0% found this document useful (0 votes)
2K views201 pages

UGC NET & SET - Paper 1

Uploaded by

drmrrwmmtw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views201 pages

UGC NET & SET - Paper 1

Uploaded by

drmrrwmmtw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 201

NET JRF & SET

PAPER 1
PART - I

Professor Academy
Copyright © 2021 by Professor Academy

All rights reserved. No part of this publication may be


reproduced, distributed, or transmitted in any form or
by any means, including photocopying, recording, or
other electronic or mechanical methods.

Title : UGC NET & SET


Paper 1
Part-I

Edition : 2nd edition

Year : 2021

Published by :
Professor Academy
No:42, Railway Border Road,
Kodambakkam,
Chennai- 600 024.
7550100920, 81244 08794
[email protected]
professoracademy.in

Feel free to mail us at [email protected]


Professor Academy‛s

Swapnit Pradhan Karunya Janaky Stephy Monisha.P Aasha John Vageeswari. U Ajay Mukund
99.99 Percentile 99.96 98.92 99.57 99.65 99.57
JRF JRF JRF JRF JRF JRF

Vishaal Kavya Shree S.Sindhuja Pavithra.R Vignesh Eube Blossom


99.33 99.9 99.6 99.16 99.11 99.12
JRF JRF JRF JRF JRF JRF

Vidhya.J S.Amrutha Varshini Vignesh. S N Idhrees Ahmed.M Thenmozhi.G Aslin Jerusha


99.74 99.97 99.31 99.503 99.109 JRF
JRF JRF JRF JRF JRF

Aishwarya G D Francis Joseph Deepthi Pavithra Gayatri S Maria Prathipa


98.39 99.54 JRF JRF JRF 97.67
JRF JRF JRF

Surender M Janani S Thiruvardhini K Keja priya S Joypearlinlucia S Hemanandhini A


98.63 JRF 99.33 95.15 JRF 96.86
JRF JRF JRF JRF
Country’s development is vested in the hands of Professors.
PREFACE

 ’¡œ¦‘’¤’“£‹œœ–ªŽ¡œŽ££œ¡ŒŠŽ˜­ŽŠ˜£¤¢œš‘—­Ž£¤Š‹—“£’Ž£¤’Ž—Фœ¡™¤’Ф
‘§“Ž£¤’Ž  Š£“¡Šš¤£“šŒ¡ŠŒ–“š‘¤’Ž  Ž¬Š˜န’“£“£œ¦¡˜Š“šœŒ¦£¤œ§—Ŋ——
¤’Ž¡ŽŸ¦“¡Ž˜Žš¤œŠ£“¡Šš¤£ª’“—Ž¡ŽŠ¡“š‘ŠŽ¡ၹထª“¤’ ¤’“£œšŽ£¤œထŠ——ФœšŽ
—ŠŒŽထ¡Ž£œ¦¡ŒŽ§—Œœš¤Žš¤န’ŽŽ¡“Ž£œ¤’ޣދœœ–£“£Œ¡ŠŤŽª“¤’Ž¡ŽŒ¤ŠšŠ—­£“£œ
Ž¬Š˜Ÿ¦Ž£¤“œšŠŽ¡£ŠšŒ¡“¤“ŒŠ—“š¤Ž¡ž¡Ž¤Š¤“œšœ¤’Ž£­——Š‹¦£န’ŽެžŽ¡“ŽšŒŽŠŒ¦—¤“Ž£
œœ¦¡¡œŽ££œ¡ŒŠŽ˜­ŽŠ˜ထª’œ“‘¢ŽŠ¤ŠŒ’“Ž¨Ž˜Žš¤“š¤Ž¡™£œ¡Ž£¦—¤£ထ’ЍŽŽššŽ
œªš¤’“£‹œœ–Š£Š˜ŽŠ£¦¡Ž¤œ‹Š—ŠšŒŽ‹œ¤’¤’ŽšŽŽ£œ  Š£“¡Šš¤£Š£ªŽ——Š£
Ž˜Šš£œ¤’ŽŽ¬Š˜ထªŽ——“šŠ¨ŠšŒŽန ’œŽ¤’Ф¤’œ£Žª’œ‘œ¤’¡œ¦‘’¤’“£‹œœ–“š
¤’Ž“¡¡ŽŠ¡Š¤“œšŠ­£ª“—— Ŋš“¤ Ч“¤§—Š£¤’Ž‹œœ–Œœ¨Ž¡£¤’ŽŽš¤“¡Ž¦Š¤Ž£­——Š‹¦£
“šၼŠ¡¥£ထŠ—œš‘ª“¤’¦š“¤ª“£Ž¤¢ŽšŠšŠ—­£“£Šš˜œ¦—Žª“£Ž‹œœ–ဖ‹ŠŒ–Ÿ¦Ž£¤“œš£¤’Ф
¡ŽŚŽŒ¤¤’Ž£¤ŠšŠ¡œ¤’ŽŽ¬Š˜နŽ£¤¢œš‘—­‹Ž—“ލޤ’“£‹œœ–ª“——’Ž—­œ¦ŠŒ’“ލŽ­œ¦¡
¡Ž£¦—¤£‹­¤’Ž˜Š¬“˜¦˜˜Š¡–£“šŠŽ¡ၹနš“¤ဠ£­œ¦¡¤“˜Žဘ——¤’ލޡ®‹Ž£¤ဘ

Saravana Perumal M
Director, Professor Academy
CONTENT

1. Communication 1.1
» Communication – An Introductory Part 1.2
» Effective Communication 1.14
» Barriers to Communication 1.26
» Communication Model and Theories 1.31
» Mass Media 1.41

2. Data Interpretation 2.1


3. Reading Comprehension 3.1
4. Information and Communication Technology (ICT) 4.1
» Computer and its Types 4.2
» Components of Computer 4.6
» Computer Memory 4.12
» Software 4.18
» Data and Information 4.23
» Number System 4.25
» Internet 4.30
» Email 4.49
» Audio File Formats, Audio Video Conferencing 4.53
» E-Governance, E-Commerce 4.55
» Abbreviations and Terminology 4.57
UGC NET Exam:
UGC NET is a national level computer based exam conducted by NTA on behalf of University Grants
Commission to certify the eligibility of candidates for the post of ‘Assistant Professor’ and/or ‘Junior Research
Fellowship.

Paper Marks Numebr of Pattern Duration


Questions
Paper - I 100 50 The questions will be generic in
General Paper on nature, intending to assess the
Teaching & Research teaching/research aptitude of
Aptitude the candidate. It will primarily 03 hours (180
Code No. : 00 be designed to test reasoning minutes) without
ability, comprehension, divergent any break.
thinking and general awareness of All the questions
the candidate. are compulsory.
Paper - II 200 100 This is based on the subject
selected by the candidate and will
assess domain knowledge.
* There will be no negative marking in the exam
PAPER-I
Unit-I Teaching Aptitude • Methods of Research: Experimental, Descriptive,
Historical, Qualitative and Quantitative methods.
• Teaching: Concept, Objectives, Levels of teaching
(Memory, Understanding and Reflective), • Steps of Research.
Characteristics and basic requirements. • Thesis and Article writing: Format and styles of
• Learner’s characteristics: Characteristics of referencing.
adolescent and adult learners (Academic, Social, • Application of ICT in research.
Emotional and Cognitive), Individual differences.
• Research ethics.
• Factors affecting teaching related to: Teacher,
Unit-III Comprehension
Learner, Support material, Instructional
facilities, Learning environment and Institution. • A passage of text be given. Questions be asked
from the passage to be answered.
• Methods of teaching in Institutions of higher
learning: Teacher centred vs. Learner centred Unit-IV Communication
methods; Off-line vs. On-line methods (Swayam, • Communication: Meaning, types and
Swayamprabha, MOOCs etc.). characteristics of communication.
• Teaching Support System: Traditional, Modern • Effective communication: Verbal and Non-verbal,
and ICT based. Inter-Cultural and group communications,
• Evaluation Systems: Elements and Types of Classroom communication.
evaluation, Evaluation in Choice Based Credit • Barriers to effective communication.
System in Higher education, Computer based
testing, Innovations in evaluation systems. • Mass-Media and Society.
Unit-II Research Aptitude Unit-V Mathematical Reasoning and Aptitude
• Research: Meaning, Types, and Characteristics, • Types of reasoning.
Positivism and Postpositivistic approach to • Number series, Letter series, Codes and
research. Relationships.
• Mathematical Aptitude (Fraction, Time & • Digital initiatives in higher education.
Distance, Ratio, Proportion and Percentage, Profit
• ICT and Governance.
and Loss, Interest and Discounting, Averages
etc.). Unit-IX People, Development and Environment
Unit-VI Logical Reasoning • Development and environment: Millennium
• Understanding the structure of arguments: development and Sustainable development goals.
argument forms, structure of categorical • Human and environment interaction:
propositions, Mood and Figure, Formal and Anthropogenic activities and their impacts on
Informal fallacies, Uses of language, Connotations environment.
and denotations of terms, Classical square of
opposition. • Environmental issues: Local, Regional and Global;
Air pollution, Water pollution, Soil pollution,
• Evaluating and distinguishing deductive and Noise pollution, Waste (solid, liquid, biomedical,
inductive reasoning. hazardous, electronic), Climate change and its
• Analogies. Socio-Economic and Political dimensions.
• Venn diagram: Simple and multiple use for • Impacts of pollutants on human health.
establishing validity of arguments.
• Natural and energy resources: Solar, Wind,
• Indian Logic: Means of knowledge. Soil, Hydro, Geothermal, Biomass, Nuclear and
• Pramanas: Pratyaksha (Perception), Anumana Forests.
(Inference), Upamana (Comparison), Shabda • Natural hazards and disasters: Mitigation
(Verbal testimony), Arthapatti (Implication) and strategies.
Anupalabddhi (Non-apprehension).
• Environmental Protection Act (1986), National
• Structure and kinds of Anumana (inference), Action Plan on Climate Change, International
Vyapti (invariable relation), Hetvabhasas agreements/efforts -Montreal Protocol, Rio
(fallacies of inference). Summit, Convention on Biodiversity, Kyoto
Unit-VII Data Interpretation Protocol, Paris Agreement, International Solar
Alliance.
• Sources, acquisition and classification of Data.
• Quantitative and Qualitative Data. Unit-X Higher Education System

• Graphical representation (Bar-chart, Histograms, • Institutions of higher learning and education in


Pie-chart, Table-chart and Line-chart) and ancient India.
mapping of Data. • Evolution of higher learning and research in Post
• Data Interpretation. Independence India.
• Data and Governance. • Oriental, Conventional and Non-conventional
learning programmes in India.
Unit-VIII Information and Communication
Technology (ICT) • Professional, Technical and Skill Based education.
• ICT: General abbreviations and terminology. • Value education and environmental education.
• Basics of Internet, Intranet, E-mail, Audio and • Policies, Governance, and Administration
Video-conferencing.
1 COMMUNICATION

Why does NET exam demand aspirants to skill application oriented (situation based) questions falls
in Communication? from these mentioned modules. The newly added module
mass media gained importance in the recent exams held.
Brilliant communication skill is the key to overall
This clearly portrays that the pattern of exam shifts
development of students, Research scholars, Professors
towards the factual based questions and terminologies
besides academic success. The communication skill
º¿ ¾²ÄÄ ¾¶µº² ²¿µ À´º¶ÅÊ ²½À¿¸ ȺŹ ·¶È ö²½ʉź¾¶
ºÄ Æ¿µ¶¿º²³½Ê ʶ ȱ¿¶ÄÅ ļº½½ À· ² Ŷ²´¹¶Ã ʲÅ º¿ÄÁºÃ¶Ä
questions from classroom communication and its
and brings out the latent potential of the learners.
barrier. Therefore, much importance, it is to concentrate
Irrespective of the subject, the seamless communication
on Emergence of mass media, its elements, very minute
is the quintessential element of success. This unit of the
µºȮ¶Ã¶¿´¶³¶Åȶ¶¿ʶŶþº¿À½À¸º¶ÄÄÆ´¹²ÄǽÀ¸ȹ³½À¸ʁ
³ÀÀ¼ºÄ²¿¶ȮÀÃÅÅÀĶ¿ÄºÅºË¶ʶŶ²´¹¶ÃIJ³ÀÆÅʶ¶Ç¶Ãʉ
¿¶È¾¶µº²ȹÄÀ´º²½¾¶µº²ʁ¶Å´ʇʁȹº´¹¹²Ä³¶¶¿µºÄ´ÆÄ͵
growing importance of communication skills that will
in our material after analysing recent previous year
help carve out themselves and their potential students as
question papers thoroughly by the team of specialised
well. Candidates preparing for the NET exam can start
faculties.
their preparation with this unit because communication
is one of the simplest units ever and it takes very less Blueprint of communication unit
time to read. Generally, 5 questions are asked from this Dear aspirants, understanding the fundamental
unit. Áú¿´ºÁ½¶Ä²Äȶ½½²Äʶ²ÃÅÀ·¶Ȯ¶´ÅºÇ¶´À¾¾Æ¿º´²ÅºÀ¿
Syllabus with the aid of media is needed to score full marks in this
subject. After a complete and detailed analysis syllabus
• Communication: Meaning, types and characteristics
and recent exam questions, the entire communication
of communication.
content has been made as modules in accordance with
• Ȯ¶´ÅºÇ¶ ´À¾¾Æ¿º´²ÅºÀ¿ʃ ¶Ã³²½ ²¿µ À¿ʉǶó²½ʁ the same and the modules are
¿Å¶ÃʉÆ½ÅÆÃ²½ ²¿µ ¸ÃÀÆÁ ´À¾¾Æ¿º´²ÅºÀ¿Äʁ
➢ Communication – an introductory part
Classroom communication.
➢ Ȯ¶´ÅºÇ¶´À¾¾Æ¿º´²ÅºÀ¿
• ²Ãú¶ÃÄÅÀ¶Ȯ¶´ÅºÇ¶´À¾¾Æ¿º´²ÅºÀ¿ʇ
➢ Barriers to communication
• ²ÄÄʉ¶µº²²¿µÀ´º¶ÅÊʇ
➢ Communication model and Theories
Trend Analysis
➢ Mass Media
There is an evident shift from mere factual questions to
ö²½ʉź¾¶ ²¿µ ²ÁÁ½º´²ÅºÀ¿ʉÀú¶¿Å¶µ À¿¶Äʇ ¹¶ ²ÄÁºÃ²¿ÅÄ After each module level 1 questions which are
are expected to possess a good understanding about memory based questions assessing recollecting ability of
communication concepts and theories, right from its ʶ²ÄÁºÃ²¿ÅIJ¿µ½¶Ç¶½ЄÂÆ¶ÄźÀ¿Äȹº´¹²Ã¶²ÁÁ½º´²ÅºÀ¿ʉ
origin to its incredible peaks in the modern world such based questions assessing the conceptual understanding
as social media and new media. Familiarity in human of the aspirants has been given with the answer key,
ÁÄÊ´¹À½À¸Ê º¿ ʶ ÁÃÀ´¶ÄÄ À· ¶Ȯ¶´ÅºÇ¶ ´À¾¾Æ¿º´²ÅºÀ¿ which the candidate can practice to bench mark their
along with the awareness of probable barriers which preparation.
are required to be eliminated from the process of
ŷŤŵŷŨŤŧŬűŪʁŶŦŲŵŨťŨŷŷŨŵʋ
communication would help score better in this unit as
Professor Academy
objective is accomplished. In communication
Communication - an Introduction
interpretation of a message depends upon the
Communication can be defined as, “ the context. Sometimes communication stimuli are used
process of understanding and sharing meaning”. to convey the messages are known as codes.
Communication

Communicating helps people to express their ideas


Encoding: Encoding is a process by which the
and feelings. It also helps us to understand emotions
sender is clear of what message to transmit, he
and thoughts of others. The word ‘communication’
decides the code through which the message
is derived from the Latin verb – ‘communicare’
shall be transmitted. The message is abstract and
meaning ‘to share publically and make common’.
intangible and, therefore, has to be converted
Communication is a two-way process in which into some form (words, gestures, pictures, etc.) to
participants exchange ideas, information, feelings and make it meaningful. Encoding means converting
emotions. They create and share meaning for reaching or translating the message into symbols. Encoding
mutual understanding.It is the process by which an idea gives meaning to the message or converts ideas
is brought to another’s perception. Communication is into codes that can be understood by the receiver.
the expression by speech, writing, gestures, conduct or Encoding means translating the message into
electronic medium.The information that is so expressed words (written or spoken), symbols or gestures. The
or exchanged is also referred to as communication. It is a code should be appropriate to the situation that is
complex and dynamic process that allows organisms to interpreted by the receiver in the manner intended.
exchange information.
Physical Context

Transmission Channel
Elements of communication
Communication is a process of sending and Noise
receiving a message through verbal or non-verbal
means, which may be speech or oral communication, Encoding “How are you” = Message Decoding
writing and graphical representations, signs, signals Channel

or behaviour. Thus communication involves at least


two people- a sender and a receiver. Communication Decoding Encoding

process is more complex than it sounds. It consists of Sender-Receiver Noise Sender-Receiver

a series of elements that results in sharing of meaning


by sender and receiver. The elements are discussed “Fine, thank you.”= Message

below:
Psychological context
Sender/ Source: The Sender is a person who initiates, Feedback Channel
generates and sends the message. The sender is the
source of message. The communication process begins Transmission/ medium/ Channel: Transmission
when the sender develops an idea (usually with a involves selecting the medium or channel of
thought in his mind) or message he wants to transmit. communication. Once decided that the message
He must arrange the ideas in a manner that can be has to be sent in writing, the sender may select the
understood by the receiver. For instance, a lecturer electronic channel and the medium of e-mail or fax.
Short messages can be transmitted through telephone
delivering a lecture in the classroom is the sender of the
but lengthy messages can be sent through letters or
message or a manager addressing his team in a meeting circulars. Choice of the channel depends upon;
is sender of the message.
• The message to be conveyed
Message: The Message is the idea or information that
• Personal biases of the sender
the sender wants to convey. He may convey it verbally • Nature of information
(by writing or speaking) or non-verbally (through
gestures or body language). Whatever be the form, Short messages are generally sent through
the message should be clearly formed so that desired telephone whereas drawings, charts and illustrations

1.2
Professor Academy
form part of the message, it should be sent in writing. when everybody has read and signed the notice.
Personal biases include the sender’s preference Subordinates will give feedback on the notice and
for a particular channel. Some senders prefer to recommend changes, if required. Managers can
communicate in writing, howsoever short the implement the notice only if it is accepted by the

Communication
message may be and, therefore, prefer the written subordinates, unless it is an order.
channel of transmission. Nature of information refers • Feedback plays important role in two-way
to immediacy and confidentiality of information. communication. In one-way communication,
Confidential information where immediate feedback sender communicates with the receiver
is required is generally transmitted orally. without getting any feedback but in two-way
Receiver: The Receiver is the person or a group communication, receiver provides feedback to
of people to whom the message is conveyed. In the sender. Though one-way communication
case of telephonic conversation, the sender can takes less time and is more orderly (it avoids noise
send a message to one receiver but in case of group and chaos), feedback in two-way commnication
discussions, seminars and conferences, receivers can makes it more accurate and precise.
be more than one. The message must be designed,
encoded and transmitted in a manner that a receiver
Process of communication
can understand it easily. Use of technical words, Communication process is a sequence of
jargons and complicated symbols should be avoided. activities where the message is created, encoded,
Depending on the channel selected, receiver may be a sent and message sent is decoded understood by
listener, viewer or a reader. the receiver in its intended meaning. A process is “a
Decoding: Decoding is a process of giving systematic series of actions, operations or series of
meaningful interpretation to the message. On changes directed to some end.” The stages of message
receiving the message, the receiver translates the processing involves perception, understanding
symbols into meaningful information to the best selection internalization, action. However, in real life
of his ability. Communication is effective if the situations, communication process is more complex
receiver understands the message in the same way as than it sounds. It consists of a series of elements
intended by the sender. The receiver must, therefore, which results in sharing of meaning by sender and
be familiar with the codes and symbols used by the receiver, the Process of Communication are of two
sender. phases. They are transmission Phase and Feedback
phase.
Feedback:
• Feedback is the receiver’s response to sender’s ➢ Transmission Phase - The message is transmitted
message. The receiver communicates his reaction from Sender to Receiver. It consists of elements
to the sender through words, symbols or gestures. such as sender(source), message, channel, receiver.
It is the reversal of communication process where ➢ Feedback Phase – The Response or Feedback re-
receiver becomes the sender and sender becomes ceived by the sender from the Receiver. So, here
the receiver. Unless the receiver responds to the
receiver sends the message. It consists of elements
message, communication process is incomplete.
• Feedback helps the sender to transform his such as feedback, environment or ambiance from
message, if needed. It also allows the receiver to which it is received, context of feedback and also
clear doubts about the message, ask questions interpretation of feedback.
to build his confidence and enable the sender
to know the efficiency of the message. Feedback Goffman´s Theory of Communication
makes the communication process complete. Constraints
• In face-to-face communication, the sender can The systematic framework for the analysis
immediately receive the feedback but in written of discourse is provided by Goffman´s theory
communication, it takes time for the sender to of communication constraints. It claims that
receive feedback on the message. A written notice certain characteristics of verbal communication
sent by manager to the employees to work six are systematically controlled by the nature of
days a week instead of five can be implemented

“The art of communication is the language of leadership” – James Humes 1.3


Professor Academy
communication system. Those characterstics are 8. Gricean norms for communication include the prin-
language-universal and so they should be present in all ciples of quality, quantity, relevance and mannerism,
types of verbal communication. Interacting with these clarity .
system constraints is the set of ritual constraints which Types of communication
Communication

add to them a ´social´ dimension. They reflect as well


as construct social norms regulating behaviour of their Communication is described depending
members . upon the situation in which communication takes
System constraints place. We communicate with ourselves, with others
1. Channel open and close signals: When the com- face to face, using a public address system with a
munication begins, a channel opens. It has formal large number of people or use radio or television.
expressions like introductory and/or farewell greet- The Communication can be classified into many
ings, enquiries about one´s well-being, etc. Also it is based on following criteria:
important to ensure whether the other person under-
stands and responds back. • Media/Expression/Channel
2. Back channel signals: They secure the transfer of the • Direction of flow of Communication
information that the message is being received and
• Organisational relations
shows the degree of involvedness of the receiver. It may
be verbal or non-verbal and may vary as to the degree • Agents (Sender and Receiver)
of their speed and spontaneity.
a) Types based on Media/Expression/Channel
3 Turnover signals: They project the end of individual
contributions and the readiness to ´yield the floor´ – Verbal Communication
linguistic, paralinguistic (reestablishment of eye-con- This involves the use of language and words
tact), suprasegmental (lowered intonation). These for the purpose of passing on the intended message.
shifts normally happen smoothly and even if overlaps But, in the context of types of communication,
occur, they may indicate involvement rather than verbal communication can be in the spoken or the
hostility or conflict. The right to produce an extended
written form. Thus, the verbal form may be oral or
turn y a speaker is often ensured by a preannounce-
written.
ment or a ticket .
4. Acoustically adequate and interpretable messages: • Written Communication: This kind of
The message must be comprehensible. In case of communication involves any kind of exchange
communication noise and or an interpretation prob- of information in the written form. For example,
lem, a request for clarification is raised. Attempts are e-mails, texts, letters, reports, SMS, posts on
made to make the understanding better. social media platforms, documents, handbooks,
5. Bracket Signals help separate ´off-line´ talk from posters, flyers, etc. the efficiency in written
´on-line´ talk – they mark the beginning of a side se- communication may involve Effective use of
quence and a return to the main message. In writing, words, concise (brevity), proof reading (editing)
the bracketed asides are conventionally marked off after writing.
spatially (footnotes) or by punctuation (parentheses,
dashes). • Oral Communication: This is the
communication which employs the spoken
6. Non-participant constraints: A nonparticipant can’t
simply enter an ongoing conversation but must com- word, sent through communication channel
pete for the entry to become a participant by e.g., gaz- air in case of face to face(direct/synchronous
ing steadily or intently, waving, asking for a permission communication - which immediately receives
to enter conversation, etc., response/reply/feedback) or over the phone.
This verbal communication could be made on a
7. Pre-empted signals: They are ways of interrupting
ongoing communication. As they are presented by a channel that passes information in only one form
non participant, permission must be elicited (e.g., by i.e. sound.
formulaic excuse me, or May I interrupt?); the signals
may alter the course of communication or bring it to
an end,
1.4
Professor Academy
Development of Communication System
-97900 B.C.E. -38800 B.C.E. 6600 B.C.E.
ROCK CAVE PAINTINGS TORTOISE SHELL SYM-
Early cave art deepens our BOLS

Communication
SCRATCHES
Engraved pieces of understanding Of the origins While Chinese inscriptions
ochre in South Africa’s of human expression. To in tortoise shells, also known
Blombos Cave date date, the oldest known cave as oracle bones, can be traced
as far back as 100,000 painting is a 40,800-year-old back to as early as 6600 B.C.E.,
years ago, providing red disk found in El Castillo, the bulk of these inscriptions
some of the earliest Spain, followed closely by were made during the Shang
evidence of the human 35,000-year-old works in Dynasty, between 1300 and
ability to create Sulawesi, Indonesia and 1100 B.C.E.
symbols. Chauvet Cave, France.
3500 B.C.E. 3200 B.C.E. -2150 B.C.E.
CUNEIFORM HIEROGLYPHICS THE EPIC OF
Cuneiform, a system Egyptian hieroglyphs, dating GILGAMESH
of making wedge- to 3200 B.C.E., contain While the real Gilgamesh ruled
shaped impressions different types of characters the ancient city-state of Uruk in
into a tablet of clay, that represent either words or 2700 B.C.E., Sumerians wrote
was developed be- sounds. “Hieroglyph” means tales about his adventures for
tween 3500 and 3000 “holy writing” in Greek; the centuries in what is considered
B. C.E. by the Sume- Egyptians called the symbols one of the first works of
rians in Mesopotamia “medunetjer,” or “the gods’ literature. The most complete
and is one of the earli- words.” version of this epic poem is
est forms of writing. recorded in the Akkadian
language on 12 clay tablets.
-1900-1700 B.C.E. A.D. 600 1824
PROTO-SINAITIC PRINTING BRAILLE
ALPHABET Around A.D. 600, the Chinese Louis Braille’s invention
Sometime between developed woodblock of Braille in 1824 brought
1900 and 1700 B.C.E, printing, an early printing reading and writing to the
Semitic-speaking technique that carved wood visually impaired. Originally
peoples adapted into stamps. In the mid- featuring a series of dot patterns
Egyptian hieroglyphs 1400s, Johannes Gutenberg representing the French
into Proto-Sinaitic expedited the process with language, Braille today serves
script, the world’s mechanical movable type almost every language.
first alphabet. More and the printing press, which
than 1,000 years later, gaverise to mass printing.
the Latin alphabet
emerged.
1958 1969 1999
PEACE SYMBOL DIGITAL EMOJIS
& SMILEY FACE COMMUNICATION In 1999, the Japanese cell phone
In 1958, British In 1969, UCLA student company NTT DOCOMO
artist Gerald Holtom Charles Kline set off a released the first emojis, a set
designed the famous revolution in communication of 176 characters designed by
peace sign for a when he sent the incomplete Shigetaka Kurita. Twelve years
nuclear disarmament word ‘‘10” to a computer later, Apple released its widely
c a m p a i g n , at Stanford University over popular set of emojis.
creating a form of ARPANET. More digital
communication both communication followed: the
portable and truly first mobile phone call (1973),
international. Harvey the invention of the World
Ball repeated the Wide Web (1989), and the
symbolic success with first text message (1992).
the iconic smiley face
in 1963.

INTERESTING FACTS!
The Acta diurna (before 59 B.C) also called Acta populi or Acta publica is a recorded official business and matters of
Th
public interest. The Acta diurna constituted a type of daily gazette and thus it was, in a sense, the prototype of the
modern newspaper.

1.5
Professor Academy
Non-Verbal Communication
Open communication system (Theory of
Verbal communication) In this type of communication, messages
are relayed without the transmission of words. The
Verbal communication is a subsystem of
Communication

messages here are wordless messages. Non verbal


a human communication, it therefore exhibits communication do not depend on channel. It
all features of an open communication system. supplements verbal communication with gestures,
The following characteristics provide an insight body language, symbols, and expressions. Through
into the nature of ´the speechmaking system´ these, one may communicate one’s mood or opinion or
from this perspective . even show a reaction to the messages that are relaying.
a. Importation of energy from outside the One’s non-verbal actions often set the tone for the
system is achieved through the goal of dialogue. The non verbal communication involves
communication which provide the system signs, symbols, codes, colours.
with´energy´. Physical Non-verbal Communication
b. Through put means that verbal This is the sum total of the physically observable
communication proceeds through part of communication. For instance, hand
coordinated activity of various subsystems gestures, body language, facial expressions, the
involved (conceptualization, verbalization, tone of one’s voice, posture, stance, touch, gaze,
articulation, perception, interpretation, etc.). and others. Several researchers have revealed that
c. Output is manifested by achievement of an physical nonverbal communication constitutes
intended goal. the majority of our daily communication.
d. Systems as cycles of events verbal These are subtle signals that are picked up as part
communication is a continuous process as it of our biological wiring. For example, if you rest
involves recurring patterns of activities. your head on your palms, it will mean that you are
very disappointed or angry.
e. Entropy (order) is a tendency towards
degeneration of order existing within • Paralanguage:
systems (e.g., when the perspective of This is the art of reading between the lines. The main
a communicative goal is lost, verbal kind of such communication is done with the tone
communication may easily lead to a of one’s voice. This kind of communication amounts
breakdown). that we do every day. Along with the tone of voice,
f. Steady state and dynamic homeostasis the style of speaking, voice quality, stress, emotions,
represents an effort which, contrary to or intonation serves the purpose of communication.
entropy, attempts to preserve balance within These aspects are not verbal.
the language system and integrity of the • Aesthetic Communication:
communication process as well as to avoid
Art is an important means of communication.
communication failure.
Through the paintings or other forms of art, an
g. Feedback means that partners reciprocally artist can convey the strongest messages. Several
monitor their reactions and accordingly times in the history of the world, art has been used
adjust their communicative behaviour. as an effective form of nonverbal communication.
h. Differentiation stands for the development • Appearance:
and refinement of various components (e.g.,
The appearance includes sets the tone. People will
skills) during the process of continuous
react to your appearance and this is a fact of life.
communication.
The aspects clothes, the color of the fabrics, etc.
That determine the reaction of your audience.

1.6
Professor Academy

Face to face
Oral

Communication
Verbal Distance
Written
Based on
Media/Expression/
Channel Visual

Non-Verbal Gesture

Audio

b) Types based on Direction of flow two person in the similar levels of the organization.

• Vertical: The information or data flows up and • Diagonal: This is the communication across the
down in the organizational structure. This can cross-functional levels of employees from various
departments of the organization. The other form
be either upward (from subordinate to boss) or
is the informal or casual communication which
downward (from boss to subordinate)
is the general communication between random
• Horizontal: This is the communication between people of the organizations.

Direct of flow of Communication


Formal
Based on
Horizontal / Vertical Cross wise / organisational
Lateral Diagonal relations
Informal

Upward Downward

c) Types based on Organisational relations rules, processes, system, formalities and chain of
command.
• Formal communication refers to interchange
of information officially (systematic flow of d) Types based on Agents on Communication
information). The flow of communication is
Interpersonal communications:
controlled and is a deliberate effort. Hence formal
communication are slow and rigid. This makes it • Interpersonal communication refers to the type
possible for the information to reach the desired of communication where two people are provided
place without any hindrance and in a proper way. with the means of interaction with one another
Formal Communication involves Hierarchy. and are able to exchange information.
• The Informal Communication (grapevine • Interpersonal communication can be direct or
communication) is the casual and unofficial form mediated, depending on whether the sender and
of communication where in the information is the receiver of the information in the process of
exchanged spontaneously between two or more communication use media, such as telephone or
persons without conforming the prescribed official email.

1.7
Professor Academy

Based on Agents on
Communication
Communication

Interpersonal Intrapersonal Group Mass


Communication Communication Communication Communication

• If technology is required for interpersonal • Solo written communication is a level of


communication, then it is a mediated. When intrapersonal communication an individual
two people are exchanging information face to expresses his thoughts on paper, being the sole
face, then it is a direct communication. Direct possible reader of the written text. The example
communication is characterized by immediacy of this is a personal diary, prayer in silence
and primacy. It happens here and now and has This level of intrapersonal communication has
a stronger feedback component than a mediated to be distinguished from the writings that are
interpersonal communication. It is preferable addressed to a future audience, such as poetry,
for people to discuss via means of direct love letters, etc.
communication things that require immediate Intrapersonal communication Interpersonal communication
feedback in order to continue the discussion. • Within a person • Between two or more
persons
• Interpersonal communication can also be
• Aspects( Self- awareness, • 1-1(Dyadic), group,
categorized by the number of participants.
perception and expecta- Public
• Dyadic communication involves two people. tion)
For example, a husband and a wife are • Asynchronous • Synchronous
discussing things during dinner. In dyadic equal • At any time • Possible only when both
oppurtunities are given to communicate between sender and receiver are
the two people. ready
• No external feedback • External feedback
Intrapersonal communication • No receiver • Receiver is available
Intrapersonal communication is the • Daydreaming, diary • Oral, written, verbal and
type of communication in which a person is writing, planning, jour- non-verbal communica-
communicating to himself. It takes place entirely naling, soliloquy, intro- tion
spection, rehearsing, etc
within a single individual. Here the Sender and
• Can be reversed • Can’t be reversed
Receiver are the same. Purposes of intrapersonal
communication can be of various kinds- from • Informal • Formal or informal
clarifying things to meditating and reflecting on • In the context of teach- • In the context of teach-
ing: Planning, contem- ing: Teaching, Clearing
complex ideas. There are several levels of activity plating & analysing doubts, motivation, etc
in intrapersonal communication:
• Internal discourse involving analysis and Group Communication
rendering information. Psychologists include Group communication is an extension of
various dreaming processes in this level of interpersonal communication where more than
intrapersonal communication. two individuals are involved in exchange of ideas,
• Solo vocal communication, which is performed skills and interests. A group is a number of people
in order to clarify things or to be relieved of with a common goal who interact with one another
certain thoughts. to accomplish their goals, recognize one another’s
1.8
Professor Academy
existence and see themselves as part of the group. and organizations. The large group of anonymous
Groups provide an opportunity for people to come and heterogeneous people as either the general
together to discuss and exchange views of common public or a segment of the general public. Channels
interest. The stages of group communications are of communication include broadcast television, radio,

Communication
forming, storming, norming, performing. social media and print. The sender of the message
Mass communication is usually a professional communicator who often
represents an organization. Mass communication
Mass communication is a process in which a is an expensive process. Unlike interpersonal
person, group of people or an organization sends a communication, feedback for mass communication is
message through a channel of communication to a usually slow and indirect.
large group of anonymous and heterogeneous people

Ask Distinguish
Questions Perspectives
Intercultural Communication:
Think Builf Self Intercultural communication (or cross –
Twice Awareness cultural communication) is a discipline
Ten Strategies that studies communication across different
Be for Effective Recognize cultures and social groups or how culture
Flexible Cross - Cultural the
Complexity affects communication. It describes the
Communication wide range of communication processes and
problems that naturally appears within an
Be Avoid Stereo organization or social context made up of
Honest typing
individuals from different religious, social,
Listen Respect ethnic and educational backgrounds.
Actively Differences

Characteristics of communication: areas (production, finance, personnel, sales) of a


business organisation.
The Charecteristics of Communication are as follows:
1. Two-way process: 5. Two people:
Communication is a two-way process of A minimum of two persons — sender and
understanding between two or more persons – sender receiver — must be present for communication to take
and receiver. A person cannot communicate with place. It may be between superiors, subordinates and
himself. peer group, intra or interpersonal.

2. Continuous process: 6. Exchange:


Exchange of ideas and opinion amongst people Communication involves exchange of ideas and
is an ongoing process in business and non-business opinions. People interact and develop understanding
organisations. Continuous interaction promotes for each other.
understanding and exchange of information relevant 7. Means of unifying organisational activities:
for decision-making. Communication unifies internal organisational
3. Dynamic process: environment with its external environment. It also
Communication between sender and receiver integrates the human and physical resources and
takes different forms and medium depending upon converts them into organisational output.
their moods and behaviour. It is, thus, a dynamic
8. Verbal and non-verbal:
process that keeps changing in different situations.
Though words are active carriers of information,
4. Pervasive: gestures can sometimes be more powerful than words.
Communication is a pervasive activity. It takes Facial expressions, sounds, signs and symbols are the
place at all levels (top, middle, low) in all functional non-verbal forms of communication.
1.9
Professor Academy
9. Mutual understanding: In the business world, managers perform their
Communication is effective when sender tasks and responsibilities through communication.
and receiver develop mutual understanding of the Communication provides the basis for effective
subject. Messages conveyed should be understood implementation of plans, assigning jobs to people,
Communication

by the receiver in the desired sense. carrying out directions and activities and facilitates
10. Goal-oriented: control.
Communication is goal-oriented. Unless the Management functions can be performed
receiver and sender know the purpose they intend successfully when managers communicate face-
to achieve through communication, it has little to-face, telephonically or electronically with their
practical utility. superiors, peers, subordinates, customers, suppliers,
11. Foundation of management: competitors etc. Even when they are not talking,
Though communication is a directing they are busy reading or writing reports, memos and
function, it is important for other managerial letters which are different forms of communication.
functions also. Designing plans and organisation Communication has reduced geographical distances
structures, motivating people to accomplish goals into storable and confidential forms and has facilitated
and controlling organisational activities; all require a large number of people to interact with each other.
communication amongst managers at various levels. It is important that communication should
12. Communication A means, not an end: be effective. Effective communication is transfer of
Communication is not an end. Effective information along with transfer of understanding. It
communication is a means towards achieving the means transfer of messages, ideas and information
end, that is, goal accomplishment. It smoothens in a manner that the sender and receiver understand
managerial operations by facilitating planning, the subject in the same sense.
organising, staffing, directing and controlling
functions. “It is the process of sending a message in
such a way that the message received is as close
13. Human activity: in meaning as possible to the message intended.”
Communication makes accomplishment Effective communication, thus, takes place when
of organisational goals possible, it is essential that receiver understands the message in the same sense
people understand and like each other. If people do as the sender wants to convey.
not understand each others’ viewpoint, there cannot
be effective communication. Communication is the foundation for human
interaction that develops common understanding
14. Inter-disciplinary: amongst two or more persons. This promotes
Communication is the art of how common objectives through coordinated efforts
communicators use knowledge of different fields amongst people belonging to different functional
of study like anthropology, psychology and departments.
sociology. Making best use of these disciplines
makes communication effective. It is, thus, an inter- Important factors in Communication:
disciplinary area of management. Framing is the thought process people use to define a
situation and decide how they are going to deal with it.
Role of Communication: Reframing is doing this over again in a different way:
Right from the time a child is born, – for example, deciding a conflict can be approached
communication plays an important role in his life. in a positive (or “win-win”) way, rather than a
Speaking, listening and writing are the common negative (or “win-lose”) way. Reframing is seeing the
forms of communication. A large part of our time is current situation from a different perspective, which
devoted to communication as we share our thoughts can be tremendously helpful in problem solving,
and feelings with individuals and groups of people. decision making and learning. Reframing is helping
Communication helps to develop an organised person to constructively move on from a situation in
society with defined roles for each individual. which the person feels stuck or confused.

1.10
Professor Academy
Framing and reframing can be differentiated using 4. Commitment to organisational objectives:
the language devices like; Managers who follow an effective system of
communication understand employees’ needs, adopt
• Simile: A simile is a poetic device in which two dif- suitable motivators to satisfy them, appraise their

Communication
ferent things are compared using the words “like” performance and provide them regular feedback.
or “as” or “so”. Eg. She fought as brave as a lion. The employees also work with commitment towards
• Metaphor: A metaphor is a poetic device in organisational objectives.
which two different things are compared with- 5. Coordination:
out using the words “like”, “as” or “so”. Eg. She Communication coordinates organisational
has a heart of lion. resources (human and non- human), individual goals
• Hyperbole: A hyperbole is a poetic device that with organisational goals and internal environment
is used for exaggeration. with external environment. Coordination is the key
to organisational success and communication is an
Importance of Communication: active contributor to coordination.
The desire to socialize and get formed 6. Adaptability to external environment:
into organised groups necessitates the need for In order to survive in the changing,
communication. In the fast changing world, dynamic environment, managers continuously
managers communicate changes in technology, interact with external parties like government,
structure or people to the subordinates. If the suppliers, customers, etc. This requires effective
communication system is well organised, it becomes communication system in the organisation.
easier for subordinates to understand and act upon
the message. Communication plays important role 7. Internal functioning of an enterprise:
in the lives of individuals and organisations. Managers interact with parties internal to
business enterprises. They constantly obtain and
1. Basis for planning: provide information to them. More effective the
Planning is the basic function of management. communication system, more accurate will be the
If plans are well designed and communicated for information.
their implementation, it leads to organisational
success. Planning requires extensive environmental 8. Healthy industrial relations:
scanning and information about internal and Satisfied workers contribute to healthy
external organisation elements. An effective system of organisations. Communication brings managers and
communication helps in obtaining this information. trade unions closer, develops mutual understanding
Implementing the plans requires communicating them and promotes industrial peace and harmony. This
to everybody in the organisation. Communication is, increases industrial production.
thus, the basis of planning.
9. Helps in performing managerial roles:
2. Motivation to work: According to Henry Mintzberg, managers
Employees are motivated to work if perform three major roles – interpersonal,
their needs are satisfied. Communication helps informational and decisional. Communication helps
managers know needs of their employees so that managers in performing these roles effectively. In
they can adopt suitable motivators and inspire interpersonal roles, managers interact with superiors,
them to develop positive attitude towards the work peers and subordinates; in informational roles they
environment. receive and give information to people inside and
outside the organization and in decisional roles,
3. Job satisfaction: they take important decisions and communicate
Exchange of information develops trust, them to organisational members for their effective
confidence and faith amongst managers and implementation.
subordinates. They understand their job positions
better and, thus, perform better. People are 10. Facilitates leadership:
committed to organisational objectives which Effective leaders interact with followers,
promotes job satisfaction. guide and inspire them to perform the individual and
1.11
Professor Academy
organisational goals. Effective communication process 12. Training and development:
facilitates leaders to carry out the leadership functions. Imparting training and development facilities
to employees depends upon how well their superiors
11. Facilitates control: communicate with them. Trainers with good
Communication

Planning is effective if accompanied by communication skills are better than those who have
an effective control system. Control is possible poor communication skills.
when managers assess subordinates’ performance,
13. Substance to organisational existence:
correct and prevent deviations and provide them Obtaining information to make plans,
regular feedback of performance. Control function making members aware of authority-responsibility
largely depends upon communication system of structure, position in the organisational hierarchy,
the organisation. How effectively managers control coordinating their activities is the essence of
organisational activities depends upon how effective organisational survival and growth. This is possible
is the communication system. through effective communication.

Self Evaluation
LEVEL 1
1. The word communication is derived from b) Aesthetic phase
__________ verb. c) Noise phase
a) Latin b) French c) German d) England d) Feedback Phase
2. The English word ‘Communication’ is derived from 8. ` In the process of communication, which one of the
the words following is in the chronological order?
a) Communis and Communicare a) Communicator, medium, receiver, effect message
b) Communist and Commune b) Medium, communicator, message, receiver, effect
c) Communism and Communalism c) Communicator, message, medium, receiver, effect
d) Communion and Common sense d) Message, communicator, medium, receiver, effect
3. Encoding means _________ 9. Dyadic Communication involves ________ persons
a) Translating the message a) Two b) Group c) One d) Three
b) Speaking to receiver 10. Chronological order of non-verbal communications is
c) Written message a) Signs, symbols, codes, colours
d) Meaningful interpretation b) Symbols, codes, signs, colours
4. Communication stimuli used to convey the message c) Colours, signs, codes, symbols
is known as [Sept-2020] d) Codes, colours, symbols, signs
a) Process b) Power 11. Which of these does not comes under communica-
c) Channel d) Codes tion based on the channel?
5. The type of communication in which the sender im- a) Verbal b) Non – verbal
mediately receives the feedback is ___________ c) Written d) Formal
a) Written b) Spoken 12. The term ‘grapevine’ is also known as
c) Face –to-face d) Mass communication a) Downward communication
6. In transmission phase, the message is transmitted b) Informal communication
from ________ c) Upward communication
a) Encoding to Medium d) Horizontal communication
b) Receiver to Sender 13. Mass communication takes place among a large
c) Medium to Encoding group of anonymous and ___________ people.
d) Sender to Receiver [Nov-2020]
7. In which phase does the receiver send the message? a) Homogeneous b) Heterogeneous
a) Transmission phase [Nov-2020] c) Group d) Two

1.12
Professor Academy
14. The concept of entropy as used in communication is (A) Environment (B) Feedback
related to [Nov-2020] (C) Context (D) Interference
a) Virtual reality b) Marketplace Choose the correct answer from the the following:
c) Order d) Communicative language a) (A), (B), (C), (D) b) (B), (C), (D), (A)

Communication
15. The break-down in verbal communication is de- c) (C), (D), (A), (B) d) (B), (A), (C), (D)
scribed as 6. Identify the correct sequence of the following:
a) Short circuit b) Contradiction a) Source, channel, message, receiver
c) Unevenness d) Entropy b) Source, receiver, channel, message
c) Source, message, receiver, channel
Answer Key d) Source, message, channel, receiver
1 2 3 4 5 6 7 8 9 10 7. Which of the following are true in respect of com-
a a a d c d d c a a munication? It is a [Oct-2020]
(A) Filtering process (B) Barrier less process
11 12 13 14 15 (C) Life-long process (D) Universal process
d b b c d (E) Collective process
Choose the correct answer from the following:
LEVEL 2 a) (A), (B), (C) only b) (B), (C), (D) only
c) (C), (D), (E) only d) (D), (E), (A) only
1. The sequence of cultural institutions in communica-
8. The chronological sequence in the development of
tion is [Oct-2020]
communication system is [Sept-2020]
A. Family B. School
A. Emergence of language
C. Religion D. Mass media B. Cave paintings
Choose the correct answer from the following: C. Interpersonal communication (verbal)
a) A, B, C, D b) B, C, D, A D. Appearance of printing technology
c) C, D, A, B d) D, A, B, C E. Telecommunication system
2. Identify the correct sequence of phases in communi- Choose the correct answer from the the following:
cation development: [Nov-2020] a) A, B, C, E, D b) B, E, D, C, A
(A) Acta Diurna c) C, D, E, A, B d) B, A, C, D, E
(B) Cave paintings
9. Match List II with List I [Oct-2020]
(C) Wooden blocks for printing
LIST I
(D) Development of languages
A. Prayer in silence
(E) Metal printing
B. Teacher talking to students outside the classroom.
Choose the correct answer from the following:
C. The CEO of a company issues a circular to his
a) (A), (B), (D), (C), (E) b) (B), (D), (C), (A), (E)
subordinates
c) (C), (D), (E), (A), (B) d) (D), (E), (A), (B), (C)
D. Rumour mongering among employees of an orga-
3. Communication begins usually with [Sept-2020] nization.
a) Confused ideas b) Semantic noise
c) Apprehension d) Pictures in the mind LIST II
I. Vertical communication
4. Efficacy of written communication depends upon II. Grapevine
A. Lengthy presentation [Sep-2020] III. Intrapersonal communication.
B. Complex sentence structure IV. Group communication.
C. Editing after writing Choose the correct answer from the following:
D. Brevity in sentences a) A-II, B-IV, C-I, D-III b) A-III, B-IV, C-I, D-II
E. Use of strong words c) A-IV, B- III, C-II, D-I d) A-I, B-II,C- III, D- IV
F. Effective use of words
Choose the correct answer from the the following: Answer Key
a) A, B and C only b) B, C and D only
c) C, D and F only d) D, E and F only 1 2 3 4 5 6 7 8 9
5. Identify the correct sequence of the following a b d c d d c d b
elements in the latter part of the communication
process after decoding: [Nov-2020]

1.13
Professor Academy
information is missing and no additional cost
Effective communication
is incurred in conveying extra message if the
communication is complete.
Effective communication occurs when there is
• A complete communication always gives
Communication

shared meaning. The message that is sent is the same


message that is received. There must be a mutual un- additional information wherever required. It
derstanding between the sender and the receiver for leaves no questions in the mind of receiver.
the transmission of ideas or information to be suc- • Complete communication helps in better
cessful. Effective communication presupposes under- decision-making by the audience/readers/
standing and import clarity to the audience. receivers of message as they get all desired and
crucial information.
Feature of communication
• It persuades the audience.
• Using language that is appropriate to others’
levels of understanding. 2. Conciseness - Conciseness means wordiness,
i.e, communicating what one’s want to convey in
• Making sure others receive the information or least possible words. Conciseness is a necessity for
knowledge intended. effective communication. Concise communication
• Developing relationships with others. has following features:
• Talking with others in a way that facilitates • It is both time-saving as well as cost-saving.
openness, honesty and cooperation. • It underlines and highlights the main message
• Content and Style. as it avoids using excessive and needless words.

• Providing feedback (2 way communication). • Concise communication provides short and


essential message in limited words to the audience.
Effective communication is a part and parcel
of any successful organization. Any communication • Concise message is more appealing and
should be free from barriers so as to be effective.In a comprehensible to the audience.
business environment, adherence to the 7 C’s and the 4 • Concise message is non-repetitive in nature.
S’s of Communication helps the sender in transmitting 3. Consideration - Consideration implies “stepping
his message with ease and accuracy. into the shoes of others”. Effective communication
i) The 7 C’s are as follows: must take the audience into consideration, i.e,
the audience’s view points, background, mind-
set, education level, etc. It is important that the
Correct Complete
self-respect of the audience is maintained and
Clear their emotions are not at harm. Additionally it is
7 C’s of Concrete essential to modify the words used by speaker/
Communication
audience in message to suit the audience’s needs
Courteous Concise while making your message complete. Features of
considerate communication are as follows:
Consideration
• Emphasize on “you” approach.
• Empathize with the audience and exhibit
1. Completeness - The communication must be interest in the audience(Empathy). This will
complete. It should convey all facts required by stimulate a positive reaction from the audience.
the audience. The sender of the message must • Show optimism towards your audience.
take into consideration of the receiver’s mind set Emphasize on “what is possible” rather than
and convey the message accordingly. A complete “what is impossible”. Lay stress on positive
communication has following features: words such as jovial, committed, thanks, warm,
• Complete communication develops and healthy, help, etc.
enhances reputation of an organization. 4. Clarity - Clarity implies emphasizing on a
• Moreover, they are cost saving as no crucial specific message or goal at a time, rather than
1.14
Professor Academy
trying to achieve too much at once. Clarity in ii) 4 S’s of Communication:
communication has following features:
• It makes understanding easier.

Communication
• Complete clarity of thoughts and ideas Sincerity Shortness
enhances the meaning of message.
• Clear message makes use of exact, appropriate
and concrete words. 4S’ of
5. Concreteness - Concrete communication Communication
implies being particular and clear rather than
fuzzy and general. Concreteness strengthens Strength Simplicity
the confidence. Concrete message has following
features:
• It is supported with specific facts and figures.
• It makes use of words that are clear and that 1 Shortness - It is often said that “Brevity is the soul
build the reputation. of wit.” The same can be said about communication.
• Concrete messages are not misinterpreted. If the message can be made brief, then transmission
and comprehension of messages is going to be faster
6. Courtesy - Courtesy in message implies the and more effective. Flooding messages with high
message should show the sender’s expression as sounding words does not create an impact. The same
well as should respect the receiver. The sender of message, when repeated will not make it important
the message should be sincerely polite, judicious, and hence it is not advised to use two words with
reflective and enthusiastic. Courteous message same meaning or any word twice.
has following features: 2 Simplicity - Simplicity both in the usage of words
and ideas reveals clarity in the thinking process.
• Courtesy implies taking into consideration Using simple terminology and equally simple
both viewpoints as well as feelings of the concepts would help in delivering the concept while
receiver of the message. teaching.
• Courteous message is positive and focused at 3 Strength - The strength of a message emanates from
the audience. the credibility of the sender. If the sender himself
believes in, a message that he is about to transmit,
• It makes use of terms showing respect for the there is bound to be strength and conviction in
receiver of message. whatever he tries to state. Half-hearted statements
• It is not at all biased. or utterances that the sender himself does not
believe in, adds a touch of falsehood to the entire
7. Correctness - Correctness in communication communication process.
implies that there are no grammatical errors in 4 Sincerity - A sincere approach to an issue is clearly
communication. Correct communication has evident to the receiver. If the sender is genuine, it will
following features: be reflected in the manner in which he communicates.
• The message is exact, correct and well-timed. Characteristics of Effective Communication
• If the communication is correct, it boosts up The real meaning of communication is getting the
the confidence level. receiver and the sender tuned together for a particular
message. Communication takes place when one person
• Correct message has greater impact on the transfers some understandable data to another person.
audience/readers. It also includes the exchange of thoughts, opinions,
• It checks for the precision and accurateness of sentiments, facts, and information between two or
facts and figures used in the message. more persons. The important motive of characteristics
of communication is to create response from audience.
• It makes use of appropriate and correct The feedback is very important as it assures that message
language in the message. should be properly conveyed to the receiver.
1.15
Professor Academy
The essential features of an effective communication 1. Vertical Network:
system are keys for productive communication. The The vertical network is usually between the
chief principles or characteristics of an effective superior and subordinate and vice versa. It is two-
communication system are as follows: - way communication. The immediate feedback is
Communication

• Clearness and integrity of message possible in this type of communication network. It


• Adequate briefing of the recipient.
• Accurate plan of objectives. is formal network.
• Reliability and uniformity of the message. Superior
• To know the main purpose of the message.
• Proper response or feedback.
Subordinate
• Correct timing. Vertical Network
• Use of proper medium to convey
• Use of informal communication. 2. Circuit Network:
The following are some important guidelines to Circuit network, is when two persons
make communication effective: - communicate with each other (dyadic). For instance,
• Effective communicators align appearance Mr. ‘A’ sends message to Mr. ‘B’. After receiving
with body language and tone and is a part of message Mr. ‘B’ communicates the feedback message
persuasion to simplify the thoughts before to Mr. ‘A’. So communication takes the form of a
communicating message. circuit. Therefore it is known as circuit network. It is
• Analyze the intent of each and every message.
• Consider the overall physical setting similar to vertical network but in circuit network ‘A’
whenever communication occurs and ‘B’ are not necessarily superior and subordinates.
• Discuss with others, where ever appropriate,
in planning communication.
• Be careful while communicating, of the
overtone as well as basic content of your
message.
• Take the opportunity to suggest something of
help or value of the receiver.
• Follow-up the communication.
• Prepare for transmit the message in a proper
way. 3. Chain Network:
• Be sure that actions support the Chain network of communication follows
communication. the organisational hierarchy and chain of command.
• Seek not only to be understood but All subordinates receive commands or instructions
understand from their superior. B, C, D and E, F, G are the
subordinates to A in the organisational hierarchy
• Communication can be well guided and
controlled by non- verbal codes, effectively and receive commands from ‘A’ which follows the
way shown in the diagram.
Communication Networks:
Medium

Transmitter
Receiver 4. Wheel Network:
In Wheel Network subordinates receive
commands from one superior. This is highly
centralized type of communication network where

1.16
Professor Academy
each subordinate receives commands or instructions digital, nonverbal codes tend rather to analogical
from a single authority or superior ‘A’ and wants the than digital. According to Mirela-Ioana Borchin
immediate feedback. difference between linguistics and languages, is as
equivalence to difference between nonverbal and

Communication
verbal codes.
The fundamental function of communication
is communization of significations, that is called
code. The codes are natural or artificial. The codes
are named also languages. The most important
human linguistic is language that constitutes the
verbal code. The communicators use both verbal
codes (linguistics) and nonverbal code.
5. Star Network:
a) Verbal code
In star communication network all members
of the group communicate with each other and The code named language has universal character
exchange information. This network is a must and offers models to another communization
for group communication or where teamwork is codes. According to Denis McQuail, quality of
involved. This network channel of communication communication code has five charecteristics. They
is open to all members of the group. The members are:
communicate with each other without hesitation. • linear character or sequential
• Systematic character (its situating under lexi-
cal rules empire, grammar; systemic excludes
aleatory).
• Systemic character (language is a system that
keeps the differences and contrasts).
• Arbitrary character (does not exist a com-
pulsory relation between word and ap-
pointed object).
• conventional character (its function is funda-
mental on implicit convention of users).
The effectiveness of the above networks of
Communicative functions of language
communication channels depend upon their users
i.e. the managers at all levels, their subordinates and Depending on which component of the
other members of the organisation and above all the communication network is fore fronted, we identify
seriousness with which all these human resources six communicative functions of language .
make use of the facilities provided to them by the 1. Referential focuses on various aspects of a
organisation to accomplish its objectives. message and is primarily related to its content
and context .
Communication Code:
2. Metalingual is employed when the object
Communication system presents a structural and
of communication is the language (code)
functional unity. Two persons can communicate in
itself; here language is used to discuss
better way if they have a common language, common
language and organize a message (e.g., in
values in order to communize significations it is
metacommunication remarks, such as First,
necessary to communize first a common language,
I want to establish some basic points in
a code.
scholarly writing,) or clarification request
Non verbal codes and verbal codes are Could you explain that please in conversation.
part of an indivisible communication system. The microexpression make communication
Burgoon shows while verbal codes are definite positive and effective.

1.17
Professor Academy
3. Expressive. directs attention of the audience c. Physical Appearance- Communication code
towards the senders self expression. elements that belong to physical appearance are
4. Conative emphasizes the sender´s intention to those constructs which consist in the modification
of aspect through: clothing, cosmetics, hairstyle or
Communication

influence (change, alter) the receiver´s attitude,


behaviour (e.g., interrogatives or directives used fragrances. The elements whose contents can’t be
in persuasive discourse). changed like height or physiognomy are not codified.
5. Poetic brings focus to the form and structure of d. Haptics is the contact code and it has five types
a message; it includes not only the area of poetry of contact: affectionate, aggressive, caregiving,
but also imaginative language use in ordinary controlling, and ritualistic touch. Signification
communication, such as innovative language, relevance has also frequency or contact intensity.
behaviour, word play humour or figurative Haptics and proxemics are considered “contact codes”.
devices. e. Proxemics is understood like non-verbal
6. Phatic is aimed at establishing and maintaining communication code through appealing to
interpersonal contact; the content of a message is interpersonal significations distance. The
suppressed in favour of creating and reinforcing interpersonal space can be: intimate space, personal
social bondage avoiding silence, keeping space, public space or social space. The founder of
the communication channel open. From the Proxemics is E. T. Hall(1959).
sociolinguistic point of view, it is the most
important communicative function.
Olfatics Kinetic
b) Non-verbal codes
The seven codes classified are: kinesics,
Oculesics
vocalic and paralanguage, physical appearance, paralanguage
haptics, proxemics, chronemics and artifacts. These Non Verbal
codes have a good semantic and are used frequently. Code Physical
Artifacts
Generally, the major issue of nonverbal codes is appearance
that they do not get a power grammar, they have
not a wide vocabulary, they have neither a stable
Chronemics Haptic
morphology nor a syntax at least principle ordering.
Proxemics
a. Kinesics- Kinetic is composed of “visual
bodily movements”, including, posture + trunk
movements, limb movements, facial expressions, f. Chronemics code are time message significations
gait, gaze. It deals with emblems, illustrators, affect trained to communize accounts and relations of
displays, regulators,and adaptors the kinesics interpersonal value and power. formal communicator
have two coordinates. They are microkinesics and would have time allocation, timeliness, audience
macrokinesics includes “facial expressions, twitches, acceptance, waiting time, decisions for breaks,
finger movements” and other movements of decisions concerning events timing, etc.
extremities, of defined parts of body. Macrokinesics
g. Artifacts form a code that makes visible a behavior
involve body’s movement as a part or whole. Founder
of kinesicst heory is Ray Birth wistell. and manage significations. Using artifacts brings
message notes. It consists of colours using, modality
b. Vocalic Paralanguage- Concerning paralanguages, of light using, objects selection and arranging.
it is understood as been constituted by utilisation
of some elements belongs of pronunciation and In addition to these,Boutaud assesses the
articulation, to appeal to vocal cues, not to articulate principle of a taste code, a code gourmand. People
words or interjections, but to modulate them. It contains communicate also through what they are eating.
modulations as volume, rate, loudness, filler words, At its turn, advertising exploits at maximum this
pitch, tempo, inflection, accent, alsopauses also pauses. necessity, first became purpose and then revealed as
eg., pitch of teacher’s voice. communication function.

1.18
Professor Academy
• Oculesics represents communication modality SPOKEN / ORAL
to use a code of sight. Basically elements of this
code are grouped on two constituents: pupil dil- Face to face communication e.g., direct verbal talk
atation and eyecontact. in discussions, lecture or exposition

Communication
• Olfatics is one of less intellective codes. Its ele- Participatory Entertainment modes e.g., TfD,
ments consist in smells categories through which songs, narratives
it is communicated.
Distance verbal communication e.g., telephone,
calls, Radio, Video, film
Communication Modes:
b) The Graphic mode
There are three main modes of The graphic mode involves written words
communication as the phonic mode (spoken/ and is mainly used by the NGOs and development
verbalized), the graphic mode (written) and the consultants to keep records such as progress reports,
multimodal channel (the use of two or more modes correspondences, or to advertise themselves promote
or semiotic codes in a single communicative episode. their activities through brochures, newsletters,
posters, leaflets, writings on T-shirts, banners, caps,
Mode wrappers, murals and any other forms of writing.

Phonic Mode (verbiage, spoken language) e.g.,


c) Multimodal Mode
used in face - to - face interaction in meetings, Multimodal communication mode
trainings, fields days, outreaches, or distance inter- is construction and sharing of information
actions as found in simultaneously and sequentially through several
modes of perception and production .This modes
Graphic Modes (the written languages) e.g., re-
ports, brochures, newsletter etc., includes visual, aural or audio, gestural, spatial and
linguistic.
Multimodal (involving two modes e.g., vi-
sual images and graphics as found in
posters
Visual

a) The Phonic Mode


The verbalized or spoken language is the Lingustic Aural
most commonly used mode of communication in
the social interactions. This mode is manifested
in both face-to-face communications as well as Spatial Gestural
distanced verbal communication. Face-to-face
interactions mean direct verbal exchange such as
found in dialogic interactions like discussions,
deliberations, presentations etc or in monologues
such as found in lectures or expositions. It also Classroom Communication
includes the participatory modes of communication Classroom is a place of communication
often associated with indigenous/traditional (group situations) where teachers spend hours
channels of communication such as the use songs, communicating with students to share information
narratives and drama variously referred to in this and knowledge. When communication meets
study as theatre for development. the aim and objective of classroom teaching it
becomes functional. The nature and planning of
On the other hand the distanced verbal
classroom communication and also the various
communication refers to all the mediated verbal
measures adopted for creating a conducive learning
communication such as found in the use of radios,
TVs and telephone communication environment will be discussed in this topic.

1.19
Professor Academy
Nature of classroom communication their difficulties explicit which need to be effectively
responded to and addressed by the teacher.
Communication is an integral part of
the teaching-learning process. Teaching is a The strength of this approach lies in
Communication

social activity that involves both the teacher and facilitating immediate feedback, warmth and
the learners. It is therefore important, that two interaction it is important that teacher has to use
way communication exists between them in appropriate words, to increase the acceptance of
order to trigger learning learning, since two way concept by student (credence). The limitation
communication is always effective Moreover direct in the feedback or delayed feedback happen due
communication between a teacher and learners to semantic noise (a communicative barrier).
allows the teacher to get immediate feedback that In teacher-centered approach is based on the
can help him/ her gauge learners’ understanding of principle of ‘teaching by telling’ and ‘learning
what has been taught. Two way communication is by listening’ in which the onus of ‘teaching lies
always effective. In classroom communication, the on the teacher. It may be noted that despite the
teacher (encoder) will also be an decoder, if the presence of a teacher, learners may remain passive
communication is circular. Based on such feedback recipients of information. It is the responsibility of
the teacher can improve his/her communication. the teacher to make students active listeners with
Due to rapid changes taking place in our social the help of different interactive techniques. Since,
system; teaching-learning environment is the teacher-centric communication, students tend
also changing at a fast pace. The information to become passive listeners. If they express their
explosion due to increased access to different mass disinterest or passivity, an alert teacher can still
communication media has increased the awareness control it by using various interactive techniques
level of learners. in arousing and sustaining the interest of the
students.
As a result they have higher expectations
from their teachers than ever before. The role and Hyperbole is the use of exaggeration as a
profile of a teacher is also changing and she has to rhetorical device or figure of speech. In rhetoric, it
undertake varied roles. While on the one hand the is also sometimes known as auxesis. In poetry and
teacher has to fulfil the task of being the source oratory, it emphasizes, evokes strong feelings, and
of information on the other hand, she has to act creates strong impressions. As a figure of speech,
as a counsellor, mentor and guide. The teacher it is usually not meant to be taken literally.
has to coordinate assignments and fulfil many
managerial functions and also use technology However, the problem may become acute
for educational purposes. Thus pedagogy, when despite a student’s apparent interest in the
social interaction, management and technology lecture/lesson through appropriate facial expressions
comprise crucial activities of a teacher and the and body language, his/her mind may wander
role of communication is paramount in all these elsewhere without following what is being discussed
activities. in the class. Speaking and listening start in the early
stages of our lives. We are constantly updating our
Classroom communication, is purposive, vocabulary, improvising your expressions and
positive and pragmatic in nature. In classroom refining our thinking processes. Speaking as well as
communication the exchange of ideas and listening are two very important skills required in
information occurs between teacher and learners, the classroom.
among learners both in formal as well as informal
situations. It involves speaking, lecturing, describing, A teacher has to be a good speaker and at the
explaining, illustrating on the part of the teacher same time has to be a patient and attentive listener
and engaging the students in debate, dialogue and for his/ her learners. Active listening is different
discussion. The important element of classroom from just hearing and requires activities such as
communication is fields of experience and advocacy. hearing, understanding i.e. attaching meaning to
Learners raise questions, doubts and queries to make what is heard and judging and thinking about it.

1.20
Professor Academy
deliver instructions, as for instance, computer
based learning, the instruction gets individualized
FILIBUSTER- A filibuster is a political pro- as a learner works and learns on computer.
cedure where one or more members of par-
liament debate over a proposed piece of leg- When instruction given to distant education or

Communication
islation so as to delay or entirely prevent a online participation of study, the student regulate
decision being made on the proposal. It is some- themselves based on the instruction received.
times referred to as “talking a bill to death”
or “talking out a bill” and is characterized as D. Small group instruction:
a form of obstruction in a legislature or other
decision-making body. In class room communica-
Small groups consisting of 15-20 learners are
tions filibustering should be avoided. more conducive for teaching and skill development.
ADVOCACY - The advocacy is the act of speak- In small group instruction, teachers can identify
ing on the behalf of or in support of another the learners, remember as well as use their names
person, place, or thing. An example of an ad- for developing a rapport with them. It becomes
vocacy is a non-profit organization that works
to help women of domestic abuse who feel too
relatively easier to address individual learning needs
afraid to speak for themselves. of learners.
Small group instruction may follow the
A. Teaching and learning direct teaching format or it may use different modes
Teaching–learning happens to be a process of teaching -learning. In addition to lecture format,
in which two way communication is important various other methods of teaching such as seminars,
for transferring information from the teacher to discussions, debates, tutorials, brain storming,
the learners. It was also stated that interpersonal problem solving, etc. can be effectively adapted and
communication allows greater scope for feedback utilized in small groups.
as both sender and receiver can decipher the facial
E. Large group instruction:
expressions, body movements and cross question
If the number comprising a group is large,
each other to resolve their doubts/queries. Feedback
it may place certain constraints in the process of
gets diminished when the number of participants
communication and reduce the level of interactivity
in the communication activity increases posing a
between the source and the receivers. The physical
challenge for the teacher.
setting may also provide less scope for the source
B. Class size and communication to be visible or audible. Lecture method is generally
Interpersonal communication between two used for providing instructions to large groups.
persons offers maximum interactivity. This is also Information and Communication Technology is
present to a great extent in group communication being increasingly used to meet the needs of large
particularly in small groups. However, as the number and dispersed classes in same or different locations.
of participants in a group increases, the level of The element of noise may place barriers in
communication gets affected. the process of communication. Noise in this respect
C. Individual instruction: could be due to indiscipline, failure to grasp the
The word ‘class’ itself takes into account a content, content overload, difficulty level, language,
number of students. Nonetheless, some students physical conditions of the classroom, etc.
require individual attention to address their specific Planning Class Room Communication
educational needs. Individual instruction is generally
between two persons and thus can be placed under Educational communication is purposive,
interpersonal communication. It allows the sender positive and pragmatic and it is a systematic and
and receiver to use various sensory channels and planned activity. It has certain specific objectives
watch facial expressions, gestures, body language that are directly related with acquiring knowledge or
of each other, etc. It facilitates clarifying one’s development of new skills in some kind of permanent
views, persuading or motivating another person way. In classroom, teacher enhances interaction
more effectively in which there is less scope for of learner that approach is called as psychological
misunderstanding. When technology is used to approach.

1.21
Professor Academy

INTERESTING FACTS! the specified timeframe. Based on these objectives,


message or content needs to be designed which
Schramm’s Fraction of Selection could be verbal, written, pictorial and/or symbolic.
shows what needs to be done if we’re The verbal message involves direct communication
on
Communication

going to raise readers. If we maintain in the form of lectures, presentations, speeches, etc.
(in the home and in the classroom) strong Written message includes published information in
Reward factors and lower the Effort the form of books, research papers, slides,handouts,
factors, reading Frequency will be high. etc. Pictorial message includes drawings, graphs,
The higher that frequency number is for etc. while symbolic messages are used in subjects
students, the higher will be their chances like Mathematics, Chemistry, Physics, etc. At times
of success in school and life. rhetorical messages are also used in classroom
Expectation communication. Rhetoric means the art of oration
of reward which includes skills in speaking at length with wit,
Frequency
humour, force and strength.
Effort of activity
required The message presented should be simple,
lucid, and clear and delivered in an interesting
manner. It should be relevant, updated and pitched at
A. The Role of Teacher the right level. It is often seen that in our effort to share
The role of teacher is paramount in planning our knowledge and expertise, we pitch our message at
classroom communication. Since the prime objective a very high level which may confuse the learner. The
of teaching is to develop academic and intellectual message should be credible and persuasive enough
skills among students, the teacher has to be well to facilitate learner participation, free from any type
equipped with facts and should analyse the subject of bias. During monotonous lecture, teacher make
to be taught. In addition to meeting the needs of efforts to keep student alert using appropriate voice
average learners she has also to satisfy the intellectual modulation, facial expressions, body language have
needs of bright students and for that she has to to be used in facilitating communication.
be well prepared. She has to encourage creativity C. Developing Classroom Culture
and innovative approaches so that students bring Although each class is distinct in its own way,
forth their arguments with appropriate reasoning there are certain norms and patterns which teachers
in contrast with rote learning. She also needs to and students of a particular class formulate. They
inculcate proper values among the students to work out how students would address the teacher,
enable them to face the economic, social and cultural how much degree of familiarity is acceptable in
challenges lying ahead and all these call upon the communication, what will be the accepted level of
skills of communication of the teacher. Persuasive noise in the class, and so on. This may vary from
communication by a teacher in the classroom is one institution to another-whether it is a private or
intended to make his/her version of information public and also governed by the society in which
acceptable to students(credence). Teacher does this we are place as classrooms are a part of the larger
at the institutional level for the purpose of image societal system. For effective functioning of a class,
building. Abilities to communicate clearly and a harmonious culture needs to be developed and the
specifically, explain well, highlight important points, importance of according respect to the viewpoint
being a good listener, skills for interaction, are some of the other should be encouraged. The class set-
of the role of a teacher. A good and communicative up should be kept democratic in which the teacher
teacher evokes more questions from students. is accorded due respect. It will be difficult to teach
if students talk constantly as no one will be able
B. Design and Presentation to hear each other. Similarly, communication may
The first and foremost step in classroom not be democratic if a section of vocal learners
communication is to define the objectives clearly dominate the interaction whereas shy and timid
and realistically so that these can be met within students do not open up unless specifically drawn.

1.22
Professor Academy
Interjecting frequently, talking loudly and shouting, a. Participatory Approach
etc., should be Discouraged and curbed at all costs A teacher can create an environment in which
Teacher should not allow an issue to fester and that students are made to feel comfortable both physically
will affect to effective communication in classroom as well as mentally. They feel free to communicate

Communication
communication. A good communicator(teacher) their ideas and get the opportunity to participate in
will address an issue in the classroom before it the class equally. There is a growing realization that
becomes serious one or a big problem. information flow should be horizontal in nature. In
sharp contrast to the vertical or ‘top-down’ approach
D. Developing Communication Skills in Learners which ‘talks at’ people rather ‘talks with’ them, this
Students need to be encouraged to express approach draws students into the communication
their opinions and views or share doubts to develop activity in a participatory mode. It involves all the
their reasoning skills and faculties. They should be students in the communication process. Proper
able to argue, challenge, analyse, and defend ideas. For seating arrangements in a classroom also create
seeking clarification they can ask: ‘could you please conducive learning environment. Studies reveal that
repeat the point you just made?’, ‘I am still not sure if students seated in the first few rows across the front
I got it right’, ‘could you guide me pence again please?’ of the classroom and those seated at the centre of the
Rephrasing has been found to be an effective method room are the ones who are most likely to participate
of questioning and they can restate or rephrase what in communication with the teacher and in circular
they have heard to clarify certain points. seating arrangement there tends to be an increased
Communication may also involve trying to eye contact and participation among students.
look beyond what is said and ascertain what is not b. Empathy
said and what the missing links in the communication ‘Empathy’ is associated with the ‘feeling of
transaction were. Non-verbal cues also convey oneness’. It is an unconditional positive regard for
meanings. For example, if the teacher shuffles the the receiver (in this case the learners), and a sincere
papers or looks away, this may give the impression approach towards promoting a favourable climate to
that student’s comments are not taken seriously. facilitate communication. It considers receivers as
Maintaining eye contact, smiling, nodding, etc. help alert, sensitive and active participants in the process
to connect with students. At times, conscious efforts of communication rather than as passive recipients of
need to be middle to maintain eye contact with those information. Similarly, it treats learners as intelligent
who are shy and timid and do not participate freely. For and empowered individuals who are partners
effective learning it is necessary that learners be able in learning. The source or teacher is genuinely
to communicate what they know. The teachers need interested in their concerns and makes efforts to
to encourage communication through discussions address them. The use of inclusive language such as
in the classroom and ensure that ‘every student has ‘our’ class and what ‘we’ must do instead of ‘you’ and
understood the communication. Activities followed ‘your’ class also helps in inculcating empathy.
by presentations made by the learners can also
nurture communication skills. Also students need a c. Appreciation and Patience
safe environment where they would not feel scared or Motivational factors such as offering praise,
inhibited to communication with the teachers. showing a willingness and interest in talking with
students and addressing them by first flames help to
Creating Learning Environment draw and involve the students. Appreciating the good
work, ideas and suggestions infuses encouragement. A
An effective teacher requires more than the reference also needs to be made about the level of patience
knowledge of content. She has to be a good motivator, of the teacher especially while facing learners questions
create positive environment in the classroom, and queries as display of irritation or impatience may
society and nation at large. For that she needs to affect the learner’s future participation. Unless, they
have a sound understanding of human psychology. are informed about these, they may not improve upon
She needs to undertake participatory approaches these areas. A mature handling of the learners’ queries
to facilitate empathy and gender sensitivity in the and sensitivity to arts their learning needs, adds to the
classroom using appropriate communication skills. success of communication transaction.
1.23
Professor Academy

Self Evaluation
LEVEL 1
Communication

1. Effective communication presupposes a) The role of teaching


a) Non- alignment b) Domination b) Designs and presentation
c) Passivity d) Understanding c) Developing classroom
d) Attention breaker
2. When does two-way communication become effec-
tive? 12. When communication meets the aims and objec-
a) Never b) Rarely tives of classroom teaching, it becomes [Sept-2020]
c) Always d) Nothing can be said 1. Extra-ordinary 2. Personal
3. Functional 4. Obligatory
3. Which of the following is not a principle of effective
communication? 13. Structured classroom communication can be catego-
a) Persuasive and convincing dialogue rized as [Nov-2020]
b) Participation of the audience 1. Inter-personal communication
c) One-way transfer of information 2. Vertical communication
d) Strategic use of grapevine 3. Group communication
4. Cross-purpose communication
4. The primary motive of characteristics of communi-
cation is to__________ 14. In a classroom, delayed feedback can happen due to
a) Create response b) Stimulate [Jun-2019]
c) Irritate d) Flows from side a) Use of technology
b) Expanded communication
5. Which of the following is not true about the nature
c) Semantic noise
of communication?
d) Participatory environment
a) It can be continuous and dynamic
b) It can be direct or indirect 15. An important element in classroom communication
c) It is a non – purposive activity is [Dec-2019]
d) It can be formal or informal a) Physical infrastructure
b) Fields of experience
6. In communication the language is
c) Conditioned feedback
a) The verbal code
d) Linearity of Message
b) Interpersonal
c) The symbolic code
d) The non- verbal code Answer Key
7. Verbal talk comes under which mode of communi- 1 2 3 4 5 6 7 8 9 10
cation? d c c a c a a b c b
a) The Phonic mode b) The Graphic mode
c) Multimodal mode d) Visual mode
11 12 13 14 15
d c c c b
8. When communication enhances the interaction of
learners, it is [Sept-2020]
a) Physiological b) Psychological
LEVEL 2
c) Artistic d) Transient
9. Which communication studies cultural differences? 1. Which of the following contribute for effective
a) Intra personal b) Interpersonal cross-cultural communication? [Oct-2020]
c) Intercultural d) Group. A. Quick flow of words
B. Use of foreign words
10. Instructional communication in the distance educa- C. Selection of simple words
tion mode is [Nov-2020] D. Taking turns to speak
a) Unstructured b) Self – regulatory E. Maintenance of etiquette
c) Informal d) Structured and interactive Choose the correct answer from the following:
11. Which of these will not come under planning class- a) A, B and C only
room communication. [Oct-2020] b) B, C and D only
1.24
Professor Academy
c) A, D and E only In the light of the above statements, choose the correct
d) C, D and E only answer from the options given below: [Oct-2020]
a) Both Statement I and Statement II are true
2. Which of the following methods help improve aca-
b) Both Statement I and Statement II are false

Communication
demic communication? [Nov-2020]
c) Statement I is correct but Statement II is false
A) Preference to vertical communication
d) Statement I is incorrect but Statement II is true
B) Training individual students in communication
skills 8. Communication activities of learners fall into do-
C) Restricting too much generation of information mains consisting of [Sept-2020]
D) Recognizing cultural and linguistic differences A. Perception
among students B. Groupism
E) Opting for uniformity in using cultural symbols C. Inter-personal skills
Choose the answer from the following: D. Regressive behaviour
a) (A), (B), (C) only b) (C), (D), (E) only E. Inter-personal relations
c) (B), (C), (D) only d) (B), (D), (E) only Choose the correct answer from the following:
a) A, B and C only b) A, C and E only
3 Which of the following is considered as an effective
c) A, C and D only d) A, D and E only
form of verbal communication? [Nov-2020]
a) Story-telling 9. Given below are two statements: One is labeled as
b) Sloganeering Assertion (A) and the other is labeled as Reason (R):
c) Use of high pitch of voice [Nov-2020]
d) Monologues Assertion (A): Repeating more and more the same
4. An effective communication does not require message will make it important.
a) Change in speech pattern Reason (R): “Don’t use two words when one will do”
b) Appropriate gestures is the guiding principle that works.
c) Mastery of content In the light of the above statements, choose the most
d) Handsome personality appropriate answer from the options given below:
a) Both (A)and (R) are correct and (R) is the correct
5. Given below are two statements, one is labelled as explanation of (A)
Assertion (A) and the other is labelled as Reason (R) b) Both (A) and (R) are correct but (R) is NOT the
Assertion (A): Allowing an issue to fester will con- correct explanation of (A)
tribute to effective communication [Sept-2020] c) (A) is correct but (R) is not correct
Reason (R): A good communicator will address an d) (A) is not correct but (R) is correct
issue in the classroom before it becomes precarious 10. Which of the following will make a student a good
In light of the above statements, choose the correct listener in the classroom? [Sept-2020]
answer from the options given below A. Ability to deflect attention
a) Both (A) and (R) are true and (R) is the correct B. Concentration
explanation of (A) C. Desire to understand
b) Both (A) and (R) are true but (R) is NOT the cor- D. Emotional outbursts
rect explanation of (A) E. Humility to know
c) (A) is true but (R) is false F. Ignoring the other side
d) (A) is false but (R) is true Choose the correct answer from the options given
6. A basic principle of effective classroom communica- below:
tion is that one should adapt his or her own to the a) A, B and C only
audience. Which of the following would replace the b) B, C and D only
gap? [June-2019] c) D, E and F only
a) Accent b) Exterior d) B, C and E only
c) Message d) Mannerism 11. Which of the following elements a good classroom
7. Given below are two statements: communication should adopt? [June-2019]
Statement I: The content and style of communication A. Concreteness B. Courtesy
are the predictor variables of effective teaching. C. Filibustering D. Fictionalisation
Statement II: A good and communicative teacher E. Coherence
evokes relatively less questions from the students. Choose the answer from the options given below:

1.25
Professor Academy
a) A, B and D b) B, D and E Barriers to Communication
c) A, B and E d) A, C and D
12. The concept ‘fraction of selection’ in classroom The process of communicator has multiple
barriers. The intended communiqué will often be
Communication

communication is determined by the expectation


of reward related to [June-2019] disturbed and distorted leading to a condition of
a) Efforts needed misunderstanding and failure of communication.
b) Reviews needed The Barriers to effective communication could be of
c) Peer pressure needed many types like as follows:
d) Time-lag needed I. Physical Barriers to Communication
They are the most obvious barriers to effective
communication. These barriers are mostly easily
Answer Key removable in principle at least. They include barriers
1 2 3 4 5 6 7 8 9 10 11 12 like noise, closed doors, faulty equipment used for
communication, closed cabins, etc. Sometimes, in a
d d b d d d c b d d c a
large office, the physical separation between various
employees combined with faulty equipment may
result in severe barriers to effective communication.
II. Channel/ Medium Barriers to Communication
a. Linguistic Barriers
The language barrier is one of the main barriers that
limit effective communication. Language is the most
commonly employed tool of communication. The
fact that each major region has its own language
is one of the Barriers to effective communication.
Sometimes even a thick dialect may render the
communication ineffective. As per some estimates,
the dialects of every two regions changes within a
few kilometres. Even in the same workplace, different
employees will have different linguistic skills. As a
result, the communication channels that span across
the organization would be affected by this.
b. Technological Barriers
Other barriers include the technological barriers.
The technology is developing fast and as a result,
it becomes difficult to keep up with the newest
developments. Hence sometimes the technological
advance may become a barrier. In addition to this,
the cost of technology is sometimes very high.
Most of the organizations will not be able
to afford a decent technology for the purpose of
communication. Hence, this becomes a very crucial
barrier. Shifting technologies and communication
institutions contribute to integration of various
system and takes communication to the next level, it
is important to avoid such barriers.
c. Socio-religious Barriers
Socio- Economic barrier is also an important barrier.
In a patriarchal society, a woman or a transgender
may face many difficulties and barriers while
communicating.

1.26
Professor Academy

Barriers to Communication

Communication
Physical Barriers caused Semantic Cultural Psychological/ Barriers caused by
Environmental by wrong choice Barriers Barriers Attitudinal varying perception
Barriers of medium Barriers of reality

(Caused by) (Caused by) (Caused by) (Caused by) (Caused by)

Varied Connotative Diversity of Moods Attitudes Levels of


meanings Cultures Relationships Understanding and
Comprehension

Time Place Space Climate Noise Choice of


medium
interpret these differently due to the difference in
III. Semantic Barriers their educational and social backgrounds. Such as,
The Semantic barriers refers to the the word “Crane” has different meaning as shown in
misunderstanding between the sender and receiver the sentences below:
arising due to the different meanings of words, and • The bird sanctuary is full of cranes.
other symbols used in the communication. • The builder used a crane to lift heavy steel rods.
• The girl has to crane her neck to watch the movie.
The semantic barriers usually arise when the
information is not in the simple language and contains c. Faulty Translation: Sometimes, the sender
those words or symbols that have multiple meanings. translates the message as per his level of understanding
Following are the main language barriers: irrespective of the recipient’s comprehension level.
For example, a manager collected information from
Wor his superiors and subordinates and translated the
d
Diff s with
Mea erent same information to all his employees, according to
ning
Ba
Expresd
s the understanding level of the superiors, and this
sion Faulty led to the misinterpretation of the message. Thus,
Translation
s it is required to mold the message according to the
Seman
Barrie tic understanding levels of the employees to have an
Tech rs
n intended response.
jargo ical
ns
Unclarifie
Denotations Assumptio d d. Unclarified Assumptions: Sometimes the sender
ns
and creates assumptions about certain things which he
Connotations feels the receiver must be knowing about it and focus
only on the subject matter. But in the case of a special
a. Bad Expression: The message is not formulated
message, if the assumptions are vague and unknown
properly and the language used is so difficult that it
to the receiver then the communication might get
could be misinterpreted by the recipient. The message
adversely affected.
is said to be badly expressed if the wrong words are
chosen, the sentences are not sequenced properly, and e. Denotations and Connotations: The denotation
there is a frequent repetition of words or sentences. means the literal meaning of the word, it just shows
The badly expressed messages consume a lot of time the name of the object and does not imply any negative
as it requires corrections and clarifications and also or positive qualities. The detonation barriers arise due
the impact of the message gets reduced. to the sender and receiver using a different definition
b. Symbols or Words with different Meanings: and meaning of the word used in the message. Such as
There are several words that carry different meanings word crane is used in the context of bird species but it
and often, people get confused with these words and is interpreted as a vehicle that lifts the objects.

1.27
Professor Academy
The implied meaning of the word is called will be able to communicate effectively. On the other
connotation that arouses personal reactions and hand, people who let their emotions take over will
qualitative judgments. The connotation barriers face certain difficulties.
arise when the people use words that hold different
Communication

A perfect mixture of emotions and facts is


meanings in different abstract situations, contexts, necessary for effective communication. Emotions
feelings, etc. For example, the word beautiful and like anger, frustration, humour, can blur the decision
confidence has a positive connotation, but can have making capacities of a person and thus limit the
any of the meaning depending on the context in effectiveness of their communication.
which it is used.
b. Attitude Barriers
f. Technical jargons: Often people working in the Some people have attitude issues, like huge ego
technical groups such as engineers, production and inconsiderate behaviours.These employees can
managers, IT managers, etc. use the technical jargons cause severe strains in the communication channels
in their communication which is quite difficult for that they are present in. Certain people like to be left
the layman to understand. Thus, the use of technical alone. They are the introverts or just people who are
jargons in communication can act as a barrier. not very social. Others like to be social or sometimes
Thus, semantic barriers lead to misunderstanding of extra clingy! Both these cases could become a barrier
the information and the objective of communication, to communication. Certain personality traits like
i.e. for which it was intended, gets disrupted. The shyness, anger, social anxiety may be removable
limited use of clinched Jargon will reduce semantic through courses and proper training.
noise. VI. Perception Barriers
IV. Cultural Barriers of Communication Different people perceive the same things
As the world is getting more and more globalized, differently. This is a fact which we must consider
any large office may have people from several parts during the communication process. Knowledge of
of the world. Different cultures have a different the perception levels of the audience is crucial to
meaning for several basic values of society. Dressing, effective communication.
Religions or lack of them, food, drinks, pets and the VII. Physiological Barriers
general behaviour will change drastically from one Certain disorders or diseases or
culture to another. other limitations could also prevent effective
Hence it is a must that we must take these different communication between the various channels of an
cultures into account while communicating and this organization. The shrillness of voice, dyslexia etc are
is what we call being culturally appropriate. In many some examples of physiological barriers to effective
multinational companies, special courses are offered communication.
at the orientation stages that let people know about
other cultures and how to be courteous and tolerant
Types of Listeners
of others.
V. Psychological Barriers Listeners are of four types, namely, active listeners,
There are various mental and psychological passive listeners, non-listeners and evaluative
issues that may be barriers to effective communication. listeners.
Some people have stage fear, speech disorders,
phobia, depression etc. All of these conditions are A. Active Listeners: Active listeners involve
very difficult to manage sometimes and will most themselves actively in the communication process
certainly limit the ease of communication. by keenly listening not only to the message but also
to the way it has been delivered. They focus on the
a. Emotional Barriers: content as well the manner in which it is delivered.
The emotional quotient (EQ) of a person determines they do show empathy
the ease and comfort with which they can B. Passive Listeners: Passive listeners exhibit exactly
communicate. A person who is emotionally mature the opposite behavioristic traits of active listeners.
1.28 “The most important thing in communication is to hear what isn’t being said” – Peter Drucker
Professor Academy
They pay attention only to partial message and lack they do not show empathy or sensitivity to the
sensitivity to the nuances, inner meanings, nonverbal speaker. They are mostly prejudiced and judgmental
subtexts involved in communication. They allow as they presume the meaning before actually the
someone to speak, without interrupting or seeking speaker completes a sentence.

Communication
clarifications. Barriers to Active Listening
C. Non Listeners: The non-listeners do not listen at ➢ Inadequate language base
all because they are genuinely disinterested in the
➢ Partial Listening
subject. These people pretend to follow the speaker
while they are actually preoccupied with something ➢ Disinterestedness
else. ➢ Pre-judging the Speaker/the Speech
D. Evaluative Listeners: Evaluative listeners literally ➢ Negativity towards the Speaker
assess the verbal content on the basis of words not ➢ Diffidence
paralinguistic or nonverbal cues. Generally, they use ➢ Over-enthusiasm/Intolerance
logic to understand the content, hence, they distance ➢ Deep-rooted beliefs
themselves emotionally from the subject. As a result,
ably considered the best solution in a classroom en-
Self Evaluation vironment
In light of the above statements, choose the correct
LEVEL 1 answer from the options given below [Sept-2020]
1. The barrier based on language is ___________ a) Both Statement I and Statement II are true
a) Linguistic b) Psychological b) Both Statement I and Statement II are false
c) Cultural d) Attitude c) Statement I is correct but Statement II is false
d) Statement I is incorrect but Statement II is true
2. Shifting technologies and communication institu-
tions contribute to [Sept-2020] 2. The most powerful barrier of communication in the
a) System integration class is
b) Temporal disintegration a) Noise in the classroom
c) Psychological disintegration b) Confusion on the part of teacher
d) Spatial integration c) Outside disturbance in the classroom
d) Lack of teaching aids
3. Poor listening by the audience leads to _____
a) Appreciating the speaker [Oct-2020] 3. Which of the following are useful in overcoming the
b) Wild imaginations communication barriers in a classroom? [Nov-2020]
c) Inaccurate inferences a) Identifying the level of redundancy
d) Disrespecting the speaker b) Use of unfamiliar words
c) Ignoring the students ‘vocabulary
4. Semantic noise in classroom communication can be d) Fragmented sentences
limited by avoiding the use of [Nov-2020] e) Voice inflexion
a) Dialogue b) Cliched jargon f) Contextualizing the speech
c) Non verbal cues d) Multi – media Choose the correct answer from the following
a) Only (a), (b) and (c) b) Only (b), (c) and (d)
Answer Key c) Only (c), (d) and (f) d) Only (a), (e) and (f)
1 2 3 4 4. Match List I with List II [Nov-2020]
a a c b List 1 List II
Communication barriers Description
A. Semantic I. Lack of physical clari-
LEVEL 2 ty in channel
1. Given below are two statements B. Psychological II. Faulty message
Statement I: Personality conflicts in a classroom situ- C. Personal III. Poor retention
ation are a barrier to effective interaction D. Physical IV. Lack of time
Statement II: Impersonal communication is invari-

1.29
Professor Academy
a) A-1, B-II, C - III, D- IV b) A-II, B-III, C-IV,D-1 9. Match List I with List II [Nov-2020]
c) A- III, B-IV, C-I, D-II d) A-IV, B-I, C-II, D-III List I
(Examples of communication barrier)
5. Match List I with List II [Sept-2020]
(A) Unclear printing in a newspaper
Communication

List I List II
(B) Different understanding of the message
Types of listeners Characteristics
(C) Passive audience reception of the message
A. Poor listeners I. Scare others
(D) Prejudice agaist certain ethnic groups
B. Aggressive listeners II. Easily agree with the
speaker List II
C. Passive listeners III. Listen to ideas, but (Types of communication barrier)
no emotions behind (I) Psychological noise
D. Pseudo-intellectual IV. Fidget repeatedly (II) Cultural stereotyping
Choose the correct answer from the following: (III) Physical noise
a) A - I, B - II, C- III, D - IV (IV) Semantic noise
b) A - II, B - III, C - IV, D - I Choose the correct answer from the following:
c) A - III, B - IV, C - I, D - II a) (A)-(IV), (B)-(III), (C)-(I), (D)-(II)
d) A - IV, B - I, C - II, D - III b) (A)- (II). (B)- (I), (C)-(IV), (D)-(II)
c) (A)-(II), (B)-(IV), (C)-(I), (D)-(II)
6. Which of the following can be the major communi-
d) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
cation barriers to online teaching? [Oct-2020]
(A) Technology (B) Legalities 10. Removal of communication barriers in a classroom
(C) Student community (D) Culture will result in [Nov-2020]
(E) Gender (A) Clear enunciation of specific instructional be-
Choose the correct answer from the following: haviors
a) (A), (B), (C) only b) (A), (D), (E) only (B) A climate of purposeful student interaction.
c) (B), (C), (D) only d) (C), (D), (E) only (C) Promotion of personality cult.
(D) The irrelevance of illustrative examples.
7. The positive impact of communication depends
Choose the correct answer from the following:
upon [Sept-2020]
a) (A) and (B) only
A. Acceptance of barriers
b) (B) and (C) only
B. Planning
c) (C) and (D) only
C. Sudden expression
d) (A) and (D) only
D. Media selection
E. Use of language 11. What are the barriers to effective communication?
Choose the correct answer from the following: a) Moralizing, being judgemental, and comments of
a) A, B and D only b) B, D and E only consolation.
c) C, D and E only d) A, D and E only b) Dialogue, summary and self-review
c) Use of simple words, cool reaction, and defensive
8. Which of the following can be considered as psycho-
attitude
logical barriers to effective communication?
d) Personal statements, eye contact, and simple nar-
A. Descriptive message
ration.
B. Inattentiveness
C. Too much reliance on the written word
D. Limited retention Answer Key
E. Logical organization
F. Flow of thought [Sept-2020] 1 2 3 4 5 6 7 8 9 10 11
Choose the coned answer from the following: c a d b d b b b c a a
a) A, B and C only b) B, C and D only
c) C, D and E only d) D, E and F only

1.30
Professor Academy

Communication Models Sender Receiver or


or Message Listener
Speaker
A communication model is chiefly a process
in which information is enclosed in form of a package

Communication
Figure : Aristotle’s Model of Communication
and is channeled then imparted by the sender to
the receiver through a medium. When the receiver Aristotle advises speakers to build speech for
gets the information he or she decodes the message different audience on different time (occasion) and
and gives the sender a certain feedback. Models of for different effects. Speaker plays an important role in
communication refer to the conceptual model used Public speaking. The speaker must prepare his speech
to explain the human communication process. and analysis audience needs before he enters into the
stage. His words should influence in audience mind
Types and persuade their thoughts towards him.
There are many models of communication
developed by noted theorists of different disciplines. b) Lasswell’s Model of Communication:
Among the theorists are: Aristotle, Lasswell, Harold Dwight Lasswell, a American political
Shannon, Weaver, McLuhan, MacLean, Rileys, scientist and communication theorist, was a member
Westley, Gerbner, Rothstein, Schramn, Berlo, of the Chicago school of sociology. In his work ‘The
Osgood, Johnson, Cherry are the renowned ones. All Structure and Function of Communication in Society’
these model can be Classified under three following (1948) he defined communication process as Who
types as: says What (in Which Channel) to Whom with What
• Linear model Effect.
Says In Which To With What
• Interactive model Who What Channel Whom Effect
• Transactional model COMMUNICATOR MESSAGE MEDIUM RECIVER EFFECT

Linear Model This model is also called a ‘linear model of


communication’, ‘uni-directional process’ or ‘action
The linear model views communication as model, because it describes a one-way process within
a one-way or linear process in which the speaker communication. It is seen as one of the most influential
speaks and the listener listens. communication models. The model consists of
a) Aristotle’s Model of Communication five components, that are used as an analysis tool
for evaluating the entire communication process.
Aristotle, a great philosopher was the first to The previous ‘W’ questions are the basis for these
develop a communication model called ‘Aristotle’s components. The answers to these questions provide
Model of Communication’. This model is more insight into the communication between people.
focused on public speaking than interpersonal
communication. Today, the Aristotelian model of The Lasswell Communication Model consists
communication is still widely used and accepted. In of the basic questions below, aimed at a component
this model of communication, the sender sends the and the gaining of an analysis:
message to the receiver in an attempt to influence WHO.... ________ CONTROL ANALYSIS
them to respond accordingly. The message has to
SAYS WHAT.... ________ CONTROL ANALYSIS
be very impressive and convincing. Therefore, the
sender must know and understand their audience IN WHICH CHANNEL.... ________ CONTROL ANALYSIS
well. In this model, the sender is an active participant WITH WHAT EFFECT.... ________ CONTROL ANALYSIS
and the receiver is passive. This concept is used in
WHO.... ________ CONTROL ANALYSIS
public speaking, seminars, and lectures.
Aristotle Model of Communication is formed with c) Shannon and Weaver Model of Communication
3 basic elements The Shannon and Weaver Model of
Communication argues that communication can be
(i) Speaker, (ii) Speech, (iii) Audience
1.31
Professor Academy
broken down into 6 key concepts: sender, encoder, Berlo’s model follows the SMCR model. This
channel, noise, decoder, and receiver. A later version model is not specific to any particular communication.
of the theory by Warren Weaver added a 7th concept Berlo’s model includes a number of factors under
(‘feedback’) which changed the model from a linear
Communication

each of the elements:


to cyclical model.
Source:
Sender Noise Recipient The source is situated where the message originates.
Source

Encoding Channel Decoding


I. Communication skills – It is the skill of the
Message signal signal message
individual to communicate. For example, the
ability to read, write, speak, listen etc.
II. Attitudes – This includes attitudes towards
Shannon and Weaver’s information theory the audience, subject and towards oneself. For
had a significant influence on the development of
example, for the student, the attitude is to learn
communication theories and models. These first
more and for teachers, it is to help teach.
studies on communication’s models promoted
more research on the subject. Shannon’s model III. Knowledge – Communicating also means that
of communication marks, in important ways, the the person needs to be knowledgeable about the
beginning of the modern field. It is a one way model subject or topic. For e.g. a teacher needs to know
to communicate with others. It consists of the sender about the subject in detail that he or she teaches
encoding a message and channeling it to the receiver so that they can communicate properly such that
in the presence of noise. Its major drawback is that it the students understand here.
assumes that there is a clear cut beginning and end (Note: It refers, not to the general knowledge, but
to communication. It also displays no feedback from to the knowledge of the subject that the person is
the receiver; e.g. Mass communication - television, communicating and their familiarity with it.)
radio, newspapers. It is any method in which there IV. Social system – The social system includes the
is no possible way for feedback (even non verbally). various aspects of society like values, beliefs,
Letters, text messages, and e-mail can be responded culture, religion and a general understanding
to. A lecture would not fit in this model because
of society. It is where the communication takes
listeners can still give feedback non verbally.
place.
d) Berlos’s Model of Communication For example, classrooms differ from country to
David Berlo Model of Communication country just like people’s behaviours and how
another famous communication model is Berlo’s they communicate, etc.
model. In this model, he stresses on the relationship (Note: We can communicate only to the
between the person sending the message and extent that the social system allows. When we
the receiver. According to this model, for the communicate, we take the social system into
message to be properly encoded and decoded, account.)
the communication skills of both the source and V. Culture: Culture of a particular society also
the receiver should be good. The communication comes under the social system.
will be at its best only if the two are skilled. Berlo’s
SMCR model has four main components and each According to this model, people can communicate
component has its own sub components. only if the above requirements are met in the
Encodes Decodes proper or adequate proportion.
Source Message Channel Receiver
(Encoder: The sender of the message, from
communication
skills Content Hearing
communication
skills where the message originates, is referred to as the
Attitudes Elements Seeing Attitudes encoder. So the source encodes the message here.)
knowledge Treatment knowledge
social
Touching
social
Message
system Structure Smelling system
I. Content – The body of a message, from the
Culture Code Tasting Culture
beginning to the end, comprises its content. For
1.32
Professor Academy
example, whatever the class teacher teaches in III. Touching: The sense of touch can be used as a
the class, from beginning to end, is the content channel to communicate. For example, we touch,
of the message. buy food, hugging our loved ones,etc.

Communication
II. Elements – It includes various things like IV. Smelling: Smell also can be a channel to
language, gestures, body language, etc. They communicate. For example, perfumes, food,
constitute all the elements of a particular message. fragrances etc. Charred smell communicates
Any content is accompanied by some elements. something is burning. People can deduct which
III. Treatment – It refers to the packing of the food is being cooked by its smell etc.
message and the way in which the message is V. Tasting : The tongue is a muscular organ used in
conveyed or the way in which it is passed on or the act of eat and taste food. For example, while
delivered. a food is being shared, the communication can
(Note: When there is too much treatment, happen regarding its taste.
communication will not go smoothly.) (Note: Despite not mentioning a medium, we
IV. Structure– The structure of the message refers need to assume that as communication is taking
to how it is arranged; the way people structure place, channels can be any of the 5 senses or
the message into various parts. combination.)

(Note: Message is the same, but if the structure is Receiver:


not properly arranged then the receiver will not • The receiver needs to think all the contents and
understand the message.) elements of the source, so as to communicate/
responds to sender effectively.
V. Code– The code of the message refers to the
means through which it is sent and in what (Decoder : The person who receives the message
form. It could be, for example, language, body and decodes it is referred to a decoder.)
language, gestures, music, etc. Even culture is Berlo’s model believes that for effective
a code. Through this, people give and receive communication to take place, the source and the
messages and communication takes place. receiver need to be on the same level. Only then
(Note: Only when the code is clear, the message communication will happen or take place properly.
will be clear. The wrong usage may lead to Hence, the source and the receiver should be similar.
misinterpretation.) For example, if the communication skill of
Channel the source is good, then the receiver should have
equally good listening skills.
• It refers to the five sense organs. The following
are the five senses: It cannot be said that the receiver does not
receive the whole message because even though he
➢ Hearing may receive it, but may not be able to interpret its
➢ Seeing meaning. For effective communication, the source
➢ Touching and the receiver need to be on the same level.
➢ Smelling
➢ Tasting Note: Self-image differs from person to
person. For communication, the person should
Communication occurs through one or more of consider the receiver, speak accordingly and give
these channels. them what they need.
I. Hearing: The use of ears to receive the message. Criticism of Berlo’s SMCR model of
For example, orally transmitted messages, communication:
interpersonal communication etc.
1. There is a lack of feedback. The effects are
II. Seeing: Visual channels, for example, Watching practically unknown.
television so the message is conveyed through
the scene/film. 2. It does not mention the barriers to
communication.
1.33
Professor Academy
3. There is no room for noise. and Schramm shows not only the transmission and
4. It is a rather complex model. hearing of a message, but offers explanations in how
5. It is a linear model of communication. it can be perceived and understood. The process of
understanding what has been said can vary widely
Communication

6. It requires people to be on the same level for from person to person as there will always be a degree
effective communication to happen. However, of semantic noise to be taken into account, such as
that rarely happens in everyday life. cultural differences, background, socioeconomics,
7. The main drawback of the model is that it education and values.
omits the usage of sixth sense as a channel of
communication, which is an asset to human Schramm (1955) andOsgood (2009)came out
beings (thinking, understanding, analyzing with an interactive model in which the receiver or
etc.) listener providing feedback to the sender or speaker.
The speaker or sender of the message also listens to
Interactive Model the feedback given by the receiver or listener. Both
the speaker and the listener take turns to speak and
The main flaw in the linear model is that
listen to each other. Feedback is given either verbally
it depicts communication as a one-way process
or non-verbally, or in both ways. This model also
where speakers only speak and never listen. It also
indicates that the speaker and listener communicate
implies that listeners listen and never speak or send
better if they have common fields of experience, or
messages.
fields which overlap.
a) Wilbur Schramm & Osgood Model of
The merits of the model are that it is
Communication
dynamic, includes redundancy, sender and receiver
The Osgood-Schramm model of are the same persons, feedback is integral part of
communication is a communication theory. It the process and so suggests communication to be
explains how we communicate with one another, circular in nature. The chief demerit is that it does
mainly through speech, writing and discourse. It not talk about semantic noise and it assumes the
emphasizes four key principles: moment of encoding and decoding.
1. That communication is circular, not linear. The Field of Field of
listener can both receive and send messages experience experience
Message
(in most instances). Encoder
Encoder
2. That communication is usually equal and Field of common
reciprocal Interpreter experience Interpreter
3. That there is a lot of interpretation involved
when receiving a message Decoder Decoder
Message
4. That all communication requires three steps:
encoding, decoding and interpreting a
message.
Effectively, this is two linear models stacked
Osgood and Schramm’s Circular Model on top of each other. The sender channels a message
of Communication was an attempt to rectify the to the receiver and the receiver then becomes the
earlier linear models of communication; it can sender and channels a message to the original sender
happen within our self or between two each (feedback). This indicates that communication is a
person acts as both sender and receiver and hence two way process. Feedback is not simultaneous, e.g.,
use interpretation. It occurs simultaneously, e.g., Instant Messaging. The sender sends an IM to the
encoding, interpreting and decoding. Wilbur receiver, and then the original sender has to wait for
Schramm stated that communication process does the IM from the receiver to react.
not start and end somewhere, but is endless. The
Circular model depicts two actors who reciprocate in
Transactional Model
identical functions throughout: encoding, decoding, The main drawback in the interactive model
and interpreting. The model presented by Osgood is that it does not indicate that communicators can
1.34
Professor Academy
both send and receive messages simultaneously. • It recognizes that communication affects all
This model also fails to show that communication parties involved. .
is a dynamic process which changes over time. The • The transactional model also contains
transactional model shows that the elements in

Communication
ellipses that symbolize the communication
communication are interdependent. Each person environment.
in the communication act is both a speaker and a
listener, and can be simultaneously sending and a) Theodore M Newcomb’s Model Of
receiving messages. Communication
The model implies: The New Comb’s model of communication
• “Transactional” means that communication was introduced by Theodore M Newcomb of the
is an ongoing and continuously changing University of Michigan in 1953. He gives different
process; approach to the communication process. The main
• In any transactional process, each element purpose of this theory is to introduce the role of
exists in relation to all the other elements. communication in a social relationship (society)
There is this interdependence where there and to maintain social equilibrium within the
can be no source without a receiver and no social system. He does not include the message as
message without a source; a separate entity in his diagram, implying it only
• Each person in the communication process by use of directional arrows. He concentrates on
reacts depending on factors such as their the social purpose of communication, showing all
background, prior experiences, attitudes, communication as a means of sustaining relationships
cultural beliefs and self-esteem. between people. Sometimes it’s called as an “ABX”
model of communication.
Transactional model of communication
that takes into account “noise” in communication as X
well as the time factor. The outer lines of the model Topic
indicate that communication happens within systems
that both communicators share or personal systems.
It also takes into account changes that happened in
the communicators’ fields of personal and common
experiences. The model also labels each communicator
as both sender as well as receiver simultaneously. B Message Message A
Transactional Model of Receiver Sender
Communication
The Newcomb’s Model
A’s Filed of
Experience
The Newcomb’s model works in a triangular format
Shared Filed Communicator A or A-B-X system
of Experience Noise
and Symbolic A – Sender
Interacrtions Communicator B
B – Receiver
over Time B’s Filed of
Experience X – Matter of Concern
The relationship between A and B is like
• That people are connected through
student and teacher, government and public or
communication;
newspaper and readers. Sender and Receiver may
• They are engaged in transaction. work in a same flow but the same time some factor
• It recognizes that each of player is a sender- like “X” may affect their flow of relationship. “X” it
receiver, not just a sender or a receiver. may be third persons, issue, topic or policy.

1.35
Professor Academy
For Example: The merits of this model include:
Teachers introduce a new policy to increase • It accounts for Feedback;
the college timing from 6 hours to 8 hours. • It can account for both interpersonal
communication and Mass communication;
Communication

A – Teachers B – Students X – Policy or issue


• It is a predictive model of communication and
If both students and teachers are satisfied with also very descriptive;
this policy then the communication maintains its • It also accounts for non-binary interactions;
equilibrium status between them. Otherwise the flow of
this means that the model is good even for
communication between “A” and “B” becomes trouble
communications involving more than two
in the social system. If “A” or “B” is not ready to accept
sources;
the policy then it will directly affect the social system and
can’t maintain the equilibrium status. So Teachers”A” can • However, it is a two dimensional model; this
convince students “B” as much as possible. Otherwise means that the model will not be applicable
they have to make some adjustments in the Policy “X” for typical communication events that
and convince them towards the policy. involve broader context and wide range of
communication messages.
b. Westley & Maclean’s Model of Communication:
c. Dance’s Helix Model
Westley and MacLean realized that
communication does not begin when one person Another very important model of
starts talking, but rather when a person responds communication is the Helical Model of
selectively to his/her physical surroundings. communication, proposed by Frank Dance. Helix
This model considers a strong relation between is a three-dimensional object with a shape like
surroundings and the process of communication. that of a smooth curve that goes upwards as also
Communication begins only when a person receives comes downwards. Frank Dance proposed a
message from surroundings.Westley & Maclean’s communication model inspired by a helix in 1967,
Model Emphasis Communication from Listener known as Helical Model of Communication. A
point of view. helix is a three dimensional spring like curve in the
shape of a cylinder or a cone. Helix is compared with
Westely and MacLean’s Model of Communication
evolution of communication of a human since birth
X1 to existence or existing moment.
fBA

The helical model of communication was


X1

fCA

X2 X2 developed in 1967 by Frank Dance, which he originally


XI XII named “Dance’s Helix Model of Communication”.
X3 C B
A The model views communication as:
X3 X3m
X3
1. Cyclical,
X4

fBC

X4 2. Influenced by time and experience,


X4 3. Continuous,
:
: 4. Non-Repetitive, and
5. Accumulative (getting increasingly more
Xn
complex and ‘knowledgeable’)
X1, X2, X3 , Xn are news, articles or Dance’s model builds on a range of
information; Feedback (f); Clients (A); Reader or improvements in communication models that took
Audience (B); and Gate Keeper (C). Feedback Loop place in the mid-20th Century.
between Reader (B) and News Paper (C) – fBC;
Here are the progressions:
Feedback Loop between News Paper and Client (A)-
fCA; and Feedback loop between Reader (B) and 1. Linear Models: Early models of
Client (A)- fBA. communication saw it as a linear process:
1.36
Professor Academy
approach to personality, the specific ways each f. Socio-Cultural Theory
person perceives and interprets the world make up Socio-cultural theory looks at the
personality and guide one’s behaviour. People’s view contributions that society makes to individual
of reality/perspective is important in guiding their
Communication

development. This theory stresses the interaction


behaviour and is shaped by learned expectations. between developing people and the culture in
These expectations form personal constructs which they live. Socio-cultural theory grew from
which are generalized ways of anticipating the the work of seminal psychologism. Lev Vygotsky,
world. who believed that parents, caregivers, peers and the
d. Cybernetic Theory (The scientific study of how culture were largely responsible for the development
information communicated in machines and of higher order function. According to Vygotsky,
electronic devices) “Every function in the child’s cultural development
appears twice: first, on the social level, and later, on
In 1948, Norbert Wiener coined the term
the individual level; first, between people (inter-
“cybernetics” to elaborate on the existing theory
psychological) and then inside the child (intra-
of the transmission of messages by incorporating
psychological). As his work became more widely
his idea that people send messages within a
published, his ideas have grown increasingly
system in an effort to control their surrounding
influential in areas including child development,
environment. The basic function of communication,
cognitive psychology and education. Socio-cultural
which Wiener defines in his theory as the processing
theory focuses not only on how adults and peers
of information, is to control the environment in
influence individual learning, but also on how cultural
which one lives. This idea suggests that the goal of
beliefs and attitudes impact how instruction and
human communication is to become familiarized
learning take place. An important concept in socio-
with a certain environment while simultaneously
cultural theory is known as the zone of proximal
influencing aspects of it.Wiener asserts that, ‘the
development. The zone of proximal development “is
purpose of Cybernetics is to develop a language
the distance between the actual development level
and techniques that enable us to attack the problem
as determined by independent problem solving and
of control and communication in general and find
the level of potential development as determined
the proper repertory of ideas and techniques to
through problem solving under adult guidance or in
classify their particular manifestations under certain
collaboration with more capable peers.” Essentially,
concepts’.Wiener introduces the ideas of entropy
it includes all of the knowledge and skills that a
and feedback into his theory. A shortcoming is
person cannot yet understand or perform on their
that Wiener’s theory assumes people are built like
own yet, but is capable of learning with guidance.
complex machines and so, are capable of interpreting
and processing feedback and making changes in g. Critical Theory (critical – Above the layman
order to fit in to an environment. points of view)
e. Socio-Psychological Theory Critical theory was first defined by Max
Social Psychology is a branch of Psychology Horkheimer of the Frankfurt School of Sociology
that studies individuals in the social context. It in his 1937 essay Traditional and Critical Theory.
focuses on the individual and also relies on the Critical theory is a social theory oriented toward
scientific research to generate the theories of social critiquing and changing society as a whole, in
behavior.A key component of this theory is the contrast to traditional theory oriented only to
understanding or explaining it. Horkheimer
postulation of the “comparison level of alternatives”,
wanted to distinguish critical theory as a radical,
which is the actor’s sense of the best possible
emancipatory form of Marxian theory. Critical
alternative (i.e., the choice with the highest benefits
theory questions and challenges the conviction
relative to costs). However, social exchange theories
that what is, or what is in the process of becoming,
differ from economic theories by making predictions
or what appears to be, or what is most commonly
about the relationships between persons, and not
understood to be, or what is dominantly conveyed
just the evaluation of goods.
to be, is also at the same time right and true, good
1.38
Professor Academy
and just, and necessary and inevitable: critical structures and hierarchies of relations with each
theory does not, at least not automatically, accept other, facilitated and regulated by particular kinds
any of this. Critical theory is always particularly of institutions, engaged in particular kinds of
concerned with inquiring into the problems and processes and practices, have formed, reformed,

Communication
limitations, the mistakes, the contradictions and and transformed ourselves, each other, and the
incoherence, the injustices and inequities in how communities, cultures, societies, and world in
human beings operate within particular kinds of which we live.

Self Evaluation
LEVEL 1
1. Which theory involves in the art of effective writing be called: [Jun-2019]
and speaking? a) A transactional model
a) Rhetorical b) Semiotic b) An interaction model
c) Phenomenological d) Critical c) A horizontal model
d) A linear model
2. In which of these models the speaker takes turn to
speak? 10. Feedback of a message comes from:
a) Linear model b) Single model a) Satellite b) Media
c) Solo model d) Interactive model c) Audience d) Communicator
3. In which model speakers are engaged in transac-
tion? Answer Key
a) Transaction model b) Interactive Model
c) Solo model d) Linear model 1 2 3 4 5 6 7 8 9 10
4. Face to face conversation is an example of _________ a d a a a d a c a c
a) Interactive model
b) Non – Linear model LEVEL 2
c) Mechanized model
d) Linear model 1. Match List I with List II [Oct-2020]
List I
5. lasswell’s model of communication an example of
(Examples of Communication)
___________
(A) Sending e-mail
a) Linear model b) Non – Linear
(B) Verbal instruction
c) Circular d) Mechanized
(C) Exchange of information between two
6. The zone of proximal development comes under (D) Traffic signals
___________ theory. [Nov-2020] List II
a) Rhetorical b) Semiotic (Types of Communication)
c) Phenomenological d) Socio-cultural theory (I) Semiotics
7. Which model views communication as oneway (II) Transactional
_________________ (III) Formal groups of people
a) Linear model b) Transaction (IV) Informal
c) Inter active d) Aristotle Choose the correct answer from the following:
a) (A)-(III), (B)-(IV), (C)-(II), (D)-(I)
8. Which of these is not the basic elements of Aristotle b) (A)-(II), (B) - (III), (C)-(I), (D)-(IV)
model c) (A) – (I), (B)-(II), (C)-(IV), (D)-(III)
a) Speaker b) Speech d) (A)-(IV), (B)-(I), (C) - (III), (D)-(II)
c) Audience d) Audio
2. The sequence of elements in linear model of commu-
9. In a classroom situation, a teacher organises group nication is [Sept-2020]
discussion to help arrive at a solution of a problem.
A. Message B. Decoder
In terms of a model of communication used, it will
C. Encoder D. Medium E. Noise

1.39
Professor Academy
Choose the correct answer from the following: (B) Shannon and Weaver
a) A, C, B, E, D b) B, D, C, A, E (C) Wilbur Schramm
c) C, A, D, E, B d) D, E, C, A, B (D) David Berlo
List II
Communication

3. Match List I with List II [Sept-2020]


(I) SMCR- Sender, Message, Channel, Receiver.
List I List II
(II) Circular Communication
Type of communication Characteristics
(III) Speaker – Centred Communication
A. Vertical I. Feedback oriented
(IV) Top-down, Linear Communication
B. Horizontal II. Inter-personal
C. Circular III. Top-down Choose the correct answer from the following:
D. Transactional IV. Rumour-oriented a) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
Choose the correct answer from following: b) (A)-(II), (B)-(III), (C)-(IV), (D)-(I)
a) A - I, B - II, C- III, D - IV c) (A)-(III), (B)-(IV), (C)-(II), (D)-(I)
b) A - II, B- III, C- IV, D - I d) (A)-(IV), (B)-(I), (C)-(III), (D)-(II)
c) A - III, B - IV, C - I, D - II
6. In communication process, when the sender and the
d) A - IV, B - I, C - II, D- III
receiver interchange their roles in respect of sending
4. Given below are two statements [Sept-2020] and receiving the message, it is called [Sept-2020]
Statement I: Signs and symbols have internal rela- a) Universal model
tions to produce meanings. b) Transactional model
Statement II: This is possible because of a network of c) Singular-flow model
signs through such relations d) Pluralistic model
In light of the above statements, choose the most ap-
propriate answer from the options given below. Answer Key
a) Both Statement I and Statement II are true
b) Both Statement I and Statement II are false 1 2 3 4 5 6
c) Statement I is true but Statement II is false a c c a c b
d) Statement I is false but Statement II is true
5. Match List I with List II [Nov-2020]
List I
(A) Aristotle Model

1.40
Professor Academy

Mass Media • Large audience


• Fairly undifferentiated audience composition
• Outside Communication that involves a single • Some form of message reproduction
• Rapid distribution and delivery

Communication
source transmitting information to a large
number of receivers simultaneously is called as • Low cost to the consumers
mass communication. The realm of interpersonal Characteristics:
communication exists another form of
• Direct message toward relatively large,
communication, which involves communication
heterogeneous and anonymous audience.
with mass audiences and hence the name mass
communication; and the channel through • Message are transmitted publicly no privacy.
which this kind of communication takes place • Short duration message for immediate
are referred to as mass media. In case of mass consumption
media,communicated message is a social product. • Feedback is indirect, non-existent or delayed
• Mass communication is the term used to • Cost per exposure per individual is minimum
describe the academic study of various • Source belongs to organization or institutions
means by which individuals and entities relay
• Mostly one way
information to large segments of the population
all at once through mass media. Mediacy is being the acknowledgement of the medi-
• Mass communication can also be defined as um delivering the message, while receiving the mes-
a “process whereby mass produced messages sage. If software designers characterise the two-di-
are transmitted to large, anonymous and mensional desktop interface as unnatural, they really
heterogeneous masses of receivers.” By ‘mass mean that it is too obviously mediated.
produced’ we mean putting the content or message
of mass communication in a form suitable to be The concept of immediacy describes the trans-
distributed to large masses of people. parency of the medium in which an image is pre-
sented. The most simple examples of immediacy
• ‘Heterogeneous’ means that the individual
are paintings and photographs, but over time it has
members of the mass are from a wide variety of
evolved to include cinema and TV. It is interesting
classes of the society. Means that individuals in to note that in these examples the larger the device
the most do not know each other. The source, or that is displaying the image, the more transparent
sender of message in mass communication does it becomes. An IMAX movie screen is more trans-
not know the individual members of the mass. parent than a standard movie screen, for instance.
Also the receivers in mass communication are Similarly, a 55” television is more transparent than
physically separated from each other and share one that measures 26”. The photographer, being
not physical proximity. transparent, achieved transparency through au-
tomatic reproduction, removing the artist as the
agent who stood between the viewer and the im-
age. Today, programmers are transparent as they
use algorithms to create an environment. The pro-
grammer is erased once the computer generates an
image by executing instructions the programmers
have written. Digital graphics and photography are
both examples where the human agent is erased.
However, a computer is imitating not an external
reality, but rather another medium.
Elements of Mass communication:
Transparent immediacy is one that erases itself so
It is observed that the terms mass communication that the user is no longer aware of using a medi-
must have at least five aspects: um,but able to develop a immediate relationship to
1.41
Professor Academy
the contents of that medium. Example: virtual real- The numbers reached by each of these art forms and
ity, whereas the presence of the mediator (the com- technologies have steadily grown from a handful, to
puter) is denied: “an interfaceless interface”. How- hundreds, thousands and even millions via newspa-
ever, transparent immediacy does not commit the pers, radio and TV. But now, through the medium of
Communication

viewer to a naive or magical conviction that the rep- the internet, the audience is virtually limitless. Mass
resentation is the same thing as what it represents. communication has been defined as “the process by
which a person, group of people, or organization
Hypermediacy places greater value on performance creates a message and transmits it through some
and interactivity than on artistic value. As such, the type of medium to a large, anonymous, heteroge-
user is usually more aware of the presence of these neous audience.” So, mass communication has been
media. Hypermedia are most often found in the around for quite some time now in different forms,
world of computer technology. When clicked, the but the ability for virtually anyone with a connected
hyperlink, directs to a new link that opens to show device to broadcast a customised message to tens of
a different type of content. Hypermediacy offers a thousands of people is very new. Now almost anyone
heterogenous space in which representation is con- can be a publisher and a simple smartphone or laptop
ceived of not as a window on to the world, but rather can be their publishing tool. So, the potential is now
as “windowed” itself. Laptops, smart phones, tablet there for organizations to customize their mass com-
computers, iPods, and e-readers are all examples of munication. But there are still barriers. Weak internet
hypermedia. However, hypermediacy is not limited or phone signals, fragmented channel providers, cen-
to the digital realm. Newspapers and magazines fit sorship in some countries, data protection and secu-
the description of hypermedia, as well. rity requirements.
Remediation is the representation of one medium in
another. For example, a digital photo album viewed Types of Mass Media
on a computer, a classic novel read on an e-reader, Mass media can be classified according to
your favorite newspaper’s online edition, or even a their physical form, the technology involved and
Blu-ray copy of a movie. All of these things have been the nature of the communication process.
remediated. They are being represented in a medium
other than the one they were originally created for. In The general classification on the basis is as follows.
other words the medium is “repurposed” to represent a. Traditional Media – Traditional media are a part
another medium.Aggressive remediation is seamless. of our country’s rich heritage. They has a strong base
For instance, Immersive Virtual Reality remediates in our oral tradition. They belong to our own land
both TV and film. Another form of remediation is and strongly rooted in our culture. They are as varied
placing a medium within a medium, for example: the and diverse as our culture itself. From very ancient
play within the play from Hamlet, the film Strange days we have been having fairs and festivals celebrat-
Days borrowing from another film, Vertigo. With ed with spontaneous songs and dances. These songs
literary critics, this has been a favorable thing: both and dances are traditional forms of media which in-
“homage and rivalry”. Repurposing as remediation is form, educate and entertain people.
both what is “unique to digital worlds” and what de-
nies the possibility of uniqueness. The advent of faster forms of media has af-
fected traditional media. However the performers or
History of Mass Communication communicators and the audience in traditional me-
The history of mass communication stretches dia are known to each other unlike in radio or tele-
from prehistoric forms of art and writing, through ba- vision. The environment in which the performances
sic printing technology from around 800AD; the in- take place is natural, known and friendly. The mes-
vention of Gutenberg’s printing press in 1455; the first sages are also simple; the content known and the lan-
weekly printed newspaper in Antwerp in 1605; the guage and idioms are familiar. Unlike other modern
invention of radio by Marconi in 1895; television by media, people never get tired of them.
John Logie Baird in 1925; and finally, to the internet There are several forms of traditional media
(the World Wide Web) by Tim Berners Lee in 1990. in our country. They are known by different names
1.42
Professor Academy
in different regions. Some common examples of tra- c. Electronic Media – The history of electronic
ditional media are storytelling, folk songs, street the- media starts with the invention of cinematograph
atre and puppetry. by Lumiere Brothers who conducted the premier
show of cinema in 1895. Later radio was invented by

Communication
Some forms of traditional media like traditional
songs and mythological stories are written down as Guglielmo Marconi. The first radio station was set
proper text. But different forms of folk media are up in Pittsburg, Newyork and Chicago in the 1920s.
generally spontaneous or are made on the spot. In short, the term electronic media mainly include
Film, Radio and Television.
Social Media Traditional Media d. New Media –
It is a form of electronic It includes contemporary
communication that modes of communication Types of New Media
enables users to create and such as television, radio, Types of New Primary Material Examples
share information, ideas, newspaper, magazine etc. Media Purpose
messages, and content. Discussion on
Harwarezone.
Two-way conversation is Traditional media delivers Forums & topics, interest Forum, Dis-
com
the heart of social media a single message through Chat Rooms group sharing cussion boards
Forums
marketing. one-way communication. of information
Web-Based
Social media gives a lot Only the sender decides Sending of
and Non- Hotmail
of freedom over creation what to publish, telecast electronic mail
Email Web- Gmail
with file
of information and in or broadcast, while the Based email Yahoo Mail
attachments
information sharing. receiver always receives the platforms
information. Fan sites,
Social media involves Traditional media Social Net- Alumni net-
Peer Network- Facebook
targeted two-way is designed for mass working works,
ing LinkedIn
Sites Personal news
communication which consumption which means
updates
means the message can they are targeted at mass
be addressed to targeted consumers. Hosting con- Informative
tent for content, pod-
audience. Content Ag- YouTube
information casts,
gregators Hulu
and videos, chan-
b. Print Media – Print media served as the major entertainment nels
means of communication reaching a wide audience, 3D Experi- Simulate envi-
Major forms of print media are: Virtual Reality ence, Alternate ronments, Second Life
• News papers Space experiences
• Magazines and periodicals MMORPG
(Massively
• Books
multiplay-
Alternate
er online World of
Online Gam- fantasy,
➢ News sheet is a thin newspaper con- ing entertainment,
role-playing Warcraft
taining information about a company or
games), StarCraft II
gaming
multi-player
organization. online
➢ A tabloid is a newspaper with a compact games

page size smaller than broadsheet. There Blogs


Opinions,
information,
Helpdesk,
viewpoints,
MrBrown.com
is no standard size for this newspaper viewpoints opinions
Xiaxue.com

format. A smaller than standard news- Aggregating


paper which focuses on less “serious”
News studies,
news, and Asiaone.com
Portals sponsored
content, especially celebrities, sports, communica-
tion tools
pages, ads
Yahoo

and sensationalist crime stories. News stories,


➢ Newsbooks were the 17th-century pre-
Social News Peer-ranked
popular blog Digg.com
Sites news stories
cursors to today’s newspapers. content

➢ Broadsheet: A standard or full sized Internet and World Wide Web opened up
newspaper that takes a serious look at several new avenues for mass communication which
major news stories. include e-mail, websites, podcasts, e-books, Blog-
1.43
Professor Academy
ging, social networking sites, Internet Protocol Tele- • Asynchronous message passing allows more
vision, Internet radio and the like. These kinds of parallelism. Since a process does not block, it
online and digital means of producing, transmitting can do some computation while the message
and receiving messages are called new media. This is in transit. In the case of receive, this means
Communication

new media has imparted wider knowledge in educa- a process can express its interest in receiving
tion and exposure rather mere facts. messages on multiple ports simultaneously.
e. Social media– It has brought different people Blog Post
from the different geographical area on one platform Blogs
Comments
on which they can share their feelings, ideas, emo-
tions, information and much more. The mainfold so- Main Post
Web Protals
cial networking sites like Facebook, WhatsApp, Ins- Comments

tagram, Twitter, Linkedin, Google+ and others open


First Post
the door to share ideas, views and thoughts on the Asynchronous E-forums
same platform. Follow-up-(post)(s)

First Mail
Media can further be Classified as Synchronous and E-malls
Asynchronous Based on the response or feedback Replies to the mail
Media
Synchronous Messages Social
First comments
Networking
Follow-up-comments
Synchronous Messages are able to flow in
both directions, to and from. Essentially it means that Prevlously non- related
Synchronous Chats
synchronous messaging is a two way communication. Prevlously related
i.e. Sender sends a message to receiver and receiver
receives this message and gives reply to the sender. Functions of Mass Media:
Sender will not send another message until it gets a Mass media is a tremendous source of
reply from receiver. Synchronous message emphasis information for individuals as well as society. The
instant feedback. functions of mass media in sequence are Information,
Asynchronous Messages (No Instant feedback/ reply) Education, Entertainment, Transmission of culture
Asynchronous messages are those without and Social integration.
instant reply/ feedback means that, it is a one way
communication and the flow of communication is INTERESTING FACTS!
one way only. They enable flexibility and offer higher Rich
Ri media is a digital advertising term for an ad that
availability. There’s less pressure on the system to act includes advanced features like video, audio, or other el-
on the information or immediately respond in some ements that encourage viewers to interact and engage
way. Also, one system being down does not impact with the content. While text ads sell with words, and dis-
the other system. For example, emails – you can send play ads sell with pictures, rich media ads offer more
thousands of emails to your friend without her having ways to involve an audience with an ad.
to revert back to you. The drawbacks of asynchronous Hypermedia is an extension to what is known as hy-
collaboration are that they can lack a sense of pertext, or the ability to open new Web pages by click-
immediacy. There’s less immediate interaction. ing text links on a Web browser. Hypermedia extends
upon this by allowing the user to click images, movies,
graphics and other media apart from text to create a
nonlinear network of information.

a) Mass Media can Help in Change


Change would also mean things for the better.
The concept of development of a country is again a
matter of change, when old practices and equipment
1.44
Professor Academy
are changed and new, better and more efficient means • All India Radio (AIR), officially known since
are being used. The mass media play an important role 1956 as Akashvani, is the radio broadcaster of
in communicating this change. By giving the necessary India and division of Prasar Bharati. Established
information, and sometimes skills, the media can help in 1936, it is the sister service of Prasar

Communication
bring about this change. You may ask how media Bharati’s Doordarshan, the national television
can impart skills. A mass media like television can broadcaster. All India Radio is one of the largest
demonstrate and show how things work. You would radio networks in the world. Its headquarters is
have seen on television how a certain dish is cooked at the Akashvani Bhavan in NewDelhi.
using modern kitchen equipment. • Doordarshan is an autonomous public service
b) Mass Media have made the World Smaller and broadcaster owned by the Broadcasting
Closer Ministry of India and is one of two divisions
The speed of media has resulted in bringing of Prasar Bharati. It was established on 15
people across the world closer. Let us take an September 1959.
example. When you watch a cricket match between • Press Council of India It is a statutory body
India and another country in England, Australia or in India that governs the conduct of the print
New Zealand live on television, you feel you are part media. The Press Council of India was first
of the crowd in that stadium. Events, happy or sad, set up on 4th July 1966 by the parliament
happening anywhere can be seen live. Sometimes we on the recommendations for the First Press
feel that the entire world is one big family. Wherever Commission with the object of preserving the
we go to any part of the world, we see the same freedom of the Press and of maintaining and
products such as soft drinks, television, washing improving the standards of press in India. The
machine, refrigerator etc. and the same type of Present Council functions under the Press
advertisements. Similarly, the worldwide web and Council Act 1978. It is a statutory, quasi-
internet have brought people and countries much judicial body which acts as a watchdog of the
closer. press. Every year National Press Day in Indian
c) Mass Media Promotes Distribution of Goods is celebrated on 16th November i.e., a symbol
of a free and responsible press in India.
Mass media are used by the consumer
industry to inform people about their products and Newspaper Circulation in India
services through advertising. Without advertising, • The Readership Studies Council of India (RSCI)
the public will not know about various products and Media Research Users Council (MRUC)
(ranging from soup to oil, television sets to cars) and released the Indian Readership Survey (IRS)
services (banking, insurance, hospitals etc.) which 2017 in Jan 2018. Now a decision has been
are avail-able in the market as well as their prices. taken to publish Quarterly Survey.
Thus mass media help the industries and consumers. • The IRS Q2 was released in August 2019. The
Keyrole played by Mass Media: Information and key results are:
education, Socialization, Entertainment, Political • Total Readership: 1st Dainik Jagran, 2nd:
awareness, Cultural transmission, Catalyst to devel- Hindustan, 3rd: Dainik Bhaskar, 4th: Amar
opment . Ujala, 5th: Daily Thanthi.
Mass Communication Agencies: • Magazine Circulation in India: 1st India
• Prasar Bharati is India’s largest public Today (English), 2nd : India Today (Hindi),
broadcaster. It is an autonomous body set 3rd: Samanya Gyan Darpan, 4th: Vanitha
up by an Act of Parliament and comprises (Malayam)
Doordarshan television network and All India • Television Broadcasting Standards: NTSC
Radio which were earlier media units of the (National Television Standards Committee)
Ministry of Information and Broadcasting. It is a standard used in North America and Japan.
was formed in 1997.

1.45
Professor Academy
• SECAM (Sequential Color Memory) is used them. Like in any other profession, like law or
sparingly around the world and can be found in medicine, the media also need to have a code of ethics
France, parts of Greece, Eastern Europe, Russia, or guidelines on what is right or wrong. In the case
Africa and a few other parts of the world. of lawyers and doctors, there are clear codes of ethics,
Communication

• TRP (Target Rating Points) is a measure of and anyone who violates the code can be punished, or
the purchased points representing an estimate removed from the profession. But in the case of the
of the component of the target audience with in mass media there are only a few guide-lines and no
the gross audience. Similar to the gross rating strict code of conduct. The Press Council of India is
one of the organizations which issues guidelines on
point, it is measured as the sum of ratings
media ethics. To keep the fair name of the profession,
achieved by a specific media vehicle (e.g T V
the media practitioners need to follow certain ethical
channel or program) of the target audience
codes which are listed below:
reached by an advertisement.
• Press Trust of India (PTI) is the largest news a) Accuracy: The information provided by media
agency in India. It is headquartered in Delhi persons in the printmedia, radio, television and
and is a nonprofit cooperative among more internet has to be accurate. If incorrect or baseless
than 450 Indian newspapers. It took over the information is given, it can harm the interests
Indian operations of the Associated Press and of individuals, institutions and the country. For
Reuters soon after India’s independence on being accurate, media persons have to verify the
August 15, 1947. It provides news coverage correctness of their facts. For example, if only 50
and information of the region in both English people have died in an accident, the media cannot
and Hindi. Press Trust of India is the only give out the figure as 200 or 500. If a media person
news agency in South Asia which operates its writes against anybody or accuses someone
own communication satellite, an INSAT, to of dishonesty, that person should be given an
broadcast news and information. opportunity to give his or her version of the story.
• Hindusthan Samachar was a multilingual b) Confidentiality: A media person maintains
news agency in India. It was set up in 1948 by confidentiality of information revealed by
S.S Apte, offering its services in 10 languages: various sources.
Bengali, Oriya, Assamese, Telugu, Malayalam,
Urdu, Punjabi, Gujarati, Hindi and Marathi. In c) Protection of sources: A source which has
1951 the Government of Bihar subscribed to the provided confidential information should
Hindusthan Samachar, followed by many states never be revealed. For example if a government
of emergency was declared in India in 1975, official provides information pertaining to his
Hindusthan Samachar was merged with Press department, media person should not reveal the
Trust of India, United News of India and Bharati name of the person in order to protect him from
Samachar to form the media monopoly Samachar. any harm.
d) Right to privacy: A journalist should respect
Media Ethics the right of a person to have privacy. That would
We have seen how powerful the mass media mean that a journalist should not write about
are. By their very nature media and the media the private life of ordinary citizens.
people meaning journalists of the print media, radio e) No incitement to violence: Mass media should
and television are quite powerful. So politicians, not motivate or provoke people to indulge in
bureaucrats and the police look at them with violence or crime. Glorifying violence in writings
apprehension. Generally they do not want to be in should also be avoided.
the media if the reports are not in their favour. If the
f) No vulgarity or obscenity: Mass Media should
media people praise them, they are happy. So by and
large people try to be friendly with the media. But not write, display or broadcast anything that is
for the media this power comes with tremendous vulgar or obscene.
responsibility. If they misuse that power to do wrong g) No Communal writing: India is a country where
things or trouble others, people will stop trusting people follow diverse faiths and religions. Our
1.46
Professor Academy
Constitution believes in secularism, which means Impact of Mass Media
respect for all faiths and religions. It is easy for
the media to create problems between sections A) Positive Effects
with different faiths and religions by writing about • Media provide news and information required

Communication
them or broadcasting issues which can pro-mote by the people.
communal problems. There have been several
occasions when communal riots and killings have • Media can educate the public.
taken place based on media reports. The media has • Media helps a democracy function effectively.
to ensure that it works in the interest of the public. They inform the public about government
policies and programmes and how these
Theories in Mass media programmes can be useful to them. This helps
Three main sociological perspectives on the the people voice their feelings and helps the
role of media exists: government to make necessary changes in
their policies or programmes.
• The Limited effects theory • Media can entertain people.
• The class dominant theory,
• The culturalist theory. • Media can act as an agent of change in
a) Limited effects theory: development.
• Media has brought people of the world closer
The limited effects theory argues that because to each other.
people generally choose what to watch or read
based on what they already believe, media exerts a • Media promote trade and industry through
negligible influence. This theory Originated and was advertisements
tested in the 1940s and 1950s. • Media can help the political and democratic
processes of a country.
b) Class dominant theory
• Media can bring in positive social changes.
The Class dominant theory argues that the medial
reflects and projects the view of a minority elite, B) Negative Effects
which controls it. Those people who own and • The traditional culture of a country is adversely
control the corporations that produce media affected by mass media.
comprise this elite. • Entertainment has become the main
c) Culturalist Theory component of mass media. This affects the
The cutluralist theory, developed in the 1980s and primary objectives of media to inform and
1990s, combines the other two theories and claims educate the people.
that people interact with media to create their own • Media promote violence. Studies have proved
meanings out of the images and messages they that violence shown on television and cinema
receive. This theory sees audiences as playing an have negative effects on children. Mass media
active rather than passive role in relation to mass promote the desire in people to buy and own
media. One strand of researches focuses on the products that are advertised through the media
audiences and how they interact with media the but which may not be essential for them.
other strand of research focuses on those who
produce the media, particularly the news. Self Evaluation
Importance of Mass media
LEVEL 1
_ Pervasiveness of Mass Media
1. Communicated message is considered as a/an
_ Mass Communication informs a) Social product [Nov-2020]
_ Mass Media Entertains b) Unnatural product
_ Mass communication Persuades c) Spin – off product
d) Techno product
_ Mass communication Binds

1.47
Professor Academy
2. The domain of media appeal addresses the issues re- (B) News book
lated to [Sept-2020] (C) News sheets
a) Knowledge b) Learning (D) Tabloids
c) Legality d) Emotions (E) Broad sheets
Communication

Choose the correct answer from the following:


3. All India Radio officially known as ________
a) (C), (B), (A), (D), (E)
a) Akashvani
b) (D), (E), (C), (B), (A)
b) Broad casting media
c) (A), (B), (C), (E), (D)
c) Akila India vannoli
d) (B), (C), (D), (E), (A)
d) AIR
2. The emergence of media of communication, in
4. Because of new media, learning is no longer an as-
chronological sequence, is [Oct-2020]
sembly of [Sept-2020]
a) Radio b) Newspaper
a) Liberal views
c) Film d) Television
b) Technology - based efforts
e) Internet
c) Facts
Choose the correct answer from the following:
d) Knowledge
a) A, C, D, E, B b) B, C, A, D, E
5. Which of the following factors are important in c) C, D, E, A, B d) D, E, C, B, A
communication? [Oct-2020]
3. Identify the correct sequence of the media produc-
A. Slang
tion process. [Oct-2020]
B. Cynical attitude
(A) Content Preparation
C. Framing
(B) Planning
D. Priming
(C) Production
E. Immediacy
(D) Transmission
Choose the correct answer from the following:
(E) Feedback analysis
a) A, B and C only b) B, C and D only
Choose the correct answer from the following:
c) A, D and E only d) C, D and E only
a) (A), (B), (C), (D), (E)
6. Announcement of arrival and departure of trains at b) (B), (C), (D), (A), (E)
railway stations is: [Oct-2020] c) (D), (D), (B), (E), (A)
a) Spatial communication d) (B), (A), (C), (D), (E)
b) Public communication
4. Match the List I with List II: [Nov-2020]
c) Organizational communication
List I List II
d) Sectional communication
(Medium) (Example)
7. Which of the following is ‘feedback’ in newspaper (A) Newspaper (I) Networking
communication? (B) Radio and television (II) Audio, Video
a) Articles b) Editorials (C) Social Media (III) Broadsheet
c) Letters to the editor d) News (D) Multi-media (IV) Broadcasting
8. Accuracy is a part of ___________ Choose the correct answer from the following:
a) Media effects b) Media theory a) (A)-(III), (B)-(IV), (D)-(I), (D)-(II)
c) Media Ethics d) Media functions b) (A)-(IV), (B)-(I), (C)-(II), (D)-(III)
c) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
d) (A)-(II), (B)-(III), (C)-(IV), (D)-(I)
Answer Key
5. Synchronous communication takes place through
1 2 3 4 5 6 7 8 which of the following technologies? [Sept-2020]
A. Video chat B. Virtual classrooms
a d a c d b c c
C. Audio conferencing D. Wikis
E. E mail
LEVEL 2 Choose the correct answer from following:
a) A, B and C only b) B, C and D only
1. Identify the correct sequence of the emergence of the c) C, D and E only d) A, D and E only
following publications: [Nov-2020]
(A) Standard newspapers

1.48
Professor Academy
6. Identify the correct sequence of mass media 10. Match List I with List IT: [Nov-2020]
functions: [Oct-2020] List I
(A) Entertainment (Type of media)
(B) Information (A) Synchronous media

Communication
(C) Transmission of culture (B) Asynchronous media
(D) Social integration (C) Rich media
(E) Education (D) Hyper media
Choose the correct answer from the following:
List II
a) (A), (C), (D), (E), (B) b) (B), (C), (E), (D), (A)
(Example)
c) (B), (E), (A), (C), (D) d) (C), (D), (E), (A), (B)
(I) Application of multi-media
7. Find out the correct sequence of the following trans- (II) Interactive multi-media
missions: [Oct-2020] (III) E-mail
(A) Narrowcasting (B) Telegraph (IV) Telephone
(C) Broadcasting (D) Telephone Choose the correct answer from the following:
(E) Podcasting a) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
Choose the correct answer from the following: b) (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
a) (A), (C), (B), (E), (D) b) (B), (D), (C), (A), (E) c) (A)-(II), (B)-(IV), (C)-(I), (D)-(III)
c) (C), (D), (E), (A), (B) d) (D), (E), (A), (B), (C) d) (A)-(III), (B)-(I), (C)-(IV), (D)-(II)
8. Find out the correct sequence of selectivity stages in 11. Match List 1 with List II [Sept-2020]
mass communication. [Nov-2020] List I
(A) Exposure (B) Retention A. Addressing the nation over national TV network
(C) Attitudinal change (D) Perception B. Conducting a workshop for a select number of
(E) Attention teachers
Choose the correct answer from following: C. Internal conversation with fellow workers
a) (A), (B), (C), (E), (D) b) (B), (C), (D), (E), (A) D. Recollection of past events
c) (C), (E), (D), (A), (B) d) (A), (E), (D), (B), (C)
List II
9. Match List I with List II [Nov-2020] Example
List I Type of communication
(Mode of Communication) I. Horizontal communication
(A) One-to-one II. Intra-personal communication
(B) One -to-many III. Mass communication
(C) Many-to- many IV. Group communication
(D) One-to-none Choose the correct answer from the following:
a) A - I, B - II, C- III, D - IV
List II
b) A - II, B - III, C - IV, D - I
(Type of communication)
c) A - III, B - IV, C - I, D – II
(I) Network (transactional)
d) A - IV, B - I, C - II, D – III
(II) Intra-personal
(III) Inter-personal
(IV) Mass Communication especially print Answer Key
Choose the correct answer from the following:
1 2 3 4 5 6 7 8 9 10
a) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
b) (A)-(II), (B)-(III), (C)-(IV), (D)-(I) d b d a a c b d c b
c) (A)-(III),(B)-(IV), (C)-(I), (D)-(II) 11
d) (A)-(IV), (B)-(I), (C)-(II), (D)-(III) c

1.49
2 DATA INTERPRETATION

Why does NET exam demand aspirants to develop Data  ÀĶ´ÆÃ¶·Æ½½Ä´Àöº¿µ²Å²º¿Å¶ÃÁöŲźÀ¿ʁ´À¿ÄºÄŶ¿´Ê


Interpretation skill ? º¿Áò´Åº´¶ºÄÃ¶ÂÆºÃ¶µʇ¶¶ÁÁò´Åº´º¿¸³¶´²ÆÄ¶ʲÅʓÄʶÀ¿½Ê
¼¶ÊÅÀÄÆ´´¶ÄIJĺÅö²½½Ê¹¶½ÁÄÄÅÆµ¶¿ÅÅÀöµÆ´¶ź¾¶ÄÁ¶¿ÅÀ¿
Data Interpretation is the process of reviewing data
²Å²º¿Å¶ÃÁöŲźÀ¿ʁ½¶²Çº¿¸¾Àöź¾¶·ÀÃÀʶÃĶ´ÅºÀ¿Ä²¿µ
ŹÃÀƸ¹ ÄÀ¾¶ Áöµ¶ȱ¿¶µ ÁÃÀ´¶ÄĶÄ ȹº´¹ Ⱥ½½ ¹¶½Á ²Äĺ¸¿
Æ¿µ¶ÃÄŲ¿µ ʲÅ ź¾¶ʉ¾²¿²¸¶¾¶¿Å ´À¾¶Ä ȺŹ Áò´ÅºÄ¶ʇ ¹¶
ÄÀ¾¶¾¶²¿º¿¸ÅÀʶµ²Å²²¿µ²ÃúǶ²Å²ö½¶Ç²¿Å´À¿´½ÆÄºÀ¿ʇ
¾ÀöÊÀÆÁò´Åº´¶ʁʶ³¶ÅŶÃÊÀƸ¶Åʇ
ź¿ÇÀ½Ç¶ÄŲ¼º¿¸ʶÃ¶ÄÆ½ÅÀ·µ²Å²²¿²½ÊĺÄʁ¾²¼º¿¸º¿·¶Ã¶¿´¶Ä
À¿ ʶ ö½²ÅºÀ¿Ä ÄÅÆµº¶µʁ ²¿µ ÆÄº¿¸ ʶ¾ ÅÀ ´À¿´½Æµ¶ʇ ¹¶  À½Çº¿¸µ²Å²º¿Å¶ÃÁöŲźÀ¿¶Ç¶Ãʵ²Êº¿ʶȲÊʲÅ
 ¶É²¾ µ¶¾²¿µÄ ´²¿µºµ²Å¶ ÅÀ ļº½½ º¿ º¿Å¶ÃÁöŲźÀ¿ À· ʶ   ÂÆ¶ÄźÀ¿Ä ĹÀƽµ ²ÁÁ¶²Ã À¿ ÊÀÆÃ ´À¾ÁÆÅ¶Ãʤ¾À³º½¶
µ²Å² ²Ç²º½²³½¶ ²Ä ºÅ º¿ÇÀ½Ç¶Ä ÅÀ ³Ãº¿¸ Dz½ºµ ´À¿´½ÆÄºÀ¿ ·ÃÀ¾ Ĵö¶¿²¿µÊÀƹ²Ç¶ÅÀµÀÊÀÆÃÃÀƸ¹ÈÀüº¿Á²Á¶ÃʲźÄ
ʶ·²´ÅƲ½µ¶Å²º½Ä²¿µ²½ÄÀ³ÊŹºÄÆ¿ºÅʁʶʲÄĶÄÄʶµ²Å² ÆÄº¿¸Á¶¿ȹÁ²Á¶Ãʯȹº´¹Ⱥ½½³¶ʶ¶É²´ÅÄ´¶¿²ÃºÀÀ·ÊÀÆÃ
²¿²½Êź´²½ ļº½½ ²¿µ ¿Æ¾¶Ãº´²½ ²¿²½Êź´²½ ļº½½ À· ² ´²¿µºµ²Å¶ʇ ´À¾ÁÆÅ¶Ãʉ³²Ä¶µ ¶É²¾ ¾Àµ¶ʰʁ Æ´¹ ² ¼º¿µ À· Áò´ÅºÄ¶ ÈÀƽµ
²Å² ¿Å¶ÃÁöŲźÀ¿ ºÄ ¿ÀÅ À¿½Ê ²³ÀÆÅ µÀº¿¸ ¾²Å¹¶¾²Åº´²½ ö²½½Ê¹¶½ÁÊÀƺ¿ź¾¶¾²¿²¸¶¾¶¿Å²¿µÄÅöÄľ²¿²¸¶¾¶¿Åº¿
´²½´Æ½²ÅºÀ¿ʁ ³ÆÅ ²½ÄÀ ²³ÀÆÅ º¿Å¶ÃÁöź¿¸ ʶ ¸ºÇ¶¿ µ²Å² ²¿µ ʶ´À¾ÁÆÅ¶Ãʉ³²Ä¶µ¶É²¾¾Àµ¶ʇ
²¿Äȶú¿¸ʶÂÆ¶ÄźÀ¿Ä²Ä¼¶µȺŹʶ³¶ÄÅÀÁźÀ¿ÄÁÃÀǺµ¶µʇ Blueprint of Data Interpretation unit
ÀŲ´¼½¶ ÂÆ¶ÄźÀ¿Äʁ½¶²Ã¿´À¿´¶ÁÅÄÀ·²Ç¶Ã²¸¶ʁÁ¶Ã´¶¿Å²¸¶ʁ
òźÀÄ ²¿µ ÁÃÀÁÀÃźÀ¿Äʇ ¹ºÄ ºÄ ² Æ¿ºÅ ȹ¶Ã¶ ´²¿µºµ²Å¶ ´²¿  ¹¶ ÂÆ¶ÄźÀ¿Ä ²Ã¶ µºÄ´ÆÄ͵ ½¶Ç¶½ ȺĶ ²´´Àõº¿¸ ÅÀ
Ķ´ÆÃ¶ʶ¾²Éº¾Æ¾¾²Ã¼ÄʯЃЂʰȺŹ´À¿ÄŲ¿ÅÁò´Åº´¶ʇ ʶ ÅÀ¿¶ À· µºȲ´Æ½ÅÊʇ ¶¿´¶ ʶ ÄÅÆµ¶¿ÅÄ ²Ã¶ ²µÇºÄ¶µ ¸À º¿
ʶÄ¶ÂÆ¶¿´¶·ÃÀ¾½¶Ç¶½ЃÅÀ½¶Ç¶½ЇʇÀ¾¶µÇ²¿´¶µÂÆ¶ÄźÀ¿Ä
Syllabus ²Ã¶µºÄ´ÆÄ͵²·Å¶Ã½¶Ç¶½Ї²¿µ²½ÄÀÄÀ¾¶ö´¶¿ÅÁöǺÀÆÄ¶Å
Data Interpretation ÂÆ¶ÄźÀ¿Ä¹²Ä³¶¶¿µºÄ´ÆÄ͵ÅÀ¶¿´ÀÆÃ²¸¶ÊÀÆÃ´À¿ȱµ¶¿´¶³Ê
ÀÃÅòʺ¿¸ÆÁµ²Å¶µÂÆ¶ÄźÀ¿Äʇ
• ÀÆÃ´¶Äʁ²´ÂƺĺźÀ¿²¿µ´½²Äĺȱ´²ÅºÀ¿À·²Å²ʇ
• Ʋ¿ÅºÅ²ÅºÇ¶²¿µƲ½ºÅ²ÅºÇ¶²Å²ʇ À Æ¿µ¶ÃÄŲ¿µ ʶ ³½Æ¶ Áú¿Å À· ÁÃÀ·¶ÄÄÀà ²´²µ²¾Ê ÊÀÆ ²Ã¶
Ã¶ÂÆºÃ¶µÅÀö²µ²³ÀÆÅǶÃǺ¶ÈÀ·ʶÂÆ¶ÄźÀ¿ÅÊÁ¶ÄÀ·ʶ ʇ
• Graphical representation (Bar-chart, Histograms, Pie-
´¹²ÃÅʁ²³½¶ʉ´¹²ÃŲ¿µº¿¶ʉ´¹²ÃÅʰ²¿µ¾²ÁÁº¿¸À·²Å²ʇ ǶÃǺ¶È À· ʶ ÂÆ¶ÄźÀ¿ ÅÊÁ¶Ä À· ʶ  ʃ ³Ä¶ÃDzźÀ¿
• ²Å² ¿Å¶ÃÁöŲźÀ¿ʇ ³²Ä¶µ ÂÆ¶ÄźÀ¿Äʃ ¹¶Ä¶ ÂÆ¶ÄźÀ¿Ä Ã¶ÂÆºÃ¶ ĺ¾Á½¶ ²¿µ ´²Ã¶·Æ½
À³Ä¶ÃDzźÀ¿ À· ʶ µ²Å²ʇ ¿Å¶ÃÁöŲźÀ¿ ²¿µ ²½´Æ½²ÅºÀ¿ ʯ ʰ
• ²Å²²¿µ ÀǶÿ²¿´¶ʇ
³²Ä¶µ ÂÆ¶ÄźÀ¿Äʃ ¹¶Ä¶ ÂÆ¶ÄźÀ¿Ä Ã¶ÂÆºÃ¶ ³²Äº´ ²¿²½ÊĺÄ ²¿µ
Trend Analysis ´²½´Æ½²ÅºÀ¿Ⱥʵ²Å²ʇÉÁ½ÀòźǶÂÆ¶ÄźÀ¿Äʃ¹¶Ä¶ÂÆ¶ÄźÀ¿Ä
Ⱥ½½ ÁÀĶ ² Ä´¶¿²ÃºÀʁ ²Ä¼º¿¸ ʶ ´²¿µºµ²Å¶ ÅÀ ȱ¿µ ²¿µ ¾²Ê
À ÄÀ½Ç¶ ²   ¶Ȳ´º¶¿Å½Êʁ ´²¿µºµ²Å¶ ¿¶¶µ ÅÀ ³ÃÆÄ¹ ÆÁ ÊÀÆÃ
¶ÉÁ¶´ÅÊÀÆÅÀÆÄ¶ʁÀ³Ä¶ÃDzźÀ¿ʁº¿Å¶ÃÁöŲźÀ¿²¿µ´²½´Æ½²ÅºÀ¿ʇ
´²½´Æ½²ÅºÀ¿ ļº½½Ä ÄÆ´¹ ²Ä ´²½´Æ½²Åº¿¸ Á¶Ã´¶¿Å²¸¶Ä º¿ ² ĹÀÃÅ
¿ ½¶Ç¶½ Ѓ ʶ µ²Å² ĶÅ ¹²Ä ² ¸Ã¶²Å¶Ã ¿Æ¾³¶Ã À· À³Ä¶ÃDzźÀ¿ʉ
ȲÊʁ¶Å´ʇʁ¿²¿²½Êĺ¿¸ʶö´¶¿Å¶É²¾ÂÆ¶ÄźÀ¿ÄʁºÅºÄ´½¶²Ã
³²Ä¶µÂÆ¶ÄźÀ¿Ä²¿µÀ¿¶ÀÃÅÈÀº¿Å¶ÃÁöŲźÀ¿ȹ´²½´Æ½²ÅºÀ¿ʉ
ʲÅŲ³Æ½²Ã·ÀþÀ·µ²Å²ºÄ¾ÀÄŷöÂƶ¿Å½Ê²Ä¼¶µŹÀƸ¹ʶ
³²Ä¶µʯ ʰÂÆ¶ÄźÀ¿ÄʇÄʁʶ¶Ç¶½º¿´Ã¶²Ä¶Äʶ ÂÆ¶ÄźÀ¿Ä
Äʽ½²³ÆÄ ²½ÄÀ º¿´½Æµ¶Ä Áº¶ ´¹²ÃÅʁ ³²Ã ¸Ã²Á¹ʁ ²¿µ ½º¿¶ ¸Ã²Á¹ʇ
²¿µ¶ÉÁ½ÀòźǶÂÆ¶ÄźÀ¿ÄÀ´´ÆÁʾÀö¿Æ¾³¶Ãº¿²µ²Å²ĶÅʇ
²¿µºµ²Å¶Ä¿¶¶µÅÀÁ¶Ã·Àþ´²½´Æ½²ÅºÀ¿Ä·²ÄŶò¿µ²´´ÆÃ²Å¶½Êʁ
²Ä ʶ Åö¿µ À· ʶ ¶É²¾ ¹²Ä Ĺº·Å¶µ ÅÀȲõÄ ´²½´Æ½²Åº¿¸ ¹¶º¿Å¶Ã¶Äź¿¸·¶²ÅÆÃ¶À· ºÄʲÅ¿ÀŲ½½ÂÆ¶ÄźÀ¿Äº¿²ĶÅ
²´´ÆÃ²Å¶Dz½Æ¶ÄòʶÃʲ¿²ÁÁÃÀɺ¾²Å¶Dz½Æ¶Äʇ¹¶ ĹÀƽµ ²Ã¶À·¶ÂƲ½µºȲ´Æ½ÅÊʇÁ¶´ºȱ´²½½Êʁ¾ÀÄÅĶÅĹ²Ç¶²ʒ´Àƿź¿¸ʓ
³¶ÄÀ½Ç¶µȺŹº¿ЃЂʉЃЄ¾º¿ÆÅ¶Äʇ ·ʶź¾¶ʲÅÊÀÆŲ¼¶ȹº½¶ ÅÊÁ¶À·ÂÆ¶ÄźÀ¿ʯ ÀȾ²¿Ê´À¾Á²¿º¶Ä¹²Ç¶ÁÃÀȱÅľÀöʲ¿
ÄÀ½Çº¿¸µºȮ¶Ã¶¿Å ʓĺľÀöʲ¿ʶź¾¶²Ȳþ¶µ²³ÀǶʁʶ¿ ²ҁʁ ¹ÀÈ ¾²¿Ê Á¶ÀÁ½¶ ¹²Ç¶ º¿´À¾¶ ½¶ÄÄ ʲ¿ Äʇ Ëʁ º¿µº¿¸
ÊÀÆö²½½Ê¿¶¶µÅÀÈÀüÀ¿ºÅʇ Å¿ÀÅÀ¿½Ê¾²ÅŶÃIJ³ÀÆÅÄÀ½Çº¿¸ ʶòźÀ³Ê´À¾Á²Ãº¿¸ÅÈÀ¿Æ¾³¶ÃÄʰʇÀÄÅÀ·ʶĶÂÆ¶ÄźÀ¿Ä
²½½ʶȱǶÂÆ¶ÄźÀ¿Ä´ÀÃö´Å½Êʁ³ÆÅ²½ÄÀ²³ÀÆÅÄÀ½Çº¿¸ºÅ·²ÄÅʁ ´²¿³¶ÄÀ½Ç¶µȺŹÀÆÅ´²½´Æ½²ÅºÀ¿³ÆÅ³Ê´½ÀĶº¿ÄÁ¶´ÅºÀ¿À·ʶ
ȹº´¹¾¶²¿Äº¿²ĹÀÃÅź¾¶Ä´Àú¿¸ʶ·Æ½½¾²Ã¼Äʇ¹¶Àʶà µ²Å²ÁöĶ¿Å¶µʇ¹¶Ä¶ÂÆ¶ÄźÀ¿ÄÈÀƽµ³¶´²Å¶¸Àú˶µ²Äʒ¸º·Åʓ
Áº´ÅÆÃ¶ȹº´¹ºÄǺǺµÀ¿²¿²½Êĺ¿¸ʶö´¶¿Å¶É²¾ÂÆ¶ÄźÀ¿Ä ÂÆ¶ÄźÀ¿Ä µ¶Äº¸¿¶µ ÅÀ ŶÄÅ ² ÄÅÆµ¶¿ÅʓÄ ÁöĶ¿´¶ À· ¾º¿µʁ ²¿µ
ºÄ ʲÅ ÀÁźÀ¿Ä ²Ã¶ ·Àþƽ²Å¶µ ÆÄº¿¸ ·Ã²´ÅºÀ¿Äʇ ²¿µºµ²Å¶Ä ĹÀƽµ¿¶Ç¶Ã³¶¾ºÄ͵ÀÆÅÀ¿ʇ
²Ã¶Ã¶ÂƺöµÅÀ¾¶¾Àú˶ÄÀ¾¶À·ʶ·Ã²´ÅºÀ¿Dz½Æ¶ÄʲŲö START PRACTISING! SUCCESS IS YOURS!
µºÄ´ÆÄ͵º¿ʶ¿¶ÉÅÁ²¸¶ÄʁÅÀ¾²¼¶ÊÀÆÃ´²½´Æ½²ÅºÀ¿ÄÁ¶¶µÊʇ
Professor Academy
Data:
Data is facts and statistics collected together for
reference or analysis. Data in numerical format helps
us to draw conclusions by comparing the data.
Interpretation:
Interpretation is the act of explaining, re-framing
or otherwise showing your own understanding of Group A Group B
something.
Different method in which data can be presented Line graph:
a)Tables: Line graph is the simplified version of the normal
Tables are the most convenient and versatile method bar graph. It is simple to draw conclusions from Line
to present data. Analysing and drawing conclusions Graph.
from tables is much easier than any other method.
Tables are the fundamental method to represent data.
Data Interpretation

In tables, the data is arranged in rows and columns


which help us to scrutinize data efficiently.

Standard Boys Girls


1 2 3 4 5
1 32 26
2 24 28

Various concepts required to solve questions on data


b) Pie chart:
interpretation
A Pie chart is a pictorial representation of data as part
of a circle. The circle presents the total value and the Average = (Sum of all the values) / no. of values
different parts of the circle present certain portions of
the data.
There are two types of pie chart: Normal and Ratio = Comparison of like terms in its
Exploded simplest forms

25%
Percentage
30% x is what percentage of y = x/y × 100
10%
x is what percentage more (or) less than
12% y = (x – y) / y × 100
23%
Percentage (Final value - Initial value) × 100
change = Initial value

c) Graphs: Tricks to solve data interpretation questions


Bar graph: 1) Analyze the Data Carefully- Have a thorough look
at the data given. Analyze the data. You will waste a lot
A bar graph is a way of representing data on the graph
of time if you jump on the questions to find answers
using X-axis and Y-axis. It is the most convenient way
directly. Look carefully at the labels, understand the
to present data. It is proven that using lengths in case
graph, scrutinize the data very carefully.
of bar chart is a better indicator than pie charts where
the data is categorized in terms of areas. 2) Read the question carefully- Before rushing over
the Data Interpretation question, stay calm and read
2.2
Professor Academy
the question carefully. In data interpretation, it is 1. India ranks …….. in adult Literacy among the
important to understand the question in order to solve countries listed as per the 2017 data given
the question. a) Sixth b) Fifth c) Third d) Fourth
Answer: a
3) Avoid Unnecessary Calculations- We are taught to Adult literacy
solve questions step by step. But in National Eligibility Korean republic -97%-1st
Test, time plays an important role, it is better to avoid Philippins -95%-2nd
unnecessary steps and solve using short cuts. Malaysia -86%-3rd
4) Pay close attention to the units used- In Data Indonesia -85%-4th
Interpretation Question at times the different unit is China -83%-5th
used for the question and another unit in the data. For India -62%-6th
example, a question may talk about two units. The time 2. Infant mortality rate is highest in
of the first unit is in hours and the second unit is in a) India b) Pakistan
minutes. Always convert the units into the ones which c) Korea Republic d) China
is required. So, if the question asks how many minutes it Answer: b
will take, convert the data from hours to minutes.

Data Interpretation
Pakistan hold first position with 95 death per
thousand birth
5) Learn to Approximate the values- You need not to
find the exact answer always. Many times, the options 3. Life expectancy at birth is highest in
that are given are far enough from each other which a) Korea Republic b) Malaysia
gives you enough space for approximation. So, for c) India d) Philippines
example, if you are asked to divide 542678/181234, Answer: a
you can easily approximate that the answer will be The life expectancy in Korea Republic is 72.4, the
somewhere around 3 by looking at the first 2 digits highest.
only. 54/18 is 3. 4. How many countries having 70% and above adult
literacy rate
Level-1
a) 3 b) 4 c) 5 d) 6
Solved Question with Explanation Answer: c
Korea Republic, Philippines, Malaysia, Indonesia,
1.1. Directions (1-5)
China are the 5 countries having 70% and above
Study the table given below to answer these adult literacy rate.
questions. Indicators of Human development for
5. What is the ratio between Korea Republic and
some Asian Countries – 2017
Malaysia in infant mortality rate?
Infant a) 3: 9 b) 3: 5 c) 9: 19 d) 1: 2
Adult
Life Mortality Answer: b
Literacy Korea Republic : Malaysia = 6 : 10 = 3 : 5
Country Expectancy rate
rate
At birth (per thou- 1.2. Directions (6-10)
(per cent)
sand births) Study the following table to answer the given questions:
India 62.4 71 62 Percentage of marks obtained by seven students in six
Bangladesh 58.1 81 39 subjects
China 69.8 38 83 Subject
Indonesia 65.1 45 85 (Max,
Eng. His Com Math Science Econ
Korea Republic 72.4 6 97 Marks
Malaysia 72.0 10 86 Students
Pakistan 64.0 95 41 (100) (100) (100) (100) (100) (100) (100)
The Philippines 68.3 32 95 Meera 100 70 50 50 90 60
Subodh 80 80 80 100 80 40

2.3
“If you work on something a little bit every day, you end up with something that is massive” – Kenneth
Professor Academy
Kunal 100 80 60 90 70 80 11. Find the average mark of Edwin?
a) 90 b) 79 c) 60 d) 69
Soni 60 70 65 80 80 80
12. What is the ratio of Giri’s Maths marks to that
Richu 50 90 62 80 100 100
Subbu English mark?
Irene 40 70 64 70 65 85 a) 13:14 b) 14:13 c) 15:16 d) 14: 15
Vijay 80 100 35 65 50 7513. What is the difference between of Edwin and Raj
6. What is the total marks obtained by Meera in all in total marks?
the subject? a) 150 b) 120 c) 130 d) 200
a) 448 b) 580 c) 420 d) 47414. Students who secured 50% below considered to be
Answer: c failed in the examination. How many students are
100+70+50+50+90+60=420 failed in the examination?
7. What is the average marks obtained by these seven a) 1 b) 4 c) 3 d) 2
students in History? (rounded off to two digits) 15. Find the difference between total mark of Tamil
a) 72 b) 73 c) 86 d) 80 and Social science for all the students?
Data Interpretation

Answer: d a) 27 b) 37 c) 17 d) 7
(70+80+80+70+90+70+100)/ 7=560/7=80
1.4 Directions (16–20)
8. How many students have got 60% or more marks
Study the following information carefully and answer
in all the subjects?
the given questions. The Table, given here, shows the
a) One b) Two c) Three d) Four
number of tickets sold by 6 students A, B. C, D, E and
Answer: b
F during a fair. Observe the table and answer questions
Soni & Kunal secured above 60% in all subject.
based on it.
9. What is the overall percentage of Kunal ?
a) 64 b) 65 c) 75 d) 80 Students A B C D E F
Answer: d Tickets 16 8 20 7 24 14
(100+80+60+90+70+80)/6=480/6=80 16. Total number of tickets sold by A, B and C is
10. In which subject richu secured the best? a) 45 b) 44 c) 42 d) 40
a) Maths b) Commerce 17. The least number of tickets were sold by
c) History d) Science. a) B b) F c) A d) D
Answer: d
Richu secured 100 marks in Science 18. Total number of tickets sold by D, E and F is
a) 47 b) 46 c) 45 d) 44
Practice Question
19. The difference between tickets sold by E and F ?
1.3 Directions (11–15) a) 10 b) 20 c) 15 d) 38
Study the following table carefully and answer the 20. The ratio between tickets sold by A and B ?
given questions a) 2 : 3 b) 4 : 2 c) 1 : 2 d) 2 : 4
The table shows four different student marks in 10th 1.5 Directions (21–25)
STD in five different Subjects.
Study the following table carefully and answer the
Student Tamil English Maths Science Social given questions. Profit of Company X In the year 1997,
Name (100) (100) (100) (100) Science 1998, 1999, 2000 as Quarters.
(100) 1997 1998 1999 2000
Edwin 80 70 96 85 64 Quarter 1 135 65 120 150
Giri 55 60 70 40 65 Quarter 2 115 75 160 180
Raj 35 45 60 50 55 Quarter 3 90 100 170 210
Subbu 85 65 75 76 54 Quarter 4 70 120 190 230
2.4
Professor Academy
21. Approximately, what was the actual profit made 17. Answer: d
by the department store in the second quarter of Least number of tickets are sold by D, D sold only
1999? Seven tickets
a) Rs. 160 lakh b) Rs. 170 lakh 18. Answer: c
c) Rs. 180 lakh d) Rs. 210 lakh Total number of tickets sold by D, E, F
22. In which of the following quarters, did the = 7 + 24 + 14 = 45
departmental store make the least amount of 19. Answer: a
profits? The difference between tickets sold by E and F
a) Third quarter of 2000 = 24 – 1 = 10
b) Second quarter of 1999
c) First quarter of 1999 20. Answer: b Hint: 2 : 1 ≠ 1 : 2
d) First quarter of 1998 The ratio between tickets sold by A and B
= 16 : 8 = 2 : 1[Since 4 : 2 = 2: 1]
23. During the period 1998-2000, how many quarters 21. Answer: a
exceeded the profit of Rs. 150 lakh? Profit made by department store in second quarter
a) 6 b) 5 c) 4 d) 3 of 1999 = 160 lakhs

Data Interpretation
24. In the year 2000, total profit made by the 22. Answer: d
departmental store was approximately Third quarter of 2000 = 210 lakhs
a) Rs. 540 lakh b) Rs. 630 lakh Second quarter of 1999 = 160 lakhs
c) Rs. 720 lakh d) Rs. 770 lakh First quarter of 1000 = 120 lakhs
25. Find the avg profit made by departmental store in First quarter of 1998 = 65 lakhs
the year 1999? The least (minimum) is first quarter of 1998 with
a) 170 lakh b) 160 lakh 65 lakhs
c) 140 lakh d) 120 lakh 23. Answer: a
Answer Key with Explanation In the period, 1998 – 2000, profit exceeding of Rs.
150 lakhs are six.
11. Answer: b B. Second quarter 1999
Average mark of Edwin C. Third quarter 1999
= (80+70+96+85+64) / 5 =395 / 5 = 79 D. Fourth quarter 1999
12. Answer: b E. Second quarter 2000
Giri marks in maths: Subbu marks in English F. Third quarter 2000
70 : 65 G. fourth quarter 2000
14 : 13
24. Answer: d
13. Answer: a Total profit in 2000 = 150 + 180 + 210 + 230
Total marks of Edwin = 395 = 770 lakhs
Total marks of Raj = 245
Difference = 150 25. Answer: b
Avg of profit in 1999
14. Answer: d = (120 + 160 + 170 + 190)/4 = 640 / 4 = 160 lakhs
Giri scored less than 50% in Science
Raj scored less than 50% in Tamil & English Level-2
15. Answer: c Solved Question with Explanation
Total marks in Tamil = 255
Total marks in Social Science =238 2.1 Directions (1-5)
Difference =255 – 238 = 17 Study the following table and answer the question.
16. Answer: b The data Shows Profit of E-Commerce sites in
Total tickets sold by A + B + C = 16 + 8 + 20 India (in Million) (Note :1 million=10 Lakhs)
= 44 tickets
2.5
Professor Academy
Profit of E-commerce sites in india (in million)
Months Jan Feb March 6. The ratio of the total expenditure on football to
Amazon 360 350 400 that of expenditure on hockey is:
Flipkart 320 300 280 a) 1:15 b) 1:1 c) 15:1 d) 3:20
Answer: b
Snapdeal 150 120 180
Food ball : Hockey = 15 : 15 = 1 : 1
India mart 270 230 130
7. If the total expenditure on sports during the
Myntra 120 80 70
year was Rs. 1,20,000,00 how much was spent on
1. What is the total profit of Snapdeal in all the given basket ball?
months together? a) Rs. 9,50,000 b) Rs. 10,00,000
a) 450 b) 300 c) 400 d) 380 c) Rs. 12,00,000 d) Rs. 15,00,000
Answer: a Answer: d
150+120+180=450 Total expenditure (100%) = 1,20,000,00
2. Find the difference between profit of amazon in the Expenditure on basket ball (12.5%) = x
Janauary month and profit of flipkart in Febraury x = (1,20,000,00 X 12.5
Data Interpretation

month? =15,000,00
a) 30 b) 60 c) 70 d) 80 Short cut:
Answer: b 100% = 1,20,000,00
360-300=60 10% = 12,00,000
3. Find the average profit of India mart 2.5% = 15,00,000
e-commerce? 8. The chart shows that the most popular game of the
a) 400 b) 300 c)210 d) 410 country is :
Answer: c a) Hockey b) Football
(270+230+130)/3= 630/3=210 c) Cricket d) Tennis
Answer: c
4. What is the total profit earned by flipkart in march
and Myntra in march together? As the expenditure on cricket is highest than
a) 270 b) 250 c) 300 d) 350 the rest, then it shows that cricket is a most popular
Answer: d game of a country.
280+70=350 9. Out of the following country’s expenditure is the
5. The profit earned by snapdeal in the month of same on :
January is approximately, what percentage of the a) Hockey and Tennis
profit earned by flipkart in the month of Febraury? b) Golf and Basket ball
a) 50% b) 60% c) 70% d) 80% c) Cricket and Football
Answer: a d) Hockey and Golf
(300-150)/300 X 100 = 150/300 X 100 = 50% Answer: b
Expenditure on Golf = 12.5% = Expenditure on
2.2 Directions (6-10)
Basket ball
Study the following Pie Chart and answer the
10. If the total expenditure on sport during the year
question .The data Shows Expenditure on Sports.
was Rs. 1,50,00,000 the expenditure on cricket and
hockey together was:
Hockey nis
n a) Rs. 60,00,000 b) Rs. 50,00,000
Te % rs
Football 15% 0
1 the c) Rs. 37,50,000 d) Rs. 25,00,000
O Answer: a
15% 10%
Basket balls Total expenditure = 1,50,000,00
Cricket
12 ½% (Cricket + Hockey) Together =
25% Golf 1,50,000,00 = 100%
12 ½% 25% + 15% = 40%
2.6
Professor Academy
Let, x be 40% Family Income Spent During 2019
x = 40%
Expenditure (in %)
x = (40 X 1,50,000,00) / 100 =60,000,00
Short cut : Other Food
18% 20%
100% = 1,50,000,00
10% = 15,00,000
40% = 60,00,000 Savings
Transport 12%
Practice Question
20%
2.3 Directions (11-15) Clothing
Education
Study the following table and answer the following Housing 15%
5%
10%
questions given.
The table shows about number of people using 16. The percent of income spent on food and clothing
Vodafone, Jio, Airtel service centre..(in thousands) is:
Year Vodafone Jio Airtel a) 5% b) 30% c) 12% d) 35 %

Data Interpretation
2014 15 25 10 17. The percent of income spent on clothing exceeds
2015 15 10 15 that on savings by:
2016 10 25 20 a) 3% b) 2.5% c) 10% d) 22.5%
2017 10 20 15
2018 40 25 25 18. If the total income of the family during 2019 was
2019 15 15 25 Rs. 100000, the savings of the family in 2019 was:
a) Rs. 1,750 b)Rs. 20,000
11. What is the average number of people using mobile c) Rs. 12,000 d) Rs. 50,000
service of Jio all year’s together?
a) 16,000 b) 18,000 19. The total expenses of the family on transport is
c) 20,000 d) None of these equal to those spent on:
a) Savings b) clothing
12. The total number of people using all 3 service c) food d) others
centre in 2017 is what percent of total number of
people using these service centre in 2018? 20. The savings of the family is more than that of
a) 50% b) 67% c) 66% d) 59% expenditure incurred on:
a) Housing b) clothing
13. The number of people using of Vodafone in 2016, c) transport d) others
2015 and 2014 together?
a) 40,000 b) 30,000 2.5 Directions (21-25)
c) 20,000 d) None of these Study the following table carefully and answer the
14. What is the ratio of Airtel service centre in the questions given below.
year 2015 to the year 2014?
Amount invested by six different companies during
a) 2:3 b) 4.2 c) 3:2 d) 2:4
six different months (in lakhs)
15. The total number of people using Jio service centre
Company A B C D E F
in 2019 and the previous year is equal to?
a) 32000 b) 50000 JAN 25 28 50 32 24 35
c) 44000 d) 40000 FEB 45 40 60 55 28 38
MAR 52 38 46 72 83 65
2.4 Directions (16 – 20)
APR 80 45 70 90 65 76
The Pie-Chart given below shows the expenditure of
MAY 15 20 47 25 13 30
a family income on various items and savings during
2019. Observe the graph and answer the following JUN 62 95 27 80 50 20
questions:

2.7
Professor Academy
21. What is the difference between the investment Total income of family in 2019 = 1,00,000
made by company A and E together in March and 100% = 1,00,000
company B and D together in January (in lakh)? The savings of family = 12%
a) 75 b) 65 c) 50 d) 85 Let, x = 12%
22. What is the average of investment made by X = (1,00,000 X 12) / 100 = 12,000
company C in May, D in February and E in January 19. Answer: c
(in lakhs)? Total expenses on transport = 20%
a) 22 b) 36 c) 42 d) 46 = Total expenses on food
23. In which month was the investment made by 20. Answer: a
companies maximum? The saving of family is 12% housing, which is 10%
a) March b) April c) May d) June 21. Answer: a
24. What is the total investment made by company A Investment made by A and E in March
in all the months together ? = 52 + 83 = 135
a) 300 b) 279 c) 340 d) 230 Investment made by B and D in January
= 28 + 32 = 60
Data Interpretation

25. What was the average investment made by


company F during all the months (in lakhs)? Hence, required difference = 135 – 60 = 75
a) 34 b) 43 c) 32 d) 44 22. Answer: c
Required average = (47 + 55 + 24)/3
Answer Key with Explanation = 126/3 = 42 lakhs
11. Answer: c 23. Answer: b
(25,000+10,000+25,000+20,000+25,000+ The total investment of companies,
15,000)/6=120/6 In January = 25 + 28 + 50 + 32 + 24 + 35 = 194 lakh
= 20,000 In February = 45 + 40 + 60 + 55 + 28 + 38 = 266 lakh
12. Answer: a In March = 52 + 38 + 46 + 72 + 83 + 65 = 356 lakh
Total no.of person using all 3 services in In April = 80 + 45 + 70 + 90 + 65 + 76 = 426 lakh
2017=10+20+15=45 In May = 15 + 20 + 47 + 25 + 13 + 30 = 150 lakh
Total no.of person using all 3 services in In June = 62 + 95 + 27 + 80 + 50 + 20 = 334 lakh
2018=40+25+25=90 Hence, April month has the maximum investments
(45/90) X 100= 50%
24. Answer: b
13. Answer: a Total investment made by company A = 25 + 45 +
Total no.of person using vodafone in 2014, 2015, 52 + 80 + 15 + 62 =279
2016=10,000+15,000+15,000 = 40,000
25. Answer: d
14. Answer: c Required average
Ratio => Airtel 2015 : Airtel 2014= 15: 10=3: 2 = (35 + 38 + 65 + 76 + 30 +20)/6=264/6=44
15. Answer: d
Level-3
Total no.of person using jio service centre in 2018
& 2019 is 25,000+ 15,000 =40,000 Solved Question with Explanation
16. Answer: d 3.1 Directions (1 – 5)
Percentage of income spent on food and clothing
The Pie-Chart given below shows the spending of a
is 20%+15%=35%
family income on various items and savings during
17. Answer: a 2019. Observe the pie chart and answer the following
Percentage of income spent on clothing = 15% questions:
Percentage of income spent on saving = 12%
Note – Income of a family is 2,00,000.
15% - 12% = 3%
18. Answer: c
2.8
Professor Academy
Family income spent during 2019 expenditure (in %) 4. Find the central angle for housing is:
A) 360 B) 6000 C) 5500 D) 1300
Other Answer: a
Food
18% 20%
Housing = 10%
Transport 12% 3600 = 100%
20% Savings x = 10%
5% 15% x = (360 x 10) / 100 = 360
Education 10% Clothing Shortcut:
Housing 100% = 3600
1. The amount spent on food is : 10% = 360
a) 20,000 b) 40,000
5. Find the central angle on saving is:
c) 25,000 d) 30,000
A) 440 B) 410 C) 43.20 D) 400
Answer: b
Answer: c
Food, 20% = x
Savings = 12%
Total expenditure, 100% = 2,00,000
360o = 100%
X = (2,00,000 x 20) / 100 = 40,000

Data Interpretation
x = 12%
Shortcut:
x = (3600 x 12) / 100 = 43.20
100% = 2,00,000
Shortcut:
10% = 20,000
100% = 3600
20% = 40,000
10% = 360
2. The difference in expenditure between housing 1% = 3.60
and clothing is 2% = 7.20
a) 10,000 b) 12,000 12% = 360+7.20=43.20
c) 5000 d) 7000
3.2 Directions (6 - 10)
Answer: a
Housing = 10% Clothing = 15% Study the table and answer the given questions.
Difference = 5% Considered the following table the total number
100% = 2,00,000 of tickets sold of five movies P,Q,R,S and T across
5% = x two cinema houses A and B on a particular day. In
X = (2,00,000 x 5) / 100 = 10,000 accordance with the table,answer the question that
Shortcut: follows:
100% = 2,00,000
10% = 20,000 Movies Cinema A Cinema B
5% = 10,000 P 200 300
3. The total expenditure on transport and education is. Q 350 400
a) 35,000 b) 40,000 R 250 350
c) 50,000 d) 25,000 S 300 350
Answer: c T 400 250
Transport = 20% Education = 5%
U 500 200
Total expenditure (transport + education)
= 25% 6. What is the average sales in cinema A for all
100% = 2,00,000 movies?
25% = x a)333.33 b)433.33 c)555.33 d)633.33
x = (2,00,000 x 25) / 100 =50,000 Answer: a
Shortcut: 200+350+250+300+400+500=2000/6=333.33
100% = 2,00,000 7. What is the average sales in cinema B for all
50% = 1,00,000 movies?
25% = 50,000 a)308.33 b)408.33 c)508.33 d)608.33

2.9
Professor Academy
Answer: a in 2009?
300+400+350+350+250+200=1850/6=308.33 a) 2.5 lakh b) 1 lakh
8. What is the difference between the average of P c) 1.5 lakh d) 1.75 lakh
and Q of cinema A and average of T and U of 12. The total number of visitors in 2013 is approximately
cinema B? what percent of the total number of visitors in
a)80 b)50 c)75 d)85 2016?
Answer: b a) 60 % b) 85 % c) 40 % d) 70 %
Average of P and Q cinema 13. If the visitors go to amusement park, the entry
A=200+350=550/2=275 fees for Malaysia visitors is Rs 350 and that of
Average of T and U cinema China visitors is Rs 450 for all visitors then what
B=200+250=450/2=225 is the total income of for that park from both the
Difference=275-225=50 country visitors during 2014 to 2016?
9. What is the difference between the average of a) 87.5 crore b) 95 crore
cinema A and cinema B? c) 92.5 crore d) 77.5 crore
a) 65 b) 25 c) 95 d)105 14. From which country is the number of visitors
Data Interpretation

Answer: b travelled to India maximum during the eight


Average of cinema A=333.33 years?
Avg of cinema B=308.33 a) Russia b) China
Difference=333.33-308.33=25 c) Japan d) Either Japan or China
10. What is the difference between the average of P 15. If the visitors from Russia donate 400 rupees each
and Q of cinema A and average of P and Q of for a children foundation and the each visitors
cinema B? from Japan donate for the same foundation 20%
a)105 b)75 c) 85 d) 65 more than that of Russia visitors, then what is the
Answer: b ratio of the donation of Russia in 2015 to that of
Avg of P and Q=275 (cinema A) Japan in 2016?
Avg of P and Q=350 (cinema B) a) 3 : 10 b) 5 : 9 c) 4 : 7 d) 5 : 6
Difference=75
3.4 Directions (16 – 20)
Practice Question
Study the following information carefully and answer
3.3 Directions (11-15) the given questions. The following table shows the
Study the column graph carefully and answer the total number of people (In thousands) joining in 4
questions given below: different forces in 6 different years.
The number of visitors travelled to India (in lakhs)
from four different countries in different years Army Navy Air force BSF
2012 5.4 2.6 1.8 5.2
Year
Russia China Japan Malaysia 2013 6.2 2.4 1.6 5.6
country
2009 6 1 7 2 2014 4.8 2.8 1.9 5.5
2010 7 4 1 6 2015 6.6 3.2 2.2 6.2
2011 4 5 6 1 2016 7 3 2.1 6.4
2012 5 4 7 3 2017 7.4 3.5 2.3 6.8
2013 5 2 1 4
2014 7 3 1 5 16. The total number of people joining in the given
2015 6 4 7 2 forces together in the year 2013 is approximately
2016 3 5 6 4 what percentage of total number of people joining
in the given forces together in the year 2015?
11. What is the difference between the number of
a) 72 % b) 56 % c) 87 % d) 95 %
visitors from China in 2014 and that from Malaysia
2.10
Professor Academy
17. Find the difference between the total numbers of 24. Number of medals won by country-China in the
people joining in Army to that of Air force in all years 2012 was approximately what percentage of
the given years together? the number of medals won by country-Russia in
a) 25500 b) 18600 the year 1996?
c) 21700 d) 23200 a) 145% b) 180% c) 155% d) 60%
18. Find the ratio between the total number of people 25. One of the countries performances decreased
joining in the given forces together in the year consistently from the year 1992 to the year 2012.
2012 to that in the year 2015? Which of the following is that country?
a) 61: 85 b) 12: 19 a) USA b) China c) India d) None
c) 23: 27 d) 75: 91 Answer Key with Explanation
19. Find the average number of people joining in BSF 11. Answer: b
force in all the given years together? Difference between the number of visitors from
a) 6160 b) 5950 c) 6320 d) 6580 China in 2014 and the number of visitors from
20. Total number of people joining in Navy in the year Malaysia in 2009
2012, 2014 and 2016 together is approximately = 3 lakh – 2 lakh

Data Interpretation
what percentage less than the total number of = 1 lakh
people joining in BSF in the year 2013 and 2015 12. Answer: d
together? Total number of visitors travelled in 2013
a) 20 % b) 45 % c) 30 % d) 60 % =1+2+4+5
3.5 Directions (21 – 25) = 12 lakh
Study the following table carefully to answer the Total number of visitors travelled in 2016
questions that follow: =3+4+5+6
= 18 lakh
Number of medals won by the five different countries Required % = 12 × 100 / 18 = 66.67% = 70 %
in six Olympic Games
13. Answer: c
Country Income from Malaysia visitors during 2014 to
Year China USA India Russia England 2016
1992 120 65 35 65 64 = (5 + 2 + 4) × 350
1996 140 60 70 36 28 = 3850 lakh
2000 42 50 56 42 110 = 38.5 crore
2004 132 38 108 41 59 Income from China visitors during 2014 to 2016
2008 90 74 76 45 63 = (3 + 4 + 5) × 450
2012 64 46 82 69 80 = 5400 lakh
21. Which country won second highest number of = 54 crore
medals over all the Olympics together? Total income = 38.5 + 54 = 92.5 crore
a) China b) Russia 14. Answer: a
c) India d) England Number of visitors travelled from Russia during
22. What was the approximate percent increase in the given eight years
number of medals won by country-India in the = 6 + 7 + 4 + 5 + 5 + 7 + 6 + 3 = 43 lakh
year 2004 from the previous Olympics? Similarly, in China = 28 lakh
a) 85% b) 75% c) 95% d) 60% In Japan = 36 lakh
In Malaysia = 27 lakh
23. If 50 percent of the medals won by USA in the year The number of visitors travelled by Russia is the
2000 were gold medals. 10 percent were bronze maximum.
and remaining were silver medals, then find the
number of silver medals won by that country? 15. Answer: d
a) 20 b) 33 c) 43 d) 37 Donation of Russia visitors in 2015

2.11
Professor Academy
= 600000 × 400 = 240000000 India won second highest number of medals over
= 24 crore all the years together.
Donation of Japan visitors in 2016 22. Answer: c
= 240000000 × 120 / 100 Required percentage
= 28.8 crore => (108-56)/56 x 100 = 52/56 x 100 = 93% = 95 %
Required ratio = 24 : 28.8 = 5 : 6
23. Answer: a
16. Answer: c Total medals won by country USA in the year
Explanation 2004 = 50
x = Total member of people joining in given forces Number of gold and bronze medals = (50+10) %
together in 2013 = 6.2+2.4+1.6+5.6 of 50 = 30
= 15.8 Therefore, Number of silver medals won
Y= Total member of people joining in given forces = 50 – 30 = 20
together in 2015 = 6.6+3.2+2.2+6.2 24. Answer: b
= 18.2 Number of medals won by China in 2012 = 64
Formula → X is what percentage of Y? Number of medals won by Russia in 1996 = 36
Data Interpretation

X ∕ Y × 100 Required percentage = (64/36) x 100 = 177.77


( 15.8 ∕ 18.2 ) × 100 ≈ 87% = 180 %
25. Answer: d
17. Answer: a Such country is not there in the table
Total Army people = 5.4+6.2+4.8+6.6+7+7.4
= 37.4 Level-4
Total Airforce people = 1.8+1.6+1.9+2.2+2.1+2.3
Solved Question with Explanation
= 11.9
Difference = 37.4 – 11.9 = 255 4.1 Directions (1 - 5)
18. Answer: d Study the table and answer the given questions.
Ratio : 2012: 2015 Figures regarding number of cars produced and sold
15 : 18.2 (in lakh per year)
75 : 91.0 (Multiply by 5) YEAR Company A Company B Company C Company D
Produc- sales produc- sales produc- sales produc- sales
19. Answer: b
Average of BSF people tion tion tion tion
2006 2.9 2.2 1.4 1.3 3.1 2.5 4.7 3.9
= 5.2+5.6+5.5+6.2+6.4+6.8 ∕ 6
2007 3.2 1.9 1.5 1.3 3.1 2.9 4.9 4.7
= 35.7 8 ∕ 6 2008 2.6 2.0 1.8 1.2 3.1 3.0 5.1 4.8
= 5950 (in thousands) 2009 3.0 2.3 1.7 1.4 3.3 2.8 4.7 4.5
2010 2.2 1.8 1.7 1.6 2.2 2.2 4.9 4.8
20. Answer: c
X = Navy → 2012, 2014, 2016 = 8.4 1. What is the ratio of the total number of cars
Y = BSF → 2013, 2015 = 11.8 produced by company C in both the years 2007
X is what percentage less than y? and 2010 together, to the total number of cars sold
Y – x ∕ Y × 100 by company A in both the years 2007 and 2009
= (11.8 – 8.4) ∕ 11.8 together?
= (3.4 ∕ 11.8) × 100 a) 3 :2 b) 14:11 c) 9 : 7 d) 7 :4
= 30% Answer: c
21. Answer: c Total number of cars produced by Company C in
It is obvious from the table. the year 2007 and 2010 together
China = 588; USA = 333; India = 427; = 3.1 + 2.3 = 5.4 lakh
Russia = 298; England = 404 Total number of cars sold by Company A in the
year 2007 and 2009 together

2.12
Professor Academy
= 1.9+2.3 =4.2lakh Institutions A B C D E
Required ratio = 5.4/4.2 = 9/7 = 9 : 7
cities
2. What is the percentage change in the number Chennai 680 610 995 295 950
of unsold cars for company C in the year 2009, Bangalore 480 530 900 200 800
compared to the previous year?
Kochi 640 670 980 280 910
a) 68 23 % increase b) 500% increase
c) 25% decrease d) 400% increase Hyderabad 830 790 985 295 920
Answer: d Goa 390 560 940 230 820
The number of unsold cars for Company C in the Mumbai 830 790 985 295 1090
year 2009
6. The number of students studying in institute A in
= 3.3 – 2.8 = 0.5 lakh = 50000
Bangalore is approximately what percentage ,more
The number of unsold cars for Company C in the
than that of students studying in institute D in kochi?
year 2008
a) 71% b) 89% c) 69% d) 61%
= 3.1 – 3 = 0.1 lakh = 10000
Answer: a
Required % change
[(480-280)/280]*100=71%

Data Interpretation
= [(50000 -10000) / 10000] x100
= (40000/10000) x 100 = 400% increase 7. What is the average number of students studying
in institute E taking all cities together?
3. What is the total number of cars sold by all the
a) 925 b) 905 c) 915 d) 900
given companies together in the year 2008?
Answer: c
a) 10.4 lakh b) 12.1 lakh
(950+800+910+920+1090+820)/6=5490/6=915
c) 11.8 lakh d) 11.0 lakh
Answer: d 8. What is the percentage difference between the
Total number of cars sold by all the given total number of students studying in Bangalore
companies together in 2008 and Mumbai taking all institution together?
= 2 + 1.2 + 3 + 4.8 = 11.0 = 11 lakh a) 37% b) 39% c) 41% d) 35%
Answer: a
4. What is the average production of company A
Bangalore =480+530+900+200+800=2910
over all the years?
Mumbai=830+790+985+295+1090=3990
a) 2.85 lakh b) 2.90 lakh
Difference:3990-2910=1080
c) 2.36 lakh d) 2.78 lakh
%difference=(1080/2910)*100=37%
Answer: d
Required average = (2.9 +3.2 +2.6 +3 + 2.2 )/5 9. The number of students in institute A in Chennai
= 13.9/5 = 2.78 lakh and Hyderabad together is what percentage less
than the number of students studying in institution
5. What is the ratio of the total sales of Company A
C in Bangalore and Hyderabad together?
to that of Company D for the years 2007, 2009 and
a) 19% b) 17% c) 21% d) 23%
2010 taken together?
Answer: b
a) 3 : 7 b) 4 : 9 c) 10 : 11 d) 7 : 13
Institute A: 680+830=1510
Answer : a
Institute C: 900+935=1835
required ratio = (1.9+2.3+1.8 ) / (4.7+4.5+4.8)
(1835-1510)/1835 = (325/1835)*100 = 17%
=6/14 = 3 : 7
10. What is the respective ratio between the number
4.2 Directions (6-10)
of students studying in institute D in Hyderabad
Study following table and answer the questions below and institute A in Goa?
Number of students from various cities, studying in a) 3:2 b) 4:2 c) 2:3 d)2:4
different institutions Answer: c
institute D =260 Institute A=390 260:390=2:3

2.13
Professor Academy
Practice Question
Total Students = 50000
4.3 Directions (11 - 15)
Study the following information carefully and answer
the given questions. Number of staffs (in thousands) U, 19% P, 15%
in two different banks in six different years
Year Reserve bank of India State Bank of India Q, 18%
2011 10 20 T, 20%
2012 15 25
2013 25 35 R, 12%
2014 20 15 S, 16%
2015 25 30
2016 35 20
Schools % of girls
11. The number of staffs in Reserve Bank of India P 48%
in the year 2015 is what Percentage increased as
Q 52%
compared to the previous year?
Data Interpretation

a) 55 % b) 25 % c) 15 % d) 45 % R 46%
S 54%
12. If 25% of the staffs in State Bank of India in the
T 44%
year 2014 were females, what was the number of
male staffs in the State Bank of India in the same U 50%
year? 16. Find the difference between the total number of
a) 11250 b) 10750 c) 12650 d) 13250 boys in School P to that of total number of girls in
13. In which year, the difference between the number School R?
of staffs in Reserve Bank of India and the number a) 1140 b) 1892 c) 1368 d) 1575
of staffs in State Bank of India is highest? 17. Find the average number of girls in School P, Q
a) 2013 b) 2014 c) 2016 d) 2015 and S together approximately?
14. What was the difference between the average a) 5040 b) 5180 c) 4200 d) 4560
number of staffs in Reserve Bank of India and 18. Find the ratio between total number of students in
State Bank of India in all the years together? School Q and School R?
a) 3000 b) 3500 c) 1500 d) 2500 a) 3: 2 b) 2: 3 c) 4: 5 d) 1: 3
15. What is the sum of the number of staffs in Reserve 19. The total number of girls in School U is
Bank of India in the year 2011, 2013 and 2015 approximately what percentage of total number of
together and the number of staffs in State Bank of boys in School Q?
India in the year 2012, 2014 and 2016 together? a) 95 % b) 110 % c) 135 % d) 70 %
a) 130000 b) 90000 20. Find the central angle for School T?
c) 110000 d) 120000 a) 66o b) 80o c) 72o d) 84o
4.4 Directions (16 – 20) 4.5 Directions (21 –25)
Study the following information carefully and answer Study the following information carefully and answer
the given questions.The following pie chart shows the the given questions.The following bar graph shows
total number of students in 6 different schools and the sales of cars of 2 different companies in 5 different
the table shows the percentage of girls out of the total years.
number of students in the respective schools.

2.14
Professor Academy
COMPANY X COMPANY Y = 25/100 × 15000 = 3750
1600
Number of male staffs = 15000 – 3750
TOTAL CARS SOLD

1500
= 11250
1400
1300 13. Answer: c
Difference between the numbers of staffs in
1200
Reserve Bank of India & Number of staffs in
1100
State Bank of India for the year
1000
2001 2002 2003 2004 2005 2011 – (20000 – 10000) = 10000
YEARS 2012 – (25000 – 15000) = 10000
21. Total cars sold by the company X in the year 2013 – (35000 – 25000) = 10000
2001 and 2005 together is approximately what 2014 – (20000 – 15000) = 5000
percentage of total cars sold by both the companies 2015 – (30000 – 25000) = 5000
in the year 2002? 2016 – (35000 – 20000) = 15000
a) 96 % b) 75 % c) 105 % d) 120 % Difference was highest in year 2016.
22. Find the ratio between the total cars sold by both 14. Answer: d

Data Interpretation
the companies in the year 2001 to that of the year Average number of staffs in Reserve Bank of
2004? India
a) 65: 73 b) 83: 87 c) 132: 152 d) 51: 59 = (10 + 15 + 25 + 20 + 25 + 35)/6
= 130/6
23. Find the average number of cars sold by the
Average number of staffs in State Bank of India
company X in all the given years together?
= (20 + 25 + 35 + 15 + 30 + 20)/6
a) 1328 b) 1440 c) 1160 d) 1284
= 145/6
24. If the total cars sold by the company X and Y in the Difference = (145/6) – (130/6)
year 2006 is increased by 20 % and 25 % respectively = 15/6 = 2.5*1000
while comparing with the previous year, then find = 2500
difference between the total number of cars sold
15. Answer: d
by the company X to that of Y in the year 2006?
Number of staffs in Reserve Bank of India in 2011,
a) 420 b) 360 c) 280 d) 540
2013 and 2015
25. Total cars sold by company Y in the year 2003 and = 10000 + 25000 + 25000 = 60000
2005 together is approximately what percentage Number of staffs in State Bank of India in 2012,
more/less than the total cars sold by the company 2014 and 2016
X in the year 2002 and 2004 together? = 25000 + 15000 + 20000 = 60000 a
a) 13 % less b) 13 % more Total staffs = 60000 + 60000 = 120000
c) 6 % more d) 24 % less
16. Answer: a
Answer Key with Explanation Number of boys in school P = 100% - 48% = 52%
11. Answer: b 52% of 7500 → 3900
Number of staffs in Reserve Bank of India Number of girls in school R = 46% of 6000
in 2015 = 25000 = 2760
Number of staffs in Reserve Bank of India Difference = 3900-2760 = 1140
in 2014 = 20000 17. Answer: c
Increase = 25000 – 20000 = 5000 Average number of girls
Increase % = 5000/20000 × 100 = 25% P,Q and S = 3600+4680+4320 ∕ 3
12. Answer: a = 12,600 ∕ 3 = 4200
Total number of staffs in State Bank of India
18. Answer: a
in 2014 = 15000
Total number of students in school Q = 9000
Number of females staffs = 25% of 15000

2.15
Professor Academy
Total number of students in school R = 6000 25. Answer: b
Ratio 9000: 6000 Total cars sold by company Y in
3:2 2003 and 2005 = 1560 + 1440
19. Answer: b = 3000
The total number of girls in school U =4750 Total Cars by company x in 2002 and 2004
The total number of boys in school Q = 4320 = 1160 + 1480 = 2640
(4750 / 4320) × 100 Percentage increase = 360/3000 X 100
≈ 110% = 13% More.

20. Answer: c Level-5


Central angle for school T = 20%
Solved Question with Explanation
= 72o
5. 1 Directions (1 – 5)
21. Answer: a
Cars sold by company X in 2001 and 2005 Study the following information carefully and answer
= 1260 + 1200 the given questions:
= 2460
Data Interpretation

The following table shows the total number of


Cars sold by both company in 2002 = 2560 Professionals from different departments in different
(2460 / 2560)× 100 ≈ 96% years in a certain city and the percentage of female
22. Answer: c among them.
Total cars sold by both the company in 2001: Total Years Engineering Law Medicine
cars sold by both the company in 2004 Total % of Total % of Total % of
1260 + 1380: 1480 + 1560 Employee female Employee female Employee female
2640 : 3040 2013 650 48% 450 46% 180 35%
132: 152 2014 720 45% 560 35% 160 45%
2015 680 60% 620 55% 150 38%
23. Answer: d 2016 540 40% 650 56% 200 42%
Company X in all years 2017 660 50% 700 40% 120 55%
= 1260+1160+1320+1480+1200
= 6420 / 5 1. Find the difference between the number of male
= 1284 engineering professionals in the year 2015 to that of
number of female Law professionals in the year 2013?
24. Answer: b a) 43 b) 24 c) 65 d) 52
20% increase Answer: c
Cars sold by company X in 2005 → Cars sold by The number of male engineering professionals in
company X in 2006 the year 2015
100% increases to 120% = > 680*(40/100)
100% = 1200 = > 272
120% = a The number of female Law professionals in the
a = (1200 × 120) ∕ 100 year 2013
a = 1440 = > 450*(46/100)
25% increase = > 207
Cars sold by company Y in 2005 → cars sold by Required difference = 272-207 = 65
company y in 2006 2. Find the ratio between the number of male medical
100% increase to 125% professionals in the year 2014 to that of number of
100% = 1440 female engineering professionals in the year 2013?
125% = b a) 23: 57 b) 51: 79 c) 5: 13 d) 11: 39
b = (1440 × 125) / 100 Answer: d
b = 1800 The number of male medical professionals in the
Difference = 1800 – 1440 year 2014
= 360
2.16
Professor Academy
=> 160*(55/100) Year SONY HP
=> 88
2014 35 40
The number of female engineering professional in
the year 2013 2015 45 35
=> 650*(48/100) 2016 35 50
=> 312 2017 50 45
Required ratio = 88: 312 2018 30 40
= 11: 39 2019 40 45
3. What is the difference between the total number
PROFIT=[(Income-Expenditure)/Expenditure] ×100
of engineering professionals and total number
of medical professionals in all the given years 6. The expenditure of HP company in 2015 and 2016
together? is 12lakh and 14.5 lakh respectively, what is total
a) 2450 b) 2300 c) 2440 d) 3340 income of HP in 2015 and 2016?
Answer: c a) 35lakhs b) 37.95lakhs
Total number of engineering professionals in all c) 39lakhs d) 43lakhs
the given years together Answer: b

Data Interpretation
=> 650 + 720 + 680 + 540 + 660 = 3250 Income in 2015=
Total number of medical professionals in all the 35%= X-12/12×100=16.20lakhs
given years together Income in 2016=
=> 180 + 160 + 150 + 200 + 120 = 810 50%= X-14. 5/14.5*100=21.75lakhs
Required difference = 3250 – 810 = 2440 Total income=37.95 lakhs
4. Find the average number of male law professionals 7. Ratio of expenditure of company Sony to HP is
in the year 2013, 2015 and 2017 together? 3:4,what is the ratio of income 2018?
a) 314 b) 352 c) 287 d) 275 a) 56:39 b) 29:56
Answer: a c) 39:56 d) None of these
The total number of male law professionals in the Answer: c
year 2013, 2015 and 2017 together FOR SONY
=> 450*(54/100) + 620*(45/100) + 700*(60/100) 30%= S-3x/3x*100
=> 243 + 279 + 420 = 942 90x=100S-300x = 100 S= 390x = S= 3.9x
Required average = 942/3 = 314 FOR HP
40%= H- 4x/4x*100
5. Number of medical professionals in the year 2014
160x= 100 H – 400x
is approximately what percentage the number of
100 H = 560x
engineering male professionals in the year 2016?
H = 5.6x
a) 42 % b) 49 % c) 28 % d) 15 %
Ratio= 39:56
Answer: b
Number of medical professionals in the year 2014 8. What is a percentage increase in profit between
=> 160 Sony and HP in 2018?
The number of engineering male professionals in a) 30.33% b) 45% c) 33.33% d) 53%
the year 2016 Answer: c
=> 540*(60/100) 40-30/30*100 = 33.33%
=> 324 9. Expenditure of Sony and HP in 2019 are equal, the
Required % = 160/324 * 100 = 49% total income of two company was 5.7lakhs, what is
5.2 Directions ( 6-10) the total expenditure of two company in 2019?
a) 6lakhs b) 2lakshs
Study the following table and answer the question
c) 4lakhs d) None of these
below Percentage of profit earned by two companies
Answer: c
Sony and HP over the given years
Sonyexpenditure = HPexpenditure
Note: Expenditure of any company should be
2.17
Professor Academy
considered as 100%, profit will be given in the Year Consumer’s (thousand) Units (in lakhs)
table, income should be calculated by below
2014 225 200
formula
Expenditure% + Profit% = Income% 2015 250 325
Let the expenditure of two company be X 2016 300 450
Profit of Sony 40%, and for HP 45% 2017 350 575
Income of two company is 5.7 lakhs, (i. e, 2.855 2018 375 550
per company) 11. What is the ratio of electricity consumption per
For Sony consumer in 2015 and 2018?
40%=2.855s- x/x*100 a) 44:39 b) 39:44
40x= 285.5s-100x c) 33:42 d) 42:33
140x=285.5s
X=2.03 12. The number of customers in 2019 is 120% more
For HP company than 2014 while consumption remain same as
45%=2.855H-x/x*100 2018, what is impact of number of units consumed
45x=285.5H-100x by consumer in 2019 compared to electricity
Data Interpretation

145x=285.5H consumption per consumer’s 2018?


X=2.00 a) 36% increase b) 24%decrease
The expenditure of two company= 2*2= 4lakhs c) 24%increase d) 36%decrease
10. If the income of HP in 2016 and 2017 were in ratio 13. The electricity consumption in 2015 is
2:3, what of ratio of expenditure of the company in approximately what percentage of consumer all
two years? year’s together?
a) 23:45 b) 25:45 c) 29:45 d) 45:29 a) 21% b) 23% c) 21.6% d) 25%
Answer: c 14. Find the percentage less in the consumption of
for the year 2016 electricity in the year 2014 and 2016 together
50=2x-E/E*100 when compared to 2015 and 2017 together.
50E=200x-100E a) 28% more b) 28% less
150E=200x c) 43% more d) 30% less
E=200/150x
15. What is average number of consumer all years
for the year 2017
together?
45=3x-E/E*100
a) 600 b) 480 c) 300 d) 210
45E= 300x-100E
145E=300x 5.4 Directions (16 – 20)
E=300/145x Study the following information carefully and answer
Required ratio the given questions.
200/150: 300/145
29:45 The following pie chart shows the total population in
5 different cities in a certain state and the table shows
Practice Question the ratio of male and female among them.
5.3 Directions (11-15)
U,10
The graph suggests the no. of consumers and P,16
consumption of electricity units in five years. Electricity T,19
units are given in Lacs while the no. of consumers are
given in thousand. Q,18

Read the graph and answer the question.


S,15
R,22

2.18
Professor Academy
City Male : Female employee in same country?
P 5:3 a) 78:56 b) 65:76
Q 4:5 c) 76:65 d) 60:70
R 6:5 24. Difference between average number of post
S 2:1 graduate in country A, B, C and D, E, F?
T 11 : 8 a) 700 b) 723 c) 734 d) 756
U 9 : 11
25. Which country has highest average employee per
16. Total male population of city P is what percentage office?
of total female population of city R? a) B b) D c) A d) None of these
a) 110 % b) 100 % c) 90 % d) 80 %
17. Find the difference between the total male
population of city Q to that of total female Answer Key with Explanation
population of city S? 11. Answer: b
a) 1,80,000 b) 1,50,000 Consumption in 2015 = 325/250
c) 1,20,000 d) 1,75,000 Consumption in 2018 = 550/375

Data Interpretation
18. Find the average female population in city P, Q Required ratio = 325/250*375/550 = 39:44
and S together? 12. Answer: d
a) 2,80,000 b) 3,00,000 In the year 2019, no of customers:
c) 2,60,000 d) 1,60,000 225*220/100=495
19. Find the ratio between the total population in city Electricity consumption=550lakhs
T to that of total male population in city U? Electricity consumption per consumer=
a) 76: 18 b) 29: 13 c) 35: 16 d) 38: 9 550*1,00,000/495*1000=111 units per consumer
20. Find the central angle of city Q? In the year 2018, electricity consumption per
a) 72.50 b) 64.80 c) 68.20 d) 75.60 consumer4 = 550*1,00,000/375*1000=147 units
5.5 Directions (21- 25) per consumer
Data related to Human Resource Dept. of a There is decline of 36%
multinational company (X) which has 145 offices 13. Answer: c
across 6 countries consumer all year’s
together=225+250+300+350+375=1500
Country Offices Total Ratio % Post Graduated = 325/1500*100= 21.6%
M:F
A 16 2568 5:7 75 14. Answer: b
B 18 2880 11:5 65 2014&2016= 650 lakhs
C 14 2310 10:11 40 2015&2017= 900lakhs
D 22 3575 3:2 60
250/900*100= 28less
E 13 3360 8:6 80
F 17 2788 20:21 75 15. Answer: c
21. Number of male Post graduate in E is 1800,if 1500/5=300
female post graduate increase by 50% in next year, 16. Answer: b
What is percentage of female in particular country Let x be total male population of city P = 16% of 40
is post graduate? lakhs
a) 90% b) 89% c) 92.5% d) 95% = 16/100 X 40,00,000
22. In which country, what percentage of women = 6,40,000
employee to no of employee is ranked lowest? X Male population of city P = 5/8 X 6,40,000
a. C b. D c. F d. None of these = 5 X 80,000
= 4,00,000
23. The ratio between number of male employees in Let Y be total female population of
country B and E and total number of post Graduate city R total population of city = 22% of40,00,000
2.19
Professor Academy
= 8,80,000 23. Answer: b
Y = Female population of city R [(11/16)*2880+(2/5)*3360]= 1980+1920= 3900
= 5/11 X 8,80,000 65%*2880+80%3360= 4560
= 5X 80,000 3900/4560=65:76
= 40,000 24. Answer: c
X is what percentage of Y x/y x 100 A=2568*75%=1926
40,000/40,000 x 100 = 100% B=2880*65%=1872
17. Answer: c C=2310*40%=924 A+B+C= 4722
Let x be total male population of city Q D=3575*60%=2145
Total population of city Q = 18% of 40,00,000 E=3360*80%=2688
= 7,20,000 F=2788*75*100=2091 D+E+F=6924
Male population of city Q = (4/91)X 7,20,000 Difference = 6924-4722= 2202/3= 734
= 3,20,000 25. Answer: d
Let y be total female population of city S A=2568/16=160.5
Total population of city S = 15% of 40,00,000 B=2880/18=160
Data Interpretation

= 6,00,000 C=2310/14=165
Female population of city S = (1/3) × 6,00,000 D=3575/22=162
= 2,00,000 E=3360/21=160
The difference = x- y F=2788/17=164
= 3,20,000 – 2,00,000 Country C has highest employee
= 1,20,000
Question I
18. Answer: a
average female population in city P,Q,S together Directions (1-5): The bar graph given below shows the
= 2,40,000+4,00,000+2,00,000 sales of books (in thousand number) from six branches
= 8,40,000 / 3 of a publishing company during two consecutive years
= 2,80,000 2000 and 2001. Sales of Books (in thousand numbers)
19. Answer: a from Six Branches - B1, B2, B3, B4, B5 and B6 of a
Explanation publishing Company in 2000 and 2001.
Total population city T : Total male population U
7,60,000 : 1,80,000
76 : 18
20. Answer: b
Central angle of Q (Therefore 100% = 3600 )
18% = 64.80
21. Answer: c
Graduate in E : (3360*80)/100=2688,
Female graduate = 2688-1800=888
Female employee = (3360*6)/14=1440
Female graduate in next year= (888*150)/100=1332
Percentage of female = (1332/1440)*100=92.5%
22. Answer: d 1. What is the ratio of the total sales of branch B2 for
A=(7/12)*100=58 34% both years to the total sales of branch B4 for both
B=(5/16)*100=31.25% years?
C=(11/21)*100=52.40% a) 2:3 b) 3:5 c) 4:5 d) 7:9
D=(2/5)*100=40%=40% 2. Total sales of branch B6 for both the years is what
E=(6/14)*100=42.86% percent of the total sales of branches B3 for both
F=(21/41)*100=51.22% the years?
The least is country B
2.20
Professor Academy
a) 68.54% b) 71.11% c) 73.17% d) 75.55% c) 31500 d) Data Inadequate
3. What percent of the average sales of branches B1, 10. The total number of candidates qualified in 1999
B2 and B3 in 2001 is the average sales of branches and 2000 together was 33500 and the number of
B1, B3 and B6 in 2000? candidates appeared in 1999 was 26500. What was
a) 75% b) 77.5% c) 82.5% d) 87.5% the number of candidates in 2000?
4. What is the average sales of all the branches (in a) 24500 b) 22000 c) 20500 d) 19000
thousand numbers) for the year 2000? Question III
a) 73 b) 80 c) 83 d) 88
Directions (11-15): Follow the given instruction to give
5. Total sales of branches B1, B3 and B5 together for the answer of the following questions. (Total number
both the years (in thousand numbers) are? who attended the workshop = Number of Literates +
a) 250 b) 310 c) 435 d) 560 Number of illiterates)
Question II Day No. of Overall ratio Number of males
literates (illiterate : (literates + illiterates)
Directions (6-10): The following line graph gives the (males+ literates) (out (out of those who
percentage of the number of candidates who qualified Females) of those who attended)

Data Interpretation
attended)
an examination out of the total number of candidates
who appeared for the examination over a period of Monday 420 5:6 250
seven years from 1994 to 2000. Tuesday 350 3:5 240
90 Wednesday 320 5:4 320
80 Thursday 300 6:5 300
70 Friday 420 2:3 320
60
Percentage

50 11. The total number of people (literates + illiterates)


40 who attended the workshop on Monday was what
30
percentage more than those who attended on
20
10 Friday?
a) 12% b) 10% c) 15% d) 18%
1994 1995 1996 1997 1998 1999 2000
12. On Friday, if 192 illiterate males attended the
Percentage of Candidates Qualified to Appeared in an workshop, what was the number of literate females
Examination Over the Years who attended the workshop on that day?
6. The difference between the percentage of candidates a) 292 b) 300 c) 275 d) 280
qualified to appeared was maximum in which of the 13. On Saturday, if the number of illiterates (males +
following pairs of years? females) increased by 40 % and that of literates
a) 1994 and 1995 b) 1997 and 1998 (males + females) reduced by 20 %, as compared
c) 1998 and 1999 d) 1999 and 2000 to Tuesday, what was the difference between the
7. In which pair of years was the number of candidates number of literates and illiterates who attended
qualified, the same? the workshop on Saturday?
a) 1995 and 1997 b) 1995 and 2000 a) 12 b) 14 c) 15 d) 18
c) 1998 and 1999 d) Data Inadequate 14. What is the average number of illiterates (males +
8. If the number of candidates qualified in 1998 was females) who attended the workshop on Monday,
21200, what was the number of candidates appeared Wednesday and Thursday?
in 1998? a) 390 b) 400 c) 300 d) 370
a) 32000 b) 28500 c) 26500 d) 25000 15. What is the ratio of the total number of males
9. If the total number of candidates appeared in 1996 (Literates + Illiterates) who attended the workshop
and 1997 together was 47400, then the total number of on Tuesday and Friday together to that of females
candidates qualified in these two years together was? (literates and Illiterates) who attended the
a) 34700 b) 32100 workshop on the same days together?

2.21
Trust yourself that you can do it and get it. – Baz Luhrmann
Professor Academy
a) 5:9 b) 9:7 c) 7:9 d) 1:3 600 550
500 450 500
Question IV 450 450
450
400 350
Directions (16-20): Study the following line graph and 400 400

Number
300 300 350
answer the questions based on it. Vehicles made by 250
200
two companies X Joined
180 100 Y Left
159
160
Percentage

148 0
139 141 1996 1997 1998 1999 2000 2001
140 128 120 Year
120
120
119 107
100 99 X 21. The strength of the school increased from 1997 to
100 78
80 Y 1998 by what percent?
60
a) 1.7% b) 1.8% c) 1.9% d) 2%
1997 1998 1999 2000 2001 2002
Year
22. The number of students studying in the school
during 1999 was
16. What is the difference between the two companies a) 3100 b) 3000 c) 3150 d) 3250
Data Interpretation

in the given years?


a) 16000 b) 26000 23. During which of the following pairs of years, the
c) 28000 d) 30000 strength of the school was same?
a) 1997 and 1998 b) 1998 and 2000
17. What is the difference between the numbers of c) 1999 and 2001 d) 1996 and 2000
vehicles manufactured by Company X in 2000 and
2001? 24. The number of students studying in the school in
a) 21000 b) 22000 1998 was what percent of the number of students
c) 23000 d) 24000 studying in the school in 2001?
18. What is the average number of vehicles a) 90.75% b) 91.75%
manufactured by Company Y over the given c) 92.75% d) 93.75%
period? 25. Among the given years the largest number of
a) 119133 b) 119233 students joined in which year?
c) 119333 d) 119433 a) 1999 b) 2000 c) 2001 d) 1998
19. In which of the following years, the difference Question VI
between the productions of Companies X and Y Directions (26-30) : Study the following line graph
was the maximum among the given years? carefully and answer the questions accordingly.
a) 1997 b) 1998 c) 1999 d) 2000 Following graph gives the demand and production of
20. The production of Company Y in 2000 was mobile phones of five companies A,B, C, D and E
approximately what percent of the production of Production in thousands
Company X in same year? 50 45
40 40
a) 163% b) 164% c) 165% d) 166% 35 35
40
Question V 30 30
35
25 25
20 25
Directions (21-25): Study the following line graph Demand
which gives the number of students who joined and 10 Production
left the school in the beginning of the year for six years 0 A B C D E
from 1996 to 2001. Initial strength of the school in Year
1995 was 3000
26. The production of company B is approximately
what percent of the demand?
a) 71.4% b) 85% c) 140% d) 66.67%

2.22
Professor Academy
27. What is the average production of mobile phones 29. The demand of company E is approximately what
by all the companies? percent of the demand of company D?
a) 3100 b) 25000 c) 26000 d) 31000 a) 30% b) 65% c) 62.5% d) 40%
28. What is the average demand of mobile phones by 30. To meet its demand the company A wishes to buy
all the companies? the surplus mobile phones from a single company.
a) 34000 b) 35000 c)25000 d) 36000 Which of the following companies can supply?
a) B b) C c) D d) E

Question VII
Directions (31-35): Study the table carefully to answer the questions that follow Number of Students Appeared
(App) and Qualified (Qua) in Preliminary exam from various exams over the years in Mumbai
Years
Exams 2013 2014 2015 2016 2017
App Qua App Qua App Qua App Qua App Qua
RRB PO 1440 1165 1684 1500 1654 1566 1564 1462 1545 1240

Data Interpretation
RRB Clerk 1390 1072 1550 1278 1897 1689 1575 1388 1647 1106
IBPS PO 1364 1145 1754 1210 1574 1024 1510 1214 1765 1567
IBPS Clerk 1478 1388 1806 1586 1886 1542 1654 1296 1530 1234
IBPS SO 1560 1389 1666 1498 2004 1930 1690 1480 1605 1356
31. What is the approximate average number of over the number of candidates appeared for the
candidates appeared for the Preliminary exam Preliminary exam in the year 2014 from all Exams
from IBPS Clerk over all the years? together?
a) 1874 b) 1498 c) 1671 d) 1521 a) 97.5% b) 68.8% c) 75.4% d)83.5%
32. What is the difference between the number 34. Approximately what is the percentage of candidates
of students appeared but not qualified in the qualified over appeared from all the Exams
Preliminary exam from RRB PO in the year 2015 together in 2016?
and the number of students appeared but not a) 76% b) 65% c) 60% d) 86%
qualified in the Preliminary exam from the same 35. Percentage of candidates qualified over appeared
exam in the year 2013? from IBPS PO is the lowest during which of the
a) 187 b) 192 c) 211 d) 178 following years?
a) 2017% b) 2015% c) 2014 % d) 2016%
33. What is the percentage of the candidates qualified
Question VIII
Directions (36-40): Following table shows the number of players from different states who participated in an
Asian Athletics Championships sports event
States
Events
Odisha Punjab Gujarat Kerala Assam Tamil Nadu
Gymnastics 10 6 14 12 9 9
Pole Vault 20 16 6 9 12 15
High Jump 20 12 20 16 8 14
Long Jump 14 15 12 11 13 7
Judo 15 8 11 9 10 13
100m race 8 12 6 15 9 16
Shot Put 16 18 14 22 12 8
Swimming 12 10 15 17 8 10
2.23
Professor Academy
36. The number of players from Gujarat who 39. The number of players from Punjab who
participated in swimming is what percentage participated in shot put is what percentage of the
more than the number of players who participated number of players from Odisha who participated
in 100-metre race from the same state? in 100-metre race?
a) 75% b) 90% c) 150% d) 120% a) 187.5% b) 125% c)195% d) 225%
37. What is the average number of players who 40. The average number of players who participated
participated in high jump from all states together? from Odisha taking all the games together is what
a) 15 b) 19 c) 11 d) 13 percentage of the average number of players who
38. What is the ratio of the total number of players participated from Tamil Nadu taking all the games
from Assam who participated in all the games to together?
the number of players who participated in long a) 110% b) 220% c) 90% d) 125%
jump from all states together?
a) 5 : 7 b) 8 : 4 c) 9 : 8 d) 4 : 7
Question IX Directions (41-45): Following table shows the percentage of boys and difference between the
number of boys and the number of girls among the students of six different schools who appeared in board
Data Interpretation

examination in different years.


Schools 2011 2012 2013 2014
% boys Difference % boys Difference % boys Difference % boys Difference
P 70% 68 60% 35 75% 92 60% 43
Q 40% 42 48% 9 45% 24 60% 45
R 44% 42 57% 42 55% 36 65% 96
S 44% 42 57% 42 55% 36 65% 96
T 75% 140 60% 68 70% 132 66% 112
U 44% 45 56% 48 65% 114 45% 42
41. Total number of students appearing from School a) 757 b) 712 c) 667 d) 697
U in the year 2011 is what percent of the total 44. What is the difference between the total number
number of students appearing from School R in of students appearing from School Q in the year
the year 2011? 2012 and that in 2014?
a) 75% b) 87.5% c) 107.5% d) 150% a) 20 b) 33 c) 10 d) 0
42. What is the average of the number of boys who 45. What is the ratio of the total number of boys
appeared from School T, taking all the four years appeared from School R in 2011 to the total
together? number of girls appeared from School T in the
a) 220 b) 215 c) 219 d) 225 year 2013?
43. What is the total number of girls who appeared a) 9 : 10 b) 4 : 5 c) 7 : 5 d) 14 : 9
in the examination from all the six schools in the
year 2012?
Question X Directions (46-50): Study the following table carefully to answer the questions that follow—
Applications Received for IBPS RRB exam (in thousands) of Six States over the Years
State
Years
Kerala West Bengal Rajasthan Assam Punjab Odisha
2011 150 98 138 85 125 210
2012 170 110 152 89 135 225
2013 180 130 160 93 142 240

2.24
Professor Academy

2014 215 140 175 99 148 250


2015 230 145 190 105 155 270
2016 240 160 198 110 160 290
46. Application received from Assam in 2014 2012?
is approximately what percent of the total a) 29 b) 17 c) 40 d) 24
Application received from all states together in 49. What was the average Application received from
the same year? all the states together in 2013?
a) 19 b) 17 c) 15 d) 10
a) 150800 b) 161400
47. What is the average Application received from c) 157500 d) 155900
Kerala for all the years together?
a) 197500 b) 178600 50. Which state had the highest percent rise in
c) 181300 d) 195100 receiving Application from 2014 to 2015?
48. Approximately what is the percent rise in a) Odisha b) Kerala
c) Assam d) Rajasthan

Data Interpretation
Application received from Assam in 2016 from
Question XI
Directions (51-55): The following table shows the percentage of marks obtained by six students in five different
subjects. Answer the following question base on the table.
Physics Chemistry Maths Hindi English
Student
(out of 75) (out of 75) (out of 200) (out of 50) (out of 150)
A 84 42 67 44 74
B 68 64 49 74 52
C 75 54 58 68 64
D 48 82 63 48 70
E 70 78 71 56 78
F 56 66 55 76 66

51. What is average mark scored by all the students Answer Key with Explanation
in physics? 1. Answer: d
a) 50.125 b) 52.25 c) 57.5 d) 47.5 (75  65) 140 7
Re quired ratio = 7:9
52. What is total marks scored by student F in all (85  95) 180 9
subject together? 2. Answer: c
a) 332 b) 334.5 c) 335 d) 338.5
ª (70  80) º
53. What is overall percentage of marks score by
Re quired percentage « (95  110) u100 » %
¬ ¼
students B?
ª 150 º
a) 53 b) 57 c) 61 d) 69 « u100 » % = 73.17%
3. Answer: d ¬ 205 ¼
54. The marks score by student C in Physics is what Average sales (number in thousands) of
percent of marks scored By him in English? branches B1, B3 and B6 in 2000
a) 59 b) 60 c) 62 d) 67 1 § 245 ·
u(80  95  70) ¨ ¸
55. What is difference between the total marks 3 © 3 ¹
obtained by student D in Chemistry and English
Average sales (number in thousands) of
and that obtained by student F in the same
branches B1, B2 and B3 in 2001
subject?
a) 14.5 b) 16 c) 18 d) 19.5
2.25
Professor Academy
1 § 280 · know at least, the number of candidates appeared
u(105  65  110) ¨ ¸ in any one of the two years 1996 or 1997 or the
3 © 3 ¹ percentage of candidates qualified to appeared in
ª 245/3 º 1996 and 1997 together.
Required percentage « 280 / 3 u 100 » % Hence, the data is inadequate.
¬ ¼
ª 245 º 10. Answer: c
« 280 u 100 » % 87.5% The number of candidates qualified in 1999 =
¬ ¼
(80% of 26500) = 21200.
4. Answer: b Number of candidates qualified in 2000 =
Average sales of all the six branches (number in (33500 - 21200) = 12300.
thousands) for the year 2000 Let the number of candidates appeared in 2000
1 be x.
u ª80  75  95  85  75  70º¼
6 ¬ Then, 60% of x = 12300
= 80.
12300 u 100
5. Answer: d x= 20, 500
Data Interpretation

60
Total sales of branches B1, B3 and B5 for both
the years (in thousand numbers) 11. Answer: b
= (80 + 105) + (95 + 110) + (75 + 95) Total number of people who attended the
= 560. workshop on Monday = 420 * (11/6) =770
6. Answer: b Total number of people who attended the
The differences between the percentages of workshop on Friday = 420 * (5/3) =700
candidates qualified to appeared for the give Required % more = [(770-700)*100]/700= 10 %
pairs of years are: 12. Answer: a
For 1994 and 1995 = 50 - 30 = 20. Number of Literate males on Friday = 320-192=
For 1998 and 1999 = 80 - 80 = 0. 128
For 1994 and 1997 = 50 - 30 = 20. Literate female on Friday =420-128= 292
For 1997 and 1998 = 80 - 50 = 30.
13. Answer: b
For 1999 and 2000 = 80 - 60 = 20.
Number of illiterate (males + female) on
Thus, the maximum difference is between the
Tuesday = 350 * (3/5) =210
years 1997 and 1998.
Now, Required difference = (210 * 140/100) –
7. Answer: d (350 * 80/100) = 294 – 280 =14
The graph gives the data for the percentage of
14. Answer: d
candidates qualified to appeared and unless
Required average = {(420 * 5/6 + 320 *5/4 + 300
the absolute values of number of candidates
* 6/5)}/3 = (350 + 400 + 360)/3 =370
qualified or candidates appeared is know we
cannot compare the absolute values for any two 15. Answer: c
years. Number of Illiterate (male + female) on Tuesday
Hence, the data is inadequate to solve this = 350 * 3/5 = 210
question. Number of illiterate (males + females) on
8. Answer: c Friday = 320 * (5/4) =400
The number of candidates appeared in 1998 be x. Number of females (literate + Illiterate) on
Then, 80% of x = 21200 Tuesday = (350 +210-240) =320
x = 21200 u 100 Similarly on Friday = (320 +400-320) = 400
26, 500 Required ratio = (240+320): (320+400) = 7: 9
80
9. Answer: d 16. Answer: b
The total number of candidates qualified in 1996 Please note that line graph values are given in
and 1997together, cannot be determined until we thousands. Total production of Company Y
2.26
Professor Academy
from 1997 to 2002 = 119000+99000+141000+ for this line graph. Let’s be back on question
78000+120000+159000 = 716000 now,
Total production of Company X from 1997 to Percentage increase in strength of the school
2002 = 139000+120000+100000+128000+ from 1997 to 1998 will be, ((3000-2950)/
107000+148000 = 742000 2950*100) %=1.69%
Difference = 742000 - 716000 So this is approx equal to 1.7%
= 26000 22. Answer: c
17. Answer: a Number of students in 1995 = 3000 [given]
Difference = 128000-107000 = 21000 Number of students in 1996 = 3000-250+350
18. Answer: c = 3100
Average number of vehicles manufactured by Number of students in 1997 = 3100-450+300
Company Y = 2950
= 1\6(119000+99000+141000+78000+120000 Number of students in 1998 = 2950-400+450
+159000) = 3000
= 119333 Number of students in 1999 = 3000-350+500

Data Interpretation
= 3150
19. Answer: d
Although if we have deep look on line chart the 23. Answer: d
we can judge that it was in year 2000 Lets also Number of students in 1995 = 3000 [given]
solve it, Number of students in 1996 = 3000-250+350
For 1997 = (139000 - 119000) = 20000 For = 3100
1998 = (120000 - 99000) = 21000 For 1999 Number of students in 1997 = 3100-450+300
= (141000 - 100000) = 41000 For 2000 = = 2950
(128000 - 78000) = 50000 For 2001 = (120000 Number of students in 1998 = 2950-400+450
- 107000) = 13000 For 2002 = (159000 - = 3000
148000) = 11000 Number of students in 1999 = 3000-350+500
Clearly the difference was maximum in year = 3150
2000. Number of students in 2000 = 3150-450+400
= 3100
20. Answer: b Number of students in 2001 = 3100-450+550
Required Percentage =(128000/78000 x = 3200
100)%=164.1% Which is approximately 164% From from above options we find in 1996 and
21. Answer: a 2000 number of students was same i.e. 3100
Let analyze the graph before answering 24. Answer: d
question. Number of students in 1995 = 3000 Number of students in 1995 = 3000 [given]
[given] Number of students in 1996 = 3000-250+350
Number of students in 1996 = 3000-250+350 = 3100
= 3100 Number of students in 1997 = 3100-450+300
Number of students in 1997 = 3100-450+300 = 2950
= 2950 Number of students in 1998 = 2950-400+450
Number of students in 1998 = 2950-400+450 = 3000
= 3000
Number of students in 1999 = 3000-350+500
Number of students in 1999 = 3000-350+500
= 3150
= 3150
Number of students in 2000 = 3150-450+400
Number of students in 2000 = 3150-450+400
= 3100
= 3100
Number of students in 2001 = 3100-450+550 Number of students in 2001 = 3100-450+550
= 3200 = 3200
Above analysis will help us solving problems In 2001 students =3200

2.27
Professor Academy
In 1998 students =3000 = 7072
Required Percentage =(3000/3200 x Required % of the candidates
100)%=93.75% = (7072 × 100)/8460
25. Answer: c = 83.59%
Clearly from the line graph we can judge it 34. Answer: d
was in year 2001. Number of students appeared in Preliminary
26. Answer: d exam from all Exams in 2016
Required Percent = (30/45) × 100 = 66.67% = 1564 + 1575 + 1510 + 1654 + 1690 = 7993
27. Answer: d Number of students qualified from all Exams
[(25 + 30 + 40 + 25 + 35)/5] thousands in 2016
= 1462 + 1388 + 1214 + 1296 + 1480 = 6840
= (155000/5) = 31000
Required % of candidates = (6840 × 100)/7993
28. Answer: d
= 85.57%
[(35 + 45 + 35 + 40 + 25 )/5] thousands = 86%
= (180000/5) = 36000 35. Answer: b
29. Answer: c Year wise percentage of candidates qualified
Data Interpretation

Required Percent = (25/40) × 100 = 62.5% over appeared from IBPS PO


30. Answer: d 2013 = (1145 × 100)/1364 = 83.94%
Only company E has surplus production of 2014 = (1210 × 100)/1754 = 68.98%
10000 mobiles than its demand 2015 = (1024 × 100)/1574 = 65.06%
31. Answer: c 2016 = (1214 × 100)/1510 = 80.39%
Number of candidates appeared for 2017 = (1567 ×100)/1765 = 88.78%
Preliminary exam from IBPS Clerk over the Lowest percentage is in the year 2015.
years 36. Answer: c
= 1530 + 1886 + 1806 + 1478 + 1654 Correct Answer is: 150%
= 8354 Number of players from Gujarat participated
Required average = 8354/5 = 1670.8 in swimming = 15
= 1671 Number of players participated from Gujarat
32. Answer: a in 100- metre race = 6
Number of students in RRB PO appeared but Required % = (15 – 6)/6 × 100
not qualified in 2015 = 150%
= 1654 – 1566 = 88 37. Answer: a
Number of players participated in high jump
Number of students in RRB PO appeared but
from all states together
not qualified in 2013
= 20 + 12 + 20 + 16 + 8 + 14
= 1440 – 1165 = 275
= 90
Required difference
Average = 90/6
= 275 – 88 = 187 = 15
33. Answer: d 38. Answer: c
Number of candidates from all Exams Total number of players from Assam
appeared for Preliminary exam in the year participated in all the games = 81
2014 Number of players participated in long jump
= 1684 + 1550 + 1754 + 1806 + 1666 from all states = 72
= 8460 Required Ratio = 81 : 72
Number of candidates from all Exams =9:8
qualified for Preliminary exam in the year 39. Answer: d
2014 Number of players from Punjab participated
= 1500 + 1278 + 1210 + 1586 + 1498 in short put = 18
2.28
Professor Academy
Number of players from Odisha participated in 48. Answer: d
100- metre race = 8 Required rise % = (110 – 89)/89 × 100
Required % = (18/8) × 100 = 23.59%
= 225% = 24%
40. Answer: d 49. Answer: c
Odisha average = 115/8 = 14.375 Tamil Nadu Average Application received
average = 92/8 = 11.5 Required % = 14.375/11.5 = (142 + 240 + 93 + 180 + 130 + 160)/6
× 100 = 945/6 = 157500
= 125% 50. Answer: d
41. Answer: c Kerala% rise = (230 – 215)/215 × 100% = 6.98%
Students from School U 2011 = 375 West Bengal% rise = (145 – 140)/140 × 100% = 3.57%
Students from School R 2011 = 350 Rajasthan% rise = (190 – 175)/175 × 100% = 8.57%
% = (375/350) × 100 Assam% rise = (105 – 99)/99 × 100% = 6.06%
= 107.5% Punjab% rise = (155 – 148)/148 × 100 = 4.73%
Odisha% rise = (270 – 250)/250 × 100% = 8%
42. Answer: c State for highest % rise = Rajasthan.

Data Interpretation
Average
51. Answer: a
= (210 + 204 + 231 + 231)/4
Average marks all students in Physics = 1/6(75{
= 876/4
0.84+0.68+0.75+0.48+0.70+0.56})
= 219
= 50.125
43. Answer: a
Total number of girls in 2012 52. Answer: d
= 70 + 117 + 129 + 129+ 136 + 176 = 757 Total marked scored by student F in all
subject=75*0.56+75*0.66+200*0.55+50*0.76+ 150*
44. Answer: d 0.66
Difference =338.5
= 225 – 225 = 0
53. Answer: b
45. Answer: d
Marks score by students B=75*0.68+75*0.64+2
Let the total number of students be x.
00*0.49+50*0.74+150*0.52
Boys = 44x/100
Required Percentage = 312/550*100=57
And
girls = 56x/100 Difference = 12x/100 = 42 54. Answer: a
x = 4200/12 = 350 Marks score by student C in Physics =
Boys = (44/100)× 350 = 154 75*0.75=56.25
Similarly, Total students = 132 × 100/40 = 330 Marks score by student C in English
Girls = (30× 330)/100 = 99 = 150*0.64 = 96 Required Percentage
Ratio = 154/99 =56.25/96*100 = 59
= 14/9 = 14 : 9 55. Answer: c
46. Answer: d Total marks obtained by student D = (75*0.82)
Required % = 99 × 100/1027 = 9.64% + (150*0.70) =166.5
= 10% Total marks obtained by student F = (75*0.66)
47. Answer: a + (150*0.66) =148.5
Average Application received Difference = 166.5-148.5 = 18
= (150 + 170 + 180 + 215 + 230 + 240)/6 =
1185000/6
=197500

2.29
Professor Academy
2. Answer : Option b
Previous NET Question (Sept-Nov 2020)
The ratio between the expenditure on taxes for the
Question I years 2016 and 2018= 108:88 = 27:22
Directions (1-5) 3. Answer : Option b
The average amount of interest =
Consider the data in the given table and answer the
(23.4+32.5+41.6+36.4+49.4)/5 = 36.6
questions that follow
4. Answer : Option d
The following table is on the Expenditures of Institu-
The total amount of bonus = 3+2.52+3.84+3.68+3.96
tion (in lakh Rupees) per annum over the given years.
= 17
Heads of Expenditure (in lakh Rupees) The total amount of salary = 288+342+324+336+420
Year Salary of Transport Bonuses Interest Taxes = 1710.
staff on loans The total amount of bonus is what percent of the
total amount of salary = (17/1710) * 100 = 1%
2015 288 98 3 23.4 83
5. Answer : Option a
2016 342 112 2.52 32.5 108
Data Interpretation

Total expenditure in 2015 = 288+ 98+3+23.40+83


2017 324 101 3.84 41.6 74
=495.4
2018 336 133 3.68 36.4 88
Total expenditure in 2019 = 420 + 14+ 3.96 + 49.40
2019 420 14 3.96 49.4 98
+98 = 585.36
1. The total expenditure of the institution on these Percentage of total expenditure in 2015 with respect
items during the year 2017 is to the total expenditure in 2019 = (495.4/585.36)*
a) 624.6 c) 544.44 100= 84.63%
b) 524.44 d) 591.41
Question II
2. The ratio between the expenditure on taxes for the Directions (6-10)
years 2016 and 2018, is approximately
Study the data in the given table and answer the ques-
a) 17:11 c) 31:27
tions that follow
b) 27:22 d) 19:17
The table below provides data on the percentage (%)
3. What is the average amount of interest per year that distribution of job vacancies in IT Companies situated
the institution had to pay? in various Indian cities in the years 2009 and 2019. In
a) 30.50 c) 39.66 the year 2009, the total number of vacancies was 5.4
b) 36.66 d) 41.02 lakhs and in the year 2019, it was 8.6 lakhs.
4. The total amount of bonus paid by the institution Percentage (%) of job vacancies
during the given period is approximately what per- 2009 2019
cent of the total amount of salary paid during this City
period? Banglore 15 22
a) 3% b) 4% c) 7% d) 1% Hyderabad 10 8
Pune 12 6
5. Total expenditure on all these items in 2015 was ap- Mumbai 10 18
proximately what percent of the total expenditure Chennai 8 10
in 2019? NCR 21 20
a) 84.63 % c) 91 % Other cities 24 16
b) 58% d) 73 %
6. What is the difference between the number of va-
Explanations
cancies available in the city of Bangalore in the year
1. Answer : Option c 2019 and 2009?
The total expenditure in 2017 = 324+ 101+ 3.84+ a) 108200 c) 118400
41.60+74 = 544.44 b) 113120 d) 96400
2.30
Professor Academy
7. What is the average number of vacancies avail- =22% of 8.6 lakhs = 1,89,200
able in the city of Hyderabad in the years 2009 Difference = 1,08,200.
and 2019? 7. Answer : Option d
a) 41080 c) 58610 The number of vacancies in Hyderabad (2009)
b) 42740 d) 61400 =10% of 5.4 lakhs =54,000
8. If the number of vacancies in the city of Pune is The number of vacancies in Hyderabad (2019)
48000 in the year 2019 and the percentage distri- =8% of 8.6 lakhs = 68,800
bution is the same as given in the table, then what Average = (54,000+68,800)/2 = 61,400.
is the number of vacancies available in NCR in 8. Answer : Option d
2019? The number of vacancies in Pune (2019) =6%
a) 1.2 lakhs c) 1.48 lakhs =48,000
b) 1.32 lakhs d) 1.6 lakhs The number of vacancies in OCR (2019) =20% =
9. What is the total number of vacancies available in (48000*20) /6 = 1,60,000.
the city of Chennai in 2009 and in that of Mum- 9. Answer : Option c
bai in the year 2019? The number of vacancies in Chennai(2009) =8%

Data Interpretation
a) 2.16 lakhs c) 1.98 lakhs of 5.4 lakhs =43,200
b) 2.04 lakhs d) 1.92 lakhs The number of vacancies in Mumbai (2019)
10. What is the approximate percentage rise seen in =18% of 8.6 lakhs = 1,54,800
vacancies available in the city of Hyderabad from Total = (1,54,800 + 43,200) = 1,98,000 = 1.98
2009 to 2019? lakhs.
a) 21.8 % c) 26.23 %
10. Answer : Option d
b) 23.23 % d) 27.41 % The number of vacancies in Hyderabad (2009)
Explanations =10% of 5.4 lakhs =54,000
The number of vacancies in Hyderabad (2019)
6. Answer : Option a =8% of 8.6 lakhs = 69,800
The number of vacancies in Bangalore(2009) Percentage increase = [(69,800 – 54,000) /
=15% of 5.4 lakhs = 81,000 54,000] * 100 = (14,800 /54,000) * 100 = 27.40%
The number of vacancies in Bangalore(2019)
Question III
Directions (11-15)
The following table shows the maximum marks of each subject inside the bracket and percentage of marks ob-
tained by seven students in six different subjects in the exam
Student/subject Computer Chemistry Physics Geography History Mathematics
Science (130) (120) (100) (50) (40)
(150)
Piyush 90 50 90 60 70 80
Gaurav 100 80 80 40 80 70
Mayank 90 60 70 70 90 70
Vimal 80 65 80 80 60 60
Vikas 80 65 85 95 50 90
Varun 70 75 65 85 40 60
Ashish 65 35 50 77 80 80
11. What are the aggregate of marks obtained by Ma- a) 432 c) 460
yank in all the six subjects? b) 456 d) 440

2.31
Professor Academy
12. What is the overall percentage of Ashish? 12. Answer : Option c
a) 54% c) 60% overall percentage of Ashish=
b) 68% d) 63% [(97.5+45.5+60+77+40+32)/590] *100=
13. The number of students who obtained 60% and 59.6%=60
above marks in all subject is: 13. Answer : Option c
a) 4 c) 2 Mayank and Vimal are the two students who ob-
b) 5 d) 1 tained 60% and above marks in all subject.
14. In which subject is the overall percentage the 14. Answer : Option a
best? The overall percentage of Computer science= [(9
a) Computer Science c) Math 0+100+90+80+80+70+65)/600]*100
b) Chemistry d) Physics = (575/600)*100= 95.8% (the Best)
15. What are the average percentage of marks (%) 15. Answer : Option b
obtained by all the seven students in Physics? The average percentage of marks (%) obtained
a) 82.42 c) 86.24 by all the seven students in Physics
b) 74.2 d) 95.14 = [(90+80+70+80+85+65+50)/7]= 520/7=
Data Interpretation

Explanations 74.28%

11. Answer : Option d


Aggregate of marks obtained by Mayank=
135+78+84+70+45+28 =440

2.32
3 READING COMPREHENSION

Why does NTA NET demand aspirants to reading comprehension of other competitive exam would be
learn Reading Comprehension? about three to four paragraphs, each having at least 15 to 20
lines. In the context of the NET exam, the answers to all the
Reading comprehension (RC) is the ability to
questions of Reading comprehension are strategically hidden
actively read the information (passage), process the text,
in the passage itself, and candidates can easily answer these
understand its meaning, and integrate the message. Reading
questions correctly if they appear for the exam with a stress-
comprehension is one of the most important topics which
free mind set and have practised enough. Practising each day,
commonly appear in the verbal ability section of almost all
reading comprehension, is a key to score marks.
qualifying exams and competitive exams. The purpose of the
reading comprehension is to evaluate the candidate’s ability to The changing pattern of reading comprehension is analysed
read and comprehend the passage. from the recent exams held. It is noticed that, the reading
comprehension passage tends to shift from inferential level to
It involves the process such as reading the passage, grasps
analytical level.
the main content of the passage, understands the opinion of
the author, assimilate the information, connect the ideas of Blueprint of Reading comprehension unit
passage, comprehend the passage and bringing the inference
Dear Aspirants, this blue print will help you
out of it. Focus is the key skill that is required for an aspirant
¸¶Å ²¿ ºµ¶² ²³ÀÆÅ µºȮ¶Ã¶¿Å ½¶Ç¶½Ä À· µºȲ´Æ½ÅÊ º¿ ö²µº¿¸
ÅÀ ȱ¿ºÄ¹ ¶²µº¿¸ ´À¾Áö¹¶¿ÄºÀ¿ ÂÆº´¼½Êʇ Ê Áò´ÅºÄº¿¸ ʶ
´À¾Áö¹¶¿ÄºÀ¿²¿µ²½ÄÀ·¶Å´¹´À¿ȱµ¶¿´¶³ÊÁò´ÅºÄº¿¸ʶ¾
reading comprehension, one can build their concentration.
in an orderly sequence. In Professor Academy blueprint the
The comprehension for paper 1 is generally based on a piece ö²µº¿¸ ´À¾Áö¹¶¿ÄºÀ¿ ¹²Ä ³¶¶¿ ´½²Äĺȱ¶µ º¿ÅÀ Ї ½¶Ç¶½Äʁ ²Ä
of recent news or topics related to any other sphere of life. follows.
However, it is essential to note that even if the candidate
Level 1- This level is a basic level; this will help you to
has a wider idea of the topic, his/her answers should only
get the basic idea and literal meaning of the passage. Literal
be based on the information mentioned in the passage. The
meaning is simply what the text says. Here are examples of
comprehension for paper 2 is generally based on the core
ʶ ÅÊÁ¶ À· º¿·Àþ²ÅºÀ¿ ʲÅ ´Àƽµ ³¶ ºµ¶¿Åºȱ¶µ ²Ä ² ½ºÅ¶Ã²½
subject topic.
meaning
Reading comprehension is much more important regarding
The main idea, Stated facts, The sequence of events, Characters
the NTA NET exam because it covers up to 30 marks out of
in the story
300 marks (total marks of the exam), that is 10% of the total
marks. These 30 marks are made from both the papers that are Level 2- This level wants you to think little for
paper 1 (10 marks) and paper 2 ( 20 marks). Though in paper answering the questions by getting inference from the
2 the format of the question does not resemble the same as passage. Inferential meaning involves determining what the
reading comprehension for some of the core subjects, some set text means. Here are examples of the type of information that
of comprehension skills are also required to secure 20 marks ´Àƽµ³¶ºµ¶¿Åºȱ¶µ²Äº¿·¶Ã¶¿Åº²½¾¶²¿º¿¸ʇ
in paper 2. So, it is important for the candidate to understand ¶¿¶Ã²½ºË²ÅºÀ¿Äʁ ´²ÆÄ¶ ²¿µ ¶Ȯ¶´Å ö½²ÅºÀ¿Ä¹ºÁÄʁ ·ÆÅÆÃ¶
this reading comprehension unit as an easy scoring point. predictions, an unstated main idea.
Syllabus Level 3- This level requires the candidate to assess
Comprehension ʯDz½Æ²Å¶ʰʶÁ²ÄIJ¸¶Ⱥʲöȷ¶´ÅºÇ¶ÄÁ¹¶Ã¶À·¼¿ÀȽ¶µ¸¶ʇ
Evaluative meaning is what the text is telling us about the
A passage of text will be given. Questions will be asked from
world outside the story. Here are examples of the type of
the passage to be answered.
º¿·Àþ²ÅºÀ¿ʲÅ´Àƽµ³¶ºµ¶¿Åºȱ¶µ²Ä¶Ç²½Æ²Åº¿¸¾¶²¿º¿¸ʇ
Trend Analysis
Choosing an alphabetical statement, giving a solution to a
To understand about reading comprehension of situation-based problem and suggestion idea/opinion.
ʁÀ¿¶¹²ÄÅÀÆ¿µ¶ÃÄŲ¿µʶµºȮ¶Ã¶¿´¶³¶Åȶ¶¿ʶ
Level 4 and Level 5 are the advanced level which
exam and the other competitive exams. Unlike other exams,
develops vocabulary skills, art of drawing indirect inferences,
NET does not demand the aspirants to have to have to have a
application- oriented questions, making judgments.
sound vocabulary. Instead, it clearly demands the aspirants
to have skill focus, concentration, making conclusion from Make use of all the passages and score the fullest in the exam!
the given passage. Reading comprehension of NET exam ALL THE BEST!
portrays a single paragraph of about 15 lines only, whereas
Professor Academy
So what exactly is a Reading Comprehension? 1. First of all have a quick but sharp glance of the
Reading Comprehension is the way of questions,
understanding what is being read. In simple words, • ‘What’ type
reading comprehension means a passage which is to be • ‘How’ type
read and comprehended. What makes comprehension
• Refers to a particular word
passages a nightmare for students is the diverse range
of topics that are covered, the vocabulary used in the • Actual data as such
passage and the time limit given in the exam. • Interpretative
Different types of area/ topics for reading 2. Read the passage
comprehensions:
• Find out the overall tone by understanding
1. Social Sciences – History, anthropology,
• Starting note (find – whether the Author
sociology, government.
Starts in a Positive Tone or Negative Tone)
2. Natural Sciences – Biology, Environment, Space
technology, Astronomy. • Ending note (find – whether the Author
Starts in a Positive Tone or Negative Tone)
3. Humanities – Art, Music, Literature, Philosophy
4. Business – Economics, Marketing, Human • Understand the transition from the First
Resources. line till the Last line
Different types of questions which come in Reading • Get to know - what does the author mean to
comprehension: say (conclusion)?
• Factual - these questions are based on the facts • If a particular word is unknown, we could
given in the passage. make educated guess if the overall meaning
is clear enough.
• Main idea - in these questions we have to tell the
main idea or the central theme of the passage. 3. Understand the passage
• Title- the title of the passage is linked directly to • Always go for the big picture of what is being
Reading Comprehension

the main idea of the passage. told actually.


• Inference - these questions are based on the • DO NOT SKIM the Content.
inference of the entire passage. • READ the Passage FULLY.
• Tone - in tone-based questions we have to deduce • RC demands presence of mind, high focus
the tone of the passage. and precise interpretation skills- a appealing
Reading comprehension is so important because: essential for an academician to understand
the subject.
• RCs test a student on a number of skills, including
English comprehension and logical ability, Level 1
language skills such as reading and vocabulary.
1.1 Directions (1-5) Read the Passage and Answer
• As we discussed earlier RCs are generally based the following Questions.
on a variety of topics, covering science, business,
philosophy, sociology and so on. Such a vast Once upon a time Shree Krishna and Arjun
breadth of topics means that one needs to read went for a short stroll around the city. They saw a poor
regularly and diversely in order to make sure looking priest begging. Arjun felt pity for him and he
that one is comfortable reading every kind of gave him a bag full of 100 gold coins. The priest became
passage. very happy and thanked Arjun. He left for his home. On
way, he saw another person who needed help. The priest
• These passages are generally based on unique could have spared a coin or two to help that person.
questions and some of the question are inferential However, he chose to ignore it. But on way to his home,
in nature. one thief robbed him of his bag of coins and ran away.
3.2
Professor Academy
The priest became dejected and went back The fish was struggling in a small pot of water, ended
again for begging. Next day again when Arjun up throwing out a diamond from the mouth! The priest
saw the same priest begging and he was surprised screamed with a joy, “I got it, I got it”. At that same point,
that after getting a bag full of coins which can last the thief who had robbed the priest’s bag of 100 gold
a lifetime, the priest was still begging! He called coins, was passing through there. He thought that the
the priest and asked him the reason for this. The priest recognized him and may get him punished. He
priest told him about the whole incident and Arjun got nervous and ran to the priest. He apologized to the
again felt pity at him. So, this time he gave him a priest and returned his bag full of 100 gold coins. The
diamond. priest couldn’t believe what just happened. Arjun saw all
The priest became very happy and left for this and said, “Oh Lord, Now I understand your play”.
home and he again saw someone who needed help Questions
but he chose to ignore again. Upon reaching home, 1. What is the moral of the story?
he safely put the diamond in an empty pot of water a. One day you will get everything, so do not
with a plan to cash it out later and live a wealthy life. lose hope.
His wife was not at home. He was very tired so he b. When you have enough to help others, don’t
decided to take a nap. In between, his wife came let that chance go.
home and picked up that empty pot of water, walked c. Your good deeds will always be repaid to you.
towards the river close by to fill up the water. She had d. You cannot get enough if you have bad luck.
not noticed the diamond in the pot. Upon arriving a) Only a b) Both b and c
at the river, she put the whole pot into the running c) Only b d) Only c
river water to fill it up. She filled up the pot but the
diamond was gone with the water flow! 2. What is the meaning of “The priest could have
spared a coin or two to help that person”?
When the priest woke up, he went to see the a) The priest could have thanked the person by
pot and asked his wife about the diamond. She told giving him one or two coins.
him, she had not noticed it and it must have been b) The priest could have given some coins to
lost in the river. The priest couldn’t believe his bad help the needy person.

Reading Comprehension
luck and again started begging. Again Arjun and c) The priest did not give any coin to the poor
Shree Krishna saw him begging and Arjun inquired person.
about it. Arjun felt bad and started thinking if this d) The poor person asked for one or two coins
priest will ever have a happy life. but the priest did not help him.
Shree Krishna who is an incarnation of God 3. Which of the following statements is correct?
smiled. Shree Krishna gave that priest one coin a) Arjun felt pity at priest when he saw him beg-
which was not even enough for buying a lunch or ging again.
dinner for one person. Arjun asked Shree Krishna, b) Arjun who is an incarnation of God smiled.
“Lord, I gave him gold coins and diamond, which c) The priest kept coin of bags in empty pot of
could have given him a wealthy life, yet it didn’t help water.
him. How will just one coin help this poor guy?” d) As opposed to first two times, the priest
Shree Krishna smiled and told Arjun to follow that offered his help third time.
priest and find out.
4. Why did the priest screamed with joy?
On the way, the priest was thinking that one a) He recognized the thief who stole his bag of
coin Shree Krishna gave him, he can’t even buy a lunch coins.
for one person. Why would he give so little? He saw a b) He was happy to save the life of the fish.
fisherman who was getting a fish out of his net. Fish c) He got the lost diamond
was struggling. The priest felt pity at fish. He thought d) He found his stolen bag of coins.
that this one coin won’t solve my problem, why not
I save that fish. So the priest paid the fisherman and 5. Why did the priest help the fish?
took the fish. He put the fish in his small pot of water a) He realized his mistake of not helping others
which he always carried with him. for the first two times.
3.3
“Reading is to the mind what exercise to the body”
Professor Academy
b) The coin given to him by Krishna was of no The World Commission on Environment and
use to him. Development suggested seven critical objectives
c) He was unable to buy even a single meal with for environment and development policies that
that coin. follow from the concept of sustainable development:
d) He felt pity at fish and realized that the coin, Reviving growth, Changing the quality of growth,
that could not solve his problem, can save Meeting essential needs and aspirations for jobs, food,
fish. energy, water and sanitation, Ensuring a sustainable
1.1 Answer key level of population, Conserving and enhancing the
resource base, Reorienting technology and manage
1 2 3 4 5 risk, Including and combining environment and
b b a c d economics considerations in decision-making.
1.2 Directions(6-10) Read the Passage and Answer Questions
the following Questions.
6. The definition for “sustainable development”
The best definition of Sustainable was presented by
development was presented by the report Our a) Rio Summit
Common Future (also known as the Brundtland b) United Nation development programme
Report):”Sustainable development is development c) Sustainable development goals
that meets the needs of the present without d) Brutland Report
compromising the ability of future generations to 7. ___________ prirotizes, its proponents
meet their own needs.”Sustainable development considered to be environmental sustainability
is thus the ability to meet the needs of the present over economic and cultural considerations.
while contributing to the future generations’ needs. a) Sustainable development
It focuses on two goals:To improve the quality of b) Millennium development
life for all of the Earth’s citizens.To stop using up c) Green development
the natural resources beyond the capacity of the d) None
environment to supply them indefinitely.Green
development is generally differentiated from 8. The sustainable development underlying the
Reading Comprehension

sustainable development in that Green development “concept of needs” in addition to


a) Priority of rich
prioritizes what its proponents consider to be
b) Limitation of Technology
environmental sustainability over economic
c) Ability to meet present and future needs
and cultural considerations. In addition to that,
d) Imbalance in ecosystem
sustainable development has underlying concepts:
the concept of ‘needs’, in particular the essential 9. Which of the following one objectives for
needs of the world’s poor, to which overriding environment policies by world commission on
priority should be given; and the idea of limitations environment.
imposed by the state of technology and social a) Reviving growth
organization on the environment’s ability to meet b) Ensuring the sustainable level of population
present and future needs. There is an additional c) Detrimental situation of environment
focus on the present generations’ responsibility to d) Both (a) and (b)
improve the future generations’ life by restoring 10. The huge gap between the developed and
the previous ecosystem damage and resisting to undeveloped countries, necessitate
contribute to further ecosystem damage.Sustainable a) Enormous stress on natural resources
development requires action on the part of world b) Re-orienting Technology
states, governments and people. The detrimental c) Practical strategy to reverse the trends
situation of the environment, the enormous stress d) Changing quality of growth
upon our natural resources and the huge gap
6 7 8 9 10
between developed and underdeveloped countries,
necessitate practical strategies to reverse the trends. d c c d c

3.4
Professor Academy
1.3 Directions (11-15) Read the Passage and Persia in the Hindu Kush and Pamir Mountains.
Answer the following Questions. Over the centuries, there has been significant fusion
of cultures between Buddhists, Hindus, Muslims
India is a land of ancient civilization. India’s
(Sunni, Shia, Sufi), Jains, Sikhs and various tribal
social, economic, and cultural configurations are the
populations in India.
products of a long process of regional expansion.
Indian history begins with the birth of the Indus Questions
Valley Civilization and the coming of the Aryans. 11. Indian History begins with the birth of
These two phases are usually described as the a) Indus valley civilization
preVedic and Vedic age. Hinduism arose in the Vedic b) Pre vedic age
period. c) Buddhism
The fifth century saw the unification of India d) Both (a) and (b)
under Ashoka, who had converted to Buddhism, and 12. Who emphasized spread of Buddhism under his
it is in his reign that Buddhism spread in many parts reign?
of Asia. In the eighth century Islam came to India a) Ashoka b) Mahavir
for the first time and by the eleventh century had c) Chanakya d) Humayun
firmly established itself in India as a political force.
It resulted into the formation of the Delhi Sultanate, 13. The Rebellion which sought to restore Indian
which was finally succeeded by the Mughal Empire, supremacy has occurred on
under which India once again achieved a large a) 1857 b) 1859
measure of political unity. c) 1860 d) 1856
It was in the 17th century that the Europeans 14. Throughout the history of India, Indian culture
came to India. This coincided with the disintegration has been heavily influenced by
of the Mughal Empire, paving the way for regional a) Buddhism b) Dharmic religions
states. In the contest for supremacy, the English c) Mughal dynasty d) None
emerged ‘victors’. The Rebellion of 1857-58, which 15. What is the concern for spread of Hinduism,
sought to restore Indian supremacy, was crushed; architecture from India to other parts of Asia
and with the subsequent crowning of Victoria as a) Amalgamation of various gools culture

Reading Comprehension
Empress of India, the incorporation of India into b) Silk Road
the empire was complete. It was followed by India’s c) Dharmic Religions
struggle for independence, which we got in the year d) None
1947.
India is one of the world’s oldest civilizations 11 12 13 14 15
and one of the most populated countries in the world. d a a b a
The Indian culture, often labeled as an amalgamation 1.4 Directions (16-20) Read the Passage and
of several various goolscultures, spans across the Answer the following Questions.
Indian subcontinent and has been influenced and
shaped by a history that is several thousand years old. Once upon a time two brothers who lived
Throughout the history of India, Indian culture has on adjoining farms fell into conflict. It was the
first serious rift in 40 years of farming side by
been heavily influenced by Dharmic religions. They
side. They had been sharing machinery, trading a
have been credited with shaping much of Indian
labour and goods as needed without a hitch. Then
philosophy, literature, architecture, art and music.
the long collaboration fell apart. It began with a
Greater India was the historical extent of Indian small misunderstanding and it grew into a major
culture beyond the Indian subcontinent. difference which exploded into an exchange of bitter
This particularly concerns the spread of words followed by weeks of silence.
Hinduism, Buddhism, architecture, administration
One morning there was a knock on elder
and writing system from India to other parts of Asia
brother’s door. He opened it to find a man with a
through the Silk Road by the travellers and maritime
carpenter’s toolbox. “I am looking for a few days of
traders during the early centuries of the Common work”, he said. “Perhaps you would have a few small
Era. To the west, Greater India overlaps with Greater jobs here and there. Could I help you?”
3.5
Professor Academy
“Yes!” said the elder brother. “I do have a job c) This was another trick used by the younger
for you. Look across the creek at that farm. That’s my brother to trick the elder brother emotionally.
neighbour, in fact, it’s my younger brother and we d) On the previous night he had seen his
don’t get along. Last week he dug a wider passage elder brother cry and pray for peace & love
for water into his farm. But he ended up creating a between them.
very wide creek in between our farms and I am sure
he did it just to annoy me. I want you to build me 18. Why had the carpenter come to the elder
something so that we don’t have to stand and see brother’s home?
each other’s face from across.” a) He was looking for a job and had knocked
on the doors of the elder brother in search of
The carpenter said “I think I understand some work.
the situation. I will be able to do a job that will b) He was a wanderer and was looking for a stay
please you.” The elder brother had to go to town for for few days in the village.
supplies, so he helped the carpenter get the materials c) He had come to bridge the gap between the
ready and then he was off for the day. The carpenter two brothers and help them love each other
worked hard all that day measuring, sawing, nailing.
once again.
At sunset when the elder brother returned, d) He had come to repair the broken door of the
the carpenter had just finished his job. The elder elder brother’s home.
brother’s eyes opened wide and his jaw dropped. It
was not what he had even thought of or imagined. It 19. Why the older brother asked the carpenter to
was a bridge stretching from one side of the creek to stay a few days?
the other! A fine piece of work, beautiful handrails. a) For some more projects
And to his surprise, his younger brother across the b) To give him some rest
creek was coming to meet him with a big smile and c) To introduce the villagers
arms wide open to hug him. d) To repair the bridge
“You are really kind and humble my brother! 20. There was a knowck on elder brother’s door
After all I had done and said to you, you still shown by______
that blood relations can never be broken! I am truly a) Saint b) Younger brother
sorry for my behaviour”, the younger brother said c) Neighbour d) Carpenter
Reading Comprehension

as he hugged his elder brother. They turned to see


16 17 18 19 20
the carpenter hoist his toolbox on his shoulder. “No,
wait! Stay a few days. I have a lot of other projects for d b a a d
you,” said the older brother. 1.5 Directions (21-25) Read the Passage and
“I’d love to stay on”, the carpenter said, “but, I have Answer the following Questions.
many more bridges to build!” Andrew walks out of his meeting, completely
Questions exhausted. After three long days of negotiating, he
16. What was the reaction of the elder brother to the has finally worked out a deal that is sure to get him a
job done by the carpenter? promotion. Despite the fact that he has an early flight
a) He was shocked and angered by the work back to New York in the morning, Andrew decides to
done by the carpenter. have a few drinks at the pub across the street. He has
b) A fine piece of work, beautiful handrails. been in London for three days and has not seen any
c) He was extremely happy. of the city. He cannot leave without at least visiting
d) He was surprised and amazed at the a pub, he thinks. He quickly crosses the street and
brilliance of the carpenter’s work. walks through the blue door of the pub. He notices
17. Why did the younger brother hug the elder a coat rack next to the door and carefully hangs his
brother despite having animosity towards him? jacket from one of the hooks. Andrew does not really
a) The carpenter had persuaded him in the consider it to be his jacket though. It was his father’s
absence of the elder brother. jacket, but it was passed down to Andrew after his
b) He was touched by the bridge built from his father died last year. Almost every memory Andrew
elder brother’s side to connect the two farms. has of his dad involves him wearing the dark red coat.
3.6
Professor Academy
Andrew walks to the bar and orders a drink. 25. Andrew missed his father’s red Jacket in
After he has finished, the bar tender asks if he wants _________
another drink. Andrew checks his watch and sees his a) Airport b) Hooks
plane is leaving in five hours and decides he needs to go. c) The pub d) Erin home
He regrets picking a flight so early in the morning, but
21 22 23 24 25
knows he will be able to sleep on the plane. He pays for
his drink, grabs his jacket, and leaves. It has gotten much c d d c c
colder outside since Andrew went into the pub, so he Level 2
slips his jacket on. At least, he tries to slip it on. He sticks
his arm in the sleeve, but the hole at the end is too small 2.1 Directions (1-5) Read the Passage and Answer
for his hand. He tries the other sleeve, but the jacket is the following Questions.
too small to stretch across his back. He takes it off and Pollution is the degradation of natural
looks at it. It looks like a shrunken version of his jacket. environment by external substances introduced
He checks the pocket and finds a wallet that is definitely directly or indirectly. Human health, ecosystem
not his. He opens it up and sees an ID with a picture of a quality, aquatic and terrestrial biodiversity may
woman. Her name is Erin. She has dark brown hair and be affected and altered permanently by pollution.
green eyes. A cute girl, Andrew thinks, but he does not Pollution occurs when ecosystems can not get rid
have time to worry about that. of substances introduced into the environment. The
He returns to the bar and checks the coat critical threshold of its ability to naturally eliminate
rack. His coat is gone. There are three black coats and substances is compromised and the balance of the
a brown one, but not a single red. He walks around ecosystem is broken.
the bar thinking that maybe Erin got cold and put India has major water pollution issues.
his jacket on, but there are no women in the whole Discharge of untreated sewage is the single most
place. He stands still, trying to decide what to do. important cause for pollution of surface and
He cannot leave his dad’s jacket in London and Erin ground water in India. There is a large gap between
probably needs her wallet. generation and treatment of domestic waste water
in India. The problem is not only that India lacks

Reading Comprehension
He types the address from her ID into his
phone and sees that her house is only a few blocks away. sufficient treatment capacity but also that the sewage
He can stop by her place, trade jackets, and still make it treatment plants that exist do not operate and are not
back to his hotel with a little bit of time to sleep. maintained. The majority of the government-owned
sewage treatment plants remain closed most of the
Questions
time due to improper design or poor maintenance
21. Andrew had an early flight back to _________ in or lack of reliable electricity supply to operate the
the morning plants, together with absentee employees and poor
a) London b) America management. The waste water generated in these
c) New York d) German areas normally percolates in the soil or evaporates.
22. Andrew quickly crosses the street and walks The uncollected wastes accumulate in the urban areas
through __________ of the pub. cause unhygienic conditions and release pollutants
a) The door b) The street that leaches to surface and ground water.
c) The road d) The Blue door Air pollution in India is a serious issue with
23. Andrew notices ___________ next to the door. the major sources being fuel wood and biomass
a) A coat rack b) Jacket burning, fuel adulteration, vehicle emission and
c) The hooks d) The door traffic congestion. Air pollution is also the main
cause of the Asian brown cloud, which is causing
24. Erin is a cute girl and her eyes was _________ the monsoon to be delayed. India is the world’s
in colour. largest consumer of fuel wood, agricultural waste
a) Red b) Brown and biomass for energy purposes. Traditional fuel
c) Green d) Black (fuel wood, crop residue and dung cake) dominates
3.7
Professor Academy
domestic energy use in rural India and accounts for 5. According to the Passage, the uranium Poisoning
about 90% of the total. In urban areas, this traditional was caused by,
fuel constitutes about 24% of the total. Fuel wood, a) Fly ash ponds of thermal power stations
agri waste and biomass cake burning releases over b) The Asian brown cloud
165 million tonnes of combustion products into c) Biomass cake burning
India’s indoor and outdoor air every year. These d) None
biomass-based household stoves in India are also a 2.2 Directions (6-10) Read the Passage and Answer
leading source of greenhouse emissions contributing the following Questions.
to climate change.
Many great inventions are greeted with
In March 2009, the issue of Uranium ridicule and disbelief. The invention of the airplane
poisoning in Punjab attracted press coverage. It was
was no exception. Although many people who
alleged to be caused by fly ash ponds of thermal power
heard about the first powered flight on December
stations, which reportedly lead to severe birth defects
in children in the Faridkot and Bhatinda districts of 17,1903, were excited and impressed, others reacted
Punjab. The news reports claimed the uranium levels with peals of laughter. The idea of flying an aircraft
were more than 60 times the maximum safe limit. In was repulsive to some people. Such people called
2012, the Government of India confirmed that the Wilbur and Orville Wright, the inventors of the first
ground water in Malwa belt of Punjab has uranium flying machine, impulsive fools. Negative reactions,
metal that is 50% above the trace limits set by the however, did not stop the Wrights. Impelled by their
United Nations’ World Health Organization. desire to succeed, they continued their experiments
Questions in aviation. Orville and Wilbur Wright had always
had a compelling interest in aeronautics and
1. What happens when the threshold level of the
environment is compromised? mechanics. As young boys they earned money by
a) Balance of an ecosystem is broken. making and selling kites and mechanical toys. Later,
b) Protocols related to environment araise. they designed a newspaper-folding machine, built a
c) Sewage plants are not maintained printing press, and operated a bicycle-repair shop.
Reading Comprehension

d) Urban areas are unhygienic In 1896, when they read about the death of Otto
2. Which is the most important cause for Water Lilienthal, the brother’s interest in flight grew into
pollution? a compulsion. Lilienthal, a pioneer in hang-gliding,
a) Ground water contamination had controlled his gliders by shifting his body in
b) Untreated sewage the desired direction. This idea was repellent to the
c) Oil Spills Wright brothers, however, and they searched for
d) Industrial Effuluent more efficient methods to control the balance of
3. What are the Additional problems that India airborne vehicles. In 1900 and 1901, the Wrights
faces in addition to lackof sewage treatment tested numerous gliders and developed control
capacity? techniques. The brothers’ inability to obtain enough
a) Treament plant is not maintained properly lift power for the gliders almost led them to abandon
b) Lack of electricity supply their efforts. After further study, the Wright brothers
c) Both (a) and (b)
concluded that the published tables of air pressure
d) None
on curved surfaces must be wrong. They set up
4. Which of the following is major source of Air a wind tunnel and began a series of experiments
pollution? with model wings. Because of their efforts, the old
i. Burning fuel wood
tables were repealed in time and replaced by the first
ii. Adulteration of fuel
reliable figures for air pressure on curved surfaces.
iii. Vehicle exhaust
a) I only b) II and III This work, in turn, made it possible for them to
c) III only d) I, II, III design a machine that would fly. In 1903 the Wrights

3.8
Professor Academy
built their first airplane, which cost less than one had been executed, there were rumors suggesting
thousand dollars. They even designed and built that Anastasia had survived. Over the years, a
their own source of propulsion lightweight gasoline number of women claimed to be Grand Duchess
engine. When they started the engine on December Anastasia. Perhaps the best –known claimant was
17, the airplane pulsated wildly before taking off. Anastasia Tschaikovsky, who was also known as
The plane managed to stay aloft for twelve seconds, Anna Anderson. In 1920, eighteen months after the
however, and it flew one hundred twenty feet. Czar’s execution, this terrified young woman was
rescued from drowning in a Berlin river. She spent
Questions
two years in a hospital, where she attempted to
6. People thought that the Wright brothers had reclaim her health and shattered mind. The doctors
____. and nurses thought that she resembled Anastasia
a) acted without thinking and questioned her about her background. She
b) been negatively influenced disclaimed any connection with the Czar’s family.
c) been too cautious
Eight years later, though, she claimed that she was
d) had not given enough thought
Anastasia. She said that she had been rescued by
7. The Wright’s interest in flight grew into a ____. two Russian soldiers after the Czar and the rest of
a) financial empire b) plan her family had been killed. Two brothers named
c) need to act d) foolish thought Tschaikovsky had carried her into Romania. She
8. Lilenthal’s idea about controlling airborne had married one of the brothers, who had taken
vehicles was ___the Wrights. her to Berlin and left her there, penniless and
a) proven wrong by b) In efficient without a vocation. Unable to invoke the aid of
c) disliked by d) accepted by her mother’s family in Germany, she had tried to
9. The old tables were __ and replaced by the drown herself. During the next few years, scores of
first reliable figures for air pressure on curved the Czar’s relatives, ex-servants, and acquaintances
surfaces. interviewed her. Many of these people said that
a) destroyed b) canceled her looks and mannerisms were evocative of the

Reading Comprehension
c) multiplied d) discarded Anastasia that they had known. Her grandmother
10. The Wrights designed and built their own source and other relatives denied that she was the real
of ____. Anastasia, however. Tried of being accused of
a) force for moving forward fraud, Anastasia immigrated to the United States in
b) force for turning around 1928 and took the name Anna Anderson. She still
c) turning wished to prove that she was Anastasia, though,
d) force to going backward and returned to Germany in 1933 to bring suit
2.3 Directions (11-15): Read the passage and against her mother’s family. There she declaimed to
answer the questions that follow: the court, asserting that she was indeed Anastasia
and deserved her inheritance. In 1957, the court
One of the most intriguing stories of
decided that it could neither confirm nor deny
the Russian Revolution concerns the identity
Anastasia’s identity. Although we will probably
of Anastasia, the youngest daughter of Czar
never know whether this woman was the Grand
Nicholas II. During his reign over Russia, the Czar
Duchess Anastasia, her search to establish her
had planned to revoke many of the harsh laws
identity has been the subject of numerous books,
established by previous czars. Some workers and
plays, and movies.
peasants, however, clamored for more rapid social
reform. In 1918 a group of these people, known as Questions
Bolsheviks, overthrew the government. On July 11. Some Russian peasants and workers___for social
17 or 18, they murdered the Czar and what was reform.
thought to be his entire family. Although witnesses a) longed b) cried out
vouched that all the members of the Czar’s family c) begged d) hoped
3.9
Professor Academy
12. Witnesses ___ that all members of the Czar’s However, her proposals have met resistance.
family had been executed) Several male politicians in her own Christian
a) gave assurance b) thought Democrat party have derided the idea to men
c) hoped d) convinced some abandoning work to change nappies. The Social
13. Tchaikovsky ____any connection with the Czar’s Democrats, junior Partners in Germany’s coalition
family. government, have also expressed unease because the
a) denied b) stopped themes of childcare and women’s right traditionally
c) noted d) justified belonged to the left.
14. She was unable to ___the aid of her relative. “Compulsory paid leave for fathers is a good
a) locate b) speak about idea”, Professor Norbert Schneider, a sociologist at
c) call upon d) identify Mainz University, said. Germany now has the highest
number of childless women in the world. This trend
15. In court she ___ maintaining that she was
has been going on since at least the 90’s. What we
Anastasia and deserved her inheritance.
also know is that higher the level of education, the
a) finally appeared b) spoke forcefully
c) testified d) gave evidence more likely a woman is to remain childless.

2.4 Directions (16-20): Read the passage and Schneider said several factors were to blame
answer the questions that follow: for Germany’s low birth rate, including inadequate
childcare provision, a school day that ends at 1 pm,
Germany has been plunged into an anguished and old-fashioned attitudes among employers. By
debate about how to encourage reluctant couples to the time they had finished university, and found a
breed after new figures showed Germany with the good job, many German women were already in
world’s highest proportion of childless women. their mid-30s, he said.
Thirty percent of German women have had Questions
no children, according to European Union statistics 16. What is Germany most worried about?
from 2005, with the figure rising among female a) the rising population of Germany
graduates to 40 percent. Germany’s family minister, b) the falling population of Germany
Reading Comprehension

Ursula von der Leyen, said that unless the birth rate c) how to encourage their reluctant couples to
picked up the country would have to “turn the light breed
out”. d) how to raise the birth rate among their
reluctant female graduates
Von der Leyen, a mother of seven and
Germany’s chancellor, Angela Merkel, told Stern 17. Which of the following statements is false in the
magazine that not only women but also “deeply given context of the passage:
uncertain” men were to blame for it. “They are unsure a) Women should not be educated
about the role of fatherhood,” she said Last month, b) Men should be made more responsive to
their role of fatherhood
Von der Leyen tabled a series of radical proposals,
c) Government should provide all facilities to
including requiring men to take two months off
encourage the prospective couples to breed)
work to look after a newborn child if they wished to d) Employers’ old-fashioned attitude should give
qualify fully for state-funded child welfare support. way to the new realities at the work place
The scheme would offer parents 67 per cent of their
previous incomes while staying at home. It would 18. According to the German Chancellor the
person(s) to be blamed for the falling birth rate
be limited to a year, up to a monthly maximum of
of Germany are:
1,800 euros. Working parents would also be able to
a) only women
offset 3,000 euros a year of childcare costs against b) only men
tax, encouraging women to have more children. c) both men and women
The proposals are based on scheme in Scandinavia, d) the government and the breeding couple
where birth rates are higher than those of Germany.

3.10
Professor Academy
19. The men are disinterested in breeding because of immediately realized his folly and rewarded Birbal
a) non-cooperative attitude of their wives for his wisdom.
b) Their unsure role of fatherhood
Questions
c) discouraging attitude of the government
d) Non-availability of facility of rearing them up 21. Why had the king not eaten his food?
a) He was very busy that day
20. Birth rate of Germany can be increased if
b) He had seen the face of the unlucky fellow
a) compulsory paid leave is allowed to husbands
c) He was not feeling well
to look after their newly born babies.
d) None of these
b) extra facilities are given to prospective
mothers 22. Who was not well on that particular day?
c) the employer’s attitude is changed to suit the a) King Akbar
convenience of the educated women b) The King’s courtiers
d) adequate facilities to look after children, c) Birbal
compulsory paid leave to husband and d) Prince Salim
change in the old-fashioned attitude of
employers are taken care of. 23. Which of the following describes Birbal?
a) He was a famous merchant
2.5 Directions: (21-25) Read the passage and b) He had lost his senses
answer the questions that follow: c) He was very poor
During Emperor Akbar’s reign, there was a d) He possessed good logical thinking
poor man in Agra, who was through to bring bad 24. Which of the following is true in the context of
luck. People believed that if any one looked at his the passage?
face in the morning, they would have a bad day. a) The poor man wanted to see the king
“Get lost, you ugly fellow!” he would be cursed b) The poor man was well educated
by one and all. “Hide your face before you kill c) The courtiers were sympathetic with the poor
someone with your evil eye!” The emperor soon man
heard of this man’s reputation and wanted to see d) King Akbar realized his mistake
him. The poor fellow, who had not harmed a single

Reading Comprehension
25. What was Birbal’s initial reaction when he heard
person in his life, was brought to Akbar. Akbar that the poor man would be executed?
took a look at him and asked him to be brought a) He was angry because Akbar had not taken
back in the evening. That particular day was an his advice
especially full and tiring day for the emperor and b) He laughed slightly
his courtiers. So, many matters had to be attended c) He was silent and wanted to give a change to
to that Akbar even forgot to eat. By the end of the the poor man
day, the emperor was exhausted. To make matters d) None of these
worse, Akbar was informed that his favorite child,
little Prince Salim, had fallen ill. Then the emperor Answers 2.1- 2.5
suddenly remembered that he had seen the face of 1 2 3 4 5
the ‘unlucky’ man that morning. That was it. It was a b c d a
that man’s entire fault, Akbar decided. Akbar called
6 7 8 9 10
his courtiers and told them that he was going to
have ‘unlucky’ man executed. All of them agreed b c c b a
immediately. That is all except Birbal. Instead, Birbal 11 12 13 14 15
let out a short laugh. “What is the matter, Birbal?” b a a c b
asked the emperor “You seem to find something 16 17 18 19 20
funny!” “Nothing, your majesty, “replied Birbal c a c b a
“You say this man brings bad luck because you
21 22 23 24 25
had to go without food ever since you saw him this
morning. Look at his luck. Yours was the first face d d d d b
he saw today, and has to die because to it.” Akbar
3.11
Professor Academy
Level 3 help the institution function better. This is already
a widely-adopted practice in executive departments
3.1 Directions: (1–5)Read the passage and answer across the country. Courts have partially realised this
the questions that follow: need and created dedicated posts for court managers
(MBA graduates) to help improve court operations.
While there is general acceptance that the
But more often than not, court managers are not
Indian judicial system suffers from case delay and
utilized to their full potential, with their duties
the use of antiquated methods, the discourse on
restricted to organising court events and running
judicial reform remains focused on areas such
errands.
as appointments and vacancies. It is time that
organizational barriers and court processes that also Questions
contribute to case delay are studied. We focus on two
1. Which of the following is/are synonyms of
areas that greatly affect court efficiency: case listing
dearth?
practices and court infrastructure.
I. Prompt II. Tardy
The need to scientifically determine how III. Inefficient IV. Scarcity
many cases should be listed per day cannot be a) Only IV b) Only II and IV
stressed enough. It is not uncommon to see over c) Only I, II and IV d) Only II, III and IV
100 matters listed before a judge in a day. When a
2. Which of the following is/are antonyms of
judge is pressed for time, not only does the quality
antiquated?
of adjudication suffer but it also means that several
I. Outdated II. Primitive
cases will inevitably go unheard. Matters listed
III. Modern IV. Mossy
towards the end (usually cases near the final stage
of hearing) tend to be left over at disproportionate a) Only II b) Only I and III
rates and often end up getting stuck in the system. c) Only III d) Only I, III and IV
The second issue is infrastructure: from 3. Which of the following is/are true as per the
inadequate support staff for judges to the dearth passage?
of basic courtroom facilities. Without research and I. The existing court infrastructure is adequate
Reading Comprehension

secretarial support, judges are unable to perform for the current sanctioned strength at all-
their functions in a timely manner. For instance, in India levels.
a private interview, a judge said that even though he II. It is not uncommon to see over 100 matters
managed to hear close to 70 cases in a day, it took listed before a judge in a day.
two days for the stenographers to finish typing the III. The Indian Judiciary needs to be modernized.
orders. A 2016 report published by the Supreme a) Only III b) Only II and III
Court showed that existing infrastructure could c) Only I and II d) Only I and III
accommodate only 15,540 judicial officers against 4. As per paragraph 1, which among the following
the all-India sanctioned strength of 20,558. The lack are the focus areas of judicial reforms?
of infrastructure also raises serious concerns about I. Framework for filling vacancies
access to justice. A recent Vidhi study on district II. Case Listing procedure
courts in the National Capital Region found that III. Infrastructure of courts
even basic needs such as drinking water, usable
a) Only II b) Only I and II
washrooms, seating and canteen facilities are often
c) Only I d) Only II and III
not available in court complexes. Solutions for such
challenges will require a fundamental shift in how 5. What could be some possible consequences of
courts are administered. the issues mentioned in paragraph 2?
I. There is uncertainty a about when the cases
Courts must become more open to applying
would come up for hearing next and hampers
management principles to optimize case movement
the efficacy of lawyers in preparing for their
and judicial time. In this, external support agencies
cases in a better manner.
competent in strategic thinking should be allowed
to work with judicial officers to understand and
3.12
Professor Academy
II. There is a better chance of winning the case in investment in public sector for those infrastructure
case of frequent changes in the hearing dates. areas, which cannot attract private investment, and
III. Frequent re-listing impacts the efficiency of through efforts to improve private participation in
the court administrative staff. different ways of public private participation.
a) Only II b) Only I and II In the early stages of reforms, the
c) Only II and III d) Only I and III liberalization of trade policies and a shift to a market
3.2 Directions: (6–10)Read the passage and answer determined exchange rate had the effect of removing
the questions that follow: constrains on agriculture in terms of depressed
prices. The removal of protection on industry helped
It is difficult to imagine the extraordinary to produce a more level playing field, because the
number of controls on Indian industry before 1991. earlier system was extremely unfair to agriculture.
Entrepreneurs needed permission to invest and could The lesson to be learnt from the reforms process is
be penalized for exceeding production capacity. Even to persevere in reforming the strategic parts of the
with the given investment capacity they had, entering economy, which will lead to even higher growth
certain areas was prohibited as these were reserved rate. India has to do better than its current average
for the public sector. If they had to import anything, growth rate of 8% and ensure that benefits from this
they required licenses. To get these licenses was tough, higher growth go beyond industry and urban areas
they had to persuade a bureaucrat that the item was and extend to agriculture.
required but even so permission was unavailable
if somebody was already producing it in India. The Questions
impact of the reforms was not instantaneously and
6. Which of the following factors was responsible
permanently wonderful. In India’s case it began to
show after about a year and a half. After 1993 there for the fall in India’s growth rate in the late 1990s?
came three years of rapid industrial growth of about a) The implementation of economic reforms
8% or so. But, in the second half of the 90s, there had was too rapid
an impact on the Indian industry. But, in the last b) It was expected after achieving a high growth
few years there has been a tremendous upturn. With at 10%

Reading Comprehension
the rise of investment industrial growth has reached c) There was a slowdown in the global economy
double digits or close. d) There were sanctions against East Asian
A lot of evidence that positive results of the countries by WTO
reforms were seen. There were companies that didn’t 7. Which of the following can be said about the
look at all internally but instead performed remarkably reforms of 1991?
in the highly competitive global market. For instance, a) They benefited Indian industry immediately
the software sector’s performance was outstanding b) All Indian companies began to focus on
in an almost totally global market. Reliance built a
indigenous development instead of looking
world class refinery. Tata’s developed an indigenously
for opportunities abroad
designed car. The success of the software sector has
c) They were targeted only at the software sector
created much higher expectations from and much
higher confidence in what Indian industry can do. d) They encouraged Foreign Direct Investment
On the government’s side it’s a vindication that in India
liberalization of both domestic and external policies, 8. What was the impact of the flourishing Indian
including the increased inflow of Foreign Direct software sector?
Investment, has created an environment in which a) Other companies were unable to be
industry can do well, has done well and is preparing to competitive in the global market
do even better. What they need is not sops, but good
b) It fulled expectations of a good performance
quality infrastructure. For the 11th plan an industrial
from the Indian economy
growth rate of around 12% is projected. It will have
methods of developing infrastructure, which will c) Growth rate rose to 12%
close the deficit. This can be done through increased d) It created cut throat competition among
3.13
Professor Academy
software companies which would hinder the pass outside the palace. He glanced at the carriage
sector in the long run out of curiosity and spied the jester sitting inside.
9. What is the author’s opinion about the The carriage was stopped. The king asked the jester
government’s decision to liberalize the economy angrily, “why have you come back to the kingdom
in 1991? without my permission?’ “Your Majesty” the jester
a) It was beneficial because it created confidence replied politely, “I left for China the day you drove
in the Indian economy me out of your court. I returned only after I had
b) The timing was wrong since the economy covered the floor of my carriage with the soil of the
experienced a slowdown in growth rate neighboring country. I have thus not set my foot
c) It led to a focus on software and other sectors on your soil,” The king found the jester’s answer
were neglected pleasing. He smiled and asked him to come to
d) Foreign companies took advantage of the new court from the next morning.
policies and exploited certain sectors Questions
10. How did software companies deal with slow 11. Why did the king leave the court suddenly one
industrial growth in an open Indian economy? day?
a) They focused on strengthening their position a) He was bored as the word was routine
in the domestic market b) He realized that he had forgotten to meet the
b) They campaigned for infrastructure queen that day
development c) He was upset that day
c) They diversified into different sectors d) None of these
d) They targeted global markets 12. Why did the king himself ask the jester to return
3.3 Directions (11–15) Read the passage and to his court?
answer the questions that follow: a) He missed the jester’s wit and humor
One day, the king came to the court and b) The jester did not need the request, the king
began attending to the routine matters people had sent through his messengers
had brought to him. He happened to be in a bad c) The courtier’s through the king was foolish for
Reading Comprehension

mood that day. Just then, a messenger arrived throwing out the jester
out of breath, with a message that the queen d) The king appreciated the jester’s cleverness in
wanted to see the king in her palace. The king rose interpreting his orders
immediately and all the courtiers respectfully got 13. Why did the jester remain seated, while the king
to their feet. The jester however remained seated was leaving?
unaware that the king was departing. He belatedly a) To show he was unhappy with king’s decision
got to his feet but while doing so, he was noticed by to leave early
the king, who perceived this behavior as an insult. b) To get the king’s attention
He ordered the jester to leave his kingdom with c) To show the king that leaving early was
immediate effect and not set foot on its soil under insulting to those, who had come to the
penalty of death. The courtiers were upset and court
protested. The jester was amusing and well liked. d) He did not realize that the king was leaving
But the jester obeyed the king’s commands and left 14. Which of the following is true in the context of
the palace promptly. Several months passed after the passage?
the king had ordered the jester to leave his court. a) The king was stubborn and never listened to
The king’s anger had subsided. He decided to his courtier’s advice
invite the jester to return to his court. Messengers b) The jester was quick witted
were sent to neighboring kingdoms to search for c) The king’s messengers did not try very hard to
the jester and bring him before the king. However find the jester
the very next day, when the king was standing in d) The jester did not return to the court till the
one of the palace balconies, he saw a horse carriage king had asked forgiveness
3.14
Professor Academy
15. Choose the word which is most similar in 1987- 1991, the number of children in foster care
meaning to the word printed in bold as used in increased by over 50%. Babies under the age of one
the passage. Spied are the fastest growing category of children entering
a) Watched b) Followed foster care. This crisis affects children under the age
c) Stared d) Noticed of three most severely, the report says. Yet, it is this
3.4 Directions (16–20) Read the passage and period – from infancy through preschool years –
answer the questions that follow: that sets the stage for a child’s future.

Though the US prides itself on being a Questions


leader in the World community, a recent report 16. The main focus of the passage is on the plight of
shows that it lags far behind other industrialized a) Orphaned children
countries in meeting the needs of its youngest b) Teenage mothers
and most vulnerable citizens. The US has a higher c) Low birth weight babies
infant mortality rate, a higher proportion of low d) All of these
birth weight babies, a smaller proportion of babies 17. Which of the following does not constitute ‘quiet
immunized against childhood diseases and a much crisis’ in the US as per the task force report?
higher rate of adolescent pregnancies. These findings, a) Lower proportion of new born babies with
described as a “quiet crisis” requiring immediate and normal weight
far reaching action, appeared in a report prepared b) Higher incidence of adolescent girls becoming
by a task force of educators, doctors, politicians and mothers
business people. According to the report, a fourth c) Lower rate of babies surviving childhood
of the nation’s 12 million infants and toddlers live in diseases
poverty. As many as half confront risk factors that d) Increasing cases of teenage couples getting
could harm their ability to develop intellectually, divorced
physically and socially. Child immunizations are too
low, more children are born into poverty, and more 18. Which of the following statements is not true in
are in substandard care, while their parents work the context of the passage?
a) The number of single parent families today is

Reading Comprehension
and more are being raised by single parents. When
taken together, these and other risk factors can lead approximately three times that four decades ago
to educational and health problems that are much b) The number of children in the US entering foster
harder and more costly to reverse. care has decreased after 1991
c) In the US, the number of infants living in poverty
The crisis begins in the womb with unplanned is about 3 million
parenthood. Women with unplanned pregnancies d) Only 20% of all the pregnancies in the US are
are less likely to seek pre natal care. In the US 80% of planned
teenage pregnancies and 56% of all pregnancies are
unplanned. The problems continue after birth, where 19. The number of children born to married mothers
unplanned pregnancies and unstable partnerships in the US is approximately, how many times the
often go hand in hand. Since 1950, the number of number of children born to unwed mothers?
single parent families has nearly tripled. More than a) 1.5 times b) 2 times
25% of all births today are to unmarried mothers. c) 3 times d) 3.5 times
As the number of single parent families grows and 20. The task force report seems to be based on the
more women enter the work force, infants and data pertaining to the period
toddlers are increasingly in the care of people other a) 1987-91
than their parents. b)1950 onwards till data
Most disturbingly, recent statistics show c) 1987 onwards till data
that American parents are increasingly neglecting d) 1950-91
or abusing their children. In only four years from

3.15
Professor Academy
3.5 Directions: (21–25) Read the passage and c) humorous d) strange
answer the questions that follow: 23. When she learned that she could not attend the
Marie Curie was one of the most accomplished university in Warsaw, she felt___.
scientists in history. Together with her husband, a) hopeless b) annoyed
Pierre, she discovered radium, an element widely c) depressed d) worried
used for treating cancer, and studied uranium and 24. Marie ___ by leaving Poland and traveling to
other radioactive substances. Pierre and Marie’s France to enter the Sorbonne.
amicable collaboration later helped to unlock the a) challenged authority
secrets of the atom. Marie was born in 1867 in Warsaw, b) showed intelligence
Poland, where her father was a professor of physics. c) behaved
At the early age, she displayed a brilliant mind and a d) was distressed
blithe personality. Her great exuberance for learning 25. _____she remembered their joy together.
prompted her to continue with her studies after high a) Dejectedly b) Worried
school. She became disgruntled, however, when she c) Tearfully d) Happily
learned that the university in Warsaw was closed to Answer 3.1 - 3.5
women. Determined to receive a higher education, she
defiantly left Poland and in 1891 entered the Sorbonne, 1 2 3 4 5
a French university, where she earned her master’s a c b c d
degree and doctorate in physics. Marie was fortunate 6 7 8 9 10
to have studied at the Sorbonne with some of the c d b a d
greatest scientists of her day, one of whom was Pierre
11 12 13 14 15
Curie. Marie and Pierre were married in 1895 and
spent many productive years working together in the d d d c d
physics laboratory. A short time after they discovered 16 17 18 19 20
radium, Pierre was killed by a horse-drawn wagon in d d b c d
1906. Marie was stunned by this horrible misfortune 21 22 23 24 25
and endured heartbreaking anguish. Despondently she a b b a a
Reading Comprehension

recalled their close relationship and the joy that they had
shared in scientific research. The fact that she had two Level 4
young daughters to raise by herself greatly increased
4.1 Directions (1–5) Read the passage and answer
her distress. Curie’s feeling of desolation finally began
the questions that follow:
to fade when she was asked to succeed her husband
as a physics professor at the Sorbonne. She was the Banking sector reforms in India were
first woman to be given a professorship at the world- introduced in order to improve efficiency in the
famous university. In 1911 she received the Nobel Prize process of financial intermediation. It was expected
in chemistry for isolating radium. Although Marie that banks would take advantage of the changing
Curie eventually suffered a fatal illness from her long operational environment and improve their
exposure to radium, she never became disillusioned performance. Towards this end, the Reserve Bank of
about her work. Regardless of the consequences, she India initiated a host of measures for the creation of
had dedicated herself to science and to revealing the a competitive environment. Deregulation of interest
mysteries of the physical world. rates on both deposit and lending sides imparted
freedom to banks to appropriate price their products
Questions
and services. To compete effectively with non-
21. The Curies’ ____ collaboration helped to unlock banking entities, banks were permitted to undertake
the secrets of the atom. newer activities like investment banking, securities
a) friendly b) competitive trading and insurance business. This was facilitated
c) courteous d) industrious through amendments in the relevant acts which
22. Marie had a bright mind and a __personality. permitted PSBs to raise equity from the market up
a) strong b) lighthearted to threshold limit and also enabling the entry of new
3.16
Professor Academy
private and foreign banks. This changing face of b) The rate of return is not commensurate with
banking led to an erosion of margins on traditional the operational cost
banking business, promoting banks to search for c) The rate of improvement has not been high
newer activities to augment their free incomes. At d) Nationalized banks and private sector banks
the same time, banks also needed to devote focused did differ in the efficiency measures
attention to operational efficiency in order to 5. Which of the following statements recognizing
contain their transaction costs. Simultaneously with improvement in efficiency is true in the context
the deregulation measures prudential norms were of the passage?
instituted to strengthen the safety and soundness a) There is no discernible difference in
of the banking system. Recent internal empirical efficiency parameters
research found that over the period 1992-2003, b) The foreign banks recorded higher efficiency
there has been a discernible improvement in the c) The efficiency of foreign banks is not
efficiency of Indian banks. The increasing trend in comparable with Indian banks
efficiency has been fairly uniform, irrespective of the d) The rate of such improvement in efficiency
ownership pattern. The rate of such improvement was very high
has, however, not been sufficiently high. The analysis 4.2 Directions: (6–10) Read the passage and
also reveals that PSBs and private sector banks in answer the questions that follow:
India did not differed significantly in terms of their
efficiency measures. Foreign banks, on the other Delays of several months in National Rural
hand, recorded higher efficiency as compared with Employment Guarantee Scheme wage payments and
their Indian counterparts. work sites where labourers have lost all hope of being
paid at all have become the norm in many states. How
Questions are workers who exist on the margins of subsistence
1. Prudential norms were initiated in the banking supposed to feed their families? Under the scheme,
sector with a view to workers must be paid within 15 days, failing which
a) Increase operational efficiency they are entitled to compensation under the Payment
b) Contain the non-performing assets of Wages Act – up to Rs.3000 per aggrieved worker. In

Reading Comprehension
c) Strengthen the soundness of banking system reality, compensation is received in only a few isolated
d) Improve the customer service instances. It is often argued by officials that the main
2. Banking sector reforms in India were introduced reason for the delay is the inability of banks and post
for the purpose of offices to handle mass payments of NREGS wages.
a) Giving more and more employment Though there is a grain of truth in this, as a diagnosis
opportunities to the educated unemployed it is misleading. The ‘jam’ in the banking system has
b) Taking care of the downtrodden masses been the result of the hasty switch to bank payments
c) Increasing efficiency in the banking activities imposed by the Central Government against the
d) Giving better return to the Central recommendation of the Central Employment
Government Guarantee Council which advocated a gradual
transition starting with villages relatively close to the
3. Banks can control their transaction costs by nearest bank. However, delays are not confined solely
a) Restricting their lending activities to the banking system. Operational hurdles include
b) Undertaking more and more non-banking implementing agencies taking more than fifteen days
activities to issue payment orders, viewing of work measurement
c) Encouraging the customers to bank with as a cumbersome process resulting in procrastination
other banks by the engineering staff and non-maintenance of
d) Devoting more attention to operational muster rolls and job card etc. But behind these delays
efficiency lies a deeper and deliberate ‘backlash’ against the
4. The recent internal empirical research conducted NREGS. With bank payments making it much harder
by the RBI found that to embezzle NREGS funds, the programme is seen as
a) There is cut-throat competition in banking a headache by many government functionaries the
industry
3.17
“Today a Reader, Tomorrow a Leader”
Professor Academy
workload has remained without the “inducements”. a) Theft of funds by administration officials
Slowing down wage payments is a convenient way of responsible for the scheme has reduced
sabotaging the scheme because workers will desert b) Increased work load for local government
NREGS worksites. officials
The common sense solution advocated by the c) Protests by workers who have to travel long
government is to adopt the business correspondent distances to the nearest bank to claim their
model. Where in bank agents will go to villages wages
to make cash payments and duly record them on d) Time consuming formalities have to be
handheld, electronic devices. This solution is based completed by workers
on the wrong diagnosis that distance separating 9. To which of the following has the author
villages from banks is the main issue. In order to attributed the delay in wage payments?
accelerate payments, clear timelines for every step of a) Embezzlement of funds by corrupt bank staff
the payment process should be incorporated into the b) Lack of monitoring by the Central Employment
system as Programme Officers often have no data on Guarantee Council
delays and cannot exert due pressure to remedy the c) An attempt to derail the NREGS by vested
situation. Workers are both clueless and powerless interests
with no provision for them to air their grievances d) Overworked bank staff deliberately delay
and seek redress. In drought affected areas the system payments to protest against extra work
of piece rate work can be dispensed with where work 10. Which of the following can be considered a
measurement is not completed within a week and deficiency in the NREGS?
wages may be paid on the basis of attendance. Buffer a) Lack of co-ordination among Programme
funds can be provided to gram panchayats and post Officers
offices to avoid bottlenecks in the flow of funds. b) Local officials are unaware of correct
Partial advances could also be considered provided operational procedures
wage payment are meticulously tracked. But failure c) Workers have no means of obtaining redressed
to recognize problems and unwillingness to remedy for untimely wage payments
them will remain major threats to the NREGS.
Reading Comprehension

d) Disbursing wages through banks instead of


Questions readily accessible post offices
6. What impact have late wage payments had on 4.3 Directions (11-15) Read the passage and
NREGS workers? answer the questions that follow:
a) They cannot obtain employment till their The WannaCry ransomware attack raised
dues are cleared perplexing questions, such as who was behind it, how
b) They have benefited from the compensation did it get unleashed, and why the code was configured
awarded to them the way it was. The malware exploited vulnerabilities
c) They have been unable to provide for their in Windows 7 that the US National Security Agency
families (NSA. apparently knew about for a few years.At some
d) None of these point, these vulnerabilities were either leaked or
7. Which of the following factors has not been electronically stolen, and in March, an entity known as
responsible for untimely payment of NREGS ShadowBrokers made them public. Microsoft very soon
wages? released an update that removed the vulnerabilities.
a) Communication delays between agencies Windows systems have the capability to automatically
implementing the scheme install updates, but in many corporate setups, the auto-
b) Improper record keeping update is disabled to give IT departments more control
c) Behind schedule release of payments by banks over company machines. This left many machines
d) Drought conditions prevalent in the country vulnerable to the attack.
8. What has the outcome of disbursing NREGS This is where the discussion moves out of the
wages through banks been? realm of the purely technical and becomes a matter
3.18
Professor Academy
of public debate. Despite the best efforts of software to a remote server before locking the computer,
companies, their products will have flaws, including thereby stealing sensitive health or financial details,
security weaknesses. Rigorous testing would prevent embarrassing photos or vital state secrets.
many exploits, but it takes too many resources to The targets may react to the ransom part of
consider every possibility. So, independent security the attack and fail to see the data theft. This may have
researchers, commercial security companies and already happened. In response to an RTI, the RBI said
intelligence agencies such as the NSA specialize in that at least one bank was attacked by ransomware last
trying to find weaknesses that were missed. Some year. If data-stealing malware targets computers in a
researchers privately notify software makers when corporate or government network, the real damage
they find vulnerability, but there are also companies is not to the owners of the computers but the people
that sell them; selling can be lucrative. It is believed whose data is exposed. In the case of government
that the FBI paid $9,00,000 to a private company secrets, the entire country may be worse off.
to access a locked iPhone. Intelligence agencies
and even police departments have been collecting Since the attack, the government has
vulnerabilities known as “zero-days”. Clearly, the downplayed the effects on Indian systems. No private
motivation is to protect national interest and public companies have disclosed that they were affected.
safety, yet it is worth asking what the trade-off is. However, there are many cyber attacks on a global
scale and it stretches credulity to believe that Indian
Security expert Bruce Schneier has criticized systems are somehow spared. The government wants
governments for hoarding zero-days. He argues to promote Digital India and internet companies want
that it is better for the common good to disclose the Indians to use their services and spend money online.
vulnerabilities before someone else uses them for For that, they need to build and keep the public’s trust.
ill. The WannaCry incident seems to bear this out.
Policymakers need to dig into the claims that zero- One way to do that is by being forthright
days are effective at preventing terrorism and crime. and owning up to mistakes or breaches. It
would demonstrate a level of responsibility and
Disclosing vulnerabilities doesn’t help much sophistication that people can respect.
if the software creators don’t take timely action.
Questions

Reading Comprehension
In general, large corporations such as Microsoft,
Google or Apple have reacted quickly. They can 11. Consider the following statements regarding the
do more to publicise vulnerabilities and fixes and Ransomware:
highlight the risk to customers if they do not update. 1. It is a Malware.
Finally, a failure to update systems poses a 2. It has exploited vulnerabilities in Windows 10.
real issue. Those individuals and organisations that Which of the following statements given above
did not apply Microsoft’s update were taking a risk; is/are correct?
whether the reasons were cost, lack of attention or a) 2 only b) Both are correct
negligence, their actions had an impact on others. c) None is correct d) 1 only
The reasons for making computer software up to
date are the same as vaccinating a population against 12. How can Software companies prevent
diseases. Policymakers may want computer owners weaknesses in their softwares?
to take the same approach. a) By rigorous testing.
b) By updating their softwares.
One curious aspect of WannaCry is that once c) By consulting Security agencies.
it enters a computer, it tries to connect to a domain on d) None of the above
the internet, and if it succeeds, it stops its activity. An
alert cybersecurity researcher created that domain 13. Which of the following statements given below
and helped slow WannaCry’s spread. Researchers is/are correct regarding the Microsoft Windows
are puzzled why this “killswitch” was left in the code. system?
What’s worrisome is that perhaps a future variant 1. Windows systems have the capability to
of ransomware will try to send contents of the disk automatically install updates

3.19
Professor Academy
2. Microsoft very soon released an update that including post-harvest losses”. Food loss is valued
removed the vulnerabilities(caused because at $1 trillion globally by the Food and Agriculture
of Ransomware) Organisation, enough to feed the 800 million who
Select the correct option using the codes given sleep hungry every night. Of this, over 200 million are
below. in India, a country that grows sufficient food to feed
a) 1 only b) 2 only its burgeoning population of 1.3 billion.
c) Both are correct d) None is correct The SDGs have clearly put the spotlight on
14. What are ‘Zero Days’? food loss and waste, and we are beginning to see more
a) The specific days of the year when Ransomware attentive discussion on the subject. At the recently
attacks computers. held Food Congress in Dusseldorf in early May
b) Software’s Vulnerabilities. 2017, the focus was on identifying possible solutions
c) The specific days of the years when Security for both — through better farming practices, use of
agencies around the world do rigorous technology, better information, change in consumer
testings on Softwares. behaviour, etc. Estimates of “food waste and food
d) None of the above loss” range between 30 and 50% for both developed
15. According to RBI, which Indian Bank has con- and emerging countries.
firmed an attack by Ransomware last year? In developed countries “food waste” happens
a) Punjab National Bank more at the consumer household level, where more
b) State Bank of India is purchased than consumed; and in emerging
c) Bank of Baroda economies, it is the supply chain that leads to “food
d) Not mentioned in the Passage loss” during harvest, storage or in transit, largely
4.4 Directions (16-20) Read the passage and due to poor infrastructure and inadequately aligned
answer the questions that follow: processes. As an example, India’s cold storage
One of the unfortunate paradoxes of our lives requirement is 66 million tonnes, and the national
today is that despite adequate food production and storage capacity currently available is approximately
unimaginable advances in technology, one in three 30 million tonnes. Investment in creating adequate
Reading Comprehension

persons worldwide is not getting enough of the right cold storage capacity alone will stem food loss
food to eat and approximately 800 million of seven substantially. With increasing wealth, India is,
billion sleep hungry every night. ironically, home to both food waste and food loss.

Not surprisingly, this makes poor diet the No. In either scenario, food that is produced
1 risk factor by far, for the global burden of disease. (using depleting and critical resources such as water)
Poor diets globally are more responsible for ill health but not consumed is a colossal waste which we
as compared with the combined effect of drugs, cannot afford to ignore. Food loss is also nutrition
tobacco and alcohol. Women and children continue loss, productivity loss and therefore GDP loss. The
to be the most vulnerable, with 156 million stunted 40% food loss in India translates to approximately
children in the world and 40% women anaemic. $7.5 billion, and for a country where agriculture
Add to this the fact that the world adds 200,000 new contributes 15% to GDP and employs 53% of the
people to its population every day, of which India workforce, this is clearly unaffordable.
adds 58,000. This translates to the need to feed two These are serious statistics, and unless there
billion more people by 2050 and to support a higher is an effort to address food loss factors systemically,
demand for major crops, estimated to increase by the state of health and nutrition of our people will
50%, from 2.5 to 3.5 billion tonnes. continue to be inadequate, as food loss means loss of
Staying on target It is therefore with macronutrients such as calories, fats, proteins; but
compelling reason that Target 3 for the Sustainable even more alarming, it means loss of micronutrients
Development Goal (SDG) 12 is to “halve per capita because foods that are rich in micronutrients are
global food waste at the retail and consumer level, and also perishable — fruits, vegetables, poultry, fish,
reduce food losses along production and supply chains dairy, etc. Additionally, with urbanisation and rising
incomes, the length of the food value chain also
3.20
Professor Academy
increases, as what people eat becomes less and less Dignified quality of life - To provide
connected to where they live. even a baseline and dignified quality of life to its
The Global Nutrition Report 2016 has people, India has to address enhancing agricultural
highlighted India’s overall tardy progress in productivity, crop diversification and eliminating
addressing chronic undernutrition, manifest in food loss and waste with a firm resolve, backed with
stunting (low weight for age), wasting (low weight the right and timely action. The last must be done
for height) and micronutrient deficiency or “hidden on priority as it deals with food already available. So
hunger”. the key question is, how do we minimise food loss
given that the government wants this, businesses
With 17% of the world’s population, want this, and people want this?
India remains home to a quarter of the world’s
undernourished people, a third of the world’s There is clearly a structural and behavioural
underweight children and a quarter of the world’s component to this, and the door is open for
hungry. This demographic cannot possibly result in investment in food system infrastructure: storage,
a productive and efficient workforce, or be converted transportation, processing, etc; investment in
into any meaningful economic dividend. The World information systems that help identify loss by crop
Happiness Report 2017, which looks at quality of and region so solutions can be specifically tailored
people’s life beyond GDP and per capita income to the problem; use of technology to better connect
and includes economic variables, social factors and supply and demand; public-private partnerships
health indicators, has ranked India at 122 of 155 with companies to reduce spoilage and loss; creation
countries. India’s decline in 2014-16, compared with of food banking networks that work with civil
2005-07, is on account of poor and slow progress on society and development agencies on getting food
social factors and health indicators. already available to those that need it. Among the
several priorities we have, minimising food loss has
Agriculture has to be one of the drivers of the potential to be transformative in multiple ways.
India’s growth, and even though we are the world’s
third largest producer of food, our agriculture Questions
growth has fallen well below the targeted 4% over 16. Target 3 for the Sustainable Development Goal

Reading Comprehension
the last 15 years. According to the International (SDG) 12 is about
Food Policy Research Institute, India needs to at a) Food wastage b) Education
least double its investment in agricultural research c) Poverty d) Terrorism
to double farmers’ incomes by 2022. This will not 17. Consider the following statements regarding
happen only with a focus on rice and wheat — more the recently held Food Congress:
diversity is needed, with the addition of vegetables, 1. It was held in Mumbai
fruits and dairy farming. 2. It is an Indian Initiative to the world)
Harnessing technology to increase Which of the statements given above is/are
agricultural productivity, where we lag both our correct?
potential and competitive benchmarks will be critical a) Both are correct b) 2 only
to our overall well-being. As an example, since the c) Neither 1 nor 2 d) 1 only
1960s India’s groundwater irrigation has increased 18. According to the passage, what is the reason
dramatically, and since the 1980s groundwater behind the ‘food loss’ problem in emerging
levels have been dropping, thus stressing the system. economies?
Groundwater recharge therefore becomes a critical a) Supply chain problems
variable to augment agricultural productivity. b) Storage problems
Further, imports of agricultural commodities have c) Poor infrastructure
increased from 4% of GDP in 2008-09 to 5.5% of d) All of the above
GDP in 2013-14, according to the Economic Survey.
Edible oil imports alone in the last year cost us Rs. 19. Which of the following statements given below
65,000 crore ($10 billion). This need not be the case is/are correct in context of food loss and agri-
in future. culture sector in India?
3.21
Professor Academy
1. The 40% food loss in India translates to through creativity and collaboration. Students
approximately $7.5 billion should be provided with opportunities to think
2. Agriculture contribution in India’s GDP is from themselves and articulate their thoughts.
15% Dewey called for education to be grounded in real
Select the correct answer using the code given below. experience. He wrote, “If you have doubts about
a) 1 only b) Both are correct how learning happens, engage in sustained inquiry:
c) 2 only d) Neither 1 nor 2 study, ponder, consider alternative possibilities and
arrive at your belief grounded in evidence.”
20. What is ‘Hidden Hunger’?
a) Micronutrient deficiency Piaget rejected the idea that learning was the
b) Chronic Undernutrition passive assimilation of given knowledge. Instead, he
c) Stunting proposed that learning is a dynamic process comprising
d) Wasting successive stages of adaption to reality during which
learners actively construct knowledge by creating and
4.5 Directions (21-25) Read the passage and testing their own theories of the world.
answer the questions that follow:
Influenced by Vygotsky, Bruner emphasizes
The default epistemology in education is the role of the teacher, language and instruction.
an empirical/reductionist approach to teaching He thought that different processes were used by
and learning. The shared epistemological basis learners in problem solving, that these vary from
for these two perspectives, on the other hand, is person to person and that social interaction lay at
interpretativism, where knowledge is believed to the root of good learning.
be acquired through involvement with content
instead of imitation or repetition there is no Bruner builds on the Socratic tradition of
absolute knowledge, just our interpretation of it. learning through dialogue, encouraging the learner
The acquisition of knowledge therefore requires to come to enlighten themselves through reflection.
the individual to consider the information and - Careful curriculum design is essential so that one
based on their past experiences, personal views, and area builds upon the other. Learning must therefore
cultural background - construct an interpretation of be a process of discovery where learners build their
Reading Comprehension

the information that is being presented to them. own knowledge, with the active dialogue of teachers,
building on their existing knowledge.
Students ‘construct’ their own meaning by
building on their previous knowledge and experience. By the 1980s the research of Dewey and
New ideas and experiences are matched against Vygotsky had blended with Piaget’s work in
existing knowledge, and the learner constructs new developmental psychology into the broad approach
or adapted rules to make sense of the world. In such of constructivism. The basic tenet of constructivism
an environment the teacher cannot be in charge is that students learn by doing rather than observing.
of the students’ learning, since everyone’s view of Students bring prior knowledge into a learning
reality will be so different and students will come to situation in which they must critique and re-evaluate
learning already possessing their own constructs of their understanding of it.
the world. Questions
Teaching styles based on this approach 21. When the knowledge is believed to be acquired
therefore mark a conscious effort to move from these through involvement is
‘traditional, objectivist models didactic, memory- a) Emprical b) Deduction
oriented transmission models’ to a more student- c) Interpretativism d) Epistemology
centered approach. 22. John Dewey emphasis on _________ ap-
John Dewey rejected the notion that schools proach on education
should focus on repetitive, rote memorization & a) Pragmatism b) rote – learning
proposed a method of “directed living” – students c) Focused Learning d) None
would engage in real-world, practical workshops 23. John Piaget proposed theory of cognitive devel-
in which they would demonstrate their knowledge
3.22
Professor Academy
opment, which comprises, stages of Adaption to difficulty in penalizing all those who converted
a) construct b) Reality unaccounted money into legal tender, demonetization
c) Theory d) Knowledge worked as an unintended amnesty scheme. Despite
24. The teaching style based on epistemological the significant cost to the economy, demonetization,
Approach, move from memory – oriented to the disappointment of the Prime Minister’s critics,
transmission models to ________ had no political fallout. Narendra Modi succeeded
a) Teacher – centered approach in portraying the move as one that would knock out
b) Student – centered approach the corrupt rich a harsh but necessary shock therapy.
c) Objectivist model approach This was perhaps why the massive disruption caused
d) Traditional approach by the overnight removal of 86% of the currency in
value terms did not cause agitations.
25. The Basic Tenet of constructivism is
a) Students learn by doing rather than observing Nevertheless, the RBI report, which points
b) Students bring prior knowledge into learning to a spurt in counterfeiting of the new Rs.500 and
situation Rs.2, 000 notes, raises the old question all over again.
c) Both (a) and (b) Was it worth the slowdown in growth, the damage
d) None to informal sector supply chains, and job losses in
sectors such as construction that were the bulwark of
Answer 4.1- 4.5 employment creation for the unskilled? True, there
1 2 3 4 5 have been some benefits. For instance, the number
c c d c b of income tax returns filed has surged a little over
6 7 8 9 10 the trend growth rate. But surely this could have
d d b c c been achieved by other policy measures. Cashless
11 12 13 14 15 modes of payment have become more common, but
d b c b d financial savings in the form of currency have also
risen, suggesting that people still value cash. Not
16 17 18 19 20
all policy choices work out and accepting mistakes
a c d b a
or planning flaws helps strengthen governance

Reading Comprehension
21 22 23 24 25
processes. For example, learning from the UPA’s
c a b b c
mistakes, a cleaner auction process for natural
Level 5 resources has been worked out. The government
must not disown its biggest reform attempt or try
5.1 Directions: (1 – 5) Read the passage and answer to sidestep parliamentary scrutiny of the outcomes
the questions that follow: of demonetization. Instead, it could focus on fixing
The Reserve Bank of India’s annual report the problems that people still face transactions with
for 2017-18 reveals that 99.3% of currency notes that Rs.2,000 notes in the absence of Rs.1,000 notes
were demonetized at midnight on November 8, 2016 are difficult as it is a departure from the currency
have returned to the banking system. This is only denomination principle (every note should be twice
marginally higher than its provisional estimate last or two and a half times its preceding denomination).
year that over 99% or Rs.15.28 lakh crore worth of the Even as these issues are sorted out, the larger lesson
old Rs.500 and Rs.1,000 notes out of the Rs.15.44 lakh must be heeded: sudden shocks to the economy
crore that were in circulation at the time had been don’t always yield intended policy objectives.
deposited by June 30, 2017. This makes a couple of Questions
things crystal clear. First, the hope that a large chunk
of unaccounted money would not return to the system 1. Which among the following sums up the opinion
arguably, the principal reason for the exercise was of the author regarding the demonetization drive
almost wholly belied. As a result, the plan to transfer announced by the government?
the arising surplus from the RBI to the Centre, which a) The author is very much hopeful that the
was not formally declared but strongly rumored, demonetization drive will be able to divide
was a non-starter. Second given the sheer logistical the wealth among all the sections equally.
3.23
Professor Academy
b) The author has no opinion to give regarding II. The cashless mode of transactions has become
demonetization since he was not staying in more popular post demonetization since now
India at that point of time. people are resorting to cashless modes of
c) The author is a blue eyed boy of the Prime transactions
Minister and that is why he will always praise III. The RBI has become more proactive these
all the moves by the government. days in order to prevent money laundering
d) The author feels that the move to demonetize activities in the country
currencies did not yield the desired results a) Both II and III b) Both I and II
though some positive sides can be appreciated) c) Both I and III d) Only III
2. Which among the following should be the 5. Which among the following is / are correct
course of action of the government now that the regarding the RBI Annual Report for the year
demonetization has failed? 2017-18 as described in the passage?
a) The government should understand that there a) More than 99% of the currency has come back
can be error in judgment on its part and it can into the system after demonetization and it is
be corrected by first accepting it. in line with the provisional estimate regarding
b) The government should cancel the whole this last year.
demonetization drive and give back the b) The instances of fake currencies with respect
currency notes to the general public) to the new Rs.500 and Rs.2000 notes are
c) The central government should approach the surfacing now.
Supreme Court to ensure that there is no legal c) The government has not become able to
issue in the future. contain the excitement of the law and order
d) The Government of India is of the opinion implementing agencies regarding arresting
that it has done the right thing but the public the offenders.
could not understand the importance of it. d) Both A and B
3. Which among the following can be considered 5.2 Directions: (6–10) Read the passage and
as the takeaway from the incident described in answer the questions that follow:
Reading Comprehension

the given passage? The great fear in Asia a short while ago was
a) The economy of the country is not suffering at that the region would suffer through the wealth
all and therefore anything can be done now to destruction already taking place in the U.S. as a result
test the waters. of the financial crisis. Stock markets tumbled as
b) The economy of India is ready to accept any exports plunged and economic growth deteriorated.
change since it is now mature enough to Lofty property prices in China and elsewhere looked
withstand any kind of problem. set to bust as credit tightened and buyers evaporated.
c) The Indian government is not receptive of But with surprising speed, fear in Asia swung back
any international shocks since there is no to greed as the reign shows signs of recovery and
mechanism in India to accept the foreign property and stock prices are soaring in many parts
risks. of Asia.
d) The economy has its own rhythm and it
should not be taken for granted that any kind Why should this sharp Asian turn around
of sudden policy decision will be positive for be greeted with skepticism? Higher asset prices
the economy. mean households feel wealthier and better able to
spend, which could further fuel the region’s nascent
4. Whichc among the following is correct rebound. But just as easily, Asia could soon find
regarding the positive effects of demonetization itself saddled with overheated markets similar to
as discussed in the passage? the U.S. housing market. In short, the world has not
I. The number of income tax returns filed post changed, it has just moved placed.
demonetization has increased since now a
lot of people are going to filing of income tax The incipient bubble is being created by
returns government policy. In response to the global credit
3.24
Professor Academy
crunch of 2008, Policy makers in Asia slashed interest 7. Which of the following can be said about the
rates and flooded financial sectors with cash in frantic Chinese government’s efforts to revive the
attempts to keep loans flowing and economies growing. economy?
These steps were logical for central bankers striving a) These were largely unsuccessful as only the
to reverse a deepening economic crisis but there is housing market improved
evidence that there is too much easy money around. b) The government’s only concern was to boost
It’s winding up in stocks and real estate, pushing prices investor confidence in stocks
up too far and too fast for the unending economic c) These efforts were ineffectual as the economy
fundamentals. Much of the concern is focused on China recovered owing to the US market stabilizing
where government stimulus efforts have been large d) These were appropriate and accomplished the
and effective, Money in China has been especially easy goal of economic revival
to find. Aggregate new bank lending surged 201% in 8. What do the statistics about loans given by
first half of 2009 from the same period a year earlier, to Chinese banks in 2009 indicate?
nearly 51.1 turn on, Exuberance over a quick recovery a) There was hardly any demand for loans in 2008
which was given a boost by China’s surprisingly strong b) The Chinese government has borrowed funds
7.9% GDP growth in the second quarter has buoyed from the US
investor sentiment not just for stocks but also for real c) China will take longer than the US to recover
estate. from the economic crisis
Former U.S. Federal Reserve Chairman d) None of these
Alan Greenspan argued that bubbles could only be 9. What is the author’s main objective in writing
recognized in hand sight. But investors who have the passage?
been well schooled in the dangers of bubbles over a) Illustrating that Asian economies are
the past decade are increasingly wary that prices have financially more sound than those of
risen too far and that the slightest bit of negative, developed countries
economic news could knock markets for a loop. b) Disputing financial theories about how
These fears are compounded by the possibility that recessions can be predicted and avoided
Asia’s central bankers will begin taking stops to shut

Reading Comprehension
c) Warning Asian countries about the dangers of
off the money. Rumors that Beijing was on the verge favoring fast growth and profits over sound
of tightening credit led to Shanghai stocks plunging economic-principles
5%. Yet many economists believe that, there is close d) Extoling China’s incredible growth and urging
to a zero possibility that the Chinese government will other countries to emulate it
do anything this year that constitutes tightening. And
without a major shift in thinking, the easy-money 10. Why does the author doubt the current
conditions will stay in place. In a global economy that resurgence of Asian economics?
has produced more dramatic ups and downs than a) Their economies are too heavily reliant on the
anyone thought possible over the past two years. Asia American economy which is yet to recover
may be heading for another disheartening plunge. b) Central banks have slashed interest rates too
abruptly which is likely to cause stock markets
Questions to crash
6. What does the author want to convey through c) With their prevailing economic conditions
the phrase “The world has not changed it has just they are at risk for a financial crisis
moved places”? d) Their GDP has not grown significantly during
a) At present countries are more dependent on the last financial year
Asian economies than on the US economy 5.3 Directions: (11–15)Read the passage and
b) Economies have become interlinked on answer the questions that follow:
account of globalization
c) Asian governments are implementing the same The wakeup call that China represents to
economic reforms as developed countries India is not limited to its showpiece urban centre
d) None of these or that New Delhi hopes India will experience the
3.25
Professor Academy
benefits that the Olympic Games have brought to over the past few years data reveals that despite
Beijing. More pertinent is the comparison of the India having the largest number of agricultural
agricultural sectors of the two countries. Why scientists in the World India’s current research
and how has China managed to outstrip India in track record is abysmal, equivalent to what China
agriculture when 25 years ago the two countries achieved in the 1908s. Far from developing new
were on par on most parameters? Both have strains, the number of field crop varieties fell by
traditionally been agrarian economies and over 50% between 1997 and 2001 despite the fact that
half their populations continue to depend on the there was sharp and sustained increase in funding.
land for their livelihood. With large populations One reason is that majority of the budget is eaten
and histories of famine, India and China share up by staff salaries with only 3% being allotted for
concern on issues such as food security, however, research. In contrast, most agricultural research
while India’s agricultural sector is projected to grow centre in China must use Central Government
by about 2.5% this year – a slide from the previous funding purely for research. Funds relating to
year’s growth. China’s has been steadily growing salaries and other administrative incidentals must
at between 4% and 5% over the last fifteen years. be generated by the centre themselves. Scientists
The widest divergence between India and China are thus, encouraged to engage in joint ventures
is in the profitable horticultural sector with the with private sector companies to form commercial
production of fruits and vegetables in China leaping signoffs from their research. In fact research
from 60 million tones in 1980 compared to India’s staff is now being hired on a contract basis with
55 million tones at the same time, to 450 million pay based on performance and salaries raised
tones in 2003 ahead of India’s corresponding 135 proportionately for those who perform well. India
million tones. China’s added advantage lies in the needs to learn from China’s example and adopt a
more diversified composition of its agricultural pragmatic approach if it has to meet its targets of
sector with animal husbandry and fisheries which the eleventh five year plan.
account for close to 45% of growth compared to Questions
30% for India.
11. What has been the major area of difference in
According to the latest report by Economic
Reading Comprehension

the development of the agricultural sectors of


Advisory Council the traditional excuses for India and China?
India’s substandard is placed favorably when a) Quantity of arable land in China is far greater
compared to China in terms of quantity of arable than in India
land, average farm size, farm mechanization etc. b) Food security is not a concern for China as
The reasons for China having outperformed the country is basically self sufficient
India are threefold : technological improvements c) China has experienced substantial growth in
accruing from research and development production in allied agricultural activities like
(China has over 1000 R&D centre devoted to horticulture
agriculture), Investment in rural infrastructure d) India’s agricultural sector is too diversified so
and an increasingly liberalized agricultural policy it is difficult to channel funds for development
moving away from self-sufficiency to leveraging
the competitive advantage with a focus on 12. How are Chinese agricultural research facilities
“efficiency as much as equity”. Investment in rural governed?
infrastructure, roads, storage facilities, marketing a) Salaries of staff are linked to performance
facilities are also crucial but government support which hampers productive research
in India has been mainly been through subsidies, b) Their funding comes from the government
not investment. There has been much debate alone to prevent private companies from
about subsidies and their utility, the opposing view manipulating the direction of their research
being that subsidies are against the market reforms c) A fixed proportion of government grants
and distort the market as well as reduce resource is allotted to be utilized for administrative
efficiency. In contrast to the 2046 applications for incidentals which cannot be exceeded
the registration of new plant varieties in China d) None of these
3.26
Professor Academy
13. Which of the following is an advantage that India Pradesh (6.5%). India is the tenth-largest economy
holds over China with respect to the agricultural in the world and the third largest by purchasing
sector? power parity adjusted exchange rates (PPP). On
a) Lack of diversification of the agricultural per capita basis, it ranks 140th in the world or
sector 129th by PPP. The economic growth has been
b) Superior technology and farming practices driven by the expansion of services that have been
c) Greater prevalence of farm mechanization growing consistently faster than other sectors. It
d) Provision of fertilizer and power subsidies is argued that the pattern of Indian development
14. Why was there a drop in development of new has been a specific one and that the country may
crop varieties for five years from 1997? be able to skip the intermediate industrialization
a) Government funding for research fell during — led phase in the transformation of its economic
that period structure. Serious concerns have been raised
b) Funds were diverted during this period to about the jobless nature of the economic growth
agricultural mechanization favorable macroeconomic performance has been
c) The private sector was not allowed to fund a necessary but no sufficient stipulation for the
research significant reduction of poverty amongst the
d) None of these Indian population. The rate of poverty decline
has not been higher in the post-reform period
15. Which of the following is not true in the context (since 1991). The improvements in some other
of the passage? non-economic dimensions of social development
a) Agricultural status of China and India was have been even less favorable. The most palpable
equivalent a quarter of a century ago example is an exceptionally high and importunate
b) India’s current economic growth rate is half level of child malnutrition (46% in 2005-06). The
that of China progress of economic reforms in India is followed
c) China is traditionally an agrarian economy closely. The World Bank suggests that the most
d) Agricultural research in India is inadequate important priorities are public sector reform,
5.4 Directions (16–20) Read the passage and infrastructure, agricultural and rural development,

Reading Comprehension
answer the questions that follow: removal of labour regulations, reforms in lagging
states, and HIV /AIDS. For 2015, India ranked
The economic development in India
142nd in Ease of Doing Business Index, which is
followed socialist- inspired policies for most of its
setback as compared with China 90th, Russia 62nd
independent history, including state-ownership of
and Brazil 120th. According to index of Economic
many sectors; India’s per capita income increased at
Freedom World Ranking an annual survey on
only around 1% annualized rate in the three decades
economic freedom of the nations, India ranks
after its independence. Since themed 1980s, India
123rd as compared with China and Russia which
has slowly opened up its markets through economic
ranks 138th and 144th respectively in 2012.
liberalization. After more fundamental reforms
since 1991 and their renewal in the 2000s, India has Questions
progressed towards a free market economy. In the 16. According to the passage, the economic growth
late 2000s, India’s growth reached 7.5%, which will has been driven by the expansion of which of
double the average income in a decade. Analysts which genre of services?
say that if India pushed more fundamental market a) The services growing slower than other sectors
reforms, it could sustain the rate and even reach available in the world
the government’s 2011 target of 10%. States have b) The services growing more easily than other
large responsibilities over their economies. The sectors available in the world
annualized 1999- 2008 growth rates for Tamil c) The services growing erratically faster than all
Nadu (9.9), Gujarat (9.6%), Haryana (9.1 %), and other sectors available in India
Delhi (8.9%) were significantly higher than for d) The services growing consistently faster than
Bihar (5.1 0/0), Uttar Pradesh (4.4%), and Madhya other sectors available in the world
3.27
Professor Academy
17. Which of the following statements is true National Bank, Bank of Baroda and Bank of India –
according to the passage? have already begun on exercise to identify takeover
a) More than one hundred and fifty countries are targets to gain access to franchises that would
doing better than India on PPP basis. augment their capabilities, said three top bankers
b) India is doing better than 140 countries on familiar with the move. The top managements of the
per capita basis. four banks are in the process of preparing a blueprint
c) India ranked 1 17th on the basis of economic that would explain the rationale for absorbing one
growth which is a setback. or two entities, said the people cited above, none of
d) India ranked 142nd in 2015 in Ease of Doing whom wanted to be named. Employees at these state
Business Index. run banks are engaged in the exercise after Finance
18. What was the opinion of the World Bank Minister Arun Jaitley gave the lenders the go-ahead
particularly on public sector reforms according, to decide how they would strategize to remain
to the passage? relevant in the emerging economic scenario.
i. Infrastructures development “We are hearing from the corridors of
ii. Health reforms finance ministry that there is seriousness on
iii. Removal of labour regulations consolidation of banks,” said an executive from one
iv. Agricultural development of the top four banks. “The sense we are getting is
a) Only i and ii b) only i, iii and iv that first there could be merger of at least one SBI
c) only ii and iv d) None of these associate bank with SBI to kick off the consolidation
19. “Economic liberalization” have been beneficial process.” Although no names of likely acquisition
for Indian according to the passage, which of targets are being discussed at these four banks, the
the following statements support the given key conditions for a smaller bank will be regional,
statement? technological and cultural advantages. For instance,
a) India bit by bit kicks off its markets through a bank such as Bank of Baroda, which does not have
economic liberalization. a presence in the East, may prefer one from that
b) India opened new markets all over world part of the country. State run banks have weakened
over the years as governments have treated them
Reading Comprehension

within 10 years of its initiation.


c) India gave a lot of employment compared to as an organ of the administration and used them
the last decade after its initiation. to push their social agenda. Meanwhile, lenders in
d) India’s growth rate increased by 7.5% after neighboring China have acquired scale while those
initiating economic liberalization. in India are puny by comparison, giving them little
clout in global markets.
20. Which of the following is not mentioned in the
passage regarding economic development? The economic downturn, with growth having
a) Index of Economic Freedom World Ranking almost halved from the peak, has exposed the fault
did an annual survey on economic freedom. lines in the system. The parlous financial position of
b) India’s per capita income increased at only the government has left banks capital starved - the
around 1% annualized rate. allocation for this year is tiny compared with the
c) The progress of economic reforms in India is amount needed to meet Basel III standards. And, to
followed closely. access capital from the market, the state run banks
d) Economic liberalization is a fusion of growth need a strategy to turn more profitable. Currently,
and economic development. they are laboring under bad debt on account of
companies finding it difficult to repay loans because
5.5 Direction (21–25)Read the passage and answer of the slump.
the questions that follow:
“Government has made it clear that they will
India’s banking sector may be getting ready not give any capital,” said one of the bankers. “Banks
for a wave of consolidation as the country tries to that have the capital and the capability to raise
build institutions of world class proportions. Four capital could look at acquisitions,” he said, while
big state run banks – State Bank of India, Punjab adding “Nothing has reached the drawing board.
3.28
Professor Academy
Banks are only doing all kinds of permutations b) Because of bad monetary policy of the RBI
and combinations.” To be sure, state run bank c) Because of the excessive payments towards
consolidation has been discussed for nearly a decade, government sponsored schemes without
but little progress has been made, except for shotgun appropriate provision for them
weddings that were aimed at rescuing ventures in d) Because of the dangerous financial position of
poor shape. Inertia among banks, cultural issues and the government
fears of trade union unrest held up any such move. 23. Which of the following is possibly the most
That may now change with the new government. appropriate title for the passage?
“There have been some suggestions for consolidation a) Policy Paralysis of the Central Government
of public sector banks,” Jaitley said in his July 10 b) The Economic Downturn
Budget speech. “Government, in principle, aggress c) Union Budget 2014: A Review
to consider these suggestions.” d) Consolidation of Banks
A committee set up by the Reserve Bank of 24. Which of the following statements regarding
India under former Axis Bank Chairman P.J. Nayak the consolidation of state run banks is/are true?
had suggested that the health of state run banks was Answer in the context of the passage
poor. To strengthen them, the report said it would be a) Efforts for consolidation of state run banks are
better “either to privatize these banks and allow their on for past one decade but nothing remarkable
future solvency to be subject to market competition, has come out as yet
including through mergers; or to design a radically b) The consolidation of state run banks is a
new governance structure for these banks which complex task and it will take some more years
would better ensure their ability to compete for its completion
successfully, in order that repeated claims for capital c) Banks are doing all kinds of permutations and
support from the government, unconnected with combinations but the result is cipher
market returns, are avoided.” The market share of d) Only a) and b)
the public sector banks is forecast to decline from
80% in 2000 to just over 60% in 2025, Nayak had 25. Under the current scenario what do state run
said. They stack up poorly in many respects against banks need to do to access capital from the

Reading Comprehension
non-state institutions. For instance, net profit per market?
employee at the new private sector banks was about a) They need to float public shares
four times that of the SBI Group in the year ended b) They need a strategy to earn more profit
RC March 2013. c) They should increase lending rate to attract
depositors
Questions d) They should announce handsome returns to
21. Which of the following is not true in the context depositors
of the passage? Answers 5.1 - 5.5
a) Four big state run banks have begun to identify
takeover targets. 1 2 3 4 5
b) The finance minister has given free hand to d a d b d
state run banks to make their own strategy for 6 7 8 9 10
banking business. d d d c c
c) The four big state run banks have already 11 12 13 14 15
decided the names of some small banks likely c d c d b
to be taken over 16 17 18 19 20
d) According to PJ Nayak Committee report, the d d b d d
state run banks were not performing well. 21 22 23 24 25
22. Why have banks turned capital starved? Answer c d d a b
in the context of the passage?
a) Because of excessive loans sanctioned to
malafide customers
3.29
Professor Academy
2. How are the idealistic concepts related to the
Previous NET Question (Sept-Nov 2020) routine practices in education?
a) They intertwine theory and practice
I. Read the given passage careful y and answer the
b) They make classroom teaching innovative
questions that follow;
c) They make the business of education highly
The ceremonial use of slogans and catch-
profitable
words in educational discussions raises the suspi-
d) They lead to the identification of gap between
cion of a tenuous linkage between thought and ac-
theory and practice
tion. As stock phrases multiply and the talk begins
3. The use of stock phrases in educational discus-
to take on an idealistic ring, the wary listener might
sions has tended to reveal
well begin to wonder whether the lip service paid to
a) The linkage between thought and action
these concepts is connected with what actually goes
b) The difference between saying and doing in
on in classrooms. It is difficult in this day and age
classroom contexts
to be opposed to democracy, creativity, and innova-
c) The ceremonial importance of slogans
tion in education but how are these attractive words
d) The idealistic ring of talks
related to the more mundane business of teaching
practice? The answer, of course, is that the two are 4. Why do young teachers appreciate the unrealistic
often not related - a fact that accounts for one of quality of expectations?
the most frequently recurring complaints among a) Because of the cynical attitude among teachers
today’s educators; the all-too-obvious gap between b) Because of the testimonial given by fellow
theory (i.e.. educational talk on the one hand and teachers
practice on the other. c) Because of their professional training
d) Because of their own experience in teaching
The dissonance between what teachers say,
or at least what their leaders say, and what they 5. What is the sequel of lack of congruence between
do takes many forms and has several important saying and doing as evident in teacher behavior?
consequences. For some, it lays the groundwork a) Opposition to revolutionary practices
for the development of a cynical outlook towards b) Lays ground for frequent complaints
Reading Comprehension

the admonitions of idealists and the advocates of c) Emergence of disillusionment among teachers
new and supposedly revolutionary practices. This d) Support to the admonition of idealists
cynicism, which grows out of a prior sense of dis-
Answers
illusionment strikes many young teachers as they
begin to appreciate the unrealistic quality of several 1 2 3 4 5
of the expectations aroused during the period of b d b a c
their professional training. Teaching as actually
II. Read the passage carefully and answer questions
experienced and as described in textbooks and col-
that follow
lege courses often turns out to be to quite different
states of affairs. The result is that college instructors Marketers are reexamining their relation-
of education and other outsiders begin to be looked ships with social values and responsibilities and
upon with suspicion by many practitioners. Even with the very Earth that sustains us. As the world-
the testimony of fellow teachers may be viewed wide consumerism and environmentalism move-
suspiciously when it conflicts with the listeners own ment mature, today’s marketers are being called on
experience in the classroom. to develop sustainable marketing practices. Corpo-
rate ethics and social responsibility have become
1. The passage analyses
hot topics for almost every business. And few com-
a) The linkage between language and discussions
panies can ignore the renewed and very demanding
b) The schism between theory and actual prac-
environmental movement. Every company action
tice of teaching
can affect customer relationships. Today’s custom-
c) The need to the use of high brow language in
ers expect companies to deliver value in a socially
educational discussions
and environmentally responsible way.
d) The importance of idealism in education
3.30
Professor Academy
The social-responsibility and environmen- Answers
tal movements will place even stricter demands on
1 2 3 4 5
companies in the future. Some companies resist
a b c c b
these movements, budging only when forced by
legislation or organized customer outcries. For- III. Read the passage carefully and answer ques-
ward-looking companies however, readily accept tions from 1 to 5.
their responsibilities to the world around them. The true role of our energy is to gain per-
They view sustainable marketing as an opportunity sonal power and operate from it at all times. Today,
to do well by doing good. They seek ways to profit in many situations. People loose their personal
by serving immediate reeds and the best long-run power in relationships between boss-subordinate,
merest of their customers and communities client-customer, colleague-colleague, teacher-stu-
Some companies.such as Patagonia. Ben & dent, husband-wife, parent-child, Friend-Friend etc.,
Jerry’s, Timberland, Method, and others.practice car- Often in these relationships someone plays the role
ing capitalism, setting themselves apart by being civic of the oppressor while the other plays the role of the
minded and responsible. They build social linkages. oppressed. But this is a great weakness in the rela-
tionship and it undermines people’s capacity to be
1. What do farsighted companies prefer?
their authentic sieves and accomplish what they want
a) Sustainable marketing
in their lives. We need personal power to hold our
b) Legislative compulsion
self esteem and go forward to succeed in our pur-
c) Organised consumer pressure
suits. Human relationships often deteriorate through
d) Status quo in the market
these power struggles and ultimately both, wheth-
2. Caring capitalism is inclusive of er they are playing the role of an oppressor or the
A. Make profit by ignoring social demands oppressed, lose their personal power. Personal power
B. Being civic-minded can be seen as the result of an interplay between
C. Forging social linkages masculine and feminine forms of power. Both these
D. Budge when there is a legislative nudge forms of power can co-exist in both men and wom-
Choose the correct answer from the options given en. Both feminine and the masculine forms of power

Reading Comprehension
below: need to be honoured and expressed for a beautiful
a) A and B only presence and creation in the world. We have to gain
b) B and C only a deeper understanding the characteristics of mascu-
c) C and D only line and feminine forms of power.
d) A and D only
1. Relationships of different types of power among
3. According to the passage, sustainable marketing people will lead to
is perceived as a) Social diversity
a) Immediately profitable b) Hierarchical structure
b) Community fallacy c) Balance of power in society
c) Doing good to community as an opportunity d) Subjugation of the weak and meek
d) Long-term burden to society as a difficult issue
2. The passage focuses on the idea of
4. The concern for today’s society centres on a) Importance of power struggle
a) Marketing strategies b) Different forms and structures of power
b) Customer relations c) The need for power division in the society
c) Corporate ethics d) Harnessing personal power in the interest of
d) Delivery of value for money co-existence
5. The present-day marketers have focused on 3. Interplay of forms of power is
a) Consumerism a) The essence of success in our pursuits
b) Social obligations b) Distinctly gender-based
c) Sustaining their business practices c) Nothing but assertion of power
d) Competitive business d) Needed for the creation of world
3.31
Professor Academy
4. Loss of personal power in the society is attributed to connection with this ‘presence’. When we remem-
a) Rigid human relations ber and sincerely seek to connect, sooner or later,
b) Aggressiveness of the oppressors the ‘Presence’ makes itself felt.
c) Weakness of the oppressed 1. How can we realize the Divine Presence?
d) Power struggle in society a) By searching for the divine
5. The power relations in a society tend to b) By recognising its presence within us
a) Hurt self accomplishments by people c) By reaching the innermost space
b) Improve the people’s abilities d) By making sincere efforts within one’s own
c) Increase self-esteem self
d) Have more oppressors than the oppressed 2. What is needed for the mind to be active?
Answers a) Life energy
1 2 3 4 5 b) Nourishment for body
b d b d a c) More knowledge
IV. Read the passage carefully and answer questions d) Constant replenishment of energy
from 1 to 5. 3. The Divine Presence in each individual can be
Our life exists by constant interchange and replen- found through
ishment. Every day, food is needed for the body a) One’s own realization of divinity
to survive. For our vital energies to thrive every b) The whirls of our mind
day, vital nourishment is needed. For our minds to
c) The surface self
be sharp and intelligent every day, an increase in
knowledge is needed. But a human does not live d) Knowing the nature of agitated Mind
by nourishment of the mind, life energy and body 4. The passage focusses on the
alone, but also by the a) Need for body replenishment
nourishment that comes by the connection with b) Intellectual thoughts
our Divine source. This deeper nourishment is c) Importance of connect with the Divine
Reading Comprehension

needed each day for our most well-being. To


Presence
connect to our deeper self and receive its nourish-
d) Vital life energies
ment, our awareness needs to touch deeper than
our mind, vital energy and body. A mere mental 5. Our inmost well-being depends upon
awareness cannot touch this inner-most space. Our a) Sharper intellect
efforts too can take us only up to a certain point. b) Nourishment of body and mind
The true question is, how much do we really want
c) Acceptance of life energies
to connect with the divinity within us. If it is a sin-
cere inner urge, then at some point, we realize that d) Connect with supreme power
there is a presence that lives within us and carries Answers
us forward. To recognize this Presence when it 1 2 3 4 5
reveals itself to us, we can begin to know its nature. d c a c d
It exists quietly in the background, often unnoticed
by our surface self. When we are lost in the whirls
of our mind, vital life-energy and body, we lose our

3.32
4 INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT)

Why does NET exam demand Aspirants ²¿µ Ⱥö½¶ÄÄ ĺ¸¿²½Äʰʁ ´À¾ÁÆÅ¶ÃÄ ²Ä ȶ½½ ²Ä ¿¶´¶ÄIJÃÊ
to learn Information and Communication ¶¿Å¶ÃÁúĶ ÄÀ·ÅȲöʁ ¾ºµµ½¶È²Ã¶ʁ ÄÅÀò¸¶ʁ ²¿µ ²ÆµºÀʉ
Technology? ÇºÄÆ²½ ÄÊÄŶ¾Ä ȹº´¹ ¶¿²³½¶ ÅÀ ²´´¶ÄÄ ÄÅÀöʁ Åò¿Ä¾ºÅ
²¿µ ¾²¿ºÁƽ²Å¶ º¿·Àþ²ÅºÀ¿ʇ ¶²Ã ²ÄÁºÃ²¿ÅÄ ¸²º¿º¿¸
 ºÄ ² Ä´º¶¿Åºȱ´ʁ Ŷ´¹¿À½À¸º´²½ ²¿µ ¶¿¸º¿¶¶Ãº¿¸
µ¶ÁŹ ¼¿ÀȽ¶µ¸¶ ²³ÀÆÅ ³²Äº´Ä À· ´À¾ÁÆÅ¶Ã ²Ä ȶ½½ ²Ä
µºÄ´ºÁ½º¿¶²¿µ¾²¿²¸¶¾¶¿ÅŶ´¹¿ºÂƶÆÄ¶µº¿¹²¿µ½º¿¸
Æ¿µ¶ÃÄŲ¿µº¿¸ ²½½ ʶ Ŷþº¿À½À¸Ê ö½²Å¶µ ÅÀ ´ÆÃö¿Å
º¿·Àþ²ÅºÀ¿ʁºÅIJÁÁ½º´²ÅºÀ¿²¿µ²ÄÄÀ´º²ÅºÀ¿ȺŹÄÀ´º²½
Ŷ´¹¿À½À¸Ê ²¿µ ºÅÄ ÄÁ¶´ºȱ´²ÅºÀ¿Ä ºÄ ǶÃÊ º¾ÁÀÃŲ¿Å ÅÀ
¶´À¿À¾º´ ²¿µ ´Æ½ÅÆÃ²½ ¾²ÅŶÃÄʇ  ȹº´¹ ºÄ ¿ÀÈ
Ä´Àö¾Àö¾²Ã¼Äº¿ŹºÄÄÆ³»¶´Åʇ
³ÃÀ²µ½Ê ÆÄ¶µ º¿ ¶µÆ´²ÅºÀ¿²½ ÈÀýµʁ Ŷ²´¹¶ÃʤÄÅÆµ¶¿ÅÄ
²¿µöĶ²Ã´¹Ä´¹À½²ÃÄÁÀÁƽ²Ã½ÊÆÄ¶ ʇǶÃʲÄÁ¶´ÅÄ Blueprint of Information and
À·½º·¶²Ã¶ö½²Å¶µÅÀÄ´º¶¿´¶²¿µ¶´¹¿À½À¸Êʇ Ƹ¶ȷÀÈ Communication Technology (ICT)
À· º¿·Àþ²ÅºÀ¿ ºÄ ¶¾¶Ã¸º¿¸ º¿ ²½½ ȱ¶½µÄ ŹÃÀƸ¹ÀÆÅ ¿ ŹºÄ Æ¿ºÅ ȶ ¹²Ç¶ ´À¾Áº½¶µ ²½½ ʶ º¾ÁÀÃŲ¿Å
ʶ ÈÀýµʇ ¶²´¹¶ÃÄ ²Ã¶ ʶ ´Àö À· ²¿Ê ½ºÇº¿¸ ÄÀ´º¶ÅÊʇ ŶþÄ ·ÃÀ¾ ʉ ʲÅ ²Ã¶ ö½¶Ç²¿Å ·Àà ʁ ²´ÃÀ¿Ê¾Ä
¶´¹¿À½À¸º¶Ä Á½²Ê ² ǺŲ½ ÃÀ½¶ º¿ Ŷ²´¹º¿¸ ²¿µ ½¶²Ã¿º¿¸ ²³³Ã¶Çº²ÅºÀ¿Äʁ ¿Å¶Ã¿¶Å ¿¶ÅÈÀüʉ³²Ä¶µ Ŷþº¿À½À¸º¶Äʁ
ÁÃÀ´¶ÄÄʇ¹ºÄÆ¿ºÅÀ·³ÀÀ¼ºÄ²´À¾Á½¶Å¶Á²´¼²¸¶À·³²Äº´Ä ½ºÄÅ À· ¶¾²º½ ²´ÃÀ¿Ê¾Ä ¶Å´ʁ¿ ²¿²½Ê˺¿¸ ÂÆ¶ÄźÀ¿Ä À·
À· ʲÅÈÀƽµ¹¶½ÁÅÀ¸²º¿¼¿ÀȽ¶µ¸¶²³ÀÆÅ²½¾ÀÄÅ ö´¶¿Å¶É²¾Ä²¿µ²½ÄÀ·ÃÀ¾ÁöǺÀÆÄ¶É²¾Äʁʶ¾ÀµÆ½¶
²½½Ŷþº¿À½À¸ÊÀ· ʇ ȺĶ ³ÀÀ¼ ³²´¼ ÂÆ¶ÄźÀ¿Ä ²Ã¶ µºÄ´ÆÄ͵ʇ ¹¶ ´À¾Á½¶Å¶
Syllabus  ´À¿Å¶¿Å ¹²Ä ³¶¶¿ µºÇºµ¶µ º¿ÅÀ ĶǶò½ ¾ÀµÆ½¶Ä º¿
²´´Àõ²¿´¶ ȺŹ ʶ Äʽ½²³ÆÄ ²¿µ ʶ ¾ÀµÆ½¶Ä ²Ã¶ ²Ä
• ʃ ¶¿¶Ã²½²³³Ã¶Çº²ÅºÀ¿Ä²¿µŶþº¿À½À¸Êʇ
·À½½ÀȺ¿¸ʃ
•  ²Äº´ÄÀ· ¿Å¶Ã¿¶Åʁ ¿Åò¿¶Åʁʉ¾²º½ʁƵºÀ²¿µºµ¶Àʉ

➢ À¾ÁÆÅ¶Ã²¿µºÅÄÅÊÁ¶Ä
´À¿·¶Ã¶¿´º¿¸ʇ
➢ À¾ÁÀ¿¶¿ÅÄÀ·À¾ÁÆÅ¶Ã
• º¸ºÅ²½º¿ºÅº²ÅºÇ¶Äº¿¹º¸¹¶Ã¶µÆ´²ÅºÀ¿ʇ ➢ À¾ÁÆÅ¶Ã¶¾ÀÃÊ
➢ À·ÅȲö
• ²¿µ ÀǶÿ²¿´¶ʇ
➢ ²Å²²¿µ ¿·Àþ²ÅºÀ¿
Trend Analysis ➢ ƾ³¶ÃÊÄŶ¾
¹¶Ã¶ ºÄ ² ¿Àź´¶²³½¶ Ĺº·Å ·ÃÀ¾ µºÃ¶´Å ÂÆ¶ÄźÀ¿Ä ➢ ¿Å¶Ã¿¶Å
ºʇ¶ʇʁ ·²´ÅƲ½ ÂÆ¶ÄźÀ¿Ä ÅÀ ²ÁÁ½º´²ÅºÀ¿ ÂÆ¶ÄźÀ¿Äʇ ¹¶ ➢ ¾²º½
²ÁÁ½º´²ÅºÀ¿ʉÀú¶¿Å¶µ ÂÆ¶ÄźÀ¿Ä ²Ã¶ ʲÅ ȹº´¹ ¾¶²¿Ä ➢ ƵºÀ º½¶ Àþ²ÅÄʁƵºÀºµ¶ÀÀ¿·¶Ã¶¿´º¿¸
²ÄĶÃźÀ¿ ²¿µ ö²ÄÀ¿º¿¸ ÂÆ¶ÄźÀ¿Äʁ ÄŲŶ¾¶¿Åʉ³²Ä¶µ ➢ ʉ ÀǶÿ²¿´¶ʁʉÀ¾¾¶Ã´¶
ÂÆ¶ÄźÀ¿Ä ʲÅ Ã¶ÂÆºÃ¶ ´²¿µºµ²Å¶Ä ÅÀ ÈÀü À¿ ¶²´¹ ➢ ³³Ã¶Çº²ÅºÀ¿Ä²¿µ¶Ã¾º¿À½À¸Ê
ÄŲŶ¾¶¿ÅÅÀȱ¿µȹ¶Å¹¶ÃºÅºÄÅÃÆ¶ÀÿÀÅʇ¹ÀƸ¹ʶ ·Å¶Ã ¶²´¹ ¾ÀµÆ½¶ ½¶Ç¶½ Ѓ ÂÆ¶ÄźÀ¿Ä ȹº´¹ ²Ã¶
ÂÆ¶ÄźÀ¿Ä Ͷ¾ ÅÀ ³¶ ·Àþƽ²Å¶µ ÀÆÅ À· ³²Äº´ ´À¿´¶ÁÅÄ ¾¶¾ÀÃÊʉ³²Ä¶µÂÆ¶ÄźÀ¿Ä²ÄĶÄĺ¿¸ö´À½½¶´Åº¿¸²³º½ºÅÊÀ·
ÄÆ´¹ ²Ä ¾¶¾ÀÃÊʁ ÄÅÀò¸¶ʁ ¶Å´ʇʁ ʶ ÄÅÃÆ´ÅÆÃ¶ À· ʶ ʶ²ÄÁºÃ²¿ÅIJ¿µ½¶Ç¶½ЄÂÆ¶ÄźÀ¿Äȹº´¹²Ã¶²ÁÁ½º´²ÅºÀ¿ʉ
ÂÆ¶ÄźÀ¿µ¶¾²¿µÄÊÀÆÅÀÈÀüÀ¿ʶÂÆ¶ÄźÀ¿ÅÀÁº´¼ ³²Ä¶µÂÆ¶ÄźÀ¿Ä²ÄĶÄĺ¿¸ʶ´À¿´¶ÁÅÆ²½Æ¿µ¶ÃÄŲ¿µº¿¸
ÊÀÆÃ ²¿Äȶà ·ÃÀ¾ DzúÀÆÄ ´Àµ¶ʇ ¶¿´¶ʁ ʶ ²ÄÁºÃ²¿ÅÄ À· ʶ ²ÄÁºÃ²¿ÅÄ ¹²Ä ³¶¶¿ ¸ºÇ¶¿ ȺŹ ʶ ²¿Äȶà ¼¶Êʁ
²Ã¶ ¶ÉÁ¶´Å¶µ ÅÀ ¹²Ç¶ ´À¾Á½¶Å¶ ¼¿ÀȽ¶µ¸¶ ²³ÀÆÅ  ²Ä ȹº´¹ ʶ ´²¿µºµ²Å¶ ´²¿ Áò´Åº´¶ ÅÀ ³¶¿´¹ ¾²Ã¼ ʶºÃ
²¿ ¶ÉŶ¿ÄºÀ¿²½ Ŷþ ·Àà º¿·Àþ²ÅºÀ¿ Ŷ´¹¿À½À¸Ê ʯ ʰ ÁöÁ²Ã²ÅºÀ¿ʇ
ʲÅ ÄÅöÄĶÄ ʶ ÃÀ½½ À· Æ¿ºȱ¶µ ´À¾¾Æ¿º´²ÅºÀ¿ ²¿µ
LET’S LEARN TECHNOLOGY!
ʶ º¿Å¶¸Ã²ÅºÀ¿ À· Ŷ½¶´À¾¾Æ¿º´²ÅºÀ¿Ä ʯŶ½¶Á¹À¿¶ ½º¿¶Ä
Professor Academy

INFORMATION AND COMMUNICATION The various types of computers are:


TECHNOLOGY (ICT) a. Digital Computer

Information and communication technology The definition of a digital computer is the most
is defined as the use of hardware and software for commonly used type of computer and is used
efficient management of information i.e. storage, to process information with quantities using
retrieval, processing, communication, diffusion digits, usually using the binary number system.
and sharing of information for social, economic The Central Processing Unit (CPU) contains an
and cultural improvement. In a broader sense, ICT arithmetic and logic unit for manipulating data, a
is consider as the whole set of enabled technology number of registers for storing data, and a control
concerned with study, communication, design, circuit for fetching and executing instructions. The
development, support or management of computer memory unit of a digital computer contains storage
based information system, particularly software for instructions and data. e.g. digital speedometers
application and computer hardware, networking, in mechanical industries.
data storage, transmission encompassing data, voice i. Micro Computers: Systems on the lower end of
and video. Now a days, the education is delivered at the size and size scale are microcomputers. They
doorsteps with the support of ICT aiming at inclusive may be tiny, special purpose devices dedicated
education. to carrying out a single task such as one inside a
camera.While most PCs are oriented towards single
users, mini systems are designed to handle the
COMPUTER
needs of multiple users. e.g. Personal Computers,
Computer is a fast operating, automatic electronic Laptops, Tablet PC, Note Pad, Smart Phones.
device which automatically accepts and store input
ii. Mainframe Computers: A mainframe is another
data, processes them and produces results under
form a computer system that is generally more
the direction of a detailed step by step program. It is
powerful than a typical mini; Mainframes
used making calculations or controlling operations
themselves may vary widely in cost and capability.
that are expressible in numerical or logical terms. In
They are used in large organizations for large
other words, a computer has the ability to
scale jobs. e.g. ATM machines.
i. Accept data supplied by the user
iii. Super computer: A supercomputer is a computer
ii. Input, store and execute instruction with great speed and memory. They are usually
iii. Perform mathematical and logical operation thousands of times faster than ordinary personal
computers made at that time. Supercomputers
iv. Give results in accordance with user’s can do arithmetic jobs very fast, so they are
requirement used for weather forecasting, code-breaking,
genetic analysis and other jobs that need many
Types/Classification of Computers calculations.
Computers are categorized on the basis of size,
Communication Technology

sort and performance. Generally, the larger the Types of


Computer
system, the greater is its processing speed, storage
Information and

capacity, cost and ability to handle large number


of devices. Digital Analog Hybrid
Computer Computer Computer

Micro Mainframe Super Mini Workstation


Computer Computer Computer Computer

Home PC


“Today is your opportunity to build the tomorrow you want”
Professor Academy
Supercomputers have certain distinguishing Intended primarily to be used by one person at
features. Unlike conventional computers, they a time, they are commonly connected to a local
usually have more than one CPU (central area network and run multi-user operating
processing unit), which contains circuits for systems.
interpreting program instructions and executing
arithmetic and logic operations in proper b. Analog Computer
sequence. supercomputers have been used for
scientific and engineering applications that must An analog computer is a computer which is
handle very large databases or do a great amount used to process analog data. Analog computers
of computation (or both). e.g. weather forecasting, store data in a continuous form of physical
climate research, etc.,. quantities and perform calculations with the
help of measures. It is quite different from
Characteristics of a Supercomputer the digital computer, which makes use of
➢ Powerful funnel capacity-to run few programs as symbolic numbers to represent results. Analog
quickly as possible. computers are excellent for situations which
➢ Expensive-Hundreds of millions of dollars. require data to be measured directly without
converting into numerals or codes. Analog
➢ Built for specific applications-Animating
computers, although available and used in
graphics.
industrial and scientific applications like
➢ Made up of tens of thousands of computing nodes. control systems and aircraft, have been largely
➢ Most controlled by Linux software. replaced by digital computers due to the wide
➢ Water cooled. range of complexities involved.
e.g.speedometer, electrical voltage, pressure,
INTERESTING FACTS! temperature.
T
There are 8 Super Computers: Used
c. Hybrid Computer
by Indian Educational Institutes for their
Research under National Super Comput- Hybrid computers are well known for their ability
ing Mission of Government of India to blend analog and digital features of computers.
➢ Colour Boson (Cray XC-30) Advantages include the availability of both analog
➢ HPC and digital computations within a single unit and
➢ PARAM Ishan an efficient processing speed. A hybrid computer
➢ PARAM Kanchenjunga is individually designed and integrated, taking
➢ PARAM SHIVAY into consideration the field of its application and
➢ PARAM YUVA II processing requirements. A hybrid computer is
➢ Sahasrat (CRAY XC40) constructed in such a way that its components
➢ Virgo make the device fast and accurate. e.g. Hospital
(in ICU), Petrol Pumps.

iv. Mini computers: Mini computers are small,


Communication Technology

general purpose computers. They can vary in size Father of Computer


from a small desktop model to the size of a small
Information and

Charles Babbage is considered to be the father


filing cabinet. One and more than one person can of computer, for his invention and the concept of
work on a mini computer at the same time. Analytical Engine in 1837. The Analytical Engine
e.g. complex computations in the fields of science contained an Arithmetic Logic Unit (ALU), basic
and engineering. flow control, and integrated memory; which led to
the development of first general purpose computer
v. Work station A workstation is a special computer
concept.
designed for technical or scientific applications.

4.3
Professor Academy
The first digital computer Sixth Generation Computing
The ENIAC (Electronic Numerical Integrator and In the Sixth Generation, computers could be
Calculator) was invented by J. Presper Eckert and defined as the era of intelligent computers, based
John Mauchly at the University of Pennsylvania and on Artificial Neural Networks. One of the most
began construction in 1943 and was not completed dramatic changes in the sixth generation will be
until 1946. It occupied about 1,800 square feet and the explosive growth of Wide Area Networking.
used about 18,000 vacuum tubes, weighing almost 50 Natural Language Processing (NLP) is a component
tons. ENIAC was the first digital computer because it of Artificial Intelligence (AI). It provides the ability
was fully functional. to develop the computer program to understand
human language.

Self Evaluation
LEVEL 1
Answer Key
1. Which of the following statements is / are True in
respect to ICT? [June-2019] 1 2 3 4 5
P: ICT is an acronym that stands for information and c b d d b
competitive technology
Q: The effective use of ICT to support learning in the
inclusive education exemplifies good teaching for all
learners LEVEL 2
a) P only b) Both P and Q
c) Q only d) Neither P nor Q 1. Consider the following technologies: [Nov-2020]
2. Match the following: [June-2019] (A) Microprocessor (B) Transistor
Set-I Set-II (C) Vacuum Tube (D) Artificial Intelligence
A. First Generation I) Transistor
Arrange the above technologies of different computer
B. Second Generation II) VLSI microproces sor
generations in the order they have been used. Start
C. Third Generation III) Vacuum Tube
from the technology that was used in first generation.
D. Fourth Generation IV) Integrated circuit
Choose the correct answer from the options given
Select the correct option from the following:
below:
a) A-III,B-IV,C-I,D-II b) A-III,B-I,C-IV,D-II
c) A-III,B-I,C-II,D-IV d) A-I,B-III,C-IV,D-II a) (C), (A), (B), (D) b) (C), (B), (A), (D)
3. Which of the following is most suitable for being c) (B), (C), (A), (D) d) (C), (B), (D), (A)
designated as Fourth Generations Language (4GL) 2. Which of the following statements regarding the
a) ALGOL b) Java c) C d) SQL features of Information and Communication
4. Which of the following is related to National Super Technology (ICT) is/are true? [June-2019]
Computing Mission of Government of India? I. ICT are the main instruments for the creation
a) Param 8000 b) Param 10000 [Sept-2020]
Communication Technology
of computer networks and the applications
c) ParamDhavak d) ParamShivay based on them.
Information and

5. The statement “The study, design, development, im- II. ICT supports the spread of information and
plementation, support or management of comput- knowledge, separating the content from the
er-based information systems, particularly software place where it belongs physically.
applications and computer Hardware” refers to
a) Information Technology (IT) III. The digital and virtual nature of most of ICT
products allow the expenditure for them to
b) Information and Communicationn Technology
(ICT)
be maximized.
c) Information and Data Technology (IDT) a) I and II only b) I and III only
d) Artificial Intelligence (AI) c) II and IIIonly d) I, II and III

4.5
Professor Academy

3 Which of the following three statements is/are false? COMPONENTS OF COMPUTER


P: Second generation Programming languages are
COBOL, ALGOL, FORTRAN The computer is the combination of hardware
Q: Fifth Generation Programming languages are and software. Hardware is the physical component
based on neural networks of a computer like motherboard, memory devices,
S: Sixth Generation Programming languages are monitor, keyboard etc., while software is the set of
Scripting language. programs or instructions. Both hardware and software
a) P Only b) Q Only together make the computer system to function.
c) S Only d) None Of These
Central Processing Unit
4. Match the following.
Control Unit
1. Hybrid computer A. Tiny and special
purpose Arithmetic / Logic
Unit
2. Analog computer B. Small and general Input Device Output Device

purpose
3. Super computer C. Genetic analysis Memory Unit

and code breaking


4. Mini computer D. Results in symbolic Let us first have a look at the functional components
numbers of a computer. Every task given to a computer follows
5. Micro computer E. Computation in an Input- Process- Output Cycle (IPO cycle). It needs
analog and digital certain input, processes that input and produces the
1 2 3 4 5 desired output. The input unit takes the input, the
a) E C D B A central processing unit does the processing of data and
the output unit produces the output. The memory unit
b) E B C D A
holds the data and instructions during the processing.
c) E D C A B
d) E D C B A Any computer has the following essential components
5. Given below three statements Choose the correct (i) Input Unit
A: Mainframe systems are powerful used in large (ii) Central processing Unit (CPU)
organization (a) Arithmetic and Logic Unit
B: Workstations commonly connected to a local (b) Control unit
area network and run multi user operating (c) Memory Unit
system, Example- ATM machine (d) Registers
(iii) Output Unit
C: Micro computers are portable and faster
built with VLSI which uses 4th generation What is Hardware?
programming languages.
Hardware is the equipment involved in the function
a) A, B of a computer. Computer hardware consists of the
b) B, C
Communication Technology

components that can be physically handled. The


c) A, C function of these components is typically divided
into three main categories; input, output, storage.
Information and

d) None Of These
Components in these categories connect to central
Answer Key processing unit (CPU), the electronic circuitry that
provides the computational ability and control of
1 2 3 4 5 the computer, via wires or circuitry called a bus. The
b a c d c main difference between software and hardware can
be assumed of their physical appearance as hardware
is tangible whereas software is intangible.


Professor Academy
2. Given below are two statements, one is labelled 4. Given two statements
Assertion(A) and the other is labelled as Reason I. Hardware is tangible whereas software is
(R) intangible.
Assertion(A): The clock speed of CPU has not II. Input and output devices are connected to
increased significant in recent years the computer via wires or circuitry called as
Reason (R): Software now being used is faster topologies.
and therefore processors do not have to be faster
In the light on the above two statement choose Which among above statement is correct?
the correct option from those given below a) Only I b) Only II
[Dec- 2019] c) Both I & II d) None of the above
a) Both (A) and (R) are true is the correct 5. What are the different set of keys available in the
explanation of (A) keyboard
b) Both (A) and (R) are true R is not the correct (i). Character keys (ii). Modifier keys
explanation of (A) (iii). Surrogate keys (iv). System keys
c) (A) is true, but (R) is false (v). Function keys (vi). Navigation keys
d) (A) is false, but (R) is true (vii). Symmetric Keys
3. Assertion (A): The computer is the combination Choose the correct option
of hardware and software.
a) (i), (ii), (iii), (v), (vi)
Reason(R): Hardware is the physical component
and software is set of information. b) (i), (ii), (iv), (v), (vi)
c) (i), (ii), (v), (vi), (vii)
Choose the correct answer from the following:
d) (i), (ii), (iv), (v), (vii)
a) Both (A) and (R) are true and (R) is the
correct explanation of (A).
b) Both (A) and (R) are true and (R) is not the Answer Key
correct explanation of (A).
1 2 3 4 5
c) (A) is true and (R) is false.
b c c a b
d) (A) is false and (R) is true.

Communication Technology
Information and

4.11
Professor Academy
Memory Storage Units
COMPUTER MEMORY
Bit 0 or 1
The performance of computer mainly based 4 Bit 1 Nibble
on memory and CPU. Memory is major part
of computers that categories into several types, 8 Bit 1 Byte
Memory is best storage part to the computers users 1024 Byte 1 Kilo Byte 210 103
to save information, programs and etc. The computer 1024 Kilo Byte 1 Mega Byte 220 106
memory offer several kinds of storage media some
can store data temporarily and some of them can 1024 Mega Byte 1 Giga Byte 230 109
store permanently. Memory consists of instructions 1024 Giga Byte 1 Tera Byte 240 1012
and the data saved into computer through Central 1024 Tera Byte 1 Peta Byte 250 1015
Processing Unit (CPU).
1024 Peta Byte 1 Exa Byte 260 1018
Primary and secondary storage device 1024 Exa Byte 1 Zetta Byte 270 1021
Memory 1024 Zetta Byte 1 Yotta Byte 280 1024
1024 Yotta Bye 1 Bronto Byte 290 1027
Secondary Storage
Primary Storage Device / Memory 1024 Bronto Byte 1 Geop Byte 2100 1030
Device / Memory

Hard Disk Memory is internal storage media of computer


that has several names which is majorly categorized
Floppy Disk into two types.
RAM ROM

1. Primary Memory
DRAM PROM
Compact Disk
i. Random Access Memory/Volatile Memory
SPRAM EPROM
ii. Read Only Memory(BIOS)/Non-Volatile Memory
EAROM Tape Drive
2. Secondary Memory/ Non-Volatile Memory
EEPROM DLT (Digital
Linear Tapes)
Primary Memory
DAT(Digital
Audio Tape)
Primary Memory is called as Volatile memory
because the memory can’t store the data permanently.
Micro Vault USB
Storage Media Primary memory select any part of memory when
user want to save the data in memory but that may
The purpose of the storage unit of the computer not be store permanently on that location. It also has
is to store the data entered before processing and another name i.e. RAM.
also to store the results after processing. (i) Random Access Memory (RAM): The primary
storage is referred to as random access memory
Communication Technology

Physical devices are used to store programs or


data on a temporary or permanent basis for use in a (RAM) due to the random selection of memory
locations. It performs both read and writes
Information and

computer.
operations on memory. If power failure occurs in
Memory-Data stored in the form of chips. systems during memory access then you will lose
Storage-Data stored in tapes or disks. your data permanently. So, Ram is volatile memory.
RAM is categorized into following types. DRAM,
Storage Unit
SRAM &DRDRAM.
1. Primary Storage Device
DRAM (Dynamic RAM): It only holds its data if it
2. Secondary Storage Device is continuously accessed by a refresh circuit. Many
hundreds of times each second, this circuitry reads

Professor Academy
and then re-writes the contents of each memory cell. Diffrence between RAM and ROM
It is slower and more complicated than SRAM. RAM is a volatile memory. ROM is a non-volatile mem-
SRAM (Static RAM): It is also a volatile storage ory.
devices. These chips are more complicated and take Data stored can be re- Data stored can only be read.
trieved and altered.
up more space. It is used in specialized applications.
Used to store the data that It stores the instructions re-
It is fast and access time 80 nano-second to read has to be currently pro- quired during bootstrap of the
from or write into any location. It is expensive. cessed by CPU temporarily. computer.
(ii) Read Only Memory (ROM): ROM is permanent It is a high-speed memory. It is much slower than the RAM.
memory location that offers huge types of standards to
save data. But it works with read only operation. No data Secondary Memory / Non Volatile
lose happen whenever power failure occurs during the Memory
ROM memory work in computers. Secondary memory is external and permanent
The BIOS – It stands for Basic Input Output memory that is useful to store the external storage
System and is a small firmware, that controls the media such as floppy disk, magnetic disks, magnetic
peripheral or the input-output devices attached tapes and cache devices etc. Secondary memory
to the system. This software is also responsible for deals with following types of components.
starting the OS or initiating the booting process .
Uses of Secondary Memory
ROM memory has several models such names are Permanent Storage: Primary Memory (RAM)
following. is volatile, i.e. it loses all information when the
PROM (Programmable ROM): PROM are electricity is turned off, so in order to secure the
programmed to record information using a facility data permanently in the device, Secondary storage
known as a PROM-Programmer. The recorded devices are needed.
information cannot be changed. It is also non-volatile Portability: Storage medium, like the CDs and
storage. e.g.- Video games, Mobile Phones etc. flash drives can be used to transfer the data from one
EPROM (Erasable PROM): It was developed device to another.
to allow programmers to reprogram permanent Fixed and Removable Storage
read only chips. It is erased and reprogrammed by Fixed Storage-
exposing the inside of the chip to Ultra Violet Light.
It were used in the old IBM PCs and XTs for storing A Fixed storage is an internal media device that is
the BIOS information. used by a computer system to store data, and usually
these are referred to as the Fixed Disks drives or the
EAROM-(Electrically Alterable ROM): Memory Hard Drives.
can be programmed and erased by electrical signals.
It does not require exposure to ultraviolet light to Types of fixed storage:
erase its contents. It provide easy means to load and ➢ Internal flash memory (rare)
store temporary or permanent information in a form ➢ SSD (solid-state disk) units Communication Technology
of ROM memory. ➢ Hard disk drives (HDD)
This memory can be retained for many years Removable Storage-
Information and

without any power supplied. It is a backup to RAM


A Removable storage is an external media device
memory. A special form of EEPROM is flash memory.
that is used by a computer system to store data, and
EEPROM-(Electrically Erasable PROM): It allow usually these are referred to as the Removable Disk
the erasure of ROM chips on the fly. It send a series drive or the External Drives.
of special electrical signals through the chip erases
Types of Removable Storage:
EEPROM chips. EEPROM chip is often referred to
as the CMOS BIOS chip in computer. Information ➢ Optical discs (CDs, DVDs, Blu-ray discs)
erased by electric pulses like Flash Memory. ➢ Memory cards

4.13
Professor Academy
➢ Floppy disks be spaced closely enough to store data that is more
➢ Magnetic tapes than six times the CD’s capacity. It is a significant
➢ Disk packs advancement in portable storage technology. A
➢ Paper storage (punched tapes, punched cards) DVD holds 4.7 GB to 17 GB of data.
(a) Hard Disk (e) Blue Ray Disk
CPU use the hard disk to load programs and data This is the latest optical storage media to store
as well as to store data. To prevent hard disk crash high definition audio and video. It is similar to a CD
must operate the PC within dust-free and cool room. or DVD but can store up to 27 GB of data on a single
(b) Floppy Disk layer disk and up to 54 GB of data on a dual layer
disk. While CDs or DVDs use red laser beam, the
It is flexible circular disk of diameter 3 inches blue ray disk uses a blue laser to read/write data on a
made of plastic coated with a magnetic material. It is a disk.
square plastic jacket. It can store 1.4 Mbytes of data.
Data recorded on a floppy disk is read and stored (f) Pen Drives
in a computer’s memory by a device called a floppy Pen Drives or Thumb drives or Flash drives
disk drive. Some of it has limited life time. It has to be are the recently emerged portable storage media. It
recycled periodically to keep them alive. A frequently is an EEPROM based flash memory which can be
recycled floppy will have a life time of 3 to 4 years. repeatedly erased and written using electric signals.
(c) Compact Disk (CD-ROM) This memory is accompanied with a USB connector
which enables the pen drive to connect to the
CD-ROM are normally used to store data as back computer.
up. Lots of information can be written on CD-ROM
and stored for future CD-ROM uses a laser scan to (g) Tape Drives
record and read data along spiral track on a 51/4 It is one of the oldest of storage technologies.
disk. A disk can store around 700mb of information. It can hold the most data on a single cartridge. A
computer tape drive works similar to a tape recorder
Burning: Copying files to or a VCR.
a CD-ROM is known as a
Burning. (h) DLT (Digital Linear Tape)

Zipping: Zipping is the act DLT drives are a robust and durable medium.
of packaging a set of files Released in the 1991. DLT drives are very reliable,
into a single file or archive high-speed and high-capacity making the DLT
that is called a zip file. drives an excellent use for network backups.
Digitizing: Digitization is the process of (i) DAT (Digital Audio Tape)
converting analog signals or information The popular choice for tape drives is DAT. It is
of any form into a digital format that best known for digital audio recording. These drive
can be understood by computer systems use a recording technique called helical scanning
or electronic devices. which is used in VCRs. The 4mm tape is wrapped
Communication Technology

Ripping: Ripping, more formally known round a spinning read/write head that records data
as digital extraction, is the process of in overlapping diagonal tracks. DAT tapes can hold
Information and

copying audio or video content from a 2GB to 40GB of compressed data.


compact disc, DVD or streaming media (j) Micro Vault USB Storage Media
onto a computer hard drive.
Micro Vault media plugs directly into the
(d) DVD computer’s BB port and acts just like another drive.
It is small, light, shock-proof and moisture proof. By
It stands for Digital Versatile Disk or Digital
connecting it via USB, the files can be transferred by
Video Disk. It looks just like a CD and use a similar
dragging and dropping.
technology as that of the CDs but allows tracks to

Professor Academy
Secodary memory device and its storage capasity access to a processor and stores frequently used
computer programs, applications and data. It is
Secondary Maximum Storage
Memory Device Capacity Component the fastest memory in a computer, and is typically
integrated onto the motherboard and directly
Floppy 1.44 MB Magnetic
embedded in the processor or random access
CD-R (or) CD- 700 MB Optical memory (RAM).
R/W
Magneto-optical 5.2 GB Magnetic Registers
disk
DVD 4.7 GB - 17GB Optical
Registers are a type of computer memory used
to quickly accept, store, and transfer data and
Blu-Ray Disc 25 GB Optical instructions that are being used immediately by the
SD Memory Cards 1GB to 512 GB Flash CPU. The registers used by the CPU are often termed
as Processor registers.
Pendrive 1GB to 512 GB Solid State
Computer Memory: Speed & Cost
External Hard Disk Up to 16TB Magnetic
Register> Cache Memory> Primary memory>
Hard Disk Up to 100 TB Magnetic/ Solid
Secondary Memory
State
Magnetic Tape Up to 185 TB Magnetic Computer Memory: Space
Secondary Memory> Primary Memory> Cache
Cache Memory Memory>Register

Cache memory is a small-sized type of volatile


computer memory that provides high-speed data

3. Given below are two statements


Self Evaluation Statement I: Cache memory is faster than random
access memory
LEVEL 1 Statement II: Random access memory is closer to the
1. Which type of memory holds the computer start-up processor than cache memory [Oct-2020]
routine? [Nov-2020] In light of the above statements, choose the most
appropriate answer from the following:
a) RAM b) WAN c) ROM d) Cache a) Both Statement I and Statement II are correct
2. Given below are two statements: One is labelled as b) Both Statement I and Statement II are incorrect
Assertion (A) and the other is labelled as Reason (R): c) Statement I is correct but Statement II is incorrect
d) Statement I is incorrect but Statement II is correct
Assertion (A): Random Access Memory (RAM) is
volatile and stores data/programs currently in use. 4. Consider the following sizes of computer memory.
Reason (R): RAM is a storage medium that retains its Choose the correct ascending order [Oct-2020]
contents even after the supply of electricity has been A. MB B. GB C. KB D. TB
turned off. [Oct-2020] Choose the correct answer from the following Communication Technology
In the light of the above statements. Choose the a) B, D, A, C b) D, B, A, C
correct answer from the following: c) A, B, C, D d) C, A, B, D
Information and

a) Both (A) and (R) are true and (R) is the correct 5. Identify the correct order of the following computer
explanation of (A) memories on the basis of increasing memory access
b) Both (A) and (R) are true but (R) is NOT the time (from low to high) [Oct-2020]
correct explanation of (A) (i) Registers (ii) Main Memory
c) (A) is true but (R) is false (iii) Secondary Memory (iv) Cache Memory
d) (A) is false but (R) is true Choose the correct answer from the following:
a) (i), (iii),(iv), (ii) b) (i), (iv), (ii), (iii)
c) (iii), (ii), (iv), (i) d) (ii),(iv), (i), (iii)

4.15
Professor Academy
6. With regard to computer memory, which of the c) Exabyte <Zettabyte < Terabyte < Petabyte
following statement(s) is/are TRUE? [Oct-2020] d) Zettabyte < Exabyte < Petabyte < Terabyte
(i) Cache memory is ‘volatile’ memory.
12. Given below are two statements: [Nov-2020]
(ii) Magnetic memory is ‘volatile’ memory.
Statement I: External hard disk is a primary memory.
(iii) Flash memory is ‘volatile’ memory.
Statement II: In general, pen drives have more storage
(iv) RAM is ‘volatile’ memory.
capacity than external hard disks.
Choose the correct answer from the following:
In the light of the above statements, choose the
a) (i) and (ii) only b) (iv) only
correct answer from the options given below:
c) (i) and (iv) only d) (iii) and (iv) only
a) Both Statement I and Statement II are true
7. In computers, a DVD-ROM is: [Oct-2020] b) Both Statement I and Statement II are false
a) An optical storage media and it can be written c) Statement I is correct but Statement II is false
many times. d) Statement I is incorrect but Statement II is true
b) A magnetic storage media and it can be written
13. Which one of the following represents one
only once.
billion characters?
c) An optical storage media and it can be written
only once. [Nov-2020]
d) A magnetic storage media and it can be written a) 1 Kilobyte b) 1 Megabyte
many times. c) 1 Gigabyte d) 1 Terabyte

8. Choose the correct lists of computer memory types 14. One Terabyte (TB) of memory is equal to:
from lowest to highest speed? [Sept-2020] a) 1024 KB [June - 2019]
a) Main Memory, Cache Memory, Secondary Storage b) 1024 * 1024 KB
b) Cache Memory, Secondary Storage, Main Memory c) 1024 * 1024 * 1024KB
c) Secondary Storage, Main Memory, Cache Memory d) 1024 * 1024 * 1024 Bytes
d) Secondary Stage, Cache Memory, Main Memory 15. Consider the following storage devices:
9. Given below are two statements [Sept-2020] a. Hard disc b. CD-ROM c. DVD-ROM
Statement I : Example of primary memory is RAM. Arrange these in ascending order of storage capacity
Statement II : Example of Secondary memory is Pen and select the correct option
drive a) (b), (c), (a) b) (b), (a), (c)
In Light of the above statements, choose the correct c) (c), (b), (a) d) (a), (c), (b)
answer from the options given below: 16. Which of the following is not considered as a form
a) Both statement I and Statement II are true of secondary storage?
b) Both statement I and Statement II are false a) RAM b) Floppy Disk
c) Statement I is correct but statement II is false c) Optical Disk d) Flash Drive
d) Statement I is incorrect but statement II is true
17. Which of the following memories must be refreshed
10. To differentiate a primary storage from a secondary many times per second?(Dec-2018)
storage in a computer system, which of the following a) EPROM b) Static ROM
statements is correct? [Oct-2020] c) RAM d)Dynamic RAM
a) Primary storage is slower, more expensive and
persistent. Answer Key
b) Primary storage is faster, more expensive and
Communication Technology

persistent. 1 2 3 4 5 6 7 8 9
c) Primary storage is faster, less expensive and not c c c d b c c c a
Information and

persistent.
10 11 12 13 14 15 16 17
d) Primary storage is faster, more expensive and not
persistent. d a b c c a a d
11. Which of the following is correct with respect to the
size of the storage units? [Nov-2020]
a) Terabyte < Petabyte < Exabyte <Zettabyte
b) Petabyte < Exabyte <Zettabyte < Terabyte


Professor Academy

4. Which one of the following computer component


LEVEL 2 is fastest in terms of speed of access? [June - 2019]
1. Identify the correct order of following different types of a) USB Drive b) Solid State Drive
storage/memory components in a computer on the basis c) RAM d) Hard Disk Drive
of price per bytes of storage from most expensive to least
expensive: [Oct-2020] 5. Select the option that contains only optical storage
media [June-2019]
(i) DDR4 RAM (ii) HDD
(iii) SSD (iv) CPU Cache a) USB Memory stick, Blu-Ray disk, CD-ROM,
Choose the correct answer from the options given DVD
below: b) DVD, CD-ROM, USB memory stick, CD-RW
a) (i), (iv), (iii), (ii) b) (iv), (i). (iii), (ii)
c) Hard disk, USB memory stick, CD-ROM, DVD
c) (i), (ii), (iii), (iv) d) (iv), (i), (ii), (iii)
d) DVD, CD-R, Blu-Ray Disk, CD-RW
2. Amit has decided to use either a DVD-R or DVD
RW. Select statements that are True for these storage 6. Which of the following storage devices stores
devices. [June - 2019] maximum amount of data? [June-2019]
P: Both DVD-R and DVD-RW are read only a) Compact disc b) Floppy disc
Q: DVD-R can be written to only once c) Hard disc d) Magnetic optic disc
R: DVD-RW can be written to many times
S: Both DVD-R and DVD-RW can be written to only 7. Select the option that storage devices in order of
once. capacity from lowest to highest [Dec-2019]
Options: a) CD-ROM, DVD-ROM, Blu-Ray
a) P only b) S only b) Blu-Ray, CD-ROM, DVD-ROM
c) P and R only d) Q and R only c) DVD-ROM, Blu-Ray, CD-ROM
3. PROM d) DVD-ROM, CD-ROM, Blu-Ray
(i) Programmable read only memory
(ii) Non-volatile Answer Key
(iii) Volatile
(iv) Programmable read on memory 1 2 3 4 5 6 7
Choose the correct option from the following: b d d c d c a
a) (iii) & (iv) b) (ii) & (iv)
c) (i) & (iii) d) (i) & (ii)

Communication Technology
Information and

4.17
Professor Academy
every computer is using a Graphical User Interface
SOFTWARE
(GUI) Based operating system that is much easier to
These are the set of instruction or more generally use and operate.
a collection of computer programs. Example of computer operating systems
Software tells the hardware how to work and ➢ Microsoft Windows : PC and IBM Compatible
perform different tasks on a computer system. At operating system. A Microsoft window is the
the lowest level software is in a form of an assembly most commonly used operating system.(Can
language, a set of instructions in a machine – include all MS Windows OS).
understandable form. At the highest level, software is ➢ Apple Mac OS: Apple Mac operating system.
in a form of high-level languages, which are compiled The only Apple computer operating system is
or interpreted into machine language code. They can Mac OS.
be further enumerated by the type of work done by ➢ Ubuntu Linux : A popular variant of Linux used
programs. The three basic types are: with Pc and IBM compatible computers.
1) The Operating System (System Software): – ➢ Google Android: An operating system used
It is the main program that governs and maintains with Android compatible phones.
the inter-cooperation of the components of a ➢ Unix: Unix Operating System is a multitasking
computer system. It controls the working of a environment. A user can also run multiple
computer system and performs essential tasks like programs at the same time.
Disk maintenance and managing screen etc. For e.g.
Booting of Computer
Microsoft Windows, Linux, Mac OS etc.
2) Programming Language Software: These An Operating system (OS) is basic software that
are basically tools use to create, debug, maintain, or makes the computer to work. When a computer is
otherwise support other programs and applications. switched on, there is no information in its RAM. At
the same time, in ROM, the pre-written program
3) Application software: It performs productive called POST (Power on Self-Test) will be executed
tasks for user such as word processing and database first. This program checks if the devices like RAM,
management etc.,. keyboard, etc., are connected properly and ready to
Apart from these three basic types of software, operate. If these devices are ready, then the BIOS
there are some other well-known forms of computer (Basic Input Output System) gets executed. This
software like Inventory Management Software. process is called Booting. Thereafter, a program called
“Bootstrap Loader” transfers OS from hard disk into
The Language Processor – The hardware main memory. Now the OS gets loaded (Windows/
components present in the computer system does Linux, etc.,) and will get executed. Booting process is
not understand human language. of two types.
Operating System 1) Cold Booting
An operating system or OS is a software program 2) Warm Booting
that acts as an interface between the user and the The system does not start from initial state and so all
Communication Technology

computer hardware and controls the execution of all diagnostic tests need not be carried out in this case.
kinds of programs. It enables the computer hardware There are chances of data loss and system damage as
Information and

to communicate and operate with the computer the data might not have been stored properly.
software. Without a computer operating system, a Recycle Bin
computer and software programs would be useless.
The recycle bin is an icon on the Windows
An operating system is the most important software
that runs on a computer. It manages the computer’s desktop that represents a directory where deleted
memory and processes, as well as all of its software files are temporarily stored. This enables you to
and hardware. When computers were first introduced, retrieve files that you may have accidentally deleted.
The Recycle Bin is an area in Windows OS that contains
the users interacted with them using a command line
interface, which required commands. Today, almost files deleted from the hard drive.

Professor Academy
Editor Assembly-Level Language: These are the Low-
Editors or text editors are software programs that Level Language(LLL), that forms a correspondence
enable the user to create and edit text files. In the between machine level instruction and general
field of programming, the term editor usually refers assembly level statements. Assembly language uses
to source code editors that include many special a mnemonics to represent each low-level machine
features for writing and editing code. instruction or operation-code also called the op-
codes. For e.g. ADD instruction is used to add two
entities, the HALT instruction is used to stop a
Programming Language Software process etc. It is a machine dependent language and
varies from processor to processor.
Programming language: It is a set of commands,
instructions, and other syntax use to create a software Algorithmic languages: Algorithmic languages
program. Languages that programmers use to write are designed to express mathematical or symbolic
code are called “high-level languages.” This code can computations. They can express algebraic operations
be compiled into a “low-level language,” which is in notation similar to mathematics and allow the
recognized directly by the computer hardware. use of subprograms that package commonly used
operations for reuse. They were the first high-level
Programming Language-Examples languages.
➢ FORTRAN ➢ ALGOL Language Transilators
➢ LISP ➢ COBOL
Assembler: An assembler is a program that converts
➢ C ➢ C++
assembly language into machine code. It takes the
➢ SQL ➢ PHP basic commands and operations from assembly
➢ JAVA ➢ Visual Basic code and converts them into binary code that
➢ Phython ➢ Matlab can be recognized by a specific type of processor.
➢ R ➢ Perl Assemblers are similar to compilers in that they
produce executable code. This language processor is
➢ Ruby ➢ C# used to convert the assembly language into machine
➢ Go ➢ Swift level language.
High-Level Language : A programming language Compiler: This language processor is used to convert
is a set of commands, instructions, and other syn- High-Level Language into machine level language
tax use to create a software program. Languages that in one go, thus execution time is fast. The error
programmers use to write code are called “high-lev- detection is difficult in a compiler. Programming
el languages.” This code can be compiled into a Languages like C, C++ and Scala use compiler.
“low-level language,” which is recognized directly Interpreter: This language processor is also used
by the computer hardware. High-level languages are to convert High-Level Language into machine
designed to be easy to read and understand. level language line-by-line, thus execution time is
slow. Error-detection is easier in an interpreter as
Low Level Language/Machine Language : A it reports as soon as a bug is caught and restarts
machine language consists of the numeric codes
Communication Technology
the process. This consumes unnecessary memory.
for the operations that a particular computer can Programming Languages like Python, Ruby and Java
execute directly. The codes are strings of 0s and
Information and

uses an interpreter.
1s, or binary digits (“bits”), which are frequently
converted both from and to hexadecimal (base 16) The Device Drivers: The device drivers and the
for human viewing and modification. Machine device programs or the system software that acts
language instructions typically use some bits to as an interface between the various Input-Output
represent operations, such as addition, and some to device and the users or the operating system. For e.g.
represent operands, or perhaps the location of the the Printers, Web cameras come with a driver disk
next instruction. Machine language is difficult to that is needed to be installed into the system to make
read and write. the device run in the system.

4.19
Professor Academy
ALGORITHM the reservation system and banking system. These
are divided into two types:
An algorithm is a set of instructions designed to
perform a specific task. This can be a simple process, The General Purpose Application Software: These
such as multiplying two numbers, or a complex are the types of application software that comes
operation, such as playing a compressed video file. in-built and ready to use, manufactures by some
In computer programming, algorithms are often company or someone. For e.g.
created as functions. ➢ Microsoft Excel – Used to prepare excel sheets.
An algorithm is a specific procedure for solving a ➢ VLC Media Player – Used to play audio/video
well-defined computational problem. The files.
development and analysis of algorithms is ➢ Adobe Photoshop – Used for designing and
fundamental to all aspects of computer science: animation and many more.
artificial intelligence, databases, graphics, Utility Software
networking, operating systems, security, and so on.
These are the most basic type of software which
An algorithm must have provides high utility to the user and the system. These
five properties: Points to Remember perform the basic but daily need tasks. For e.g.
➢ Input specified Antivirus Software: These provide protection to
➢ Output specified the computer system from unwanted malware and
➢ Definiteness viruses. For e.g. QuickHeal, McAfee etc.
➢ Effectiveness Disk Defragmenter Tools: These help the users to
➢ Finiteness analyse the bad sectors of the disk and rearrange the
files in a proper order.
The characteristics of a good algorithm are:
➢ Precision – the steps are precisely stated(defined). Text-editors: These help the users to take regular
notes and create basic text files. For e.g. Notepad,
➢ Uniqueness – results of each step are uniquely
Gedit etc.
defined and only depend on the input and the
result of the preceding steps. Open Source Software
➢ Finiteness – the algorithm stops after a finite Open source software is free. The term open source
number of instructions are executed. refers to something people can modify and share
➢ Input – the algorithm receives input. because its design is publicly accessible.The term
➢ Unambiguous − Algorithm should be clear and originated in the context of software development to
designate a specific approach to creating computer
unambiguous.
programs. As organizations aim at deriving more
Not a characteristics of a good algorithm are: business values from less, open-source software can
➢ The algorithm does not stop in a finite number deliver high flexibility, lower IT costs and increased
of times. opportunities for innovation.
➢ The algorithm does not display the output.
Proprietary Software
Communication Technology

➢ The algorithm obtains the input but does not


apply it. Software or (Proprietary software)- They are also
Information and

➢ The algorithm does not precisely state the steps known as Closed-source software. These types of
of execution. applications are usually paid and have intellectual
property rights or patents over the source code.
Application Software Proprietary software is any software that is
These are the basic software used to run to accomplish copyrighted and bears limits against use, distribution
a particular action and task. These are the dedicated and modification that are imposed by its publisher,
software, dedicated to performing simple and single vendor or developer. Proprietary software remains
tasks. For e.g. a single software cannot serve to both the property of its owner/creator and is used by end-
users/organizations under predefined conditions.

Professor Academy
With proprietary software, such as Microsoft
Windows, and Office, companies are required to Self Evaluation
upgrade both software and hardware on a timely
LEVEL 1
basis. Updates must be installed for the proper
working. However, not all updates are flexible with 1. Which of the following is NOT a system software?
all the versions of the software. a) Compiler b) Operating System
Alternatives to Proprietary Software c) Application Software d) Editor [Sept-2020]
It is interesting to see that there are so many 2. Which of the following is an application software?
open-source software alternatives for the existing a) Android b) iOS [Sept-2020]
proprietary software which are equivalent or more c) Linux d) MS Word
reliable, secure, and flexible. 3. Which of the following statements is true in respect
of computers? [Oct-2020]
Software Category Proprietary Equivalent Open-
Software source Software
a) Software is loaded into secondary storage from
RAM and is then executed by CPU.
Operating System Microsoft Linux Ubuntu
Windows b) Software is loaded into RAM from secondary
Browser Internet Explorer Mozilla Firefox storage and is then executed by CPU.
Office automation Microsoft Office Open Office c) Software is loaded into RAM from secondary
MATHWORKS MATLAB Sci Lab
storage and is then executed by motherboard.
Graphics Tool Adobe GIMP(GNU Image d) Software is loaded into secondary storage from
Photoshop Manipulation Program RAM and is then executed by motherboard
Drafting tool Auto CAD Archimedes 4. In computer related activities which of the following
Web Editors Adobe NVU is in appropriate for describing a language translator?
Dreamweaver a) Assembler b) Compiler
Desktop Publishing Adobe Acrobat PDF Creator c) Interpreter d) Codec [Dec-2019]
Blogs Blogger Word Press
5. A computer program that translates a program
Mobile IOS Android
statement by statement into machine language
Media Player Windows Media VLC
Player
is called a / an
Database Oracle, Microsoft My SQL, Mongo DB,
a) Compiler b) Simulator
SQLServer HADOOP c) Translator d) Interpreter
Server Microsoft Red Hat Server, Ubuntu 6. Select the true statement about an operating system
Window Server Server (OS)? [June - 2019]
Web Server IIS Apache
a) An OS controls peripheral, allocates memory and
organizes data into fields and records.
Freeware b) An OS provides protection against viruses and
controls peripherals
Software that can be copied and used without any c) An OS controls peripheral, and allocates memory
cost, although there may be some restrictions on and processor time Communication Technology
distribution. d) An OS controls the processor and peripherals
and allows the user to connect to the internet
Shareware
Information and

7. The set of computer programs that manage


It is a software that is freely distributed to users on the hardware/software of a computer is called
a trial basis before paying for it. Unlike freeware, [June - 2019]
a) Compiler system b) Operation system
shareware often has limited functionality or may
only be used for a limited time before requiring c) Operating system d) None of these
payment and registration. Once you pay for a 8. Which one of the following is an example of
shareware program, the program is fully functional Operating System ?
and the time limit is removed. a) Microsoft Word b) Microsoft Excel
c) Microsoft Access d) Microsoft Windows
4.21
Professor Academy
9. Software that you can download for free, but have to Reason (R): An assembler loads the operating system
pay to continue its use after a trial period is called: from the disc to the main memory of the computer.
a) Public domain software b) Freeware In the right of the above two statements, choose the
c) Open-source software d) Shareware [Dec-2019] correct answer:
10. Which of the following consists of different types of a) Both (A) and (R) are true and (R) is the correct
utility software? explanation of (A).
(i) Anti-virus Software (ii) Desktop Widgets b) Both (A) and (R) are true and (R) is not the correct
(iii) Compilers (iv) Operating System explanation of (A).
(v) Backup Software c) (A) is true but (R) is false.
a) (i),(ii),(iii),(iv) b) (i),(ii),(iii),(iv),(v)
d)(A) is false but (R) is true.
c) (i),(ii),(v) d) (iii),(iv),(v)
3. Which of the following are examples of proprietary
11. Which of the follwing is a programming language? system software?
a) Deep learning b) Machine learning i) Microsoft Windows ii)Adobe Photoshop
c) Artificial Intelligence d) Python iii) Google Earth iv) Whatsapp
12. The Recycle Bin is an area in Windows OS that v) Firefox
contains files deleted from the : [Nov-2020]
Select the most appropriate answer
(i) hard drive (ii) Pen drive (iii) CD-ROM
a) (i) (ii)
Choose the correct answer from the following::
b) (i) (iii) and (iv)
a) (i) only b) (i) and (ii) only
c) (i) (ii) (iii) and (iv)
c) (ii) and (iii) only d) (i) and (iii) only
d) (i), (ii), (iii), (iv) and (v)
Answer Key 4. Given below are two statements. One labelled as
Assertion (A) and other is labelled as Reason (R).
1 2 3 4 5 6
Assertion (A): Windows 8 is a multiprocessing
c d b a d c Operating System.
7 8 9 10 11 12
Reason (R): Windows 8 allows processing of multiple
c d d c d a tasks simultaneously.
In the right of the above two statements, choose the
correct answer:
LEVEL 2 a) Both (A) and (R) are true and (R) is the correct
1. A confidential file needs to be deleted from a explanation of (A).
workstation. Which is the most effective way to ensure b) Both (A) and (R) are true and (R) is not the correct
this? [June-2019] explanation of (A).
a) Rename the file c) (A) is true but (R) is false.
b) Compress the file and back-up to tape
Communication Technology

c) Copy and paste the file into the recycle bin and d) (A) is false but (R) is true.
empty the recyclebin
Information and

d) Drag the file into the recycle bin and empty the Answer Key
recyclebin
1 2 3 4
2. Given below are two statements. One labelled as d c a b
Assertion (A) and other is labelled as Reason (R).
Assertion (A): A computer requires an operating
system to boot up initial start-up programs.


Professor Academy
➢ Geographical Information System - A Geo-
DATA AND INFORMATION
graphic Information System (GIS) is a system
We all know what computer is? It is an electronic designed to capture, store, manipulate, analyse,
device that processes the input according to the set manage, and present spatial or geographic data.
of instructions provided to it and gives the desired
output at a very fast rate. Computers are very MS Office Applications
versatile as they do a lot of different tasks such as
MS-Excel:
storing data, weather forecasting, booking airlines,
railway or movie tickets and even playing games. Microsoft Excel is a spreadsheet program
included in the Microsoft Office suite of applications.
➢ Data:
Spreadsheet presents tables of values arranged
Data is defined as a un- processed collection of in rows and columns that can be manipulated
raw facts, suitable for communication, interpretation mathematically using both basic and complex
or processing. arithmetic operations and functions.
e.g. 134, 16, ‘Kavitha’, ‘C’ is data. This will not
MS-Power Point:
give any meaningful message.
Microsoft Power Point is a computer software
➢ Information:
created by Microsoft which allows the user to create
Information is a collection of facts from which slides with recordings, narrations, transitions and
conclusions may be drawn. In simple words we can other features in order to present information. An
say that data is the raw fact that is processed to give example of Power Point is presentation software
meaningful, ordered or structured information. made by Microsoft.
For example Vanitha is 16 years old. This MS-Word:
information is about Vanitha and conveys some
meaning. This conversion of data into information is Microsoft Word is the most popular word
called data processing. processing software used today. A word processor
is essentially a computerized version of the standard
Information typewriter. However, the computer adds features
Data Process typewriters never dreamed of having like spell
check, the ability to save and store documents, copy
“A Computer is an electronic device that takes
and paste functions.
raw data (unprocessed) as an input from the user and
processes it under the control of a set of instructions Mail Merge
(called program), produces a result (output), and
saves it for future use.” Mail merge consists in combining mail and
letters and pre-addressed envelopes or mailing labels
Data Storage and Hierarchy for mass mailings from a form letter. Microsoft Word
Bit→Byte→Field→Record→File→Database can insert content from a database, spreadsheet, or
table into Word documents. Communication Technology
➢ Database System - A Database is a shared col-
Desktop Publishing
lection of logically related data and description
Desktop publishing (DTP) is the creation of
Information and

of these data, designed to meet the information


needs of an organization. A Database Manage- documents using page layout software on a personal
ment System, i.e. DBMS, is a software system (“desktop”) computer.
which is used to enables users to define, create, Word Processing
maintain, and control access to the database. Word processor is a software package that
➢ Data warehouse - A large store of data accumu- enables you to create, edit, print and save
lated from a wide range of sources within a com- documents for future retrieval and reference.
pany and used to guide management decisions Creating a document involves typing by using
a keyboard and saving it. Editing a document
4.23
Professor Academy
involves correcting the spelling mistakes, if any, a) Mail join b) Mail copy
deleting or moving word sentences or paragraphs. c) Mail insert d) Mail merge
Word processor (more formally known as
document preparation system) is a computer 5. You need to use automatic calculations in
application used for the production (including preparing a budget. Which software application
composition, editing, formatting and possibly should be used? [June - 2019]
printing) of any sort of printable material. a) Spreadsheet b) Presentation
c) Word processing d)Desktop publishing
Features of Word processing
Most word processor available today allows more Answer Key
than just creating and editing documents. They have 1 2 3 4 5
wide range of other tools and functions, which are b c b d a
used in formatting in the documents. The following
are the main features of a Word processor.
LEVEL 2
➢ Texting is typing into the computer, which allows
1. Given below are two statements. One labelled as
alterations to be made easily. Assertion (A) and other is labelled as Reason (R).
➢ Words and sentences can be inserted, amended Assertion (A): Microsoft Office is a collection of
or deleted. applications and each application has a unique
➢ Paragraphs or text can be copied/ moved purpose and requirement.
throughout the documents. Reason (R): The basic function of MS office is to
➢ Margins and page length can be adjusted as allow all these applications to run in the system and
desired. help us create meaningful documents.
➢ Spelling can be checked and modified through In the right of the above two statements, choose the
the spell check facility. correct answer:
➢ Multiple document / files can be merged. a) Both (A) and (R) are true and (R) is the correct
➢ Multiple copies of letters can be generated with explanation of (A).
different address through the Mail merge facility. b) Both (A) and (R) are true and (R) is not the
correct explanation of (A).
Self Evaluation c) (A) is true but (R) is false.
d) (A) is false but (R) is true.
LEVEL 1
2. Consider the following statements.
1. Information is [Sept-2020]
1. Microsoft Office 2009 is not a version of MS
a) Raw data b) Processed data Office.
c) Redundant data d) Always ordinal data
2. Ctrl + L can be used to align the text to the left
2. ------------Represents raw facts, whereas ------------ side of the document in MS Word.
is processed meanngful data [Nov-2020]
Communication Technology

Which among above is/are correct


a) Information, Bits b) Records, Bytes
c) Data, Information d) Information, a) Only 1 b) Only 2
Information and

Reporting c) Both 1 and 2 d) Neither 1 nor 2


3. Which one of the following tasks is associated
Answer Key
with changing appearance of a document in word
processing? [Dec - 2019] 1 2
a) Editing b) Formatting a c
c) Writing d) Printing
4. Which of the following enables us to send the same
letter to different persons in MS Word [Dec - 2019]

Professor Academy

NUMBER SYSTEM (1101)2 = 1 × 23 + 1 × 22 + 0 × 21 + 1 × 20


= 8+4+0+1
= (13)10
1. Decimal number system
2. Binary number system
3. Octal number system 3. Octal Number System
4. Hexadecimal number system Octal number system uses digits 0,1,2,3,4,5,6 and
7 (8 digits). Each octal digit has its own positional
Number System
value or weight as a power of 8.
Decimal (0-9) Example: The Octal sequence (547)8 has the decimal
equivalent:
Binary (0, 1)
(547)8 = 5 × 82 + 4 × 81 + 7 × 80
Octal (0-7) = 5 × 64 + 4 × 8 + 7 × 1
= 320 + 32 + 7
= (359)10
Hexa Decimal
(0-9)(A-F)
4. Hexadecimal Number System
1. Decimal Number System A hexadecimal number is represented using
base 16. Hexadecimal or Hex numbers are used as
It consists of 0,1,2,3,4,5,6,7,8,9(10 digits). It is the a shorthand form of binary sequence. This system is
oldest and most popular number system used in our used to represent data in a more compact manner.
day to day life. In the positional number system, each Since 16 symbols are used, 0 to F, the notation is
decimal digit is weighted relative to its position in the called hexadecimal. The first 10 symbols are the same
number. This means that each digit in the number is as in the decimal system, 0 to 9 and the remaining
multiplied by 10 raised to a power corresponding to 6 symbols are taken from the first 6 letters of the
that digit’s position. alphabet sequence, A to F, where A represents 10, B
is 11, C is 12, D is 13, E is 14 and F is 15.
(123)10 = 1x102 + 2x101 + 3x100
Example: The hexadecimal sequence (25)16 has the
=100 + 20 + 3
decimal equivalent:
= (123) 10
(25)16 = 2 × 161 + 5 × 160
2. Binary Number System = 32 + 5
= (37)10
There are only two digits in the Binary system,
namely 0 and 1. The numbers in the binary system
are represented to the base 2 and the positional Number System Conversions
multipliers are the powers of 2. The left most bit in
Decimal to other number system
the binary number is called as the Most Significant
Bit (MSB) and it has the largest positional weight. 1. Decimal to Binary Conversion
The right most bit is the Least Significant Bit (LSB) 2. Decimal to Octal Conversion
Communication Technology

and has the smallest positional weight. 3. Decimal to Hexadecimal Conversion


4. Fractional Decimal to Binary Conversion
Information and

1 1 0 1
1. Decimal to Binary Conversion
Decimal numbers can be converted to binary by
repeated division of the number by 2 while recording
MSB LSB
the remainder.
Example Example: Convert (65)10 into its equivalent binary
The binary sequence (1101)2 has the decimal number.
equivalent:

4.25
Professor Academy
4. Conversion of fractional Decimal to Binary
2 65 Remainder The method of repeated multiplication by 2 has
LSB to be used to convert such kind of decimal fractions.
2 32 1 Note:
65/2 = 32 + 1 Multiply the decimal fraction by
2 16 - 0
32/2 = 16 + 0 Step 1 : 2 and note the integer part. The
2 8- 0 integer part is either 0 or 1.
16/2 = 8+0
2 4- 0 Discard the integer part of the previous
8/2 = 4+0 product. Multiply the fractional part
2 2- 0 4/2 = 2+0 Step 2 : of the previous product by 2. Repeat
1- 0 2/2 = 1+0 Step 1 until the same fraction repeats
MSB or terminates (0).
The resulting integer part forms a
(65)10 = (1 0 0 0 0 0 1)2 sequence of 0s and 1s that become
Step 3 :
the binary equivalent of decimal
fraction.
2. Decimal to Octal Conversion The final answer is to be written
Decimal numbers can be converted to octal by Step 4 : from first integer part obtained till
repeated division of the number by 8 while recording the last integer part obtained.
the remainder.
Example:
Convert (65)10 into its equivalent Octal number. Integer Part

0.4 0 (first integer part obtained)


0.2 × 2 =
8 65
LSB 0
8 8 - 1 0.4 × 2 = 0.8

1 - 0 0.8 × 2 = 16 1
MSB
0.6 × 2 = 1.2 1
(65)10 = (1 0 1)8 (last integer part obtained)
0.2 × 2 = 0.4 0

3. Decimal to Hexadecimal Conversion


Decimal numbers can be converted to Note: Fraction repeats, the product is the same
Hexadecimal by repeated division of the number by as in the first step. Write the integer parts from
16 while recording the remainder. top to bottom to obtain the equivalent fractional
binary number. Hence (0.2)10= (0.00110011…)2 =
Example: (0.00110011)2
Communication Technology

Convert (31)10 into its equivalent hexadecimal


number. Binary to other number system
Information and

1. Binary to Decimal Conversion


8 65 2. Binary to Octal Conversion
LSB
1 - 15 3. Binary to Hexadecimal Conversion
MSB 4. fractional Binary to Decimal Conversion
1. Binary to Decimal Conversion
(16)10 = (1 F)16
To convert Binary to Decimal use positional
notation method.

Professor Academy
Example:
Write down the Binary digits and
Step 1 : list the powers of 2 from right to Convert (11010110)2 into octal equivalent
left (Positional Notation). number.
011 010 110
For each positional notation

{
{
{
Step 2 : written for the digit, now write the
equivalent weight.
3 2 6
Multiply each digit with its
Step 3 :
corresponding weight.
(1 1 0 1 0 1 1 0)2 = (326)8
Step 4 : Add all the values. 3. Binary to Hexadecimal Conversion
To convert a binary number to hexadecimal
Example number, these steps are followed −
Convert (111011)2 into its equivalent decimal • Starting from the least significant bit, make
number. groups of four bits.
• If there is one or two bits less in making
the groups, 0s can be added after the most
Weight 32 16 8 4 2 1
significant bit.
Positional Notation 25 24 23 22 21 20 • Convert each group into its equivalent octal
Given number 1 1 1 0 1 1 number.
Hexadecimal number Binary equivalent
0 0000
32 + 16 + 8 + 0 + 2 + 1 = (59)10 1 0001
(1 1 1 0 1 1)2 = (59)10 2 0010
3 0011
4 0100
5 0101
2. Binary to Octal Conversion 6 0110
To convert a binary number to octal number, 7 0111
8 1000
these steps are followed − 9 1001
• Starting from the least significant bit, make A 1010
B 1011
groups of three bits. C 1100
D 1101
• If there are one or two bits less in making E 1110
the groups, 0s can be added after the most F 1111
significant bit. Table (B) Hexadecimal numbers and their Binary equivalent

• Convert each group into its equivalent octal Example:


number.
Convert (1111010110)2 into Hexadecimal
Communication Technology

Octal Binary Equivalent number


0 000
Information and

1 001
2 010 0011 1101 0110
3 011
{
{
{

4 100
5
6
101
110
3 D 6
7 111 (1 1 1 1 0 1 0 1 1 0)2 = (3D6)16
Table (A) Octal numbers and their Binary equivalent

4.27
Professor Academy
Hexadecimal to other number system a. Invert all the bits in the binary sequence (i.e.,
change every 0 to1 and every 1 to 0 ie.,1’s
1. Hexadecimal to Decimal Conversion complement)
2. Hexadecimal to Binary Conversion
b. Add 1 to the result to the Least Significant Bit
3. Hexadecimal to Octal conversion (LSB).
1. Hexadecimal to Decimal Conversion Example
To convert Hexadecimal to Decimal we can use 2’s Complement represent of (-24)10
positional notation method.
1. Write down the Hexadecimal digits and list Binary equivalent of + 24 11000
the powers of 16 from right to left(Positional 8 bit format 00011000
Notation).
1’s Complement 11100111
2. For each positional notation written for the
digit, now write the equivalent weight. Add 1 to LSB +1
3. Multiply each digit with its corresponding weight. 2’s Complement of -24 11101000
4. Add all the values to get one final value.
Example Self Evaluation
Convert (25F)16 into its equivalent Decimal
number. LEVEL 1
Weight 256 16 1 1. Which of the following statement(s) is/are TRUE?
S1: The decimal number 11 is larger than the
Positional Notation 162 161 160 hexadecimal number 11.
Given number 2 5 F (15) S2: In the binary number 1110.101, the fractional
part has the decimal value as 0.625. [Dec-2019]
(25 F)16 = 2 × 256 + 5 × 16 + 15 × 1 a) S1 only b) S2 only
c) Both S1 and S2 d) Neither S1 nor S2
= 512 + 80 + 15
2. Which of the following statement is/are correct?
(25 F)16 = (607)10
a) for the sequence of integers represented in binary
as 00111, 01001, 01011, p=…………, the next
2. Hexadecimal to Binary Conversion integer p would be represented as 01101
Write 4 bits Binary equivalent for each b) A byte is n binary number consisting of exactly
Hexadecimal digit for the given number using 8 bits
positional notation method. Choose the correct option: [Dec - 2019]

Example: a) a only b) b only


c) Both a and b d) Neither a nor b
Convert (8BC)16 into equivalent Binary number
3. What is the decimal equivalent of binary
8 B C number1100110? Communication Technology
p p p a) 102 b) 204
c) 153 d) 51
1000 1011 1100
Information and

4. The binary equivalent of decimal number 75?


(8BC)16 = (1 0 0 0 1 0 1 1 1 1 0 0)2
a) 1101001 b) 101001
3. Hexadecimal to octal Conversion c) 100101 d) 1001011 [Jun - 2019]
To Convert Hexadecimal to binary then convert 5. If the binary equivalent of the decimal number 48
Binary to Octal. is 110000, then the binary equivalent of the decimal
number 51 is given by
2’s Complement representation
a) 110011 b) 110010
The 2’s-complement method for negative number c) 110001 d) 110100
is as follows:
4.29
Professor Academy
6. Which one of the following is correct? INTRODUCTION TO INTERNET
a) (17)10=(17)16 b) (17)10=(17)8
c) (17)10=(10111)2 d) (17)10=(10001)2 Internet is the world’s largest computer network,
7. Consider the following statements. the network of networks, scattered all over the
A) Decimal equivalent of Binary number 1100110 world. It was created nearly twenty five years ago
is 104. as a project for U.S Department of Defence. A
B) Numbers, pictures and words with context are global computer network providing a variety of
known as data. information and communication facilities,
Which among above is/are correct consisting of interconnected networks using
a) Only A b) Only B standardized communication protocols. The
c) Both A and B d) Neither A nor B Internet is a global network of computers that
allows many millions of computer users to share
Answer Key and exchange information. Internet is a rich source
1 2 3 4 5 6 7 of information. Many thousands of computers are
b c a d a d b linked to internet, hold vast quantities of data that
you can access from your personal computers. can
get recent data from internet which makes their
LEVEL 2 knowledge up-to-date. Accessing the information
1. Given below are two statements: [Nov-2020] through internet is much faster. Information can
Statement I: Minimum number of bits required to be downloaded into the computer and printout can
store any 3-digit decimal number is 10. be taken. Many people have heard that the Internet
Statement II: The data in a digital computer is stored began with some military computers in the
in terms of bits/ bytes where one Peta Byte is equal Pentagon called Arpanet in 1969. The theory goes
to 2^50 bits. on to suggest that the network was designed to
In the light of the above statements, choose the survive a nuclear attack. A project which began in
correct answer from the following:: the Pentagon that year, called Arpanet, gave birth
a) Both Statement I and Statement II are true to the Internet protocols sometime later (during
b) Both Statement I and Statement I are false the 1970’s), but 1969 was not the Internet’s
beginnings. Surviving a nuclear attack was not
c) Statement I is correct but Statement II is false
Arpanet’s motivation, nor was building a global
d) Statement I is incorrect but Statement II is true communications network.
2. The binary equivalent of (–15)10 is (2’s complement
system is used) Origins and Development of the Internet
a) 11110001 b) 11110000 1957 ARPA was formed.
c) 10001111 d) None of these 1969 ARPANET was commissioned for research
3. The binary equivalent of (–19)10 in signed into computer networking.
magnitude system is
1971 E –mail and e-mail utility became available.
a) 11101100 b) 11101101
1973 First international connections to
c) 10010011 d) None of these
ARPANET and University College of
Communication Technology

4. If (Y)x represents a number Y in base x, then London.


which of the following numbers is smallest of all?
Information and

[June-2019] 1974 Telnet.


a) (11110)2 b) (11110)8 1975 Operational management of the internet
transferred to DCA (DISA).
c) (11110)10 d) (11110)16
1979 USENET : ARPA established the Internet
Answer Key Configuration Control Board (ICCB).
1 2 3 4 1982 TCP/IP suite declared as standard of
c a b a Department of Defense.
1983 MILNET separated from ARPANET.

Professor Academy
1985 Domain Name System introduced, Speed: Up to 10-100 Mbps
number of hosts exceeds 1000. Advantages: Low Cost, Resource Sharing,
1986 NSFNET was established. IETF and IRTF Security
came into existence under the LAB. Disadvantages: Area Covered Limited when
1988 Internet Relay Chat developed. number of nodes increases, performance
decreases.
1989 Number of hosts exceeds 100,000.
2. MAN – Metropolitan Area Network
1990 ARPANET ceases to exist; Dial up internet
connections by ILSPs. Range: 10 to 15 Miles
1991 WAIS, Gopher and World Wide Web. Location: MAN is a network designed to extend
over an entire city
1992 Internet Society is chartered; Number of
hosts break 1,000.000, Veronica released. Speed: Up to 5 – 10 Mbps
1993 Business and media take note of the Advantages: Wider than LAN
internet; Mosaic takes the internet by Disadvantages: Data rate is slow compared to
storm. LAN, Cost higher than LAN
1994 ARPANET /internet celebrates 25th 3. WAN – Wide Area Network
anniversary; shopping malls on the Range: Above 1000 Kms
internet. Location: It Span entire countries and continents
1995 NEFNET revert back to research network Speed: Upto 256 Kbps to 2 Mbps
Main US back bone traffic rerouted through
Advantages: Large geographical Area
interconnected network providers. Search
engines developed. Disadvantages: Complicated and Complex, High
Cost, Requires high Performance Devices, Low
1996 Government restrictions on the internet
security, Cost higher than LAN
use around world.
4. PAN – Personal Area Network
Types of Network Range: Up to 100 meters
Depending upon geographical area covered by a Location: Used for shorter distance, controlled
network, it is classified as: by a single person within a single building
1. Local Area Network (LAN) Speed: up to 250 Kbps
2. Metropolitan Area Network (MAN) Advantages: Efficient, Cost effective and
convenient. Controlled by a single person
3. Wide Area Network (WAN) Hotspot may connect up to 8 devices
4. Personal Area Network (PAN) Disadvantages: Shorter distance up to 10 meters
5. Campus Area Network (CAN) only. Data rate is low compared to other network
6. Wireless Local Area Network (W-LAN) 5. CAN – Campus Area Network
Range: Up to 5 Kms
7. Storage (System) area network (SAN)
Communication Technology

Location: Larger than LAN, but smaller than


8. Global area network (GAN) MAN. University, school or small business,
Information and

9. Enterprise Private Network (EPN) enterprise


10. Virtual Private Network (VPN) Speed: 40 KB/s TO 1 MB/s
Advantages: Cost effective, wired or Wired
1. LAN – LOCAL AREA NETWORK
Network, High Bandwidth Multi-departmental
Range: Up to 10 Km Network access
Location: Refers to same office, same building, Disadvantages: Difficult to manage
same company and in same schools

4.31
Professor Academy
6. WLAN – Wireless Local Area Network Difference Between Wired and Wireless Network
Range: Up to 50 Kms Wired Network
Location: Ranges from a single room to an entire “Wired” as the name suggests refers to any
campus Uses Wi-Fi or Bluetooth, Radio waves physical medium connected through wires and
Speed: 1 Mbps to 54 Mbps cables. The wires/cables can be copper wire, twisted
Advantages: Portable Installation is quick and pair or even fibre optic. Wired connectivity is
easy responsible for providing high security with high
Disadvantages: Low Bandwidth due to Bandwidth provisioned for each user.
interference In fact, Wired connectivity is considered highly
7. SAN – Storage area network reliable and incurs very low delay, unlike Wireless
Range: Up to 10 Km (Same as LAN) connectivity.
Location: Refers to same office, same building, Wireless Network
same company and in same schools “Wireless” as the term refers, uses air as a medium
Speed: Up to1 Gbps – 4 Gbps to send electromagnetic waves or infrared waves.
Advantages: High speed of data transfer, Wireless devices have antennas for communication.
Centralized backup, dynamic failover protection, Wireless connectivity provides a major benefit of
Adding/removing of storage devices is easy, Data user mobility and ease of deployment. Wireless
security. becomes more useful in areas where Wires can’t be
Disadvantages: Not good for high traffic, reached.
Sensitive data may be leaked. Though wireless connectivity is less secured
8. GAN – Global area network and higher delay than wired connectivity, it is still
preferred communication technology for customers.
A global area network (GAN) refers to a network
Wireless also earns low Installation cost in contrast
composed of different interconnected networks
to wired connectivity.
that cover an unlimited geographical area. The
term is loosely synonymous with Internet, which is
considered a global area network. World Wide Web - Terminology
9. EPN - Enterprise Private Network The World Wide Web (WWW), commonly
known as the Web, is an information system where
An enterprise private network is a computer documents and other web resources are identified
network that helps enterprise companies with a by Uniform Resource Locators (URLs, such as
number of disparate offices connect those offices to https://example.com/), which may be interlinked by
each in a secure way over a network. An enterprise hypertext, and are accessible over the Internet. The
private network is mainly set up to share computer WWW is the most widely used part of the Internet.
resources. It is based on URL’s and http, and allows dynamic
10.Virtual Private Network (VPN) links to an incredible amount of information.
Communication Technology

A virtual private network (VPN) is a network Internet


that is constructed using public wires usually the
A global network connecting millions
Information and

internet to connect remote users or regional offices


to a company’s private, internal network. computer. As of 1998, the Internet has more than
100 million users worldwide, and that number
11. WAP (Wireless Application Protocol) is growing rapidly. More than 100 countries are
Wireless Application Protocol (WAP) is a linked into exchanges of data, news and opinions.
technical standard for accessing information over a Unlike Internet speed is measured by Gbps
mobile wireless network. A WAP browser is a web online services, which are centrally controlled,
browser for mobile devices such as mobile phones the Internet is decentralized by design. Each
that use the protocol. Internet computer, called a host, is independent.

Professor Academy
Its operators can choose which Internet services Search Engine
to use and which local services to make available Search engine is used for searching the
to the global Internet community. Remarkably, information which is present in the web searching in
this anarchy by design works exceedingly well. the search engine is done with the help of keyword.
There are a variety of ways to access the Internet. Some of the examples of search engine are Google,
Most online services, such as America Online, Bing, Opera and Yahoo. Purposes of search engine
offer access to some Internet services. It is also are to locate the information which the user is
possible to gain access through a commercial seeking.
Internet Service Provider (ISP). For most of its
existence the Internet was primarily a research Hypertext
and academic network. More recently, commercial Hypertext is one of the key underlying concepts
enterprises and a vast number of consumers have of the World Wide Web, where Web pages are often
come to recognize the Internet’s potential. Today written in the Hypertext Markup Language (HTML).
people and businesses around the world can use
the Internet to retrieve information, communicate Hypertext Markup Language is the standard
and conduct business globally and access a vast markup language for documents designed to
array of services and resources on-line. be displayed in a web browser. They also have
commands that let you import images,sounds,
ISP animations, and movies. Each page contains a series
short form a Internet Service Provider, a of connections to other pages called hyperlinks.
company that provides access to the Internet. For This file have to save with the extension of .html
a monthly fee, the service provider gives you a or .htm. As implemented on the Web, hypertext
software package, username, password and access enables the easy-to-use publication of information
phone number. Equipped with a modem, you can over the Internet.
then log on to the Internet and browse the World
Wide Web and USENET, and send and receive Http
e-mail. In addition to serving individuals, ISPs also Short for Hypertext Transfer Protocol, the
serve large companies, providing a direct connection underlying protocol used by the World Wide
from the company’s networks to the Internet. ISPs Web. HTTP defines how messages are formatted
themselves are connected to one another through and transmitted, and what actions Web servers
Network Access Points (NAPs). ISPs are also called and browsers should take in response to various
IAPs (Internet Access Providers). commands. For example, when you enter a URL in
your browser, this actually sends an HTTP command
Browser to the Web server directing it to fetch and transmit
Short for Web browser, a software application the requested Web page.
used to locate and display Web pages. Most modern
browsers can present multimedia information, Domain Name
including sound and video, though they require It is a name or an identity which become an
plug-ins for some formats. A web browser is a online identity and can be access by the web browser
software application for accessing information on when connected to internet.
Communication Technology
the World Wide Web.
➢ Firefox ➢ Chrome Generic
Description
Information and

Domain Name
➢ Safari ➢ Maxthon
.com Commercial organization
➢ Opera ➢ Vivaldi .gov Government Institution
➢ Avast secure browser ➢ Tor browser .org Non Profit Organization
➢ Brave browser .net Network Support Group
➢ Internet explorer & edge .edu Educational Institution

4.33
Professor Academy

Virtual Private Web page


Description A document on the WWW. Every web page is
Network (VPN)
identified by a unique URL (Uniform Resource
.in India
Locator).
.au Australia Web site
.us United states of America A site (location) on the World Wide Web. Each
Web site contains a home page, which is the first
.jp Japan document users see when they enter the site. The site
might also contain additional documents and files.
.ru Russia Each site is owned and managed by an individual,
.sg Singapore company or organization.
Difference between Webpage and Website
The domain name system (DNS) Web page Website
DNS is a naming database in which internet Consist of a single A Collection of
domain names are located and translated into document displayed by Multiple web page
internet protocol (IP) addresses. The domain a browser displayable by a
name system maps the name people use to locate browser
a website to the IP address that a computer uses to
locate a website. Shares a Unique Has its own unique
domain Name domain name
URL Makes up a website Contains one or more
URLs make it possible to direct both people and web pages
software applications to a variety of information, Home page
available from a number of different Internet The main page of a Web site. Typically, the home
protocols. Abbreviation of Uniform Resource page serves as an index or table of contents to other
Locator, the global address of documents and other
documents stored at the site.
resources on the World Wide Web. The first part of
the address indicates what protocol to use, and the Intranet
second part specifies the IP address or the domain
name where the resource is located. An intranet is a computer network for sharing
information, collaboration tools, operational
Uniform Resource Locator systems, and other computing services within an
organization, usually to the exclusion of access by
Sub domain Top Level domain outsiders.
An intranet is a private computer network
that uses Internet Protocol technologies to securely
http://www.google.com
share any part of an organization’s information
Communication Technology

or operational systems within that organization.


Protocol domain The term is used in contrast to internet, a network
between organizations, and instead refers to a
Information and

network within an organization.


Protocol
Sometimes the term refers only to the
A protocol is a standard set of rules that allow organization’s internal website, but may be
electronic devices to communicate with each a more extensive part of the organization’s
other. information technology infrastructure. It may
Path host multiple private websites and constitute an
important component and focal point of internal
The path refers to the exact location of a page communication and collaboration.

Professor Academy
Difference between internet and intranet
improving the web. It is made up of sever-
Internet Intranet al hundred member organizations from a variety
The Internet is a wide Intranet is a network of of related IT industries. W3C sets standards for
the World Wide Web (WWW) to facilitate better
network of computers computers designed for
communication ability and cooperation among all
and is available to all. a certain group of users.
web stakeholders. It was established in 1994 by
Internet contains a large Intranet can be accessed the creator of the WWW, Tim Berners-Lee.
number of intranets. from the Internet with
specific restrictions.
Number of internet Number of users is
Internet Devices
users are very high. limited. Network devices
Internet contains Intranet only contains
Network devices are components used to
various source of group-specific
connect computers or other electronic devices
information. information.
together so that they can share files or resources.
Anyone can access the Accessible only by the
internet. organization employees Hub
or admin who have It is a common connection point for devices in a
login details. network. It joins together the workstations, printers,
It is not as safe as Safe and secure and servers on a network to communicate with each
compared to intranet. network. other. Each hub has a number of ports that connect
It is a public network. It is a private network. it to the other devices via a network cable. A hub
Private Version of the connects all the devices on its ports together. When
Internet. data arrives at one port, it is sent to the other ports
so that all the devices can see all the information,
INTERESTING FACTS! commonly called packets.
Who
W Governs the Internet? Switch
One of the most frequently asked ques- A switch is a hardware device that filters and
tions about the internet is, “Who runs it?” The forwards network packets. A network switch also
truth is that no centralized management of the connects computers to each other, like a hub. When
internet exists. a switch receives a packet of data, it determines what
The internet as a whole does not have a computer or device the packet is intended for and
single controller. But the Internet society, which sends it to that computer only. It does not broadcast
is a voluntary membership organization, takes the the packet to all computers as a hub. For this reason
responsibility to promote global information ex- alone, switches are usually preferred over a hub.
change through the internet technology. Inter-
Repeater
net Corporation for Assigned Names and Numbers
(ICANN) administers the domain name registra- Repeaters remove the unwanted noise in an
tion. It helps to avoid a name which is already incoming signal. It increases a signal’s strength, so
Communication Technology

registered. it can be transmitted and received over a greater


What is W3C? distance without a loss in quality. Network repeaters
Information and

W3C stands for “World Wide Web Con- receive and retransmit incoming electrical, wireless
sortium.” The W3C is an international commu- or optical signals. Whenever a repeater receives a
nity that includes a full-time staff, industry ex- signal through one of its ports, it repeats or sends
perts, and several member organizations. These the incoming signal onto the other port. Its main use
groups work together to develop standards for is to amplify and regenerate signals.
the World Wide Web.
Gateway
The World Wide Web Consortium (W3C)
is an international organization committed to
A network gateway joins two networks so the
devices on one network can communicate with the
4.35
Professor Academy
devices on another network. Gateways serve as the Network Address
entry and exit point of a network. For basic Internet
connections at home, the gateway is the Internet
Service Provider that gives you access to the entire NETWORK ADDRESS
Internet.
A gateway is often associated with a router. Hardware address Software Address
Routers can be gateways because a router can control
the path through which information is sent in and Physical Address Logical Address
out.
The default gateway is the machine IP number MAC Address IP Address
that you need to access to get to the rest of the
network or the Internet. IPV4 IPV6
Router
Internet Protocol (TCP/IP)
A router is a networking device that forwards
data packets between computer networks. Routers The Internet Protocol (IP) is the method or
perform the traffic directing functions on the protocol by which data is sent from one computer
Internet. Data sent through the internet, such as a to another on the Internet. Each computer (known
web page or email, is in the form of data packets. as a host) on the Internet has at least one IP address
that uniquely identifies it from all other computers
Bridge
on the Internet.
A bridge is a network device that connects Every server on the internet has an IP number, a
multiple LANs (local area networks) together to form unique number consisting of four parts separated by
a larger LAN. The process of aggregating networks dots. The IP number is the server’s address
is called network bridging. A bridge connects the
different components so that they appear as parts of 165.113.245.2
a single network. 128.143.22.55
Firewall Transmission Control Protocol/Internet
A firewall is a software package that sits between Protocol (TCP/IP) is a networking protocol that
your computer and your Internet connection, keeping allows two computers to communicate.
an eye on the traffic going to and fro. If anything IPV4
suspicious appears, such as an unauthorised attempt
from a remote computer to write information to IPv4 uses 32 binary bits to create a single unique
your hard disc or to send information from your address on the network. Here’s an example of what
computer to a remote computer, it will block it and an IP address might look like: 66.171.248.170
warn you. An IPv4 address consists of four numbers, each
Modem of which contains one to three digits, with a single
dot (.) separating each number or set of digits. Each
Short for modulator/demodulator. A device
Communication Technology

of the four numbers can range from 0 to 255.


which converts computer data to a signal that can
be transmitted over a standard telephone line. It can IPV6
Information and

also reconvert a signal coming into a computer via IPv6 uses 128 binary bits to create a single
a telephone line so that it can be understood by the unique address on the network and is arranged in
computer. Modems are used to connect computers eight groups, each of which is 16 bits. Each group is
with the Internet. expressed as four hexadecimal digits and the groups
are separated by colons. An example of a full IPv6
Webcam address could be:
A camera connected to a computer that enables An IPv6 address is split into two parts, a network
it to transmit images and videos to the webserver and a node component. The network component is


Professor Academy

The Differences Between 2G, 3G, 4G bandwidth of 15-20MHz. Some of the main features
of 3G are:
LTE, and 5G Networks
➢ Speed of up to 2 Mbps.
the first 64 bits of the address and is used for routing. ➢ Increased bandwidth and data transfer rates.
The node component is the later 64 bits and is used ➢ Send/receive large email messages.
to identify the address of the interface. ➢ Large capacities and broadband capabilities.

The “G” stands for “GENERATION”. While Fourth Generation (4G)


connected to the internet, the speed of the connection
The main difference between 3G and 4G is the
depends upon the signal strength that is shown in
data rate. There is also a huge difference between 3G
abbreviations like 2G, 3G, 4G, 5G, etc. on any mobile
and 4G technology. The key technologies that have
device. Each generation of wireless broadband is defined
made 4G possible are MIMO (Multiple Input Multiple
as a set of telephone network standards that describe
Output) and OFDM (Orthogonal Frequency Division
the technological implementation of the system.
Multiplexing). The most important 4G standards
The aim of wireless communication is to provide are WiMAX and LTE. While 4G LTE is a major
high quality, reliable communication just like wired improvement over 3G speeds, it is technically not 4G.
communication and each new generation represents
Even after it was widely available, many networks
a big leap in that direction. Mobile communication
were not up to the required speed of 4G. 4G LTE is
has become more popular in the last few years due to
a “fourth generation long term evolution”, capable of
fast reform in mobile technology. For the comparison
delivering a very fast and secure internet connection.
of 2G, 3G, 4G, and 5G we first need to understand
Basically, 4G is the predetermined standard for
the key features of all these technologies.
mobile network connections. 4G LTE is the term
Second Generation (2G) given to the path which has to be followed to achieve
those predefined standards. Some of the features of
2G refers to the second generation of mobile
4G LTE are
networks based on GSM. The radio signals used by
the 1G network were analog, while 2G networks were • Support interactive multimedia, voice, video.
digital. 2G capabilities were achieved by allowing • High speed, high capacity and low cost per bit
multiple users on a single channel via multiplexing. (Speeds of up to 20 Mbps or more.)
During 2G, Cellular phones were used for data along • Global and scalable mobile networks.
with voice. Some of the key features of 2G were • Ad hoc and multi-hop networks.
➢ Data speeds of up to 64 kbps. Fifth Generation (5G)
➢ Use of digital signals instead of analog.
5G uses the rarely used radio millimeter bands
➢ Enabled services such as SMS and MMS in the 30 GHz to 300 GHz range. Testing of 5G range
(Multimedia Message). in mm Wave has produced results approximately
➢ Provided better quality voice calls. 500 meters from the tower. Using small cells, the
➢ It used a bandwidth of 30 to 200 KHz. deployment of 5G with millimeterwave-based
Communication Technology

carriers can improve overall coverage area. Combined


Third Generation (3G)
with Beamforming, small cells can deliver extremely
Information and

The 3G standard utilizes Universal Mobile fast coverage with low latency.
Telecommunications System (UMTS) as its core
Network Peek Speed Average Speed
network architecture. 3G network combines aspects
of the 2G network with new technologies and 5G 10Gbps 400Mbps
protocols to deliver a significantly faster data rate. 4G 1Gbps 50Mbps
By using packet switching, the original technology
was improved to allow speeds up to 14 Mbps. It
Types of Internet Service
used Wide Band Wireless Network that increased Here are some common types of Internet service.
clarity. It operates at a range of 2100MHz and has a Wireless Radio frequency bands are used in place
4.37
Professor Academy
of telephone or cable networks. One of the greatest be available. Similar to wireless access, satellite
advantages of wireless Internet connections is the connection utilizes a modem.
“always-on” connection that can be accessed from ISDN
any location that falls within network coverage.
Wireless connections are made possible through the ISDN (Integrated Services Digital Network)
use of a modem, which picks up Internet signals and allows users to send data, voice and video content
sends them to other devices. over digital telephone lines or standard telephone
wires. The installation of an ISDN adapter is required
Mobile at both ends of the transmission—on the part of the
Many cell phone and smart phone providers user as well as the Internet access provider.
offer voice plans with Internet access.
Dongles / Data Card
Mobile Internet connections provide good
Today, many dongles provide wireless capabilities.
speeds and allow you to access the Internet.
For example, USB Wi-Fi adapters are often called
Hotspots dongles. Since most computers now have built-in
Hotspots are sites that offer Internet access over Wi-Fi chips, mobile data adapters, such as 3G and 4G
a wireless local area network (WLAN) by way of dongles, are more prevalent. These types of dongles
a router that then connects to an Internet service allow connecting to the Internet even when Wi-Fi is
provider. Hotspots utilize Wi- Fi technology, which not available.
allows electronic devices to connect to the Internet
or exchange data wirelessly through radio waves. Wifi -Wireless Fidelity
Hotspots can be phone-based or free-standing, Wi-Fi stands for Wireless Fidelity. WIFI is
commercial or free to the public. based on the IEEE 802.11 family of standards
Broadband and is primarily a local area networking (LAN)
This high-speed Internet connection is provided technology designed to provide in-building
through either cable or telephone companies. broadband coverage.
One of the fastest options available, broadband Current Wi-Fi systems support a peak physical-
Internet uses multiple data channels to send large layer data rate of 54 Mbps and typically provide
quantities of information. The term broadband is indoor coverage over a distance of 100 feet.
shorthand for broad bandwidth. Broadband Internet
connections such as DSL and cable are considered One significant advantage of WiFi over WiMAX
high- bandwidth connections. Although many DSL and 3G is its wide availability of terminal devices. A
connections can be considered broadband, not all vast majority of laptops shipped today have a built-
broadband connections are DSL. in WiFi interface. WiFi interfaces are now also being
built into a variety of devices, including personal
DSL data assistants (PDAs), cordless phones, cellular
DSL, which stands for Digital Subscriber Line, phones, cameras, and media players.
uses existing 2-wire copper telephone line connected
to one’s home so service is delivered at the same time Wifi - Working Concepts
as landline telephone service. Customers can still
Communication Technology

place calls while surfing the Internet. Radio Signals


Radio Signals are the keys, which make Wi-Fi
Cable
Information and

networking possible. These radio signals transmitted


Cable Internet connection is a form of broadband from Wi-Fi antennas are picked up by Wi-Fi
access. Through use of a cable modem, users can
receivers, such as computers and cell phones that are
access the Internet over cable TV lines. Cable
equipped with Wi-Fi cards. Whenever, a computer
modems can provide extremely fast access to the
receives any of the signals within the range of a
Internet.
Wi-Fi network, which is usually 300 — 500 feet for
Satellite antennas, the Wi-Fi card reads the signals and thus
In certain areas where broadband connection creates an internet connection between the user and
is not yet offered, a satellite Internet option may the network without the use of a cord.

Professor Academy
Wi-Fi Hotspots Hence you ought to be aware of the issues and be
extra vigilant when online and offline.
A Wi-Fi hotspot is created by installing an access
point to an internet connection. The access point Computer virus
transmits a wireless signal over a short distance. It A computer virus is a small piece of software that
typically covers around 300 feet. When a Wi-Fi enabled can spread from one infected computer to another.
device such as a Pocket PC encounters a hotspot, the makes copies of itself by attaching itself to another
device can then connect to that network wirelessly. program (install itself) The virus could corrupt,
steal, or delete data on your computer— even erasing
Bluetooth
everything on your hard drive. A virus could also use
Bluetooth is a technical industry standard for other programs like your email program to spread
radio technology which facilitates the transmission itself to other computers.
of signals over short distances (up to around 10
metres) between telephones, computers and other Anti-virus
devices without the use of wires. For example, a The software tries to detect viruses before they
Bluetooth-enabled mobile phone can communicate can get access to your computer. It is usually set up to
with a Desktop Computer or Laptop Computer scan your computer on a regular basis and to check
for the purpose of synchronising data, such as an every file being opened before it is allowed to run.
appointments diary Bluetooth technology consumes
Malware
low power than Wi-Fi technology.
Malware is the collective name for a number
Internet Applications of malicious software variants, including viruses,
ransomware and spyware. Shorthand for malicious
➢ Internet Telephony software, malware typically consists of code
➢ Job search developed by cyberattackers, designed to cause
➢ Online shopping extensive damage to data and systems or to gain
➢ Stock market updates unauthorized access to a network.
➢ Travel Spyware
➢ Research
Spyware is a type of malware that aims to gather
➢ Video Conferencing
information about a person or organization, without
➢ e-commerce their knowledge and send such information to hack
➢ Online payments another entity without the consumer’s consent.
➢ Social Networking
➢ Voice mail Logic Bomb
➢ Chatting A logic bomb is a piece of code inserted into
➢ e-banking an operating system or software application that
➢ e-learning implements a malicious function after a certain
amount of time, or specific conditions are met.
Internet Threat Logic bombs are often used with viruses, worms,
and trojan horses to time them to do maximum
Communication Technology
It’s a dangerous world out there in the World damage before being noticed. They perform actions
Wide Web. Just as your mother may have told you like corrupting or altering data, reformatting a hard
Information and

to never talk to strangers, the same advice holds true drive, and deleting important files.
for the virtual world. You may know to be wary of
giving strangers your business bank account details. Trojan horse
But can you be sure the website you’re logging A Trojan horse, or Trojan, is a type of malicious
into is that of your bank and not a forgery created code or software that looks legitimate but can take
by a cybercriminal? Cybercriminals use many control of your computer. A Trojan is designed to
different methods to lure you into parting with damage, disrupt, steal, or in general inflict some
your confidential personal or business information. other harmful action on your data or network.

4.39
Professor Academy
Computer worm your email inbox. Spam, or electronic junk mail,
A computer worm is a standalone malware is a nuisance as it can clutter your mailbox as well
computer program that replicates itself in order to as potentially take up space on your mail server.
spread to other computers. It often uses a computer However, spam messages can contain links that
network to spread itself, relying on security failures when clicked on could go to a website that installs
on the target computer to access it. It will use this malicious software onto your computer.
machine as a host to scan and infect other computers Phishing
Worm is capable of transferring from one computer Phishing scams are fraudulent attempts by
to another without any ‘user interaction’ cybercriminals to obtain private information.
Botnet Phishing scams often appear in the guise of
A botnet is a group of computers connected email messages designed to appear as though
to the Internet that have been compromised by a they are from legitimate sources. For example,
hacker using a computer virus or Trojan horse. An the message would try to lure you into giving
individual computer in the group is known as a your personal information by pretending that
“zombie “computer. your bank or email service provider is updating
its website and that you must click on the link in
Root kit the email to verify your account information and
A root kit is a collection of tools that are used to password details.
obtain administrator-level access to a computer or a
network of computers. A root kit could be installed Spoofing
on your computer by a cyber criminal exploiting Spoofing is the act of disguising a communication
a vulnerability or security hole in a legitimate from an unknown source as being from a known,
application on your PC and may contain spy ware trusted source. Spoofing can apply to emails, phone
that monitors and records keystrokes. calls, and websites, or can be more technical, such
Sniffing as a computer spoofing an IP address, Address
Resolution Protocol (ARP), or Domain Name
Sniffing is a process of monitoring and capturing System (DNS) server.
all data packets passing through given network.
Sniffers are used by network/system administrator to Spoofing refers to any type of cybercrime that
monitor and troubleshoot network traffic. Attackers happens when a hacker impersonates a known
use sniffers to capture data packets containing contact or source. The process through which
sensitive information such as password, account an illegitimate website pretends to be a specific
information etc. legitimate website is known as Spoofing. In network
security involves fooling a computer or network via
Spam a falsified IP address, by redirecting internet traffic at
Spam in the security context is primarily used the DNS level, or by faking ARP data within a local
to describe email spam. Unwanted messages in access network (LAN).
Top Web Browsers Top Search Engines
Communication Technology

1) Google Chrome 2) Internet Explorer 1) Google 2) Bing


3) Safari 4) Opera 3) Yahoo 4) Baidu
Information and

5) Firefox 6) Microsoft Edge 5) AOL.com 6) Ask.com


7) Konqueror 8) Slim Browser 7) Excite 8) DuckDuckGo
9) Wolfram Alpha 10) Yandex
9) Netscape Browser 10) UC Browser
11) Lycos 12) ChaCha.com
11) Mozilla Firefox 12) Chromium
13) Wiki.com 14) Internet Archive
13) Vivaldi 14) SR Ware Iron 15) CC Search 16) Gibiru
15) Avant Browser 16) SeaMonkey 7) Search Encrypt 18) Startpage
17) Brave 19) SwissCows 20) BoardReader

Professor Academy

Self Evaluation
LEVEL 1
1. Speed of Internet is measured in [Sept-2020]
a) GHz b) Gbps
c) GB d) Dpi
2. What is the name for a web page address?
a) Directory b) Folder
c) Domain d) URL [Sept-2020]
3. Consider the following incomplete sentence:
Infrared(IR) Wi-Fi is short for Wireless Fidelity and it is a set
of ___________ for using short range _________
• An infrared transmission is a wireless
to allow computing to connect____________ to a
technology used for communication over
LAN or to the Internet. [Oct-2020]
short ranges.
• The frequency of the infrared in the range Complete the above sentence by choosing the
from 300 GHz to 400 THz. correct words in order from the following list:
• It is used for short-range communication (A) Standards (B) Waves
such as data transfer between two cell phones, (C) Devices
Choose the correct answer from the options given
TV remote operation, data transfer between a
below:
computer and cell phone resides in the same
a) (C), (B), (A) b) (C), (A), (B)
closed area. c) (A), (C), (B) d) (A). (B), (C)

Multimedia 4. Which one of the following is NOT used to avail


internet connectivity? [Oct-2020]
Multimedia is a representation of information a) Wi-Fi b) 3G
in an attractive and interactive manner with the c) Scanner d) 4G
use of a combination of text, audio, video, graphics 5. Which of the following statements is/are true?
and animation. In other words, we can say that (A) Fibre optic cables are wooden fibers to provide
Multimedia is a computerized method of presenting high quality transmission.
information combining textual data, audio, visuals (B) Wireless communication provides anytime,
(video), graphics and animations. anywhere connection to both computers and
telephones.
For example: E-Mail, Yahoo Messenger, Video (C) Mobile phones are capable of providing voice
Conferencing, and Multimedia Message Service communication and also digital messaging
(MMS). service. [Nov-2020]
Multimedia as name suggests is the combination Choose the correct answer from the options
of Multi and Media that is many types of media a) (A) and (C) only b) (B) and (C) only
c) (A) and (B) only d) (C) only
Communication Technology
(hardware/software) used for communication of
information. 6. Which one of the following is NOT a web browser?
Information and

a) Firefox b) Facebook
Components of Multimedia c) Chrome d) Safari [Oct-2020]
➢ Text 7. A computer network enables two or more computers
➢ Graphics to [Nov-2020]
a) Increase the speed
➢ Audio
b) Share data and hardware resources
➢ Video c) Increase the work
➢ Animation d) Monitor the software

4.43
Professor Academy
8. The application of which of the following ICT in 18. Which of the following statement is correct?
research will ensure wider coverage and accessibility a) Modem is a software
of needed information? [Dec - 2019] b) Modem helps in stabilizing the voltage
a) LAN b)WAN c) Modem is the operating system
c) MAN d) Intranet d) Modem converts the analog signal into digital
signal and vice-versa
9. A computer network which is used within a building
is called a [June - 2019] 19. …….. are ‘attempts by individuals to obtain
a) WAN b) MAN confidential information from you by falsifying
c) LAN d) SAN theiridentity’.
a) Phishing b) Computerviruses
10. Which of the following is generally associated with
c) Spyware d) Viruses
the domain name of an educational institution?
a) .org b) .edu 20. list of rules for transferring data over a network is
c) .com d) .inst called?
a) Protocols b) Programcode
11. --------------- is a wireless technology built in
c) Rules d) Flowchart
electronic gadgets for transferring data over short
distance [Dec - 2019] 21. A global network made up of thousands of privately
a) Wi-Fi b) Bluetooth owned computers and networks , and also said to be
c) Modem d) USB as networks of networks :
a) World Wide Web.
12. Which of the following devices enables a computer b) Internet
to transmit data over telephone lines? [June - 2019] c) Specialized search engine.
a) CPU b) Hub d) Intranet
c) Switch d) Modem
22. The concept of connect intelligence is derived from:
13. Identify the IP Address from the following: a) Virtual reality b) Fuzzy logic
a) 300.215.317.3 b) [email protected] c) Bluetooth technology
c) 202.50.20.148 d) 202-50-20-148 d) Value added networks
14. Virus type that is capable of transferring from one 23. Information and Communication Technology
computer to another without any ‘user interaction’ includes: [Sept-2020]
is known as [June - 2019]
a) On line learning
a) Worm b) Trojan b) Learning through the use of EDUSAT
c) Key logging d) Boot sector virus
c) Web Based Learning
15. A/An ------------- is a computer program that d) All the above
spreads by inserting copies of itself into other
24. Which of the following domains is used for – profit
executable code or documents [June - 2019]
businesses?
a) Operating system b) Computer Virus
a) net b) edu
c) Firewall d) Anti-virus
c) com d) org
16. Which of the following is a type of malware
25. Consider the following statements.
intentionally inserted into a software system that
Communication Technology

will set off a malicious function when specified 1) The World Wide Web emerged as a powerful
conditions are met? [June - 2019] mass medium in the 1980s.
Information and

a) Worm b) Trojan 2) Internet Explorer, Mozilla Firefox, Google


c) Spyware d) Logic bomb Chrome are examples of browsers.
Which of the following statements is/are correct?
17. Which of the following is not a/an web browser?
a) Only Statement 1
a) Internet Explorer b) Mozilla Firefox b) Only Statement 2
c) Google Chrome d) Yahoo [June - 2019] c) Both Statements 1 and 2
d) Neither Statement 1 nor Statement 2


Professor Academy
26. Match the two and give the answer by selecting the 2. What is bit rate? [Nov-2020]
appropriate code. a) Number of bits stored in computer
Set – I (Terms) Set – II ( Meanings) b) Number of bits per second that can be transmitted
over a network
a. Browsers i. Looking for c) Number of bits per hour stored in a computer
information on the over a network
internet d) Binary digit converted to Hexa Decimal number
b. Malicious spyware ii. Describes Trojan 3. Scrambling of data before transmission across a
application network to avoid manipulation by a third party is
c. Virus iii. Piece of software known as _____ [Nov-2020]
spreads itself to a) Protection b) Permutation
other computer c) Detection d) Encryption
d. Firmware iv. Several pieces of 4. Which one of the following allows a phone call to be
Hardware providing routed over network wires? [Nov-2020]
interfaces for high – a) Video conferencing b) Teleconferencing
level software. c) Optical Fibre d) VOIP
A B C D 5. Given below are two statements:[Nov-2020]
a) (i) (iii) (iv) (ii) Statement I: In peer-to-peer network, there is no
central server instead each computer can act as a
b) (ii) (iv) (iii) (i) server as well as a client.
c) (ii) (iii) (iv) (i) Statement II: LAN is a computer network
d) (i) (ii) (iii) (iv) created for individual person.
27. ___ is a Tool in Ms office which allows us to easily In the light of the above statements, choose the
modify one part of a document with unique data correct answer from the options given below:
elements in Data base.
a) Both Statement I and Statement II are true
a) cross reference b) Mail merge b) Both Statement I and Statement II are false
c) envelopes d) Labels. c) Statement I is correct but Statement II is false
28. What is the standard port number of HTTP d) Statement I is incorrect but Statement II is true
a) 83 b) 80 6. Given below are two statements, one is labelled as
c) 81 d) 82 Assertion A and the other is labelled as Reason R
Assertion A: Privacy and security of user data is at
Answer Key stake on the Internet
1 2 3 4 5 6 7 8 Reason R: No steps are being taken by the user for
b d d c b b b b the security and privacy of data
9 10 11 12 13 14 15 16 In light of the above statements, choose the most
c b b d c a b d appropriate answer from the following: [Nov-2020] Communication Technology
17 18 19 20 21 22 23 24 a) Both A and R are correct and R is the correct
explanation of A
d d a a b b d c
b) Both A and R are correct but R is NOT the correct
Information and

25 26 27 28 explanation of A
b d b b c) A is correct but R is not correct
d) A is not correct but R is correct
LEVEL 2 7. Given below are two statements: [Nov-2020]
1. The process through which an illegitimate website Statement I: A company-wide network closed to
pretends to be a specific legitimate website is known as public access, which uses internet-type technology
a) Sniffing b) Spoofing [Nov-2020] is called World Wide Web.
c) Back Doors d) War Dialing Statement II: MODEM is a device that enables a

4.45
Professor Academy
computer to communicate over telephone lines. a) Protocol,domain name of the host, path/file
In the light of the above statements, choose the b) Path/file, Protocol, domain name of the host
correct answer from the options given below: c) Protocol, path/file, domain name of the host
a) Both Statement I and Statement II are true d) Domain name of the host, protocol, path/file
b) Both Statement I and Statement II are false
13. Which of the following statements is/are correct?
c) Statement I is correct hut Statement II is false
d) Statement I is incorrect but Statement II is true i. WWW is a network of networks that first started
with four computer nodes.
8. Ankur receives an email informing him that his ii. WWW is a service that runs on the internet
credit card is going to be cancelled. The email Choose the correct option. [Dec-2019]
advises him to check on the provided link and sign a) i only b) ii only
into his online banking account to prevent this from c) Both i and ii d) Neither i nor ii
happening, which he does, A week later, Ankur
notices that ₹10,000 has been withdrawn from his 14. Which one of the following is the not same as the
bank account. What has Ankur fallen victim to? other three? (Jun - 2019)
a) A phishing scam b) A Trojan horse a) MAC Address b) Hardware Address
c) Online blackmail d) A virus [Oct-2020] c) Physical Address d)IP Address

9. Radha receives an email claiming that her credit card 15. IPv4 and IPv6 are addresses used to identify
account is about to be suspended unless she emails computers on the internet.
her credit card details and personal identification Find the correct statement out of the following:
number (PIN) immediately. What is this an example a) Number of bits required for IPv4 address is more
of? [Oct-2020] than number of bits required for IPv6 address
a) Spamming b) Phishing b) Number of bits required for IPv4 address is same
c) Virus Signing d) Scanning as number of bits required for IPv6 address
10. Given below are two statements – one islabelled as c) Number of bits required for IPv4 address is less
Assertion (A) and other as Reason (R) than number of bits required for IPv6 address
d) Number of bits required for IPv4 address is 64
Assertion (A): The internet is a collection of
inter connected computer networks, linked by 16. With respect to computers, which one of the
transmission medium such as copper wire, fibre following best describes phishing?
optic cables, wireless connections etc. a) A malicious program installed on a system that
Reason (R): World Wide Web is a collection of stays concealed to avoid detection
interconnected documents. b) A method of by passing normal authentication
In the light of the above stated two statements, procedures over a connection to a network
choose the correct option from the choices given c) A type of unsolicited bulk email of identical
below: [Dec - 2019] messages sent to numerous recipients
a) Both (A) and (R) are true is the correct explanation d) An attempt to acquire sensitive information
of (A) for malicious reasons, by masquerading as a
b) Both (A) and (R) are true (R) is not the correct trustworthy entity
explanation of (A)
17. What is spyware in respect of computer software?
c) (A) is true, but (R) is false
d) (A) is false, but (R) is true a) Software that aims to gather information about
Communication Technology

person without his/her knowledge, and that may


11. The following list indicates different types of send such information to another entity
computer networks. Arrange them in an ascending
Information and

b) Legitimate software that allows companies to


order on the basis of geographical space implied. monitor and supervise the computers of their
a) LAN,WAN,MAN employees from a central location
b) WAN,LAN,MAN c) Software used to disrupt computer operation or
c) MAN,LAN,WAN gain access to private compute systems
d) LAN,MAN,WAN [June-2019] d) A computer program hidden within another
12. Select the option that lists components for a seemingly harmless program that produces
cyberspaces address (URL) in the correct order copies of itself and inserts them into another
from the beginning to end? [Dec-2019] programs or files


Professor Academy
18. Which of the following statements are correct 23. Given below are two statements. One labelled as
i. Google’s web browsers is called “Chrome” Assertion (A) and other is labelled as Reason (R).
ii. Apple’s web browser is called “safari” Assertion (A): The router’s primary responsibility is
iii. “Mozilla Firefox” is an open source web browsing to direct(route) data to the correct receiver.
software [Dec-2019] Reason (R): A Wi-Fi repeater, extender, or booster
a) i and ii only b) i and iii only is a device that forwards wireless signals from the
c) ii and iii only d) i, ii and iii router to cover a larger area.
In the right of the above two statements, choose the
19. In the context of IT/ICT, which one of the following correct answer:
statements about spamming is true? [June - 2019] a) Both (A) and (R) are true and (R) is the correct
a) Spamming is pasting or e-mailing unsolicited explanation of (A).
advertising messages to a wide audience b) Both (A) and (R) are true and (R) is not the
b) Spamming is sending lines of nonsensical garbage correct explanation of (A).
in a chat conversation c) (A) is true but (R) is false.
c) Spamming is posting a message that contains d) (A) is false but (R) is true.
graphic description of something offensive
d) Spamming is an attempt to acquire sensitive 24. Given below are two statements. One labelled as
information for malicious reasons, by Assertion (A) and other is labelled as Reason (R).
masquerading as trustworthy entity Assertion (A): Bluetooth is a wireless Personal
Area Network (WPAN) technology and is used for
20. Given below are two statements – one is labelled as exchanging data over smaller distances.
Assertion (A) and other as Reason (R) Reason (R): Maximum devices that can be connected
Assertion (A): Sniffing may be used to steal data or at the same time are 7 and it ranges up to 30 meters.
information over network. In the right of the above two statements, choose the
Reason (R): Sniffing is a process of monitoring and correct answer:
capturing all data packets passing through given a) Both (A) and (R) are true and (R) is the correct
network explanation of (A).
In the light of the above stated two statements, b) Both (A) and (R) are true and (R) is not the
choose the correct option from the choices given correct explanation of (A).
below: [June-2019] c) (A) is true but (R) is false.
a) Both (A) and (R) are correct explanation of (A) d) (A) is false but (R) is true.
b) Both (A) and (R) are true R is not the correct
explanation of (A) 25. Given below are two statements, one labelled as
c) (A) is true, but (R) is false Assertion (A) and the other as Reason (R):
d) (A) is false, but (R) is true Assertion (A): An Intranet is a private network
for sharing computing resources and information
21. Small plain text files that are written to your within an organization
computer’s hard disk by many of the Websites you Reason (R): Intranet is private version of the Internet
visit are called Choose the correct answer [Nov-2020]
a) RFIDs b) Web beacons a) Both (A) and (R) are true and (R) is the correct
c) GUI d) Cookies explanation of (A)
22. Which of the following statements is/are correct b) Both (A) and (R) are true but (R) is not the
with respect to Internet and Intranet? correct explanation of (A)
Communication Technology

c)(A) is true, but (R) is false


i. The number of users in Intranet is limited.
d)(A) is false, but (R) is true
Information and

ii. Internet is a wide network of computers & open


26. Which of the following statement are correct?
to all.
A. Internet is larger than intranet
iii. Internet uses internet protocols such as TCP/IP B. Intranet is larger than internet
and FTP. C. Internet and intranet are same
iv. Internet is safer than Intranet. D. Internet is a network of networks
a) (i), (ii) and (iii) only E. World Wide Web is an example of intranet
b) (ii), (iii) and (iv) only Choose the correct answer [Nov-2020]
c) (i) and (iv) only a) B and E only b) A and D only
d) All of the above. c) C and E only d) B and C only

4.47
Professor Academy
27. Which of the following is true about the wireless Choose the correct answer [Nov-2020]
networking?
a) (A), (C) only
(A) It is easier to expand the network b) (B), (C) only
(B) Data is less secured than wired system c) (A), (B), (C) only
(C) Reliability is more than wired d) (A), (B), (D) only
(D) Faster than wired network
31. Which of the following statement is / arecorrect?
Choose the correct answer [Nov-2020]
i) A Local Area Network (LAN) is usually located
a) (A), (B), (D) only b) (A), (B) only one brand of computer
c) (B), (C) only d) (A), (B), (C) only
ii) The acronym ‘ISP’ stands for Internet Standard
28. Consider the following incomplete sentences: 3G is Provider
a_______ range wireless technology. Some activities
Choose the correct answer
that require __________bandwidth cannot he
carried out by using 3G.Bluetooth is a______ range a) i only b) ii only
wireless technology which is used to connect devices c) Both i and ii d) Neither i nor ii
together for data transfer. Bluetooth is a_____ cost 32. Match List I with List II
means of data transfer. [Nov-2020]
List List
Complete the above sentences by choosing the
correct words in order from the following list: a. VOIP i) Makes use of lightpulses
0 transmit data
(A) Long (B) Low
(C) Short (D) High b. Fibre-optic cable ii) use of internet to make
phone calls
Choose the correct answer from the options given
below: c. URL iii) Most appropriate to
connect computers in a
a) (A), (D), (C), (B) b) (C), (D), (A), (B) small building
c) (C), (B), (A), (D) d) (A), (B), (C), (D)
d. UTP cable iv) Text used by web
29. P. Root kit is a collection of tools used to obtain browsers to locate a web
administrator – level access to a computer or a address on the internet
network of computers.
Choose the correct answer [Dec-2019]
Q: Botnet is a group of computers connected to
the Internet that have been compromised by a a) a-ii, b-iv, c-i, d-iii
hacker using a computer virus or Trojan horse. b) a-ii, b-i, c-iv, d-iii
c) a-iii, b-i, c-iv, d-iii
R: Computer Virus is a software program that
d) a-iii, b-i, c-iv, d-ii
can copy itself from one computer to another,
without human interaction.
Answer Key
Choose the correct answer from the options given
below: 1 2 3 4 5 6 7 8
a) P only b) Q and R only b b d d c c d a
c) P and Q only d) P and R only 9 10 11 12 13 14 15 16
Communication Technology

30. Firewall is a software tool that protects b b d a c d c d


17 18 19 20 21 22 23 24
Information and

(A) Server (B) Network


(C) Fire (D) Individual Computer a d a a d a b c
25 26 27 28 29 30 31 32
b b b a c d d b


Professor Academy
➢ Subjects: subject is a description of the topic of
E-MAIL
the message and displays in most email systems
Electronic mail (also known as email or e-mail) that list email message individually.
is one of the most commonly used services on the ➢ Sender (From): This is the sender’s Internet
Internet, allowing people to send message to one email address. It is usually presumed to be the
or more recipients. Email was invented by Ray same as the Reply – to address, unless a different
Tomlinson in 1972 Email (Electronic mail) is a way one is provided.
to send and receive message across the Internet. We ➢ Date and time received (on): The date and time
can send and receive text, document files, image the message was received.
files, and audio files – in fact, any files at all. One big ➢ Reply – to: this is the Internet email address that
advantage is, unlike using the telephone; the recipient will become the recipient of your reply if you
does not have to be present when a message is sent click the Reply button.
to them. They can read incoming mail and reply (if ➢ Recipient (To): First / last name of email
necessary) at their own time.
recipient, as configured by the sender.
➢ Recipient email address: The Internet mail
Parts of an Email Address
address of the recipient, or where the message
The following are three major parts of an email was actually sent.
address: ➢ Attachment: Files that are attached to the
1. Username: The first part of an email address is message.
the username. This is the unique name that you ➢ Body: The body of a message contains text that is
or your ISP selects. This can be your real name the actual content. The message body also may
or a nickname. The username must be unique. include signatures or automatically generated
No two people or organizations can have the text that is inserted by the sender’s email system.
same username with the same provider. ➢ Address books allow easy access to the user’s
2. @ Symbol: An “at” or “@” symbol is the second friends, family, business associates and others by
part of an email address. This fits in between the maintaining their email and other contact details.
username and the domain of your email address.
When you insert the symbol, your email program
recognizes the character and sends the email to
the domain name the follows it.
3. Domain: The last part of an email address is
the domain, which can be broken down into
two portions: the mail server and the top-level
domain. The mail server is the server hosting
the email account. For example, Gmail email
accounts use “Gmail” as the server name. The
top – level domain is the extension such as, .Com,
.net or .info. Emails from educational institutions
Communication Technology
often have the edu extension, while employees of
a government agency use a gov extension.
Information and

Parts of an Email Message


To view an e-mail, you have to use e-mail software
An email message consists of the following is “Outlook Express”.
general components:
In the e-mail window, you can find “Folder Pane”
➢ Headers: The message headers contain at the left side of the window. It has set of folders
information concerning the sender and named as Composed email, Inbox, Out Box, Sent
recipients. The exact content of mail headers Items, Drafts, Trash, Spam etc.,
can vary depending on the email system that
generated the message.
4.49
Professor Academy
Inbox is used to store incoming An Internet Protocol address (also known
Outbox is used to store outgoing email as an IP address) is a numerical label assigned to
Sent Items is used to store email that has already each device (e.g., computer, printer) participating
been in a computer network. It acts as an identifier
for a computer. It is a unique address for every
Deleted Items (Trash) is used to store deleted email computer.
A draft folder is used to store email that is not yet Top-level domain: Each part of a domain
complete name contains certain information. The first field
Spam is used to store the unsolicited or marketing is the hostname, identifying a single computer or
bulk e-mail organization. The last field is the top-level domain,
Compose Mail is use to create a new user describing the type of organization and occasionally
country of origin associated with the for e.g. – .com
To: Type the e-mail address of the person to whom
– Commercial, .edu – Educational.
you want to send an email.
Subject: To type a few words about the subject of the
letter. Protocols
CC (Carbon Copy): To type the e-mail address Transmission Control Protocol (TCP)
of the other recipients in this box, each address is The transmission Control Protocol (TCP) is
separated by a comma (,). When you complete the one of the most important protocols of Internet
mail and click the “Send” button, then the mail will Protocols suite. It is most widely used protocol for
automatically be sent to all the recipients. Here, all data transmission in communication network such
the recipients will know who the other recipients are. as internet.
BCC ( Blind Carbon Copy) or (Blind courtesy User Datagram Protocol (UDP)
Copy) : If you don’t want them to know who else The User Datagram Protocol (UDP) is simplest
have received copies, you can type the addresses in Transport Layer communication protocol available
the BCC text. In this case, only you (the sender) will of the TCP/IP protocol suite. The receiver does not
know the identity of all the recipients of mail. generate an acknowledgement of packet received
[Blind Carbon Copy will get to know from To, CC and in turn, the sender does not wait for any
Carbon copy will get to know from To, NOTE: It acknowledgement of packet sent. This shortcoming
depends on mails we use] makes this protocol unreliable as well as easier on
Reply: You can send your reply using the same. The processing.
subject box will have the same subject, but with the Internet Protocol (IP)
words “Re:” before it. Internet Protocol is connectionless and unreliable
Forward: You can send the forward message using protocol. It ensures no guarantee of successful
the same. The subject box will have the same subject, transmission of data. In order to make it reliable, it
but with the words “Fwd:” before it. must be paired with reliable protocol such as TCP at
Attachment : An email attachment is a computer the transport layer.
Communication Technology

file sent along with an email message. One or more


files can be attached to any email message, and be Post Office Protocol (POP3) - Port Number-110
Information and

sent along with it. The first email was sent by Ray POP3 (Post Office Protocol 3) is the most recent
Tomlinson to himself in 1971. version of a standard protocol for receiving e-mail.
The Drafts folder retains copies of messages that POP3 is a client/server protocol in which e-mail is
you have started but are not yet ready to send. received and held for you by your Internet server.
Hotmail, a free e-mail service provided by Periodically, you (or your client e-mail receiver)
Microsoft which was established in 1995 was co- check your mail-box on the server and download any
founded by an Indian American entrepreneur Sabeer mail, probably using POP3. This standard protocol is
Bhatia along with Jack Smith in July of 1996. built into most popular e-mail products.


Professor Academy
Hyper Text Transfer Protocol (HTTP)- Port Simple Mail Transfer Protocol(SMTP)
Number -80 An SMTP server is an application that’s primary
HTTP (Hypertext Transfer Protocol) is the set purpose is to send, receive, and/or relay outgoing
of rules for transferring files, such as text, graphic mail between email senders and receivers. When
images, sound, video, and other multimedia files, on you send an email, the SMTP server processes your
the World Wide Web. As soon as a Web user opens email, decides which server to send the message to,
their Web browser, the user is indirectly making and relays the message to that server.
use of HTTP. HTTP is an application protocol that Multi – Purpose Internet Mail Extension(MIME)
runs on top of the TCP/IP suite of protocols (the
foundation protocols for the Internet). MIME is an expansion of an email system to include
more detailed aspects such as the use of attachments,
File Transfer Protocol (FTP) - Port Number -21
whether these are audio, images or videos for
FTP stands for File transfer protocol.FTP is a instance.
standard internet protocol provided by TCP/IP used
for transmitting the files from one host to another. EMAIL ABUSE AND SPAM
It is mainly used for transferring the web page files Spam also known as junk email is when unsolicited
from their creator to the computer that acts as a messages are sent by email. Superfluous Pieces of
server for other computers on the internet. It is also Additional Mail.
used for downloading the files to computer from Spammer is an individual or an entity (group of
other servers. individuals or a company) that sends spam emails.
Internet Control Message Protocol (ICMP) Email Phishing where private data is captured.
ICMP (Internet Control Message Protocol) is Email Spoofing is when an email message is sent
an error-reporting protocol. Network devices like with a forged sender.
routers used to generate error messages to the source Email Worms Email Worms spread through
IP address when network problems prevent delivery malicious email as an attachment or a link of a
of IP packets. ICMP creates and sends messages to malicious website.
the source IP address indicating that a gateway to
the Internet that a router, service or host cannot be
reached for packet delivery. Any IP network device
has the capability to send, receive or process ICMP
Self Evaluation
messages.
LEVEL 1
Internet Message Access Protocol (IMAP) - port
number 993 1. An unsolicited e-mail message sent to many recipients
at once is a [Nov-2020]
The IMAP architecture enables users to send a) Inbox b) Spam
and receive emails through a remote server, without c) Virus d) Attack
support from a particular device. This type of email
2. The convenient place to store contact information
access is ideal for travellers receiving or answering
for quick retrieval in e-mail is: [June - 2019]
Communication Technology
emails from their home desktop or office computer.
a) Address box b) Message box
This term is also known as interactive mail access
c) Address book d) Message book
Information and

protocol, Internet mail access protocol, and in term


mail access protocol. IMAP can be contrasted with 3. An unsolicited e-mail message sent to many
another client/server email protocol, Post Office recipients at once is a [June-2019]
Protocol 3 (POP3). With POP3, mail is saved for a) Worm b) Virus
the end user in a single mailbox on the server and c) Threat d) Spam
moved to the end user’s device when the mail client 4. _______ is a protocol used by e-mail clients to
opens. While POP3 can be thought of as a “store- download e-mails to your computer.
and-forward” service, IMAP can be thought of as a a)TCP b) FTP
remote file server. c) SMTP d) POP

4.51
Professor Academy
5. When sending an e-mail,the line describes the 5. Which of the following is the appropriate format of
contents of the message. URL of e-mail?
a) To b) Subject a) www_mail.com b) [email protected]
c) Contents d) CC c) [email protected] d) www.mail.com
6. Given below are two statements. One labelled as
Answer Key Assertion (A) and other is labelled as Reason (R).
1 2 3 4 5 Assertion (A): The attached file in an email, could
b c d d b be potentially dangerous to the receiving computer
if it contains Virus.
Reason (R): Virus is harmful for the system as it
LEVEL 2 may enter the system but not corrupt the files.
choose the correct answer:
1. Which of the following is not suitable in the context of
a) Both (A) and (R) are true and (R) is the correct
E-mail? [Dec - 2019]
explanation of (A).
a) It is a letter sent over a computer network b) Both (A) and (R) are true and (R) is not the
b) It can be used to send unsolicited message correct explanation of (A).
c) E-mail is snail-mail c) (A) is true but (R) is false.
d) E-mail address includes domain name d) (A) is false but (R) is true.
2. While sending an e-mail, to differentiate among 7. Given below are two statements. One labelled as
to: Cc: and Bcc: fields, which one of the following Assertion (A) and other is labelled as Reason (R).
statement is True? [June - 2019]
Assertion (A): Set of communication guidelines
a) Recipients in the to: field can see the email that allows the software to transmit an electronic
addresses that are in the Bcc: and Cc: fields. mail over the internet is known as SMTP
b) Recipients in the Cc: field can see the email Reason (R): POP or IMAP are used to retrieve those
addresses that are in the to: and Bcc: fields mails at the receiver’s side.
c) Recipients in the Bcc: field can see the email choose the correct answer:
addresses that are in the to: and Cc: fields a) Both (A) and (R) are true and (R) is the correct
d) Only the recipients in the Cc: field can see the explanation of (A).
other email addresses in the Bcc: field b) Both (A) and (R) are true and (R) is not the
3. Why would BCC: be used in an e-mail? correct explanation of (A).
c) (A) is true but (R) is false.
a) BCC: allows the recipient to identify all the other
d) (A) is false but (R) is true.
recipients in the list when a group email address
is used 8. Consider the following statements.
b) BCC: allows the sender to indicate who the email 1) Recipients in CC (carbon copy) will always know
is for if there is more than one recipient all the other recipients.
c) BCC: allows recipients to be visible to all other 2) Recipients in BCC(Blind carbon copy) will know
recipients of the message all the recipients in to& CC.
d) BCC: allows the sender of a message to conceal Which of the following statements is/are correct?
the recipient entered in the BCC: field from the a) Only Statement 1
other recipients. [june-2019] b) Only Statement 2
Communication Technology

4. POP3 and IMAP are e-mail accounts in which c) Both Statements 1 and 2
d) Neither Statement 1 nor Statement 2
a) One automatically gets one’s mail everyday
Information and

b) One has to be connected to the server to read or


Answer Key
write one’s mail
c) One only has to be connected to the server to 1 2 3 4 5 6 7 8
send and receive email c c d c d c b b
d) One does not need any telephone lines


Professor Academy

AUDIO AND VIDEO CONFERENCING Document .pdf, .doc, .docx, .xls, .xlsx, .ppt, .pptx
Web .html, .xml, .php, .jsp, .asp, .aspx
Database .xml, .tar, .sql, .db, .dbf, .dat, .csv
Audio Conferencing
Program .bat, .com, .exe
Audio conferencing is where two or more people in Text file .csv, .rtf, .txt, .text, .doc, .docx
different locations use technology to connect bridge
Difference between .doc and .docx
to hold an audio call. Audio conferencing is different
from a traditional phone in that all participants dial .doc - Microsoft Word document before - Word 2007
into a central system that connects them instead of .docx - Microsoft Word document (start with 2007)
directly calling each other. Audio conferencing aims Video Compression
at achieving communications and collaboration Video compression is the process of reducing the
simultaneously. Many audio conferencing products total number of bits needed to represent a given
may also come with online collaboration elements image or video sequence. Video compression is most
standard or optional, like screen-sharing capabilities, commonly performed by a program with a specific
to further enhance the value of audio meetings. algorithm or formula for determining the best way to
Video Conferencing shrink the size of the data.

Video conferencing is a method of communicating


by way video and audio transmission with help of
telecommunication technologies. Self Evaluation
Modes of Video conferencing
LEVEL 1
1. Point-to-Point
This mode of conferencing connects two locations 1. The file extension of Microsoft (MS) Word document in
office 2007 is [Sept-2020]
only
a) .docx b) .png
2. Multi-Point c) .doc d) .Jpg
This mode of conferencing connects more than two
2. Match List I with List II [Nov-2020]
location through multipoint Control unit.
List I List II
Virtual Learning Environment (VLE)
A. Image I. .doc
A virtual learning environment (VLE) in educational B. Video II. .mp3
technology is a Web-based platform for the digital C. Audio III. jpeg
aspects of courses of study, usually within educational D. Word processing IV. .mpeg
institutions. A virtual learning environment or Choose the correct answer from the options given
VLE is an online education platform. It is used as below:
an extension of normal school lessons. Students a) A - 1, B - II, C - Ill, D - IV
can access the VLE from home by logging in to the b) A - III, B - IV, C - II, D - I
system. This allows them to do their homework or c) A - II, B - III, C - IV, D - I
Communication Technology

complete their projects from home. d) A - I, B - IV, C - Ill, D - II


3. Multimedia comprises of [Sept-2020]
Information and

File Formats and Extensions a) Text and Audio b) Video and Audio
c) Video only d) Text, Audio and Video
DATA FILE FORMAT
4. Which of the following file format is not a video file
Video .avi, .mov, .mp4, .wmv, .mkv format? [June - 2019]
Image .jpg, .jpeg, .jpeg2000, .png, .gif, .ico, a) .AVI b) .MOV
.webp, .tiff c) .MP4 d) .JPEG
Sound/ .mp3, .wma, .m4a, .ogg, .amr, .aac,
Audio .wav, .midi
4.53
Professor Academy
5. Select the options it contains exclusively the text file a) a, b, d&e b)a, b, c&e
formats [Dec - 2019] c) a, b, c&d d) a, c&d
a) JPEG,MP3,RTF b) CSV,RTF,TXT 3. Given below are two statements. One labelled as
c) GIF,JPEG,MP3 d) CSV,MP3, PDF Assertion (A) and other is labelled as Reason (R).
6. gif. jpg, bmp, png are used as extensions for files Assertion (A): Email and Forums employ only
which store [Dec - 2019] asynchronous communication.
a) audio data b) image data Reason (R): The term asynchronous is usually used
c) video data d) text data to describe communication in which data can be
transmitted intermittently.
7. In Audio and Video compression, the term RGB In the right of the above two statements, choose the
means: correct answer:
a) Red, Grey, Blue b) Red, Green, Blue a) Both (A) and (R) are true and (R) is the correct
c) Red, Green, Black d) Red, Grey, Black explanation of (A).
8. Select the option that includes file formats suitable b) Both (A) and (R) are true and (R) is not the correct
for distributing sound files across the Internet. explanation of (A).
c) (A) is true but (R) is false.
i.mp4 ii. wmv
d) (A) is false but (R) is true.
iii. wma iv. mp3
v. midi vi. Wav 4. Consider the following statements.
a) i, ii, iii, iv b) ii, iii, v, vi 1. Computer with access to the internet is
c) i, iii, iv, v d) iii, iv, v,vi most essential requirements for video/audio
conferencing .
Answer Key 2. Browsers, Speakers, Microphone and Web
1 2 3 4 5 6 7 8 camera are optional requirements for video/audio
conferencing.
a b d d b b b d
Which among above is/are correct?
a) Only 1 b) Only 2
LEVEL 2 c) Both 1 and 2 d) Neither 1 nor 2
1. Select the option for distributing sound files across the Answer Key
Internet. [Dec-2019]
a) Wmv.mp4.wma.mp3 b) Avi,midi,wav,mp3 1 2 3 4
c) Avi,mov,wmv,mp3 d) Midi,wav,wma,mp3 d a a a
2. Select the option that includes audio file formats
a. MP3 b. WAV c. MP4 d. AIFF e. AU
Select the most appropriate answer from the
following code:
DIGITAL INITIATIVES IN HIGHER EDUCATION
[REFER IN HIGHER EDUCATION UNIT]
Communication Technology
Information and


“To succeed in your mission, you must have single-minded devotion to your goal” - APJ Abdul Kalam
Professor Academy

E-GOVERNANCE because it simplifies the task on the one hand


and increases the quality of work on the other.
Electronic governance or e-governance is the
application of information and communication E-Commerce
technology (ICT) for delivering government services.
Classifying ecommerce according to the parties
Benefits of E-governance
involved:
➢ Reduced corruption.
1. Business to consumer (B2C) – Transactions
➢ High transparency. happened between businesses and consumers.
➢ Increased convenience. In B2C ecommerce, businesses are the ones
➢ Reduction in overall cost. selling products or services to end-users (i.e.
consumers).
➢ Expanded reach of government Types of
Interactions in India. 2. Business to business (B2B) – As its
name states, B2B ecommerce pertains
E-governance
to transactions conducted between two
1. G2G(Government to Government): When the businesses. Any company whose customers
exchange of information and services is within are other businesses operate on a B2B model.
the periphery of the government, is termed as
G2G interaction. This can be both horizontal, 3. Consumer to business (C2B) – Consumer
(i.e. among various government entities and to business ecommerce happens when a
vertical, i.e. between national, state and local consumer sells or contributes monetary value
government entities and within different levels to a business. Many crowdsourcing campaigns
of the entity). fall under C2B ecommerce.
2. G2C (Government to Citizen): The interaction 4. Consumer to consumer (C2C) – As you
amidst the government and general public might have guessed, C2C ecommerce happens
is G2C interaction. Here an interface is set when something is bought and sold between
up between government and citizens, which two consumers. C2C commonly takes place
enables citizens to get access to wide variety of on online marketplaces such as eBay, in which
public services. The citizens have the freedom to one individual sells a product or service to
share their views and grievances on government another.
policies anytime at anywhere.
3. G2B (Government to Business): In this case, 5. Government to business (G2B) – G2B
the e-governance helps the business class transactions are take place when a company
to interact with the government seamlessly. pays for government goods, services, or fees
It aims at eliminating red-tapism, saving online. Examples are it could be a business
time, cost and establish transparency in the paying for taxes using the Internet.
business environment, while interacting with 6. Business to government (B2G) – When
government. a government entity uses the Internet
4. G2E (Government to Employees): The to purchases goods or services from a
Communication Technology

government of any country is the biggest business, the transaction may fall under B2G
employer and so it also deals with employees on ecommerce. Let’s say a city or town hires a
Information and

a regular basis, as other employers do. ICT helps web design firm to update its website. This
in making the interaction between government type of deal may be considered a form of B2G.
and employees fast and efficient, along with
raising their level of satisfaction by providing 7. Consumer to government (G2C) –
perquisites and add-on benefits. Consumers can also engage in B2C
E-governance has a great role to play, that ecommerce. People paying for traffic tickets
improves and supports all tasks performed or paying for their car registration renewals
by the government department and agencies, online may fall under this category.

4.55
Professor Academy

Self Evaluation iii. Common Services Centres (CSCs) help in


providing and using E-Governance related
Services.
LEVEL 1 Choose the correct option:
1. E-commerce involves buying and selling of: a) i,ii and iii b) ii and iii only
a) International goods [Nov-2020] c) i and iii only d) i and ii only
b) Electronic goods 2. Which description is appropriate among the
c) Products related to computers following for ‘E-Governance? [Dec-2019]
d) Products and services over the Internet i. To engage, enable and empower the citizens
2. One aspect of E-governance deals with flow ii. To provide fair and unbiased services to the
of information between the Government and citizens
citizens. Which of the following are Government iii. To provide technology driven governance
to Citizens (G2C) initiatives? [Nov-2020] iv. To ensure people’s faith in E-Commerce
application
A) e- Help B) e- Health
Choose the correct option:
C) e - Tendering D) e– Feedback
a) i,ii and iii b) ii and iii only
Choose the correct option
c) i and iii only d) i and ii only
a) (A) and B) only b) (C) and D) only
c) (B) and D) only d) (B) and C) only 3. Responsibilities of E – Governance
3. The National e – Governance Plan (NEGP) has been A. Easy access to single point delivery of public
formulated by _____ service to citizens
a. Department of Electronics and Information B. Higher penetration due to automation
Technology (DEITY) C. Increased efficiency due to connectivity
b. Department of Administrative Reforms and Public D. Increased accountability
Grievances (DARPG) E. Reduction in cost of delivery services
c. Departmental NIC F. Increased transparency
Choose the correct answer from the following: G. Higher availability of public domain information
a) a & b b) a & c H. Reduced corruption.
c) c only d) none of these. Choose the correct answer from the following:
a) A, B, D, F, G, H b) A, B, C, E, F, G
4. E-Governance Facilitate interaction between different
c) A, B, C, E, G d) All of these.
stake holders in governance.
A. G2G – Government to Government Answer Key
B. G2C – Government to Citizens
C. G2B – Government to Business 1 2 3
D. G2E – Government to Employee b a d
Choose the incorrect answer from the following:
a ) A only b) B, C
c) C, D d) None of these

Answer Key
Communication Technology

1 2 3 4
d a a d
Information and

LEVEL 2
1. Regarding E governance, which of the following
statements is / are correct? [Dec-2019]
i. Decreasing transparency is an ICT enabled
advantage of E-Governance
ii. E-Governance is related to the implementation of
ICT in the government processes and functions.

Professor Academy

ABBREVIATIONS AND TERMINOLOGY SDT Serial Data Transmission


CAN Campus Area Network
Abbreviations
PAN Personal Area Network
AGP Accelerated graphics port SIMM Single In-line Memory Module
ICT Information and Communications ALU Arithmetic Logic Unit(Dec-2012)
Technology (Dec-2004) DIMM Dual In-line Memory Module
PC Personal Computer CMOS Complementary Metaoxide Semi-
EPROM Erasable Programmable Read Only Conductor
Memory ENIAC Electronic Numerical Integrator and
EEPROM Electrically Erasable Programmable Calculator
Read Only Memory EDSAC Electronic Delay Storage Automatic
BIOS Basic Input and Output System Computer
HDD Hard Disk Drive MAC Media Access Control
RW Re-Writable IC Integrated Circuit
UNIVAC Universal Automatic Computer LSIC Large Scale Integrated Circuit
GUI Graphical User Interface GIGO Garbage In Garbage Out
USB Universal serial Bus (Nov-2017) PHP HyperText Preprocessor
VGA Visual Graphics Array PDA Personal Digital Assistant
MAN Metropolitan Area Network USSD Unstructured Supplementary Service
Data
WAN Wide Area Network
WWW World Wide Web
ASCII American Standard Code for
Information Interchange COBOL Common Business Oriented
Language
EBCDIC Extended Binary Coded Decimal
Interchange Code CCNP Cisco Certified Network Professionals
CPU Central Processing Unit BASIC Beginners All Purpose Symbolic
Instruction Code
OS Operating System
CEH Certified Ethical Hacking
CD Compact Disk
TCP Transmission Control Protocol
ROM Read Only Memory
UDP User Datagram Protocol
VDU Visual Display Unit
SMTP Simple Mail Transfer Protocol
URL Uniform Resource Locator
(June-2019)
IDE Integrated Development
CISCO Computer Information System
Environment
Company
FORTRAN Formula Translator
Communication Technology
XSS Cross Site Scripting
MOS Metal oxide Semi Conductor
XML Extensible Mark-up Language
Information and

ATX Advanced Technology Extended


HTML Hyper Text Mark-up Language
SIM Subscriber Identification Module
CCNA Cisco Certified Network Associate
ISP Internet Service Provider
DBMS Database Management System RFI Remote File Inclusion
SQL Structured Query Language HTTP Hyper Text Transfer Protocol
PCI Peripheral Component DDOS Distribution Denial Of Service
Interconnect (Dec-2019) DOS Disk Operating System

4.57
Professor Academy
VPN Virtual Private Network SDI Selective Dissemination of
SEO Search Engine Optimization Information
IP Internet Protocol CCITT Consultative Committee for
ASR Automatic Speech Recogni International Telephony and
Telegraphy
ATM Automated Teller Machine
BCD Binary Coded Decimal LAN Local Area Network (Dec-2006)
BIS Business Information System CD-I Compact Disc Interactive
BPS Bits Per Second CDS Computerized Documentation
DVD Digital Versatile Disc (Jan-2017) System
CAD Computer Aided Design ISIS Integrated Set of Information Systems
CAM Computer Aided Manufacturing CGI Common Gateway Interface
CASE Computer Aided Software CIT Computer Information Technology
Engineering CD-ROM Compact Disc Read-Only Memory
CPS Character Per Second DDC Display Data Channel / Dewey
CROM Control Read Only Memory Decimal Channel
CRT Cathode Ray Tube RAM Random Access Memory (Dec-2007)
DPI Dots Per Inch (Dec-2018) ECTD Electronics, Computer &
DTP Desk Top Publishing Telecommunication Department
FM Frequency Modulation EDVAC Electronic Discrete Variable
ISO International Standard Organization Automatic Computer
LCD Liquid Crystal Display (June- 2019) ES Expert Systems
MICR Magnetic Ink Character Recognition FDM Frequency Division Multiplexing
OCR Optical Character Recognition HW Hard Ware
OMR Optical Mark Reader IBM International Business Machine
PCB Printed Circuit Board IM Instant Message
PDF Portable Document Format I/O Input/output
PIN Personal Identification Number INDEST Indian National Digital Libraries in
PPP Point-to-Point Protocol Engineering Science & Technology
URL Uniform Resource Locator IRC Internet Relay Chat
VDU Visual Display Unit (Dec-2019) IRPHE Institute for Research and Planning in
Wi-Fi Wireless Fidelity Higher Education
AI Artificial Intelligence ISD International Subscriber Dialling
CCT Computer Communication IS & R Information Storage and Retrieval
Communication Technology

Technology ISDN Integrated Services Digital Network


ANS Advanced Network & Services
Information and

ISIO Internet Society on International


ARPANET Advanced Research Project Agency Organization
Network
ISLA Information Science Library Abstract
ASK Amplified Shift Keying ISOC Internet Society
BSD Berkely Software Distribution FTP File Transfer Protocol (June-2014)
KIPS Knowledge Information on
CAI Computer Assisted Instruction
Processing System
CAL Computer Aided Learning
LSI Large Scale Integration

Professor Academy
MARC Machine Readable Catalog CL Common LISP
MCSE Microsoft Certified Solutions Expert CLI Command Line Interface
MICT Ministry of Information and D/A Digital -to-Analog
Communication Technology DAT Digital Audio Tape
MSC Mobile Switching Centre DBS Data Base Management
NASA National Aeronautics and Space DDL Data Definition Language
Administration DDS Digital Data Storage
NGN Next Generation Network VLE Virtual Learning Environment
NICTA National Information & (Dec-2018)
Communication Technology DEC Digital Equipment Corporation
Authority
OPAC Online Public Access Catalog DMA Direct Memory Access
SDC System Development Corporation DNA Digital Network Architecture
DRAM Dynamic Random Access Memory
SDI Selective Dissemination of
Information DSN Distributed Systems Network/ Data
Source Name
ASCII American Standard Code for
Information Interchange (July-2016) DTS Digital Theater Sound
SME System Management Entity EPG Electronic Programming Guide
SSI Small Scale Integration EPIC Explicitly Parallel Instruction
Computing
STD Subscriber Trunk Dialling
FAT File Allocation Table
SW Soft Ware
GPRS General Packet Radio Service
TITAN Telemetry Instrumentation and
Telecommunication in an Automated GSM Global System for Mobile
Network communication
UHF Ultra High Frequency HSS Hierarchical Storage System
ULSI Ultra Large Scale Integration IDN Integrated Digital Networks
VLSI Very Large Scale Integration JPEG Joint Photographic Experts Group
VSAT Very Small Aperture Terminal JRE Java Runtime Engine
VSI Very Small Integration JSP Java Server Pages
WAP Wireless Application Protocol LED Light Emitting Diode
ACM Association for Computing LPM Lines Per Minute
Machinery CSS Cascading Style Sheet (Dec- 2014)
NMEICT National Mission on Education MBR Memory Buffer Register Communication Technology
Through Information and MIDI Musical Instrument Digital Interface
Communication Technology MIPS Millions of Instructions Per Second
Information and

(Dec-2015) MPEG Motion Picture Expert Group


ALGOL Algorithmic Language AAC Advanced Audio Coding
AMD Advanced Micro Devices
ACA Adaptive Channel Allocation
BASIC Beginners All-purpose Symbolic
Instruction Code ACC Analog Control Channel
BIPS Billions Instructions Per Second ACF Authentication Control Function
BPI Bytes Per Inch ACM Address Complete Message

4.59
Professor Academy
ACS Automatic Configuration Service DLL Dynamic Link Library
ACTS Advanced Communications DNS Domain Name Server
Technology Satellite DNS Domain Name System (Dec-2018)
ADDS Application Data Delivery Service DVB Digital Video Broadcasting
ADLC Asynchronous Data Link Control FDMA Frequency Division Multiple Access
ADT Asynchronous Data Teleservice GAT Generic Application Template
AIN Advanced Intelligent Network AUP Acceptable Use Policy
PDU Protocol Data Unit EGP Exterior Gateway Protocol
RFID Radio Frequency Identification GPU Graphics Processing Unit
(Dec-2018) GWT Google Web Toolkit
ALI Automatic Location Identification ARP Address Resolution Protocol
ANI Automatic Number Identification AAA Authentication Authorization,
API Application Programming Interface Accounting
APS Asynchronous Protocol Specification ACP Airline Control Program
ASIC Application Specific Integrated ASIC Application-Specific Integrated
Circuit Circuit
ASP Application Service Provider AVC Advanced Video Coding
ASR Automatic Speech Recognition AVI Audio Video Interleaved
BCC Blind Carbon Copy AWT Abstract Window Toolkit
WORM Write Once Read Many (Dec-2019) WOS Web of Science (Dec-2019)
BER Bit Error Rate BINAC Binary Automatic Computer
BSC Base Station Controller CLI Command Line Interface
BSC Binary Symmetric Channels CLR Common Language Runtime
BSS Broadcasting-Satellite Service DRAM Dynamic Random-Access Memory
CARE Computer Aided Reverse SRAM Static Random-Access Memory
Engineering DHTML Dynamic Hypertext Markup
CAS Customer Alert Signal Language
CCSN Common Channel Signalling DIP Dual In-line Package
Network
DIMM Dual Inline Memory Module
CDMA Code Division Multiple Access
DVI Digital Visual Interface
CORBA Common Object Request Broker
GIF Graphics Interchange Format (June
Architecture
2013)
CSMA Carrier Sense Multiple Access
IPS Instruction Prevention System
Communication Technology

DBA Data Base Administrator


IOT Internet Of Things
DBA Dynamic Bandwidth Allocation
Information and

IGRP Interior Gateway Routing Protocol


DHCP Dynamic Host Configuration
IPV4 Internet Protocol version 4
Protocol
IPV6 Internet Protocol version 6
DI Digital Interface
JVM Java Virtual Machine
CD-ROM Compact Disc Read Only Memory
(Dec-2007) MISD Multiple Instruction, Single Data
DLC Digital Loop Carrier NSI Network Service Interface
DLC Dynamic Load Control WWW World Wide Web (June-2013)

Professor Academy
MLE Managed Learning Environment compared to only 6% by traditional data centers,
according to research by Cisco.
TFTP Trivial File Transfer Protocol
Cloud computing differs from traditional IT
MOOC Massive Open Online Course (Dec-2014) hosting services in that the consumer (whether
RTF Rich Text Format that’s a business, organization, or individual user)
PPP Peer to Peer Protocol generally doesn’t own the infrastructure needed to
PING Packet Internet Gopher support the programs or applications they use.
POST Power On Self-Test Artificial Intelligence
SFTP Secure File Transfer Protocol
The study of computer systems that attempt to
WMA Windows Media Audio
model and apply the intellgence of the human mind.
WMV Window Media Video A branch of computer science dealing with the
WYSIWYG What You See Is What You Get simulation of intelligent behaviour in computer. The
(June-2008) capability of a machine to imitate intelligent human
ZIF Zero Insertion Force behaviour.
ZIP Zero Information Protocol
Internet of Things (IOT)
HDMI High Definition Multimedia Interface
UPS Uninterruptible Power Supply Internet of Things (IoT) is a network of physical
objects or people called “things” that are embedded
ICANN Internet Corporation for Assigned
with software, electronics, network, and sensors that
Names and Numbers
allows these objects to collect and exchange data.
The goal of IoT is to extend to internet connectivity
Advanced Concepts from standard devices like computer, mobile, tablet to
Big data relatively dumb devices like a toaster.
IoT makes virtually everything “smart,” by
Extremely large data sets that may be analysed improving aspects of our life with the power of data
computationally to reveal patterns, trends, and collection, AI algorithm, and networks. The thing
associations, especially relating to human behaviour in IoT can also be a person with a diabetes monitor
and interactions. Big Data is a collection of data that implant, an animal with tracking devices, etc.
is huge in volume, yet growing exponentially with
time. It is a data with so large size and complexity
Terminology
that none of traditional data management tools can
store it or process it efficiently. Big data is also a data ADSL
but with huge size. Abbreviation for Asymmetric Digital Subscriber
Line. A high-speed digital telephone connection
Cloud Computing
that operates over an existing copper telephone line,
Cloud computing is the delivery of computing allowing the same line to be used for voice calls.
services-including servers, storage, database, Adware
Communication Technology

networking, software, analytics, and intelligence- It is a software that may have been installed on
over the Internet (“the cloud”) to offer faster your computer by a remote computer, i.e. via the
Information and

innovation, flexible resources, and economies of Web. Many free utilities that you download from
scale, you typically pay only for cloud services you the Internet will install hidden software that sends
use, helping lower your operating costs, run your details of the websites you visit and other information
infrastructure more efficiently and scale as your from your computer (which can include your email
address) to advertisers so they can target you with
business needs change. popup ads and spam.
Cloud computing is taking the world by storm.
AJAX
In fact, 94% of workloads and compute instances will
vbe processed through cloud data centers by 2021, Abbreviation for Asynchronous JavaScript and
XML
4.61
Professor Academy
It is a web programming tool which makes it AVI
possible to create interactive web applications. AJAX Abbreviation for Audio Video Interleave
is a programming tool that is used extensively in (or Interleaved). A file format for storing video
what are known as web 2.0 applications. recordings on a computer. See ASF, MOV, MPEG,
Anchor RM, which are alternative video file formats.
A term used in connection with HTML, the Backup
coding system used for creating Web pages. An Used as a verb, to back up means to copy a File
anchor is the target of a Hyperlink. i.e. A point in a or Folder from your computer to another Storage
Web document to which you jump when you click Device e.g. a CD-ROM.
on a hyperlink. Bandwidth
Animation The amount of data that can be sent from one
The display of a sequence of images in a computer computer to another through a particular connection
program or on a Web page to give the impression of in a certain amount of time, e.g. via a computer to
movement. the Internet and vice versa. The more bandwidth
ANSI available, the faster you are able to access information.
Bandwidth is usually measured in kilobits per
Abbreviation for American National Standards second(Kbps) or megabits per second(Mbps).
Institute. This is a system that specifies code numbers
for all the characters that appear on a computer Baud
Keyboard, plus the extended character set used in A unit of measurement at which data can be
Microsoft Windows. transferred (i.e. the baud rate), for example over a
Apache telephone line via a Modem or from a computer to an
external device such as a Printer. Rarely used nowadays,
It is the most popular web server software on as transfer rates are normally expressed in kilobits per
the World Wide Web. Apache mainly runs on UNIX second (Kbps) or megabits per second (Mbps).
systems.
Binary File
API
Strictly speaking all computer files are Binary,
An Application Programming Interface (API) is consisting of a string of ones and zeroes, but the term
a tool set that programmers can use in helping them binary file is often used to differentiate program files
create software. Example is the Apple (iOS) API and data files.
that’s used to detect touchscreen interactions. APIs
are tools. They allow you as a programmer to deliver Blended Learning
solid solutions fairly rapidly. This term normally refers to combining Internet-
Applet based distance learning with face-to-face tuition but
it may also be used to describe combining offline
It is a small program written in the Java progr- ICT-based materials with more traditional materials,
amming language and embedded in a web page. such as books, audiocassettes and videocassettes.
When we use our browser to access a web page,
an applet may run inside the web page, as it were Blog
to perform an interactive animation and make a A blog (short form for web log) is an online
calculation or carry out another simple task. diary in which an individual records and publishes
Archive his/her thoughts on one or more subjects. A blog
can contain news items, short essays, annotated
It is used to describe the documents or files
Communication Technology

links, documents, graphics and multimedia. These


that are not immediately needed but it won’t be
completely discarded. An archive may be stored in posts are usually in reverse chronological order and
Information and

an external hard disc, such as CD-ROM, DVD or often take the form of a journal or diary. Blogger
other storage devices. refers to someone who blogs, i.e., who regularly
writes blogs.
Asynchronous
Back Door
“Not at the same time”. Often used to refer to
communication by Email or via a Discussion List, A backdoor refers to any method by which
where the recipients of the email or the participants authorized and unauthorized users are able to get
in the discussion do not have to be present at around normal security measures and gain high
the same time and can respond at their own level user access on a computer system, network or
convenience. software application.

Professor Academy
Broadband Clipart or Clip Art
A general term used to describe a high-speed A collection of image files that can be embedded
connection to the Internet. Connection speed is or inserted into Web pages, word-processed
usually measured in Kbps (kilobits per second) and documents, PowerPoint presentations, etc.
Mbps (megabits per second). Typically, a home user Clipboard
will have a broadband connection using an ADSL
telephone line running at 2Mbps to 8Mbps. A temporary storage area in a computer’s memory.
It may be used, e.g. to store text that we are in the
Bulletin Board process of copying and pasting from one section of a
A type of forum on the Internet or an intranet, word-processed document to another section in the
where users can post messages by email or via the same document or to another document.
World Wide Web for other users to read and respond Compatibility
to.
Pieces of hardware or software which are
CEF capable of being used together are described as
Shortened abbreviation for the Common compatible
European Framework of Reference for Languages.
Compression
CGI Script
A technique which reduces the amount of space
A term used by Web authors. CGI is an required to store data, e.g. as used to reduce the
abbreviation for Common Gateway Interface. A amount of space needed to store an image, an audio
program residing on a Web Server, usually in a recording, or a video recording.
directory called cgi-bin, which processes data from
an HTML form. CGI scripts can be written in any Computer Assisted Instruction (CAI)
programming language suitable for handling text A term used mainly in the business world.
data, but Perl (http://www.perl.com) is the most Implies a top-down, instructor-centred approach to
popular scripting language. teaching with computers and is closely associated
Character User Interface (CUI) with Programmed Learning.
A Character User Interface describes a way Computer Based Training (CBT)
in which a computer user communicates with A term used mainly in the business world.
a computer by entering commands as text, i.e. Implies a top-down, trainer-centred approach to
In order to run programs and to carry out other teaching with computers and is closely associated
operations such as copying information from one with Programmed Learning.
Folder to another, deleting files, etc. Contrasted
Computer Program
with a Graphical User Interface (GUI), e.g.
Microsoft Windows, which allows the user to carry A set of instructions that the computer carries out
out such operations by clicking on icons, opening in sequence to perform a given task. Programs are
and shutting windows and dragging and dropping written in English-like programming languages (e.g.
with a mouse. MS DOS and Unix are examples of C, Pascal), are then converted into binary machine
CUIs. See Icon, Mouse, Operating System, Window, instructions via a compiler or an interpreter.
Windows. Cookie
Chat Room A piece of information stored on a user’s
A synchronous, mainly text-based comm- computer by a Web Browser when the user visits a
Communication Technology
unication facility, offering a Web-based environment website for the first time. Websites use cookies to
where people either drop into or arrange to meet and recognise users who have previously visited them.
Information and

chat at specific times. We type in our text online, it The next time that the user visits that site, the
is seen almost immediately by others online at the information in the cookie is sent back to the site so
same time who respond online in real time. that the site can tailor what it presents to the user,
Client e.g. favorite in music or shopping habits.
A computer that receives services from another Copyright
computer. A stand-alone computer on your desk New technologies have raised all kinds of new
which we use to browse the Web is a client, and the issues relating to copyright. mainly it has become
computers from which World Wide Web files are so easy to copy materials from a variety of digital
downloaded to your computer are servers. sources.

4.63
Professor Academy
Crawler Dots Per Inch (DPI)
A crawler is a program that searches the Web for The definition of DPI is the same as PPI. DPI
new links, new content and changes in order to keep is used to measure the number of points which is
Search Engine results up to date. equivalent to 1 inch. Because in a printer, dots per
Cursor inch means the number of ink dots per inch. DPI
The pointer which appears on screen and is can be higher and lower depending on the printer’s
controlled by a pointing device, such as a mouse. The characteristics are show less.
cursor usually has the shape of an arrow. Domain Name
Cyber Venting A unique name that identifies a Website. A
Cyber-venting is the act of bad-mouthing about domain name can be purchased from registered by a
one’s employer, senior executives, colleagues, etc. with domain name registration company, Eg : http://www.
the intention of letting off the steam, using websites amenworld.com. Such companies also provide a
and making such comments public for all to see them. service that will check if a required name is available
While the websites do not restrict the mentioning of for purchase. Domain names always have two or
the name of the employer and company or its address. more parts, separated by dots.
It allows for the anonymity of the employee who posts
the comments. This poses trouble for the companies Desktop Publishing (DTP)
to track down the employees who posted them. The Desktop publishing is the creation of documents
negative statements affect the company’s images and using page layout software on a personal computer.
the posting of confidential information on the internet Initially, It was exclusively used for print publications,
will adversely affect the companies and benefit its but now it also assists in the creation of various forms
competitors. of online content.
Dynamic Microphone
Using a website to pour out one’s grievances is
This type of microphone is often used in
also called a cyber venting.
multimedia CALL programs when the learner has
Defragmentation to record his/her own voice. The main drawback
Defragmentation, also known as “defrag” or of this type of microphone is requires considerable
amplification and may result in very faint playback
“defragging” is the process of reorganizing the data on some systems. This type of microphone is often
stored on the hard drive so that related pieces of data popularly referred to as a karaoke microphone.
are put back together, all lined up in a continuous Encryption
fashion. A system of coding that helps prevent access to
Digital Camera private information on computer networks or on the
A camera used for taking still photographs - but Web.
some digital cameras can also record short sequences End-user
of moving images. A digital camera looks much the The final user of a piece of Software or Hardware
same as an ordinary camera but stores photographs i.e. the individual person for whom the product is
in electronic format so that they can be uploaded created, as distinct from the people who create and
computer via a USB cable to a computer. produce the product.
Communication Technology

Dithering: E-Feedback
The technique of combining dots of primary Electronic feedback loops are used to control the
Information and

colours to give the appearance of intermediate output of electronic devices, such as amplifiers. A
colours. Dots are combined in a square area, known feedback loop is created when all or some portion of
as a dither matrix, to simulate a dot of an intermediate
the output is fed back to the input. A device is said to
colour.
be operating open loop if no output feedback is being
Digital Divide
employed and closed loop if feedback is being used.
A society which is dependent on technology can
E-Tendering
create inequality. The gap between those who have
access to the latest technology and those who do not On-line Digitally signed E-Tenders are invited
is called the ‘digital divid. in two Bid System from Manufacturers / authorized

Professor Academy
dealers for “Supply of Computer System with File
Monitor & Laptops at National Science Centre, A file in computer jargon can be used to describe
Delhi”. The experienced / eligible manufacturers/ many different things. It may be a Computer Program,
reputed authorized dealers may download the tender a document file created with a Word-processor, an
documents from the Central Public Procurement image file, an audio file, a video file, etc. Think of it
Portal. in the same way as we would think of a file in a filing
cabinet. A file has a name that describes what it is,
The online bid both Technical Bid and Financial and the file is stored in a place where we can easily
Bid, should be uploaded by the due date and time as find it.
per the above schedule. The responsibility to ensure Firewire
the same lies with the bidders. Off-line tenders shall A firewire is a facility that allows you to transfer
not be accepted and no request in this regard will be video recordings very quickly from one device
entertained whatsoever. to another, e.g. from a Camcorder to a computer,
Extension using a special cable that connects to the computer’s
firewire socket. Many modern computers already
In computer jargon an extension is an optional have a firewire socket built in.
addition, usually consisting of a dot plus three or
four letters, to the name of a File. The extension Firmware
to the filename helps the computer (and the user) Software that has been written to a ROM (Read
recognise what type of file it is and what it may Only Memory) chip by the manufacturers.
contain, e.g. .doc is a Word document file, .exe is a Flash Drive
computer program, .jpg or .jpeg is a picture file, and A portable Storage Device. Flash drives look like
.htm or .html is a Web page file. a small flat pen, around 3cm to 5cm long, and are
E-health easily carried in your pocket. Their storage capacity
It is also called e-health care, use of digital is impressive; 4GB to 8GB is not unusual these days.
technologies and telecommunications, such as They are used to store data that you wish to carry
computers, the Internet, and mobile devices, to around, e.g. a PowerPoint presentation, and they can
facilitate health improvement and health care be plugged into any computer with a USB socket.
Flash drives are also commonly referred to as pen
services.
drives or memory sticks.
Favourites Flash Player
A facility within the Internet Explorer Browser Software produced by Adobe for the development
that enables you to keep a record of Web pages that and viewing of animated and interactive sequences
you have visited and may wish to visit again. Also on the Web.
known as bookmarks.
Folder
Feedback
An alternative word for a directory and which
Feedback is an automatic response from a has become more common since the introduction
computer, which may take the form of text, image,
of Windows. It describes a location on a disc which
audio and video or any combination of these, to a
contains a set of related files. A folder can be divided
learner’s input. Input from the learner may take
various forms, e.g. into sub-folders.
i. clicking with the mouse to select an answer in Font
Communication Technology

a multiple-choice exercise. The terms font (also spell fount) and typeface
ii. Typing an answer at the computer keyboard. are often confused or interchanged. Font refers to a
Information and

complete collection of letters, numerals, symbols and


iii. Speaking an answer into a microphone. punctuation marks that have common characteristics,
Feedback in interactive language learning including their style and size. The two common fonts
materials should go beyond a “boing” (wrong) or are Times New Roman and a Serif font.
“applause” (right) or “try again” message and attempt Formatting
to mimic the “live” situation when using the language
results in either a response from the other person The process of preparing a writeable disc for use.
or an action showing that the language used was Formatting creates a structure on the disc which
appropriate. Feedback is often described as intrinsic enables it to hold data.
(implicit) or extrinsic (explicit).
4.65
Professor Academy
Forum cards or bank account, which may be stored in a
Often used synonymously with Discussion List. file somewhere on your computer. If you access the
An electronic forum on the Internet or an intranet Internet regularly you should consider installing a
enables users to post messages by email or via the Firewall to protect against hackers.
Web for other users to read and respond to. Hardcopy or Hard Copy
Frame Printed output from a computer, as opposed to
A area in a Web page that scrolls independently output on screen.
of the rest of the Web page. A Web page can be Host
divided into multiple frames. Any computer that provides services to other
FTP computers that are linked to it, via a local network or
Abbreviation for File Transfer Protocol. This via the Internet is called as host.
is the method, i.e. a software standard, used for Host Name or Hostname
transferring files from one computer to another via A host name is the unique name of a computer
the Internet. FTP is also used as a verb in the sense on the Internet, which is normally written as a series
“to transfer” (a file). of letters, for example www.hull.ac.uk. A host name
GIF is the human-friendly form of the host’s numerical
Abbreviation for Graphics Interchange Format. IP address, i.e. it’s an alias for the “real” Internet
A file format used for storing simple graphics. GIF address of the host computer.
files use a palette of 256 colours, which makes them Hypermedia
practical for almost all graphics except photographs. The extension of the hypertext concept to
Generally, GIF files can be used for logos, line multimedia, describing the combination of
drawings, icons, etc, i.e. images that don’t contain a multimedia information (text, images, audio,
rich range of colours. A GIF file containing a small video, etc) in a meaningful configuration, which is
number of colours tends to be quite small, but it will especially useful for teaching and learning.
be big if the image has a wide range of colours, e.g. a Icon
photograph.GIF files are commonly used for storing
images on the Web. A small symbol or picture used in a Graphical
User Interface (GUI). The icons on the computer
Google screen represent programs or files, e.g. a picture of a
It is a popular Search Engine. Probably the most painter’s palette might represent a program used for
widely used search engine on the Web. drawing and editing pictures, and a picture of a book
Graphical User Interface (GUI) with a question mark on its cover might represent the
An Interface, i.e. a software package that text of a manual or a help file. In a GUI the Mouse
enables human beings to control what happens is used to move the Cursor so that it locates over an
on their computers. A GUI consists of graphical icon. Clicking a button on the mouse then causes the
elements known as icons and enables the user to run program that the icon represents to run or a file to be
programs and to carry out other operations such as displayed.
copying information from one Folder to another, Feedback
deleting files, etc by clicking on these icons, opening A verb used to describe the process of installing or
and shutting windows and dragging and dropping setting up a computer program or suite of computer
with a mouse. Microsoft Windows and the much programs on the computer’s hard disc for first-time
Communication Technology

older Apple Mac interface are GUIs. Contrasted use. Programs are normally supplied on CD-ROM
with Character User Interface (CUI), an older type or DVD, but they may also be downloaded from the
Information and

of interface which required the user to control the Web, either free of charge or on payment.
computer by typing commands at the Keyboard. Integrated Circuit
Hacker An electronic circuit etched onto a small piece
A person who spends their time trying to gain of silicon which has been subjected, using photo-
access to information stored on other people’s masking processes, to controlled “doping” with
computers all around the world. Some hackers are certain impurities. Particular areas of the chip can
just harmless browsing types, but other have more then be made to act like electronic components such
invidious aims such as grabbing details of your credit as diodes, capacitors and resistors.


Professor Academy
Internet Inequality JPEG or JPG
The Digital Divide refers to the gap between Joint Photographic Expert Group. Pronounced
those able to benefit from the internet and those “Jaypeg”, a file format used for storing images.
who are not. The matter of closing the digital divide The JPEG/JPG format uses a palette of millions of
nowadays includes the matter of how emergent colours and is primarily intended for photographic
images. The internal compression algorithm of the
technologies such as Artificial Intelligence, robotics
JPEG/JPG format, unlike the GIF format, actually
and internet of things can help societies. throws out superfluous information, which is why
Interactive Video (IV) JPEG/JPG files containing photographic images end
A system consisting of a computer connected to up smaller than GIF files containing photographic
a 12-inch videodisc player, allowing the presentation images.
of still images or video clips combined with some LCD
kind of interactivity, e.g. carrying out a set of Liquid Crystal Display, a technology used for
exercises linked to the images or to the video clips. producing a type of flat panel computer Display
Interface Screen, which is replacing the older type of Cathode
An interface in computer jargon is a connection Ray Tube display screen. A more advanced form of
between two systems. It can be Hardware or Software. technology for producing flat panel display screens
It may take the form of a plug, cable or socket, or is known as TFT (Thin Film Transistor). LCD and
all three, for example where a Printer or Scanner is TFT screens are also used in digital cameras and
connected to a computer, and then it’s a hardware camcorders.
interface. There are also software interfaces that Learning Platform
enable one program to link with another, passing This term is used to describe the software and
across data and variables. The term interface, also systems that are used to deliver E-learning. Some
known as user interface, also describes the software confusion surrounds this term: sometimes it is used
that is used to enable human beings to communicate synonymously with Virtual Learning Environment
with a computer, for example Microsoft Windows, (VLE) and sometimes with Managed Learning
which is a Graphical User Interface (GUI) in Environment (MLE). Many people use it as a catch-
common use on personal computers. all term to describe software and systems designed
iPod to manage, deliver and provide access to E-learning
The name of a portable (mobile) Media Player materials.
designed and marketed by Apple. The iPod first Linux
appeared in 2001. As well as being capable of storing The Unix-type Operating System, similar to
and playing back audio recordings, newer models Windows and the Apple Mac operating system.
can also record and play back video. The iPod has Linux was originally created by Linus Torvalds
become popular for storing recordings, mainly music with the assistance of developers around the world.
downloaded from the Web or transferred from audio The Source Code for Linux is freely available to
CD to a computer and then moved across to an iPod everyone.
using a software package known as iTunes. Lurker
Internet Commercials It is mainly used in connection with a Discussion
Delivering ads to Internet users via websites, List, Forum or Blog. This term describes someone
email, ad-supported software, text messaging who prefers to read other people’s messages rather
Communication Technology

and Internet-enabled cellphones. Also called an than posting their own views.
“ad network” or “ad serving network,” Internet Machine Assisted Translation (MAT)
Information and

advertising organizations act as a middleman The use of computers to assist human beings in
between the advertiser and the Internet venues that the process of translating natural language. MAT
display the ads. systems are normally used as only aids for human
translators who have to intervene in the process of
ISDN translation by machine, making corrections and
Integrated Services Digital Network, a type of amendments as necessary. Contrasted with Machine
digital telephone service, used for transferring large Translation (MT), which normally describes a fully
chunks of data to and from the Internet without a automatic process.
Modem.
4.67
Professor Academy
Machine Code transistors etched on to its surface, connected to
The machine-readable form of a computer the Motherboard by an array of pins at its base.
program, produced by conversion of the human- Microsoft Office: A suite of programs produced
written program (source code) into binary code by a by Microsoft Corporation, comprising a Word-
compiler or interpreter. processor (Word), a Spreadsheet (Excel), a
Macro Presentation Program (PowerPoint), an Email
A sort of mini-program that can be package (Outlook), a Database program (Access),
incorporated into other programs, comprising a and a Desktop Publishing package.
series of keystrokes that you may wish to use over MIDI
and over again. For example, if you perform a task Abbreviation for Musical Instrument Digital
repeatedly in Microsoft Word, you can automate Interface. A format for synthesised music. Music in
the task using a macro. A macro is a series of MIDI format is created and played through the use of
commands and instructions that you group synthesisers, unlike “real” music which is normally
together as a single command to accomplish a task recorded in MP3, WMA or WAV format.
automatically.
MP3
Media Player
Abbreviation for MPEG Layer 3. MP3 is a file
It is used in two main senses: (1) A program format for storing high-quality audio files that can
that enables your computer to record, store and play be played back on computers and portable media
back audio and video recordings; (2) A device such
players such as the iPod. MP3 has the advantage of
as the portable iPod media player that is also used to
taking up far less storage space than the WAV format
record, store and play back recordings.
without loss of quality.
Memory Stick
A small electronic card, also known as a memory MP4
card, which is inserted into a Digital Camera or The MPEG-4 is a file format. There are two basic
Camcorder for storing photographs or movie files types of MP4: MP4 AAC (Advanced Audio Coding)
that can then uploaded to a computer. This term is and MP4 AVC (Advanced Video Coding). The MP4
also used as an alternative to Flash Drive. AAC file format is used to store audio files in a more
Menu manageable size without affecting the quality. The
MP4 AVC file format is used to store video files in a
A list of options from which a computer user
more manageable size wihout affecting the quality. It
makes a selection in order to determine the course
of events in a program. This usually involves keying is also increasingly being used for storing video on
in a single letter or number, or selecting text or an iPods and similar portable devices. Ex- MPEG.
Icon with a Mouse. MPEG or MPG
Menu Bar Motion Picture Expert Group is Pronounced as
Most computer programs display a menu bar or “Empeg”. A standard file format for storing movies
set of menu bars at the top of the screen, from which in digital format and high-quality audio files in a
choices can be made by the user to carry out certain variation known as MP3. Video files stored MPEG
operations, e.g. saving a File, printing a document, format can be recognised by the Extension .mpg
or setting up the program in different ways. or .mpeg. MP3 audio files can be recognised by
the Extension .mp3. A newer file format is MP4.
Communication Technology

Microphone
MP4 files that can be recognised by the Extension
It is essential for making sound recordings in .mp4.
Information and

multimedia CALL programs. Microphones used in


multimedia applications are much the same as those MS DOS
used with standard audio cassette devices. Microsoft Disc Operating System is an operating
Microprocessor system for the personal computer, written by
The micro processor is the Central Processing Microsoft Corporation, but now superseded by
Unit (CPU) of a computer, where all the data Microsoft Windows. MS DOS is a character-based
processing and calculations are carried out. system, whereby the user has to type commands at a
It’s a single silicon chip containing millions of prompt.


Professor Academy
Multimedia Netizen
The integration of two or more types of Derived from the term citizen, referring to
information (text, images, audio, video, animation, a citizen of the Internet, or someone who uses
etc.) in a single application. networked resources. The term connotes civic
Multitasking responsibility and participation.
The execution of more than one program, Netscape
apparently at the same time, on a computer. In reality, An early Web Browser, which first appeared
however, the computer rapidly switches its attention in 1994, shortly after the World Wide Web went
from one program to another, thus dividing its time. public.
Multitasking makes it possible, e.g. to print one word-
processed document while working on another. Package
Another form of multitasking allows you to open A program or suite of programs such as Microsoft
several different windows in which different programs Office, but often has the sense of a set of programs
can be run, but only one window is the active window. designed to be used by people who wish to use the
package in different ways.
My Log
The verb “log on” refers to the process of accessing PDF
a secure computer system or website. When you log Portable Document Format is a file type created
on to a system, you provide “login” information by Adobe that allows fully formatted, documents
to be transmitted across the Internet and viewed
that authenticates you as a user. Similarly, when you on any computer that has Adobe Acrobat Reader
access a remote system through a remote access or software - a proprietary software viewing program
FTP (File Transfer Protocol) connection, you may be available for free at the Adobe website.
required to log on to the system.
Pen Drive
Narrowband An alternative term for Flash Drive.
A term used to describe a slow-speed connection
to the Internet, normally via a Modem and less than Pixel
or equal to 64 Kbps. A contraction of picture element. What we see on
a computer display screen is made up of thousands
Navigation of coloured pixels or small dots, which can be set
This describes the process of finding your way, according to the user’s choice to produce either low-
i.e. navigating, around a series of menus within a resolution output, medium-resolution output or
computer program or finding your way around the high-resolution output.
World Wide Web by means of a Browser.
Portal
Netbook A Web page, website or service that acts as link
A netbook is a small, lightweight computer, or entrance to other websites on the Internet.
smaller than a Laptop Computer, with a long battery PowerPoint
life and ideal for travelling. Netbook computers have
The name of a Presentation Program forming
built in Wifi and are optimized for browsing the Web part of the Microsoft Office suite of programs.
and Email.
Pop-up Message
Net Ads
Communication Technology

Pop-ups are small windows that ‘pop up’ over


Online advertising, also known as online
the top of web pages in your internet browser.
Information and

marketing, Internet advertising, digital advertising


Advertisers used them as a way to get your
or web advertising, is a form of marketing and
attention, but users soon became annoyed, leading
advertising which uses the Internet to deliver
software providers and all the major web browsers
promotional marketing messages to consumers.
to introduce pop-up blockers.
Netiquette
Protocol
Etiquette on the Internet. A code of behaviour
for people communicating by email via the Internet. In Internet terminology protocol usually refers
There are several useful publications relating to to a set of rules that define an exact format for
netiquette. communication between systems.

4.69
Professor Academy
Viral Advertisement telephones. Skype and Ventrilo are examples of VoIP.
Viral marketing or viral advertising is a business War Dialling
strategy that uses existing social networks to promote
A war dialer is a computer program used to
a product. Its name refers to how consumers spread
identify the phone numbers that can successfully
information about a product with other people,
make a connection with a computer modem. The
much in the same way that a virus spreads from one
program automatically dials a defined range of phone
person to another.
numbers and logs and enters in a database those
Virtual Reality numbers that successfully connect to the modem.
The simulation of an environment by Web 2.0
presentation of 3D moving images and associated
sounds, giving the user the impression of being able Web 2.0 is the term used to describe a variety
to move around with the simulated environment. of web sites and applications that allow anyone to
Users wear helmets and visors that convey the images create and share online information or material they
and sound and gloves that give them the experience have created. There are number of different types of
of touching objects. web 2.0 applications including wikis, blogs, social
VoIP networking.
Voice over Internet Protocol, is audio
communication using the Internet instead of

6. Given below are two statements [Sept-2020]


Self Evaluation Statement I: ALU stands for Arithmetic Logic Unit
Statement II: UPS stands for Uniform Power Source
LEVEL 1 choose the correct answer
1. What is the full form of the abbreviation BIOS? a) Both Statement I and Statement II are true
b) Both Statement I and Statement II are false
a)Big Information Online System [Sept-2020] c) Statement I is correct but Statement II is false
b) Binary Input Output Software d) Statement I is incorrect but Statement II is true
c) Basic Input Output System
d) Binary Inner Open Software 7. GUI stands for [Sept-2020]
a) Graphical Usage Interaction
2. What is the full form of the abbreviation IoT? b) Gaming User Interface
a) International Office of Tourism [Sept-2020] c) Graphical user Interface
b) Internet of Things d) Graphical User Interaction
c) Internet of Think
d) Instrument of Telecommunication 8. CDMA stands for [Nov-2020]
a) Code Division Multiplexed Access
3. What is the full form of the abbreviation ISP? b) Code Division Multiple Access
a) International Service Provider [Sept-2020] c) Code Division Mobile Access
b) Internet Service Provider d) Code Division Mobile Adapter
c) Internet Software Provider 9. In display technology, CRT stands for [Nov-2020]
d) Internet Service Product
Communication Technology

a) Cathode Ray Transmission


4. URL stands for [Oct-2020] b) Computer Ray Transmission
Information and

a) Universal Resource Location c) Cathode Ray Tube


b) Universal Response Locator d) Cathode Ray Transducer
c) Unified Response Location 10. BCD stands for [Nov-2020]
d) Uniform Resource Locator a) Binary Coded Decimal
5. What is the full form of the abbreviation GIF? b) Binary Coded Digit
c) Bit Coded Decimal
a) Graphics Interchange Format [Sept-2020]
d) Bit Coded Digit
b) Graphics Interchange File
c) Global Interchange Format
d) Graphics Input Format

Professor Academy
11. Full form of the abbreviation OCR is: [Nov-2020] 19. Commercial messages on the net are identified as
a) Optical Character Recognition a) Net ads b) Internet commercials
b) Online Computer Reader c) Web mercials d) Viral advertisements
c) Optical Computer Recognition
20. Which of the following is a characteristic of Web2.0
d) Optical Control Reader
applications?
12. What is the full form of the abbreviation CD-ROM? a) Multiple users schedule their time to use Web2.0
a) Count Disk Random Only Memory [Nov-2020] applications one byone.
b) Compact Disk Run Only Memory
b) Web2.0 applications are focused on the ability for
c) Compact Disk Read Only Memory
people to collaborate and share informationonline.
d) Count Disk Raw Only Memory
c) Web2.0 applications provide users with content
13. Which of the following is excluded from the domain rather than facilitating users to create it.
of Artificial Intelligence? [Sept-2020]
d) Web2.0 applications use only staticpages.
a) Computer Vision b) Machine Learning
c) Deep Learning d) Text 21. An image on a computer screen is made up of a
matrix of what?
14. Cloud computing has the following distinct a) Byte b) Pixels
characteristic: [Nov-2020] c) Bit d) Palette
(A) The service is hosted on the internet.
(B) ‘It is made available by a service provider. 22. What are the units used to count the speed of a
(C) It computes and predicts rain when the weather printer?
is cloudy. a) CPM b) DPI c) PPM d) BIT
(D) The service is fully managed by the provider 23. The process of laying out a document with text,
Choose the correct answer from the options given graphics, headlines and photographs is involved in
below: [June-2019]
a) (A), (B) only b) (A), (B). (C) only a) Desk Top Publishing b) Desk Top Printing
c) (A), (D) only d) (A). B), (D) only c) Deck Top Publishing d) Deck Top Printing
15. Which of the following is a computer based system 24. Which of the following statements, regarding the
that stores and manipulate data which are viewed term ICT is/are True?
from a geographical point or reference? [June-2019] P: ICT is an acronym that stands for Indian Classical
a) Data base system Technology.
b) Geographical Information System Q: Converging technologies that exemplify ICT
c) Geographic System include the merging of audio-visual, telephone and
d) Software system computer networks through a common cabling
16. A group’s access to digital technology and another system.
group’s lack of access to it, will causes a disparity a) P only b) Q only
known as [June – 2019] c) P and Q d) Neither P nor Q
a) Internet inequality 25. WAP refers to a technical standard for accessing
b) Web inequality information over a mobile wireless network. What
c) Technological imbalance does WAP stands for?
d) Digital divide a) Wireless Application Protocol
Communication Technology
17. What is blog? [June-2019] b) Wireless Area Protocol
a) Online music c) Wireless Analog Program
d) Wireless Application Program
Information and

b) Intranet
c) A personal or corporate website in the form of an 26. Using a website to pour out one’s grievances is called
online journal a) Cyber venting b) Web hate [Sept-2020]
d) A personal or corporate Google search c) Web anger d) Cyber abuse
18. Encoding or scrambling data for transmissionacross 27. The word blog is derived from the word [Nov-2020]
a network is knownas: [June-2019] a) My log b) We blog
a) Decryption b) Protection c) E blog d) Blogger
c) Detection d) Encryption

4.71
Professor Academy
Assertion (A): According to computer terminology
Answer Key ACPI is Advanced configuration and Power
1 2 3 4 5 6 7 8 interface.
Reason (R): It is an industry specification for the
c b b d a c c b
efficient handling of power consumption in desktop
9 10 11 12 13 14 15 16 and mobile computers.
c a a c d d b d choose the correct answer:
17 18 19 20 21 22 23 24 a) Both (A) and (R) are true and (R) is the correct
c d c b b b a b explanation of (A).
b) Both (A) and (R) are true and (R) is not the
25 26 27
correct explanation of (A).
a a b c) (A) is true but (R) is false.
d) (A) is false but (R) is true.

LEVEL 2 Answer Key


1. Given below are two statements one is labelled as 1 2 3 4 5
Assertion (A) and the other is labelled as Reason(R); a a b b a
Assertion (A): A blog is a form of social media
Reason (R): A blog allows anyone to communicate
to a public audience
choose the correct option: [June-2019]
a) Both (A) and (R) are true and (R) is the correct
explanation of (A) COMMON QUESTION
b) Both (A) and (R) are true and (R) is not the
correct explanation of (A)
LEVEL 1
c) (A) is true, but (R) is false
d) (A) is false, but (R) is true 1. Match List I with List II [Sept-2020]
2. Using websites to pour out one’s grievances is called: List I List II
a)Cyber venting b) Cyber ranting A. Web browser I. Hard Disk
c) Web hate d) Web plea[June-2019] B. Operating system II. Chrome
C. Secondary memory III. MS-Word
3. What is the ultimate purpose of Defragmentation? D. Application software IV. DOS
a) Make the PCfaster
Choose the correct answer from the options given
b) Create More Free Space
below:
c)Delete temporaryfiles
a) A - III, B - II, C - I, D - IV
d) Reduce Power consumption
b) A - II, B - IV, C - I, D - Ill
4. _______________ is a system of interrelated c) A - III, B - I, C - II, D - IV
computing devices, mechanical and digital d) A - III, B - I, C - IV, D – II
machines with unique identifiers(IDs) and ability to
2. Match List I with List II [Sept-2020]
transfer data over a network. It has an extensive set
Communication Technology

of applications in consumer, commercial, industrial, List I List II


infrastructural spaces. A. Software I. Step by step
procedure to solve a
Information and

a)Blockchain
problem
b) Internet of Things(IoT)
B. Hardware II. Raw facts and figures
c) Cloud computing
C. Algorithm III. Hard Disk
d) Machine learning
D. Data IV. Linux
Choose the correct answer
5. Given below are two statements. One labelled as
a) A - III, B - I, C - II, D - IV
Assertion (A) and other is labelled as Reason (R).
b) A - Ill, B - II, C - I, D - IV


Professor Academy
c) A - IV, B - I, C - II, D - III a) A - III, B - IV, C - I, D - II
d) A - IV, B - III, C - I, D – II b) A - IV, B - III, C - I, D - II
c) A - I, B - II, C- III, D - IV
3. Match List I with List II : [Nov-2020]
d) A - I, B - III, C- II, D – IV
List I (Computer Terms) List II (Description)
(A) Operating System (OS) (I) A service that runs 7. Given below are two statements
on the internet. Statement I: Operating systems are hardware
(B) WWW (II) Software the helps Statement II: Algorithm is a step by step procedure
an OS to control a to solve a problem
Piece of hardware. choose the correct answer [Sept-2020]
(C) Device Driver (III) Software that a) Both Statement I and Statement II are true
controls peripherals b) Both Statement I and Statement II are false
and Allocates memory c) Statement I is correct but Statement II is false
and processor time. d) Statement I is incorrect but Statement II is true
(D) IP (IV) Defines network 8. Given below are two statements [Sept-2020]
address and is used for
Statement I: Compilers are software
rout ing packets.
Statement II: Touch screen monitors are input/
Choose the correct answer from the following: output devices
a) (A) - (II), (B) – (IV), (C) - (III), (D) - (I) choose the most appropriate answer
b) (A) - (III), (B) - (I), (C) - (II), (D) - (IV) a) Both Statement I and Statement II are true
c) (A) - (IV), (B) - (I), (C) - (II), (D) - (III) b) Both Statement I and Statement II are false
d) (A) – (III), (B) – (IV), (C) - (II), (D) – (I) c) Statement I is true but Statement II is false
d) Statement I is false but Statement II is true
4. Match List I with List II [Oct-2020]
9. Match List I with List II: [Nov-2020]
LIST I LIST II
List I List II
A. Input device I.Chrome
(A) Input (I) Mouse
B. Output device II. MS- office
(B) Output (II) Monitor
C. Software III. Mouse
(C) Memory (III) Cache
D. Web browser IV. Monitor
(D) Software (IV) Python
Choose the correct answer
a) A - II, B- III, C-I, D-IV Choose the correct answer
b) A-III, B- IV, C-II, D- I a) A-(I), B-(II), C-(IV), D-(III)
c) A-I, B-II, C- IV, D-III b) A-(I), B-(III), C-(II), D-(IV)
d) A-IV, B- III, C- II, D-I c) A-(III), B-(II), C-(I), D-(IV)
d) A-(I), B-(II), C-(III), D-(IV)
5. Match List I with List II [Sept-2020]
List I List II 10. Match List I with List II [Nov-2020]
1) Programming LanguageI. Wide Area Network List I List II
2) Operating System II. MS PowerPoint (A) Web 2.0 Applications (I) Windows 8,ioS
3) Internet III. Windows XP (B) Search Engines (II) C++, Java
4) Application Software IV. C++ (C) System Software (III) Blogs, Twitter
Choose the correct answer (D) High level languages (IV) Google, Yahoo
Communication Technology
a) A – I, B – II, C – III, D – IV Choose the correct answer
b) A – IV, B – III, C –I, D - II a) (A)-(IV),(B)-(III),(C)-(I),(D)- (II)
Information and

c) A – IV, B – II, C – III, D - I b) (A)-(III),(B)-(IV),(C)-(I),(D)-(II)


d) A – II, B – III, C – I, D – IV c) (A)-(I),(B)-(III), (C)-(IV),(D)-(II)
d) (A)-(IV),(B)-(I),(C)-(III),(D)-(II)
6. Match List I with List II [Sept-2020]
List I List II 11. Given below are two statements [Oct-2020]
A. Search engine I. www.gmail.com Statement I: Printed output from a computer system
B. Job openings II.www.amazon.in is called soft copy.
C. E-mail III. www.google.com Statement II: RAM is a read/write memory.
D. E-commerce IV. www.naukri.com choose the correct answer
Choose the correct answer a) Both Statement I and Statement II are true
4.73
Professor Academy
b) Both Statement I and Statement II are false a) i only b) ii only
c) Statement I is correct but Statement II is false c)Both i and ii d) Neither i nor ii
d) Statement I is incorrect but Statement II is true
18. Match List I with List II [Dec-2019]
12. Which of the following statement is / arecorrect? a. Web browser i) Prepare written documents
i. The clock speed of a CPU is measured in hertz(Hz) b. Word processor ii) Create and edit web pages
ii. Blue tooth technology consumes more power c. Spreadsheet iii) Connect to websites and
than Wi-Fi technology display web pages
Choose the correct answer [dec-2019] d. Web authoring iv) Analyzes and summarize
a) i only b) ii only numerical data
c) Both i and ii d) Neither i nor ii a) a-ii, b-iv, c-i, d-iii b) a-iii, b-i, c-iv, d-ii
c) a-iii, b-i, c-iv, d-iii d) a-ii, b-i, c-iv, d-iii
13. Match the following
a. WWW (i) Volatile Memory 19. Match the following communication channels with
b. JAVA (ii) Non Volatile Memory their distinguishing type: [Dec-2019]
c. RAM (iii) World Wide Web Communication channel Distinguishing Type
d. ROM (iv) Programming Lanuage a) Blogging i) electronic media
Choose the correct option [Dec - 2019] b) Television ii) Print Media
a) (a)-i, (b)-ii, (c)-iii, (d)-iv c) Periodicals iii) Social media
b) (a)-ii, (b)-iii, (c)-iv, (d)-i d) Collection sites iv) World wide web
c) (a)-iii, (b)-iv, (c)-i, (d)-ii a) a-iv, b-ii, c-i, d-iii b) a-ii, b-iv,c-iii, d-i
d) (a)-iv, (b)-i, (c)-ii, (d)-iii c) a-i, b-iii, c-iv, d-ii d) a-iii, b-i, c-ii, d-iv
14. which one of the following pairs LEAST matches in 20. There are two sets given below Set – I specifies the
respect of computers? [Dec - 2019] IT related acronyms. While Set – II indicates their
meanings. Match the two and give the answer by
a) 1 Giga Byte: (1024) * (1024) * 8 bits
selecting the appropriate code.
b) CRT: Cathode Ray Tube
c) ROM: Rapid Online Memory Set – I (Acronyms) Set – II ( Meanings)
d) CPU: Central Processing Unit A. DPI i. Measures resolution of a laser
15. Which one of the following pairs least matches in printer
respect of computers? [June - 2019] B. CRT ii. An example of a read – Only
a) Gigabyte: (1024) * (1024) * (1024) bytes Storage
b) LCD: Light Crystal Display C. NIC iii. A type of a computer monitor
c) USB: Universal Serial Bus
D. CD - ROM iv. Enables computer to connect
d) GUI: Graphical Users Interface
to other computer
16. Match List I with List II [Dec - 2019]
A B C D
List I List – II
a) (i) (iii) (iv) (ii)
a) 50 in decimal i) 0110010 in binary
b) (ii) (iv) (iii) (i)
b) 102 in decimal ii) 1100110 in binary
c) (ii) (iii) (iv) (i)
c) Real-Time video iii) Synchronous
d) (i) (iv) (iii) (ii)
conferencing
communication
Communication Technology

d) SMS texting iv) Asynchronous Answer Key


communication 1 2 3 4 5 6 7 8
Information and

a) a-ii, b-i, c-iii, d-iv b) a-ii, b-i, c-iv, d-iii


c) a-i, b-ii, c-iii, d-iv d) a-i, b-ii, c-iv, d-iii
b d b b b a d a
9 10 11 12 13 14 15 16
17. Which of the following statement is/are correct?
d b d a c c b c
i) It is usually faster to access data stored in RAM
than that in hard drive 17 18 19 20
ii) The hexadecimal number is 99 is the same as the a b d a
decimal number 99
Choose the correct option [Dec - 2019]


Professor Academy
choose the correct options [June-2019]
LEVEL 2 a) Both (A) and (R) are true is the correct explanation
1. Which of the following statements are correct? of (A)
A. NKN stands for New Knowledge Network b) Both (A) and (R) are true R is not the correct
B. MOOCs are offline courses explanation of (A)
C. National Supercomputing Mission is a c) (A) is true, but (R) is false
Government of India initiative d) (A) is false, but (R) is true
D. Clock rate of CPU is measured in Gigabytes 4. Read the following two statements:
E. ParamShivay is a super computer [Oct-2020] I: Information and Communication Technology
a) C and E only b) B and C only (ICT) is considered a subset of Information
c) C and D only d) A and E only Technology (IT).
2. Identify the correct pair from the following: II: The ‘right to use’ a piece of software is termed
A. AVI – File, Transfer Protocol as copyright. Which of the above statement(s) is/are
B. Excel – Word Processing Software correct?
C. HDD – Cloud Storage Faculty a) Both I andII b) Neither I norII
D. Ubuntu – Operating System c) IIonly d) Ionly
Choose the correct option [Nov-2020]
a) A and C Only b) D Only Answer Key
c) B and C Only d) None of the above
1 2 3 4
3. Given below are two statements – one labelled as
Assertion (A) and the other labelled as Reason (R) a b a c
Assertion (A) : Information technology is fast
becoming a very important field of activity in India
Reason (R) : Software is one of the major exports
of India and further India has a very strong base in
Hardware

Communication Technology
Information and

4.75

You might also like