MPPSC Question Booklet Unit-9 (English)
MPPSC Question Booklet Unit-9 (English)
13. The third generation of computers introduced which of the following innovations?
A) Artificial Intelligence
B) Integrated Circuits
C) Vacuum Tubes
D)Fiber Optics
14. What type of computer forms the backbone of cloud computing services?
A) Embedded Computers
B) Mainframes and Supercomputers
C) Minicomputers
D) Personal Computers
17. Which programming language is designed for artificial intelligence and natural
language processing?
A) Java
B)Prolog
C) C++
D) R
20. Which of these languages is widely used for front-end web development?
A) Java
B) HTML
C) Python
D) Ruby
34. Which layer of the OSI model corresponds to the internet's IP addressing and
routing?
A) Physical Layer
B) Transport Layer
C) Network Layer
D) Application Layer
37. Which protocol secures communication over the internet using encryption?
A) HTTP
B) HTTPS
C) FTP
40. In which year was ARPANET, the precursor to the modern internet, first
implemented?
A) 1969
B) 1972
C) 1983
D) 1991
42. When was the term "internet" first used to describe the interconnected network of
networks?
A) 1974
B) 1980
C) 1983
D) 1990
43. Which institution is responsible for managing the global Domain Name System
(DNS)?
A) ICANN
B) IETF
C) W3C
D) ISOC
50. In which year was the first version of Microsoft Office released?
A) 1987
B) 1989
C) 1990
D) 1995
51. Which Microsoft Office application is used primarily for database management?
A) Excel
B) Access
C) OneNote
D) Visio
53. Which Windows operating system was the first to support touchscreen functionality?
A) Windows XP
B) Windows Vista
C) Windows 7
D) Windows 8
58. Which technology aims to safeguard data against threats posed by quantum
computers?
A. Blockchain Technology
B. Cloud Security Protocols
C. Post-Quantum Cryptography (PQC)
D. Neural Network Algorithms
62. Which cybersecurity threat is becoming more prominent with advanced AI?
A. Phishing
B. Social Engineering Attacks
C. Brute Force Attacks
D. Ransomware
65. What generation of mobile networks introduced video calling as a common feature?
A. 2G
B. 3G
C. 4G
D. 5G
66. Which mobile network generation uses millimeter waves for faster speeds?
A. 2G
B. 3G
C. 4G
D. 5G
70. Fifth-generation computers are best associated with which of the following fields?
A) Artificial Intelligence
B) Mechanical Computing
C) Analog Processing
D) Vacuum Tubes
71. Which component was introduced with second-generation computers that replaced
vacuum tubes?
A) Resistors
B) Transistors
C) Capacitors
D) None of the above
76. What year marks the transition from the second to the third generation of
computers?
A) 1955
B) 1964
C) 1971
D) 1980
80. Who is credited with coining the term "Artificial Intelligence," central to fifth-
generation computing?
A) Alan Turing
B) John McCarthy
C) Marvin Minsky
D) Claude Shannon
81. Which type of computer is designed for personal use at home or in an office?
A) Microcomputer
B) Supercomputer
C) Mainframe
D) Embedded Computer
82.Which type of computer is widely used for data analytics in research labs?
A) Mainframe
B) Workstation
C) Tablet
86. Who is credited with creating the first hard disk drive?
A) IBM
B) Seagate
C) Toshiba
D) Hitachi
89. Which operating system is known as the first multi-user, multitasking OS?
A) UNIX
B) MS-DOS
C) Windows 95
D) Mac OS
91. Which OS is the primary choice for servers due to its stability and security?
A) Linux
B) Windows
C) MacOS
D) Chrome OS
97. What is one of the key features introduced in the 2024 update of Windows 11?
A) Advanced holographic displays
B) Generative erase for photos
C) Blockchain-based file management
D) Virtual desktop for AR applications
99.Which operating system includes the "Nearby Share" feature, similar to Apple’s
AirDrop?
A) Android 14
B) iOS 17
C) macOS Ventura
D) Windows 11
100. Which Linux distribution gained traction in 2024 for AI model training?
A) Ubuntu 24.04
B) Fedora AI Edition
C) CentOS Stream
D) ArchLinux AI
Test-2
Cyber Security
2.Section 66A of the IT Act, 2000 was struck down by the Supreme Court in which case?
A. K.S. Puttaswamy vs Union of India
B. Shreya Singhal vs Union of India
C. Naz Foundation vs Government of NCT
D. Internet Freedom Foundation vs TRAI
4.What is the penalty for tampering with computer source documents under the IT Act?
A. Section 65
B. Section 67
C. Section 70
D. Section 72
7.Under the IT Act, what is the term for a person who assists in committing a
cybercrime?
A. Perpetrator
B. Abettor
C. Hacker
D. Accomplice
8.What is the primary objective of the Digital India program in terms of cybersecurity?
A. Setting up more IT colleges
B. Creating a secure cyberspace
C. Developing mobile apps
D. Promoting e-commerce
9.Which law governs data breaches and imposes responsibilities on companies for user
data protection?
A. IT Act, 2000
B. Data Protection Bill, 2019
C. Copyright Act, 1957
D. Indian Penal Code, 1860
15.What type of cybercrime uses small data storage devices to steal sensitive files from a
computer physically?
A. USB-based malware
B. Physical hacking
C. Cyber theft
D. Insider attack
16What is the term for cybercrime that involves manipulating stock prices using
misinformation?
A. Digital piracy
B. Pump-and-dump schemes
C. Hacking
D. Identity theft
18.What type of attack involves embedding malicious code into a legitimate program to
gain access to a system?
A. Spyware
B. Trojan horse
C. Adware
D. Keylogging
20.Which type of virus rapidly consumes disk space or memory by creating multiple
copies of itself?
A. Worm
B. Space-filler virus
C. Logic bomb
D. Boot sector virus
23. Which cryptographic protocol secures data during transmission over the internet?
A. SSL/TLS
B. MD5
C. SHA-256
D. DES
32.What is the role of a Security Information and Event Management (SIEM) system?
A. Preventing unauthorized logins
B. Encrypting sensitive data
C. Collecting and analyzing security logs for threat detection
D. Scanning emails for phishing
38. Which virus is known for affecting Microsoft Windows systems by exploiting
vulnerabilities in the system’s file-sharing protocol?
A) Conficker
B) Blaster
C) MyDoom
D) Sasser
39. The "Stuxnet" virus is considered a significant cyber-attack. What was its primary
target?
A) Banking systems
B) Nuclear facilities
C) Healthcare systems
D) Social media accounts
40. Which virus is known for being one of the first to perform "ransomware" actions by
encrypting files and demanding payment?
A) Cryptolocker
B) Ransomware
C) Zeus
D) Code Red
43. The "Code Red" virus primarily targeted which version of Windows?
A) Windows XP
B) Windows 95
C) Windows NT
D) Windows 2000
44. Which of these viruses spreads primarily through instant messaging services?
A) Sasser
B) Nimda
C) Zbot
D) ILOVEYOU
45. Which of the following is the main function of a firewall in computer security?
A) It helps in encrypting files
B) It prevents unauthorized access to a network
C) It repairs corrupted files
D) It checks the computer for malware
46. Which virus was famous for creating a backdoor into Windows systems by exploiting
a vulnerability in the SMB protocol?
A) Stuxnet
B) Conficker
C) MyDoom
D) WannaCry
51. Which type of hacking involves unauthorized access for malicious intent?
A) Gray Hat Hacking
B) White Hat Hacking
C) Black Hat Hacking
D) Script Kiddies
55. What type of hacking targets public figures or organizations to damage their
reputation?
A) Hacktivism
B) Cyber Espionage
C) Phishing
D) Ransomware Attack
58. Which rootkit operates at the core of the operating system and has full access to
resources?
A) Application Rootkit
B) Kernel-level Rootkit
C) Firmware Rootkit
D) User-mode Rootkit
64.The "Intermediary Guidelines and Digital Media Ethics Code Rules, 2021" were
framed under which act?
A. IT Act, 2000
B. Indian Evidence Act, 1872
C. Indian Telegraph Act, 1885
D. Data Protection Act, 2019
68. What recent malware can bypass Chrome's cookie encryption to steal data?
a) Glove Stealer
b) Hydra Trojan
c) Zeus
d) SteelFox
70.What is the name of the campaign targeting Ukrainian conscripts with malware?
a) UNC5812
b) BlueNoroff
c) Pegasus
d) HydraNet
72.A Russian national was charged for creating which prolific infostealer malware?
a) Emotet
b) RedLine
c) DarkComet
d) Dridex
73. Which of the following is the national nodal agency for responding to cybersecurity
incidents in India?
A) CERT-In
B) C-DAC
C) NCIIPC
D) DSCI
74. In which year was the Data Security Council of India (DSCI) established?
A) 2001
B) 2005
C) 2008
D) 2010
76. Which organization is responsible for advising the government on the protection of
India’s critical infrastructure from cyber threats?
A) C-DAC
B) CERT-In
C) NCIIPC
D) DSCI
77. Which Indian institute is tasked with securing communication networks and
providing encryption solutions?
A) C-DAC
B) CERT-In
C) NCIIPC
D) IDRBT
80. The Aadhaar Act, 2016 ensures data protection under which of its provisions?
A. Section 8
B. Section 28
C. Section 34
D. Section 37
85. What is the penalty for identity theft under Section 66C of IT Act?
A. Fine up to ₹1 lakh
B. Imprisonment up to 3 years
C. Both fine and imprisonment
D. No penalty
87. Which section penalizes breach of confidentiality and privacy under IT Act 2000?
A. Section 66
B. Section 67A
C. Section 72
D. Section 75
89.What is the term for software designed to disrupt, damage, or gain unauthorized
access to a computer system?
A. Ransomware
90.Which cybercrime specifically targets financial gain by encrypting victims' files and
demanding payment for the decryption key?
A. Phishing
B. Ransomware
C. Hacking
D. Cyberbullying
92. Which type of cybercrime involves secretly monitoring someone's online activity?
A. Cyberstalking
B. Spyware attack
C. Phishing
D. Identity theft
93.What is the term for the theft of someone’s identity for fraudulent purposes?
A. Cyberbullying
B. Hacking
C. Identity theft
D. Spoofing
98. What type of attack uses fake identities to deceive others online?
A. Phishing
B. Spoofing
C. Cyberbullying
D. Data breach
99. What is the term for unauthorized attempts to access database systems using
malicious queries?
A. SQL injection
B. DoS attack
C. Phishing
D. Cyber espionage
100. What is the cybercrime involving sending fraudulent emails claiming to be from
reputable sources to gain financial or personal information?
A. Cyberbullying
B. Phishing
C. Cyber espionage
D. Data breach
Test-3
Robotics and AI
2. What was the name of the play in which the term "robot" was first introduced?
A) Metropolis
B) R.U.R. (Rossum's Universal Robots)
C) Frankenstein
D) The Robot’s Rebellion
3. Which ancient Greek engineer is known for creating early automata such as
mechanical temples and puppets?
A) Pythagoras
9. Which Indian institution established the first robotics laboratory in the country?
A) IIT Kanpur
B) IISc Bangalore
C) DRDO
D) ISRO
10. In which year was the Indian Society for Robotics and Automation (ISRA) founded?
A) 1986
B) 1992
C) 2000
D) 1984
13. What was India's first humanoid robot developed for public interaction?
A) Mitra
B) Manav
C) Sophia
D) Chitti
14. Which organization created India's first indigenous robotic surgical system, SSI
Mantra?
A) All India Institute of Medical Sciences
B) Indian Institute of Science
C) Skanray Technologies
D) SS Innovations
15. What is the primary purpose of the “e-Vahan” robot developed in India?
A) Autonomous farming
B) Traffic management
C) Law enforcement
D) Disaster recovery
16. Which Indian startup is known for developing the advanced robotic arm Grasp?
A) GreyOrange
B) Asimov Robotics
C) Hi-Tech Robotics Systemz
D) Sastra Robotics
17. In which year did the Government of India launch the SAMARTH Udyog initiative,
focusing on robotics in manufacturing?
A) 2016
B) 2017
C) 2018
D) 2019
19.What was significant about the robot "BigDog," developed by Boston Dynamics?
A) It mimicked a horse’s movements
B) It was the first quadruped robot capable of navigating rough terrain
C) It could fly autonomously
D) It was powered entirely by solar energy
22. Which programming language is most associated with early robotics research?
A) Python
B) LISP
C) C++
D) COBOL
26. Which country leads the world in AI regulations through its proposed AI Act?
A) United States
B) European Union
C) India
D) China
.
27. India recently collaborated with which global tech giant to establish AI models for
healthcare?
A) Google
B) Microsoft
C) OpenAI
28. The first generative AI system in India for public administration is called?
A) Bhashini AI
B) GPT India
C) Samarth AI
D) Sagar AI
29. Which Indian company launched the ‘Sankalp’ AI platform to combat cyber threats?
A) Infosys
B) TCS
C) HCL
D) Wipro
.
30.Which technology is utilized in India’s new flood prediction AI model?
A) Natural Language Processing
B) Machine Learning
C) Blockchain
D) Internet of Things (IoT)
31. India is collaborating with which nation for AI-based agricultural technologies?
A) Israel
B) Germany
C) Japan
D) France
.
32. Which Indian state recently announced a large-scale AI initiative for smart cities?
A) Karnataka
B) Maharashtra
C) Tamil Nadu
D) Gujarat
33. Which global summit discussed AI's role in climate change mitigation in 2024?
A) COP29
B) G20 Summit
C) UNGA AI Summit
D) AI for Climate Forum
34. What is the name of the initiative focusing on AI in governance by NITI Aayog?
A) Digital India AI
B) Responsible AI for All
C) AI Governance Hub
D) Bharat AI Ecosystem
36. Which industry in India has benefited the most from AI-driven chatbots in 2024?
A) Banking
B) Retail
C) Education
D) Tourism
37. What is the global AI-powered humanitarian prediction tool used in India for natural
disasters?
A) Gaia AI
B) Artemis AI
C) AI4Relief
D) CEPI-AI
38. Which AI-powered tool was recently adopted in India for mapping biodiversity?
A) EcoAI
B) iNaturalist AI
C) AI-WildLife Mapper
D) eBiodiversityAI
39. Which AI system has been implemented by the Indian Railways for safety
monitoring?
A) Kavach AI
B) AI-SafeGuard
C) RailNet AI
D) LokSuraksha AI
41. Which organization launched the "AI for All" initiative in India?
A) NITI Aayog
B) Microsoft India
C) CBSE
D) Intel India
43. Which AI initiative is being used by the Indian agricultural sector for soil health
analysis?
A) Bhoomi AI
B) KrishiYantrAI
C) DigiKisan AI
D) AgriTechAI
45. The AI chatbot “Saksham” was introduced in India for which sector?
A) Banking
B) Railways
C) Education
D) Healthcare
46. Which test was proposed by Alan Turing in 1950 to determine machine intelligence?
A) Intelligence Quotient Test
B) Turing Test
C) Imitation Game
D) Neural Network Test
47. Which event in 1956 is widely considered the starting point of AI as a research field?
A) The invention of the transistor
B) Dartmouth Conference
C) Launch of Sputnik
D) Publication of "Perceptrons" by Minsky and Papert
54. Which sensor is most commonly used for object detection in robots?
A) Gyroscope
B) Proximity sensor
C) Thermometer
D) Humidity sensor
55. Which material is commonly used for building lightweight robotic frames?
A) Stainless steel
B) Aluminum
C) Lead
D) Titanium
58. Which Indian state is home to the largest robotics park inaugurated in 2022?
A) Karnataka
B) Tamil Nadu
C) Gujarat
D) Maharashtra
66. What does "Deep Learning" primarily use for its operations?
A) Simple algorithms
B) Large datasets and multi-layered neural networks
C) Knowledge bases
D) Statistical models
69. Which type of AI can only perform tasks it was specifically programmed for?
A) Narrow AI
B) General AI
C) Super AI
D) Reactive AI
72. Which AI type is not yet realized but represents the ultimate goal of AI development?
A) Narrow AI
B) General AI
C) Super AI
D) Reactive Machines
76. AI chatbots like Siri and Alexa are examples of which type of AI?
A) General AI
79. Deep Blue, the chess-playing computer, is an example of what type of AI?
A) General AI
B) Reactive AI
C) Limited Memory AI
D) Super AI
83. What subfield of AI involves planning and problem-solving using stored knowledge?
A) Machine Learning
B) Expert Systems
C) Robotics
D) NLP
84. Which AI model was launched to assist Indian farmers with weather predictions?
A) Meghdoot AI
B) MonsoonAI
C) Krishi AI
D) ClimateAI
86. Which AI tool is helping Indian police with facial recognition for missing persons?
A) Trinetra AI
B) Darpan AI
C) Aadhaar Face AI
D) Jyoti AI
87. Which ministry released the Draft National Strategy on Robotics in October 2023?
A) Ministry of Science and Technology
B) Ministry of Electronics and Information Technology
C) Ministry of Defence
D) Ministry of Skill Development
88. The National Robotics Mission proposes establishing which of the following?
A) Space robotics labs
B) Robotics Innovation Units (RIU)
C) AI-only research centers
D) Drone-specific R&D zones
89. Which country is leading in humanoid robot deployment for public services?
A) USA
B) Japan
C) Germany
D) South Korea
90. What is the significance of "Cyber Physical Systems" in India's robotics mission?
A) Advanced military weaponry
B) Integration of physical and digital technologies
C) Replacement of human workers in agriculture
D) Robotics for social media monitoring
91. Which Indian initiative aims to promote robotics and AI at school levels?
A) Skill India
B) Atal Tinkering Labs
C) Digital India
D) National AI Mission
94. India's "Make in India 2.0" includes robotics under how many identified sub-sectors?
A) 10
B) 15
C) 27
D) 30
95. Which humanoid robot made by Kerala engineering students was recently in the
news?
a) Sophia
b) ASIMO
c) Vihaan
d) Aadya
97. Which Indian startup launched the “Elevate V1” series drone?
a) InsideFPV
b) DRDO
c) Skyroot
d) AeronX
98. The “Coro-bot” was developed during the COVID-19 pandemic for what purpose?
a) Delivering food in isolation wards
b) Disinfecting large areas
c) Diagnosing diseases
d) Robotic surgeries
100. What is the purpose of Captain Arjun, a robot launched by the Indian Railways?
a) Surveillance at railway stations
b) Ticket vending
Test-4
E-Commerce and E Governance
Name……………………………… ID………………… Marks………./100
2. Which is the first country to implement a fully digital voting system under e-
Governance?
a) Estonia
b) Finland
c) Japan
d) USA
11. What is the main purpose of UMANG (Unified Mobile Application for New-age
Governance)?
a) Single-point access to multiple government services
b) Mobile gaming
c) Weather updates
d) Virtual reality experiences
13. Which type of e-Governance is primarily used for internal government operations?
a) G2B
b) G2G
c) G2E
d) G2C
16. Which type of e-Governance does the online filing of income tax fall under?
a) G2C
b) G2B
c) G2G
d) G2E
20. Which type of e-Governance ensures better service delivery through mobile
platforms?
a) m-Governance
b) G2C
c) G2E
d) G2G
22. Which component is associated with the seamless interaction between various
government entities?
a) G2C
b) Interoperability
c) Transparency
d) Citizen feedback
27. Which payment gateway first introduced the "Buy Now, Pay Later" feature in India?
a) PayU
b) Razorpay
c) Simpl
d) Paytm
33. Which NeGP initiative aims to provide education, healthcare, and employment-
related services through a digital platform?
a) e-District
b) State e-Governance Service Delivery Gateway
c) National Knowledge Network
d) National e-Governance Infrastructure
35. Which of the following is an example of a service offered through the e-District
project under NeGP?
a) Online land records
b) Job training programs
c) Digital payments for government services
d) E-filing of taxes
36. Which of the following apps is designed to help citizens in India to find and track the
status of their driving license, vehicle registration, and other transport-related services?
37.. Which mobile app launched by the Ministry of Health and Family Welfare helps
users in India book appointments with doctors and access health services online?
a) Aarogya Setu
b) Swasthya Kendra
c) e-Swasthya
d) Health India
38. Which portal was launched to streamline the online application and delivery of
public services to citizens in India?
a) e-District Portal
b) ServicePlus
c) National Knowledge Network
d) Digital India Portal
39. Which government app was launched to enhance financial inclusion in India by
providing financial services to underserved sections of society?
a) DigiLocker
b) PMGDISHA
c) e-RUPI
d) Jan Dhan
40. Which mobile application launched by the Ministry of Agriculture and Farmers'
Welfare aims to provide farmers with information on weather conditions, crop
protection, and market prices?
a) Kisan RATH
b) Kisan App
c) mKisan
d) PM Kisan
41. Which initiative was launched to facilitate the digital registration of laborers and
workers in India’s unorganized sector?
a) PMGDISHA
b) e-Shram Portal
c) National Skill Development Portal
d) Skill India
.
42. What is the purpose of the 'SWECHHA' portal launched by the Government of India?
a) To track the online education status
b) To support the Clean India Mission
c) To offer citizen grievances resolution
d) To enable environmental monitoring
44. Which app launched by the Ministry of Women and Child Development helps women
in distress by connecting them with services such as legal help and counseling?
a) Beti Bachao Beti Padhao
b) Mahila Shakti Kendra
c) One Stop Center
d) Nirbhaya Fund
45. Which mobile application was launched by the Ministry of Tourism to promote
tourism in India by providing detailed information about tourist destinations, events,
and services?
a) Incredible India
b) Visit India
c) Explore India
d) India Tourism App
46.. Which of the following initiatives launched by the Government of India is designed
to offer a unified platform for submitting and tracking grievances?
a) MyGov
b) e-District
c) CPGRAMS
d) e-Kranti
47. What is the full form of RTGS, commonly used in business payments?
a) Real-Time Gross Settlement
b) Rapid Transaction Gateway System
c) Real-Time General Settlement
d) Regular Transaction Gateway Service
48. Which component ensures ease of access to services for citizens in remote areas?
a) IT infrastructure
b) Connectivity
c) Service delivery channels
d) Cybersecurity
51. Which of the following is NOT a component of the National e-Governance Plan
(NeGP)?
a) e-District
b) e-Courts
c) e-Panchayat
d) Smart Cities Mission
52. Which year was the National e-Governance Plan (NeGP) launched?
a) 2005
b) 2007
c) 2010
d) 2012
53. What is the main purpose of the Common Services Centers (CSCs) under NeGP?
a) To provide free Wi-Fi in rural areas
b) To provide government services in electronic form at the village level
c) To train government officials in IT skills
d) To facilitate e-commerce transactions
54. Under NeGP, which department is responsible for ensuring the delivery of
government services electronically?
a) Ministry of Finance
b) Ministry of Rural Development
c) Department of Electronics and Information Technology (DeitY)
d) Ministry of Home Affairs
55. Which Indian government e-commerce initiative promotes the sale of products made
by artisans and craftsmen?
a) Flipkart
b) GeM (Government e-Marketplace)
c) Amazon Karigar
d) Snapdeal
56. What is the cap on Foreign Direct Investment (FDI) in inventory-based e-commerce
in India?
a) 0%
b) 26%
c) 49%
d) 100%
58. What is the maximum penalty for violation of the Consumer Protection (E-
Commerce) Rules, 2020?
a) ₹1 lakh
b) ₹5 lakh
c) ₹10 lakh
d) ₹50 lakh
60. What does the Press Note 2 (2018) address in the context of e-commerce?
a) Guidelines for offline retailers
b) Rules for FDI in e-commerce
c) Consumer complaint resolution timelines
d) Data protection in e-commerce
61. Which platform was launched to empower Indian artisans through e-commerce?
a) Flipkart Samarth
b) Amazon Karigar
c) GeM
d) Startup India Hub
62. Which Indian law protects intellectual property rights in the digital domain for e-
commerce?
a) Copyright Act, 1957
b) Trademarks Act, 1999
c) Patent Act, 1970
d) All of the above
63. What is the purpose of the "ONDC" project launched by the Indian government?
a) To regulate e-commerce prices
b) To create a unified e-commerce platform
c) To ensure fair competition in e-commerce
d) To boost offline retail
64. Which Indian government policy encourages cashless transactions for e-commerce?
69. Which type of e-commerce involves individuals selling goods or services to other
individuals?
a) B2B
b) B2C
c) C2C
d) C2B
70. Which of the following best defines the term 'digital marketplace'?
a) A place where businesses and consumers meet to trade goods and services
b) A physical market where products are sold online
c) A government-regulated platform for electronic payments
d) A place for conducting online meetings
74. Which business model refers to e-commerce activities where a consumer sells
products to a business?
a) B2C
b) C2B
c) B2B
d) C2C
79. Which e-commerce platform was started by IIT graduates Sachin Bansal and Binny
Bansal?
a) Snapdeal
b) Flipkart
c) Paytm Mall
d) Amazon India
80. Which platform focuses on consumer-to-consumer (C2C) sales, primarily for used
goods?
a) OLX
b) Snapdeal
c) Flipkart
d) Paytm Mall
81. Which Indian e-commerce platform primarily targets small and medium-sized
businesses (SMBs)?
a) IndiaMART
b) Flipkart
c) Paytm Mall
d) Snapdeal
89. Which of the following is NOT a core component of the Digital India Mission?
a) Digital Infrastructure as a Utility to Every Citizen
b) Digital Literacy
c) E-Governance for Tax Collection
d) Secure Cyber Ecosystem
90. Which initiative was launched to enhance digital payment systems across India?
a) PMGDISHA
b) Digital India
c) JAM Trinity
d) Bharat Interface for Money (BHIM)
91. Which service under e-Governance helps citizens avail government services like
birth certificates, land records, and ration cards online?
a) e-District
b) e-Courts
c) BharatNet
d) National Knowledge Network (NKN)
92. Which project was initiated to make all public sector services available
electronically in India?
a) NICNET
b) NeGP
c) e-District
d) BharatNet
95 Which project is aimed at ensuring that broadband internet reaches every village in
India?
a) BharatNet
b) e-Kranti
c) Digital India
d) National Optical Fiber Network
97. Which initiative allows citizens to track the status of their grievance with
government departments?
a) e-District
b) e-Panchayat
c) CPGRAMS
d) DigiLocker
98. Which e-commerce platform recently launched a "Local Sellers Program" to promote
small-scale entrepreneurs?
a) Amazon India
b) Flipkart
c) Meesho
d) Snapdeal
99. Which platform introduced "Shopsy," a low-cost social commerce initiative in India?
a) Myntra
b) Flipkart
c) Nykaa
d) Amazon
Test-5
Internet and Social media
2. Which search engine was launched in 1998 and revolutionized Internet search?
A) Yahoo
B) AltaVista
C) Google
D) Bing
4. Which type of Internet allows limited access to selected users, usually from outside an
organization?
A) Internet
B) Extranet
C) Intranet
D) World Wide Web
5.Which Internet term refers to the amount of data that can be transmitted in a given
time?
A) Bandwidth
B) Latency
C) Ping
D) Throughput
19. What does "TLD" stand for in the context of domain names?
A) Top-Level Domain
B) Translated Layer Domain
C) Tree Level Directory
D) Terminal Level Domain
21. Which type of Internet refers to websites and content that is hidden and not
accessible through traditional browsers?
A) Surface Web
B) Deep Web
C) Dark Web
D) Extranet
23. Which of the following is NOT considered part of the Deep Web?
A) Password-protected websites
B) Subscription-based academic databases
C) Websites indexed by search engines
D) Online banking sites
25. A key difference between the Surface Web and the Deep Web is:
A) The Surface Web is encrypted, while the Deep Web is not
B) The Surface Web is indexed by search engines, while the Deep Web is not
C) The Deep Web is faster and more accessible
D) The Surface Web contains more secure data than the Deep Web
26. The use of Tor (The Onion Router) is associated with which type of Internet?
A) Dark Web
B) Surface Web
C) Extranet
D) Intranet
27. Who is credited with conceptualizing the idea of the World Wide Web?
A) Tim Berners-Lee
B) Vint Cerf
C) Robert Kahn
D) Larry Roberts
28. ARPANET, the precursor to the modern Internet, was established in which year?
A) 1965
B) 1969
C) 1971
D) 1973
33. Which protocol is designed for remote login to a server over a network?
A) Telnet
B) HTTP
C) SMTP
D) FTP
34. Which protocol is used for encrypting and securing communication over a network?
A) FTP
B) HTTPS
C) HTTP
D) SMTP
36. Which protocol is used for sending email from an email client to an email server?
A) IMAP
B) POP3
C) SMTP
D) FTP
37. Which system is used to assign unique identifiers to devices in a network and allows
them to communicate?
A) MAC
B) IP address
38. Which system uses public and private key encryption to secure data on the internet?
A) SSL/TLS
B) DNS
C) FTP
D) HTTP
40. Which protocol is used for secure communication between a user’s browser and a
website?
A) HTTP
B) HTTPS
C) FTP
D) SMTP
43. Which of the following systems is responsible for the secure transfer of files between
two computers over a network?
A) HTTP
B) FTP
C) SMTP
D) Telnet
46. Which search engine is known for prioritizing user privacy by not tracking searches?
A) Google
B) Yahoo
C) DuckDuckGo
D) Baidu
49.What innovation allows search engines to understand user intent beyond keywords?
A) Semantic Search
B) Keyword Density
C) Backlink Analysis
D) AdWords Integration
51. What is the maximum file size limit for email attachments in most email services?
A) 5 MB
B) 25 MB
C) 50 MB
D) 100 MB
52. Which email component allows grouping multiple related emails together?
A) Folder
53. What does the acronym SaaS stand for in cloud computing?
A) System as a Service
B) Software as a Service
C) Storage as a Service
D) Solution as a Service
54. Which cloud model combines private and public cloud services?
A) Public cloud
B) Private cloud
C) Hybrid cloud
D) Community cloud
56. Which service model is suitable for developers who need tools and platforms to
build applications?
A) SaaS
B) IaaS
C) PaaS
D) DaaS
59. What is the process of moving data from one cloud service to another called?
A) Cloud migration
B) Cloud replication
C) Cloud transfer
D) Cloud cloning
65. What type of networks does grid computing often rely on?
A) Peer-to-peer networks
B) Local Area Networks (LAN)
C) Wide Area Networks (WAN)
D) Satellite networks
69. Which layer of the OSI model is responsible for ensuring end-to-end delivery of data?
A) Physical layer
B) Transport layer
C) Application layer
D) Data link layer
71. Which platform is primarily used for professional networking and career
development?
A) Reddit
B) LinkedIn
C) Snapchat
D) TikTok
75.Which platform is popular for creating and sharing memes and animated GIFs?
A)Giphy
76. Which app is focused on real-time voice and text chat for gamers?
A) Discord
B) Twitch
C) WhatsApp
D) Instagram
77. Which Indian government portal serves as a one-stop platform for citizen-centric
services?
A) MyGov
B) UMANG
C) e-SamikSha
D)DigiLocker
86. Which feature in web browsers helps in syncing bookmarks, history, and passwords
across devices?
A) Extensions
B) Cloud Storage
C) Browser Sync
D) Cookies
88. Which protocol is responsible for sending emails from a client to a server?
A) SMTP
B) POP3
C) IMAP
D) DNS
90. Which portal is used for online registration of intellectual property rights in India?
91. Which portal was launched to enhance the skill development ecosystem in India?
A) Skill India
B) e-Kaushal
C) ASEEM
D) Bharat Skills
93. Which Indian government portal provides access to agriculture-related services and
schemes?
A) e-Krishi
B) Kisan Rath
C) PM Kisan Portal
D) e-NAM
94. Which device acts as a gateway between a local network and the Internet?
A) Router
B) Switch
C) Hub
D) Repeater
95. Which type of network card is commonly used to connect a computer to a wired
Internet network?
A) Wireless NIC
B) Ethernet NIC
C) Fiber NIC
D) Token Ring NIC
97. Which hardware helps to amplify and retransmit network signals in long-distance
Internet connections?
A) Router
B) Repeater
C) Hub
98. Which hardware device converts fiber optic signals to Ethernet for Internet
connectivity?
A) Media Converter
B) Ethernet Bridge
C) Fiber Repeater
D) Access Point
99. Which Internet hardware device is essential for connecting multiple networks?
A) Switch
B) Hub
C) Gateway
D) Bridge
100. What is the primary medium for data transmission in Li-Fi technology?
A) Radio waves
B) Visible light
C) Infrared waves
D) Microwave signals
Test-6 ELECTRONICS
1. Who is considered the father of modern electronics?
a. Thomas Edison
b. Nikola Tesla
c. John Bardeen
d. Michael Faraday
16. Which element is commonly used as a dopant for creating N-type silicon?
a. Boron
b. Gallium
c. Phosphorus
d. Aluminum
18. Which diode is specifically designed to allow current to flow in reverse under a
certain voltage?
a. LED
b. Zener Diode
c. Schottky Diode
d. Tunnel Diode
19. What type of diode emits light when a current passes through it?
a. Schottky Diode
b. Photodiode
c. Light Emitting Diode (LED)
d. Zener Diode
23. Which diode has the ability to handle large current surges?
a. Schottky Diode
34. Which of the following materials can act as a dopant for creating a P-type
semiconductor?
a. Phosphorus
b. Boron
c. Antimony
d. Arsenic
39. What kind of bonding occurs between the trivalent impurity and the host atoms
in P-type semiconductors?
a. Covalent bonding with one electron missing
b. Ionic bonding
c. Metallic bonding
d. Van der Waals forces
43. What property of superconductors makes them ideal for quantum computing?
a. High critical field
b. Zero resistance
c. Magnetic flux quantization
d. High thermal conductivity
44. What is the output of an AND gate when all inputs are HIGH?
a. LOW
b. HIGH
c. Undefined
d. Depends on the number of inputs
45. Which of the following gates has an output that is LOW only when all inputs are
HIGH?
a. AND
b. NOR
c. XOR
d. NAND
47. Which department under the Ministry of Electronics and Information Technology
(MeitY) is responsible for promoting electronic governance?
a. Department of Telecommunications
b. National Informatics Centre (NIC)
c. Department of Electronics Development
d. Digital India Division
48. What is the main focus of the Standardization Testing and Quality Certification
(STQC) Directorate?
a. Export promotion
b. Software testing
54. Which department regulates the policies for internet usage in India?
a. TRAI
b. NIC
c. DoT
d. MeitY
60. Which of the following types of TVs was the first widely available color television?
a. LCD
b. CRT
c. Plasma
d. OLED
61. What feature is a significant advantage of QLED TVs over OLED TVs?
a. Better contrast
b. Higher brightness levels
c. Deeper blacks
d. Organic materials
70. The "Modified Electronics Manufacturing Clusters (EMC 2.0)" scheme primarily
focuses on:
a. Building electronic retail stores
b. Setting up infrastructure for electronics clusters
c. Exporting consumer electronics
d. Manufacturing wearable devices
71. Which ministry launched the "National Policy on Software Products 2019"?
a. Ministry of Electronics and Information Technology
b. Ministry of Commerce
c. Ministry of Finance
d. Ministry of Education
73. What is the main objective of the National Knowledge Network (NKN)?
a. Establish a nationwide telecom grid
b. Provide high-speed internet to research institutions
c. Develop consumer electronics hubs
d. Manufacture semiconductors
84. Which year marked the beginning of color television broadcasting in India?
a. 1980
b. 1982
c. 1985
d. 1990
85. What was the primary purpose of SITE (Satellite Instructional Television
Experiment) in 1975-1976?
a. Entertainment
b. Education and development
c. News dissemination
d. Sports broadcasting
88. Which year saw the launch of the first private satellite channel in India?
a. 1991
b. 1993
c. 1995
d. 1999
89. What is the name of the community radio initiative started by the Indian
government?
a. AIR Community FM
b. CRS Scheme
c. Akashvani Local
d. Lok Sewa Radio
92. What was the first radio program to focus on farmers and rural issues in India?
a. Gram Sabha Radio
b. Krishi Darshan
c. Kisan Vani
d. Gram Shakti
93. Which Indian Prime Minister was responsible for introducing the Prasar Bharati
Act?
a. Indira Gandhi
b. Rajiv Gandhi
c. P. V. Narasimha Rao
d. Atal Bihari Vajpayee
95. What electronic device is associated with the invention of the cathode-ray tube?
a. Radio
b. Television
c. Radar
d. Oscilloscope
2. If you wish to extend the length of the network without having the signal degrade, you
would use a
(a) resonance
(b) router
(c) gateway
(d) repeater
3. A __________ is the term used when a search engine returns a Web page that matches the
search criteria.
(a) blog
(b) hit
(c) link
(d) view
6. A hacker contacts your phone or E-mails and attempts to acquire your password is called
(a) spoofing
(b) phishing
(c) spamming
(d) buging
7. The phrase ____ describes viruses, worms, trojan horse attack applets and attack scripts.
(a) malware
(b) spam
8. What is the name of Artificial Intelligence which allows machines to handle vague
information with a deftness that mimics human intuition?
(a) Human intelligence
(b) Boolean logic
(c) Functional logic
(d) Fuzzy logic
10. Which term is used for describing the judgmental or commonsense part of problem
solving?
(a) Heuristic
(b) Critical
(c) Value based
(d) Analytical
11. What was originally called the “imitation game” by its creator?
(a) The Turing Test
(b) LISP
(c) The Logic Theorist
(d) Cybernetics
14. Most of the commonly available personal computers/laptops have a keyboard popularly
known as __________.
(a) QWERTY
(b) QOLTY
(c) ALTER
(d) UCLIF
16. Collecting personal information and effectively posing as another individual is known as
the crime of __________.
(a) spooling
(b) identity theft
(c) spoofing
(d) hacking
17. A prescribed set of well-defined instructions for solving mathematical problems is called
__________.
(a) a compiler
(b) a code
(c) a description
(d) an algorithm
18. A collection of computers and devices connected together via communication devices and
transmission media is called a __________.
(a) workgroup
(b) server
(c) mainframe
(d) network
19. What device separates a single network into two segments but lets the two segments
appear as one to higher protocols?
(a) Switch
(b) Bridge
(c) Gateway
(d) Router
21. Which of the following communications modes support two-way traffic but in only one
direction of a time?
(a) simplex
(b) half-duplex
(c) three-quarters duplex
(d) All of the above
22. Programs such as Internet Explorer that serve as navigable windows into the Web are
called
(a) Hypertext
(b) Networks
(c) Internet
(d) Web browsers
23. __________ is the act of copying or downloading a program from a network and making
multiple copies of it.
24. Unauthorised copying of software to be used for personal gain instead of personal backups
is called
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
27. What is the full form of USB as used in computer related activities?
(a) Universal Security Block
(b) Ultra Serial Block
(c) United Service Block
(d) Universal Serial Bus
29. PDA–
(a) People’s Data Assistant
(b) Personal Data Assistant
(c) People’s Digital Assistant
(d) Personal Digital Assistant
30. In which year John McCarthy coined the term Artificial Intelligence?
(a) . 1950
(b) . 1953
(c) . 1956
(d) . 1959
32. Which of the following is not the commonly used programming language for Artificial
Intelligence?
(a) Perl
(b) Java
(c) PROLOG
(d) LISP
35. Which government platform facilitates the issuance of digital driving licenses and vehicle
registration certificates?
(a) RTO India
(b) Digital Motor Authority
(c) e-Vehicle Services
(d) Vahan Sarathi
37. Which of the following basic parts of a robot unit would comprise the computer circuitry
that could be programmed to determine which of the following the robot would do?
(a) sensor
(b) end effector
(c) . arm
(d) controller
38. Which of the following is not among the 5 basic parts of a robot?
(a) controller
(b) end effectors
(c) peripheral tools
(d) drive
39. Which of the following “laws” is Asimov’s first and most significant robotics law?
(a) . robot events must never result in damage to the robot
(b) . robots must make a business a more profitable business
(c) robots must obey the directions given by humans
(d) . robots must never take actions harmful to persons
41. In a semiconductor which of the following carries can contribute to the current?
(a) Electrons
(b) Holes
(c) Both
(d) None
42. In which of the following semiconductor, the concentration of the holes and electrons is
equal?
(a) Intrinsic
(b) Extrinsic
(c) Compound
(d) Elemental
51. Which media has the ability to have data/information stored (written) on them by users
more than once?
(a) CD-R disks
(b) CD-RW disks
(c) Zip disks
(d) Opti-Disks
53. Computer programs are written in a high-level programming language; however, the
humanreadable version of a program is called -
(a) cache
(b) instruction set
(c) source code
(d) word size
56. . Hardware devices that are not part of the main computer system and are often added later
to the system are
(a) clip art
(b) highlight
(c) execute
(d) peripheral
58. Which of the following refers to the usage of compressed gasses to drive the robot device?
(a) . photosensitive
(b) . hydraulic
(c) piezoelectric
(d) . pneumatic
59. Which of the following is correct about photo diode electronic devices?
(a) P-N junction is connected in reverse bias.
(b) Electron-hole pairs are generated by impurity injection in depletion
layer
(c) It is a photovoltaic cell
(d) No external voltage is applied
60. Which of the following diode is used in ultra-high speed switching electronic circuits?
a) Zener diode
b) Varactor diode
c) Tunnel diode
d) Schottky diode
61. In which year was the first version of Microsoft Office released?
A) 1987
B) 1989
C) 1990
D) 1995
62. . Which Microsoft Office application is used primarily for database management?
A) Excel
B) Access
C) OneNote
D) Visio
64. . Which Windows operating system was the first to support touchscreen functionality?
A) Windows XP
B) Windows Vista
C) Windows 7
D) Windows 8
67. What distinguishes third-generation computers from their predecessors in terms of user
interface?
a) Graphical User Interface
b) Use of Monitors
c) Keyboards and Operating Systems
d) Virtual Reality
70. Which Indian law was first amended to accommodate digital evidence?
A. Indian Penal Code, 1860
B. Indian Evidence Act, 1872
C. Consumer Protection Act, 1986
D. Indian Telegraph Act, 1885
72. Under the IT Act, what is the term for a person who assists in committing a cybercrime?
A. Perpetrator
B. Abettor
C. Hacker
D. Accomplice
73. What is the primary objective of the Digital India program in terms of cybersecurity?
A. Setting up more IT colleges
B. Creating a secure cyberspace
C. Developing mobile apps
D. Promoting e-commerce
74. Which law governs data breaches and imposes responsibilities on companies for user data
protection?
A. IT Act, 2000
B. Data Protection Bill, 2019
C. Copyright Act, 1957
D. Indian Penal Code, 1860
82. . What does "TLD" stand for in the context of domain names?
(a) Top-Level Domain
(b) Translated Layer Domain
(c) Tree Level Directory
(d) Terminal Level Domain
84. . Which type of Internet refers to websites and content that is hidden and not accessible
through traditional browsers?
A) Surface Web
B) Deep Web
C) Dark Web
D) Extranet
90. Which diode is specifically designed to allow current to flow in reverse under a certain
voltage?
a) LED
b) Zener Diode
c) Schottky Diode
d) Tunnel Diode
91. What type of diode emits light when a current passes through it?
a) Schottky Diode
b) Photodiode
c) Light Emitting Diode (LED)
d) Zener Diode
99. Which country leads the world in AI regulations through its proposed AI Act?
A) United States
B) European Union
C) India
D) China
100. India recently collaborated with which global tech giant to establish AI models for
healthcare?
(a) Google
(b) Microsoft
(c) OpenAI
(d) IBM