal system. For effective functioning of a class,
building. Abilities to communicate clearly and a harmonious culture needs to be developed and the
specifically, explain well, highlight important points, importance of according respect to the viewpoint
being a good listener, skills for interaction, are some of the other should be encouraged. The class set-
of the role of a teacher. A good and communicative up should be kept democratic in which the teacher
teacher evokes more questions from students. is accorded due respect. It will be difficult to teach
if students talk constantly as no one will be able
B. Design and Presentation to hear each other. Similarly, communication may
The first and foremost step in classroom not be democratic if a section of vocal learners
communication is to define the objectives clearly dominate the interaction whereas shy and timid
and realistically so that these can be met within students do not open up unless specifically drawn.
1.22
Professor Academy
Interjecting frequently, talking loudly and shouting, a. Participatory Approach
etc., should be Discouraged and curbed at all costs A teacher can create an environment in which
Teacher should not allow an issue to fester and that students are made to feel comfortable both physically
will affect to effective communication in classroom as well as mentally. They feel free to communicate
Communication
communication. A good communicator(teacher) their ideas and get the opportunity to participate in
will address an issue in the classroom before it the class equally. There is a growing realization that
becomes serious one or a big problem. information flow should be horizontal in nature. In
sharp contrast to the vertical or ‘top-down’ approach
D. Developing Communication Skills in Learners which ‘talks at’ people rather ‘talks with’ them, this
Students need to be encouraged to express approach draws students into the communication
their opinions and views or share doubts to develop activity in a participatory mode. It involves all the
their reasoning skills and faculties. They should be students in the communication process. Proper
able to argue, challenge, analyse, and defend ideas. For seating arrangements in a classroom also create
seeking clarification they can ask: ‘could you please conducive learning environment. Studies reveal that
repeat the point you just made?’, ‘I am still not sure if students seated in the first few rows across the front
I got it right’, ‘could you guide me pence again please?’ of the classroom and those seated at the centre of the
Rephrasing has been found to be an effective method room are the ones who are most likely to participate
of questioning and they can restate or rephrase what in communication with the teacher and in circular
they have heard to clarify certain points. seating arrangement there tends to be an increased
Communication may also involve trying to eye contact and participation among students.
look beyond what is said and ascertain what is not b. Empathy
said and what the missing links in the communication ‘Empathy’ is associated with the ‘feeling of
transaction were. Non-verbal cues also convey oneness’. It is an unconditional positive regard for
meanings. For example, if the teacher shuffles the the receiver (in this case the learners), and a sincere
papers or looks away, this may give the impression approach towards promoting a favourable climate to
that student’s comments are not taken seriously. facilitate communication. It considers receivers as
Maintaining eye contact, smiling, nodding, etc. help alert, sensitive and active participants in the process
to connect with students. At times, conscious efforts of communication rather than as passive recipients of
need to be middle to maintain eye contact with those information. Similarly, it treats learners as intelligent
who are shy and timid and do not participate freely. For and empowered individuals who are partners
effective learning it is necessary that learners be able in learning. The source or teacher is genuinely
to communicate what they know. The teachers need interested in their concerns and makes efforts to
to encourage communication through discussions address them. The use of inclusive language such as
in the classroom and ensure that ‘every student has ‘our’ class and what ‘we’ must do instead of ‘you’ and
understood the communication. Activities followed ‘your’ class also helps in inculcating empathy.
by presentations made by the learners can also
nurture communication skills. Also students need a c. Appreciation and Patience
safe environment where they would not feel scared or Motivational factors such as offering praise,
inhibited to communication with the teachers. showing a willingness and interest in talking with
students and addressing them by first flames help to
Creating Learning Environment draw and involve the students. Appreciating the good
work, ideas and suggestions infuses encouragement. A
An effective teacher requires more than the reference also needs to be made about the level of patience
knowledge of content. She has to be a good motivator, of the teacher especially while facing learners questions
create positive environment in the classroom, and queries as display of irritation or impatience may
society and nation at large. For that she needs to affect the learner’s future participation. Unless, they
have a sound understanding of human psychology. are informed about these, they may not improve upon
She needs to undertake participatory approaches these areas. A mature handling of the learners’ queries
to facilitate empathy and gender sensitivity in the and sensitivity to arts their learning needs, adds to the
classroom using appropriate communication skills. success of communication transaction.
1.23
Professor Academy
Self Evaluation
LEVEL 1
Communication
Communication
demic communication? [Nov-2020]
c) Statement I is correct but Statement II is false
A) Preference to vertical communication
d) Statement I is incorrect but Statement II is true
B) Training individual students in communication
skills 8. Communication activities of learners fall into do-
C) Restricting too much generation of information mains consisting of [Sept-2020]
D) Recognizing cultural and linguistic differences A. Perception
among students B. Groupism
E) Opting for uniformity in using cultural symbols C. Inter-personal skills
Choose the answer from the following: D. Regressive behaviour
a) (A), (B), (C) only b) (C), (D), (E) only E. Inter-personal relations
c) (B), (C), (D) only d) (B), (D), (E) only Choose the correct answer from the following:
a) A, B and C only b) A, C and E only
3 Which of the following is considered as an effective
c) A, C and D only d) A, D and E only
form of verbal communication? [Nov-2020]
a) Story-telling 9. Given below are two statements: One is labeled as
b) Sloganeering Assertion (A) and the other is labeled as Reason (R):
c) Use of high pitch of voice [Nov-2020]
d) Monologues Assertion (A): Repeating more and more the same
4. An effective communication does not require message will make it important.
a) Change in speech pattern Reason (R): “Don’t use two words when one will do”
b) Appropriate gestures is the guiding principle that works.
c) Mastery of content In the light of the above statements, choose the most
d) Handsome personality appropriate answer from the options given below:
a) Both (A)and (R) are correct and (R) is the correct
5. Given below are two statements, one is labelled as explanation of (A)
Assertion (A) and the other is labelled as Reason (R) b) Both (A) and (R) are correct but (R) is NOT the
Assertion (A): Allowing an issue to fester will con- correct explanation of (A)
tribute to effective communication [Sept-2020] c) (A) is correct but (R) is not correct
Reason (R): A good communicator will address an d) (A) is not correct but (R) is correct
issue in the classroom before it becomes precarious 10. Which of the following will make a student a good
In light of the above statements, choose the correct listener in the classroom? [Sept-2020]
answer from the options given below A. Ability to deflect attention
a) Both (A) and (R) are true and (R) is the correct B. Concentration
explanation of (A) C. Desire to understand
b) Both (A) and (R) are true but (R) is NOT the cor- D. Emotional outbursts
rect explanation of (A) E. Humility to know
c) (A) is true but (R) is false F. Ignoring the other side
d) (A) is false but (R) is true Choose the correct answer from the options given
6. A basic principle of effective classroom communica- below:
tion is that one should adapt his or her own to the a) A, B and C only
audience. Which of the following would replace the b) B, C and D only
gap? [June-2019] c) D, E and F only
a) Accent b) Exterior d) B, C and E only
c) Message d) Mannerism 11. Which of the following elements a good classroom
7. Given below are two statements: communication should adopt? [June-2019]
Statement I: The content and style of communication A. Concreteness B. Courtesy
are the predictor variables of effective teaching. C. Filibustering D. Fictionalisation
Statement II: A good and communicative teacher E. Coherence
evokes relatively less questions from the students. Choose the answer from the options given below:
1.25
Professor Academy
a) A, B and D b) B, D and E Barriers to Communication
c) A, B and E d) A, C and D
12. The concept ‘fraction of selection’ in classroom The process of communicator has multiple
barriers. The intended communiqué will often be
Communication
1.26
Professor Academy
Barriers to Communication
Communication
Physical Barriers caused Semantic Cultural Psychological/ Barriers caused by
Environmental by wrong choice Barriers Barriers Attitudinal varying perception
Barriers of medium Barriers of reality
(Caused by) (Caused by) (Caused by) (Caused by) (Caused by)
1.27
Professor Academy
The implied meaning of the word is called will be able to communicate effectively. On the other
connotation that arouses personal reactions and hand, people who let their emotions take over will
qualitative judgments. The connotation barriers face certain difficulties.
arise when the people use words that hold different
Communication
Communication
clarifications. Barriers to Active Listening
C. Non Listeners: The non-listeners do not listen at ➢ Inadequate language base
all because they are genuinely disinterested in the
➢ Partial Listening
subject. These people pretend to follow the speaker
while they are actually preoccupied with something ➢ Disinterestedness
else. ➢ Pre-judging the Speaker/the Speech
D. Evaluative Listeners: Evaluative listeners literally ➢ Negativity towards the Speaker
assess the verbal content on the basis of words not ➢ Diffidence
paralinguistic or nonverbal cues. Generally, they use ➢ Over-enthusiasm/Intolerance
logic to understand the content, hence, they distance ➢ Deep-rooted beliefs
themselves emotionally from the subject. As a result,
ably considered the best solution in a classroom en-
Self Evaluation vironment
In light of the above statements, choose the correct
LEVEL 1 answer from the options given below [Sept-2020]
1. The barrier based on language is ___________ a) Both Statement I and Statement II are true
a) Linguistic b) Psychological b) Both Statement I and Statement II are false
c) Cultural d) Attitude c) Statement I is correct but Statement II is false
d) Statement I is incorrect but Statement II is true
2. Shifting technologies and communication institu-
tions contribute to [Sept-2020] 2. The most powerful barrier of communication in the
a) System integration class is
b) Temporal disintegration a) Noise in the classroom
c) Psychological disintegration b) Confusion on the part of teacher
d) Spatial integration c) Outside disturbance in the classroom
d) Lack of teaching aids
3. Poor listening by the audience leads to _____
a) Appreciating the speaker [Oct-2020] 3. Which of the following are useful in overcoming the
b) Wild imaginations communication barriers in a classroom? [Nov-2020]
c) Inaccurate inferences a) Identifying the level of redundancy
d) Disrespecting the speaker b) Use of unfamiliar words
c) Ignoring the students ‘vocabulary
4. Semantic noise in classroom communication can be d) Fragmented sentences
limited by avoiding the use of [Nov-2020] e) Voice inflexion
a) Dialogue b) Cliched jargon f) Contextualizing the speech
c) Non verbal cues d) Multi – media Choose the correct answer from the following
a) Only (a), (b) and (c) b) Only (b), (c) and (d)
Answer Key c) Only (c), (d) and (f) d) Only (a), (e) and (f)
1 2 3 4 4. Match List I with List II [Nov-2020]
a a c b List 1 List II
Communication barriers Description
A. Semantic I. Lack of physical clari-
LEVEL 2 ty in channel
1. Given below are two statements B. Psychological II. Faulty message
Statement I: Personality conflicts in a classroom situ- C. Personal III. Poor retention
ation are a barrier to effective interaction D. Physical IV. Lack of time
Statement II: Impersonal communication is invari-
1.29
Professor Academy
a) A-1, B-II, C - III, D- IV b) A-II, B-III, C-IV,D-1 9. Match List I with List II [Nov-2020]
c) A- III, B-IV, C-I, D-II d) A-IV, B-I, C-II, D-III List I
(Examples of communication barrier)
5. Match List I with List II [Sept-2020]
(A) Unclear printing in a newspaper
Communication
List I List II
(B) Different understanding of the message
Types of listeners Characteristics
(C) Passive audience reception of the message
A. Poor listeners I. Scare others
(D) Prejudice agaist certain ethnic groups
B. Aggressive listeners II. Easily agree with the
speaker List II
C. Passive listeners III. Listen to ideas, but (Types of communication barrier)
no emotions behind (I) Psychological noise
D. Pseudo-intellectual IV. Fidget repeatedly (II) Cultural stereotyping
Choose the correct answer from the following: (III) Physical noise
a) A - I, B - II, C- III, D - IV (IV) Semantic noise
b) A - II, B - III, C - IV, D - I Choose the correct answer from the following:
c) A - III, B - IV, C - I, D - II a) (A)-(IV), (B)-(III), (C)-(I), (D)-(II)
d) A - IV, B - I, C - II, D - III b) (A)- (II). (B)- (I), (C)-(IV), (D)-(II)
c) (A)-(II), (B)-(IV), (C)-(I), (D)-(II)
6. Which of the following can be the major communi-
d) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
cation barriers to online teaching? [Oct-2020]
(A) Technology (B) Legalities 10. Removal of communication barriers in a classroom
(C) Student community (D) Culture will result in [Nov-2020]
(E) Gender (A) Clear enunciation of specific instructional be-
Choose the correct answer from the following: haviors
a) (A), (B), (C) only b) (A), (D), (E) only (B) A climate of purposeful student interaction.
c) (B), (C), (D) only d) (C), (D), (E) only (C) Promotion of personality cult.
(D) The irrelevance of illustrative examples.
7. The positive impact of communication depends
Choose the correct answer from the following:
upon [Sept-2020]
a) (A) and (B) only
A. Acceptance of barriers
b) (B) and (C) only
B. Planning
c) (C) and (D) only
C. Sudden expression
d) (A) and (D) only
D. Media selection
E. Use of language 11. What are the barriers to effective communication?
Choose the correct answer from the following: a) Moralizing, being judgemental, and comments of
a) A, B and D only b) B, D and E only consolation.
c) C, D and E only d) A, D and E only b) Dialogue, summary and self-review
c) Use of simple words, cool reaction, and defensive
8. Which of the following can be considered as psycho-
attitude
logical barriers to effective communication?
d) Personal statements, eye contact, and simple nar-
A. Descriptive message
ration.
B. Inattentiveness
C. Too much reliance on the written word
D. Limited retention Answer Key
E. Logical organization
F. Flow of thought [Sept-2020] 1 2 3 4 5 6 7 8 9 10 11
Choose the coned answer from the following: c a d b d b b b c a a
a) A, B and C only b) B, C and D only
c) C, D and E only d) D, E and F only
1.30
Professor Academy
Communication
Figure : Aristotle’s Model of Communication
and is channeled then imparted by the sender to
the receiver through a medium. When the receiver Aristotle advises speakers to build speech for
gets the information he or she decodes the message different audience on different time (occasion) and
and gives the sender a certain feedback. Models of for different effects. Speaker plays an important role in
communication refer to the conceptual model used Public speaking. The speaker must prepare his speech
to explain the human communication process. and analysis audience needs before he enters into the
stage. His words should influence in audience mind
Types and persuade their thoughts towards him.
There are many models of communication
developed by noted theorists of different disciplines. b) Lasswell’s Model of Communication:
Among the theorists are: Aristotle, Lasswell, Harold Dwight Lasswell, a American political
Shannon, Weaver, McLuhan, MacLean, Rileys, scientist and communication theorist, was a member
Westley, Gerbner, Rothstein, Schramn, Berlo, of the Chicago school of sociology. In his work ‘The
Osgood, Johnson, Cherry are the renowned ones. All Structure and Function of Communication in Society’
these model can be Classified under three following (1948) he defined communication process as Who
types as: says What (in Which Channel) to Whom with What
• Linear model Effect.
Says In Which To With What
• Interactive model Who What Channel Whom Effect
• Transactional model COMMUNICATOR MESSAGE MEDIUM RECIVER EFFECT
Communication
II. Elements – It includes various things like IV. Smelling: Smell also can be a channel to
language, gestures, body language, etc. They communicate. For example, perfumes, food,
constitute all the elements of a particular message. fragrances etc. Charred smell communicates
Any content is accompanied by some elements. something is burning. People can deduct which
III. Treatment – It refers to the packing of the food is being cooked by its smell etc.
message and the way in which the message is V. Tasting : The tongue is a muscular organ used in
conveyed or the way in which it is passed on or the act of eat and taste food. For example, while
delivered. a food is being shared, the communication can
(Note: When there is too much treatment, happen regarding its taste.
communication will not go smoothly.) (Note: Despite not mentioning a medium, we
IV. Structure– The structure of the message refers need to assume that as communication is taking
to how it is arranged; the way people structure place, channels can be any of the 5 senses or
the message into various parts. combination.)
6. It requires people to be on the same level for from person to person as there will always be a degree
effective communication to happen. However, of semantic noise to be taken into account, such as
that rarely happens in everyday life. cultural differences, background, socioeconomics,
7. The main drawback of the model is that it education and values.
omits the usage of sixth sense as a channel of
communication, which is an asset to human Schramm (1955) andOsgood (2009)came out
beings (thinking, understanding, analyzing with an interactive model in which the receiver or
etc.) listener providing feedback to the sender or speaker.
The speaker or sender of the message also listens to
Interactive Model the feedback given by the receiver or listener. Both
the speaker and the listener take turns to speak and
The main flaw in the linear model is that
listen to each other. Feedback is given either verbally
it depicts communication as a one-way process
or non-verbally, or in both ways. This model also
where speakers only speak and never listen. It also
indicates that the speaker and listener communicate
implies that listeners listen and never speak or send
better if they have common fields of experience, or
messages.
fields which overlap.
a) Wilbur Schramm & Osgood Model of
The merits of the model are that it is
Communication
dynamic, includes redundancy, sender and receiver
The Osgood-Schramm model of are the same persons, feedback is integral part of
communication is a communication theory. It the process and so suggests communication to be
explains how we communicate with one another, circular in nature. The chief demerit is that it does
mainly through speech, writing and discourse. It not talk about semantic noise and it assumes the
emphasizes four key principles: moment of encoding and decoding.
1. That communication is circular, not linear. The Field of Field of
listener can both receive and send messages experience experience
Message
(in most instances). Encoder
Encoder
2. That communication is usually equal and Field of common
reciprocal Interpreter experience Interpreter
3. That there is a lot of interpretation involved
when receiving a message Decoder Decoder
Message
4. That all communication requires three steps:
encoding, decoding and interpreting a
message.
Effectively, this is two linear models stacked
Osgood and Schramm’s Circular Model on top of each other. The sender channels a message
of Communication was an attempt to rectify the to the receiver and the receiver then becomes the
earlier linear models of communication; it can sender and channels a message to the original sender
happen within our self or between two each (feedback). This indicates that communication is a
person acts as both sender and receiver and hence two way process. Feedback is not simultaneous, e.g.,
use interpretation. It occurs simultaneously, e.g., Instant Messaging. The sender sends an IM to the
encoding, interpreting and decoding. Wilbur receiver, and then the original sender has to wait for
Schramm stated that communication process does the IM from the receiver to react.
not start and end somewhere, but is endless. The
Circular model depicts two actors who reciprocate in
Transactional Model
identical functions throughout: encoding, decoding, The main drawback in the interactive model
and interpreting. The model presented by Osgood is that it does not indicate that communicators can
1.34
Professor Academy
both send and receive messages simultaneously. • It recognizes that communication affects all
This model also fails to show that communication parties involved. .
is a dynamic process which changes over time. The • The transactional model also contains
transactional model shows that the elements in
Communication
ellipses that symbolize the communication
communication are interdependent. Each person environment.
in the communication act is both a speaker and a
listener, and can be simultaneously sending and a) Theodore M Newcomb’s Model Of
receiving messages. Communication
The model implies: The New Comb’s model of communication
• “Transactional” means that communication was introduced by Theodore M Newcomb of the
is an ongoing and continuously changing University of Michigan in 1953. He gives different
process; approach to the communication process. The main
• In any transactional process, each element purpose of this theory is to introduce the role of
exists in relation to all the other elements. communication in a social relationship (society)
There is this interdependence where there and to maintain social equilibrium within the
can be no source without a receiver and no social system. He does not include the message as
message without a source; a separate entity in his diagram, implying it only
• Each person in the communication process by use of directional arrows. He concentrates on
reacts depending on factors such as their the social purpose of communication, showing all
background, prior experiences, attitudes, communication as a means of sustaining relationships
cultural beliefs and self-esteem. between people. Sometimes it’s called as an “ABX”
model of communication.
Transactional model of communication
that takes into account “noise” in communication as X
well as the time factor. The outer lines of the model Topic
indicate that communication happens within systems
that both communicators share or personal systems.
It also takes into account changes that happened in
the communicators’ fields of personal and common
experiences. The model also labels each communicator
as both sender as well as receiver simultaneously. B Message Message A
Transactional Model of Receiver Sender
Communication
The Newcomb’s Model
A’s Filed of
Experience
The Newcomb’s model works in a triangular format
Shared Filed Communicator A or A-B-X system
of Experience Noise
and Symbolic A – Sender
Interacrtions Communicator B
B – Receiver
over Time B’s Filed of
Experience X – Matter of Concern
The relationship between A and B is like
• That people are connected through
student and teacher, government and public or
communication;
newspaper and readers. Sender and Receiver may
• They are engaged in transaction. work in a same flow but the same time some factor
• It recognizes that each of player is a sender- like “X” may affect their flow of relationship. “X” it
receiver, not just a sender or a receiver. may be third persons, issue, topic or policy.
1.35
Professor Academy
For Example: The merits of this model include:
Teachers introduce a new policy to increase • It accounts for Feedback;
the college timing from 6 hours to 8 hours. • It can account for both interpersonal
communication and Mass communication;
Communication
fCA
fBC
Communication
limitations, the mistakes, the contradictions and and transformed ourselves, each other, and the
incoherence, the injustices and inequities in how communities, cultures, societies, and world in
human beings operate within particular kinds of which we live.
Self Evaluation
LEVEL 1
1. Which theory involves in the art of effective writing be called: [Jun-2019]
and speaking? a) A transactional model
a) Rhetorical b) Semiotic b) An interaction model
c) Phenomenological d) Critical c) A horizontal model
d) A linear model
2. In which of these models the speaker takes turn to
speak? 10. Feedback of a message comes from:
a) Linear model b) Single model a) Satellite b) Media
c) Solo model d) Interactive model c) Audience d) Communicator
3. In which model speakers are engaged in transac-
tion? Answer Key
a) Transaction model b) Interactive Model
c) Solo model d) Linear model 1 2 3 4 5 6 7 8 9 10
4. Face to face conversation is an example of _________ a d a a a d a c a c
a) Interactive model
b) Non – Linear model LEVEL 2
c) Mechanized model
d) Linear model 1. Match List I with List II [Oct-2020]
List I
5. lasswell’s model of communication an example of
(Examples of Communication)
___________
(A) Sending e-mail
a) Linear model b) Non – Linear
(B) Verbal instruction
c) Circular d) Mechanized
(C) Exchange of information between two
6. The zone of proximal development comes under (D) Traffic signals
___________ theory. [Nov-2020] List II
a) Rhetorical b) Semiotic (Types of Communication)
c) Phenomenological d) Socio-cultural theory (I) Semiotics
7. Which model views communication as oneway (II) Transactional
_________________ (III) Formal groups of people
a) Linear model b) Transaction (IV) Informal
c) Inter active d) Aristotle Choose the correct answer from the following:
a) (A)-(III), (B)-(IV), (C)-(II), (D)-(I)
8. Which of these is not the basic elements of Aristotle b) (A)-(II), (B) - (III), (C)-(I), (D)-(IV)
model c) (A) – (I), (B)-(II), (C)-(IV), (D)-(III)
a) Speaker b) Speech d) (A)-(IV), (B)-(I), (C) - (III), (D)-(II)
c) Audience d) Audio
2. The sequence of elements in linear model of commu-
9. In a classroom situation, a teacher organises group nication is [Sept-2020]
discussion to help arrive at a solution of a problem.
A. Message B. Decoder
In terms of a model of communication used, it will
C. Encoder D. Medium E. Noise
1.39
Professor Academy
Choose the correct answer from the following: (B) Shannon and Weaver
a) A, C, B, E, D b) B, D, C, A, E (C) Wilbur Schramm
c) C, A, D, E, B d) D, E, C, A, B (D) David Berlo
List II
Communication
1.40
Professor Academy
Communication
source transmitting information to a large
number of receivers simultaneously is called as • Low cost to the consumers
mass communication. The realm of interpersonal Characteristics:
communication exists another form of
• Direct message toward relatively large,
communication, which involves communication
heterogeneous and anonymous audience.
with mass audiences and hence the name mass
communication; and the channel through • Message are transmitted publicly no privacy.
which this kind of communication takes place • Short duration message for immediate
are referred to as mass media. In case of mass consumption
media,communicated message is a social product. • Feedback is indirect, non-existent or delayed
• Mass communication is the term used to • Cost per exposure per individual is minimum
describe the academic study of various • Source belongs to organization or institutions
means by which individuals and entities relay
• Mostly one way
information to large segments of the population
all at once through mass media. Mediacy is being the acknowledgement of the medi-
• Mass communication can also be defined as um delivering the message, while receiving the mes-
a “process whereby mass produced messages sage. If software designers characterise the two-di-
are transmitted to large, anonymous and mensional desktop interface as unnatural, they really
heterogeneous masses of receivers.” By ‘mass mean that it is too obviously mediated.
produced’ we mean putting the content or message
of mass communication in a form suitable to be The concept of immediacy describes the trans-
distributed to large masses of people. parency of the medium in which an image is pre-
sented. The most simple examples of immediacy
• ‘Heterogeneous’ means that the individual
are paintings and photographs, but over time it has
members of the mass are from a wide variety of
evolved to include cinema and TV. It is interesting
classes of the society. Means that individuals in to note that in these examples the larger the device
the most do not know each other. The source, or that is displaying the image, the more transparent
sender of message in mass communication does it becomes. An IMAX movie screen is more trans-
not know the individual members of the mass. parent than a standard movie screen, for instance.
Also the receivers in mass communication are Similarly, a 55” television is more transparent than
physically separated from each other and share one that measures 26”. The photographer, being
not physical proximity. transparent, achieved transparency through au-
tomatic reproduction, removing the artist as the
agent who stood between the viewer and the im-
age. Today, programmers are transparent as they
use algorithms to create an environment. The pro-
grammer is erased once the computer generates an
image by executing instructions the programmers
have written. Digital graphics and photography are
both examples where the human agent is erased.
However, a computer is imitating not an external
reality, but rather another medium.
Elements of Mass communication:
Transparent immediacy is one that erases itself so
It is observed that the terms mass communication that the user is no longer aware of using a medi-
must have at least five aspects: um,but able to develop a immediate relationship to
1.41
Professor Academy
the contents of that medium. Example: virtual real- The numbers reached by each of these art forms and
ity, whereas the presence of the mediator (the com- technologies have steadily grown from a handful, to
puter) is denied: “an interfaceless interface”. How- hundreds, thousands and even millions via newspa-
ever, transparent immediacy does not commit the pers, radio and TV. But now, through the medium of
Communication
viewer to a naive or magical conviction that the rep- the internet, the audience is virtually limitless. Mass
resentation is the same thing as what it represents. communication has been defined as “the process by
which a person, group of people, or organization
Hypermediacy places greater value on performance creates a message and transmits it through some
and interactivity than on artistic value. As such, the type of medium to a large, anonymous, heteroge-
user is usually more aware of the presence of these neous audience.” So, mass communication has been
media. Hypermedia are most often found in the around for quite some time now in different forms,
world of computer technology. When clicked, the but the ability for virtually anyone with a connected
hyperlink, directs to a new link that opens to show device to broadcast a customised message to tens of
a different type of content. Hypermediacy offers a thousands of people is very new. Now almost anyone
heterogenous space in which representation is con- can be a publisher and a simple smartphone or laptop
ceived of not as a window on to the world, but rather can be their publishing tool. So, the potential is now
as “windowed” itself. Laptops, smart phones, tablet there for organizations to customize their mass com-
computers, iPods, and e-readers are all examples of munication. But there are still barriers. Weak internet
hypermedia. However, hypermediacy is not limited or phone signals, fragmented channel providers, cen-
to the digital realm. Newspapers and magazines fit sorship in some countries, data protection and secu-
the description of hypermedia, as well. rity requirements.
Remediation is the representation of one medium in
another. For example, a digital photo album viewed Types of Mass Media
on a computer, a classic novel read on an e-reader, Mass media can be classified according to
your favorite newspaper’s online edition, or even a their physical form, the technology involved and
Blu-ray copy of a movie. All of these things have been the nature of the communication process.
remediated. They are being represented in a medium
other than the one they were originally created for. In The general classification on the basis is as follows.
other words the medium is “repurposed” to represent a. Traditional Media – Traditional media are a part
another medium.Aggressive remediation is seamless. of our country’s rich heritage. They has a strong base
For instance, Immersive Virtual Reality remediates in our oral tradition. They belong to our own land
both TV and film. Another form of remediation is and strongly rooted in our culture. They are as varied
placing a medium within a medium, for example: the and diverse as our culture itself. From very ancient
play within the play from Hamlet, the film Strange days we have been having fairs and festivals celebrat-
Days borrowing from another film, Vertigo. With ed with spontaneous songs and dances. These songs
literary critics, this has been a favorable thing: both and dances are traditional forms of media which in-
“homage and rivalry”. Repurposing as remediation is form, educate and entertain people.
both what is “unique to digital worlds” and what de-
nies the possibility of uniqueness. The advent of faster forms of media has af-
fected traditional media. However the performers or
History of Mass Communication communicators and the audience in traditional me-
The history of mass communication stretches dia are known to each other unlike in radio or tele-
from prehistoric forms of art and writing, through ba- vision. The environment in which the performances
sic printing technology from around 800AD; the in- take place is natural, known and friendly. The mes-
vention of Gutenberg’s printing press in 1455; the first sages are also simple; the content known and the lan-
weekly printed newspaper in Antwerp in 1605; the guage and idioms are familiar. Unlike other modern
invention of radio by Marconi in 1895; television by media, people never get tired of them.
John Logie Baird in 1925; and finally, to the internet There are several forms of traditional media
(the World Wide Web) by Tim Berners Lee in 1990. in our country. They are known by different names
1.42
Professor Academy
in different regions. Some common examples of tra- c. Electronic Media – The history of electronic
ditional media are storytelling, folk songs, street the- media starts with the invention of cinematograph
atre and puppetry. by Lumiere Brothers who conducted the premier
show of cinema in 1895. Later radio was invented by
Communication
Some forms of traditional media like traditional
songs and mythological stories are written down as Guglielmo Marconi. The first radio station was set
proper text. But different forms of folk media are up in Pittsburg, Newyork and Chicago in the 1920s.
generally spontaneous or are made on the spot. In short, the term electronic media mainly include
Film, Radio and Television.
Social Media Traditional Media d. New Media –
It is a form of electronic It includes contemporary
communication that modes of communication Types of New Media
enables users to create and such as television, radio, Types of New Primary Material Examples
share information, ideas, newspaper, magazine etc. Media Purpose
messages, and content. Discussion on
Harwarezone.
Two-way conversation is Traditional media delivers Forums & topics, interest Forum, Dis-
com
the heart of social media a single message through Chat Rooms group sharing cussion boards
Forums
marketing. one-way communication. of information
Web-Based
Social media gives a lot Only the sender decides Sending of
and Non- Hotmail
of freedom over creation what to publish, telecast electronic mail
Email Web- Gmail
with file
of information and in or broadcast, while the Based email Yahoo Mail
attachments
information sharing. receiver always receives the platforms
information. Fan sites,
Social media involves Traditional media Social Net- Alumni net-
Peer Network- Facebook
targeted two-way is designed for mass working works,
ing LinkedIn
Sites Personal news
communication which consumption which means
updates
means the message can they are targeted at mass
be addressed to targeted consumers. Hosting con- Informative
tent for content, pod-
audience. Content Ag- YouTube
information casts,
gregators Hulu
and videos, chan-
b. Print Media – Print media served as the major entertainment nels
means of communication reaching a wide audience, 3D Experi- Simulate envi-
Major forms of print media are: Virtual Reality ence, Alternate ronments, Second Life
• News papers Space experiences
• Magazines and periodicals MMORPG
(Massively
• Books
multiplay-
Alternate
er online World of
Online Gam- fantasy,
➢ News sheet is a thin newspaper con- ing entertainment,
role-playing Warcraft
taining information about a company or
games), StarCraft II
gaming
multi-player
organization. online
➢ A tabloid is a newspaper with a compact games
➢ Broadsheet: A standard or full sized Internet and World Wide Web opened up
newspaper that takes a serious look at several new avenues for mass communication which
major news stories. include e-mail, websites, podcasts, e-books, Blog-
1.43
Professor Academy
ging, social networking sites, Internet Protocol Tele- • Asynchronous message passing allows more
vision, Internet radio and the like. These kinds of parallelism. Since a process does not block, it
online and digital means of producing, transmitting can do some computation while the message
and receiving messages are called new media. This is in transit. In the case of receive, this means
Communication
new media has imparted wider knowledge in educa- a process can express its interest in receiving
tion and exposure rather mere facts. messages on multiple ports simultaneously.
e. Social media– It has brought different people Blog Post
from the different geographical area on one platform Blogs
Comments
on which they can share their feelings, ideas, emo-
tions, information and much more. The mainfold so- Main Post
Web Protals
cial networking sites like Facebook, WhatsApp, Ins- Comments
First Mail
Media can further be Classified as Synchronous and E-malls
Asynchronous Based on the response or feedback Replies to the mail
Media
Synchronous Messages Social
First comments
Networking
Follow-up-comments
Synchronous Messages are able to flow in
both directions, to and from. Essentially it means that Prevlously non- related
Synchronous Chats
synchronous messaging is a two way communication. Prevlously related
i.e. Sender sends a message to receiver and receiver
receives this message and gives reply to the sender. Functions of Mass Media:
Sender will not send another message until it gets a Mass media is a tremendous source of
reply from receiver. Synchronous message emphasis information for individuals as well as society. The
instant feedback. functions of mass media in sequence are Information,
Asynchronous Messages (No Instant feedback/ reply) Education, Entertainment, Transmission of culture
Asynchronous messages are those without and Social integration.
instant reply/ feedback means that, it is a one way
communication and the flow of communication is INTERESTING FACTS!
one way only. They enable flexibility and offer higher Rich
Ri media is a digital advertising term for an ad that
availability. There’s less pressure on the system to act includes advanced features like video, audio, or other el-
on the information or immediately respond in some ements that encourage viewers to interact and engage
way. Also, one system being down does not impact with the content. While text ads sell with words, and dis-
the other system. For example, emails – you can send play ads sell with pictures, rich media ads offer more
thousands of emails to your friend without her having ways to involve an audience with an ad.
to revert back to you. The drawbacks of asynchronous Hypermedia is an extension to what is known as hy-
collaboration are that they can lack a sense of pertext, or the ability to open new Web pages by click-
immediacy. There’s less immediate interaction. ing text links on a Web browser. Hypermedia extends
upon this by allowing the user to click images, movies,
graphics and other media apart from text to create a
nonlinear network of information.
Communication
bring about this change. You may ask how media Bharati’s Doordarshan, the national television
can impart skills. A mass media like television can broadcaster. All India Radio is one of the largest
demonstrate and show how things work. You would radio networks in the world. Its headquarters is
have seen on television how a certain dish is cooked at the Akashvani Bhavan in NewDelhi.
using modern kitchen equipment. • Doordarshan is an autonomous public service
b) Mass Media have made the World Smaller and broadcaster owned by the Broadcasting
Closer Ministry of India and is one of two divisions
The speed of media has resulted in bringing of Prasar Bharati. It was established on 15
people across the world closer. Let us take an September 1959.
example. When you watch a cricket match between • Press Council of India It is a statutory body
India and another country in England, Australia or in India that governs the conduct of the print
New Zealand live on television, you feel you are part media. The Press Council of India was first
of the crowd in that stadium. Events, happy or sad, set up on 4th July 1966 by the parliament
happening anywhere can be seen live. Sometimes we on the recommendations for the First Press
feel that the entire world is one big family. Wherever Commission with the object of preserving the
we go to any part of the world, we see the same freedom of the Press and of maintaining and
products such as soft drinks, television, washing improving the standards of press in India. The
machine, refrigerator etc. and the same type of Present Council functions under the Press
advertisements. Similarly, the worldwide web and Council Act 1978. It is a statutory, quasi-
internet have brought people and countries much judicial body which acts as a watchdog of the
closer. press. Every year National Press Day in Indian
c) Mass Media Promotes Distribution of Goods is celebrated on 16th November i.e., a symbol
of a free and responsible press in India.
Mass media are used by the consumer
industry to inform people about their products and Newspaper Circulation in India
services through advertising. Without advertising, • The Readership Studies Council of India (RSCI)
the public will not know about various products and Media Research Users Council (MRUC)
(ranging from soup to oil, television sets to cars) and released the Indian Readership Survey (IRS)
services (banking, insurance, hospitals etc.) which 2017 in Jan 2018. Now a decision has been
are avail-able in the market as well as their prices. taken to publish Quarterly Survey.
Thus mass media help the industries and consumers. • The IRS Q2 was released in August 2019. The
Keyrole played by Mass Media: Information and key results are:
education, Socialization, Entertainment, Political • Total Readership: 1st Dainik Jagran, 2nd:
awareness, Cultural transmission, Catalyst to devel- Hindustan, 3rd: Dainik Bhaskar, 4th: Amar
opment . Ujala, 5th: Daily Thanthi.
Mass Communication Agencies: • Magazine Circulation in India: 1st India
• Prasar Bharati is India’s largest public Today (English), 2nd : India Today (Hindi),
broadcaster. It is an autonomous body set 3rd: Samanya Gyan Darpan, 4th: Vanitha
up by an Act of Parliament and comprises (Malayam)
Doordarshan television network and All India • Television Broadcasting Standards: NTSC
Radio which were earlier media units of the (National Television Standards Committee)
Ministry of Information and Broadcasting. It is a standard used in North America and Japan.
was formed in 1997.
1.45
Professor Academy
• SECAM (Sequential Color Memory) is used them. Like in any other profession, like law or
sparingly around the world and can be found in medicine, the media also need to have a code of ethics
France, parts of Greece, Eastern Europe, Russia, or guidelines on what is right or wrong. In the case
Africa and a few other parts of the world. of lawyers and doctors, there are clear codes of ethics,
Communication
• TRP (Target Rating Points) is a measure of and anyone who violates the code can be punished, or
the purchased points representing an estimate removed from the profession. But in the case of the
of the component of the target audience with in mass media there are only a few guide-lines and no
the gross audience. Similar to the gross rating strict code of conduct. The Press Council of India is
one of the organizations which issues guidelines on
point, it is measured as the sum of ratings
media ethics. To keep the fair name of the profession,
achieved by a specific media vehicle (e.g T V
the media practitioners need to follow certain ethical
channel or program) of the target audience
codes which are listed below:
reached by an advertisement.
• Press Trust of India (PTI) is the largest news a) Accuracy: The information provided by media
agency in India. It is headquartered in Delhi persons in the printmedia, radio, television and
and is a nonprofit cooperative among more internet has to be accurate. If incorrect or baseless
than 450 Indian newspapers. It took over the information is given, it can harm the interests
Indian operations of the Associated Press and of individuals, institutions and the country. For
Reuters soon after India’s independence on being accurate, media persons have to verify the
August 15, 1947. It provides news coverage correctness of their facts. For example, if only 50
and information of the region in both English people have died in an accident, the media cannot
and Hindi. Press Trust of India is the only give out the figure as 200 or 500. If a media person
news agency in South Asia which operates its writes against anybody or accuses someone
own communication satellite, an INSAT, to of dishonesty, that person should be given an
broadcast news and information. opportunity to give his or her version of the story.
• Hindusthan Samachar was a multilingual b) Confidentiality: A media person maintains
news agency in India. It was set up in 1948 by confidentiality of information revealed by
S.S Apte, offering its services in 10 languages: various sources.
Bengali, Oriya, Assamese, Telugu, Malayalam,
Urdu, Punjabi, Gujarati, Hindi and Marathi. In c) Protection of sources: A source which has
1951 the Government of Bihar subscribed to the provided confidential information should
Hindusthan Samachar, followed by many states never be revealed. For example if a government
of emergency was declared in India in 1975, official provides information pertaining to his
Hindusthan Samachar was merged with Press department, media person should not reveal the
Trust of India, United News of India and Bharati name of the person in order to protect him from
Samachar to form the media monopoly Samachar. any harm.
d) Right to privacy: A journalist should respect
Media Ethics the right of a person to have privacy. That would
We have seen how powerful the mass media mean that a journalist should not write about
are. By their very nature media and the media the private life of ordinary citizens.
people meaning journalists of the print media, radio e) No incitement to violence: Mass media should
and television are quite powerful. So politicians, not motivate or provoke people to indulge in
bureaucrats and the police look at them with violence or crime. Glorifying violence in writings
apprehension. Generally they do not want to be in should also be avoided.
the media if the reports are not in their favour. If the
f) No vulgarity or obscenity: Mass Media should
media people praise them, they are happy. So by and
large people try to be friendly with the media. But not write, display or broadcast anything that is
for the media this power comes with tremendous vulgar or obscene.
responsibility. If they misuse that power to do wrong g) No Communal writing: India is a country where
things or trouble others, people will stop trusting people follow diverse faiths and religions. Our
1.46
Professor Academy
Constitution believes in secularism, which means Impact of Mass Media
respect for all faiths and religions. It is easy for
the media to create problems between sections A) Positive Effects
with different faiths and religions by writing about • Media provide news and information required
Communication
them or broadcasting issues which can pro-mote by the people.
communal problems. There have been several
occasions when communal riots and killings have • Media can educate the public.
taken place based on media reports. The media has • Media helps a democracy function effectively.
to ensure that it works in the interest of the public. They inform the public about government
policies and programmes and how these
Theories in Mass media programmes can be useful to them. This helps
Three main sociological perspectives on the the people voice their feelings and helps the
role of media exists: government to make necessary changes in
their policies or programmes.
• The Limited effects theory • Media can entertain people.
• The class dominant theory,
• The culturalist theory. • Media can act as an agent of change in
a) Limited effects theory: development.
• Media has brought people of the world closer
The limited effects theory argues that because to each other.
people generally choose what to watch or read
based on what they already believe, media exerts a • Media promote trade and industry through
negligible influence. This theory Originated and was advertisements
tested in the 1940s and 1950s. • Media can help the political and democratic
processes of a country.
b) Class dominant theory
• Media can bring in positive social changes.
The Class dominant theory argues that the medial
reflects and projects the view of a minority elite, B) Negative Effects
which controls it. Those people who own and • The traditional culture of a country is adversely
control the corporations that produce media affected by mass media.
comprise this elite. • Entertainment has become the main
c) Culturalist Theory component of mass media. This affects the
The cutluralist theory, developed in the 1980s and primary objectives of media to inform and
1990s, combines the other two theories and claims educate the people.
that people interact with media to create their own • Media promote violence. Studies have proved
meanings out of the images and messages they that violence shown on television and cinema
receive. This theory sees audiences as playing an have negative effects on children. Mass media
active rather than passive role in relation to mass promote the desire in people to buy and own
media. One strand of researches focuses on the products that are advertised through the media
audiences and how they interact with media the but which may not be essential for them.
other strand of research focuses on those who
produce the media, particularly the news. Self Evaluation
Importance of Mass media
LEVEL 1
_ Pervasiveness of Mass Media
1. Communicated message is considered as a/an
_ Mass Communication informs a) Social product [Nov-2020]
_ Mass Media Entertains b) Unnatural product
_ Mass communication Persuades c) Spin – off product
d) Techno product
_ Mass communication Binds
1.47
Professor Academy
2. The domain of media appeal addresses the issues re- (B) News book
lated to [Sept-2020] (C) News sheets
a) Knowledge b) Learning (D) Tabloids
c) Legality d) Emotions (E) Broad sheets
Communication
1.48
Professor Academy
6. Identify the correct sequence of mass media 10. Match List I with List IT: [Nov-2020]
functions: [Oct-2020] List I
(A) Entertainment (Type of media)
(B) Information (A) Synchronous media
Communication
(C) Transmission of culture (B) Asynchronous media
(D) Social integration (C) Rich media
(E) Education (D) Hyper media
Choose the correct answer from the following:
List II
a) (A), (C), (D), (E), (B) b) (B), (C), (E), (D), (A)
(Example)
c) (B), (E), (A), (C), (D) d) (C), (D), (E), (A), (B)
(I) Application of multi-media
7. Find out the correct sequence of the following trans- (II) Interactive multi-media
missions: [Oct-2020] (III) E-mail
(A) Narrowcasting (B) Telegraph (IV) Telephone
(C) Broadcasting (D) Telephone Choose the correct answer from the following:
(E) Podcasting a) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
Choose the correct answer from the following: b) (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
a) (A), (C), (B), (E), (D) b) (B), (D), (C), (A), (E) c) (A)-(II), (B)-(IV), (C)-(I), (D)-(III)
c) (C), (D), (E), (A), (B) d) (D), (E), (A), (B), (C) d) (A)-(III), (B)-(I), (C)-(IV), (D)-(II)
8. Find out the correct sequence of selectivity stages in 11. Match List 1 with List II [Sept-2020]
mass communication. [Nov-2020] List I
(A) Exposure (B) Retention A. Addressing the nation over national TV network
(C) Attitudinal change (D) Perception B. Conducting a workshop for a select number of
(E) Attention teachers
Choose the correct answer from following: C. Internal conversation with fellow workers
a) (A), (B), (C), (E), (D) b) (B), (C), (D), (E), (A) D. Recollection of past events
c) (C), (E), (D), (A), (B) d) (A), (E), (D), (B), (C)
List II
9. Match List I with List II [Nov-2020] Example
List I Type of communication
(Mode of Communication) I. Horizontal communication
(A) One-to-one II. Intra-personal communication
(B) One -to-many III. Mass communication
(C) Many-to- many IV. Group communication
(D) One-to-none Choose the correct answer from the following:
a) A - I, B - II, C- III, D - IV
List II
b) A - II, B - III, C - IV, D - I
(Type of communication)
c) A - III, B - IV, C - I, D – II
(I) Network (transactional)
d) A - IV, B - I, C - II, D – III
(II) Intra-personal
(III) Inter-personal
(IV) Mass Communication especially print Answer Key
Choose the correct answer from the following:
1 2 3 4 5 6 7 8 9 10
a) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
b) (A)-(II), (B)-(III), (C)-(IV), (D)-(I) d b d a a c b d c b
c) (A)-(III),(B)-(IV), (C)-(I), (D)-(II) 11
d) (A)-(IV), (B)-(I), (C)-(II), (D)-(III) c
1.49
2 DATA INTERPRETATION
25%
Percentage
30% x is what percentage of y = x/y × 100
10%
x is what percentage more (or) less than
12% y = (x – y) / y × 100
23%
Percentage (Final value - Initial value) × 100
change = Initial value
Data Interpretation
Pakistan hold first position with 95 death per
thousand birth
5) Learn to Approximate the values- You need not to
find the exact answer always. Many times, the options 3. Life expectancy at birth is highest in
that are given are far enough from each other which a) Korea Republic b) Malaysia
gives you enough space for approximation. So, for c) India d) Philippines
example, if you are asked to divide 542678/181234, Answer: a
you can easily approximate that the answer will be The life expectancy in Korea Republic is 72.4, the
somewhere around 3 by looking at the first 2 digits highest.
only. 54/18 is 3. 4. How many countries having 70% and above adult
literacy rate
Level-1
a) 3 b) 4 c) 5 d) 6
Solved Question with Explanation Answer: c
Korea Republic, Philippines, Malaysia, Indonesia,
1.1. Directions (1-5)
China are the 5 countries having 70% and above
Study the table given below to answer these adult literacy rate.
questions. Indicators of Human development for
5. What is the ratio between Korea Republic and
some Asian Countries – 2017
Malaysia in infant mortality rate?
Infant a) 3: 9 b) 3: 5 c) 9: 19 d) 1: 2
Adult
Life Mortality Answer: b
Literacy Korea Republic : Malaysia = 6 : 10 = 3 : 5
Country Expectancy rate
rate
At birth (per thou- 1.2. Directions (6-10)
(per cent)
sand births) Study the following table to answer the given questions:
India 62.4 71 62 Percentage of marks obtained by seven students in six
Bangladesh 58.1 81 39 subjects
China 69.8 38 83 Subject
Indonesia 65.1 45 85 (Max,
Eng. His Com Math Science Econ
Korea Republic 72.4 6 97 Marks
Malaysia 72.0 10 86 Students
Pakistan 64.0 95 41 (100) (100) (100) (100) (100) (100) (100)
The Philippines 68.3 32 95 Meera 100 70 50 50 90 60
Subodh 80 80 80 100 80 40
2.3
“If you work on something a little bit every day, you end up with something that is massive” – Kenneth
Professor Academy
Kunal 100 80 60 90 70 80 11. Find the average mark of Edwin?
a) 90 b) 79 c) 60 d) 69
Soni 60 70 65 80 80 80
12. What is the ratio of Giri’s Maths marks to that
Richu 50 90 62 80 100 100
Subbu English mark?
Irene 40 70 64 70 65 85 a) 13:14 b) 14:13 c) 15:16 d) 14: 15
Vijay 80 100 35 65 50 7513. What is the difference between of Edwin and Raj
6. What is the total marks obtained by Meera in all in total marks?
the subject? a) 150 b) 120 c) 130 d) 200
a) 448 b) 580 c) 420 d) 47414. Students who secured 50% below considered to be
Answer: c failed in the examination. How many students are
100+70+50+50+90+60=420 failed in the examination?
7. What is the average marks obtained by these seven a) 1 b) 4 c) 3 d) 2
students in History? (rounded off to two digits) 15. Find the difference between total mark of Tamil
a) 72 b) 73 c) 86 d) 80 and Social science for all the students?
Data Interpretation
Answer: d a) 27 b) 37 c) 17 d) 7
(70+80+80+70+90+70+100)/ 7=560/7=80
1.4 Directions (16–20)
8. How many students have got 60% or more marks
Study the following information carefully and answer
in all the subjects?
the given questions. The Table, given here, shows the
a) One b) Two c) Three d) Four
number of tickets sold by 6 students A, B. C, D, E and
Answer: b
F during a fair. Observe the table and answer questions
Soni & Kunal secured above 60% in all subject.
based on it.
9. What is the overall percentage of Kunal ?
a) 64 b) 65 c) 75 d) 80 Students A B C D E F
Answer: d Tickets 16 8 20 7 24 14
(100+80+60+90+70+80)/6=480/6=80 16. Total number of tickets sold by A, B and C is
10. In which subject richu secured the best? a) 45 b) 44 c) 42 d) 40
a) Maths b) Commerce 17. The least number of tickets were sold by
c) History d) Science. a) B b) F c) A d) D
Answer: d
Richu secured 100 marks in Science 18. Total number of tickets sold by D, E and F is
a) 47 b) 46 c) 45 d) 44
Practice Question
19. The difference between tickets sold by E and F ?
1.3 Directions (11–15) a) 10 b) 20 c) 15 d) 38
Study the following table carefully and answer the 20. The ratio between tickets sold by A and B ?
given questions a) 2 : 3 b) 4 : 2 c) 1 : 2 d) 2 : 4
The table shows four different student marks in 10th 1.5 Directions (21–25)
STD in five different Subjects.
Study the following table carefully and answer the
Student Tamil English Maths Science Social given questions. Profit of Company X In the year 1997,
Name (100) (100) (100) (100) Science 1998, 1999, 2000 as Quarters.
(100) 1997 1998 1999 2000
Edwin 80 70 96 85 64 Quarter 1 135 65 120 150
Giri 55 60 70 40 65 Quarter 2 115 75 160 180
Raj 35 45 60 50 55 Quarter 3 90 100 170 210
Subbu 85 65 75 76 54 Quarter 4 70 120 190 230
2.4
Professor Academy
21. Approximately, what was the actual profit made 17. Answer: d
by the department store in the second quarter of Least number of tickets are sold by D, D sold only
1999? Seven tickets
a) Rs. 160 lakh b) Rs. 170 lakh 18. Answer: c
c) Rs. 180 lakh d) Rs. 210 lakh Total number of tickets sold by D, E, F
22. In which of the following quarters, did the = 7 + 24 + 14 = 45
departmental store make the least amount of 19. Answer: a
profits? The difference between tickets sold by E and F
a) Third quarter of 2000 = 24 – 1 = 10
b) Second quarter of 1999
c) First quarter of 1999 20. Answer: b Hint: 2 : 1 ≠ 1 : 2
d) First quarter of 1998 The ratio between tickets sold by A and B
= 16 : 8 = 2 : 1[Since 4 : 2 = 2: 1]
23. During the period 1998-2000, how many quarters 21. Answer: a
exceeded the profit of Rs. 150 lakh? Profit made by department store in second quarter
a) 6 b) 5 c) 4 d) 3 of 1999 = 160 lakhs
Data Interpretation
24. In the year 2000, total profit made by the 22. Answer: d
departmental store was approximately Third quarter of 2000 = 210 lakhs
a) Rs. 540 lakh b) Rs. 630 lakh Second quarter of 1999 = 160 lakhs
c) Rs. 720 lakh d) Rs. 770 lakh First quarter of 1000 = 120 lakhs
25. Find the avg profit made by departmental store in First quarter of 1998 = 65 lakhs
the year 1999? The least (minimum) is first quarter of 1998 with
a) 170 lakh b) 160 lakh 65 lakhs
c) 140 lakh d) 120 lakh 23. Answer: a
Answer Key with Explanation In the period, 1998 – 2000, profit exceeding of Rs.
150 lakhs are six.
11. Answer: b B. Second quarter 1999
Average mark of Edwin C. Third quarter 1999
= (80+70+96+85+64) / 5 =395 / 5 = 79 D. Fourth quarter 1999
12. Answer: b E. Second quarter 2000
Giri marks in maths: Subbu marks in English F. Third quarter 2000
70 : 65 G. fourth quarter 2000
14 : 13
24. Answer: d
13. Answer: a Total profit in 2000 = 150 + 180 + 210 + 230
Total marks of Edwin = 395 = 770 lakhs
Total marks of Raj = 245
Difference = 150 25. Answer: b
Avg of profit in 1999
14. Answer: d = (120 + 160 + 170 + 190)/4 = 640 / 4 = 160 lakhs
Giri scored less than 50% in Science
Raj scored less than 50% in Tamil & English Level-2
15. Answer: c Solved Question with Explanation
Total marks in Tamil = 255
Total marks in Social Science =238 2.1 Directions (1-5)
Difference =255 – 238 = 17 Study the following table and answer the question.
16. Answer: b The data Shows Profit of E-Commerce sites in
Total tickets sold by A + B + C = 16 + 8 + 20 India (in Million) (Note :1 million=10 Lakhs)
= 44 tickets
2.5
Professor Academy
Profit of E-commerce sites in india (in million)
Months Jan Feb March 6. The ratio of the total expenditure on football to
Amazon 360 350 400 that of expenditure on hockey is:
Flipkart 320 300 280 a) 1:15 b) 1:1 c) 15:1 d) 3:20
Answer: b
Snapdeal 150 120 180
Food ball : Hockey = 15 : 15 = 1 : 1
India mart 270 230 130
7. If the total expenditure on sports during the
Myntra 120 80 70
year was Rs. 1,20,000,00 how much was spent on
1. What is the total profit of Snapdeal in all the given basket ball?
months together? a) Rs. 9,50,000 b) Rs. 10,00,000
a) 450 b) 300 c) 400 d) 380 c) Rs. 12,00,000 d) Rs. 15,00,000
Answer: a Answer: d
150+120+180=450 Total expenditure (100%) = 1,20,000,00
2. Find the difference between profit of amazon in the Expenditure on basket ball (12.5%) = x
Janauary month and profit of flipkart in Febraury x = (1,20,000,00 X 12.5
Data Interpretation
month? =15,000,00
a) 30 b) 60 c) 70 d) 80 Short cut:
Answer: b 100% = 1,20,000,00
360-300=60 10% = 12,00,000
3. Find the average profit of India mart 2.5% = 15,00,000
e-commerce? 8. The chart shows that the most popular game of the
a) 400 b) 300 c)210 d) 410 country is :
Answer: c a) Hockey b) Football
(270+230+130)/3= 630/3=210 c) Cricket d) Tennis
Answer: c
4. What is the total profit earned by flipkart in march
and Myntra in march together? As the expenditure on cricket is highest than
a) 270 b) 250 c) 300 d) 350 the rest, then it shows that cricket is a most popular
Answer: d game of a country.
280+70=350 9. Out of the following country’s expenditure is the
5. The profit earned by snapdeal in the month of same on :
January is approximately, what percentage of the a) Hockey and Tennis
profit earned by flipkart in the month of Febraury? b) Golf and Basket ball
a) 50% b) 60% c) 70% d) 80% c) Cricket and Football
Answer: a d) Hockey and Golf
(300-150)/300 X 100 = 150/300 X 100 = 50% Answer: b
Expenditure on Golf = 12.5% = Expenditure on
2.2 Directions (6-10)
Basket ball
Study the following Pie Chart and answer the
10. If the total expenditure on sport during the year
question .The data Shows Expenditure on Sports.
was Rs. 1,50,00,000 the expenditure on cricket and
hockey together was:
Hockey nis
n a) Rs. 60,00,000 b) Rs. 50,00,000
Te % rs
Football 15% 0
1 the c) Rs. 37,50,000 d) Rs. 25,00,000
O Answer: a
15% 10%
Basket balls Total expenditure = 1,50,000,00
Cricket
12 ½% (Cricket + Hockey) Together =
25% Golf 1,50,000,00 = 100%
12 ½% 25% + 15% = 40%
2.6
Professor Academy
Let, x be 40% Family Income Spent During 2019
x = 40%
Expenditure (in %)
x = (40 X 1,50,000,00) / 100 =60,000,00
Short cut : Other Food
18% 20%
100% = 1,50,000,00
10% = 15,00,000
40% = 60,00,000 Savings
Transport 12%
Practice Question
20%
2.3 Directions (11-15) Clothing
Education
Study the following table and answer the following Housing 15%
5%
10%
questions given.
The table shows about number of people using 16. The percent of income spent on food and clothing
Vodafone, Jio, Airtel service centre..(in thousands) is:
Year Vodafone Jio Airtel a) 5% b) 30% c) 12% d) 35 %
Data Interpretation
2014 15 25 10 17. The percent of income spent on clothing exceeds
2015 15 10 15 that on savings by:
2016 10 25 20 a) 3% b) 2.5% c) 10% d) 22.5%
2017 10 20 15
2018 40 25 25 18. If the total income of the family during 2019 was
2019 15 15 25 Rs. 100000, the savings of the family in 2019 was:
a) Rs. 1,750 b)Rs. 20,000
11. What is the average number of people using mobile c) Rs. 12,000 d) Rs. 50,000
service of Jio all year’s together?
a) 16,000 b) 18,000 19. The total expenses of the family on transport is
c) 20,000 d) None of these equal to those spent on:
a) Savings b) clothing
12. The total number of people using all 3 service c) food d) others
centre in 2017 is what percent of total number of
people using these service centre in 2018? 20. The savings of the family is more than that of
a) 50% b) 67% c) 66% d) 59% expenditure incurred on:
a) Housing b) clothing
13. The number of people using of Vodafone in 2016, c) transport d) others
2015 and 2014 together?
a) 40,000 b) 30,000 2.5 Directions (21-25)
c) 20,000 d) None of these Study the following table carefully and answer the
14. What is the ratio of Airtel service centre in the questions given below.
year 2015 to the year 2014?
Amount invested by six different companies during
a) 2:3 b) 4.2 c) 3:2 d) 2:4
six different months (in lakhs)
15. The total number of people using Jio service centre
Company A B C D E F
in 2019 and the previous year is equal to?
a) 32000 b) 50000 JAN 25 28 50 32 24 35
c) 44000 d) 40000 FEB 45 40 60 55 28 38
MAR 52 38 46 72 83 65
2.4 Directions (16 – 20)
APR 80 45 70 90 65 76
The Pie-Chart given below shows the expenditure of
MAY 15 20 47 25 13 30
a family income on various items and savings during
2019. Observe the graph and answer the following JUN 62 95 27 80 50 20
questions:
2.7
Professor Academy
21. What is the difference between the investment Total income of family in 2019 = 1,00,000
made by company A and E together in March and 100% = 1,00,000
company B and D together in January (in lakh)? The savings of family = 12%
a) 75 b) 65 c) 50 d) 85 Let, x = 12%
22. What is the average of investment made by X = (1,00,000 X 12) / 100 = 12,000
company C in May, D in February and E in January 19. Answer: c
(in lakhs)? Total expenses on transport = 20%
a) 22 b) 36 c) 42 d) 46 = Total expenses on food
23. In which month was the investment made by 20. Answer: a
companies maximum? The saving of family is 12% housing, which is 10%
a) March b) April c) May d) June 21. Answer: a
24. What is the total investment made by company A Investment made by A and E in March
in all the months together ? = 52 + 83 = 135
a) 300 b) 279 c) 340 d) 230 Investment made by B and D in January
= 28 + 32 = 60
Data Interpretation
Data Interpretation
x = 12%
Shortcut:
x = (3600 x 12) / 100 = 43.20
100% = 2,00,000
Shortcut:
10% = 20,000
100% = 3600
20% = 40,000
10% = 360
2. The difference in expenditure between housing 1% = 3.60
and clothing is 2% = 7.20
a) 10,000 b) 12,000 12% = 360+7.20=43.20
c) 5000 d) 7000
3.2 Directions (6 - 10)
Answer: a
Housing = 10% Clothing = 15% Study the table and answer the given questions.
Difference = 5% Considered the following table the total number
100% = 2,00,000 of tickets sold of five movies P,Q,R,S and T across
5% = x two cinema houses A and B on a particular day. In
X = (2,00,000 x 5) / 100 = 10,000 accordance with the table,answer the question that
Shortcut: follows:
100% = 2,00,000
10% = 20,000 Movies Cinema A Cinema B
5% = 10,000 P 200 300
3. The total expenditure on transport and education is. Q 350 400
a) 35,000 b) 40,000 R 250 350
c) 50,000 d) 25,000 S 300 350
Answer: c T 400 250
Transport = 20% Education = 5%
U 500 200
Total expenditure (transport + education)
= 25% 6. What is the average sales in cinema A for all
100% = 2,00,000 movies?
25% = x a)333.33 b)433.33 c)555.33 d)633.33
x = (2,00,000 x 25) / 100 =50,000 Answer: a
Shortcut: 200+350+250+300+400+500=2000/6=333.33
100% = 2,00,000 7. What is the average sales in cinema B for all
50% = 1,00,000 movies?
25% = 50,000 a)308.33 b)408.33 c)508.33 d)608.33
2.9
Professor Academy
Answer: a in 2009?
300+400+350+350+250+200=1850/6=308.33 a) 2.5 lakh b) 1 lakh
8. What is the difference between the average of P c) 1.5 lakh d) 1.75 lakh
and Q of cinema A and average of T and U of 12. The total number of visitors in 2013 is approximately
cinema B? what percent of the total number of visitors in
a)80 b)50 c)75 d)85 2016?
Answer: b a) 60 % b) 85 % c) 40 % d) 70 %
Average of P and Q cinema 13. If the visitors go to amusement park, the entry
A=200+350=550/2=275 fees for Malaysia visitors is Rs 350 and that of
Average of T and U cinema China visitors is Rs 450 for all visitors then what
B=200+250=450/2=225 is the total income of for that park from both the
Difference=275-225=50 country visitors during 2014 to 2016?
9. What is the difference between the average of a) 87.5 crore b) 95 crore
cinema A and cinema B? c) 92.5 crore d) 77.5 crore
a) 65 b) 25 c) 95 d)105 14. From which country is the number of visitors
Data Interpretation
Data Interpretation
what percentage less than the total number of = 1 lakh
people joining in BSF in the year 2013 and 2015 12. Answer: d
together? Total number of visitors travelled in 2013
a) 20 % b) 45 % c) 30 % d) 60 % =1+2+4+5
3.5 Directions (21 – 25) = 12 lakh
Study the following table carefully to answer the Total number of visitors travelled in 2016
questions that follow: =3+4+5+6
= 18 lakh
Number of medals won by the five different countries Required % = 12 × 100 / 18 = 66.67% = 70 %
in six Olympic Games
13. Answer: c
Country Income from Malaysia visitors during 2014 to
Year China USA India Russia England 2016
1992 120 65 35 65 64 = (5 + 2 + 4) × 350
1996 140 60 70 36 28 = 3850 lakh
2000 42 50 56 42 110 = 38.5 crore
2004 132 38 108 41 59 Income from China visitors during 2014 to 2016
2008 90 74 76 45 63 = (3 + 4 + 5) × 450
2012 64 46 82 69 80 = 5400 lakh
21. Which country won second highest number of = 54 crore
medals over all the Olympics together? Total income = 38.5 + 54 = 92.5 crore
a) China b) Russia 14. Answer: a
c) India d) England Number of visitors travelled from Russia during
22. What was the approximate percent increase in the given eight years
number of medals won by country-India in the = 6 + 7 + 4 + 5 + 5 + 7 + 6 + 3 = 43 lakh
year 2004 from the previous Olympics? Similarly, in China = 28 lakh
a) 85% b) 75% c) 95% d) 60% In Japan = 36 lakh
In Malaysia = 27 lakh
23. If 50 percent of the medals won by USA in the year The number of visitors travelled by Russia is the
2000 were gold medals. 10 percent were bronze maximum.
and remaining were silver medals, then find the
number of silver medals won by that country? 15. Answer: d
a) 20 b) 33 c) 43 d) 37 Donation of Russia visitors in 2015
2.11
Professor Academy
= 600000 × 400 = 240000000 India won second highest number of medals over
= 24 crore all the years together.
Donation of Japan visitors in 2016 22. Answer: c
= 240000000 × 120 / 100 Required percentage
= 28.8 crore => (108-56)/56 x 100 = 52/56 x 100 = 93% = 95 %
Required ratio = 24 : 28.8 = 5 : 6
23. Answer: a
16. Answer: c Total medals won by country USA in the year
Explanation 2004 = 50
x = Total member of people joining in given forces Number of gold and bronze medals = (50+10) %
together in 2013 = 6.2+2.4+1.6+5.6 of 50 = 30
= 15.8 Therefore, Number of silver medals won
Y= Total member of people joining in given forces = 50 – 30 = 20
together in 2015 = 6.6+3.2+2.2+6.2 24. Answer: b
= 18.2 Number of medals won by China in 2012 = 64
Formula → X is what percentage of Y? Number of medals won by Russia in 1996 = 36
Data Interpretation
2.12
Professor Academy
= 1.9+2.3 =4.2lakh Institutions A B C D E
Required ratio = 5.4/4.2 = 9/7 = 9 : 7
cities
2. What is the percentage change in the number Chennai 680 610 995 295 950
of unsold cars for company C in the year 2009, Bangalore 480 530 900 200 800
compared to the previous year?
Kochi 640 670 980 280 910
a) 68 23 % increase b) 500% increase
c) 25% decrease d) 400% increase Hyderabad 830 790 985 295 920
Answer: d Goa 390 560 940 230 820
The number of unsold cars for Company C in the Mumbai 830 790 985 295 1090
year 2009
6. The number of students studying in institute A in
= 3.3 – 2.8 = 0.5 lakh = 50000
Bangalore is approximately what percentage ,more
The number of unsold cars for Company C in the
than that of students studying in institute D in kochi?
year 2008
a) 71% b) 89% c) 69% d) 61%
= 3.1 – 3 = 0.1 lakh = 10000
Answer: a
Required % change
[(480-280)/280]*100=71%
Data Interpretation
= [(50000 -10000) / 10000] x100
= (40000/10000) x 100 = 400% increase 7. What is the average number of students studying
in institute E taking all cities together?
3. What is the total number of cars sold by all the
a) 925 b) 905 c) 915 d) 900
given companies together in the year 2008?
Answer: c
a) 10.4 lakh b) 12.1 lakh
(950+800+910+920+1090+820)/6=5490/6=915
c) 11.8 lakh d) 11.0 lakh
Answer: d 8. What is the percentage difference between the
Total number of cars sold by all the given total number of students studying in Bangalore
companies together in 2008 and Mumbai taking all institution together?
= 2 + 1.2 + 3 + 4.8 = 11.0 = 11 lakh a) 37% b) 39% c) 41% d) 35%
Answer: a
4. What is the average production of company A
Bangalore =480+530+900+200+800=2910
over all the years?
Mumbai=830+790+985+295+1090=3990
a) 2.85 lakh b) 2.90 lakh
Difference:3990-2910=1080
c) 2.36 lakh d) 2.78 lakh
%difference=(1080/2910)*100=37%
Answer: d
Required average = (2.9 +3.2 +2.6 +3 + 2.2 )/5 9. The number of students in institute A in Chennai
= 13.9/5 = 2.78 lakh and Hyderabad together is what percentage less
than the number of students studying in institution
5. What is the ratio of the total sales of Company A
C in Bangalore and Hyderabad together?
to that of Company D for the years 2007, 2009 and
a) 19% b) 17% c) 21% d) 23%
2010 taken together?
Answer: b
a) 3 : 7 b) 4 : 9 c) 10 : 11 d) 7 : 13
Institute A: 680+830=1510
Answer : a
Institute C: 900+935=1835
required ratio = (1.9+2.3+1.8 ) / (4.7+4.5+4.8)
(1835-1510)/1835 = (325/1835)*100 = 17%
=6/14 = 3 : 7
10. What is the respective ratio between the number
4.2 Directions (6-10)
of students studying in institute D in Hyderabad
Study following table and answer the questions below and institute A in Goa?
Number of students from various cities, studying in a) 3:2 b) 4:2 c) 2:3 d)2:4
different institutions Answer: c
institute D =260 Institute A=390 260:390=2:3
2.13
Professor Academy
Practice Question
Total Students = 50000
4.3 Directions (11 - 15)
Study the following information carefully and answer
the given questions. Number of staffs (in thousands) U, 19% P, 15%
in two different banks in six different years
Year Reserve bank of India State Bank of India Q, 18%
2011 10 20 T, 20%
2012 15 25
2013 25 35 R, 12%
2014 20 15 S, 16%
2015 25 30
2016 35 20
Schools % of girls
11. The number of staffs in Reserve Bank of India P 48%
in the year 2015 is what Percentage increased as
Q 52%
compared to the previous year?
Data Interpretation
a) 55 % b) 25 % c) 15 % d) 45 % R 46%
S 54%
12. If 25% of the staffs in State Bank of India in the
T 44%
year 2014 were females, what was the number of
male staffs in the State Bank of India in the same U 50%
year? 16. Find the difference between the total number of
a) 11250 b) 10750 c) 12650 d) 13250 boys in School P to that of total number of girls in
13. In which year, the difference between the number School R?
of staffs in Reserve Bank of India and the number a) 1140 b) 1892 c) 1368 d) 1575
of staffs in State Bank of India is highest? 17. Find the average number of girls in School P, Q
a) 2013 b) 2014 c) 2016 d) 2015 and S together approximately?
14. What was the difference between the average a) 5040 b) 5180 c) 4200 d) 4560
number of staffs in Reserve Bank of India and 18. Find the ratio between total number of students in
State Bank of India in all the years together? School Q and School R?
a) 3000 b) 3500 c) 1500 d) 2500 a) 3: 2 b) 2: 3 c) 4: 5 d) 1: 3
15. What is the sum of the number of staffs in Reserve 19. The total number of girls in School U is
Bank of India in the year 2011, 2013 and 2015 approximately what percentage of total number of
together and the number of staffs in State Bank of boys in School Q?
India in the year 2012, 2014 and 2016 together? a) 95 % b) 110 % c) 135 % d) 70 %
a) 130000 b) 90000 20. Find the central angle for School T?
c) 110000 d) 120000 a) 66o b) 80o c) 72o d) 84o
4.4 Directions (16 – 20) 4.5 Directions (21 –25)
Study the following information carefully and answer Study the following information carefully and answer
the given questions.The following pie chart shows the the given questions.The following bar graph shows
total number of students in 6 different schools and the sales of cars of 2 different companies in 5 different
the table shows the percentage of girls out of the total years.
number of students in the respective schools.
2.14
Professor Academy
COMPANY X COMPANY Y = 25/100 × 15000 = 3750
1600
Number of male staffs = 15000 – 3750
TOTAL CARS SOLD
1500
= 11250
1400
1300 13. Answer: c
Difference between the numbers of staffs in
1200
Reserve Bank of India & Number of staffs in
1100
State Bank of India for the year
1000
2001 2002 2003 2004 2005 2011 – (20000 – 10000) = 10000
YEARS 2012 – (25000 – 15000) = 10000
21. Total cars sold by the company X in the year 2013 – (35000 – 25000) = 10000
2001 and 2005 together is approximately what 2014 – (20000 – 15000) = 5000
percentage of total cars sold by both the companies 2015 – (30000 – 25000) = 5000
in the year 2002? 2016 – (35000 – 20000) = 15000
a) 96 % b) 75 % c) 105 % d) 120 % Difference was highest in year 2016.
22. Find the ratio between the total cars sold by both 14. Answer: d
Data Interpretation
the companies in the year 2001 to that of the year Average number of staffs in Reserve Bank of
2004? India
a) 65: 73 b) 83: 87 c) 132: 152 d) 51: 59 = (10 + 15 + 25 + 20 + 25 + 35)/6
= 130/6
23. Find the average number of cars sold by the
Average number of staffs in State Bank of India
company X in all the given years together?
= (20 + 25 + 35 + 15 + 30 + 20)/6
a) 1328 b) 1440 c) 1160 d) 1284
= 145/6
24. If the total cars sold by the company X and Y in the Difference = (145/6) – (130/6)
year 2006 is increased by 20 % and 25 % respectively = 15/6 = 2.5*1000
while comparing with the previous year, then find = 2500
difference between the total number of cars sold
15. Answer: d
by the company X to that of Y in the year 2006?
Number of staffs in Reserve Bank of India in 2011,
a) 420 b) 360 c) 280 d) 540
2013 and 2015
25. Total cars sold by company Y in the year 2003 and = 10000 + 25000 + 25000 = 60000
2005 together is approximately what percentage Number of staffs in State Bank of India in 2012,
more/less than the total cars sold by the company 2014 and 2016
X in the year 2002 and 2004 together? = 25000 + 15000 + 20000 = 60000 a
a) 13 % less b) 13 % more Total staffs = 60000 + 60000 = 120000
c) 6 % more d) 24 % less
16. Answer: a
Answer Key with Explanation Number of boys in school P = 100% - 48% = 52%
11. Answer: b 52% of 7500 → 3900
Number of staffs in Reserve Bank of India Number of girls in school R = 46% of 6000
in 2015 = 25000 = 2760
Number of staffs in Reserve Bank of India Difference = 3900-2760 = 1140
in 2014 = 20000 17. Answer: c
Increase = 25000 – 20000 = 5000 Average number of girls
Increase % = 5000/20000 × 100 = 25% P,Q and S = 3600+4680+4320 ∕ 3
12. Answer: a = 12,600 ∕ 3 = 4200
Total number of staffs in State Bank of India
18. Answer: a
in 2014 = 15000
Total number of students in school Q = 9000
Number of females staffs = 25% of 15000
2.15
Professor Academy
Total number of students in school R = 6000 25. Answer: b
Ratio 9000: 6000 Total cars sold by company Y in
3:2 2003 and 2005 = 1560 + 1440
19. Answer: b = 3000
The total number of girls in school U =4750 Total Cars by company x in 2002 and 2004
The total number of boys in school Q = 4320 = 1160 + 1480 = 2640
(4750 / 4320) × 100 Percentage increase = 360/3000 X 100
≈ 110% = 13% More.
Data Interpretation
=> 650 + 720 + 680 + 540 + 660 = 3250 Income in 2015=
Total number of medical professionals in all the 35%= X-12/12×100=16.20lakhs
given years together Income in 2016=
=> 180 + 160 + 150 + 200 + 120 = 810 50%= X-14. 5/14.5*100=21.75lakhs
Required difference = 3250 – 810 = 2440 Total income=37.95 lakhs
4. Find the average number of male law professionals 7. Ratio of expenditure of company Sony to HP is
in the year 2013, 2015 and 2017 together? 3:4,what is the ratio of income 2018?
a) 314 b) 352 c) 287 d) 275 a) 56:39 b) 29:56
Answer: a c) 39:56 d) None of these
The total number of male law professionals in the Answer: c
year 2013, 2015 and 2017 together FOR SONY
=> 450*(54/100) + 620*(45/100) + 700*(60/100) 30%= S-3x/3x*100
=> 243 + 279 + 420 = 942 90x=100S-300x = 100 S= 390x = S= 3.9x
Required average = 942/3 = 314 FOR HP
40%= H- 4x/4x*100
5. Number of medical professionals in the year 2014
160x= 100 H – 400x
is approximately what percentage the number of
100 H = 560x
engineering male professionals in the year 2016?
H = 5.6x
a) 42 % b) 49 % c) 28 % d) 15 %
Ratio= 39:56
Answer: b
Number of medical professionals in the year 2014 8. What is a percentage increase in profit between
=> 160 Sony and HP in 2018?
The number of engineering male professionals in a) 30.33% b) 45% c) 33.33% d) 53%
the year 2016 Answer: c
=> 540*(60/100) 40-30/30*100 = 33.33%
=> 324 9. Expenditure of Sony and HP in 2019 are equal, the
Required % = 160/324 * 100 = 49% total income of two company was 5.7lakhs, what is
5.2 Directions ( 6-10) the total expenditure of two company in 2019?
a) 6lakhs b) 2lakshs
Study the following table and answer the question
c) 4lakhs d) None of these
below Percentage of profit earned by two companies
Answer: c
Sony and HP over the given years
Sonyexpenditure = HPexpenditure
Note: Expenditure of any company should be
2.17
Professor Academy
considered as 100%, profit will be given in the Year Consumer’s (thousand) Units (in lakhs)
table, income should be calculated by below
2014 225 200
formula
Expenditure% + Profit% = Income% 2015 250 325
Let the expenditure of two company be X 2016 300 450
Profit of Sony 40%, and for HP 45% 2017 350 575
Income of two company is 5.7 lakhs, (i. e, 2.855 2018 375 550
per company) 11. What is the ratio of electricity consumption per
For Sony consumer in 2015 and 2018?
40%=2.855s- x/x*100 a) 44:39 b) 39:44
40x= 285.5s-100x c) 33:42 d) 42:33
140x=285.5s
X=2.03 12. The number of customers in 2019 is 120% more
For HP company than 2014 while consumption remain same as
45%=2.855H-x/x*100 2018, what is impact of number of units consumed
45x=285.5H-100x by consumer in 2019 compared to electricity
Data Interpretation
2.18
Professor Academy
City Male : Female employee in same country?
P 5:3 a) 78:56 b) 65:76
Q 4:5 c) 76:65 d) 60:70
R 6:5 24. Difference between average number of post
S 2:1 graduate in country A, B, C and D, E, F?
T 11 : 8 a) 700 b) 723 c) 734 d) 756
U 9 : 11
25. Which country has highest average employee per
16. Total male population of city P is what percentage office?
of total female population of city R? a) B b) D c) A d) None of these
a) 110 % b) 100 % c) 90 % d) 80 %
17. Find the difference between the total male
population of city Q to that of total female Answer Key with Explanation
population of city S? 11. Answer: b
a) 1,80,000 b) 1,50,000 Consumption in 2015 = 325/250
c) 1,20,000 d) 1,75,000 Consumption in 2018 = 550/375
Data Interpretation
18. Find the average female population in city P, Q Required ratio = 325/250*375/550 = 39:44
and S together? 12. Answer: d
a) 2,80,000 b) 3,00,000 In the year 2019, no of customers:
c) 2,60,000 d) 1,60,000 225*220/100=495
19. Find the ratio between the total population in city Electricity consumption=550lakhs
T to that of total male population in city U? Electricity consumption per consumer=
a) 76: 18 b) 29: 13 c) 35: 16 d) 38: 9 550*1,00,000/495*1000=111 units per consumer
20. Find the central angle of city Q? In the year 2018, electricity consumption per
a) 72.50 b) 64.80 c) 68.20 d) 75.60 consumer4 = 550*1,00,000/375*1000=147 units
5.5 Directions (21- 25) per consumer
Data related to Human Resource Dept. of a There is decline of 36%
multinational company (X) which has 145 offices 13. Answer: c
across 6 countries consumer all year’s
together=225+250+300+350+375=1500
Country Offices Total Ratio % Post Graduated = 325/1500*100= 21.6%
M:F
A 16 2568 5:7 75 14. Answer: b
B 18 2880 11:5 65 2014&2016= 650 lakhs
C 14 2310 10:11 40 2015&2017= 900lakhs
D 22 3575 3:2 60
250/900*100= 28less
E 13 3360 8:6 80
F 17 2788 20:21 75 15. Answer: c
21. Number of male Post graduate in E is 1800,if 1500/5=300
female post graduate increase by 50% in next year, 16. Answer: b
What is percentage of female in particular country Let x be total male population of city P = 16% of 40
is post graduate? lakhs
a) 90% b) 89% c) 92.5% d) 95% = 16/100 X 40,00,000
22. In which country, what percentage of women = 6,40,000
employee to no of employee is ranked lowest? X Male population of city P = 5/8 X 6,40,000
a. C b. D c. F d. None of these = 5 X 80,000
= 4,00,000
23. The ratio between number of male employees in Let Y be total female population of
country B and E and total number of post Graduate city R total population of city = 22% of40,00,000
2.19
Professor Academy
= 8,80,000 23. Answer: b
Y = Female population of city R [(11/16)*2880+(2/5)*3360]= 1980+1920= 3900
= 5/11 X 8,80,000 65%*2880+80%3360= 4560
= 5X 80,000 3900/4560=65:76
= 40,000 24. Answer: c
X is what percentage of Y x/y x 100 A=2568*75%=1926
40,000/40,000 x 100 = 100% B=2880*65%=1872
17. Answer: c C=2310*40%=924 A+B+C= 4722
Let x be total male population of city Q D=3575*60%=2145
Total population of city Q = 18% of 40,00,000 E=3360*80%=2688
= 7,20,000 F=2788*75*100=2091 D+E+F=6924
Male population of city Q = (4/91)X 7,20,000 Difference = 6924-4722= 2202/3= 734
= 3,20,000 25. Answer: d
Let y be total female population of city S A=2568/16=160.5
Total population of city S = 15% of 40,00,000 B=2880/18=160
Data Interpretation
= 6,00,000 C=2310/14=165
Female population of city S = (1/3) × 6,00,000 D=3575/22=162
= 2,00,000 E=3360/21=160
The difference = x- y F=2788/17=164
= 3,20,000 – 2,00,000 Country C has highest employee
= 1,20,000
Question I
18. Answer: a
average female population in city P,Q,S together Directions (1-5): The bar graph given below shows the
= 2,40,000+4,00,000+2,00,000 sales of books (in thousand number) from six branches
= 8,40,000 / 3 of a publishing company during two consecutive years
= 2,80,000 2000 and 2001. Sales of Books (in thousand numbers)
19. Answer: a from Six Branches - B1, B2, B3, B4, B5 and B6 of a
Explanation publishing Company in 2000 and 2001.
Total population city T : Total male population U
7,60,000 : 1,80,000
76 : 18
20. Answer: b
Central angle of Q (Therefore 100% = 3600 )
18% = 64.80
21. Answer: c
Graduate in E : (3360*80)/100=2688,
Female graduate = 2688-1800=888
Female employee = (3360*6)/14=1440
Female graduate in next year= (888*150)/100=1332
Percentage of female = (1332/1440)*100=92.5%
22. Answer: d 1. What is the ratio of the total sales of branch B2 for
A=(7/12)*100=58 34% both years to the total sales of branch B4 for both
B=(5/16)*100=31.25% years?
C=(11/21)*100=52.40% a) 2:3 b) 3:5 c) 4:5 d) 7:9
D=(2/5)*100=40%=40% 2. Total sales of branch B6 for both the years is what
E=(6/14)*100=42.86% percent of the total sales of branches B3 for both
F=(21/41)*100=51.22% the years?
The least is country B
2.20
Professor Academy
a) 68.54% b) 71.11% c) 73.17% d) 75.55% c) 31500 d) Data Inadequate
3. What percent of the average sales of branches B1, 10. The total number of candidates qualified in 1999
B2 and B3 in 2001 is the average sales of branches and 2000 together was 33500 and the number of
B1, B3 and B6 in 2000? candidates appeared in 1999 was 26500. What was
a) 75% b) 77.5% c) 82.5% d) 87.5% the number of candidates in 2000?
4. What is the average sales of all the branches (in a) 24500 b) 22000 c) 20500 d) 19000
thousand numbers) for the year 2000? Question III
a) 73 b) 80 c) 83 d) 88
Directions (11-15): Follow the given instruction to give
5. Total sales of branches B1, B3 and B5 together for the answer of the following questions. (Total number
both the years (in thousand numbers) are? who attended the workshop = Number of Literates +
a) 250 b) 310 c) 435 d) 560 Number of illiterates)
Question II Day No. of Overall ratio Number of males
literates (illiterate : (literates + illiterates)
Directions (6-10): The following line graph gives the (males+ literates) (out (out of those who
percentage of the number of candidates who qualified Females) of those who attended)
Data Interpretation
attended)
an examination out of the total number of candidates
who appeared for the examination over a period of Monday 420 5:6 250
seven years from 1994 to 2000. Tuesday 350 3:5 240
90 Wednesday 320 5:4 320
80 Thursday 300 6:5 300
70 Friday 420 2:3 320
60
Percentage
2.21
Trust yourself that you can do it and get it. – Baz Luhrmann
Professor Academy
a) 5:9 b) 9:7 c) 7:9 d) 1:3 600 550
500 450 500
Question IV 450 450
450
400 350
Directions (16-20): Study the following line graph and 400 400
Number
300 300 350
answer the questions based on it. Vehicles made by 250
200
two companies X Joined
180 100 Y Left
159
160
Percentage
148 0
139 141 1996 1997 1998 1999 2000 2001
140 128 120 Year
120
120
119 107
100 99 X 21. The strength of the school increased from 1997 to
100 78
80 Y 1998 by what percent?
60
a) 1.7% b) 1.8% c) 1.9% d) 2%
1997 1998 1999 2000 2001 2002
Year
22. The number of students studying in the school
during 1999 was
16. What is the difference between the two companies a) 3100 b) 3000 c) 3150 d) 3250
Data Interpretation
2.22
Professor Academy
27. What is the average production of mobile phones 29. The demand of company E is approximately what
by all the companies? percent of the demand of company D?
a) 3100 b) 25000 c) 26000 d) 31000 a) 30% b) 65% c) 62.5% d) 40%
28. What is the average demand of mobile phones by 30. To meet its demand the company A wishes to buy
all the companies? the surplus mobile phones from a single company.
a) 34000 b) 35000 c)25000 d) 36000 Which of the following companies can supply?
a) B b) C c) D d) E
Question VII
Directions (31-35): Study the table carefully to answer the questions that follow Number of Students Appeared
(App) and Qualified (Qua) in Preliminary exam from various exams over the years in Mumbai
Years
Exams 2013 2014 2015 2016 2017
App Qua App Qua App Qua App Qua App Qua
RRB PO 1440 1165 1684 1500 1654 1566 1564 1462 1545 1240
Data Interpretation
RRB Clerk 1390 1072 1550 1278 1897 1689 1575 1388 1647 1106
IBPS PO 1364 1145 1754 1210 1574 1024 1510 1214 1765 1567
IBPS Clerk 1478 1388 1806 1586 1886 1542 1654 1296 1530 1234
IBPS SO 1560 1389 1666 1498 2004 1930 1690 1480 1605 1356
31. What is the approximate average number of over the number of candidates appeared for the
candidates appeared for the Preliminary exam Preliminary exam in the year 2014 from all Exams
from IBPS Clerk over all the years? together?
a) 1874 b) 1498 c) 1671 d) 1521 a) 97.5% b) 68.8% c) 75.4% d)83.5%
32. What is the difference between the number 34. Approximately what is the percentage of candidates
of students appeared but not qualified in the qualified over appeared from all the Exams
Preliminary exam from RRB PO in the year 2015 together in 2016?
and the number of students appeared but not a) 76% b) 65% c) 60% d) 86%
qualified in the Preliminary exam from the same 35. Percentage of candidates qualified over appeared
exam in the year 2013? from IBPS PO is the lowest during which of the
a) 187 b) 192 c) 211 d) 178 following years?
a) 2017% b) 2015% c) 2014 % d) 2016%
33. What is the percentage of the candidates qualified
Question VIII
Directions (36-40): Following table shows the number of players from different states who participated in an
Asian Athletics Championships sports event
States
Events
Odisha Punjab Gujarat Kerala Assam Tamil Nadu
Gymnastics 10 6 14 12 9 9
Pole Vault 20 16 6 9 12 15
High Jump 20 12 20 16 8 14
Long Jump 14 15 12 11 13 7
Judo 15 8 11 9 10 13
100m race 8 12 6 15 9 16
Shot Put 16 18 14 22 12 8
Swimming 12 10 15 17 8 10
2.23
Professor Academy
36. The number of players from Gujarat who 39. The number of players from Punjab who
participated in swimming is what percentage participated in shot put is what percentage of the
more than the number of players who participated number of players from Odisha who participated
in 100-metre race from the same state? in 100-metre race?
a) 75% b) 90% c) 150% d) 120% a) 187.5% b) 125% c)195% d) 225%
37. What is the average number of players who 40. The average number of players who participated
participated in high jump from all states together? from Odisha taking all the games together is what
a) 15 b) 19 c) 11 d) 13 percentage of the average number of players who
38. What is the ratio of the total number of players participated from Tamil Nadu taking all the games
from Assam who participated in all the games to together?
the number of players who participated in long a) 110% b) 220% c) 90% d) 125%
jump from all states together?
a) 5 : 7 b) 8 : 4 c) 9 : 8 d) 4 : 7
Question IX Directions (41-45): Following table shows the percentage of boys and difference between the
number of boys and the number of girls among the students of six different schools who appeared in board
Data Interpretation
2.24
Professor Academy
Data Interpretation
Application received from Assam in 2016 from
Question XI
Directions (51-55): The following table shows the percentage of marks obtained by six students in five different
subjects. Answer the following question base on the table.
Physics Chemistry Maths Hindi English
Student
(out of 75) (out of 75) (out of 200) (out of 50) (out of 150)
A 84 42 67 44 74
B 68 64 49 74 52
C 75 54 58 68 64
D 48 82 63 48 70
E 70 78 71 56 78
F 56 66 55 76 66
51. What is average mark scored by all the students Answer Key with Explanation
in physics? 1. Answer: d
a) 50.125 b) 52.25 c) 57.5 d) 47.5 (75 65) 140 7
Re quired ratio = 7:9
52. What is total marks scored by student F in all (85 95) 180 9
subject together? 2. Answer: c
a) 332 b) 334.5 c) 335 d) 338.5
ª (70 80) º
53. What is overall percentage of marks score by
Re quired percentage « (95 110) u100 » %
¬ ¼
students B?
ª 150 º
a) 53 b) 57 c) 61 d) 69 « u100 » % = 73.17%
3. Answer: d ¬ 205 ¼
54. The marks score by student C in Physics is what Average sales (number in thousands) of
percent of marks scored By him in English? branches B1, B3 and B6 in 2000
a) 59 b) 60 c) 62 d) 67 1 § 245 ·
u(80 95 70) ¨ ¸
55. What is difference between the total marks 3 © 3 ¹
obtained by student D in Chemistry and English
Average sales (number in thousands) of
and that obtained by student F in the same
branches B1, B2 and B3 in 2001
subject?
a) 14.5 b) 16 c) 18 d) 19.5
2.25
Professor Academy
1 § 280 · know at least, the number of candidates appeared
u(105 65 110) ¨ ¸ in any one of the two years 1996 or 1997 or the
3 © 3 ¹ percentage of candidates qualified to appeared in
ª 245/3 º 1996 and 1997 together.
Required percentage « 280 / 3 u 100 » % Hence, the data is inadequate.
¬ ¼
ª 245 º 10. Answer: c
« 280 u 100 » % 87.5% The number of candidates qualified in 1999 =
¬ ¼
(80% of 26500) = 21200.
4. Answer: b Number of candidates qualified in 2000 =
Average sales of all the six branches (number in (33500 - 21200) = 12300.
thousands) for the year 2000 Let the number of candidates appeared in 2000
1 be x.
u ª80 75 95 85 75 70º¼
6 ¬ Then, 60% of x = 12300
= 80.
12300 u 100
5. Answer: d x= 20, 500
Data Interpretation
60
Total sales of branches B1, B3 and B5 for both
the years (in thousand numbers) 11. Answer: b
= (80 + 105) + (95 + 110) + (75 + 95) Total number of people who attended the
= 560. workshop on Monday = 420 * (11/6) =770
6. Answer: b Total number of people who attended the
The differences between the percentages of workshop on Friday = 420 * (5/3) =700
candidates qualified to appeared for the give Required % more = [(770-700)*100]/700= 10 %
pairs of years are: 12. Answer: a
For 1994 and 1995 = 50 - 30 = 20. Number of Literate males on Friday = 320-192=
For 1998 and 1999 = 80 - 80 = 0. 128
For 1994 and 1997 = 50 - 30 = 20. Literate female on Friday =420-128= 292
For 1997 and 1998 = 80 - 50 = 30.
13. Answer: b
For 1999 and 2000 = 80 - 60 = 20.
Number of illiterate (males + female) on
Thus, the maximum difference is between the
Tuesday = 350 * (3/5) =210
years 1997 and 1998.
Now, Required difference = (210 * 140/100) –
7. Answer: d (350 * 80/100) = 294 – 280 =14
The graph gives the data for the percentage of
14. Answer: d
candidates qualified to appeared and unless
Required average = {(420 * 5/6 + 320 *5/4 + 300
the absolute values of number of candidates
* 6/5)}/3 = (350 + 400 + 360)/3 =370
qualified or candidates appeared is know we
cannot compare the absolute values for any two 15. Answer: c
years. Number of Illiterate (male + female) on Tuesday
Hence, the data is inadequate to solve this = 350 * 3/5 = 210
question. Number of illiterate (males + females) on
8. Answer: c Friday = 320 * (5/4) =400
The number of candidates appeared in 1998 be x. Number of females (literate + Illiterate) on
Then, 80% of x = 21200 Tuesday = (350 +210-240) =320
x = 21200 u 100 Similarly on Friday = (320 +400-320) = 400
26, 500 Required ratio = (240+320): (320+400) = 7: 9
80
9. Answer: d 16. Answer: b
The total number of candidates qualified in 1996 Please note that line graph values are given in
and 1997together, cannot be determined until we thousands. Total production of Company Y
2.26
Professor Academy
from 1997 to 2002 = 119000+99000+141000+ for this line graph. Let’s be back on question
78000+120000+159000 = 716000 now,
Total production of Company X from 1997 to Percentage increase in strength of the school
2002 = 139000+120000+100000+128000+ from 1997 to 1998 will be, ((3000-2950)/
107000+148000 = 742000 2950*100) %=1.69%
Difference = 742000 - 716000 So this is approx equal to 1.7%
= 26000 22. Answer: c
17. Answer: a Number of students in 1995 = 3000 [given]
Difference = 128000-107000 = 21000 Number of students in 1996 = 3000-250+350
18. Answer: c = 3100
Average number of vehicles manufactured by Number of students in 1997 = 3100-450+300
Company Y = 2950
= 1\6(119000+99000+141000+78000+120000 Number of students in 1998 = 2950-400+450
+159000) = 3000
= 119333 Number of students in 1999 = 3000-350+500
Data Interpretation
= 3150
19. Answer: d
Although if we have deep look on line chart the 23. Answer: d
we can judge that it was in year 2000 Lets also Number of students in 1995 = 3000 [given]
solve it, Number of students in 1996 = 3000-250+350
For 1997 = (139000 - 119000) = 20000 For = 3100
1998 = (120000 - 99000) = 21000 For 1999 Number of students in 1997 = 3100-450+300
= (141000 - 100000) = 41000 For 2000 = = 2950
(128000 - 78000) = 50000 For 2001 = (120000 Number of students in 1998 = 2950-400+450
- 107000) = 13000 For 2002 = (159000 - = 3000
148000) = 11000 Number of students in 1999 = 3000-350+500
Clearly the difference was maximum in year = 3150
2000. Number of students in 2000 = 3150-450+400
= 3100
20. Answer: b Number of students in 2001 = 3100-450+550
Required Percentage =(128000/78000 x = 3200
100)%=164.1% Which is approximately 164% From from above options we find in 1996 and
21. Answer: a 2000 number of students was same i.e. 3100
Let analyze the graph before answering 24. Answer: d
question. Number of students in 1995 = 3000 Number of students in 1995 = 3000 [given]
[given] Number of students in 1996 = 3000-250+350
Number of students in 1996 = 3000-250+350 = 3100
= 3100 Number of students in 1997 = 3100-450+300
Number of students in 1997 = 3100-450+300 = 2950
= 2950 Number of students in 1998 = 2950-400+450
Number of students in 1998 = 2950-400+450 = 3000
= 3000
Number of students in 1999 = 3000-350+500
Number of students in 1999 = 3000-350+500
= 3150
= 3150
Number of students in 2000 = 3150-450+400
Number of students in 2000 = 3150-450+400
= 3100
= 3100
Number of students in 2001 = 3100-450+550 Number of students in 2001 = 3100-450+550
= 3200 = 3200
Above analysis will help us solving problems In 2001 students =3200
2.27
Professor Academy
In 1998 students =3000 = 7072
Required Percentage =(3000/3200 x Required % of the candidates
100)%=93.75% = (7072 × 100)/8460
25. Answer: c = 83.59%
Clearly from the line graph we can judge it 34. Answer: d
was in year 2001. Number of students appeared in Preliminary
26. Answer: d exam from all Exams in 2016
Required Percent = (30/45) × 100 = 66.67% = 1564 + 1575 + 1510 + 1654 + 1690 = 7993
27. Answer: d Number of students qualified from all Exams
[(25 + 30 + 40 + 25 + 35)/5] thousands in 2016
= 1462 + 1388 + 1214 + 1296 + 1480 = 6840
= (155000/5) = 31000
Required % of candidates = (6840 × 100)/7993
28. Answer: d
= 85.57%
[(35 + 45 + 35 + 40 + 25 )/5] thousands = 86%
= (180000/5) = 36000 35. Answer: b
29. Answer: c Year wise percentage of candidates qualified
Data Interpretation
Data Interpretation
Average
51. Answer: a
= (210 + 204 + 231 + 231)/4
Average marks all students in Physics = 1/6(75{
= 876/4
0.84+0.68+0.75+0.48+0.70+0.56})
= 219
= 50.125
43. Answer: a
Total number of girls in 2012 52. Answer: d
= 70 + 117 + 129 + 129+ 136 + 176 = 757 Total marked scored by student F in all
subject=75*0.56+75*0.66+200*0.55+50*0.76+ 150*
44. Answer: d 0.66
Difference =338.5
= 225 – 225 = 0
53. Answer: b
45. Answer: d
Marks score by students B=75*0.68+75*0.64+2
Let the total number of students be x.
00*0.49+50*0.74+150*0.52
Boys = 44x/100
Required Percentage = 312/550*100=57
And
girls = 56x/100 Difference = 12x/100 = 42 54. Answer: a
x = 4200/12 = 350 Marks score by student C in Physics =
Boys = (44/100)× 350 = 154 75*0.75=56.25
Similarly, Total students = 132 × 100/40 = 330 Marks score by student C in English
Girls = (30× 330)/100 = 99 = 150*0.64 = 96 Required Percentage
Ratio = 154/99 =56.25/96*100 = 59
= 14/9 = 14 : 9 55. Answer: c
46. Answer: d Total marks obtained by student D = (75*0.82)
Required % = 99 × 100/1027 = 9.64% + (150*0.70) =166.5
= 10% Total marks obtained by student F = (75*0.66)
47. Answer: a + (150*0.66) =148.5
Average Application received Difference = 166.5-148.5 = 18
= (150 + 170 + 180 + 215 + 230 + 240)/6 =
1185000/6
=197500
2.29
Professor Academy
2. Answer : Option b
Previous NET Question (Sept-Nov 2020)
The ratio between the expenditure on taxes for the
Question I years 2016 and 2018= 108:88 = 27:22
Directions (1-5) 3. Answer : Option b
The average amount of interest =
Consider the data in the given table and answer the
(23.4+32.5+41.6+36.4+49.4)/5 = 36.6
questions that follow
4. Answer : Option d
The following table is on the Expenditures of Institu-
The total amount of bonus = 3+2.52+3.84+3.68+3.96
tion (in lakh Rupees) per annum over the given years.
= 17
Heads of Expenditure (in lakh Rupees) The total amount of salary = 288+342+324+336+420
Year Salary of Transport Bonuses Interest Taxes = 1710.
staff on loans The total amount of bonus is what percent of the
total amount of salary = (17/1710) * 100 = 1%
2015 288 98 3 23.4 83
5. Answer : Option a
2016 342 112 2.52 32.5 108
Data Interpretation
Data Interpretation
a) 2.16 lakhs c) 1.98 lakhs of 5.4 lakhs =43,200
b) 2.04 lakhs d) 1.92 lakhs The number of vacancies in Mumbai (2019)
10. What is the approximate percentage rise seen in =18% of 8.6 lakhs = 1,54,800
vacancies available in the city of Hyderabad from Total = (1,54,800 + 43,200) = 1,98,000 = 1.98
2009 to 2019? lakhs.
a) 21.8 % c) 26.23 %
10. Answer : Option d
b) 23.23 % d) 27.41 % The number of vacancies in Hyderabad (2009)
Explanations =10% of 5.4 lakhs =54,000
The number of vacancies in Hyderabad (2019)
6. Answer : Option a =8% of 8.6 lakhs = 69,800
The number of vacancies in Bangalore(2009) Percentage increase = [(69,800 – 54,000) /
=15% of 5.4 lakhs = 81,000 54,000] * 100 = (14,800 /54,000) * 100 = 27.40%
The number of vacancies in Bangalore(2019)
Question III
Directions (11-15)
The following table shows the maximum marks of each subject inside the bracket and percentage of marks ob-
tained by seven students in six different subjects in the exam
Student/subject Computer Chemistry Physics Geography History Mathematics
Science (130) (120) (100) (50) (40)
(150)
Piyush 90 50 90 60 70 80
Gaurav 100 80 80 40 80 70
Mayank 90 60 70 70 90 70
Vimal 80 65 80 80 60 60
Vikas 80 65 85 95 50 90
Varun 70 75 65 85 40 60
Ashish 65 35 50 77 80 80
11. What are the aggregate of marks obtained by Ma- a) 432 c) 460
yank in all the six subjects? b) 456 d) 440
2.31
Professor Academy
12. What is the overall percentage of Ashish? 12. Answer : Option c
a) 54% c) 60% overall percentage of Ashish=
b) 68% d) 63% [(97.5+45.5+60+77+40+32)/590] *100=
13. The number of students who obtained 60% and 59.6%=60
above marks in all subject is: 13. Answer : Option c
a) 4 c) 2 Mayank and Vimal are the two students who ob-
b) 5 d) 1 tained 60% and above marks in all subject.
14. In which subject is the overall percentage the 14. Answer : Option a
best? The overall percentage of Computer science= [(9
a) Computer Science c) Math 0+100+90+80+80+70+65)/600]*100
b) Chemistry d) Physics = (575/600)*100= 95.8% (the Best)
15. What are the average percentage of marks (%) 15. Answer : Option b
obtained by all the seven students in Physics? The average percentage of marks (%) obtained
a) 82.42 c) 86.24 by all the seven students in Physics
b) 74.2 d) 95.14 = [(90+80+70+80+85+65+50)/7]= 520/7=
Data Interpretation
Explanations 74.28%
2.32
3 READING COMPREHENSION
Why does NTA NET demand aspirants to reading comprehension of other competitive exam would be
learn Reading Comprehension? about three to four paragraphs, each having at least 15 to 20
lines. In the context of the NET exam, the answers to all the
Reading comprehension (RC) is the ability to
questions of Reading comprehension are strategically hidden
actively read the information (passage), process the text,
in the passage itself, and candidates can easily answer these
understand its meaning, and integrate the message. Reading
questions correctly if they appear for the exam with a stress-
comprehension is one of the most important topics which
free mind set and have practised enough. Practising each day,
commonly appear in the verbal ability section of almost all
reading comprehension, is a key to score marks.
qualifying exams and competitive exams. The purpose of the
reading comprehension is to evaluate the candidate’s ability to The changing pattern of reading comprehension is analysed
read and comprehend the passage. from the recent exams held. It is noticed that, the reading
comprehension passage tends to shift from inferential level to
It involves the process such as reading the passage, grasps
analytical level.
the main content of the passage, understands the opinion of
the author, assimilate the information, connect the ideas of Blueprint of Reading comprehension unit
passage, comprehend the passage and bringing the inference
Dear Aspirants, this blue print will help you
out of it. Focus is the key skill that is required for an aspirant
¸¶Å ²¿ ºµ¶² ²³ÀÆÅ µºȮ¶Ã¶¿Å ½¶Ç¶½Ä À· µºȲ´Æ½ÅÊ º¿ ö²µº¿¸
ÅÀ ȱ¿ºÄ¹ ¶²µº¿¸ ´À¾Áö¹¶¿ÄºÀ¿ ÂÆº´¼½Êʇ Ê Áò´ÅºÄº¿¸ ʶ
´À¾Áö¹¶¿ÄºÀ¿²¿µ²½ÄÀ·¶Å´¹´À¿ȱµ¶¿´¶³ÊÁò´ÅºÄº¿¸Å¹¶¾
reading comprehension, one can build their concentration.
in an orderly sequence. In Professor Academy blueprint the
The comprehension for paper 1 is generally based on a piece ö²µº¿¸ ´À¾Áö¹¶¿ÄºÀ¿ ¹²Ä ³¶¶¿ ´½²Äĺȱ¶µ º¿ÅÀ Ї ½¶Ç¶½Äʁ ²Ä
of recent news or topics related to any other sphere of life. follows.
However, it is essential to note that even if the candidate
Level 1- This level is a basic level; this will help you to
has a wider idea of the topic, his/her answers should only
get the basic idea and literal meaning of the passage. Literal
be based on the information mentioned in the passage. The
meaning is simply what the text says. Here are examples of
comprehension for paper 2 is generally based on the core
ʶ ÅÊÁ¶ À· º¿·Àþ²ÅºÀ¿ ʲŠ´Àƽµ ³¶ ºµ¶¿Åºȱ¶µ ²Ä ² ½ºÅ¶Ã²½
subject topic.
meaning
Reading comprehension is much more important regarding
The main idea, Stated facts, The sequence of events, Characters
the NTA NET exam because it covers up to 30 marks out of
in the story
300 marks (total marks of the exam), that is 10% of the total
marks. These 30 marks are made from both the papers that are Level 2- This level wants you to think little for
paper 1 (10 marks) and paper 2 ( 20 marks). Though in paper answering the questions by getting inference from the
2 the format of the question does not resemble the same as passage. Inferential meaning involves determining what the
reading comprehension for some of the core subjects, some set text means. Here are examples of the type of information that
of comprehension skills are also required to secure 20 marks ´Àƽµ³¶ºµ¶¿Åºȱ¶µ²Äº¿·¶Ã¶¿Åº²½¾¶²¿º¿¸ʇ
in paper 2. So, it is important for the candidate to understand ¶¿¶Ã²½ºË²ÅºÀ¿Äʁ ´²ÆÄ¶ ²¿µ ¶Ȯ¶´Å ö½²ÅºÀ¿Ä¹ºÁÄʁ ·ÆÅÆÃ¶
this reading comprehension unit as an easy scoring point. predictions, an unstated main idea.
Syllabus Level 3- This level requires the candidate to assess
Comprehension ʯDz½Æ²Å¶ʰʶÁ²ÄIJ¸¶ÈºÅ¹²Ã¶ȷ¶´ÅºÇ¶ÄÁ¹¶Ã¶À·¼¿ÀȽ¶µ¸¶ʇ
Evaluative meaning is what the text is telling us about the
A passage of text will be given. Questions will be asked from
world outside the story. Here are examples of the type of
the passage to be answered.
º¿·Àþ²ÅºÀ¿Å¹²Å´Àƽµ³¶ºµ¶¿Åºȱ¶µ²Ä¶Ç²½Æ²Åº¿¸¾¶²¿º¿¸ʇ
Trend Analysis
Choosing an alphabetical statement, giving a solution to a
To understand about reading comprehension of situation-based problem and suggestion idea/opinion.
ʁÀ¿¶¹²ÄÅÀÆ¿µ¶ÃÄŲ¿µÅ¹¶µºȮ¶Ã¶¿´¶³¶Åȶ¶¿Å¹¶
Level 4 and Level 5 are the advanced level which
exam and the other competitive exams. Unlike other exams,
develops vocabulary skills, art of drawing indirect inferences,
NET does not demand the aspirants to have to have to have a
application- oriented questions, making judgments.
sound vocabulary. Instead, it clearly demands the aspirants
to have skill focus, concentration, making conclusion from Make use of all the passages and score the fullest in the exam!
the given passage. Reading comprehension of NET exam ALL THE BEST!
portrays a single paragraph of about 15 lines only, whereas
Professor Academy
So what exactly is a Reading Comprehension? 1. First of all have a quick but sharp glance of the
Reading Comprehension is the way of questions,
understanding what is being read. In simple words, • ‘What’ type
reading comprehension means a passage which is to be • ‘How’ type
read and comprehended. What makes comprehension
• Refers to a particular word
passages a nightmare for students is the diverse range
of topics that are covered, the vocabulary used in the • Actual data as such
passage and the time limit given in the exam. • Interpretative
Different types of area/ topics for reading 2. Read the passage
comprehensions:
• Find out the overall tone by understanding
1. Social Sciences – History, anthropology,
• Starting note (find – whether the Author
sociology, government.
Starts in a Positive Tone or Negative Tone)
2. Natural Sciences – Biology, Environment, Space
technology, Astronomy. • Ending note (find – whether the Author
Starts in a Positive Tone or Negative Tone)
3. Humanities – Art, Music, Literature, Philosophy
4. Business – Economics, Marketing, Human • Understand the transition from the First
Resources. line till the Last line
Different types of questions which come in Reading • Get to know - what does the author mean to
comprehension: say (conclusion)?
• Factual - these questions are based on the facts • If a particular word is unknown, we could
given in the passage. make educated guess if the overall meaning
is clear enough.
• Main idea - in these questions we have to tell the
main idea or the central theme of the passage. 3. Understand the passage
• Title- the title of the passage is linked directly to • Always go for the big picture of what is being
Reading Comprehension
Reading Comprehension
luck and again started begging. Again Arjun and c) The priest did not give any coin to the poor
Shree Krishna saw him begging and Arjun inquired person.
about it. Arjun felt bad and started thinking if this d) The poor person asked for one or two coins
priest will ever have a happy life. but the priest did not help him.
Shree Krishna who is an incarnation of God 3. Which of the following statements is correct?
smiled. Shree Krishna gave that priest one coin a) Arjun felt pity at priest when he saw him beg-
which was not even enough for buying a lunch or ging again.
dinner for one person. Arjun asked Shree Krishna, b) Arjun who is an incarnation of God smiled.
“Lord, I gave him gold coins and diamond, which c) The priest kept coin of bags in empty pot of
could have given him a wealthy life, yet it didn’t help water.
him. How will just one coin help this poor guy?” d) As opposed to first two times, the priest
Shree Krishna smiled and told Arjun to follow that offered his help third time.
priest and find out.
4. Why did the priest screamed with joy?
On the way, the priest was thinking that one a) He recognized the thief who stole his bag of
coin Shree Krishna gave him, he can’t even buy a lunch coins.
for one person. Why would he give so little? He saw a b) He was happy to save the life of the fish.
fisherman who was getting a fish out of his net. Fish c) He got the lost diamond
was struggling. The priest felt pity at fish. He thought d) He found his stolen bag of coins.
that this one coin won’t solve my problem, why not
I save that fish. So the priest paid the fisherman and 5. Why did the priest help the fish?
took the fish. He put the fish in his small pot of water a) He realized his mistake of not helping others
which he always carried with him. for the first two times.
3.3
“Reading is to the mind what exercise to the body”
Professor Academy
b) The coin given to him by Krishna was of no The World Commission on Environment and
use to him. Development suggested seven critical objectives
c) He was unable to buy even a single meal with for environment and development policies that
that coin. follow from the concept of sustainable development:
d) He felt pity at fish and realized that the coin, Reviving growth, Changing the quality of growth,
that could not solve his problem, can save Meeting essential needs and aspirations for jobs, food,
fish. energy, water and sanitation, Ensuring a sustainable
1.1 Answer key level of population, Conserving and enhancing the
resource base, Reorienting technology and manage
1 2 3 4 5 risk, Including and combining environment and
b b a c d economics considerations in decision-making.
1.2 Directions(6-10) Read the Passage and Answer Questions
the following Questions.
6. The definition for “sustainable development”
The best definition of Sustainable was presented by
development was presented by the report Our a) Rio Summit
Common Future (also known as the Brundtland b) United Nation development programme
Report):”Sustainable development is development c) Sustainable development goals
that meets the needs of the present without d) Brutland Report
compromising the ability of future generations to 7. ___________ prirotizes, its proponents
meet their own needs.”Sustainable development considered to be environmental sustainability
is thus the ability to meet the needs of the present over economic and cultural considerations.
while contributing to the future generations’ needs. a) Sustainable development
It focuses on two goals:To improve the quality of b) Millennium development
life for all of the Earth’s citizens.To stop using up c) Green development
the natural resources beyond the capacity of the d) None
environment to supply them indefinitely.Green
development is generally differentiated from 8. The sustainable development underlying the
Reading Comprehension
3.4
Professor Academy
1.3 Directions (11-15) Read the Passage and Persia in the Hindu Kush and Pamir Mountains.
Answer the following Questions. Over the centuries, there has been significant fusion
of cultures between Buddhists, Hindus, Muslims
India is a land of ancient civilization. India’s
(Sunni, Shia, Sufi), Jains, Sikhs and various tribal
social, economic, and cultural configurations are the
populations in India.
products of a long process of regional expansion.
Indian history begins with the birth of the Indus Questions
Valley Civilization and the coming of the Aryans. 11. Indian History begins with the birth of
These two phases are usually described as the a) Indus valley civilization
preVedic and Vedic age. Hinduism arose in the Vedic b) Pre vedic age
period. c) Buddhism
The fifth century saw the unification of India d) Both (a) and (b)
under Ashoka, who had converted to Buddhism, and 12. Who emphasized spread of Buddhism under his
it is in his reign that Buddhism spread in many parts reign?
of Asia. In the eighth century Islam came to India a) Ashoka b) Mahavir
for the first time and by the eleventh century had c) Chanakya d) Humayun
firmly established itself in India as a political force.
It resulted into the formation of the Delhi Sultanate, 13. The Rebellion which sought to restore Indian
which was finally succeeded by the Mughal Empire, supremacy has occurred on
under which India once again achieved a large a) 1857 b) 1859
measure of political unity. c) 1860 d) 1856
It was in the 17th century that the Europeans 14. Throughout the history of India, Indian culture
came to India. This coincided with the disintegration has been heavily influenced by
of the Mughal Empire, paving the way for regional a) Buddhism b) Dharmic religions
states. In the contest for supremacy, the English c) Mughal dynasty d) None
emerged ‘victors’. The Rebellion of 1857-58, which 15. What is the concern for spread of Hinduism,
sought to restore Indian supremacy, was crushed; architecture from India to other parts of Asia
and with the subsequent crowning of Victoria as a) Amalgamation of various gools culture
Reading Comprehension
Empress of India, the incorporation of India into b) Silk Road
the empire was complete. It was followed by India’s c) Dharmic Religions
struggle for independence, which we got in the year d) None
1947.
India is one of the world’s oldest civilizations 11 12 13 14 15
and one of the most populated countries in the world. d a a b a
The Indian culture, often labeled as an amalgamation 1.4 Directions (16-20) Read the Passage and
of several various goolscultures, spans across the Answer the following Questions.
Indian subcontinent and has been influenced and
shaped by a history that is several thousand years old. Once upon a time two brothers who lived
Throughout the history of India, Indian culture has on adjoining farms fell into conflict. It was the
first serious rift in 40 years of farming side by
been heavily influenced by Dharmic religions. They
side. They had been sharing machinery, trading a
have been credited with shaping much of Indian
labour and goods as needed without a hitch. Then
philosophy, literature, architecture, art and music.
the long collaboration fell apart. It began with a
Greater India was the historical extent of Indian small misunderstanding and it grew into a major
culture beyond the Indian subcontinent. difference which exploded into an exchange of bitter
This particularly concerns the spread of words followed by weeks of silence.
Hinduism, Buddhism, architecture, administration
One morning there was a knock on elder
and writing system from India to other parts of Asia
brother’s door. He opened it to find a man with a
through the Silk Road by the travellers and maritime
carpenter’s toolbox. “I am looking for a few days of
traders during the early centuries of the Common work”, he said. “Perhaps you would have a few small
Era. To the west, Greater India overlaps with Greater jobs here and there. Could I help you?”
3.5
Professor Academy
“Yes!” said the elder brother. “I do have a job c) This was another trick used by the younger
for you. Look across the creek at that farm. That’s my brother to trick the elder brother emotionally.
neighbour, in fact, it’s my younger brother and we d) On the previous night he had seen his
don’t get along. Last week he dug a wider passage elder brother cry and pray for peace & love
for water into his farm. But he ended up creating a between them.
very wide creek in between our farms and I am sure
he did it just to annoy me. I want you to build me 18. Why had the carpenter come to the elder
something so that we don’t have to stand and see brother’s home?
each other’s face from across.” a) He was looking for a job and had knocked
on the doors of the elder brother in search of
The carpenter said “I think I understand some work.
the situation. I will be able to do a job that will b) He was a wanderer and was looking for a stay
please you.” The elder brother had to go to town for for few days in the village.
supplies, so he helped the carpenter get the materials c) He had come to bridge the gap between the
ready and then he was off for the day. The carpenter two brothers and help them love each other
worked hard all that day measuring, sawing, nailing.
once again.
At sunset when the elder brother returned, d) He had come to repair the broken door of the
the carpenter had just finished his job. The elder elder brother’s home.
brother’s eyes opened wide and his jaw dropped. It
was not what he had even thought of or imagined. It 19. Why the older brother asked the carpenter to
was a bridge stretching from one side of the creek to stay a few days?
the other! A fine piece of work, beautiful handrails. a) For some more projects
And to his surprise, his younger brother across the b) To give him some rest
creek was coming to meet him with a big smile and c) To introduce the villagers
arms wide open to hug him. d) To repair the bridge
“You are really kind and humble my brother! 20. There was a knowck on elder brother’s door
After all I had done and said to you, you still shown by______
that blood relations can never be broken! I am truly a) Saint b) Younger brother
sorry for my behaviour”, the younger brother said c) Neighbour d) Carpenter
Reading Comprehension
Reading Comprehension
He types the address from her ID into his
phone and sees that her house is only a few blocks away. sufficient treatment capacity but also that the sewage
He can stop by her place, trade jackets, and still make it treatment plants that exist do not operate and are not
back to his hotel with a little bit of time to sleep. maintained. The majority of the government-owned
sewage treatment plants remain closed most of the
Questions
time due to improper design or poor maintenance
21. Andrew had an early flight back to _________ in or lack of reliable electricity supply to operate the
the morning plants, together with absentee employees and poor
a) London b) America management. The waste water generated in these
c) New York d) German areas normally percolates in the soil or evaporates.
22. Andrew quickly crosses the street and walks The uncollected wastes accumulate in the urban areas
through __________ of the pub. cause unhygienic conditions and release pollutants
a) The door b) The street that leaches to surface and ground water.
c) The road d) The Blue door Air pollution in India is a serious issue with
23. Andrew notices ___________ next to the door. the major sources being fuel wood and biomass
a) A coat rack b) Jacket burning, fuel adulteration, vehicle emission and
c) The hooks d) The door traffic congestion. Air pollution is also the main
cause of the Asian brown cloud, which is causing
24. Erin is a cute girl and her eyes was _________ the monsoon to be delayed. India is the world’s
in colour. largest consumer of fuel wood, agricultural waste
a) Red b) Brown and biomass for energy purposes. Traditional fuel
c) Green d) Black (fuel wood, crop residue and dung cake) dominates
3.7
Professor Academy
domestic energy use in rural India and accounts for 5. According to the Passage, the uranium Poisoning
about 90% of the total. In urban areas, this traditional was caused by,
fuel constitutes about 24% of the total. Fuel wood, a) Fly ash ponds of thermal power stations
agri waste and biomass cake burning releases over b) The Asian brown cloud
165 million tonnes of combustion products into c) Biomass cake burning
India’s indoor and outdoor air every year. These d) None
biomass-based household stoves in India are also a 2.2 Directions (6-10) Read the Passage and Answer
leading source of greenhouse emissions contributing the following Questions.
to climate change.
Many great inventions are greeted with
In March 2009, the issue of Uranium ridicule and disbelief. The invention of the airplane
poisoning in Punjab attracted press coverage. It was
was no exception. Although many people who
alleged to be caused by fly ash ponds of thermal power
heard about the first powered flight on December
stations, which reportedly lead to severe birth defects
in children in the Faridkot and Bhatinda districts of 17,1903, were excited and impressed, others reacted
Punjab. The news reports claimed the uranium levels with peals of laughter. The idea of flying an aircraft
were more than 60 times the maximum safe limit. In was repulsive to some people. Such people called
2012, the Government of India confirmed that the Wilbur and Orville Wright, the inventors of the first
ground water in Malwa belt of Punjab has uranium flying machine, impulsive fools. Negative reactions,
metal that is 50% above the trace limits set by the however, did not stop the Wrights. Impelled by their
United Nations’ World Health Organization. desire to succeed, they continued their experiments
Questions in aviation. Orville and Wilbur Wright had always
had a compelling interest in aeronautics and
1. What happens when the threshold level of the
environment is compromised? mechanics. As young boys they earned money by
a) Balance of an ecosystem is broken. making and selling kites and mechanical toys. Later,
b) Protocols related to environment araise. they designed a newspaper-folding machine, built a
c) Sewage plants are not maintained printing press, and operated a bicycle-repair shop.
Reading Comprehension
d) Urban areas are unhygienic In 1896, when they read about the death of Otto
2. Which is the most important cause for Water Lilienthal, the brother’s interest in flight grew into
pollution? a compulsion. Lilienthal, a pioneer in hang-gliding,
a) Ground water contamination had controlled his gliders by shifting his body in
b) Untreated sewage the desired direction. This idea was repellent to the
c) Oil Spills Wright brothers, however, and they searched for
d) Industrial Effuluent more efficient methods to control the balance of
3. What are the Additional problems that India airborne vehicles. In 1900 and 1901, the Wrights
faces in addition to lackof sewage treatment tested numerous gliders and developed control
capacity? techniques. The brothers’ inability to obtain enough
a) Treament plant is not maintained properly lift power for the gliders almost led them to abandon
b) Lack of electricity supply their efforts. After further study, the Wright brothers
c) Both (a) and (b)
concluded that the published tables of air pressure
d) None
on curved surfaces must be wrong. They set up
4. Which of the following is major source of Air a wind tunnel and began a series of experiments
pollution? with model wings. Because of their efforts, the old
i. Burning fuel wood
tables were repealed in time and replaced by the first
ii. Adulteration of fuel
reliable figures for air pressure on curved surfaces.
iii. Vehicle exhaust
a) I only b) II and III This work, in turn, made it possible for them to
c) III only d) I, II, III design a machine that would fly. In 1903 the Wrights
3.8
Professor Academy
built their first airplane, which cost less than one had been executed, there were rumors suggesting
thousand dollars. They even designed and built that Anastasia had survived. Over the years, a
their own source of propulsion lightweight gasoline number of women claimed to be Grand Duchess
engine. When they started the engine on December Anastasia. Perhaps the best –known claimant was
17, the airplane pulsated wildly before taking off. Anastasia Tschaikovsky, who was also known as
The plane managed to stay aloft for twelve seconds, Anna Anderson. In 1920, eighteen months after the
however, and it flew one hundred twenty feet. Czar’s execution, this terrified young woman was
rescued from drowning in a Berlin river. She spent
Questions
two years in a hospital, where she attempted to
6. People thought that the Wright brothers had reclaim her health and shattered mind. The doctors
____. and nurses thought that she resembled Anastasia
a) acted without thinking and questioned her about her background. She
b) been negatively influenced disclaimed any connection with the Czar’s family.
c) been too cautious
Eight years later, though, she claimed that she was
d) had not given enough thought
Anastasia. She said that she had been rescued by
7. The Wright’s interest in flight grew into a ____. two Russian soldiers after the Czar and the rest of
a) financial empire b) plan her family had been killed. Two brothers named
c) need to act d) foolish thought Tschaikovsky had carried her into Romania. She
8. Lilenthal’s idea about controlling airborne had married one of the brothers, who had taken
vehicles was ___the Wrights. her to Berlin and left her there, penniless and
a) proven wrong by b) In efficient without a vocation. Unable to invoke the aid of
c) disliked by d) accepted by her mother’s family in Germany, she had tried to
9. The old tables were __ and replaced by the drown herself. During the next few years, scores of
first reliable figures for air pressure on curved the Czar’s relatives, ex-servants, and acquaintances
surfaces. interviewed her. Many of these people said that
a) destroyed b) canceled her looks and mannerisms were evocative of the
Reading Comprehension
c) multiplied d) discarded Anastasia that they had known. Her grandmother
10. The Wrights designed and built their own source and other relatives denied that she was the real
of ____. Anastasia, however. Tried of being accused of
a) force for moving forward fraud, Anastasia immigrated to the United States in
b) force for turning around 1928 and took the name Anna Anderson. She still
c) turning wished to prove that she was Anastasia, though,
d) force to going backward and returned to Germany in 1933 to bring suit
2.3 Directions (11-15): Read the passage and against her mother’s family. There she declaimed to
answer the questions that follow: the court, asserting that she was indeed Anastasia
and deserved her inheritance. In 1957, the court
One of the most intriguing stories of
decided that it could neither confirm nor deny
the Russian Revolution concerns the identity
Anastasia’s identity. Although we will probably
of Anastasia, the youngest daughter of Czar
never know whether this woman was the Grand
Nicholas II. During his reign over Russia, the Czar
Duchess Anastasia, her search to establish her
had planned to revoke many of the harsh laws
identity has been the subject of numerous books,
established by previous czars. Some workers and
plays, and movies.
peasants, however, clamored for more rapid social
reform. In 1918 a group of these people, known as Questions
Bolsheviks, overthrew the government. On July 11. Some Russian peasants and workers___for social
17 or 18, they murdered the Czar and what was reform.
thought to be his entire family. Although witnesses a) longed b) cried out
vouched that all the members of the Czar’s family c) begged d) hoped
3.9
Professor Academy
12. Witnesses ___ that all members of the Czar’s However, her proposals have met resistance.
family had been executed) Several male politicians in her own Christian
a) gave assurance b) thought Democrat party have derided the idea to men
c) hoped d) convinced some abandoning work to change nappies. The Social
13. Tchaikovsky ____any connection with the Czar’s Democrats, junior Partners in Germany’s coalition
family. government, have also expressed unease because the
a) denied b) stopped themes of childcare and women’s right traditionally
c) noted d) justified belonged to the left.
14. She was unable to ___the aid of her relative. “Compulsory paid leave for fathers is a good
a) locate b) speak about idea”, Professor Norbert Schneider, a sociologist at
c) call upon d) identify Mainz University, said. Germany now has the highest
number of childless women in the world. This trend
15. In court she ___ maintaining that she was
has been going on since at least the 90’s. What we
Anastasia and deserved her inheritance.
also know is that higher the level of education, the
a) finally appeared b) spoke forcefully
c) testified d) gave evidence more likely a woman is to remain childless.
2.4 Directions (16-20): Read the passage and Schneider said several factors were to blame
answer the questions that follow: for Germany’s low birth rate, including inadequate
childcare provision, a school day that ends at 1 pm,
Germany has been plunged into an anguished and old-fashioned attitudes among employers. By
debate about how to encourage reluctant couples to the time they had finished university, and found a
breed after new figures showed Germany with the good job, many German women were already in
world’s highest proportion of childless women. their mid-30s, he said.
Thirty percent of German women have had Questions
no children, according to European Union statistics 16. What is Germany most worried about?
from 2005, with the figure rising among female a) the rising population of Germany
graduates to 40 percent. Germany’s family minister, b) the falling population of Germany
Reading Comprehension
Ursula von der Leyen, said that unless the birth rate c) how to encourage their reluctant couples to
picked up the country would have to “turn the light breed
out”. d) how to raise the birth rate among their
reluctant female graduates
Von der Leyen, a mother of seven and
Germany’s chancellor, Angela Merkel, told Stern 17. Which of the following statements is false in the
magazine that not only women but also “deeply given context of the passage:
uncertain” men were to blame for it. “They are unsure a) Women should not be educated
about the role of fatherhood,” she said Last month, b) Men should be made more responsive to
their role of fatherhood
Von der Leyen tabled a series of radical proposals,
c) Government should provide all facilities to
including requiring men to take two months off
encourage the prospective couples to breed)
work to look after a newborn child if they wished to d) Employers’ old-fashioned attitude should give
qualify fully for state-funded child welfare support. way to the new realities at the work place
The scheme would offer parents 67 per cent of their
previous incomes while staying at home. It would 18. According to the German Chancellor the
person(s) to be blamed for the falling birth rate
be limited to a year, up to a monthly maximum of
of Germany are:
1,800 euros. Working parents would also be able to
a) only women
offset 3,000 euros a year of childcare costs against b) only men
tax, encouraging women to have more children. c) both men and women
The proposals are based on scheme in Scandinavia, d) the government and the breeding couple
where birth rates are higher than those of Germany.
3.10
Professor Academy
19. The men are disinterested in breeding because of immediately realized his folly and rewarded Birbal
a) non-cooperative attitude of their wives for his wisdom.
b) Their unsure role of fatherhood
Questions
c) discouraging attitude of the government
d) Non-availability of facility of rearing them up 21. Why had the king not eaten his food?
a) He was very busy that day
20. Birth rate of Germany can be increased if
b) He had seen the face of the unlucky fellow
a) compulsory paid leave is allowed to husbands
c) He was not feeling well
to look after their newly born babies.
d) None of these
b) extra facilities are given to prospective
mothers 22. Who was not well on that particular day?
c) the employer’s attitude is changed to suit the a) King Akbar
convenience of the educated women b) The King’s courtiers
d) adequate facilities to look after children, c) Birbal
compulsory paid leave to husband and d) Prince Salim
change in the old-fashioned attitude of
employers are taken care of. 23. Which of the following describes Birbal?
a) He was a famous merchant
2.5 Directions: (21-25) Read the passage and b) He had lost his senses
answer the questions that follow: c) He was very poor
During Emperor Akbar’s reign, there was a d) He possessed good logical thinking
poor man in Agra, who was through to bring bad 24. Which of the following is true in the context of
luck. People believed that if any one looked at his the passage?
face in the morning, they would have a bad day. a) The poor man wanted to see the king
“Get lost, you ugly fellow!” he would be cursed b) The poor man was well educated
by one and all. “Hide your face before you kill c) The courtiers were sympathetic with the poor
someone with your evil eye!” The emperor soon man
heard of this man’s reputation and wanted to see d) King Akbar realized his mistake
him. The poor fellow, who had not harmed a single
Reading Comprehension
25. What was Birbal’s initial reaction when he heard
person in his life, was brought to Akbar. Akbar that the poor man would be executed?
took a look at him and asked him to be brought a) He was angry because Akbar had not taken
back in the evening. That particular day was an his advice
especially full and tiring day for the emperor and b) He laughed slightly
his courtiers. So, many matters had to be attended c) He was silent and wanted to give a change to
to that Akbar even forgot to eat. By the end of the the poor man
day, the emperor was exhausted. To make matters d) None of these
worse, Akbar was informed that his favorite child,
little Prince Salim, had fallen ill. Then the emperor Answers 2.1- 2.5
suddenly remembered that he had seen the face of 1 2 3 4 5
the ‘unlucky’ man that morning. That was it. It was a b c d a
that man’s entire fault, Akbar decided. Akbar called
6 7 8 9 10
his courtiers and told them that he was going to
have ‘unlucky’ man executed. All of them agreed b c c b a
immediately. That is all except Birbal. Instead, Birbal 11 12 13 14 15
let out a short laugh. “What is the matter, Birbal?” b a a c b
asked the emperor “You seem to find something 16 17 18 19 20
funny!” “Nothing, your majesty, “replied Birbal c a c b a
“You say this man brings bad luck because you
21 22 23 24 25
had to go without food ever since you saw him this
morning. Look at his luck. Yours was the first face d d d d b
he saw today, and has to die because to it.” Akbar
3.11
Professor Academy
Level 3 help the institution function better. This is already
a widely-adopted practice in executive departments
3.1 Directions: (1–5)Read the passage and answer across the country. Courts have partially realised this
the questions that follow: need and created dedicated posts for court managers
(MBA graduates) to help improve court operations.
While there is general acceptance that the
But more often than not, court managers are not
Indian judicial system suffers from case delay and
utilized to their full potential, with their duties
the use of antiquated methods, the discourse on
restricted to organising court events and running
judicial reform remains focused on areas such
errands.
as appointments and vacancies. It is time that
organizational barriers and court processes that also Questions
contribute to case delay are studied. We focus on two
1. Which of the following is/are synonyms of
areas that greatly affect court efficiency: case listing
dearth?
practices and court infrastructure.
I. Prompt II. Tardy
The need to scientifically determine how III. Inefficient IV. Scarcity
many cases should be listed per day cannot be a) Only IV b) Only II and IV
stressed enough. It is not uncommon to see over c) Only I, II and IV d) Only II, III and IV
100 matters listed before a judge in a day. When a
2. Which of the following is/are antonyms of
judge is pressed for time, not only does the quality
antiquated?
of adjudication suffer but it also means that several
I. Outdated II. Primitive
cases will inevitably go unheard. Matters listed
III. Modern IV. Mossy
towards the end (usually cases near the final stage
of hearing) tend to be left over at disproportionate a) Only II b) Only I and III
rates and often end up getting stuck in the system. c) Only III d) Only I, III and IV
The second issue is infrastructure: from 3. Which of the following is/are true as per the
inadequate support staff for judges to the dearth passage?
of basic courtroom facilities. Without research and I. The existing court infrastructure is adequate
Reading Comprehension
secretarial support, judges are unable to perform for the current sanctioned strength at all-
their functions in a timely manner. For instance, in India levels.
a private interview, a judge said that even though he II. It is not uncommon to see over 100 matters
managed to hear close to 70 cases in a day, it took listed before a judge in a day.
two days for the stenographers to finish typing the III. The Indian Judiciary needs to be modernized.
orders. A 2016 report published by the Supreme a) Only III b) Only II and III
Court showed that existing infrastructure could c) Only I and II d) Only I and III
accommodate only 15,540 judicial officers against 4. As per paragraph 1, which among the following
the all-India sanctioned strength of 20,558. The lack are the focus areas of judicial reforms?
of infrastructure also raises serious concerns about I. Framework for filling vacancies
access to justice. A recent Vidhi study on district II. Case Listing procedure
courts in the National Capital Region found that III. Infrastructure of courts
even basic needs such as drinking water, usable
a) Only II b) Only I and II
washrooms, seating and canteen facilities are often
c) Only I d) Only II and III
not available in court complexes. Solutions for such
challenges will require a fundamental shift in how 5. What could be some possible consequences of
courts are administered. the issues mentioned in paragraph 2?
I. There is uncertainty a about when the cases
Courts must become more open to applying
would come up for hearing next and hampers
management principles to optimize case movement
the efficacy of lawyers in preparing for their
and judicial time. In this, external support agencies
cases in a better manner.
competent in strategic thinking should be allowed
to work with judicial officers to understand and
3.12
Professor Academy
II. There is a better chance of winning the case in investment in public sector for those infrastructure
case of frequent changes in the hearing dates. areas, which cannot attract private investment, and
III. Frequent re-listing impacts the efficiency of through efforts to improve private participation in
the court administrative staff. different ways of public private participation.
a) Only II b) Only I and II In the early stages of reforms, the
c) Only II and III d) Only I and III liberalization of trade policies and a shift to a market
3.2 Directions: (6–10)Read the passage and answer determined exchange rate had the effect of removing
the questions that follow: constrains on agriculture in terms of depressed
prices. The removal of protection on industry helped
It is difficult to imagine the extraordinary to produce a more level playing field, because the
number of controls on Indian industry before 1991. earlier system was extremely unfair to agriculture.
Entrepreneurs needed permission to invest and could The lesson to be learnt from the reforms process is
be penalized for exceeding production capacity. Even to persevere in reforming the strategic parts of the
with the given investment capacity they had, entering economy, which will lead to even higher growth
certain areas was prohibited as these were reserved rate. India has to do better than its current average
for the public sector. If they had to import anything, growth rate of 8% and ensure that benefits from this
they required licenses. To get these licenses was tough, higher growth go beyond industry and urban areas
they had to persuade a bureaucrat that the item was and extend to agriculture.
required but even so permission was unavailable
if somebody was already producing it in India. The Questions
impact of the reforms was not instantaneously and
6. Which of the following factors was responsible
permanently wonderful. In India’s case it began to
show after about a year and a half. After 1993 there for the fall in India’s growth rate in the late 1990s?
came three years of rapid industrial growth of about a) The implementation of economic reforms
8% or so. But, in the second half of the 90s, there had was too rapid
an impact on the Indian industry. But, in the last b) It was expected after achieving a high growth
few years there has been a tremendous upturn. With at 10%
Reading Comprehension
the rise of investment industrial growth has reached c) There was a slowdown in the global economy
double digits or close. d) There were sanctions against East Asian
A lot of evidence that positive results of the countries by WTO
reforms were seen. There were companies that didn’t 7. Which of the following can be said about the
look at all internally but instead performed remarkably reforms of 1991?
in the highly competitive global market. For instance, a) They benefited Indian industry immediately
the software sector’s performance was outstanding b) All Indian companies began to focus on
in an almost totally global market. Reliance built a
indigenous development instead of looking
world class refinery. Tata’s developed an indigenously
for opportunities abroad
designed car. The success of the software sector has
c) They were targeted only at the software sector
created much higher expectations from and much
higher confidence in what Indian industry can do. d) They encouraged Foreign Direct Investment
On the government’s side it’s a vindication that in India
liberalization of both domestic and external policies, 8. What was the impact of the flourishing Indian
including the increased inflow of Foreign Direct software sector?
Investment, has created an environment in which a) Other companies were unable to be
industry can do well, has done well and is preparing to competitive in the global market
do even better. What they need is not sops, but good
b) It fulled expectations of a good performance
quality infrastructure. For the 11th plan an industrial
from the Indian economy
growth rate of around 12% is projected. It will have
methods of developing infrastructure, which will c) Growth rate rose to 12%
close the deficit. This can be done through increased d) It created cut throat competition among
3.13
Professor Academy
software companies which would hinder the pass outside the palace. He glanced at the carriage
sector in the long run out of curiosity and spied the jester sitting inside.
9. What is the author’s opinion about the The carriage was stopped. The king asked the jester
government’s decision to liberalize the economy angrily, “why have you come back to the kingdom
in 1991? without my permission?’ “Your Majesty” the jester
a) It was beneficial because it created confidence replied politely, “I left for China the day you drove
in the Indian economy me out of your court. I returned only after I had
b) The timing was wrong since the economy covered the floor of my carriage with the soil of the
experienced a slowdown in growth rate neighboring country. I have thus not set my foot
c) It led to a focus on software and other sectors on your soil,” The king found the jester’s answer
were neglected pleasing. He smiled and asked him to come to
d) Foreign companies took advantage of the new court from the next morning.
policies and exploited certain sectors Questions
10. How did software companies deal with slow 11. Why did the king leave the court suddenly one
industrial growth in an open Indian economy? day?
a) They focused on strengthening their position a) He was bored as the word was routine
in the domestic market b) He realized that he had forgotten to meet the
b) They campaigned for infrastructure queen that day
development c) He was upset that day
c) They diversified into different sectors d) None of these
d) They targeted global markets 12. Why did the king himself ask the jester to return
3.3 Directions (11–15) Read the passage and to his court?
answer the questions that follow: a) He missed the jester’s wit and humor
One day, the king came to the court and b) The jester did not need the request, the king
began attending to the routine matters people had sent through his messengers
had brought to him. He happened to be in a bad c) The courtier’s through the king was foolish for
Reading Comprehension
mood that day. Just then, a messenger arrived throwing out the jester
out of breath, with a message that the queen d) The king appreciated the jester’s cleverness in
wanted to see the king in her palace. The king rose interpreting his orders
immediately and all the courtiers respectfully got 13. Why did the jester remain seated, while the king
to their feet. The jester however remained seated was leaving?
unaware that the king was departing. He belatedly a) To show he was unhappy with king’s decision
got to his feet but while doing so, he was noticed by to leave early
the king, who perceived this behavior as an insult. b) To get the king’s attention
He ordered the jester to leave his kingdom with c) To show the king that leaving early was
immediate effect and not set foot on its soil under insulting to those, who had come to the
penalty of death. The courtiers were upset and court
protested. The jester was amusing and well liked. d) He did not realize that the king was leaving
But the jester obeyed the king’s commands and left 14. Which of the following is true in the context of
the palace promptly. Several months passed after the passage?
the king had ordered the jester to leave his court. a) The king was stubborn and never listened to
The king’s anger had subsided. He decided to his courtier’s advice
invite the jester to return to his court. Messengers b) The jester was quick witted
were sent to neighboring kingdoms to search for c) The king’s messengers did not try very hard to
the jester and bring him before the king. However find the jester
the very next day, when the king was standing in d) The jester did not return to the court till the
one of the palace balconies, he saw a horse carriage king had asked forgiveness
3.14
Professor Academy
15. Choose the word which is most similar in 1987- 1991, the number of children in foster care
meaning to the word printed in bold as used in increased by over 50%. Babies under the age of one
the passage. Spied are the fastest growing category of children entering
a) Watched b) Followed foster care. This crisis affects children under the age
c) Stared d) Noticed of three most severely, the report says. Yet, it is this
3.4 Directions (16–20) Read the passage and period – from infancy through preschool years –
answer the questions that follow: that sets the stage for a child’s future.
Reading Comprehension
and more are being raised by single parents. When
taken together, these and other risk factors can lead approximately three times that four decades ago
to educational and health problems that are much b) The number of children in the US entering foster
harder and more costly to reverse. care has decreased after 1991
c) In the US, the number of infants living in poverty
The crisis begins in the womb with unplanned is about 3 million
parenthood. Women with unplanned pregnancies d) Only 20% of all the pregnancies in the US are
are less likely to seek pre natal care. In the US 80% of planned
teenage pregnancies and 56% of all pregnancies are
unplanned. The problems continue after birth, where 19. The number of children born to married mothers
unplanned pregnancies and unstable partnerships in the US is approximately, how many times the
often go hand in hand. Since 1950, the number of number of children born to unwed mothers?
single parent families has nearly tripled. More than a) 1.5 times b) 2 times
25% of all births today are to unmarried mothers. c) 3 times d) 3.5 times
As the number of single parent families grows and 20. The task force report seems to be based on the
more women enter the work force, infants and data pertaining to the period
toddlers are increasingly in the care of people other a) 1987-91
than their parents. b)1950 onwards till data
Most disturbingly, recent statistics show c) 1987 onwards till data
that American parents are increasingly neglecting d) 1950-91
or abusing their children. In only four years from
3.15
Professor Academy
3.5 Directions: (21–25) Read the passage and c) humorous d) strange
answer the questions that follow: 23. When she learned that she could not attend the
Marie Curie was one of the most accomplished university in Warsaw, she felt___.
scientists in history. Together with her husband, a) hopeless b) annoyed
Pierre, she discovered radium, an element widely c) depressed d) worried
used for treating cancer, and studied uranium and 24. Marie ___ by leaving Poland and traveling to
other radioactive substances. Pierre and Marie’s France to enter the Sorbonne.
amicable collaboration later helped to unlock the a) challenged authority
secrets of the atom. Marie was born in 1867 in Warsaw, b) showed intelligence
Poland, where her father was a professor of physics. c) behaved
At the early age, she displayed a brilliant mind and a d) was distressed
blithe personality. Her great exuberance for learning 25. _____she remembered their joy together.
prompted her to continue with her studies after high a) Dejectedly b) Worried
school. She became disgruntled, however, when she c) Tearfully d) Happily
learned that the university in Warsaw was closed to Answer 3.1 - 3.5
women. Determined to receive a higher education, she
defiantly left Poland and in 1891 entered the Sorbonne, 1 2 3 4 5
a French university, where she earned her master’s a c b c d
degree and doctorate in physics. Marie was fortunate 6 7 8 9 10
to have studied at the Sorbonne with some of the c d b a d
greatest scientists of her day, one of whom was Pierre
11 12 13 14 15
Curie. Marie and Pierre were married in 1895 and
spent many productive years working together in the d d d c d
physics laboratory. A short time after they discovered 16 17 18 19 20
radium, Pierre was killed by a horse-drawn wagon in d d b c d
1906. Marie was stunned by this horrible misfortune 21 22 23 24 25
and endured heartbreaking anguish. Despondently she a b b a a
Reading Comprehension
recalled their close relationship and the joy that they had
shared in scientific research. The fact that she had two Level 4
young daughters to raise by herself greatly increased
4.1 Directions (1–5) Read the passage and answer
her distress. Curie’s feeling of desolation finally began
the questions that follow:
to fade when she was asked to succeed her husband
as a physics professor at the Sorbonne. She was the Banking sector reforms in India were
first woman to be given a professorship at the world- introduced in order to improve efficiency in the
famous university. In 1911 she received the Nobel Prize process of financial intermediation. It was expected
in chemistry for isolating radium. Although Marie that banks would take advantage of the changing
Curie eventually suffered a fatal illness from her long operational environment and improve their
exposure to radium, she never became disillusioned performance. Towards this end, the Reserve Bank of
about her work. Regardless of the consequences, she India initiated a host of measures for the creation of
had dedicated herself to science and to revealing the a competitive environment. Deregulation of interest
mysteries of the physical world. rates on both deposit and lending sides imparted
freedom to banks to appropriate price their products
Questions
and services. To compete effectively with non-
21. The Curies’ ____ collaboration helped to unlock banking entities, banks were permitted to undertake
the secrets of the atom. newer activities like investment banking, securities
a) friendly b) competitive trading and insurance business. This was facilitated
c) courteous d) industrious through amendments in the relevant acts which
22. Marie had a bright mind and a __personality. permitted PSBs to raise equity from the market up
a) strong b) lighthearted to threshold limit and also enabling the entry of new
3.16
Professor Academy
private and foreign banks. This changing face of b) The rate of return is not commensurate with
banking led to an erosion of margins on traditional the operational cost
banking business, promoting banks to search for c) The rate of improvement has not been high
newer activities to augment their free incomes. At d) Nationalized banks and private sector banks
the same time, banks also needed to devote focused did differ in the efficiency measures
attention to operational efficiency in order to 5. Which of the following statements recognizing
contain their transaction costs. Simultaneously with improvement in efficiency is true in the context
the deregulation measures prudential norms were of the passage?
instituted to strengthen the safety and soundness a) There is no discernible difference in
of the banking system. Recent internal empirical efficiency parameters
research found that over the period 1992-2003, b) The foreign banks recorded higher efficiency
there has been a discernible improvement in the c) The efficiency of foreign banks is not
efficiency of Indian banks. The increasing trend in comparable with Indian banks
efficiency has been fairly uniform, irrespective of the d) The rate of such improvement in efficiency
ownership pattern. The rate of such improvement was very high
has, however, not been sufficiently high. The analysis 4.2 Directions: (6–10) Read the passage and
also reveals that PSBs and private sector banks in answer the questions that follow:
India did not differed significantly in terms of their
efficiency measures. Foreign banks, on the other Delays of several months in National Rural
hand, recorded higher efficiency as compared with Employment Guarantee Scheme wage payments and
their Indian counterparts. work sites where labourers have lost all hope of being
paid at all have become the norm in many states. How
Questions are workers who exist on the margins of subsistence
1. Prudential norms were initiated in the banking supposed to feed their families? Under the scheme,
sector with a view to workers must be paid within 15 days, failing which
a) Increase operational efficiency they are entitled to compensation under the Payment
b) Contain the non-performing assets of Wages Act – up to Rs.3000 per aggrieved worker. In
Reading Comprehension
c) Strengthen the soundness of banking system reality, compensation is received in only a few isolated
d) Improve the customer service instances. It is often argued by officials that the main
2. Banking sector reforms in India were introduced reason for the delay is the inability of banks and post
for the purpose of offices to handle mass payments of NREGS wages.
a) Giving more and more employment Though there is a grain of truth in this, as a diagnosis
opportunities to the educated unemployed it is misleading. The ‘jam’ in the banking system has
b) Taking care of the downtrodden masses been the result of the hasty switch to bank payments
c) Increasing efficiency in the banking activities imposed by the Central Government against the
d) Giving better return to the Central recommendation of the Central Employment
Government Guarantee Council which advocated a gradual
transition starting with villages relatively close to the
3. Banks can control their transaction costs by nearest bank. However, delays are not confined solely
a) Restricting their lending activities to the banking system. Operational hurdles include
b) Undertaking more and more non-banking implementing agencies taking more than fifteen days
activities to issue payment orders, viewing of work measurement
c) Encouraging the customers to bank with as a cumbersome process resulting in procrastination
other banks by the engineering staff and non-maintenance of
d) Devoting more attention to operational muster rolls and job card etc. But behind these delays
efficiency lies a deeper and deliberate ‘backlash’ against the
4. The recent internal empirical research conducted NREGS. With bank payments making it much harder
by the RBI found that to embezzle NREGS funds, the programme is seen as
a) There is cut-throat competition in banking a headache by many government functionaries the
industry
3.17
“Today a Reader, Tomorrow a Leader”
Professor Academy
workload has remained without the “inducements”. a) Theft of funds by administration officials
Slowing down wage payments is a convenient way of responsible for the scheme has reduced
sabotaging the scheme because workers will desert b) Increased work load for local government
NREGS worksites. officials
The common sense solution advocated by the c) Protests by workers who have to travel long
government is to adopt the business correspondent distances to the nearest bank to claim their
model. Where in bank agents will go to villages wages
to make cash payments and duly record them on d) Time consuming formalities have to be
handheld, electronic devices. This solution is based completed by workers
on the wrong diagnosis that distance separating 9. To which of the following has the author
villages from banks is the main issue. In order to attributed the delay in wage payments?
accelerate payments, clear timelines for every step of a) Embezzlement of funds by corrupt bank staff
the payment process should be incorporated into the b) Lack of monitoring by the Central Employment
system as Programme Officers often have no data on Guarantee Council
delays and cannot exert due pressure to remedy the c) An attempt to derail the NREGS by vested
situation. Workers are both clueless and powerless interests
with no provision for them to air their grievances d) Overworked bank staff deliberately delay
and seek redress. In drought affected areas the system payments to protest against extra work
of piece rate work can be dispensed with where work 10. Which of the following can be considered a
measurement is not completed within a week and deficiency in the NREGS?
wages may be paid on the basis of attendance. Buffer a) Lack of co-ordination among Programme
funds can be provided to gram panchayats and post Officers
offices to avoid bottlenecks in the flow of funds. b) Local officials are unaware of correct
Partial advances could also be considered provided operational procedures
wage payment are meticulously tracked. But failure c) Workers have no means of obtaining redressed
to recognize problems and unwillingness to remedy for untimely wage payments
them will remain major threats to the NREGS.
Reading Comprehension
Reading Comprehension
In general, large corporations such as Microsoft,
Google or Apple have reacted quickly. They can 11. Consider the following statements regarding the
do more to publicise vulnerabilities and fixes and Ransomware:
highlight the risk to customers if they do not update. 1. It is a Malware.
Finally, a failure to update systems poses a 2. It has exploited vulnerabilities in Windows 10.
real issue. Those individuals and organisations that Which of the following statements given above
did not apply Microsoft’s update were taking a risk; is/are correct?
whether the reasons were cost, lack of attention or a) 2 only b) Both are correct
negligence, their actions had an impact on others. c) None is correct d) 1 only
The reasons for making computer software up to
date are the same as vaccinating a population against 12. How can Software companies prevent
diseases. Policymakers may want computer owners weaknesses in their softwares?
to take the same approach. a) By rigorous testing.
b) By updating their softwares.
One curious aspect of WannaCry is that once c) By consulting Security agencies.
it enters a computer, it tries to connect to a domain on d) None of the above
the internet, and if it succeeds, it stops its activity. An
alert cybersecurity researcher created that domain 13. Which of the following statements given below
and helped slow WannaCry’s spread. Researchers is/are correct regarding the Microsoft Windows
are puzzled why this “killswitch” was left in the code. system?
What’s worrisome is that perhaps a future variant 1. Windows systems have the capability to
of ransomware will try to send contents of the disk automatically install updates
3.19
Professor Academy
2. Microsoft very soon released an update that including post-harvest losses”. Food loss is valued
removed the vulnerabilities(caused because at $1 trillion globally by the Food and Agriculture
of Ransomware) Organisation, enough to feed the 800 million who
Select the correct option using the codes given sleep hungry every night. Of this, over 200 million are
below. in India, a country that grows sufficient food to feed
a) 1 only b) 2 only its burgeoning population of 1.3 billion.
c) Both are correct d) None is correct The SDGs have clearly put the spotlight on
14. What are ‘Zero Days’? food loss and waste, and we are beginning to see more
a) The specific days of the year when Ransomware attentive discussion on the subject. At the recently
attacks computers. held Food Congress in Dusseldorf in early May
b) Software’s Vulnerabilities. 2017, the focus was on identifying possible solutions
c) The specific days of the years when Security for both — through better farming practices, use of
agencies around the world do rigorous technology, better information, change in consumer
testings on Softwares. behaviour, etc. Estimates of “food waste and food
d) None of the above loss” range between 30 and 50% for both developed
15. According to RBI, which Indian Bank has con- and emerging countries.
firmed an attack by Ransomware last year? In developed countries “food waste” happens
a) Punjab National Bank more at the consumer household level, where more
b) State Bank of India is purchased than consumed; and in emerging
c) Bank of Baroda economies, it is the supply chain that leads to “food
d) Not mentioned in the Passage loss” during harvest, storage or in transit, largely
4.4 Directions (16-20) Read the passage and due to poor infrastructure and inadequately aligned
answer the questions that follow: processes. As an example, India’s cold storage
One of the unfortunate paradoxes of our lives requirement is 66 million tonnes, and the national
today is that despite adequate food production and storage capacity currently available is approximately
unimaginable advances in technology, one in three 30 million tonnes. Investment in creating adequate
Reading Comprehension
persons worldwide is not getting enough of the right cold storage capacity alone will stem food loss
food to eat and approximately 800 million of seven substantially. With increasing wealth, India is,
billion sleep hungry every night. ironically, home to both food waste and food loss.
Not surprisingly, this makes poor diet the No. In either scenario, food that is produced
1 risk factor by far, for the global burden of disease. (using depleting and critical resources such as water)
Poor diets globally are more responsible for ill health but not consumed is a colossal waste which we
as compared with the combined effect of drugs, cannot afford to ignore. Food loss is also nutrition
tobacco and alcohol. Women and children continue loss, productivity loss and therefore GDP loss. The
to be the most vulnerable, with 156 million stunted 40% food loss in India translates to approximately
children in the world and 40% women anaemic. $7.5 billion, and for a country where agriculture
Add to this the fact that the world adds 200,000 new contributes 15% to GDP and employs 53% of the
people to its population every day, of which India workforce, this is clearly unaffordable.
adds 58,000. This translates to the need to feed two These are serious statistics, and unless there
billion more people by 2050 and to support a higher is an effort to address food loss factors systemically,
demand for major crops, estimated to increase by the state of health and nutrition of our people will
50%, from 2.5 to 3.5 billion tonnes. continue to be inadequate, as food loss means loss of
Staying on target It is therefore with macronutrients such as calories, fats, proteins; but
compelling reason that Target 3 for the Sustainable even more alarming, it means loss of micronutrients
Development Goal (SDG) 12 is to “halve per capita because foods that are rich in micronutrients are
global food waste at the retail and consumer level, and also perishable — fruits, vegetables, poultry, fish,
reduce food losses along production and supply chains dairy, etc. Additionally, with urbanisation and rising
incomes, the length of the food value chain also
3.20
Professor Academy
increases, as what people eat becomes less and less Dignified quality of life - To provide
connected to where they live. even a baseline and dignified quality of life to its
The Global Nutrition Report 2016 has people, India has to address enhancing agricultural
highlighted India’s overall tardy progress in productivity, crop diversification and eliminating
addressing chronic undernutrition, manifest in food loss and waste with a firm resolve, backed with
stunting (low weight for age), wasting (low weight the right and timely action. The last must be done
for height) and micronutrient deficiency or “hidden on priority as it deals with food already available. So
hunger”. the key question is, how do we minimise food loss
given that the government wants this, businesses
With 17% of the world’s population, want this, and people want this?
India remains home to a quarter of the world’s
undernourished people, a third of the world’s There is clearly a structural and behavioural
underweight children and a quarter of the world’s component to this, and the door is open for
hungry. This demographic cannot possibly result in investment in food system infrastructure: storage,
a productive and efficient workforce, or be converted transportation, processing, etc; investment in
into any meaningful economic dividend. The World information systems that help identify loss by crop
Happiness Report 2017, which looks at quality of and region so solutions can be specifically tailored
people’s life beyond GDP and per capita income to the problem; use of technology to better connect
and includes economic variables, social factors and supply and demand; public-private partnerships
health indicators, has ranked India at 122 of 155 with companies to reduce spoilage and loss; creation
countries. India’s decline in 2014-16, compared with of food banking networks that work with civil
2005-07, is on account of poor and slow progress on society and development agencies on getting food
social factors and health indicators. already available to those that need it. Among the
several priorities we have, minimising food loss has
Agriculture has to be one of the drivers of the potential to be transformative in multiple ways.
India’s growth, and even though we are the world’s
third largest producer of food, our agriculture Questions
growth has fallen well below the targeted 4% over 16. Target 3 for the Sustainable Development Goal
Reading Comprehension
the last 15 years. According to the International (SDG) 12 is about
Food Policy Research Institute, India needs to at a) Food wastage b) Education
least double its investment in agricultural research c) Poverty d) Terrorism
to double farmers’ incomes by 2022. This will not 17. Consider the following statements regarding
happen only with a focus on rice and wheat — more the recently held Food Congress:
diversity is needed, with the addition of vegetables, 1. It was held in Mumbai
fruits and dairy farming. 2. It is an Indian Initiative to the world)
Harnessing technology to increase Which of the statements given above is/are
agricultural productivity, where we lag both our correct?
potential and competitive benchmarks will be critical a) Both are correct b) 2 only
to our overall well-being. As an example, since the c) Neither 1 nor 2 d) 1 only
1960s India’s groundwater irrigation has increased 18. According to the passage, what is the reason
dramatically, and since the 1980s groundwater behind the ‘food loss’ problem in emerging
levels have been dropping, thus stressing the system. economies?
Groundwater recharge therefore becomes a critical a) Supply chain problems
variable to augment agricultural productivity. b) Storage problems
Further, imports of agricultural commodities have c) Poor infrastructure
increased from 4% of GDP in 2008-09 to 5.5% of d) All of the above
GDP in 2013-14, according to the Economic Survey.
Edible oil imports alone in the last year cost us Rs. 19. Which of the following statements given below
65,000 crore ($10 billion). This need not be the case is/are correct in context of food loss and agri-
in future. culture sector in India?
3.21
Professor Academy
1. The 40% food loss in India translates to through creativity and collaboration. Students
approximately $7.5 billion should be provided with opportunities to think
2. Agriculture contribution in India’s GDP is from themselves and articulate their thoughts.
15% Dewey called for education to be grounded in real
Select the correct answer using the code given below. experience. He wrote, “If you have doubts about
a) 1 only b) Both are correct how learning happens, engage in sustained inquiry:
c) 2 only d) Neither 1 nor 2 study, ponder, consider alternative possibilities and
arrive at your belief grounded in evidence.”
20. What is ‘Hidden Hunger’?
a) Micronutrient deficiency Piaget rejected the idea that learning was the
b) Chronic Undernutrition passive assimilation of given knowledge. Instead, he
c) Stunting proposed that learning is a dynamic process comprising
d) Wasting successive stages of adaption to reality during which
learners actively construct knowledge by creating and
4.5 Directions (21-25) Read the passage and testing their own theories of the world.
answer the questions that follow:
Influenced by Vygotsky, Bruner emphasizes
The default epistemology in education is the role of the teacher, language and instruction.
an empirical/reductionist approach to teaching He thought that different processes were used by
and learning. The shared epistemological basis learners in problem solving, that these vary from
for these two perspectives, on the other hand, is person to person and that social interaction lay at
interpretativism, where knowledge is believed to the root of good learning.
be acquired through involvement with content
instead of imitation or repetition there is no Bruner builds on the Socratic tradition of
absolute knowledge, just our interpretation of it. learning through dialogue, encouraging the learner
The acquisition of knowledge therefore requires to come to enlighten themselves through reflection.
the individual to consider the information and - Careful curriculum design is essential so that one
based on their past experiences, personal views, and area builds upon the other. Learning must therefore
cultural background - construct an interpretation of be a process of discovery where learners build their
Reading Comprehension
the information that is being presented to them. own knowledge, with the active dialogue of teachers,
building on their existing knowledge.
Students ‘construct’ their own meaning by
building on their previous knowledge and experience. By the 1980s the research of Dewey and
New ideas and experiences are matched against Vygotsky had blended with Piaget’s work in
existing knowledge, and the learner constructs new developmental psychology into the broad approach
or adapted rules to make sense of the world. In such of constructivism. The basic tenet of constructivism
an environment the teacher cannot be in charge is that students learn by doing rather than observing.
of the students’ learning, since everyone’s view of Students bring prior knowledge into a learning
reality will be so different and students will come to situation in which they must critique and re-evaluate
learning already possessing their own constructs of their understanding of it.
the world. Questions
Teaching styles based on this approach 21. When the knowledge is believed to be acquired
therefore mark a conscious effort to move from these through involvement is
‘traditional, objectivist models didactic, memory- a) Emprical b) Deduction
oriented transmission models’ to a more student- c) Interpretativism d) Epistemology
centered approach. 22. John Dewey emphasis on _________ ap-
John Dewey rejected the notion that schools proach on education
should focus on repetitive, rote memorization & a) Pragmatism b) rote – learning
proposed a method of “directed living” – students c) Focused Learning d) None
would engage in real-world, practical workshops 23. John Piaget proposed theory of cognitive devel-
in which they would demonstrate their knowledge
3.22
Professor Academy
opment, which comprises, stages of Adaption to difficulty in penalizing all those who converted
a) construct b) Reality unaccounted money into legal tender, demonetization
c) Theory d) Knowledge worked as an unintended amnesty scheme. Despite
24. The teaching style based on epistemological the significant cost to the economy, demonetization,
Approach, move from memory – oriented to the disappointment of the Prime Minister’s critics,
transmission models to ________ had no political fallout. Narendra Modi succeeded
a) Teacher – centered approach in portraying the move as one that would knock out
b) Student – centered approach the corrupt rich a harsh but necessary shock therapy.
c) Objectivist model approach This was perhaps why the massive disruption caused
d) Traditional approach by the overnight removal of 86% of the currency in
value terms did not cause agitations.
25. The Basic Tenet of constructivism is
a) Students learn by doing rather than observing Nevertheless, the RBI report, which points
b) Students bring prior knowledge into learning to a spurt in counterfeiting of the new Rs.500 and
situation Rs.2, 000 notes, raises the old question all over again.
c) Both (a) and (b) Was it worth the slowdown in growth, the damage
d) None to informal sector supply chains, and job losses in
sectors such as construction that were the bulwark of
Answer 4.1- 4.5 employment creation for the unskilled? True, there
1 2 3 4 5 have been some benefits. For instance, the number
c c d c b of income tax returns filed has surged a little over
6 7 8 9 10 the trend growth rate. But surely this could have
d d b c c been achieved by other policy measures. Cashless
11 12 13 14 15 modes of payment have become more common, but
d b c b d financial savings in the form of currency have also
risen, suggesting that people still value cash. Not
16 17 18 19 20
all policy choices work out and accepting mistakes
a c d b a
or planning flaws helps strengthen governance
Reading Comprehension
21 22 23 24 25
processes. For example, learning from the UPA’s
c a b b c
mistakes, a cleaner auction process for natural
Level 5 resources has been worked out. The government
must not disown its biggest reform attempt or try
5.1 Directions: (1 – 5) Read the passage and answer to sidestep parliamentary scrutiny of the outcomes
the questions that follow: of demonetization. Instead, it could focus on fixing
The Reserve Bank of India’s annual report the problems that people still face transactions with
for 2017-18 reveals that 99.3% of currency notes that Rs.2,000 notes in the absence of Rs.1,000 notes
were demonetized at midnight on November 8, 2016 are difficult as it is a departure from the currency
have returned to the banking system. This is only denomination principle (every note should be twice
marginally higher than its provisional estimate last or two and a half times its preceding denomination).
year that over 99% or Rs.15.28 lakh crore worth of the Even as these issues are sorted out, the larger lesson
old Rs.500 and Rs.1,000 notes out of the Rs.15.44 lakh must be heeded: sudden shocks to the economy
crore that were in circulation at the time had been don’t always yield intended policy objectives.
deposited by June 30, 2017. This makes a couple of Questions
things crystal clear. First, the hope that a large chunk
of unaccounted money would not return to the system 1. Which among the following sums up the opinion
arguably, the principal reason for the exercise was of the author regarding the demonetization drive
almost wholly belied. As a result, the plan to transfer announced by the government?
the arising surplus from the RBI to the Centre, which a) The author is very much hopeful that the
was not formally declared but strongly rumored, demonetization drive will be able to divide
was a non-starter. Second given the sheer logistical the wealth among all the sections equally.
3.23
Professor Academy
b) The author has no opinion to give regarding II. The cashless mode of transactions has become
demonetization since he was not staying in more popular post demonetization since now
India at that point of time. people are resorting to cashless modes of
c) The author is a blue eyed boy of the Prime transactions
Minister and that is why he will always praise III. The RBI has become more proactive these
all the moves by the government. days in order to prevent money laundering
d) The author feels that the move to demonetize activities in the country
currencies did not yield the desired results a) Both II and III b) Both I and II
though some positive sides can be appreciated) c) Both I and III d) Only III
2. Which among the following should be the 5. Which among the following is / are correct
course of action of the government now that the regarding the RBI Annual Report for the year
demonetization has failed? 2017-18 as described in the passage?
a) The government should understand that there a) More than 99% of the currency has come back
can be error in judgment on its part and it can into the system after demonetization and it is
be corrected by first accepting it. in line with the provisional estimate regarding
b) The government should cancel the whole this last year.
demonetization drive and give back the b) The instances of fake currencies with respect
currency notes to the general public) to the new Rs.500 and Rs.2000 notes are
c) The central government should approach the surfacing now.
Supreme Court to ensure that there is no legal c) The government has not become able to
issue in the future. contain the excitement of the law and order
d) The Government of India is of the opinion implementing agencies regarding arresting
that it has done the right thing but the public the offenders.
could not understand the importance of it. d) Both A and B
3. Which among the following can be considered 5.2 Directions: (6–10) Read the passage and
as the takeaway from the incident described in answer the questions that follow:
Reading Comprehension
the given passage? The great fear in Asia a short while ago was
a) The economy of the country is not suffering at that the region would suffer through the wealth
all and therefore anything can be done now to destruction already taking place in the U.S. as a result
test the waters. of the financial crisis. Stock markets tumbled as
b) The economy of India is ready to accept any exports plunged and economic growth deteriorated.
change since it is now mature enough to Lofty property prices in China and elsewhere looked
withstand any kind of problem. set to bust as credit tightened and buyers evaporated.
c) The Indian government is not receptive of But with surprising speed, fear in Asia swung back
any international shocks since there is no to greed as the reign shows signs of recovery and
mechanism in India to accept the foreign property and stock prices are soaring in many parts
risks. of Asia.
d) The economy has its own rhythm and it
should not be taken for granted that any kind Why should this sharp Asian turn around
of sudden policy decision will be positive for be greeted with skepticism? Higher asset prices
the economy. mean households feel wealthier and better able to
spend, which could further fuel the region’s nascent
4. Whichc among the following is correct rebound. But just as easily, Asia could soon find
regarding the positive effects of demonetization itself saddled with overheated markets similar to
as discussed in the passage? the U.S. housing market. In short, the world has not
I. The number of income tax returns filed post changed, it has just moved placed.
demonetization has increased since now a
lot of people are going to filing of income tax The incipient bubble is being created by
returns government policy. In response to the global credit
3.24
Professor Academy
crunch of 2008, Policy makers in Asia slashed interest 7. Which of the following can be said about the
rates and flooded financial sectors with cash in frantic Chinese government’s efforts to revive the
attempts to keep loans flowing and economies growing. economy?
These steps were logical for central bankers striving a) These were largely unsuccessful as only the
to reverse a deepening economic crisis but there is housing market improved
evidence that there is too much easy money around. b) The government’s only concern was to boost
It’s winding up in stocks and real estate, pushing prices investor confidence in stocks
up too far and too fast for the unending economic c) These efforts were ineffectual as the economy
fundamentals. Much of the concern is focused on China recovered owing to the US market stabilizing
where government stimulus efforts have been large d) These were appropriate and accomplished the
and effective, Money in China has been especially easy goal of economic revival
to find. Aggregate new bank lending surged 201% in 8. What do the statistics about loans given by
first half of 2009 from the same period a year earlier, to Chinese banks in 2009 indicate?
nearly 51.1 turn on, Exuberance over a quick recovery a) There was hardly any demand for loans in 2008
which was given a boost by China’s surprisingly strong b) The Chinese government has borrowed funds
7.9% GDP growth in the second quarter has buoyed from the US
investor sentiment not just for stocks but also for real c) China will take longer than the US to recover
estate. from the economic crisis
Former U.S. Federal Reserve Chairman d) None of these
Alan Greenspan argued that bubbles could only be 9. What is the author’s main objective in writing
recognized in hand sight. But investors who have the passage?
been well schooled in the dangers of bubbles over a) Illustrating that Asian economies are
the past decade are increasingly wary that prices have financially more sound than those of
risen too far and that the slightest bit of negative, developed countries
economic news could knock markets for a loop. b) Disputing financial theories about how
These fears are compounded by the possibility that recessions can be predicted and avoided
Asia’s central bankers will begin taking stops to shut
Reading Comprehension
c) Warning Asian countries about the dangers of
off the money. Rumors that Beijing was on the verge favoring fast growth and profits over sound
of tightening credit led to Shanghai stocks plunging economic-principles
5%. Yet many economists believe that, there is close d) Extoling China’s incredible growth and urging
to a zero possibility that the Chinese government will other countries to emulate it
do anything this year that constitutes tightening. And
without a major shift in thinking, the easy-money 10. Why does the author doubt the current
conditions will stay in place. In a global economy that resurgence of Asian economics?
has produced more dramatic ups and downs than a) Their economies are too heavily reliant on the
anyone thought possible over the past two years. Asia American economy which is yet to recover
may be heading for another disheartening plunge. b) Central banks have slashed interest rates too
abruptly which is likely to cause stock markets
Questions to crash
6. What does the author want to convey through c) With their prevailing economic conditions
the phrase “The world has not changed it has just they are at risk for a financial crisis
moved places”? d) Their GDP has not grown significantly during
a) At present countries are more dependent on the last financial year
Asian economies than on the US economy 5.3 Directions: (11–15)Read the passage and
b) Economies have become interlinked on answer the questions that follow:
account of globalization
c) Asian governments are implementing the same The wakeup call that China represents to
economic reforms as developed countries India is not limited to its showpiece urban centre
d) None of these or that New Delhi hopes India will experience the
3.25
Professor Academy
benefits that the Olympic Games have brought to over the past few years data reveals that despite
Beijing. More pertinent is the comparison of the India having the largest number of agricultural
agricultural sectors of the two countries. Why scientists in the World India’s current research
and how has China managed to outstrip India in track record is abysmal, equivalent to what China
agriculture when 25 years ago the two countries achieved in the 1908s. Far from developing new
were on par on most parameters? Both have strains, the number of field crop varieties fell by
traditionally been agrarian economies and over 50% between 1997 and 2001 despite the fact that
half their populations continue to depend on the there was sharp and sustained increase in funding.
land for their livelihood. With large populations One reason is that majority of the budget is eaten
and histories of famine, India and China share up by staff salaries with only 3% being allotted for
concern on issues such as food security, however, research. In contrast, most agricultural research
while India’s agricultural sector is projected to grow centre in China must use Central Government
by about 2.5% this year – a slide from the previous funding purely for research. Funds relating to
year’s growth. China’s has been steadily growing salaries and other administrative incidentals must
at between 4% and 5% over the last fifteen years. be generated by the centre themselves. Scientists
The widest divergence between India and China are thus, encouraged to engage in joint ventures
is in the profitable horticultural sector with the with private sector companies to form commercial
production of fruits and vegetables in China leaping signoffs from their research. In fact research
from 60 million tones in 1980 compared to India’s staff is now being hired on a contract basis with
55 million tones at the same time, to 450 million pay based on performance and salaries raised
tones in 2003 ahead of India’s corresponding 135 proportionately for those who perform well. India
million tones. China’s added advantage lies in the needs to learn from China’s example and adopt a
more diversified composition of its agricultural pragmatic approach if it has to meet its targets of
sector with animal husbandry and fisheries which the eleventh five year plan.
account for close to 45% of growth compared to Questions
30% for India.
11. What has been the major area of difference in
According to the latest report by Economic
Reading Comprehension
Reading Comprehension
answer the questions that follow: removal of labour regulations, reforms in lagging
states, and HIV /AIDS. For 2015, India ranked
The economic development in India
142nd in Ease of Doing Business Index, which is
followed socialist- inspired policies for most of its
setback as compared with China 90th, Russia 62nd
independent history, including state-ownership of
and Brazil 120th. According to index of Economic
many sectors; India’s per capita income increased at
Freedom World Ranking an annual survey on
only around 1% annualized rate in the three decades
economic freedom of the nations, India ranks
after its independence. Since themed 1980s, India
123rd as compared with China and Russia which
has slowly opened up its markets through economic
ranks 138th and 144th respectively in 2012.
liberalization. After more fundamental reforms
since 1991 and their renewal in the 2000s, India has Questions
progressed towards a free market economy. In the 16. According to the passage, the economic growth
late 2000s, India’s growth reached 7.5%, which will has been driven by the expansion of which of
double the average income in a decade. Analysts which genre of services?
say that if India pushed more fundamental market a) The services growing slower than other sectors
reforms, it could sustain the rate and even reach available in the world
the government’s 2011 target of 10%. States have b) The services growing more easily than other
large responsibilities over their economies. The sectors available in the world
annualized 1999- 2008 growth rates for Tamil c) The services growing erratically faster than all
Nadu (9.9), Gujarat (9.6%), Haryana (9.1 %), and other sectors available in India
Delhi (8.9%) were significantly higher than for d) The services growing consistently faster than
Bihar (5.1 0/0), Uttar Pradesh (4.4%), and Madhya other sectors available in the world
3.27
Professor Academy
17. Which of the following statements is true National Bank, Bank of Baroda and Bank of India –
according to the passage? have already begun on exercise to identify takeover
a) More than one hundred and fifty countries are targets to gain access to franchises that would
doing better than India on PPP basis. augment their capabilities, said three top bankers
b) India is doing better than 140 countries on familiar with the move. The top managements of the
per capita basis. four banks are in the process of preparing a blueprint
c) India ranked 1 17th on the basis of economic that would explain the rationale for absorbing one
growth which is a setback. or two entities, said the people cited above, none of
d) India ranked 142nd in 2015 in Ease of Doing whom wanted to be named. Employees at these state
Business Index. run banks are engaged in the exercise after Finance
18. What was the opinion of the World Bank Minister Arun Jaitley gave the lenders the go-ahead
particularly on public sector reforms according, to decide how they would strategize to remain
to the passage? relevant in the emerging economic scenario.
i. Infrastructures development “We are hearing from the corridors of
ii. Health reforms finance ministry that there is seriousness on
iii. Removal of labour regulations consolidation of banks,” said an executive from one
iv. Agricultural development of the top four banks. “The sense we are getting is
a) Only i and ii b) only i, iii and iv that first there could be merger of at least one SBI
c) only ii and iv d) None of these associate bank with SBI to kick off the consolidation
19. “Economic liberalization” have been beneficial process.” Although no names of likely acquisition
for Indian according to the passage, which of targets are being discussed at these four banks, the
the following statements support the given key conditions for a smaller bank will be regional,
statement? technological and cultural advantages. For instance,
a) India bit by bit kicks off its markets through a bank such as Bank of Baroda, which does not have
economic liberalization. a presence in the East, may prefer one from that
b) India opened new markets all over world part of the country. State run banks have weakened
over the years as governments have treated them
Reading Comprehension
Reading Comprehension
non-state institutions. For instance, net profit per market?
employee at the new private sector banks was about a) They need to float public shares
four times that of the SBI Group in the year ended b) They need a strategy to earn more profit
RC March 2013. c) They should increase lending rate to attract
depositors
Questions d) They should announce handsome returns to
21. Which of the following is not true in the context depositors
of the passage? Answers 5.1 - 5.5
a) Four big state run banks have begun to identify
takeover targets. 1 2 3 4 5
b) The finance minister has given free hand to d a d b d
state run banks to make their own strategy for 6 7 8 9 10
banking business. d d d c c
c) The four big state run banks have already 11 12 13 14 15
decided the names of some small banks likely c d c d b
to be taken over 16 17 18 19 20
d) According to PJ Nayak Committee report, the d d b d d
state run banks were not performing well. 21 22 23 24 25
22. Why have banks turned capital starved? Answer c d d a b
in the context of the passage?
a) Because of excessive loans sanctioned to
malafide customers
3.29
Professor Academy
2. How are the idealistic concepts related to the
Previous NET Question (Sept-Nov 2020) routine practices in education?
a) They intertwine theory and practice
I. Read the given passage careful y and answer the
b) They make classroom teaching innovative
questions that follow;
c) They make the business of education highly
The ceremonial use of slogans and catch-
profitable
words in educational discussions raises the suspi-
d) They lead to the identification of gap between
cion of a tenuous linkage between thought and ac-
theory and practice
tion. As stock phrases multiply and the talk begins
3. The use of stock phrases in educational discus-
to take on an idealistic ring, the wary listener might
sions has tended to reveal
well begin to wonder whether the lip service paid to
a) The linkage between thought and action
these concepts is connected with what actually goes
b) The difference between saying and doing in
on in classrooms. It is difficult in this day and age
classroom contexts
to be opposed to democracy, creativity, and innova-
c) The ceremonial importance of slogans
tion in education but how are these attractive words
d) The idealistic ring of talks
related to the more mundane business of teaching
practice? The answer, of course, is that the two are 4. Why do young teachers appreciate the unrealistic
often not related - a fact that accounts for one of quality of expectations?
the most frequently recurring complaints among a) Because of the cynical attitude among teachers
today’s educators; the all-too-obvious gap between b) Because of the testimonial given by fellow
theory (i.e.. educational talk on the one hand and teachers
practice on the other. c) Because of their professional training
d) Because of their own experience in teaching
The dissonance between what teachers say,
or at least what their leaders say, and what they 5. What is the sequel of lack of congruence between
do takes many forms and has several important saying and doing as evident in teacher behavior?
consequences. For some, it lays the groundwork a) Opposition to revolutionary practices
for the development of a cynical outlook towards b) Lays ground for frequent complaints
Reading Comprehension
the admonitions of idealists and the advocates of c) Emergence of disillusionment among teachers
new and supposedly revolutionary practices. This d) Support to the admonition of idealists
cynicism, which grows out of a prior sense of dis-
Answers
illusionment strikes many young teachers as they
begin to appreciate the unrealistic quality of several 1 2 3 4 5
of the expectations aroused during the period of b d b a c
their professional training. Teaching as actually
II. Read the passage carefully and answer questions
experienced and as described in textbooks and col-
that follow
lege courses often turns out to be to quite different
states of affairs. The result is that college instructors Marketers are reexamining their relation-
of education and other outsiders begin to be looked ships with social values and responsibilities and
upon with suspicion by many practitioners. Even with the very Earth that sustains us. As the world-
the testimony of fellow teachers may be viewed wide consumerism and environmentalism move-
suspiciously when it conflicts with the listeners own ment mature, today’s marketers are being called on
experience in the classroom. to develop sustainable marketing practices. Corpo-
rate ethics and social responsibility have become
1. The passage analyses
hot topics for almost every business. And few com-
a) The linkage between language and discussions
panies can ignore the renewed and very demanding
b) The schism between theory and actual prac-
environmental movement. Every company action
tice of teaching
can affect customer relationships. Today’s custom-
c) The need to the use of high brow language in
ers expect companies to deliver value in a socially
educational discussions
and environmentally responsible way.
d) The importance of idealism in education
3.30
Professor Academy
The social-responsibility and environmen- Answers
tal movements will place even stricter demands on
1 2 3 4 5
companies in the future. Some companies resist
a b c c b
these movements, budging only when forced by
legislation or organized customer outcries. For- III. Read the passage carefully and answer ques-
ward-looking companies however, readily accept tions from 1 to 5.
their responsibilities to the world around them. The true role of our energy is to gain per-
They view sustainable marketing as an opportunity sonal power and operate from it at all times. Today,
to do well by doing good. They seek ways to profit in many situations. People loose their personal
by serving immediate reeds and the best long-run power in relationships between boss-subordinate,
merest of their customers and communities client-customer, colleague-colleague, teacher-stu-
Some companies.such as Patagonia. Ben & dent, husband-wife, parent-child, Friend-Friend etc.,
Jerry’s, Timberland, Method, and others.practice car- Often in these relationships someone plays the role
ing capitalism, setting themselves apart by being civic of the oppressor while the other plays the role of the
minded and responsible. They build social linkages. oppressed. But this is a great weakness in the rela-
tionship and it undermines people’s capacity to be
1. What do farsighted companies prefer?
their authentic sieves and accomplish what they want
a) Sustainable marketing
in their lives. We need personal power to hold our
b) Legislative compulsion
self esteem and go forward to succeed in our pur-
c) Organised consumer pressure
suits. Human relationships often deteriorate through
d) Status quo in the market
these power struggles and ultimately both, wheth-
2. Caring capitalism is inclusive of er they are playing the role of an oppressor or the
A. Make profit by ignoring social demands oppressed, lose their personal power. Personal power
B. Being civic-minded can be seen as the result of an interplay between
C. Forging social linkages masculine and feminine forms of power. Both these
D. Budge when there is a legislative nudge forms of power can co-exist in both men and wom-
Choose the correct answer from the options given en. Both feminine and the masculine forms of power
Reading Comprehension
below: need to be honoured and expressed for a beautiful
a) A and B only presence and creation in the world. We have to gain
b) B and C only a deeper understanding the characteristics of mascu-
c) C and D only line and feminine forms of power.
d) A and D only
1. Relationships of different types of power among
3. According to the passage, sustainable marketing people will lead to
is perceived as a) Social diversity
a) Immediately profitable b) Hierarchical structure
b) Community fallacy c) Balance of power in society
c) Doing good to community as an opportunity d) Subjugation of the weak and meek
d) Long-term burden to society as a difficult issue
2. The passage focuses on the idea of
4. The concern for today’s society centres on a) Importance of power struggle
a) Marketing strategies b) Different forms and structures of power
b) Customer relations c) The need for power division in the society
c) Corporate ethics d) Harnessing personal power in the interest of
d) Delivery of value for money co-existence
5. The present-day marketers have focused on 3. Interplay of forms of power is
a) Consumerism a) The essence of success in our pursuits
b) Social obligations b) Distinctly gender-based
c) Sustaining their business practices c) Nothing but assertion of power
d) Competitive business d) Needed for the creation of world
3.31
Professor Academy
4. Loss of personal power in the society is attributed to connection with this ‘presence’. When we remem-
a) Rigid human relations ber and sincerely seek to connect, sooner or later,
b) Aggressiveness of the oppressors the ‘Presence’ makes itself felt.
c) Weakness of the oppressed 1. How can we realize the Divine Presence?
d) Power struggle in society a) By searching for the divine
5. The power relations in a society tend to b) By recognising its presence within us
a) Hurt self accomplishments by people c) By reaching the innermost space
b) Improve the people’s abilities d) By making sincere efforts within one’s own
c) Increase self-esteem self
d) Have more oppressors than the oppressed 2. What is needed for the mind to be active?
Answers a) Life energy
1 2 3 4 5 b) Nourishment for body
b d b d a c) More knowledge
IV. Read the passage carefully and answer questions d) Constant replenishment of energy
from 1 to 5. 3. The Divine Presence in each individual can be
Our life exists by constant interchange and replen- found through
ishment. Every day, food is needed for the body a) One’s own realization of divinity
to survive. For our vital energies to thrive every b) The whirls of our mind
day, vital nourishment is needed. For our minds to
c) The surface self
be sharp and intelligent every day, an increase in
knowledge is needed. But a human does not live d) Knowing the nature of agitated Mind
by nourishment of the mind, life energy and body 4. The passage focusses on the
alone, but also by the a) Need for body replenishment
nourishment that comes by the connection with b) Intellectual thoughts
our Divine source. This deeper nourishment is c) Importance of connect with the Divine
Reading Comprehension
3.32
4 INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT)
Why does NET exam demand Aspirants ²¿µ Ⱥö½¶ÄÄ Äº¸¿²½Äʰʁ ´À¾ÁÆÅ¶ÃÄ ²Ä ȶ½½ ²Ä ¿¶´¶ÄIJÃÊ
to learn Information and Communication ¶¿Å¶ÃÁúĶ ÄÀ·ÅȲöʁ ¾ºµµ½¶È²Ã¶ʁ ÄÅÀò¸¶ʁ ²¿µ ²ÆµºÀʉ
Technology? ÇºÄÆ²½ ÄÊÄŶ¾Ä ȹº´¹ ¶¿²³½¶ ÅÀ ²´´¶ÄÄ ÄÅÀöʁ Åò¿Ä¾ºÅ
²¿µ ¾²¿ºÁƽ²Å¶ º¿·Àþ²ÅºÀ¿ʇ ¶²Ã ²ÄÁºÃ²¿ÅÄ ¸²º¿º¿¸
ºÄ ² Ä´º¶¿Åºȱ´ʁ Ŷ´¹¿À½À¸º´²½ ²¿µ ¶¿¸º¿¶¶Ãº¿¸
µ¶ÁŹ ¼¿ÀȽ¶µ¸¶ ²³ÀÆÅ ³²Äº´Ä À· ´À¾ÁÆÅ¶Ã ²Ä ȶ½½ ²Ä
µºÄ´ºÁ½º¿¶²¿µ¾²¿²¸¶¾¶¿ÅŶ´¹¿ºÂƶÆÄ¶µº¿¹²¿µ½º¿¸
Æ¿µ¶ÃÄŲ¿µº¿¸ ²½½ ʶ Ŷþº¿À½À¸Ê ö½²Å¶µ ÅÀ ´ÆÃö¿Å
º¿·Àþ²ÅºÀ¿ʁºÅIJÁÁ½º´²ÅºÀ¿²¿µ²ÄÄÀ´º²ÅºÀ¿ÈºÅ¹ÄÀ´º²½
Ŷ´¹¿À½À¸Ê ²¿µ ºÅÄ ÄÁ¶´ºȱ´²ÅºÀ¿Ä ºÄ ǶÃÊ º¾ÁÀÃŲ¿Å ÅÀ
¶´À¿À¾º´ ²¿µ ´Æ½ÅÆÃ²½ ¾²ÅŶÃÄʇ ȹº´¹ ºÄ ¿ÀÈ
Ä´Àö¾Àö¾²Ã¼Äº¿Å¹ºÄÄÆ³»¶´Åʇ
³ÃÀ²µ½Ê ÆÄ¶µ º¿ ¶µÆ´²ÅºÀ¿²½ ÈÀýµʁ Ŷ²´¹¶ÃʤÄÅÆµ¶¿ÅÄ
²¿µÃ¶Ä¶²Ã´¹Ä´¹À½²ÃÄÁÀÁƽ²Ã½ÊÆÄ¶ ʇǶÃʲÄÁ¶´ÅÄ Blueprint of Information and
À·½º·¶²Ã¶Ã¶½²Å¶µÅÀÄ´º¶¿´¶²¿µ¶´¹¿À½À¸Êʇ Ƹ¶ȷÀÈ Communication Technology (ICT)
À· º¿·Àþ²ÅºÀ¿ ºÄ ¶¾¶Ã¸º¿¸ º¿ ²½½ ȱ¶½µÄ ŹÃÀƸ¹ÀÆÅ ¿ ŹºÄ Æ¿ºÅ ȶ ¹²Ç¶ ´À¾Áº½¶µ ²½½ ʶ º¾ÁÀÃŲ¿Å
ʶ ÈÀýµʇ ¶²´¹¶ÃÄ ²Ã¶ ʶ ´Àö À· ²¿Ê ½ºÇº¿¸ ÄÀ´º¶ÅÊʇ Å¶Ã¾Ä ·ÃÀ¾ ʉ ʲŠ²Ã¶ ö½¶Ç²¿Å ·Àà ʁ ²´ÃÀ¿Ê¾Ä
¶´¹¿À½À¸º¶Ä Á½²Ê ² ǺŲ½ ÃÀ½¶ º¿ Ŷ²´¹º¿¸ ²¿µ ½¶²Ã¿º¿¸ ²³³Ã¶Çº²ÅºÀ¿Äʁ ¿Å¶Ã¿¶Å ¿¶ÅÈÀüʉ³²Ä¶µ Ŷþº¿À½À¸º¶Äʁ
ÁÃÀ´¶ÄÄʇ¹ºÄÆ¿ºÅÀ·³ÀÀ¼ºÄ²´À¾Á½¶Å¶Á²´¼²¸¶À·³²Äº´Ä ½ºÄÅ À· ¶¾²º½ ²´ÃÀ¿Ê¾Ä ¶Å´ʁ¿ ²¿²½Ê˺¿¸ ÂÆ¶ÄźÀ¿Ä À·
À· ʲÅÈÀƽµ¹¶½ÁÅÀ¸²º¿¼¿ÀȽ¶µ¸¶²³ÀÆÅ²½¾ÀÄŠö´¶¿Å¶É²¾Ä²¿µ²½ÄÀ·ÃÀ¾ÁöǺÀÆÄ¶É²¾Äʁʶ¾ÀµÆ½¶
²½½Å¶Ã¾º¿À½À¸ÊÀ· ʇ ȺĶ ³ÀÀ¼ ³²´¼ ÂÆ¶ÄźÀ¿Ä ²Ã¶ µºÄ´ÆÄ͵ʇ ¹¶ ´À¾Á½¶Å¶
Syllabus ´À¿Å¶¿Å ¹²Ä ³¶¶¿ µºÇºµ¶µ º¿ÅÀ ĶǶò½ ¾ÀµÆ½¶Ä º¿
²´´Àõ²¿´¶ ȺŹ Ź¶ Äʽ½²³ÆÄ ²¿µ ʶ ¾ÀµÆ½¶Ä ²Ã¶ ²Ä
• ʃ ¶¿¶Ã²½²³³Ã¶Çº²ÅºÀ¿Ä²¿µÅ¶Ã¾º¿À½À¸Êʇ
·À½½ÀȺ¿¸ʃ
• ²Äº´ÄÀ· ¿Å¶Ã¿¶Åʁ ¿Åò¿¶Åʁʉ¾²º½ʁƵºÀ²¿µºµ¶Àʉ
➢ À¾ÁÆÅ¶Ã²¿µºÅÄÅÊÁ¶Ä
´À¿·¶Ã¶¿´º¿¸ʇ
➢ À¾ÁÀ¿¶¿ÅÄÀ·À¾ÁÆÅ¶Ã
• º¸ºÅ²½º¿ºÅº²ÅºÇ¶Äº¿¹º¸¹¶Ã¶µÆ´²ÅºÀ¿ʇ ➢ À¾ÁÆÅ¶Ã¶¾ÀÃÊ
➢ À·ÅȲö
• ²¿µ ÀǶÿ²¿´¶ʇ
➢ ²Å²²¿µ ¿·Àþ²ÅºÀ¿
Trend Analysis ➢ ƾ³¶ÃÊÄŶ¾
¹¶Ã¶ ºÄ ² ¿Àź´¶²³½¶ Ĺº·Å ·ÃÀ¾ µºÃ¶´Å ÂÆ¶ÄźÀ¿Ä ➢ ¿Å¶Ã¿¶Å
ºʇ¶ʇʁ ·²´ÅƲ½ ÂÆ¶ÄźÀ¿Ä ÅÀ ²ÁÁ½º´²ÅºÀ¿ ÂÆ¶ÄźÀ¿Äʇ ¹¶ ➢ ¾²º½
²ÁÁ½º´²ÅºÀ¿ʉÀú¶¿Å¶µ ÂÆ¶ÄźÀ¿Ä ²Ã¶ ʲŠȹº´¹ ¾¶²¿Ä ➢ ƵºÀ º½¶ Àþ²ÅÄʁƵºÀºµ¶ÀÀ¿·¶Ã¶¿´º¿¸
²ÄĶÃźÀ¿ ²¿µ ö²ÄÀ¿º¿¸ ÂÆ¶ÄźÀ¿Äʁ ÄŲŶ¾¶¿Åʉ³²Ä¶µ ➢ ʉ ÀǶÿ²¿´¶ʁʉÀ¾¾¶Ã´¶
ÂÆ¶ÄźÀ¿Ä Ź²Å Ã¶ÂÆºÃ¶ ´²¿µºµ²Å¶Ä ÅÀ ÈÀü À¿ ¶²´¹ ➢ ³³Ã¶Çº²ÅºÀ¿Ä²¿µ¶Ã¾º¿À½À¸Ê
ÄŲŶ¾¶¿ÅÅÀȱ¿µÈ¹¶Å¹¶ÃºÅºÄÅÃÆ¶ÀÿÀÅʇ¹ÀƸ¹Å¹¶ ·Å¶Ã ¶²´¹ ¾ÀµÆ½¶ ½¶Ç¶½ Ѓ ÂÆ¶ÄźÀ¿Ä ȹº´¹ ²Ã¶
ÂÆ¶ÄźÀ¿Ä Ͷ¾ ÅÀ ³¶ ·Àþƽ²Å¶µ ÀÆÅ À· ³²Äº´ ´À¿´¶ÁÅÄ ¾¶¾ÀÃÊʉ³²Ä¶µÂƶÄźÀ¿Ä²ÄĶÄĺ¿¸Ã¶´À½½¶´Åº¿¸²³º½ºÅÊÀ·
ÄÆ´¹ ²Ä ¾¶¾ÀÃÊʁ ÄÅÀò¸¶ʁ ¶Å´ʇʁ ʶ ÄÅÃÆ´ÅÆÃ¶ À· ʶ ʶ²ÄÁºÃ²¿ÅIJ¿µ½¶Ç¶½ЄÂƶÄźÀ¿Äȹº´¹²Ã¶²ÁÁ½º´²ÅºÀ¿ʉ
ÂÆ¶ÄźÀ¿µ¶¾²¿µÄÊÀÆÅÀÈÀüÀ¿Å¹¶ÂƶÄźÀ¿ÅÀÁº´¼ ³²Ä¶µÂƶÄźÀ¿Ä²ÄĶÄĺ¿¸Å¹¶´À¿´¶ÁÅÆ²½Æ¿µ¶ÃÄŲ¿µº¿¸
ÊÀÆÃ ²¿Äȶà ·ÃÀ¾ DzúÀÆÄ ´Àµ¶ʇ ¶¿´¶ʁ ʶ ²ÄÁºÃ²¿ÅÄ À· ʶ ²ÄÁºÃ²¿ÅÄ ¹²Ä ³¶¶¿ ¸ºÇ¶¿ ȺŹ Ź¶ ²¿Äȶà ¼¶Êʁ
²Ã¶ ¶ÉÁ¶´Å¶µ ÅÀ ¹²Ç¶ ´À¾Á½¶Å¶ ¼¿ÀȽ¶µ¸¶ ²³ÀÆÅ ²Ä ȹº´¹ ʶ ´²¿µºµ²Å¶ ´²¿ Áò´Åº´¶ ÅÀ ³¶¿´¹ ¾²Ã¼ ʶºÃ
²¿ ¶ÉŶ¿ÄºÀ¿²½ Ŷþ ·Àà º¿·Àþ²ÅºÀ¿ Ŷ´¹¿À½À¸Ê ʯ ʰ ÁöÁ²Ã²ÅºÀ¿ʇ
ʲŠÄÅöÄÄ¶Ä Å¹¶ ÃÀ½½ À· Æ¿ºȱ¶µ ´À¾¾Æ¿º´²ÅºÀ¿ ²¿µ
LET’S LEARN TECHNOLOGY!
ʶ º¿Å¶¸Ã²ÅºÀ¿ À· Ŷ½¶´À¾¾Æ¿º´²ÅºÀ¿Ä ʯŶ½¶Á¹À¿¶ ½º¿¶Ä
Professor Academy
Information and communication technology The definition of a digital computer is the most
is defined as the use of hardware and software for commonly used type of computer and is used
efficient management of information i.e. storage, to process information with quantities using
retrieval, processing, communication, diffusion digits, usually using the binary number system.
and sharing of information for social, economic The Central Processing Unit (CPU) contains an
and cultural improvement. In a broader sense, ICT arithmetic and logic unit for manipulating data, a
is consider as the whole set of enabled technology number of registers for storing data, and a control
concerned with study, communication, design, circuit for fetching and executing instructions. The
development, support or management of computer memory unit of a digital computer contains storage
based information system, particularly software for instructions and data. e.g. digital speedometers
application and computer hardware, networking, in mechanical industries.
data storage, transmission encompassing data, voice i. Micro Computers: Systems on the lower end of
and video. Now a days, the education is delivered at the size and size scale are microcomputers. They
doorsteps with the support of ICT aiming at inclusive may be tiny, special purpose devices dedicated
education. to carrying out a single task such as one inside a
camera.While most PCs are oriented towards single
users, mini systems are designed to handle the
COMPUTER
needs of multiple users. e.g. Personal Computers,
Computer is a fast operating, automatic electronic Laptops, Tablet PC, Note Pad, Smart Phones.
device which automatically accepts and store input
ii. Mainframe Computers: A mainframe is another
data, processes them and produces results under
form a computer system that is generally more
the direction of a detailed step by step program. It is
powerful than a typical mini; Mainframes
used making calculations or controlling operations
themselves may vary widely in cost and capability.
that are expressible in numerical or logical terms. In
They are used in large organizations for large
other words, a computer has the ability to
scale jobs. e.g. ATM machines.
i. Accept data supplied by the user
iii. Super computer: A supercomputer is a computer
ii. Input, store and execute instruction with great speed and memory. They are usually
iii. Perform mathematical and logical operation thousands of times faster than ordinary personal
computers made at that time. Supercomputers
iv. Give results in accordance with user’s can do arithmetic jobs very fast, so they are
requirement used for weather forecasting, code-breaking,
genetic analysis and other jobs that need many
Types/Classification of Computers calculations.
Computers are categorized on the basis of size,
Communication Technology
Home PC
“Today is your opportunity to build the tomorrow you want”
Professor Academy
Supercomputers have certain distinguishing Intended primarily to be used by one person at
features. Unlike conventional computers, they a time, they are commonly connected to a local
usually have more than one CPU (central area network and run multi-user operating
processing unit), which contains circuits for systems.
interpreting program instructions and executing
arithmetic and logic operations in proper b. Analog Computer
sequence. supercomputers have been used for
scientific and engineering applications that must An analog computer is a computer which is
handle very large databases or do a great amount used to process analog data. Analog computers
of computation (or both). e.g. weather forecasting, store data in a continuous form of physical
climate research, etc.,. quantities and perform calculations with the
help of measures. It is quite different from
Characteristics of a Supercomputer the digital computer, which makes use of
➢ Powerful funnel capacity-to run few programs as symbolic numbers to represent results. Analog
quickly as possible. computers are excellent for situations which
➢ Expensive-Hundreds of millions of dollars. require data to be measured directly without
converting into numerals or codes. Analog
➢ Built for specific applications-Animating
computers, although available and used in
graphics.
industrial and scientific applications like
➢ Made up of tens of thousands of computing nodes. control systems and aircraft, have been largely
➢ Most controlled by Linux software. replaced by digital computers due to the wide
➢ Water cooled. range of complexities involved.
e.g.speedometer, electrical voltage, pressure,
INTERESTING FACTS! temperature.
T
There are 8 Super Computers: Used
c. Hybrid Computer
by Indian Educational Institutes for their
Research under National Super Comput- Hybrid computers are well known for their ability
ing Mission of Government of India to blend analog and digital features of computers.
➢ Colour Boson (Cray XC-30) Advantages include the availability of both analog
➢ HPC and digital computations within a single unit and
➢ PARAM Ishan an efficient processing speed. A hybrid computer
➢ PARAM Kanchenjunga is individually designed and integrated, taking
➢ PARAM SHIVAY into consideration the field of its application and
➢ PARAM YUVA II processing requirements. A hybrid computer is
➢ Sahasrat (CRAY XC40) constructed in such a way that its components
➢ Virgo make the device fast and accurate. e.g. Hospital
(in ICU), Petrol Pumps.
4.3
Professor Academy
The first digital computer Sixth Generation Computing
The ENIAC (Electronic Numerical Integrator and In the Sixth Generation, computers could be
Calculator) was invented by J. Presper Eckert and defined as the era of intelligent computers, based
John Mauchly at the University of Pennsylvania and on Artificial Neural Networks. One of the most
began construction in 1943 and was not completed dramatic changes in the sixth generation will be
until 1946. It occupied about 1,800 square feet and the explosive growth of Wide Area Networking.
used about 18,000 vacuum tubes, weighing almost 50 Natural Language Processing (NLP) is a component
tons. ENIAC was the first digital computer because it of Artificial Intelligence (AI). It provides the ability
was fully functional. to develop the computer program to understand
human language.
Self Evaluation
LEVEL 1
Answer Key
1. Which of the following statements is / are True in
respect to ICT? [June-2019] 1 2 3 4 5
P: ICT is an acronym that stands for information and c b d d b
competitive technology
Q: The effective use of ICT to support learning in the
inclusive education exemplifies good teaching for all
learners LEVEL 2
a) P only b) Both P and Q
c) Q only d) Neither P nor Q 1. Consider the following technologies: [Nov-2020]
2. Match the following: [June-2019] (A) Microprocessor (B) Transistor
Set-I Set-II (C) Vacuum Tube (D) Artificial Intelligence
A. First Generation I) Transistor
Arrange the above technologies of different computer
B. Second Generation II) VLSI microproces sor
generations in the order they have been used. Start
C. Third Generation III) Vacuum Tube
from the technology that was used in first generation.
D. Fourth Generation IV) Integrated circuit
Choose the correct answer from the options given
Select the correct option from the following:
below:
a) A-III,B-IV,C-I,D-II b) A-III,B-I,C-IV,D-II
c) A-III,B-I,C-II,D-IV d) A-I,B-III,C-IV,D-II a) (C), (A), (B), (D) b) (C), (B), (A), (D)
3. Which of the following is most suitable for being c) (B), (C), (A), (D) d) (C), (B), (D), (A)
designated as Fourth Generations Language (4GL) 2. Which of the following statements regarding the
a) ALGOL b) Java c) C d) SQL features of Information and Communication
4. Which of the following is related to National Super Technology (ICT) is/are true? [June-2019]
Computing Mission of Government of India? I. ICT are the main instruments for the creation
a) Param 8000 b) Param 10000 [Sept-2020]
Communication Technology
of computer networks and the applications
c) ParamDhavak d) ParamShivay based on them.
Information and
5. The statement “The study, design, development, im- II. ICT supports the spread of information and
plementation, support or management of comput- knowledge, separating the content from the
er-based information systems, particularly software place where it belongs physically.
applications and computer Hardware” refers to
a) Information Technology (IT) III. The digital and virtual nature of most of ICT
products allow the expenditure for them to
b) Information and Communicationn Technology
(ICT)
be maximized.
c) Information and Data Technology (IDT) a) I and II only b) I and III only
d) Artificial Intelligence (AI) c) II and IIIonly d) I, II and III
4.5
Professor Academy
purpose
3. Super computer C. Genetic analysis Memory Unit
d) None Of These
Components in these categories connect to central
Answer Key processing unit (CPU), the electronic circuitry that
provides the computational ability and control of
1 2 3 4 5 the computer, via wires or circuitry called a bus. The
b a c d c main difference between software and hardware can
be assumed of their physical appearance as hardware
is tangible whereas software is intangible.
Professor Academy
2. Given below are two statements, one is labelled 4. Given two statements
Assertion(A) and the other is labelled as Reason I. Hardware is tangible whereas software is
(R) intangible.
Assertion(A): The clock speed of CPU has not II. Input and output devices are connected to
increased significant in recent years the computer via wires or circuitry called as
Reason (R): Software now being used is faster topologies.
and therefore processors do not have to be faster
In the light on the above two statement choose Which among above statement is correct?
the correct option from those given below a) Only I b) Only II
[Dec- 2019] c) Both I & II d) None of the above
a) Both (A) and (R) are true is the correct 5. What are the different set of keys available in the
explanation of (A) keyboard
b) Both (A) and (R) are true R is not the correct (i). Character keys (ii). Modifier keys
explanation of (A) (iii). Surrogate keys (iv). System keys
c) (A) is true, but (R) is false (v). Function keys (vi). Navigation keys
d) (A) is false, but (R) is true (vii). Symmetric Keys
3. Assertion (A): The computer is the combination Choose the correct option
of hardware and software.
a) (i), (ii), (iii), (v), (vi)
Reason(R): Hardware is the physical component
and software is set of information. b) (i), (ii), (iv), (v), (vi)
c) (i), (ii), (v), (vi), (vii)
Choose the correct answer from the following:
d) (i), (ii), (iv), (v), (vii)
a) Both (A) and (R) are true and (R) is the
correct explanation of (A).
b) Both (A) and (R) are true and (R) is not the Answer Key
correct explanation of (A).
1 2 3 4 5
c) (A) is true and (R) is false.
b c c a b
d) (A) is false and (R) is true.
Communication Technology
Information and
4.11
Professor Academy
Memory Storage Units
COMPUTER MEMORY
Bit 0 or 1
The performance of computer mainly based 4 Bit 1 Nibble
on memory and CPU. Memory is major part
of computers that categories into several types, 8 Bit 1 Byte
Memory is best storage part to the computers users 1024 Byte 1 Kilo Byte 210 103
to save information, programs and etc. The computer 1024 Kilo Byte 1 Mega Byte 220 106
memory offer several kinds of storage media some
can store data temporarily and some of them can 1024 Mega Byte 1 Giga Byte 230 109
store permanently. Memory consists of instructions 1024 Giga Byte 1 Tera Byte 240 1012
and the data saved into computer through Central 1024 Tera Byte 1 Peta Byte 250 1015
Processing Unit (CPU).
1024 Peta Byte 1 Exa Byte 260 1018
Primary and secondary storage device 1024 Exa Byte 1 Zetta Byte 270 1021
Memory 1024 Zetta Byte 1 Yotta Byte 280 1024
1024 Yotta Bye 1 Bronto Byte 290 1027
Secondary Storage
Primary Storage Device / Memory 1024 Bronto Byte 1 Geop Byte 2100 1030
Device / Memory
1. Primary Memory
DRAM PROM
Compact Disk
i. Random Access Memory/Volatile Memory
SPRAM EPROM
ii. Read Only Memory(BIOS)/Non-Volatile Memory
EAROM Tape Drive
2. Secondary Memory/ Non-Volatile Memory
EEPROM DLT (Digital
Linear Tapes)
Primary Memory
DAT(Digital
Audio Tape)
Primary Memory is called as Volatile memory
because the memory can’t store the data permanently.
Micro Vault USB
Storage Media Primary memory select any part of memory when
user want to save the data in memory but that may
The purpose of the storage unit of the computer not be store permanently on that location. It also has
is to store the data entered before processing and another name i.e. RAM.
also to store the results after processing. (i) Random Access Memory (RAM): The primary
storage is referred to as random access memory
Communication Technology
computer.
operations on memory. If power failure occurs in
Memory-Data stored in the form of chips. systems during memory access then you will lose
Storage-Data stored in tapes or disks. your data permanently. So, Ram is volatile memory.
RAM is categorized into following types. DRAM,
Storage Unit
SRAM &DRDRAM.
1. Primary Storage Device
DRAM (Dynamic RAM): It only holds its data if it
2. Secondary Storage Device is continuously accessed by a refresh circuit. Many
hundreds of times each second, this circuitry reads
Professor Academy
and then re-writes the contents of each memory cell. Diffrence between RAM and ROM
It is slower and more complicated than SRAM. RAM is a volatile memory. ROM is a non-volatile mem-
SRAM (Static RAM): It is also a volatile storage ory.
devices. These chips are more complicated and take Data stored can be re- Data stored can only be read.
trieved and altered.
up more space. It is used in specialized applications.
Used to store the data that It stores the instructions re-
It is fast and access time 80 nano-second to read has to be currently pro- quired during bootstrap of the
from or write into any location. It is expensive. cessed by CPU temporarily. computer.
(ii) Read Only Memory (ROM): ROM is permanent It is a high-speed memory. It is much slower than the RAM.
memory location that offers huge types of standards to
save data. But it works with read only operation. No data Secondary Memory / Non Volatile
lose happen whenever power failure occurs during the Memory
ROM memory work in computers. Secondary memory is external and permanent
The BIOS – It stands for Basic Input Output memory that is useful to store the external storage
System and is a small firmware, that controls the media such as floppy disk, magnetic disks, magnetic
peripheral or the input-output devices attached tapes and cache devices etc. Secondary memory
to the system. This software is also responsible for deals with following types of components.
starting the OS or initiating the booting process .
Uses of Secondary Memory
ROM memory has several models such names are Permanent Storage: Primary Memory (RAM)
following. is volatile, i.e. it loses all information when the
PROM (Programmable ROM): PROM are electricity is turned off, so in order to secure the
programmed to record information using a facility data permanently in the device, Secondary storage
known as a PROM-Programmer. The recorded devices are needed.
information cannot be changed. It is also non-volatile Portability: Storage medium, like the CDs and
storage. e.g.- Video games, Mobile Phones etc. flash drives can be used to transfer the data from one
EPROM (Erasable PROM): It was developed device to another.
to allow programmers to reprogram permanent Fixed and Removable Storage
read only chips. It is erased and reprogrammed by Fixed Storage-
exposing the inside of the chip to Ultra Violet Light.
It were used in the old IBM PCs and XTs for storing A Fixed storage is an internal media device that is
the BIOS information. used by a computer system to store data, and usually
these are referred to as the Fixed Disks drives or the
EAROM-(Electrically Alterable ROM): Memory Hard Drives.
can be programmed and erased by electrical signals.
It does not require exposure to ultraviolet light to Types of fixed storage:
erase its contents. It provide easy means to load and ➢ Internal flash memory (rare)
store temporary or permanent information in a form ➢ SSD (solid-state disk) units Communication Technology
of ROM memory. ➢ Hard disk drives (HDD)
This memory can be retained for many years Removable Storage-
Information and
4.13
Professor Academy
➢ Floppy disks be spaced closely enough to store data that is more
➢ Magnetic tapes than six times the CD’s capacity. It is a significant
➢ Disk packs advancement in portable storage technology. A
➢ Paper storage (punched tapes, punched cards) DVD holds 4.7 GB to 17 GB of data.
(a) Hard Disk (e) Blue Ray Disk
CPU use the hard disk to load programs and data This is the latest optical storage media to store
as well as to store data. To prevent hard disk crash high definition audio and video. It is similar to a CD
must operate the PC within dust-free and cool room. or DVD but can store up to 27 GB of data on a single
(b) Floppy Disk layer disk and up to 54 GB of data on a dual layer
disk. While CDs or DVDs use red laser beam, the
It is flexible circular disk of diameter 3 inches blue ray disk uses a blue laser to read/write data on a
made of plastic coated with a magnetic material. It is a disk.
square plastic jacket. It can store 1.4 Mbytes of data.
Data recorded on a floppy disk is read and stored (f) Pen Drives
in a computer’s memory by a device called a floppy Pen Drives or Thumb drives or Flash drives
disk drive. Some of it has limited life time. It has to be are the recently emerged portable storage media. It
recycled periodically to keep them alive. A frequently is an EEPROM based flash memory which can be
recycled floppy will have a life time of 3 to 4 years. repeatedly erased and written using electric signals.
(c) Compact Disk (CD-ROM) This memory is accompanied with a USB connector
which enables the pen drive to connect to the
CD-ROM are normally used to store data as back computer.
up. Lots of information can be written on CD-ROM
and stored for future CD-ROM uses a laser scan to (g) Tape Drives
record and read data along spiral track on a 51/4 It is one of the oldest of storage technologies.
disk. A disk can store around 700mb of information. It can hold the most data on a single cartridge. A
computer tape drive works similar to a tape recorder
Burning: Copying files to or a VCR.
a CD-ROM is known as a
Burning. (h) DLT (Digital Linear Tape)
Zipping: Zipping is the act DLT drives are a robust and durable medium.
of packaging a set of files Released in the 1991. DLT drives are very reliable,
into a single file or archive high-speed and high-capacity making the DLT
that is called a zip file. drives an excellent use for network backups.
Digitizing: Digitization is the process of (i) DAT (Digital Audio Tape)
converting analog signals or information The popular choice for tape drives is DAT. It is
of any form into a digital format that best known for digital audio recording. These drive
can be understood by computer systems use a recording technique called helical scanning
or electronic devices. which is used in VCRs. The 4mm tape is wrapped
Communication Technology
Ripping: Ripping, more formally known round a spinning read/write head that records data
as digital extraction, is the process of in overlapping diagonal tracks. DAT tapes can hold
Information and
a) Both (A) and (R) are true and (R) is the correct 5. Identify the correct order of the following computer
explanation of (A) memories on the basis of increasing memory access
b) Both (A) and (R) are true but (R) is NOT the time (from low to high) [Oct-2020]
correct explanation of (A) (i) Registers (ii) Main Memory
c) (A) is true but (R) is false (iii) Secondary Memory (iv) Cache Memory
d) (A) is false but (R) is true Choose the correct answer from the following:
a) (i), (iii),(iv), (ii) b) (i), (iv), (ii), (iii)
c) (iii), (ii), (iv), (i) d) (ii),(iv), (i), (iii)
4.15
Professor Academy
6. With regard to computer memory, which of the c) Exabyte <Zettabyte < Terabyte < Petabyte
following statement(s) is/are TRUE? [Oct-2020] d) Zettabyte < Exabyte < Petabyte < Terabyte
(i) Cache memory is ‘volatile’ memory.
12. Given below are two statements: [Nov-2020]
(ii) Magnetic memory is ‘volatile’ memory.
Statement I: External hard disk is a primary memory.
(iii) Flash memory is ‘volatile’ memory.
Statement II: In general, pen drives have more storage
(iv) RAM is ‘volatile’ memory.
capacity than external hard disks.
Choose the correct answer from the following:
In the light of the above statements, choose the
a) (i) and (ii) only b) (iv) only
correct answer from the options given below:
c) (i) and (iv) only d) (iii) and (iv) only
a) Both Statement I and Statement II are true
7. In computers, a DVD-ROM is: [Oct-2020] b) Both Statement I and Statement II are false
a) An optical storage media and it can be written c) Statement I is correct but Statement II is false
many times. d) Statement I is incorrect but Statement II is true
b) A magnetic storage media and it can be written
13. Which one of the following represents one
only once.
billion characters?
c) An optical storage media and it can be written
only once. [Nov-2020]
d) A magnetic storage media and it can be written a) 1 Kilobyte b) 1 Megabyte
many times. c) 1 Gigabyte d) 1 Terabyte
8. Choose the correct lists of computer memory types 14. One Terabyte (TB) of memory is equal to:
from lowest to highest speed? [Sept-2020] a) 1024 KB [June - 2019]
a) Main Memory, Cache Memory, Secondary Storage b) 1024 * 1024 KB
b) Cache Memory, Secondary Storage, Main Memory c) 1024 * 1024 * 1024KB
c) Secondary Storage, Main Memory, Cache Memory d) 1024 * 1024 * 1024 Bytes
d) Secondary Stage, Cache Memory, Main Memory 15. Consider the following storage devices:
9. Given below are two statements [Sept-2020] a. Hard disc b. CD-ROM c. DVD-ROM
Statement I : Example of primary memory is RAM. Arrange these in ascending order of storage capacity
Statement II : Example of Secondary memory is Pen and select the correct option
drive a) (b), (c), (a) b) (b), (a), (c)
In Light of the above statements, choose the correct c) (c), (b), (a) d) (a), (c), (b)
answer from the options given below: 16. Which of the following is not considered as a form
a) Both statement I and Statement II are true of secondary storage?
b) Both statement I and Statement II are false a) RAM b) Floppy Disk
c) Statement I is correct but statement II is false c) Optical Disk d) Flash Drive
d) Statement I is incorrect but statement II is true
17. Which of the following memories must be refreshed
10. To differentiate a primary storage from a secondary many times per second?(Dec-2018)
storage in a computer system, which of the following a) EPROM b) Static ROM
statements is correct? [Oct-2020] c) RAM d)Dynamic RAM
a) Primary storage is slower, more expensive and
persistent. Answer Key
b) Primary storage is faster, more expensive and
Communication Technology
persistent. 1 2 3 4 5 6 7 8 9
c) Primary storage is faster, less expensive and not c c c d b c c c a
Information and
persistent.
10 11 12 13 14 15 16 17
d) Primary storage is faster, more expensive and not
persistent. d a b c c a a d
11. Which of the following is correct with respect to the
size of the storage units? [Nov-2020]
a) Terabyte < Petabyte < Exabyte <Zettabyte
b) Petabyte < Exabyte <Zettabyte < Terabyte
Professor Academy
Communication Technology
Information and
4.17
Professor Academy
every computer is using a Graphical User Interface
SOFTWARE
(GUI) Based operating system that is much easier to
These are the set of instruction or more generally use and operate.
a collection of computer programs. Example of computer operating systems
Software tells the hardware how to work and ➢ Microsoft Windows : PC and IBM Compatible
perform different tasks on a computer system. At operating system. A Microsoft window is the
the lowest level software is in a form of an assembly most commonly used operating system.(Can
language, a set of instructions in a machine – include all MS Windows OS).
understandable form. At the highest level, software is ➢ Apple Mac OS: Apple Mac operating system.
in a form of high-level languages, which are compiled The only Apple computer operating system is
or interpreted into machine language code. They can Mac OS.
be further enumerated by the type of work done by ➢ Ubuntu Linux : A popular variant of Linux used
programs. The three basic types are: with Pc and IBM compatible computers.
1) The Operating System (System Software): – ➢ Google Android: An operating system used
It is the main program that governs and maintains with Android compatible phones.
the inter-cooperation of the components of a ➢ Unix: Unix Operating System is a multitasking
computer system. It controls the working of a environment. A user can also run multiple
computer system and performs essential tasks like programs at the same time.
Disk maintenance and managing screen etc. For e.g.
Booting of Computer
Microsoft Windows, Linux, Mac OS etc.
2) Programming Language Software: These An Operating system (OS) is basic software that
are basically tools use to create, debug, maintain, or makes the computer to work. When a computer is
otherwise support other programs and applications. switched on, there is no information in its RAM. At
the same time, in ROM, the pre-written program
3) Application software: It performs productive called POST (Power on Self-Test) will be executed
tasks for user such as word processing and database first. This program checks if the devices like RAM,
management etc.,. keyboard, etc., are connected properly and ready to
Apart from these three basic types of software, operate. If these devices are ready, then the BIOS
there are some other well-known forms of computer (Basic Input Output System) gets executed. This
software like Inventory Management Software. process is called Booting. Thereafter, a program called
“Bootstrap Loader” transfers OS from hard disk into
The Language Processor – The hardware main memory. Now the OS gets loaded (Windows/
components present in the computer system does Linux, etc.,) and will get executed. Booting process is
not understand human language. of two types.
Operating System 1) Cold Booting
An operating system or OS is a software program 2) Warm Booting
that acts as an interface between the user and the The system does not start from initial state and so all
Communication Technology
computer hardware and controls the execution of all diagnostic tests need not be carried out in this case.
kinds of programs. It enables the computer hardware There are chances of data loss and system damage as
Information and
to communicate and operate with the computer the data might not have been stored properly.
software. Without a computer operating system, a Recycle Bin
computer and software programs would be useless.
The recycle bin is an icon on the Windows
An operating system is the most important software
that runs on a computer. It manages the computer’s desktop that represents a directory where deleted
memory and processes, as well as all of its software files are temporarily stored. This enables you to
and hardware. When computers were first introduced, retrieve files that you may have accidentally deleted.
The Recycle Bin is an area in Windows OS that contains
the users interacted with them using a command line
interface, which required commands. Today, almost files deleted from the hard drive.
Professor Academy
Editor Assembly-Level Language: These are the Low-
Editors or text editors are software programs that Level Language(LLL), that forms a correspondence
enable the user to create and edit text files. In the between machine level instruction and general
field of programming, the term editor usually refers assembly level statements. Assembly language uses
to source code editors that include many special a mnemonics to represent each low-level machine
features for writing and editing code. instruction or operation-code also called the op-
codes. For e.g. ADD instruction is used to add two
entities, the HALT instruction is used to stop a
Programming Language Software process etc. It is a machine dependent language and
varies from processor to processor.
Programming language: It is a set of commands,
instructions, and other syntax use to create a software Algorithmic languages: Algorithmic languages
program. Languages that programmers use to write are designed to express mathematical or symbolic
code are called “high-level languages.” This code can computations. They can express algebraic operations
be compiled into a “low-level language,” which is in notation similar to mathematics and allow the
recognized directly by the computer hardware. use of subprograms that package commonly used
operations for reuse. They were the first high-level
Programming Language-Examples languages.
➢ FORTRAN ➢ ALGOL Language Transilators
➢ LISP ➢ COBOL
Assembler: An assembler is a program that converts
➢ C ➢ C++
assembly language into machine code. It takes the
➢ SQL ➢ PHP basic commands and operations from assembly
➢ JAVA ➢ Visual Basic code and converts them into binary code that
➢ Phython ➢ Matlab can be recognized by a specific type of processor.
➢ R ➢ Perl Assemblers are similar to compilers in that they
produce executable code. This language processor is
➢ Ruby ➢ C# used to convert the assembly language into machine
➢ Go ➢ Swift level language.
High-Level Language : A programming language Compiler: This language processor is used to convert
is a set of commands, instructions, and other syn- High-Level Language into machine level language
tax use to create a software program. Languages that in one go, thus execution time is fast. The error
programmers use to write code are called “high-lev- detection is difficult in a compiler. Programming
el languages.” This code can be compiled into a Languages like C, C++ and Scala use compiler.
“low-level language,” which is recognized directly Interpreter: This language processor is also used
by the computer hardware. High-level languages are to convert High-Level Language into machine
designed to be easy to read and understand. level language line-by-line, thus execution time is
slow. Error-detection is easier in an interpreter as
Low Level Language/Machine Language : A it reports as soon as a bug is caught and restarts
machine language consists of the numeric codes
Communication Technology
the process. This consumes unnecessary memory.
for the operations that a particular computer can Programming Languages like Python, Ruby and Java
execute directly. The codes are strings of 0s and
Information and
uses an interpreter.
1s, or binary digits (“bits”), which are frequently
converted both from and to hexadecimal (base 16) The Device Drivers: The device drivers and the
for human viewing and modification. Machine device programs or the system software that acts
language instructions typically use some bits to as an interface between the various Input-Output
represent operations, such as addition, and some to device and the users or the operating system. For e.g.
represent operands, or perhaps the location of the the Printers, Web cameras come with a driver disk
next instruction. Machine language is difficult to that is needed to be installed into the system to make
read and write. the device run in the system.
4.19
Professor Academy
ALGORITHM the reservation system and banking system. These
are divided into two types:
An algorithm is a set of instructions designed to
perform a specific task. This can be a simple process, The General Purpose Application Software: These
such as multiplying two numbers, or a complex are the types of application software that comes
operation, such as playing a compressed video file. in-built and ready to use, manufactures by some
In computer programming, algorithms are often company or someone. For e.g.
created as functions. ➢ Microsoft Excel – Used to prepare excel sheets.
An algorithm is a specific procedure for solving a ➢ VLC Media Player – Used to play audio/video
well-defined computational problem. The files.
development and analysis of algorithms is ➢ Adobe Photoshop – Used for designing and
fundamental to all aspects of computer science: animation and many more.
artificial intelligence, databases, graphics, Utility Software
networking, operating systems, security, and so on.
These are the most basic type of software which
An algorithm must have provides high utility to the user and the system. These
five properties: Points to Remember perform the basic but daily need tasks. For e.g.
➢ Input specified Antivirus Software: These provide protection to
➢ Output specified the computer system from unwanted malware and
➢ Definiteness viruses. For e.g. QuickHeal, McAfee etc.
➢ Effectiveness Disk Defragmenter Tools: These help the users to
➢ Finiteness analyse the bad sectors of the disk and rearrange the
files in a proper order.
The characteristics of a good algorithm are:
➢ Precision – the steps are precisely stated(defined). Text-editors: These help the users to take regular
notes and create basic text files. For e.g. Notepad,
➢ Uniqueness – results of each step are uniquely
Gedit etc.
defined and only depend on the input and the
result of the preceding steps. Open Source Software
➢ Finiteness – the algorithm stops after a finite Open source software is free. The term open source
number of instructions are executed. refers to something people can modify and share
➢ Input – the algorithm receives input. because its design is publicly accessible.The term
➢ Unambiguous − Algorithm should be clear and originated in the context of software development to
designate a specific approach to creating computer
unambiguous.
programs. As organizations aim at deriving more
Not a characteristics of a good algorithm are: business values from less, open-source software can
➢ The algorithm does not stop in a finite number deliver high flexibility, lower IT costs and increased
of times. opportunities for innovation.
➢ The algorithm does not display the output.
Proprietary Software
Communication Technology
➢ The algorithm does not precisely state the steps known as Closed-source software. These types of
of execution. applications are usually paid and have intellectual
property rights or patents over the source code.
Application Software Proprietary software is any software that is
These are the basic software used to run to accomplish copyrighted and bears limits against use, distribution
a particular action and task. These are the dedicated and modification that are imposed by its publisher,
software, dedicated to performing simple and single vendor or developer. Proprietary software remains
tasks. For e.g. a single software cannot serve to both the property of its owner/creator and is used by end-
users/organizations under predefined conditions.
Professor Academy
With proprietary software, such as Microsoft
Windows, and Office, companies are required to Self Evaluation
upgrade both software and hardware on a timely
LEVEL 1
basis. Updates must be installed for the proper
working. However, not all updates are flexible with 1. Which of the following is NOT a system software?
all the versions of the software. a) Compiler b) Operating System
Alternatives to Proprietary Software c) Application Software d) Editor [Sept-2020]
It is interesting to see that there are so many 2. Which of the following is an application software?
open-source software alternatives for the existing a) Android b) iOS [Sept-2020]
proprietary software which are equivalent or more c) Linux d) MS Word
reliable, secure, and flexible. 3. Which of the following statements is true in respect
of computers? [Oct-2020]
Software Category Proprietary Equivalent Open-
Software source Software
a) Software is loaded into secondary storage from
RAM and is then executed by CPU.
Operating System Microsoft Linux Ubuntu
Windows b) Software is loaded into RAM from secondary
Browser Internet Explorer Mozilla Firefox storage and is then executed by CPU.
Office automation Microsoft Office Open Office c) Software is loaded into RAM from secondary
MATHWORKS MATLAB Sci Lab
storage and is then executed by motherboard.
Graphics Tool Adobe GIMP(GNU Image d) Software is loaded into secondary storage from
Photoshop Manipulation Program RAM and is then executed by motherboard
Drafting tool Auto CAD Archimedes 4. In computer related activities which of the following
Web Editors Adobe NVU is in appropriate for describing a language translator?
Dreamweaver a) Assembler b) Compiler
Desktop Publishing Adobe Acrobat PDF Creator c) Interpreter d) Codec [Dec-2019]
Blogs Blogger Word Press
5. A computer program that translates a program
Mobile IOS Android
statement by statement into machine language
Media Player Windows Media VLC
Player
is called a / an
Database Oracle, Microsoft My SQL, Mongo DB,
a) Compiler b) Simulator
SQLServer HADOOP c) Translator d) Interpreter
Server Microsoft Red Hat Server, Ubuntu 6. Select the true statement about an operating system
Window Server Server (OS)? [June - 2019]
Web Server IIS Apache
a) An OS controls peripheral, allocates memory and
organizes data into fields and records.
Freeware b) An OS provides protection against viruses and
controls peripherals
Software that can be copied and used without any c) An OS controls peripheral, and allocates memory
cost, although there may be some restrictions on and processor time Communication Technology
distribution. d) An OS controls the processor and peripherals
and allows the user to connect to the internet
Shareware
Information and
c) Copy and paste the file into the recycle bin and d) (A) is false but (R) is true.
empty the recyclebin
Information and
d) Drag the file into the recycle bin and empty the Answer Key
recyclebin
1 2 3 4
2. Given below are two statements. One labelled as d c a b
Assertion (A) and other is labelled as Reason (R).
Assertion (A): A computer requires an operating
system to boot up initial start-up programs.
Professor Academy
➢ Geographical Information System - A Geo-
DATA AND INFORMATION
graphic Information System (GIS) is a system
We all know what computer is? It is an electronic designed to capture, store, manipulate, analyse,
device that processes the input according to the set manage, and present spatial or geographic data.
of instructions provided to it and gives the desired
output at a very fast rate. Computers are very MS Office Applications
versatile as they do a lot of different tasks such as
MS-Excel:
storing data, weather forecasting, booking airlines,
railway or movie tickets and even playing games. Microsoft Excel is a spreadsheet program
included in the Microsoft Office suite of applications.
➢ Data:
Spreadsheet presents tables of values arranged
Data is defined as a un- processed collection of in rows and columns that can be manipulated
raw facts, suitable for communication, interpretation mathematically using both basic and complex
or processing. arithmetic operations and functions.
e.g. 134, 16, ‘Kavitha’, ‘C’ is data. This will not
MS-Power Point:
give any meaningful message.
Microsoft Power Point is a computer software
➢ Information:
created by Microsoft which allows the user to create
Information is a collection of facts from which slides with recordings, narrations, transitions and
conclusions may be drawn. In simple words we can other features in order to present information. An
say that data is the raw fact that is processed to give example of Power Point is presentation software
meaningful, ordered or structured information. made by Microsoft.
For example Vanitha is 16 years old. This MS-Word:
information is about Vanitha and conveys some
meaning. This conversion of data into information is Microsoft Word is the most popular word
called data processing. processing software used today. A word processor
is essentially a computerized version of the standard
Information typewriter. However, the computer adds features
Data Process typewriters never dreamed of having like spell
check, the ability to save and store documents, copy
“A Computer is an electronic device that takes
and paste functions.
raw data (unprocessed) as an input from the user and
processes it under the control of a set of instructions Mail Merge
(called program), produces a result (output), and
saves it for future use.” Mail merge consists in combining mail and
letters and pre-addressed envelopes or mailing labels
Data Storage and Hierarchy for mass mailings from a form letter. Microsoft Word
Bit→Byte→Field→Record→File→Database can insert content from a database, spreadsheet, or
table into Word documents. Communication Technology
➢ Database System - A Database is a shared col-
Desktop Publishing
lection of logically related data and description
Desktop publishing (DTP) is the creation of
Information and
1 1 0 1
1. Decimal to Binary Conversion
Decimal numbers can be converted to binary by
repeated division of the number by 2 while recording
MSB LSB
the remainder.
Example Example: Convert (65)10 into its equivalent binary
The binary sequence (1101)2 has the decimal number.
equivalent:
4.25
Professor Academy
4. Conversion of fractional Decimal to Binary
2 65 Remainder The method of repeated multiplication by 2 has
LSB to be used to convert such kind of decimal fractions.
2 32 1 Note:
65/2 = 32 + 1 Multiply the decimal fraction by
2 16 - 0
32/2 = 16 + 0 Step 1 : 2 and note the integer part. The
2 8- 0 integer part is either 0 or 1.
16/2 = 8+0
2 4- 0 Discard the integer part of the previous
8/2 = 4+0 product. Multiply the fractional part
2 2- 0 4/2 = 2+0 Step 2 : of the previous product by 2. Repeat
1- 0 2/2 = 1+0 Step 1 until the same fraction repeats
MSB or terminates (0).
The resulting integer part forms a
(65)10 = (1 0 0 0 0 0 1)2 sequence of 0s and 1s that become
Step 3 :
the binary equivalent of decimal
fraction.
2. Decimal to Octal Conversion The final answer is to be written
Decimal numbers can be converted to octal by Step 4 : from first integer part obtained till
repeated division of the number by 8 while recording the last integer part obtained.
the remainder.
Example:
Convert (65)10 into its equivalent Octal number. Integer Part
1 - 0 0.8 × 2 = 16 1
MSB
0.6 × 2 = 1.2 1
(65)10 = (1 0 1)8 (last integer part obtained)
0.2 × 2 = 0.4 0
{
{
{
Step 2 : written for the digit, now write the
equivalent weight.
3 2 6
Multiply each digit with its
Step 3 :
corresponding weight.
(1 1 0 1 0 1 1 0)2 = (326)8
Step 4 : Add all the values. 3. Binary to Hexadecimal Conversion
To convert a binary number to hexadecimal
Example number, these steps are followed −
Convert (111011)2 into its equivalent decimal • Starting from the least significant bit, make
number. groups of four bits.
• If there is one or two bits less in making
the groups, 0s can be added after the most
Weight 32 16 8 4 2 1
significant bit.
Positional Notation 25 24 23 22 21 20 • Convert each group into its equivalent octal
Given number 1 1 1 0 1 1 number.
Hexadecimal number Binary equivalent
0 0000
32 + 16 + 8 + 0 + 2 + 1 = (59)10 1 0001
(1 1 1 0 1 1)2 = (59)10 2 0010
3 0011
4 0100
5 0101
2. Binary to Octal Conversion 6 0110
To convert a binary number to octal number, 7 0111
8 1000
these steps are followed − 9 1001
• Starting from the least significant bit, make A 1010
B 1011
groups of three bits. C 1100
D 1101
• If there are one or two bits less in making E 1110
the groups, 0s can be added after the most F 1111
significant bit. Table (B) Hexadecimal numbers and their Binary equivalent
1 001
2 010 0011 1101 0110
3 011
{
{
{
4 100
5
6
101
110
3 D 6
7 111 (1 1 1 1 0 1 0 1 1 0)2 = (3D6)16
Table (A) Octal numbers and their Binary equivalent
4.27
Professor Academy
Hexadecimal to other number system a. Invert all the bits in the binary sequence (i.e.,
change every 0 to1 and every 1 to 0 ie.,1’s
1. Hexadecimal to Decimal Conversion complement)
2. Hexadecimal to Binary Conversion
b. Add 1 to the result to the Least Significant Bit
3. Hexadecimal to Octal conversion (LSB).
1. Hexadecimal to Decimal Conversion Example
To convert Hexadecimal to Decimal we can use 2’s Complement represent of (-24)10
positional notation method.
1. Write down the Hexadecimal digits and list Binary equivalent of + 24 11000
the powers of 16 from right to left(Positional 8 bit format 00011000
Notation).
1’s Complement 11100111
2. For each positional notation written for the
digit, now write the equivalent weight. Add 1 to LSB +1
3. Multiply each digit with its corresponding weight. 2’s Complement of -24 11101000
4. Add all the values to get one final value.
Example Self Evaluation
Convert (25F)16 into its equivalent Decimal
number. LEVEL 1
Weight 256 16 1 1. Which of the following statement(s) is/are TRUE?
S1: The decimal number 11 is larger than the
Positional Notation 162 161 160 hexadecimal number 11.
Given number 2 5 F (15) S2: In the binary number 1110.101, the fractional
part has the decimal value as 0.625. [Dec-2019]
(25 F)16 = 2 × 256 + 5 × 16 + 15 × 1 a) S1 only b) S2 only
c) Both S1 and S2 d) Neither S1 nor S2
= 512 + 80 + 15
2. Which of the following statement is/are correct?
(25 F)16 = (607)10
a) for the sequence of integers represented in binary
as 00111, 01001, 01011, p=…………, the next
2. Hexadecimal to Binary Conversion integer p would be represented as 01101
Write 4 bits Binary equivalent for each b) A byte is n binary number consisting of exactly
Hexadecimal digit for the given number using 8 bits
positional notation method. Choose the correct option: [Dec - 2019]
4.31
Professor Academy
6. WLAN – Wireless Local Area Network Difference Between Wired and Wireless Network
Range: Up to 50 Kms Wired Network
Location: Ranges from a single room to an entire “Wired” as the name suggests refers to any
campus Uses Wi-Fi or Bluetooth, Radio waves physical medium connected through wires and
Speed: 1 Mbps to 54 Mbps cables. The wires/cables can be copper wire, twisted
Advantages: Portable Installation is quick and pair or even fibre optic. Wired connectivity is
easy responsible for providing high security with high
Disadvantages: Low Bandwidth due to Bandwidth provisioned for each user.
interference In fact, Wired connectivity is considered highly
7. SAN – Storage area network reliable and incurs very low delay, unlike Wireless
Range: Up to 10 Km (Same as LAN) connectivity.
Location: Refers to same office, same building, Wireless Network
same company and in same schools “Wireless” as the term refers, uses air as a medium
Speed: Up to1 Gbps – 4 Gbps to send electromagnetic waves or infrared waves.
Advantages: High speed of data transfer, Wireless devices have antennas for communication.
Centralized backup, dynamic failover protection, Wireless connectivity provides a major benefit of
Adding/removing of storage devices is easy, Data user mobility and ease of deployment. Wireless
security. becomes more useful in areas where Wires can’t be
Disadvantages: Not good for high traffic, reached.
Sensitive data may be leaked. Though wireless connectivity is less secured
8. GAN – Global area network and higher delay than wired connectivity, it is still
preferred communication technology for customers.
A global area network (GAN) refers to a network
Wireless also earns low Installation cost in contrast
composed of different interconnected networks
to wired connectivity.
that cover an unlimited geographical area. The
term is loosely synonymous with Internet, which is
considered a global area network. World Wide Web - Terminology
9. EPN - Enterprise Private Network The World Wide Web (WWW), commonly
known as the Web, is an information system where
An enterprise private network is a computer documents and other web resources are identified
network that helps enterprise companies with a by Uniform Resource Locators (URLs, such as
number of disparate offices connect those offices to https://example.com/), which may be interlinked by
each in a secure way over a network. An enterprise hypertext, and are accessible over the Internet. The
private network is mainly set up to share computer WWW is the most widely used part of the Internet.
resources. It is based on URL’s and http, and allows dynamic
10.Virtual Private Network (VPN) links to an incredible amount of information.
Communication Technology
Domain Name
➢ Safari ➢ Maxthon
.com Commercial organization
➢ Opera ➢ Vivaldi .gov Government Institution
➢ Avast secure browser ➢ Tor browser .org Non Profit Organization
➢ Brave browser .net Network Support Group
➢ Internet explorer & edge .edu Educational Institution
4.33
Professor Academy
W3C stands for “World Wide Web Con- receive and retransmit incoming electrical, wireless
sortium.” The W3C is an international commu- or optical signals. Whenever a repeater receives a
nity that includes a full-time staff, industry ex- signal through one of its ports, it repeats or sends
perts, and several member organizations. These the incoming signal onto the other port. Its main use
groups work together to develop standards for is to amplify and regenerate signals.
the World Wide Web.
Gateway
The World Wide Web Consortium (W3C)
is an international organization committed to
A network gateway joins two networks so the
devices on one network can communicate with the
4.35
Professor Academy
devices on another network. Gateways serve as the Network Address
entry and exit point of a network. For basic Internet
connections at home, the gateway is the Internet
Service Provider that gives you access to the entire NETWORK ADDRESS
Internet.
A gateway is often associated with a router. Hardware address Software Address
Routers can be gateways because a router can control
the path through which information is sent in and Physical Address Logical Address
out.
The default gateway is the machine IP number MAC Address IP Address
that you need to access to get to the rest of the
network or the Internet. IPV4 IPV6
Router
Internet Protocol (TCP/IP)
A router is a networking device that forwards
data packets between computer networks. Routers The Internet Protocol (IP) is the method or
perform the traffic directing functions on the protocol by which data is sent from one computer
Internet. Data sent through the internet, such as a to another on the Internet. Each computer (known
web page or email, is in the form of data packets. as a host) on the Internet has at least one IP address
that uniquely identifies it from all other computers
Bridge
on the Internet.
A bridge is a network device that connects Every server on the internet has an IP number, a
multiple LANs (local area networks) together to form unique number consisting of four parts separated by
a larger LAN. The process of aggregating networks dots. The IP number is the server’s address
is called network bridging. A bridge connects the
different components so that they appear as parts of 165.113.245.2
a single network. 128.143.22.55
Firewall Transmission Control Protocol/Internet
A firewall is a software package that sits between Protocol (TCP/IP) is a networking protocol that
your computer and your Internet connection, keeping allows two computers to communicate.
an eye on the traffic going to and fro. If anything IPV4
suspicious appears, such as an unauthorised attempt
from a remote computer to write information to IPv4 uses 32 binary bits to create a single unique
your hard disc or to send information from your address on the network. Here’s an example of what
computer to a remote computer, it will block it and an IP address might look like: 66.171.248.170
warn you. An IPv4 address consists of four numbers, each
Modem of which contains one to three digits, with a single
dot (.) separating each number or set of digits. Each
Short for modulator/demodulator. A device
Communication Technology
also reconvert a signal coming into a computer via IPv6 uses 128 binary bits to create a single
a telephone line so that it can be understood by the unique address on the network and is arranged in
computer. Modems are used to connect computers eight groups, each of which is 16 bits. Each group is
with the Internet. expressed as four hexadecimal digits and the groups
are separated by colons. An example of a full IPv6
Webcam address could be:
A camera connected to a computer that enables An IPv6 address is split into two parts, a network
it to transmit images and videos to the webserver and a node component. The network component is
Professor Academy
The Differences Between 2G, 3G, 4G bandwidth of 15-20MHz. Some of the main features
of 3G are:
LTE, and 5G Networks
➢ Speed of up to 2 Mbps.
the first 64 bits of the address and is used for routing. ➢ Increased bandwidth and data transfer rates.
The node component is the later 64 bits and is used ➢ Send/receive large email messages.
to identify the address of the interface. ➢ Large capacities and broadband capabilities.
The 3G standard utilizes Universal Mobile fast coverage with low latency.
Telecommunications System (UMTS) as its core
Network Peek Speed Average Speed
network architecture. 3G network combines aspects
of the 2G network with new technologies and 5G 10Gbps 400Mbps
protocols to deliver a significantly faster data rate. 4G 1Gbps 50Mbps
By using packet switching, the original technology
was improved to allow speeds up to 14 Mbps. It
Types of Internet Service
used Wide Band Wireless Network that increased Here are some common types of Internet service.
clarity. It operates at a range of 2100MHz and has a Wireless Radio frequency bands are used in place
4.37
Professor Academy
of telephone or cable networks. One of the greatest be available. Similar to wireless access, satellite
advantages of wireless Internet connections is the connection utilizes a modem.
“always-on” connection that can be accessed from ISDN
any location that falls within network coverage.
Wireless connections are made possible through the ISDN (Integrated Services Digital Network)
use of a modem, which picks up Internet signals and allows users to send data, voice and video content
sends them to other devices. over digital telephone lines or standard telephone
wires. The installation of an ISDN adapter is required
Mobile at both ends of the transmission—on the part of the
Many cell phone and smart phone providers user as well as the Internet access provider.
offer voice plans with Internet access.
Dongles / Data Card
Mobile Internet connections provide good
Today, many dongles provide wireless capabilities.
speeds and allow you to access the Internet.
For example, USB Wi-Fi adapters are often called
Hotspots dongles. Since most computers now have built-in
Hotspots are sites that offer Internet access over Wi-Fi chips, mobile data adapters, such as 3G and 4G
a wireless local area network (WLAN) by way of dongles, are more prevalent. These types of dongles
a router that then connects to an Internet service allow connecting to the Internet even when Wi-Fi is
provider. Hotspots utilize Wi- Fi technology, which not available.
allows electronic devices to connect to the Internet
or exchange data wirelessly through radio waves. Wifi -Wireless Fidelity
Hotspots can be phone-based or free-standing, Wi-Fi stands for Wireless Fidelity. WIFI is
commercial or free to the public. based on the IEEE 802.11 family of standards
Broadband and is primarily a local area networking (LAN)
This high-speed Internet connection is provided technology designed to provide in-building
through either cable or telephone companies. broadband coverage.
One of the fastest options available, broadband Current Wi-Fi systems support a peak physical-
Internet uses multiple data channels to send large layer data rate of 54 Mbps and typically provide
quantities of information. The term broadband is indoor coverage over a distance of 100 feet.
shorthand for broad bandwidth. Broadband Internet
connections such as DSL and cable are considered One significant advantage of WiFi over WiMAX
high- bandwidth connections. Although many DSL and 3G is its wide availability of terminal devices. A
connections can be considered broadband, not all vast majority of laptops shipped today have a built-
broadband connections are DSL. in WiFi interface. WiFi interfaces are now also being
built into a variety of devices, including personal
DSL data assistants (PDAs), cordless phones, cellular
DSL, which stands for Digital Subscriber Line, phones, cameras, and media players.
uses existing 2-wire copper telephone line connected
to one’s home so service is delivered at the same time Wifi - Working Concepts
as landline telephone service. Customers can still
Communication Technology
to never talk to strangers, the same advice holds true drive, and deleting important files.
for the virtual world. You may know to be wary of
giving strangers your business bank account details. Trojan horse
But can you be sure the website you’re logging A Trojan horse, or Trojan, is a type of malicious
into is that of your bank and not a forgery created code or software that looks legitimate but can take
by a cybercriminal? Cybercriminals use many control of your computer. A Trojan is designed to
different methods to lure you into parting with damage, disrupt, steal, or in general inflict some
your confidential personal or business information. other harmful action on your data or network.
4.39
Professor Academy
Computer worm your email inbox. Spam, or electronic junk mail,
A computer worm is a standalone malware is a nuisance as it can clutter your mailbox as well
computer program that replicates itself in order to as potentially take up space on your mail server.
spread to other computers. It often uses a computer However, spam messages can contain links that
network to spread itself, relying on security failures when clicked on could go to a website that installs
on the target computer to access it. It will use this malicious software onto your computer.
machine as a host to scan and infect other computers Phishing
Worm is capable of transferring from one computer Phishing scams are fraudulent attempts by
to another without any ‘user interaction’ cybercriminals to obtain private information.
Botnet Phishing scams often appear in the guise of
A botnet is a group of computers connected email messages designed to appear as though
to the Internet that have been compromised by a they are from legitimate sources. For example,
hacker using a computer virus or Trojan horse. An the message would try to lure you into giving
individual computer in the group is known as a your personal information by pretending that
“zombie “computer. your bank or email service provider is updating
its website and that you must click on the link in
Root kit the email to verify your account information and
A root kit is a collection of tools that are used to password details.
obtain administrator-level access to a computer or a
network of computers. A root kit could be installed Spoofing
on your computer by a cyber criminal exploiting Spoofing is the act of disguising a communication
a vulnerability or security hole in a legitimate from an unknown source as being from a known,
application on your PC and may contain spy ware trusted source. Spoofing can apply to emails, phone
that monitors and records keystrokes. calls, and websites, or can be more technical, such
Sniffing as a computer spoofing an IP address, Address
Resolution Protocol (ARP), or Domain Name
Sniffing is a process of monitoring and capturing System (DNS) server.
all data packets passing through given network.
Sniffers are used by network/system administrator to Spoofing refers to any type of cybercrime that
monitor and troubleshoot network traffic. Attackers happens when a hacker impersonates a known
use sniffers to capture data packets containing contact or source. The process through which
sensitive information such as password, account an illegitimate website pretends to be a specific
information etc. legitimate website is known as Spoofing. In network
security involves fooling a computer or network via
Spam a falsified IP address, by redirecting internet traffic at
Spam in the security context is primarily used the DNS level, or by faking ARP data within a local
to describe email spam. Unwanted messages in access network (LAN).
Top Web Browsers Top Search Engines
Communication Technology
Self Evaluation
LEVEL 1
1. Speed of Internet is measured in [Sept-2020]
a) GHz b) Gbps
c) GB d) Dpi
2. What is the name for a web page address?
a) Directory b) Folder
c) Domain d) URL [Sept-2020]
3. Consider the following incomplete sentence:
Infrared(IR) Wi-Fi is short for Wireless Fidelity and it is a set
of ___________ for using short range _________
• An infrared transmission is a wireless
to allow computing to connect____________ to a
technology used for communication over
LAN or to the Internet. [Oct-2020]
short ranges.
• The frequency of the infrared in the range Complete the above sentence by choosing the
from 300 GHz to 400 THz. correct words in order from the following list:
• It is used for short-range communication (A) Standards (B) Waves
such as data transfer between two cell phones, (C) Devices
Choose the correct answer from the options given
TV remote operation, data transfer between a
below:
computer and cell phone resides in the same
a) (C), (B), (A) b) (C), (A), (B)
closed area. c) (A), (C), (B) d) (A). (B), (C)
a) Firefox b) Facebook
Components of Multimedia c) Chrome d) Safari [Oct-2020]
➢ Text 7. A computer network enables two or more computers
➢ Graphics to [Nov-2020]
a) Increase the speed
➢ Audio
b) Share data and hardware resources
➢ Video c) Increase the work
➢ Animation d) Monitor the software
4.43
Professor Academy
8. The application of which of the following ICT in 18. Which of the following statement is correct?
research will ensure wider coverage and accessibility a) Modem is a software
of needed information? [Dec - 2019] b) Modem helps in stabilizing the voltage
a) LAN b)WAN c) Modem is the operating system
c) MAN d) Intranet d) Modem converts the analog signal into digital
signal and vice-versa
9. A computer network which is used within a building
is called a [June - 2019] 19. …….. are ‘attempts by individuals to obtain
a) WAN b) MAN confidential information from you by falsifying
c) LAN d) SAN theiridentity’.
a) Phishing b) Computerviruses
10. Which of the following is generally associated with
c) Spyware d) Viruses
the domain name of an educational institution?
a) .org b) .edu 20. list of rules for transferring data over a network is
c) .com d) .inst called?
a) Protocols b) Programcode
11. --------------- is a wireless technology built in
c) Rules d) Flowchart
electronic gadgets for transferring data over short
distance [Dec - 2019] 21. A global network made up of thousands of privately
a) Wi-Fi b) Bluetooth owned computers and networks , and also said to be
c) Modem d) USB as networks of networks :
a) World Wide Web.
12. Which of the following devices enables a computer b) Internet
to transmit data over telephone lines? [June - 2019] c) Specialized search engine.
a) CPU b) Hub d) Intranet
c) Switch d) Modem
22. The concept of connect intelligence is derived from:
13. Identify the IP Address from the following: a) Virtual reality b) Fuzzy logic
a) 300.215.317.3 b) [email protected] c) Bluetooth technology
c) 202.50.20.148 d) 202-50-20-148 d) Value added networks
14. Virus type that is capable of transferring from one 23. Information and Communication Technology
computer to another without any ‘user interaction’ includes: [Sept-2020]
is known as [June - 2019]
a) On line learning
a) Worm b) Trojan b) Learning through the use of EDUSAT
c) Key logging d) Boot sector virus
c) Web Based Learning
15. A/An ------------- is a computer program that d) All the above
spreads by inserting copies of itself into other
24. Which of the following domains is used for – profit
executable code or documents [June - 2019]
businesses?
a) Operating system b) Computer Virus
a) net b) edu
c) Firewall d) Anti-virus
c) com d) org
16. Which of the following is a type of malware
25. Consider the following statements.
intentionally inserted into a software system that
Communication Technology
will set off a malicious function when specified 1) The World Wide Web emerged as a powerful
conditions are met? [June - 2019] mass medium in the 1980s.
Information and
Professor Academy
26. Match the two and give the answer by selecting the 2. What is bit rate? [Nov-2020]
appropriate code. a) Number of bits stored in computer
Set – I (Terms) Set – II ( Meanings) b) Number of bits per second that can be transmitted
over a network
a. Browsers i. Looking for c) Number of bits per hour stored in a computer
information on the over a network
internet d) Binary digit converted to Hexa Decimal number
b. Malicious spyware ii. Describes Trojan 3. Scrambling of data before transmission across a
application network to avoid manipulation by a third party is
c. Virus iii. Piece of software known as _____ [Nov-2020]
spreads itself to a) Protection b) Permutation
other computer c) Detection d) Encryption
d. Firmware iv. Several pieces of 4. Which one of the following allows a phone call to be
Hardware providing routed over network wires? [Nov-2020]
interfaces for high – a) Video conferencing b) Teleconferencing
level software. c) Optical Fibre d) VOIP
A B C D 5. Given below are two statements:[Nov-2020]
a) (i) (iii) (iv) (ii) Statement I: In peer-to-peer network, there is no
central server instead each computer can act as a
b) (ii) (iv) (iii) (i) server as well as a client.
c) (ii) (iii) (iv) (i) Statement II: LAN is a computer network
d) (i) (ii) (iii) (iv) created for individual person.
27. ___ is a Tool in Ms office which allows us to easily In the light of the above statements, choose the
modify one part of a document with unique data correct answer from the options given below:
elements in Data base.
a) Both Statement I and Statement II are true
a) cross reference b) Mail merge b) Both Statement I and Statement II are false
c) envelopes d) Labels. c) Statement I is correct but Statement II is false
28. What is the standard port number of HTTP d) Statement I is incorrect but Statement II is true
a) 83 b) 80 6. Given below are two statements, one is labelled as
c) 81 d) 82 Assertion A and the other is labelled as Reason R
Assertion A: Privacy and security of user data is at
Answer Key stake on the Internet
1 2 3 4 5 6 7 8 Reason R: No steps are being taken by the user for
b d d c b b b b the security and privacy of data
9 10 11 12 13 14 15 16 In light of the above statements, choose the most
c b b d c a b d appropriate answer from the following: [Nov-2020] Communication Technology
17 18 19 20 21 22 23 24 a) Both A and R are correct and R is the correct
explanation of A
d d a a b b d c
b) Both A and R are correct but R is NOT the correct
Information and
25 26 27 28 explanation of A
b d b b c) A is correct but R is not correct
d) A is not correct but R is correct
LEVEL 2 7. Given below are two statements: [Nov-2020]
1. The process through which an illegitimate website Statement I: A company-wide network closed to
pretends to be a specific legitimate website is known as public access, which uses internet-type technology
a) Sniffing b) Spoofing [Nov-2020] is called World Wide Web.
c) Back Doors d) War Dialing Statement II: MODEM is a device that enables a
4.45
Professor Academy
computer to communicate over telephone lines. a) Protocol,domain name of the host, path/file
In the light of the above statements, choose the b) Path/file, Protocol, domain name of the host
correct answer from the options given below: c) Protocol, path/file, domain name of the host
a) Both Statement I and Statement II are true d) Domain name of the host, protocol, path/file
b) Both Statement I and Statement II are false
13. Which of the following statements is/are correct?
c) Statement I is correct hut Statement II is false
d) Statement I is incorrect but Statement II is true i. WWW is a network of networks that first started
with four computer nodes.
8. Ankur receives an email informing him that his ii. WWW is a service that runs on the internet
credit card is going to be cancelled. The email Choose the correct option. [Dec-2019]
advises him to check on the provided link and sign a) i only b) ii only
into his online banking account to prevent this from c) Both i and ii d) Neither i nor ii
happening, which he does, A week later, Ankur
notices that ₹10,000 has been withdrawn from his 14. Which one of the following is the not same as the
bank account. What has Ankur fallen victim to? other three? (Jun - 2019)
a) A phishing scam b) A Trojan horse a) MAC Address b) Hardware Address
c) Online blackmail d) A virus [Oct-2020] c) Physical Address d)IP Address
9. Radha receives an email claiming that her credit card 15. IPv4 and IPv6 are addresses used to identify
account is about to be suspended unless she emails computers on the internet.
her credit card details and personal identification Find the correct statement out of the following:
number (PIN) immediately. What is this an example a) Number of bits required for IPv4 address is more
of? [Oct-2020] than number of bits required for IPv6 address
a) Spamming b) Phishing b) Number of bits required for IPv4 address is same
c) Virus Signing d) Scanning as number of bits required for IPv6 address
10. Given below are two statements – one islabelled as c) Number of bits required for IPv4 address is less
Assertion (A) and other as Reason (R) than number of bits required for IPv6 address
d) Number of bits required for IPv4 address is 64
Assertion (A): The internet is a collection of
inter connected computer networks, linked by 16. With respect to computers, which one of the
transmission medium such as copper wire, fibre following best describes phishing?
optic cables, wireless connections etc. a) A malicious program installed on a system that
Reason (R): World Wide Web is a collection of stays concealed to avoid detection
interconnected documents. b) A method of by passing normal authentication
In the light of the above stated two statements, procedures over a connection to a network
choose the correct option from the choices given c) A type of unsolicited bulk email of identical
below: [Dec - 2019] messages sent to numerous recipients
a) Both (A) and (R) are true is the correct explanation d) An attempt to acquire sensitive information
of (A) for malicious reasons, by masquerading as a
b) Both (A) and (R) are true (R) is not the correct trustworthy entity
explanation of (A)
17. What is spyware in respect of computer software?
c) (A) is true, but (R) is false
d) (A) is false, but (R) is true a) Software that aims to gather information about
Communication Technology
Professor Academy
18. Which of the following statements are correct 23. Given below are two statements. One labelled as
i. Google’s web browsers is called “Chrome” Assertion (A) and other is labelled as Reason (R).
ii. Apple’s web browser is called “safari” Assertion (A): The router’s primary responsibility is
iii. “Mozilla Firefox” is an open source web browsing to direct(route) data to the correct receiver.
software [Dec-2019] Reason (R): A Wi-Fi repeater, extender, or booster
a) i and ii only b) i and iii only is a device that forwards wireless signals from the
c) ii and iii only d) i, ii and iii router to cover a larger area.
In the right of the above two statements, choose the
19. In the context of IT/ICT, which one of the following correct answer:
statements about spamming is true? [June - 2019] a) Both (A) and (R) are true and (R) is the correct
a) Spamming is pasting or e-mailing unsolicited explanation of (A).
advertising messages to a wide audience b) Both (A) and (R) are true and (R) is not the
b) Spamming is sending lines of nonsensical garbage correct explanation of (A).
in a chat conversation c) (A) is true but (R) is false.
c) Spamming is posting a message that contains d) (A) is false but (R) is true.
graphic description of something offensive
d) Spamming is an attempt to acquire sensitive 24. Given below are two statements. One labelled as
information for malicious reasons, by Assertion (A) and other is labelled as Reason (R).
masquerading as trustworthy entity Assertion (A): Bluetooth is a wireless Personal
Area Network (WPAN) technology and is used for
20. Given below are two statements – one is labelled as exchanging data over smaller distances.
Assertion (A) and other as Reason (R) Reason (R): Maximum devices that can be connected
Assertion (A): Sniffing may be used to steal data or at the same time are 7 and it ranges up to 30 meters.
information over network. In the right of the above two statements, choose the
Reason (R): Sniffing is a process of monitoring and correct answer:
capturing all data packets passing through given a) Both (A) and (R) are true and (R) is the correct
network explanation of (A).
In the light of the above stated two statements, b) Both (A) and (R) are true and (R) is not the
choose the correct option from the choices given correct explanation of (A).
below: [June-2019] c) (A) is true but (R) is false.
a) Both (A) and (R) are correct explanation of (A) d) (A) is false but (R) is true.
b) Both (A) and (R) are true R is not the correct
explanation of (A) 25. Given below are two statements, one labelled as
c) (A) is true, but (R) is false Assertion (A) and the other as Reason (R):
d) (A) is false, but (R) is true Assertion (A): An Intranet is a private network
for sharing computing resources and information
21. Small plain text files that are written to your within an organization
computer’s hard disk by many of the Websites you Reason (R): Intranet is private version of the Internet
visit are called Choose the correct answer [Nov-2020]
a) RFIDs b) Web beacons a) Both (A) and (R) are true and (R) is the correct
c) GUI d) Cookies explanation of (A)
22. Which of the following statements is/are correct b) Both (A) and (R) are true but (R) is not the
with respect to Internet and Intranet? correct explanation of (A)
Communication Technology
4.47
Professor Academy
27. Which of the following is true about the wireless Choose the correct answer [Nov-2020]
networking?
a) (A), (C) only
(A) It is easier to expand the network b) (B), (C) only
(B) Data is less secured than wired system c) (A), (B), (C) only
(C) Reliability is more than wired d) (A), (B), (D) only
(D) Faster than wired network
31. Which of the following statement is / arecorrect?
Choose the correct answer [Nov-2020]
i) A Local Area Network (LAN) is usually located
a) (A), (B), (D) only b) (A), (B) only one brand of computer
c) (B), (C) only d) (A), (B), (C) only
ii) The acronym ‘ISP’ stands for Internet Standard
28. Consider the following incomplete sentences: 3G is Provider
a_______ range wireless technology. Some activities
Choose the correct answer
that require __________bandwidth cannot he
carried out by using 3G.Bluetooth is a______ range a) i only b) ii only
wireless technology which is used to connect devices c) Both i and ii d) Neither i nor ii
together for data transfer. Bluetooth is a_____ cost 32. Match List I with List II
means of data transfer. [Nov-2020]
List List
Complete the above sentences by choosing the
correct words in order from the following list: a. VOIP i) Makes use of lightpulses
0 transmit data
(A) Long (B) Low
(C) Short (D) High b. Fibre-optic cable ii) use of internet to make
phone calls
Choose the correct answer from the options given
below: c. URL iii) Most appropriate to
connect computers in a
a) (A), (D), (C), (B) b) (C), (D), (A), (B) small building
c) (C), (B), (A), (D) d) (A), (B), (C), (D)
d. UTP cable iv) Text used by web
29. P. Root kit is a collection of tools used to obtain browsers to locate a web
administrator – level access to a computer or a address on the internet
network of computers.
Choose the correct answer [Dec-2019]
Q: Botnet is a group of computers connected to
the Internet that have been compromised by a a) a-ii, b-iv, c-i, d-iii
hacker using a computer virus or Trojan horse. b) a-ii, b-i, c-iv, d-iii
c) a-iii, b-i, c-iv, d-iii
R: Computer Virus is a software program that
d) a-iii, b-i, c-iv, d-ii
can copy itself from one computer to another,
without human interaction.
Answer Key
Choose the correct answer from the options given
below: 1 2 3 4 5 6 7 8
a) P only b) Q and R only b b d d c c d a
c) P and Q only d) P and R only 9 10 11 12 13 14 15 16
Communication Technology
Professor Academy
➢ Subjects: subject is a description of the topic of
E-MAIL
the message and displays in most email systems
Electronic mail (also known as email or e-mail) that list email message individually.
is one of the most commonly used services on the ➢ Sender (From): This is the sender’s Internet
Internet, allowing people to send message to one email address. It is usually presumed to be the
or more recipients. Email was invented by Ray same as the Reply – to address, unless a different
Tomlinson in 1972 Email (Electronic mail) is a way one is provided.
to send and receive message across the Internet. We ➢ Date and time received (on): The date and time
can send and receive text, document files, image the message was received.
files, and audio files – in fact, any files at all. One big ➢ Reply – to: this is the Internet email address that
advantage is, unlike using the telephone; the recipient will become the recipient of your reply if you
does not have to be present when a message is sent click the Reply button.
to them. They can read incoming mail and reply (if ➢ Recipient (To): First / last name of email
necessary) at their own time.
recipient, as configured by the sender.
➢ Recipient email address: The Internet mail
Parts of an Email Address
address of the recipient, or where the message
The following are three major parts of an email was actually sent.
address: ➢ Attachment: Files that are attached to the
1. Username: The first part of an email address is message.
the username. This is the unique name that you ➢ Body: The body of a message contains text that is
or your ISP selects. This can be your real name the actual content. The message body also may
or a nickname. The username must be unique. include signatures or automatically generated
No two people or organizations can have the text that is inserted by the sender’s email system.
same username with the same provider. ➢ Address books allow easy access to the user’s
2. @ Symbol: An “at” or “@” symbol is the second friends, family, business associates and others by
part of an email address. This fits in between the maintaining their email and other contact details.
username and the domain of your email address.
When you insert the symbol, your email program
recognizes the character and sends the email to
the domain name the follows it.
3. Domain: The last part of an email address is
the domain, which can be broken down into
two portions: the mail server and the top-level
domain. The mail server is the server hosting
the email account. For example, Gmail email
accounts use “Gmail” as the server name. The
top – level domain is the extension such as, .Com,
.net or .info. Emails from educational institutions
Communication Technology
often have the edu extension, while employees of
a government agency use a gov extension.
Information and
sent along with it. The first email was sent by Ray POP3 (Post Office Protocol 3) is the most recent
Tomlinson to himself in 1971. version of a standard protocol for receiving e-mail.
The Drafts folder retains copies of messages that POP3 is a client/server protocol in which e-mail is
you have started but are not yet ready to send. received and held for you by your Internet server.
Hotmail, a free e-mail service provided by Periodically, you (or your client e-mail receiver)
Microsoft which was established in 1995 was co- check your mail-box on the server and download any
founded by an Indian American entrepreneur Sabeer mail, probably using POP3. This standard protocol is
Bhatia along with Jack Smith in July of 1996. built into most popular e-mail products.
Professor Academy
Hyper Text Transfer Protocol (HTTP)- Port Simple Mail Transfer Protocol(SMTP)
Number -80 An SMTP server is an application that’s primary
HTTP (Hypertext Transfer Protocol) is the set purpose is to send, receive, and/or relay outgoing
of rules for transferring files, such as text, graphic mail between email senders and receivers. When
images, sound, video, and other multimedia files, on you send an email, the SMTP server processes your
the World Wide Web. As soon as a Web user opens email, decides which server to send the message to,
their Web browser, the user is indirectly making and relays the message to that server.
use of HTTP. HTTP is an application protocol that Multi – Purpose Internet Mail Extension(MIME)
runs on top of the TCP/IP suite of protocols (the
foundation protocols for the Internet). MIME is an expansion of an email system to include
more detailed aspects such as the use of attachments,
File Transfer Protocol (FTP) - Port Number -21
whether these are audio, images or videos for
FTP stands for File transfer protocol.FTP is a instance.
standard internet protocol provided by TCP/IP used
for transmitting the files from one host to another. EMAIL ABUSE AND SPAM
It is mainly used for transferring the web page files Spam also known as junk email is when unsolicited
from their creator to the computer that acts as a messages are sent by email. Superfluous Pieces of
server for other computers on the internet. It is also Additional Mail.
used for downloading the files to computer from Spammer is an individual or an entity (group of
other servers. individuals or a company) that sends spam emails.
Internet Control Message Protocol (ICMP) Email Phishing where private data is captured.
ICMP (Internet Control Message Protocol) is Email Spoofing is when an email message is sent
an error-reporting protocol. Network devices like with a forged sender.
routers used to generate error messages to the source Email Worms Email Worms spread through
IP address when network problems prevent delivery malicious email as an attachment or a link of a
of IP packets. ICMP creates and sends messages to malicious website.
the source IP address indicating that a gateway to
the Internet that a router, service or host cannot be
reached for packet delivery. Any IP network device
has the capability to send, receive or process ICMP
Self Evaluation
messages.
LEVEL 1
Internet Message Access Protocol (IMAP) - port
number 993 1. An unsolicited e-mail message sent to many recipients
at once is a [Nov-2020]
The IMAP architecture enables users to send a) Inbox b) Spam
and receive emails through a remote server, without c) Virus d) Attack
support from a particular device. This type of email
2. The convenient place to store contact information
access is ideal for travellers receiving or answering
for quick retrieval in e-mail is: [June - 2019]
Communication Technology
emails from their home desktop or office computer.
a) Address box b) Message box
This term is also known as interactive mail access
c) Address book d) Message book
Information and
4.51
Professor Academy
5. When sending an e-mail,the line describes the 5. Which of the following is the appropriate format of
contents of the message. URL of e-mail?
a) To b) Subject a) www_mail.com b) [email protected]
c) Contents d) CC c) [email protected] d) www.mail.com
6. Given below are two statements. One labelled as
Answer Key Assertion (A) and other is labelled as Reason (R).
1 2 3 4 5 Assertion (A): The attached file in an email, could
b c d d b be potentially dangerous to the receiving computer
if it contains Virus.
Reason (R): Virus is harmful for the system as it
LEVEL 2 may enter the system but not corrupt the files.
choose the correct answer:
1. Which of the following is not suitable in the context of
a) Both (A) and (R) are true and (R) is the correct
E-mail? [Dec - 2019]
explanation of (A).
a) It is a letter sent over a computer network b) Both (A) and (R) are true and (R) is not the
b) It can be used to send unsolicited message correct explanation of (A).
c) E-mail is snail-mail c) (A) is true but (R) is false.
d) E-mail address includes domain name d) (A) is false but (R) is true.
2. While sending an e-mail, to differentiate among 7. Given below are two statements. One labelled as
to: Cc: and Bcc: fields, which one of the following Assertion (A) and other is labelled as Reason (R).
statement is True? [June - 2019]
Assertion (A): Set of communication guidelines
a) Recipients in the to: field can see the email that allows the software to transmit an electronic
addresses that are in the Bcc: and Cc: fields. mail over the internet is known as SMTP
b) Recipients in the Cc: field can see the email Reason (R): POP or IMAP are used to retrieve those
addresses that are in the to: and Bcc: fields mails at the receiver’s side.
c) Recipients in the Bcc: field can see the email choose the correct answer:
addresses that are in the to: and Cc: fields a) Both (A) and (R) are true and (R) is the correct
d) Only the recipients in the Cc: field can see the explanation of (A).
other email addresses in the Bcc: field b) Both (A) and (R) are true and (R) is not the
3. Why would BCC: be used in an e-mail? correct explanation of (A).
c) (A) is true but (R) is false.
a) BCC: allows the recipient to identify all the other
d) (A) is false but (R) is true.
recipients in the list when a group email address
is used 8. Consider the following statements.
b) BCC: allows the sender to indicate who the email 1) Recipients in CC (carbon copy) will always know
is for if there is more than one recipient all the other recipients.
c) BCC: allows recipients to be visible to all other 2) Recipients in BCC(Blind carbon copy) will know
recipients of the message all the recipients in to& CC.
d) BCC: allows the sender of a message to conceal Which of the following statements is/are correct?
the recipient entered in the BCC: field from the a) Only Statement 1
other recipients. [june-2019] b) Only Statement 2
Communication Technology
4. POP3 and IMAP are e-mail accounts in which c) Both Statements 1 and 2
d) Neither Statement 1 nor Statement 2
a) One automatically gets one’s mail everyday
Information and
Professor Academy
AUDIO AND VIDEO CONFERENCING Document .pdf, .doc, .docx, .xls, .xlsx, .ppt, .pptx
Web .html, .xml, .php, .jsp, .asp, .aspx
Database .xml, .tar, .sql, .db, .dbf, .dat, .csv
Audio Conferencing
Program .bat, .com, .exe
Audio conferencing is where two or more people in Text file .csv, .rtf, .txt, .text, .doc, .docx
different locations use technology to connect bridge
Difference between .doc and .docx
to hold an audio call. Audio conferencing is different
from a traditional phone in that all participants dial .doc - Microsoft Word document before - Word 2007
into a central system that connects them instead of .docx - Microsoft Word document (start with 2007)
directly calling each other. Audio conferencing aims Video Compression
at achieving communications and collaboration Video compression is the process of reducing the
simultaneously. Many audio conferencing products total number of bits needed to represent a given
may also come with online collaboration elements image or video sequence. Video compression is most
standard or optional, like screen-sharing capabilities, commonly performed by a program with a specific
to further enhance the value of audio meetings. algorithm or formula for determining the best way to
Video Conferencing shrink the size of the data.
File Formats and Extensions a) Text and Audio b) Video and Audio
c) Video only d) Text, Audio and Video
DATA FILE FORMAT
4. Which of the following file format is not a video file
Video .avi, .mov, .mp4, .wmv, .mkv format? [June - 2019]
Image .jpg, .jpeg, .jpeg2000, .png, .gif, .ico, a) .AVI b) .MOV
.webp, .tiff c) .MP4 d) .JPEG
Sound/ .mp3, .wma, .m4a, .ogg, .amr, .aac,
Audio .wav, .midi
4.53
Professor Academy
5. Select the options it contains exclusively the text file a) a, b, d&e b)a, b, c&e
formats [Dec - 2019] c) a, b, c&d d) a, c&d
a) JPEG,MP3,RTF b) CSV,RTF,TXT 3. Given below are two statements. One labelled as
c) GIF,JPEG,MP3 d) CSV,MP3, PDF Assertion (A) and other is labelled as Reason (R).
6. gif. jpg, bmp, png are used as extensions for files Assertion (A): Email and Forums employ only
which store [Dec - 2019] asynchronous communication.
a) audio data b) image data Reason (R): The term asynchronous is usually used
c) video data d) text data to describe communication in which data can be
transmitted intermittently.
7. In Audio and Video compression, the term RGB In the right of the above two statements, choose the
means: correct answer:
a) Red, Grey, Blue b) Red, Green, Blue a) Both (A) and (R) are true and (R) is the correct
c) Red, Green, Black d) Red, Grey, Black explanation of (A).
8. Select the option that includes file formats suitable b) Both (A) and (R) are true and (R) is not the correct
for distributing sound files across the Internet. explanation of (A).
c) (A) is true but (R) is false.
i.mp4 ii. wmv
d) (A) is false but (R) is true.
iii. wma iv. mp3
v. midi vi. Wav 4. Consider the following statements.
a) i, ii, iii, iv b) ii, iii, v, vi 1. Computer with access to the internet is
c) i, iii, iv, v d) iii, iv, v,vi most essential requirements for video/audio
conferencing .
Answer Key 2. Browsers, Speakers, Microphone and Web
1 2 3 4 5 6 7 8 camera are optional requirements for video/audio
conferencing.
a b d d b b b d
Which among above is/are correct?
a) Only 1 b) Only 2
LEVEL 2 c) Both 1 and 2 d) Neither 1 nor 2
1. Select the option for distributing sound files across the Answer Key
Internet. [Dec-2019]
a) Wmv.mp4.wma.mp3 b) Avi,midi,wav,mp3 1 2 3 4
c) Avi,mov,wmv,mp3 d) Midi,wav,wma,mp3 d a a a
2. Select the option that includes audio file formats
a. MP3 b. WAV c. MP4 d. AIFF e. AU
Select the most appropriate answer from the
following code:
DIGITAL INITIATIVES IN HIGHER EDUCATION
[REFER IN HIGHER EDUCATION UNIT]
Communication Technology
Information and
“To succeed in your mission, you must have single-minded devotion to your goal” - APJ Abdul Kalam
Professor Academy
government of any country is the biggest business, the transaction may fall under B2G
employer and so it also deals with employees on ecommerce. Let’s say a city or town hires a
Information and
a regular basis, as other employers do. ICT helps web design firm to update its website. This
in making the interaction between government type of deal may be considered a form of B2G.
and employees fast and efficient, along with
raising their level of satisfaction by providing 7. Consumer to government (G2C) –
perquisites and add-on benefits. Consumers can also engage in B2C
E-governance has a great role to play, that ecommerce. People paying for traffic tickets
improves and supports all tasks performed or paying for their car registration renewals
by the government department and agencies, online may fall under this category.
4.55
Professor Academy
Answer Key
Communication Technology
1 2 3 4
d a a d
Information and
LEVEL 2
1. Regarding E governance, which of the following
statements is / are correct? [Dec-2019]
i. Decreasing transparency is an ICT enabled
advantage of E-Governance
ii. E-Governance is related to the implementation of
ICT in the government processes and functions.
Professor Academy
4.57
Professor Academy
VPN Virtual Private Network SDI Selective Dissemination of
SEO Search Engine Optimization Information
IP Internet Protocol CCITT Consultative Committee for
ASR Automatic Speech Recogni International Telephony and
Telegraphy
ATM Automated Teller Machine
BCD Binary Coded Decimal LAN Local Area Network (Dec-2006)
BIS Business Information System CD-I Compact Disc Interactive
BPS Bits Per Second CDS Computerized Documentation
DVD Digital Versatile Disc (Jan-2017) System
CAD Computer Aided Design ISIS Integrated Set of Information Systems
CAM Computer Aided Manufacturing CGI Common Gateway Interface
CASE Computer Aided Software CIT Computer Information Technology
Engineering CD-ROM Compact Disc Read-Only Memory
CPS Character Per Second DDC Display Data Channel / Dewey
CROM Control Read Only Memory Decimal Channel
CRT Cathode Ray Tube RAM Random Access Memory (Dec-2007)
DPI Dots Per Inch (Dec-2018) ECTD Electronics, Computer &
DTP Desk Top Publishing Telecommunication Department
FM Frequency Modulation EDVAC Electronic Discrete Variable
ISO International Standard Organization Automatic Computer
LCD Liquid Crystal Display (June- 2019) ES Expert Systems
MICR Magnetic Ink Character Recognition FDM Frequency Division Multiplexing
OCR Optical Character Recognition HW Hard Ware
OMR Optical Mark Reader IBM International Business Machine
PCB Printed Circuit Board IM Instant Message
PDF Portable Document Format I/O Input/output
PIN Personal Identification Number INDEST Indian National Digital Libraries in
PPP Point-to-Point Protocol Engineering Science & Technology
URL Uniform Resource Locator IRC Internet Relay Chat
VDU Visual Display Unit (Dec-2019) IRPHE Institute for Research and Planning in
Wi-Fi Wireless Fidelity Higher Education
AI Artificial Intelligence ISD International Subscriber Dialling
CCT Computer Communication IS & R Information Storage and Retrieval
Communication Technology
4.59
Professor Academy
ACS Automatic Configuration Service DLL Dynamic Link Library
ACTS Advanced Communications DNS Domain Name Server
Technology Satellite DNS Domain Name System (Dec-2018)
ADDS Application Data Delivery Service DVB Digital Video Broadcasting
ADLC Asynchronous Data Link Control FDMA Frequency Division Multiple Access
ADT Asynchronous Data Teleservice GAT Generic Application Template
AIN Advanced Intelligent Network AUP Acceptable Use Policy
PDU Protocol Data Unit EGP Exterior Gateway Protocol
RFID Radio Frequency Identification GPU Graphics Processing Unit
(Dec-2018) GWT Google Web Toolkit
ALI Automatic Location Identification ARP Address Resolution Protocol
ANI Automatic Number Identification AAA Authentication Authorization,
API Application Programming Interface Accounting
APS Asynchronous Protocol Specification ACP Airline Control Program
ASIC Application Specific Integrated ASIC Application-Specific Integrated
Circuit Circuit
ASP Application Service Provider AVC Advanced Video Coding
ASR Automatic Speech Recognition AVI Audio Video Interleaved
BCC Blind Carbon Copy AWT Abstract Window Toolkit
WORM Write Once Read Many (Dec-2019) WOS Web of Science (Dec-2019)
BER Bit Error Rate BINAC Binary Automatic Computer
BSC Base Station Controller CLI Command Line Interface
BSC Binary Symmetric Channels CLR Common Language Runtime
BSS Broadcasting-Satellite Service DRAM Dynamic Random-Access Memory
CARE Computer Aided Reverse SRAM Static Random-Access Memory
Engineering DHTML Dynamic Hypertext Markup
CAS Customer Alert Signal Language
CCSN Common Channel Signalling DIP Dual In-line Package
Network
DIMM Dual Inline Memory Module
CDMA Code Division Multiple Access
DVI Digital Visual Interface
CORBA Common Object Request Broker
GIF Graphics Interchange Format (June
Architecture
2013)
CSMA Carrier Sense Multiple Access
IPS Instruction Prevention System
Communication Technology
networking, software, analytics, and intelligence- It is a software that may have been installed on
over the Internet (“the cloud”) to offer faster your computer by a remote computer, i.e. via the
Information and
innovation, flexible resources, and economies of Web. Many free utilities that you download from
scale, you typically pay only for cloud services you the Internet will install hidden software that sends
use, helping lower your operating costs, run your details of the websites you visit and other information
infrastructure more efficiently and scale as your from your computer (which can include your email
address) to advertisers so they can target you with
business needs change. popup ads and spam.
Cloud computing is taking the world by storm.
AJAX
In fact, 94% of workloads and compute instances will
vbe processed through cloud data centers by 2021, Abbreviation for Asynchronous JavaScript and
XML
4.61
Professor Academy
It is a web programming tool which makes it AVI
possible to create interactive web applications. AJAX Abbreviation for Audio Video Interleave
is a programming tool that is used extensively in (or Interleaved). A file format for storing video
what are known as web 2.0 applications. recordings on a computer. See ASF, MOV, MPEG,
Anchor RM, which are alternative video file formats.
A term used in connection with HTML, the Backup
coding system used for creating Web pages. An Used as a verb, to back up means to copy a File
anchor is the target of a Hyperlink. i.e. A point in a or Folder from your computer to another Storage
Web document to which you jump when you click Device e.g. a CD-ROM.
on a hyperlink. Bandwidth
Animation The amount of data that can be sent from one
The display of a sequence of images in a computer computer to another through a particular connection
program or on a Web page to give the impression of in a certain amount of time, e.g. via a computer to
movement. the Internet and vice versa. The more bandwidth
ANSI available, the faster you are able to access information.
Bandwidth is usually measured in kilobits per
Abbreviation for American National Standards second(Kbps) or megabits per second(Mbps).
Institute. This is a system that specifies code numbers
for all the characters that appear on a computer Baud
Keyboard, plus the extended character set used in A unit of measurement at which data can be
Microsoft Windows. transferred (i.e. the baud rate), for example over a
Apache telephone line via a Modem or from a computer to an
external device such as a Printer. Rarely used nowadays,
It is the most popular web server software on as transfer rates are normally expressed in kilobits per
the World Wide Web. Apache mainly runs on UNIX second (Kbps) or megabits per second (Mbps).
systems.
Binary File
API
Strictly speaking all computer files are Binary,
An Application Programming Interface (API) is consisting of a string of ones and zeroes, but the term
a tool set that programmers can use in helping them binary file is often used to differentiate program files
create software. Example is the Apple (iOS) API and data files.
that’s used to detect touchscreen interactions. APIs
are tools. They allow you as a programmer to deliver Blended Learning
solid solutions fairly rapidly. This term normally refers to combining Internet-
Applet based distance learning with face-to-face tuition but
it may also be used to describe combining offline
It is a small program written in the Java progr- ICT-based materials with more traditional materials,
amming language and embedded in a web page. such as books, audiocassettes and videocassettes.
When we use our browser to access a web page,
an applet may run inside the web page, as it were Blog
to perform an interactive animation and make a A blog (short form for web log) is an online
calculation or carry out another simple task. diary in which an individual records and publishes
Archive his/her thoughts on one or more subjects. A blog
can contain news items, short essays, annotated
It is used to describe the documents or files
Communication Technology
an external hard disc, such as CD-ROM, DVD or often take the form of a journal or diary. Blogger
other storage devices. refers to someone who blogs, i.e., who regularly
writes blogs.
Asynchronous
Back Door
“Not at the same time”. Often used to refer to
communication by Email or via a Discussion List, A backdoor refers to any method by which
where the recipients of the email or the participants authorized and unauthorized users are able to get
in the discussion do not have to be present at around normal security measures and gain high
the same time and can respond at their own level user access on a computer system, network or
convenience. software application.
Professor Academy
Broadband Clipart or Clip Art
A general term used to describe a high-speed A collection of image files that can be embedded
connection to the Internet. Connection speed is or inserted into Web pages, word-processed
usually measured in Kbps (kilobits per second) and documents, PowerPoint presentations, etc.
Mbps (megabits per second). Typically, a home user Clipboard
will have a broadband connection using an ADSL
telephone line running at 2Mbps to 8Mbps. A temporary storage area in a computer’s memory.
It may be used, e.g. to store text that we are in the
Bulletin Board process of copying and pasting from one section of a
A type of forum on the Internet or an intranet, word-processed document to another section in the
where users can post messages by email or via the same document or to another document.
World Wide Web for other users to read and respond Compatibility
to.
Pieces of hardware or software which are
CEF capable of being used together are described as
Shortened abbreviation for the Common compatible
European Framework of Reference for Languages.
Compression
CGI Script
A technique which reduces the amount of space
A term used by Web authors. CGI is an required to store data, e.g. as used to reduce the
abbreviation for Common Gateway Interface. A amount of space needed to store an image, an audio
program residing on a Web Server, usually in a recording, or a video recording.
directory called cgi-bin, which processes data from
an HTML form. CGI scripts can be written in any Computer Assisted Instruction (CAI)
programming language suitable for handling text A term used mainly in the business world.
data, but Perl (http://www.perl.com) is the most Implies a top-down, instructor-centred approach to
popular scripting language. teaching with computers and is closely associated
Character User Interface (CUI) with Programmed Learning.
A Character User Interface describes a way Computer Based Training (CBT)
in which a computer user communicates with A term used mainly in the business world.
a computer by entering commands as text, i.e. Implies a top-down, trainer-centred approach to
In order to run programs and to carry out other teaching with computers and is closely associated
operations such as copying information from one with Programmed Learning.
Folder to another, deleting files, etc. Contrasted
Computer Program
with a Graphical User Interface (GUI), e.g.
Microsoft Windows, which allows the user to carry A set of instructions that the computer carries out
out such operations by clicking on icons, opening in sequence to perform a given task. Programs are
and shutting windows and dragging and dropping written in English-like programming languages (e.g.
with a mouse. MS DOS and Unix are examples of C, Pascal), are then converted into binary machine
CUIs. See Icon, Mouse, Operating System, Window, instructions via a compiler or an interpreter.
Windows. Cookie
Chat Room A piece of information stored on a user’s
A synchronous, mainly text-based comm- computer by a Web Browser when the user visits a
Communication Technology
unication facility, offering a Web-based environment website for the first time. Websites use cookies to
where people either drop into or arrange to meet and recognise users who have previously visited them.
Information and
chat at specific times. We type in our text online, it The next time that the user visits that site, the
is seen almost immediately by others online at the information in the cookie is sent back to the site so
same time who respond online in real time. that the site can tailor what it presents to the user,
Client e.g. favorite in music or shopping habits.
A computer that receives services from another Copyright
computer. A stand-alone computer on your desk New technologies have raised all kinds of new
which we use to browse the Web is a client, and the issues relating to copyright. mainly it has become
computers from which World Wide Web files are so easy to copy materials from a variety of digital
downloaded to your computer are servers. sources.
4.63
Professor Academy
Crawler Dots Per Inch (DPI)
A crawler is a program that searches the Web for The definition of DPI is the same as PPI. DPI
new links, new content and changes in order to keep is used to measure the number of points which is
Search Engine results up to date. equivalent to 1 inch. Because in a printer, dots per
Cursor inch means the number of ink dots per inch. DPI
The pointer which appears on screen and is can be higher and lower depending on the printer’s
controlled by a pointing device, such as a mouse. The characteristics are show less.
cursor usually has the shape of an arrow. Domain Name
Cyber Venting A unique name that identifies a Website. A
Cyber-venting is the act of bad-mouthing about domain name can be purchased from registered by a
one’s employer, senior executives, colleagues, etc. with domain name registration company, Eg : http://www.
the intention of letting off the steam, using websites amenworld.com. Such companies also provide a
and making such comments public for all to see them. service that will check if a required name is available
While the websites do not restrict the mentioning of for purchase. Domain names always have two or
the name of the employer and company or its address. more parts, separated by dots.
It allows for the anonymity of the employee who posts
the comments. This poses trouble for the companies Desktop Publishing (DTP)
to track down the employees who posted them. The Desktop publishing is the creation of documents
negative statements affect the company’s images and using page layout software on a personal computer.
the posting of confidential information on the internet Initially, It was exclusively used for print publications,
will adversely affect the companies and benefit its but now it also assists in the creation of various forms
competitors. of online content.
Dynamic Microphone
Using a website to pour out one’s grievances is
This type of microphone is often used in
also called a cyber venting.
multimedia CALL programs when the learner has
Defragmentation to record his/her own voice. The main drawback
Defragmentation, also known as “defrag” or of this type of microphone is requires considerable
amplification and may result in very faint playback
“defragging” is the process of reorganizing the data on some systems. This type of microphone is often
stored on the hard drive so that related pieces of data popularly referred to as a karaoke microphone.
are put back together, all lined up in a continuous Encryption
fashion. A system of coding that helps prevent access to
Digital Camera private information on computer networks or on the
A camera used for taking still photographs - but Web.
some digital cameras can also record short sequences End-user
of moving images. A digital camera looks much the The final user of a piece of Software or Hardware
same as an ordinary camera but stores photographs i.e. the individual person for whom the product is
in electronic format so that they can be uploaded created, as distinct from the people who create and
computer via a USB cable to a computer. produce the product.
Communication Technology
Dithering: E-Feedback
The technique of combining dots of primary Electronic feedback loops are used to control the
Information and
colours to give the appearance of intermediate output of electronic devices, such as amplifiers. A
colours. Dots are combined in a square area, known feedback loop is created when all or some portion of
as a dither matrix, to simulate a dot of an intermediate
the output is fed back to the input. A device is said to
colour.
be operating open loop if no output feedback is being
Digital Divide
employed and closed loop if feedback is being used.
A society which is dependent on technology can
E-Tendering
create inequality. The gap between those who have
access to the latest technology and those who do not On-line Digitally signed E-Tenders are invited
is called the ‘digital divid. in two Bid System from Manufacturers / authorized
Professor Academy
dealers for “Supply of Computer System with File
Monitor & Laptops at National Science Centre, A file in computer jargon can be used to describe
Delhi”. The experienced / eligible manufacturers/ many different things. It may be a Computer Program,
reputed authorized dealers may download the tender a document file created with a Word-processor, an
documents from the Central Public Procurement image file, an audio file, a video file, etc. Think of it
Portal. in the same way as we would think of a file in a filing
cabinet. A file has a name that describes what it is,
The online bid both Technical Bid and Financial and the file is stored in a place where we can easily
Bid, should be uploaded by the due date and time as find it.
per the above schedule. The responsibility to ensure Firewire
the same lies with the bidders. Off-line tenders shall A firewire is a facility that allows you to transfer
not be accepted and no request in this regard will be video recordings very quickly from one device
entertained whatsoever. to another, e.g. from a Camcorder to a computer,
Extension using a special cable that connects to the computer’s
firewire socket. Many modern computers already
In computer jargon an extension is an optional have a firewire socket built in.
addition, usually consisting of a dot plus three or
four letters, to the name of a File. The extension Firmware
to the filename helps the computer (and the user) Software that has been written to a ROM (Read
recognise what type of file it is and what it may Only Memory) chip by the manufacturers.
contain, e.g. .doc is a Word document file, .exe is a Flash Drive
computer program, .jpg or .jpeg is a picture file, and A portable Storage Device. Flash drives look like
.htm or .html is a Web page file. a small flat pen, around 3cm to 5cm long, and are
E-health easily carried in your pocket. Their storage capacity
It is also called e-health care, use of digital is impressive; 4GB to 8GB is not unusual these days.
technologies and telecommunications, such as They are used to store data that you wish to carry
computers, the Internet, and mobile devices, to around, e.g. a PowerPoint presentation, and they can
facilitate health improvement and health care be plugged into any computer with a USB socket.
Flash drives are also commonly referred to as pen
services.
drives or memory sticks.
Favourites Flash Player
A facility within the Internet Explorer Browser Software produced by Adobe for the development
that enables you to keep a record of Web pages that and viewing of animated and interactive sequences
you have visited and may wish to visit again. Also on the Web.
known as bookmarks.
Folder
Feedback
An alternative word for a directory and which
Feedback is an automatic response from a has become more common since the introduction
computer, which may take the form of text, image,
of Windows. It describes a location on a disc which
audio and video or any combination of these, to a
contains a set of related files. A folder can be divided
learner’s input. Input from the learner may take
various forms, e.g. into sub-folders.
i. clicking with the mouse to select an answer in Font
Communication Technology
a multiple-choice exercise. The terms font (also spell fount) and typeface
ii. Typing an answer at the computer keyboard. are often confused or interchanged. Font refers to a
Information and
older Apple Mac interface are GUIs. Contrasted use. Programs are normally supplied on CD-ROM
with Character User Interface (CUI), an older type or DVD, but they may also be downloaded from the
Information and
of interface which required the user to control the Web, either free of charge or on payment.
computer by typing commands at the Keyboard. Integrated Circuit
Hacker An electronic circuit etched onto a small piece
A person who spends their time trying to gain of silicon which has been subjected, using photo-
access to information stored on other people’s masking processes, to controlled “doping” with
computers all around the world. Some hackers are certain impurities. Particular areas of the chip can
just harmless browsing types, but other have more then be made to act like electronic components such
invidious aims such as grabbing details of your credit as diodes, capacitors and resistors.
Professor Academy
Internet Inequality JPEG or JPG
The Digital Divide refers to the gap between Joint Photographic Expert Group. Pronounced
those able to benefit from the internet and those “Jaypeg”, a file format used for storing images.
who are not. The matter of closing the digital divide The JPEG/JPG format uses a palette of millions of
nowadays includes the matter of how emergent colours and is primarily intended for photographic
images. The internal compression algorithm of the
technologies such as Artificial Intelligence, robotics
JPEG/JPG format, unlike the GIF format, actually
and internet of things can help societies. throws out superfluous information, which is why
Interactive Video (IV) JPEG/JPG files containing photographic images end
A system consisting of a computer connected to up smaller than GIF files containing photographic
a 12-inch videodisc player, allowing the presentation images.
of still images or video clips combined with some LCD
kind of interactivity, e.g. carrying out a set of Liquid Crystal Display, a technology used for
exercises linked to the images or to the video clips. producing a type of flat panel computer Display
Interface Screen, which is replacing the older type of Cathode
An interface in computer jargon is a connection Ray Tube display screen. A more advanced form of
between two systems. It can be Hardware or Software. technology for producing flat panel display screens
It may take the form of a plug, cable or socket, or is known as TFT (Thin Film Transistor). LCD and
all three, for example where a Printer or Scanner is TFT screens are also used in digital cameras and
connected to a computer, and then it’s a hardware camcorders.
interface. There are also software interfaces that Learning Platform
enable one program to link with another, passing This term is used to describe the software and
across data and variables. The term interface, also systems that are used to deliver E-learning. Some
known as user interface, also describes the software confusion surrounds this term: sometimes it is used
that is used to enable human beings to communicate synonymously with Virtual Learning Environment
with a computer, for example Microsoft Windows, (VLE) and sometimes with Managed Learning
which is a Graphical User Interface (GUI) in Environment (MLE). Many people use it as a catch-
common use on personal computers. all term to describe software and systems designed
iPod to manage, deliver and provide access to E-learning
The name of a portable (mobile) Media Player materials.
designed and marketed by Apple. The iPod first Linux
appeared in 2001. As well as being capable of storing The Unix-type Operating System, similar to
and playing back audio recordings, newer models Windows and the Apple Mac operating system.
can also record and play back video. The iPod has Linux was originally created by Linus Torvalds
become popular for storing recordings, mainly music with the assistance of developers around the world.
downloaded from the Web or transferred from audio The Source Code for Linux is freely available to
CD to a computer and then moved across to an iPod everyone.
using a software package known as iTunes. Lurker
Internet Commercials It is mainly used in connection with a Discussion
Delivering ads to Internet users via websites, List, Forum or Blog. This term describes someone
email, ad-supported software, text messaging who prefers to read other people’s messages rather
Communication Technology
and Internet-enabled cellphones. Also called an than posting their own views.
“ad network” or “ad serving network,” Internet Machine Assisted Translation (MAT)
Information and
advertising organizations act as a middleman The use of computers to assist human beings in
between the advertiser and the Internet venues that the process of translating natural language. MAT
display the ads. systems are normally used as only aids for human
translators who have to intervene in the process of
ISDN translation by machine, making corrections and
Integrated Services Digital Network, a type of amendments as necessary. Contrasted with Machine
digital telephone service, used for transferring large Translation (MT), which normally describes a fully
chunks of data to and from the Internet without a automatic process.
Modem.
4.67
Professor Academy
Machine Code transistors etched on to its surface, connected to
The machine-readable form of a computer the Motherboard by an array of pins at its base.
program, produced by conversion of the human- Microsoft Office: A suite of programs produced
written program (source code) into binary code by a by Microsoft Corporation, comprising a Word-
compiler or interpreter. processor (Word), a Spreadsheet (Excel), a
Macro Presentation Program (PowerPoint), an Email
A sort of mini-program that can be package (Outlook), a Database program (Access),
incorporated into other programs, comprising a and a Desktop Publishing package.
series of keystrokes that you may wish to use over MIDI
and over again. For example, if you perform a task Abbreviation for Musical Instrument Digital
repeatedly in Microsoft Word, you can automate Interface. A format for synthesised music. Music in
the task using a macro. A macro is a series of MIDI format is created and played through the use of
commands and instructions that you group synthesisers, unlike “real” music which is normally
together as a single command to accomplish a task recorded in MP3, WMA or WAV format.
automatically.
MP3
Media Player
Abbreviation for MPEG Layer 3. MP3 is a file
It is used in two main senses: (1) A program format for storing high-quality audio files that can
that enables your computer to record, store and play be played back on computers and portable media
back audio and video recordings; (2) A device such
players such as the iPod. MP3 has the advantage of
as the portable iPod media player that is also used to
taking up far less storage space than the WAV format
record, store and play back recordings.
without loss of quality.
Memory Stick
A small electronic card, also known as a memory MP4
card, which is inserted into a Digital Camera or The MPEG-4 is a file format. There are two basic
Camcorder for storing photographs or movie files types of MP4: MP4 AAC (Advanced Audio Coding)
that can then uploaded to a computer. This term is and MP4 AVC (Advanced Video Coding). The MP4
also used as an alternative to Flash Drive. AAC file format is used to store audio files in a more
Menu manageable size without affecting the quality. The
MP4 AVC file format is used to store video files in a
A list of options from which a computer user
more manageable size wihout affecting the quality. It
makes a selection in order to determine the course
of events in a program. This usually involves keying is also increasingly being used for storing video on
in a single letter or number, or selecting text or an iPods and similar portable devices. Ex- MPEG.
Icon with a Mouse. MPEG or MPG
Menu Bar Motion Picture Expert Group is Pronounced as
Most computer programs display a menu bar or “Empeg”. A standard file format for storing movies
set of menu bars at the top of the screen, from which in digital format and high-quality audio files in a
choices can be made by the user to carry out certain variation known as MP3. Video files stored MPEG
operations, e.g. saving a File, printing a document, format can be recognised by the Extension .mpg
or setting up the program in different ways. or .mpeg. MP3 audio files can be recognised by
the Extension .mp3. A newer file format is MP4.
Communication Technology
Microphone
MP4 files that can be recognised by the Extension
It is essential for making sound recordings in .mp4.
Information and
Professor Academy
Multimedia Netizen
The integration of two or more types of Derived from the term citizen, referring to
information (text, images, audio, video, animation, a citizen of the Internet, or someone who uses
etc.) in a single application. networked resources. The term connotes civic
Multitasking responsibility and participation.
The execution of more than one program, Netscape
apparently at the same time, on a computer. In reality, An early Web Browser, which first appeared
however, the computer rapidly switches its attention in 1994, shortly after the World Wide Web went
from one program to another, thus dividing its time. public.
Multitasking makes it possible, e.g. to print one word-
processed document while working on another. Package
Another form of multitasking allows you to open A program or suite of programs such as Microsoft
several different windows in which different programs Office, but often has the sense of a set of programs
can be run, but only one window is the active window. designed to be used by people who wish to use the
package in different ways.
My Log
The verb “log on” refers to the process of accessing PDF
a secure computer system or website. When you log Portable Document Format is a file type created
on to a system, you provide “login” information by Adobe that allows fully formatted, documents
to be transmitted across the Internet and viewed
that authenticates you as a user. Similarly, when you on any computer that has Adobe Acrobat Reader
access a remote system through a remote access or software - a proprietary software viewing program
FTP (File Transfer Protocol) connection, you may be available for free at the Adobe website.
required to log on to the system.
Pen Drive
Narrowband An alternative term for Flash Drive.
A term used to describe a slow-speed connection
to the Internet, normally via a Modem and less than Pixel
or equal to 64 Kbps. A contraction of picture element. What we see on
a computer display screen is made up of thousands
Navigation of coloured pixels or small dots, which can be set
This describes the process of finding your way, according to the user’s choice to produce either low-
i.e. navigating, around a series of menus within a resolution output, medium-resolution output or
computer program or finding your way around the high-resolution output.
World Wide Web by means of a Browser.
Portal
Netbook A Web page, website or service that acts as link
A netbook is a small, lightweight computer, or entrance to other websites on the Internet.
smaller than a Laptop Computer, with a long battery PowerPoint
life and ideal for travelling. Netbook computers have
The name of a Presentation Program forming
built in Wifi and are optimized for browsing the Web part of the Microsoft Office suite of programs.
and Email.
Pop-up Message
Net Ads
Communication Technology
4.69
Professor Academy
Viral Advertisement telephones. Skype and Ventrilo are examples of VoIP.
Viral marketing or viral advertising is a business War Dialling
strategy that uses existing social networks to promote
A war dialer is a computer program used to
a product. Its name refers to how consumers spread
identify the phone numbers that can successfully
information about a product with other people,
make a connection with a computer modem. The
much in the same way that a virus spreads from one
program automatically dials a defined range of phone
person to another.
numbers and logs and enters in a database those
Virtual Reality numbers that successfully connect to the modem.
The simulation of an environment by Web 2.0
presentation of 3D moving images and associated
sounds, giving the user the impression of being able Web 2.0 is the term used to describe a variety
to move around with the simulated environment. of web sites and applications that allow anyone to
Users wear helmets and visors that convey the images create and share online information or material they
and sound and gloves that give them the experience have created. There are number of different types of
of touching objects. web 2.0 applications including wikis, blogs, social
VoIP networking.
Voice over Internet Protocol, is audio
communication using the Internet instead of
b) Intranet
c) A personal or corporate website in the form of an 26. Using a website to pour out one’s grievances is called
online journal a) Cyber venting b) Web hate [Sept-2020]
d) A personal or corporate Google search c) Web anger d) Cyber abuse
18. Encoding or scrambling data for transmissionacross 27. The word blog is derived from the word [Nov-2020]
a network is knownas: [June-2019] a) My log b) We blog
a) Decryption b) Protection c) E blog d) Blogger
c) Detection d) Encryption
4.71
Professor Academy
Assertion (A): According to computer terminology
Answer Key ACPI is Advanced configuration and Power
1 2 3 4 5 6 7 8 interface.
Reason (R): It is an industry specification for the
c b b d a c c b
efficient handling of power consumption in desktop
9 10 11 12 13 14 15 16 and mobile computers.
c a a c d d b d choose the correct answer:
17 18 19 20 21 22 23 24 a) Both (A) and (R) are true and (R) is the correct
c d c b b b a b explanation of (A).
b) Both (A) and (R) are true and (R) is not the
25 26 27
correct explanation of (A).
a a b c) (A) is true but (R) is false.
d) (A) is false but (R) is true.
a)Blockchain
problem
b) Internet of Things(IoT)
B. Hardware II. Raw facts and figures
c) Cloud computing
C. Algorithm III. Hard Disk
d) Machine learning
D. Data IV. Linux
Choose the correct answer
5. Given below are two statements. One labelled as
a) A - III, B - I, C - II, D - IV
Assertion (A) and other is labelled as Reason (R).
b) A - Ill, B - II, C - I, D - IV
Professor Academy
c) A - IV, B - I, C - II, D - III a) A - III, B - IV, C - I, D - II
d) A - IV, B - III, C - I, D – II b) A - IV, B - III, C - I, D - II
c) A - I, B - II, C- III, D - IV
3. Match List I with List II : [Nov-2020]
d) A - I, B - III, C- II, D – IV
List I (Computer Terms) List II (Description)
(A) Operating System (OS) (I) A service that runs 7. Given below are two statements
on the internet. Statement I: Operating systems are hardware
(B) WWW (II) Software the helps Statement II: Algorithm is a step by step procedure
an OS to control a to solve a problem
Piece of hardware. choose the correct answer [Sept-2020]
(C) Device Driver (III) Software that a) Both Statement I and Statement II are true
controls peripherals b) Both Statement I and Statement II are false
and Allocates memory c) Statement I is correct but Statement II is false
and processor time. d) Statement I is incorrect but Statement II is true
(D) IP (IV) Defines network 8. Given below are two statements [Sept-2020]
address and is used for
Statement I: Compilers are software
rout ing packets.
Statement II: Touch screen monitors are input/
Choose the correct answer from the following: output devices
a) (A) - (II), (B) – (IV), (C) - (III), (D) - (I) choose the most appropriate answer
b) (A) - (III), (B) - (I), (C) - (II), (D) - (IV) a) Both Statement I and Statement II are true
c) (A) - (IV), (B) - (I), (C) - (II), (D) - (III) b) Both Statement I and Statement II are false
d) (A) – (III), (B) – (IV), (C) - (II), (D) – (I) c) Statement I is true but Statement II is false
d) Statement I is false but Statement II is true
4. Match List I with List II [Oct-2020]
9. Match List I with List II: [Nov-2020]
LIST I LIST II
List I List II
A. Input device I.Chrome
(A) Input (I) Mouse
B. Output device II. MS- office
(B) Output (II) Monitor
C. Software III. Mouse
(C) Memory (III) Cache
D. Web browser IV. Monitor
(D) Software (IV) Python
Choose the correct answer
a) A - II, B- III, C-I, D-IV Choose the correct answer
b) A-III, B- IV, C-II, D- I a) A-(I), B-(II), C-(IV), D-(III)
c) A-I, B-II, C- IV, D-III b) A-(I), B-(III), C-(II), D-(IV)
d) A-IV, B- III, C- II, D-I c) A-(III), B-(II), C-(I), D-(IV)
d) A-(I), B-(II), C-(III), D-(IV)
5. Match List I with List II [Sept-2020]
List I List II 10. Match List I with List II [Nov-2020]
1) Programming LanguageI. Wide Area Network List I List II
2) Operating System II. MS PowerPoint (A) Web 2.0 Applications (I) Windows 8,ioS
3) Internet III. Windows XP (B) Search Engines (II) C++, Java
4) Application Software IV. C++ (C) System Software (III) Blogs, Twitter
Choose the correct answer (D) High level languages (IV) Google, Yahoo
Communication Technology
a) A – I, B – II, C – III, D – IV Choose the correct answer
b) A – IV, B – III, C –I, D - II a) (A)-(IV),(B)-(III),(C)-(I),(D)- (II)
Information and
Professor Academy
choose the correct options [June-2019]
LEVEL 2 a) Both (A) and (R) are true is the correct explanation
1. Which of the following statements are correct? of (A)
A. NKN stands for New Knowledge Network b) Both (A) and (R) are true R is not the correct
B. MOOCs are offline courses explanation of (A)
C. National Supercomputing Mission is a c) (A) is true, but (R) is false
Government of India initiative d) (A) is false, but (R) is true
D. Clock rate of CPU is measured in Gigabytes 4. Read the following two statements:
E. ParamShivay is a super computer [Oct-2020] I: Information and Communication Technology
a) C and E only b) B and C only (ICT) is considered a subset of Information
c) C and D only d) A and E only Technology (IT).
2. Identify the correct pair from the following: II: The ‘right to use’ a piece of software is termed
A. AVI – File, Transfer Protocol as copyright. Which of the above statement(s) is/are
B. Excel – Word Processing Software correct?
C. HDD – Cloud Storage Faculty a) Both I andII b) Neither I norII
D. Ubuntu – Operating System c) IIonly d) Ionly
Choose the correct option [Nov-2020]
a) A and C Only b) D Only Answer Key
c) B and C Only d) None of the above
1 2 3 4
3. Given below are two statements – one labelled as
Assertion (A) and the other labelled as Reason (R) a b a c
Assertion (A) : Information technology is fast
becoming a very important field of activity in India
Reason (R) : Software is one of the major exports
of India and further India has a very strong base in
Hardware
Communication Technology
Information and
4.75