Test-1
Basic Knowledge of Computer.
1. What was the primary programming language used in second-generation computers?
A) Machine Language
B) Assembly Language
C) FORTRAN and COBOL
D) Python
2. Which company introduced the first commercially successful microprocessor?
A) IBM
B) Intel
C) HP
D) Microsoft
3.Which technology was primarily used in the first generation of computers?
A) Vacuum Tubes
B) Transistors
C) Integrated Circuits
D) Microprocessors
4.What was the primary programming language used in second-generation computers?
A) Machine Language
B) Assembly Language
C) FORTRAN and COBOL
D) Python
5. Which of the following is an example of a third-generation computer?
A) ENIAC
B) IBM 360
C) Intel 4004
D) Apple I
6. Which of the following programming paradigms became prominent with fifth-
generation computers?
A) Procedural Programming
B) Object-Oriented Programming
C) Logic Programming
D) Assembly-Level Programming
7. What development during the second generation significantly improved
programming productivity?
A) Use of Transistors
B) High-Level Programming Languages
C) Punch Cards for Input
D) Introduction of Registers
© Civil Services Club Bhopal-7747068666 Page 2
8. Which material innovation contributed to the miniaturization of integrated circuits in
third-generation computers?
A) Germanium
B) Silicon
C) Copper
D) Gallium Arsenide
9. Which device became widely adopted as an output mechanism in fourth-generation
computers?
A) Punch Cards
B) CRT Monitors
C) Printers
D) LEDs
10. What distinguishes supercomputers from mainframes in fourth-generation
computing?
A) Higher Storage Capacity
B) Parallel Processing
C) Larger Size
D) Use of Magnetic Tape
11. Which type of operating systems emerged in third-generation computers?
A) Batch Processing
B) Time-Sharing Systems
C) Real-Time Operating Systems
D) Virtual Operating Systems
12. What is a key feature expected from sixth-generation computers?
A) Integrated Quantum Chips
B) Improved Vacuum Tubes
C) Greater Reliance on Magnetic Tape
D) Use of BASIC as the Core Language
13. The third generation of computers introduced which of the following innovations?
A) Artificial Intelligence
B) Integrated Circuits
C) Vacuum Tubes
D)Fiber Optics
14. What type of computer forms the backbone of cloud computing services?
A) Embedded Computers
B) Mainframes and Supercomputers
C) Minicomputers
D) Personal Computers
15.Who invented the C programming language?
A) Dennis Ritchie
© Civil Services Club Bhopal-7747068666 Page 3
B) Bjarne Stroustrup
C) Ken Thompson
D) James Gosling
16. Who is credited with inventing the first digital computer?
A) Konrad Zuse
B) Charles Babbage
C) Alan Turing
D) John von Neumann
17. Which programming language is designed for artificial intelligence and natural
language processing?
A) Java
B)Prolog
C) C++
D) R
18. Which language introduced the concept of object-oriented programming (OOP)?
A) Java
B) Smalltalk
C) C++
D) Python
19. Which language is specifically designed for database queries?
A) Python
B) SQL
C) JavaScript
D)Kotlin
20. Which of these languages is widely used for front-end web development?
A) Java
B) HTML
C) Python
D) Ruby
21.What is the main purpose of the MATLAB programming language?
A) Web development
B) Numerical computing
C) Game development
D) Systems programming
22. Which type of RAM needs to be refreshed periodically?
A) SRAM
B) DRAM
C) ROM
© Civil Services Club Bhopal-7747068666 Page 4
D) Flash
23.Which memory is directly accessible by the CPU?
A) Cache Memory
B) Secondary Memory
C) Virtual Memory
D) External Storage
24. What is the main purpose of virtual memory?
A) To store data permanently
B) To expand the capacity of primary memory
C) To increase processing speed
D) To store frequently used instructions
25.Which type of memory is the fastest?
A) DRAM
B) SSD
C) Cache
D) HDD
26.What does EEPROM stand for?
A) Electrically Erasable Programmable Read-Only Memory
B) Electronic Erasable Peripheral ROM
C) Enhanced Erasable Primary ROM
D) Efficient Erasable Programmable RAM
27. Which unit measures the speed of memory?
A) Hertz
B) Bits
C) Bytes
D) Nanoseconds
28. Which type of memory is used in USB drives?
A) Flash Memory
B) ROM
C) SRAM
D) Cache
29.What is the full form of SDRAM?
A) Synchronous Dynamic Random Access Memory
B) Systematic Dynamic Random Access Memory
C) Static Data Random Access Memory
D) Serial Dynamic Read Access Memory
30.Which type of internet service is typically associated with mobile broadband
networks and offers internet access via cellular data?
A) DSL
© Civil Services Club Bhopal-7747068666 Page 5
B) Wi-Fi
C) 4G/LTE
D)Fiber optic
31.Which of the following internet services is widely used for short-range
communication within a building or a small area?
A) Bluetooth
B) 4G
C) DSL
D) Wi-Fi
32. Which system translates domain names into IP addresses?
A) FTP
B) DNS
C) HTTP
D) DHCP
33. Which type of addressing does the IPv6 protocol use?
A) 32-bit addresses
B) 64-bit addresses
C) 128-bit addresses
D) 256-bit addresses
34. Which layer of the OSI model corresponds to the internet's IP addressing and
routing?
A) Physical Layer
B) Transport Layer
C) Network Layer
D) Application Layer
35. Which internet technology helps maintain user anonymity by routing
communications through a network of relays?
A) DNS
B) VPN
C) Tor
D) FTP
36. What protocol is used to send emails over the internet?
A) POP
B) SMTP
C) HTTP
D) IMAP
37. Which protocol secures communication over the internet using encryption?
A) HTTP
B) HTTPS
C) FTP
© Civil Services Club Bhopal-7747068666 Page 6
D) SMTP
38. What is "ping" used for in networking?
A) Measuring data packet size
B) Checking the reachability of a host
C) Encrypting communications
D) Transferring files
39. What does the term "bandwidth" refer to in internet connections?
A) Speed of the internet
B) Amount of data that can be transferred in a given time
C) Number of devices connected to a network
D) Encryption strength of a network
40. In which year was ARPANET, the precursor to the modern internet, first
implemented?
A) 1969
B) 1972
C) 1983
D) 1991
41. Who is credited with inventing the World Wide Web?
A) Vinton Cerf
B) Tim Berners-Lee
C) Robert Metcalfe
D) Steve Jobs
42. When was the term "internet" first used to describe the interconnected network of
networks?
A) 1974
B) 1980
C) 1983
D) 1990
43. Which institution is responsible for managing the global Domain Name System
(DNS)?
A) ICANN
B) IETF
C) W3C
D) ISOC
44. Which organization developed ARPANET?
A) DARPA
B) NASA
C) MIT
D) NSF
© Civil Services Club Bhopal-7747068666 Page 7
45. When was the first web browser, WorldWideWeb, created?
A) 1989
B) 1990
C) 1992
D) 1993
46. Who invented Ethernet technology?
A) Tim Berners-Lee
B) Vinton Cerf
C) Robert Metcalfe
D) Dennis Ritchie
47. When was ICANN established?
A) 1988
B) 1995
C) 1998
D) 2000
48. Which organization proposed the first email standard?
A) W3C
B) ARPA
C) IETF
D) ISOC
49. Which institution manages the assignment of IP addresses globally?
A) ICANN
B) RIRs
C) ISOC
D) IANA
50. In which year was the first version of Microsoft Office released?
A) 1987
B) 1989
C) 1990
D) 1995
51. Which Microsoft Office application is used primarily for database management?
A) Excel
B) Access
C) OneNote
D) Visio
52. When was Microsoft Excel first released?
A) 1982
B) 1985
C) 1987
© Civil Services Club Bhopal-7747068666 Page 8
D) 1990
53. Which Windows operating system was the first to support touchscreen functionality?
A) Windows XP
B) Windows Vista
C) Windows 7
D) Windows 8
54. Which feature was first introduced in Windows Vista?
A) Windows Defender
B) Task Manager
C) Cortana
D) Microsoft Edge
55. What is the purpose of a domain name?
A. Identifies a specific computer on the internet
B. Simplifies complex IP addresses
C. Functions as a search engine
D. Maintains network security
56. What does "cookie" refer to in internet browsing?
A. A virus program
B. A small text file storing user data
C. A tracking tool for hackers
D. A browser plug-in
57. What is the maximum length of an IPv4 address?
A. 16 bits
B. 32 bits
C. 64 bits
D. 128 bits
58. Which technology aims to safeguard data against threats posed by quantum
computers?
A. Blockchain Technology
B. Cloud Security Protocols
C. Post-Quantum Cryptography (PQC)
D. Neural Network Algorithms
59. What is a significant goal of AI in Customer Experience (CX) management?
A. Full automation of customer service
B. Upskilling employees for better service
C. Increasing data collection
D. Replacing human interaction
60. What is a key feature of smaller AI models being developed?
A. Greater energy consumption
B. Improved multitasking
© Civil Services Club Bhopal-7747068666 Page 9
C. Task-specific optimization
D. Increased model size
61. Virtual and augmented reality are significantly transforming:
A. Social media platforms
B. Infrastructure planning
C. Video game design
D. Retail management
62. Which cybersecurity threat is becoming more prominent with advanced AI?
A. Phishing
B. Social Engineering Attacks
C. Brute Force Attacks
D. Ransomware
63. What is the main feature introduced in the 1G mobile technology?
A. Internet browsing
B. Analog voice communication
C. SMS service
D. Digital voice communication
64. Which technology forms the basis of 3G mobile networks?
A. AMPS
B. GSM
C. CDMA2000 and UMTS
D. LTE
65. What generation of mobile networks introduced video calling as a common feature?
A. 2G
B. 3G
C. 4G
D. 5G
66. Which mobile network generation uses millimeter waves for faster speeds?
A. 2G
B. 3G
C. 4G
D. 5G
67.What does VoLTE stand for, as seen in 4G networks?
A. Voice Over Long-Term Evolution
B. Video Over LTE
C. Volume Optimization LTE
D. Variable Optimization Long-Term Evolution
© Civil Services Club Bhopal-7747068666 Page 10
.
68. Which of the following is a goal of 6G technology?
A. Higher voice clarity
B. Terabit-level data speeds
C. Reduced data rates
D. Improved SMS functionality
69. Which of these was a hallmark feature of fourth-generation computers?
A) Microprocessors
B) Cloud Computing
C) Quantum Processing
D) Punch Cards
70. Fifth-generation computers are best associated with which of the following fields?
A) Artificial Intelligence
B) Mechanical Computing
C) Analog Processing
D) Vacuum Tubes
71. Which component was introduced with second-generation computers that replaced
vacuum tubes?
A) Resistors
B) Transistors
C) Capacitors
D) None of the above
72. Which company introduced the first commercially successful microprocessor?
A) IBM
B) Intel
C) HP
D) Microsoft
73. What distinguishes third-generation computers from their predecessors in terms of
user interface?
A) Graphical User Interface
B) Use of Monitors
C) Keyboards and Operating Systems
D) Virtual Reality
74. Which language became prominent with fourth-generation computers?
A) BASIC
B) COBOL
C) Assembly
D) Pascal
75. Which of the following computers is an example of the first generation?
A) UNIVAC
© Civil Services Club Bhopal-7747068666 Page 11
B) IBM 1401
C) IBM 360
D) DEC PDP-11
76. What year marks the transition from the second to the third generation of
computers?
A) 1955
B) 1964
C) 1971
D) 1980
77. What was the primary drawback of first-generation computers?
A) Limited Memory
B) High Cost and Size
C) Inaccuracy
D) Slow Clock Speeds
78. Which generation saw the emergence of supercomputers?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
79. Which type of memory was first used in second-generation computers?
A) Magnetic Core Memory
B) Dynamic RAM
C) EPROM
D) Flash Memory
80. Who is credited with coining the term "Artificial Intelligence," central to fifth-
generation computing?
A) Alan Turing
B) John McCarthy
C) Marvin Minsky
D) Claude Shannon
81. Which type of computer is designed for personal use at home or in an office?
A) Microcomputer
B) Supercomputer
C) Mainframe
D) Embedded Computer
82.Which type of computer is widely used for data analytics in research labs?
A) Mainframe
B) Workstation
C) Tablet
© Civil Services Club Bhopal-7747068666 Page 12
D) Embedded Computer
83. What is the primary feature of a tablet computer?
A) Detachable storage
B) Touchscreen interface
C) High computational speed
D) Parallel processing
84. Who developed the UNIX operating system?
A) Dennis Ritchie and Ken Thompson
B) Bill Gates
C) Linus Torvalds
D) Steve Wozniak
85. Who invented the graphical user interface (GUI)?
A) Xerox PARC team
B) Steve Jobs
C) Tim Berners-Lee
D) Bill Gates
86. Who is credited with creating the first hard disk drive?
A) IBM
B) Seagate
C) Toshiba
D) Hitachi
87. Who developed the first personal computer?
A) IBM
B) Steve Jobs and Steve Wozniak
C) Ed Roberts
D) Bill Gates
88. Who is credited with creating the Linux operating system?
A) Linus Torvalds
B) Richard Stallman
C) Ken Thompson
D) Dennis Ritchie
89. Which operating system is known as the first multi-user, multitasking OS?
A) UNIX
B) MS-DOS
C) Windows 95
D) Mac OS
90. What does the acronym "BIOS" stand for?
A) Basic Integrated Operating System
© Civil Services Club Bhopal-7747068666 Page 13
B) Binary Input/Output System
C) Basic Input/Output System
D) Binary Integrated Operating System
91. Which OS is the primary choice for servers due to its stability and security?
A) Linux
B) Windows
C) MacOS
D) Chrome OS
92. What is the purpose of a swap space in an operating system?
A) To swap data between two computers
B) To store the kernel
C) To act as virtual memory
D) To back up data
93. Which Windows version introduced the Start menu?
A) Windows 95
B) Windows 3.1
C) Windows 98
D) Windows NT
94. Which OS is primarily used in Apple devices?
A) iOS
B) macOS
C) WatchOS
D) All of the above
95. What is the primary function of a shell in an OS?
A) Manage hardware
B) Interface between the user and kernel
C) Store user data
D) Execute software applications
96. Which of the following is an open-source mobile operating system?
A) iOS
B) Android
C) Windows Phone
D) Blackberry OS
97. What is one of the key features introduced in the 2024 update of Windows 11?
A) Advanced holographic displays
B) Generative erase for photos
C) Blockchain-based file management
D) Virtual desktop for AR applications
© Civil Services Club Bhopal-7747068666 Page 14
98. Which mobile operating system introduced "Emergency SOS via satellite" for regions
without cellular service in 2023?
A) Android 14
B) iOS 16
C) HarmonyOS 4
D) iOS 17
99.Which operating system includes the "Nearby Share" feature, similar to Apple’s
AirDrop?
A) Android 14
B) iOS 17
C) macOS Ventura
D) Windows 11
100. Which Linux distribution gained traction in 2024 for AI model training?
A) Ubuntu 24.04
B) Fedora AI Edition
C) CentOS Stream
D) ArchLinux AI
Test-2
Cyber Security
1.Which act serves as the primary legislation for cybersecurity in India?
A. Indian Penal Code, 1860
B. IT Act, 2000
C. Cybersecurity Act, 2010
D. Personal Data Protection Bill, 2019
2.Section 66A of the IT Act, 2000 was struck down by the Supreme Court in which case?
A. K.S. Puttaswamy vs Union of India
B. Shreya Singhal vs Union of India
C. Naz Foundation vs Government of NCT
D. Internet Freedom Foundation vs TRAI
3.Which section of the IT Act penalizes sending offensive messages through
communication service?
A. Section 65
B. Section 66A
C. Section 67
D. Section 68
4.What is the penalty for tampering with computer source documents under the IT Act?
A. Section 65
B. Section 67
C. Section 70
D. Section 72
© Civil Services Club Bhopal-7747068666 Page 15
5.Which Indian law was first amended to accommodate digital evidence?
A. Indian Penal Code, 1860
B. Indian Evidence Act, 1872
C. Consumer Protection Act, 1986
D. Indian Telegraph Act, 1885
6.Which body regulates the use of encryption in India?
A. TRAI
B. CERT-In
C. Ministry of Electronics and IT (MeitY)
D. Reserve Bank of India
7.Under the IT Act, what is the term for a person who assists in committing a
cybercrime?
A. Perpetrator
B. Abettor
C. Hacker
D. Accomplice
8.What is the primary objective of the Digital India program in terms of cybersecurity?
A. Setting up more IT colleges
B. Creating a secure cyberspace
C. Developing mobile apps
D. Promoting e-commerce
9.Which law governs data breaches and imposes responsibilities on companies for user
data protection?
A. IT Act, 2000
B. Data Protection Bill, 2019
C. Copyright Act, 1957
D. Indian Penal Code, 1860
10. Which section of the IT Act penalizes hacking?
A. Section 43
B. Section 66
C. Section 67
D. Section 70
11.Under which section can websites be blocked in India?
A. Section 66
B. Section 69A
C. Section 72
D. Section 77
12. Which section addresses cyber terrorism?
A. Section 66C
© Civil Services Club Bhopal-7747068666 Page 16
B. Section 66F
C. Section 70
D. Section 73
13.Which type of cybercrime refers to monitoring someone's online behavior without
their knowledge?
A. Keylogging
B. Cyber voyeurism
C. Cyber defamation
D. Malware attack
14.Which cybercrime involves obtaining sensitive government or corporate data?
A. Cyber espionage
B. Phishing
C. Keylogging
D. Cyberstalking
15.What type of cybercrime uses small data storage devices to steal sensitive files from a
computer physically?
A. USB-based malware
B. Physical hacking
C. Cyber theft
D. Insider attack
16What is the term for cybercrime that involves manipulating stock prices using
misinformation?
A. Digital piracy
B. Pump-and-dump schemes
C. Hacking
D. Identity theft
17.Which cybercrime intercepts users' sensitive data by exploiting unsecured wireless
networks?
A. Packet sniffing
B. Malware attack
C. SQL injection
D. Denial-of-service attack
18.What type of attack involves embedding malicious code into a legitimate program to
gain access to a system?
A. Spyware
B. Trojan horse
C. Adware
D. Keylogging
19.What is a stealth virus designed to do?
A. Encrypt files
© Civil Services Club Bhopal-7747068666 Page 17
B. Hide its presence from antivirus software
C. Infect boot sectors
D. Replicate via email attachments
20.Which type of virus rapidly consumes disk space or memory by creating multiple
copies of itself?
A. Worm
B. Space-filler virus
C. Logic bomb
D. Boot sector virus
21.Which encryption standard is widely used in wireless networks?
A. AES
B. RSA
C. DES
D. SHA
22.Which key length is considered secure for modern encryption?
A. 64-bit
B. 128-bit
C. 512-bit
D. 1024-bit
23. Which cryptographic protocol secures data during transmission over the internet?
A. SSL/TLS
B. MD5
C. SHA-256
D. DES
24. Which hashing algorithm is widely used for data integrity?
A. AES
B. RSA
C. SHA-256
D. DES
25.What is the primary function of Public Key Infrastructure (PKI)?
A. To encrypt files
B. To manage keys and digital certificates
C. To store passwords
D. To compress data
26.What does the term "plaintext" refer to in encryption?
A. Encrypted data
B. Data before encryption
C. Data compressed for transmission
D. A public key
© Civil Services Club Bhopal-7747068666 Page 18
27. Which encryption algorithm is known for being used in blockchain technology?
A. RSA
B. SHA-256
C. AES
D. DES
28. What is the primary vulnerability of symmetric encryption?
A. Complexity of algorithms
B. Difficulty in sharing the key securely
C. High computational overhead
D. Inability to encrypt large data
29. Which type of encryption is best for securing emails?
A. Symmetric encryption
B. Asymmetric encryption
C. Hashing
D. Stream cipher
30.Which technology is designed to detect and respond to unauthorized intrusions in a
network?
A. Virtual Private Network (VPN)
B. Intrusion Detection System (IDS)
C. Multi-factor Authentication (MFA)
D. Antivirus software
31.Which cryptographic technique is used to secure data during transmission?
A. Digital Signatures
B. SSL/TLS Protocol
C. Hashing
D. EDR
32.What is the role of a Security Information and Event Management (SIEM) system?
A. Preventing unauthorized logins
B. Encrypting sensitive data
C. Collecting and analyzing security logs for threat detection
D. Scanning emails for phishing
33. What does "sandboxing" refer to in cybersecurity?
A. Testing applications in isolated environments to detect malicious behavior
B. Encrypting sensitive data
C. Managing user authentication
D. Blocking spam emails
34. What is a Zero Trust security model?
A. Always assuming internal traffic is safe
B. Trusting no user or device by default, even within the network
© Civil Services Club Bhopal-7747068666 Page 19
C. Allowing all traffic after initial authentication
D. A method of password management
35.Which cybersecurity technology helps prevent phishing attacks?
A. EDR
B. DNS filtering
C. SIEM
D. Encryption
36.Which malware has recently exploited a zero-day vulnerability in GeoVision devices
for potential DDoS attacks?
a) Pegasus
b) SteelFox
c) Bumblebee
d) Water Hydra
37. What is the primary characteristic of the "ILOVEYOU" virus?
A) It spreads through email attachments
B) It spreads through website pop-ups
C) It affects hardware components
D) It encrypts files
38. Which virus is known for affecting Microsoft Windows systems by exploiting
vulnerabilities in the system’s file-sharing protocol?
A) Conficker
B) Blaster
C) MyDoom
D) Sasser
39. The "Stuxnet" virus is considered a significant cyber-attack. What was its primary
target?
A) Banking systems
B) Nuclear facilities
C) Healthcare systems
D) Social media accounts
40. Which virus is known for being one of the first to perform "ransomware" actions by
encrypting files and demanding payment?
A) Cryptolocker
B) Ransomware
C) Zeus
D) Code Red
41. What is the function of the "Conficker" virus?
A) It steals sensitive personal information
B) It turns infected computers into a botnet
C) It encrypts the hard drive
D) It redirects web traffic to fake websites
© Civil Services Club Bhopal-7747068666 Page 20
42. The "MyDoom" virus is often associated with which type of activity?
A) Stealing passwords
B) Distributed Denial of Service (DDoS) attacks
C) Phishing
D) Keylogging
43. The "Code Red" virus primarily targeted which version of Windows?
A) Windows XP
B) Windows 95
C) Windows NT
D) Windows 2000
44. Which of these viruses spreads primarily through instant messaging services?
A) Sasser
B) Nimda
C) Zbot
D) ILOVEYOU
45. Which of the following is the main function of a firewall in computer security?
A) It helps in encrypting files
B) It prevents unauthorized access to a network
C) It repairs corrupted files
D) It checks the computer for malware
46. Which virus was famous for creating a backdoor into Windows systems by exploiting
a vulnerability in the SMB protocol?
A) Stuxnet
B) Conficker
C) MyDoom
D) WannaCry
47.Which computer virus, classified as a Trojan, is specifically designed to steal sensitive
financial information?
A) Zeus
B) Melissa
C) ILOVEYOU
D) Sasser
48. What is the "Trojan Horse" virus primarily known for?
A) Self-replication across networks
B) Unauthorized data collection
C) Disguising as legitimate software to trick users
D) Corrupting system files
49. What function does a "firewall" serve in a corporate network?
A) It encrypts sensitive data
B) It prevents unauthorized access to and from the network
C) It scans incoming emails for malware
D) It updates antivirus definitions
50. What is "White Hat" hacking also known as?
A) Malicious Hacking
B) Ethical Hacking
© Civil Services Club Bhopal-7747068666 Page 21
C) Cyber Espionage
D) Phishing
51. Which type of hacking involves unauthorized access for malicious intent?
A) Gray Hat Hacking
B) White Hat Hacking
C) Black Hat Hacking
D) Script Kiddies
52. What is "Gray Hat" hacking?
A) Ethical hacking without permission
B) Ethical hacking with authorization
C) Malicious hacking for financial gain
D) Phishing attacks
53. What is the primary purpose of a rootkit?
A) To enhance system performance
B) To gain unauthorized control over a system
C) To detect malware
D) To block phishing emails
54. Which type of rootkit hides in the firmware of a system?
A) Kernel-level Rootkit
B) Firmware Rootkit
C) User-mode Rootkit
D) Application Rootkit
55. What type of hacking targets public figures or organizations to damage their
reputation?
A) Hacktivism
B) Cyber Espionage
C) Phishing
D) Ransomware Attack
56. What is a "keylogger" commonly used for in cyber attacks?
A) Encrypting sensitive data
B) Recording keystrokes to steal information
C) Scanning for vulnerabilities
D) Blocking unauthorized access
57. What is the primary target of a "Man-in-the-Middle" attack?
A) System files
B) Communication between two parties
C) Network routers
D) User accounts
58. Which rootkit operates at the core of the operating system and has full access to
resources?
A) Application Rootkit
B) Kernel-level Rootkit
C) Firmware Rootkit
D) User-mode Rootkit
© Civil Services Club Bhopal-7747068666 Page 22
59. What is a "Botnet"?
A) A single malware program
B) A network of infected computers controlled remotely
C) A type of ransomware
D) A firewall technique
60. What distinguishes Spear Phishing from regular Phishing?
A) It targets specific individuals or organizations
B) It uses mass email campaigns
C) It infects systems with ransomware
D) It bypasses firewalls
61. What is a "Polymorphic Virus"?
A) A virus that infects the BIOS
B) A virus that changes its code to evade detection
C) A virus that replicates without user intervention
D) A virus designed to target rootkits
62.What is the purpose of the CERT-In (Computer Emergency Response Team-India)?
A. To draft cyber laws
B. To monitor and respond to cybersecurity incidents
C. To enforce penalties for cybercrimes
D. To regulate online content
63. Which section of the IT Act penalizes identity theft?
A. Section 66B
B. Section 66C
C. Section 67
D. Section 72
64.The "Intermediary Guidelines and Digital Media Ethics Code Rules, 2021" were
framed under which act?
A. IT Act, 2000
B. Indian Evidence Act, 1872
C. Indian Telegraph Act, 1885
D. Data Protection Act, 2019
65.What does Section 67 of the IT Act, 2000 address?
A. Cyberstalking
B. Publishing obscene material in electronic form
C. Hacking
D. Financial fraud
66.The “Pigmy Goat” malware targets which security devices?
a) Cisco routers
b) Sophos firewalls
c) AWS EC2 instances
d) Palo Alto firewalls
© Civil Services Club Bhopal-7747068666 Page 23
67. Which malware loader returned in 2024 after law enforcement disruption?
a) Bumblebee
b) Emotet
c) RedLine
d) Glove Stealer
68. What recent malware can bypass Chrome's cookie encryption to steal data?
a) Glove Stealer
b) Hydra Trojan
c) Zeus
d) SteelFox
69.CVE-2023-22527 was a critical vulnerability in which system?
a) WordPress
b) Atlassian Confluence
c) Apache
d) VMware
70.What is the name of the campaign targeting Ukrainian conscripts with malware?
a) UNC5812
b) BlueNoroff
c) Pegasus
d) HydraNet
71. Which malware was associated with macOScryptomining in 2024?
a) RedLine
b) SteelFox
c) BlueNoroff
d) HydraNet
72.A Russian national was charged for creating which prolific infostealer malware?
a) Emotet
b) RedLine
c) DarkComet
d) Dridex
73. Which of the following is the national nodal agency for responding to cybersecurity
incidents in India?
A) CERT-In
B) C-DAC
C) NCIIPC
D) DSCI
74. In which year was the Data Security Council of India (DSCI) established?
A) 2001
B) 2005
C) 2008
D) 2010
© Civil Services Club Bhopal-7747068666 Page 24
75. What does the abbreviation IDRBT stand for?
A) Institute for Digital Research in Banking Technology
B) Institute for Development and Research in Banking Technology
C) Indian Data Research in Banking Technology
D) Indian Development Research in Banking Technology
76. Which organization is responsible for advising the government on the protection of
India’s critical infrastructure from cyber threats?
A) C-DAC
B) CERT-In
C) NCIIPC
D) DSCI
77. Which Indian institute is tasked with securing communication networks and
providing encryption solutions?
A) C-DAC
B) CERT-In
C) NCIIPC
D) IDRBT
78. Which of the following institutes is involved in managing cybersecurity threats
specific to national security?
A) NCIIPC
B) DSCI
C) CERT-In
D) IDRBT
79.Which law in India addresses unauthorized access to a computer system?
A. Section 43 of IT Act, 2000
B. Section 65 of IT Act, 2000
C. Indian Penal Code, 1860
D. Data Protection Bill, 2019
80. The Aadhaar Act, 2016 ensures data protection under which of its provisions?
A. Section 8
B. Section 28
C. Section 34
D. Section 37
81. What does Section 67 of the IT Act penalize?
A. Publishing obscene material electronically
B. Identity theft
C. Hacking
D. Data tampering
© Civil Services Club Bhopal-7747068666 Page 25
82. What is the punishment for tampering with computer source documents under
Section 65?
A. Fine only
B. Imprisonment of up to 3 years, or fine, or both
C. Imprisonment of up to 1 year
D. No penalty
83. Which section grants authority to monitor encrypted information?
A. Section 69
B. Section 66A
C. Section 70
D. Section 72
84. What is the role of Section 70 in the IT Act?
A. Defines penalties for hacking
B. Protects critical information infrastructure
C. Addresses digital signatures
D. Penalizes obscene content
85. What is the penalty for identity theft under Section 66C of IT Act?
A. Fine up to ₹1 lakh
B. Imprisonment up to 3 years
C. Both fine and imprisonment
D. No penalty
86. Which body handles cybersecurity incidents under the IT Act?
A. TRAI
B. CERT-In
C. MeitY
D. NIA
87. Which section penalizes breach of confidentiality and privacy under IT Act 2000?
A. Section 66
B. Section 67A
C. Section 72
D. Section 75
88.Which cybercrime involves tricking individuals into divulging sensitive information
via fake websites or emails?
A. Malware attack
B. Phishing
C. Denial-of-service attack
D. Spyware installation
89.What is the term for software designed to disrupt, damage, or gain unauthorized
access to a computer system?
A. Ransomware
© Civil Services Club Bhopal-7747068666 Page 26
B. Malware
C. Trojan Horse
D. Spyware
90.Which cybercrime specifically targets financial gain by encrypting victims' files and
demanding payment for the decryption key?
A. Phishing
B. Ransomware
C. Hacking
D. Cyberbullying
91.What type of cybercrime involves sending a large number of requests to overwhelm a
server and make it inaccessible?
A. Spoofing
B. Denial-of-service (DoS) attack
C. Cyber espionage
D. SQL injection
92. Which type of cybercrime involves secretly monitoring someone's online activity?
A. Cyberstalking
B. Spyware attack
C. Phishing
D. Identity theft
93.What is the term for the theft of someone’s identity for fraudulent purposes?
A. Cyberbullying
B. Hacking
C. Identity theft
D. Spoofing
94.Which cybercrime uses social engineering techniques to manipulate individuals into
revealing personal information?
A. Malware attack
B. Phishing
C. Cyberstalking
D. Smishing
95. What is the act of altering data unlawfully to defraud others?
A. Hacking
B. Cyber fraud
C. Data diddling
D. Spoofing
96. Which type of cybercrime targets children by exploiting them online?
A. Cyberbullying
B. Cyber grooming
C. Identity theft
© Civil Services Club Bhopal-7747068666 Page 27
D. Spyware installation
97. What cybercrime involves intercepting private communications over a network?
A. Cyber espionage
B. Eavesdropping
C. Denial-of-service attack
D. SQL injection
98. What type of attack uses fake identities to deceive others online?
A. Phishing
B. Spoofing
C. Cyberbullying
D. Data breach
99. What is the term for unauthorized attempts to access database systems using
malicious queries?
A. SQL injection
B. DoS attack
C. Phishing
D. Cyber espionage
100. What is the cybercrime involving sending fraudulent emails claiming to be from
reputable sources to gain financial or personal information?
A. Cyberbullying
B. Phishing
C. Cyber espionage
D. Data breach
Test-3
Robotics and AI
1. Who is considered the co-inventor of the first industrial robot, Unimate?
A) Isaac Asimov
B) George Devol
C) Joseph Engelberger
D) Both B and C
2. What was the name of the play in which the term "robot" was first introduced?
A) Metropolis
B) R.U.R. (Rossum's Universal Robots)
C) Frankenstein
D) The Robot’s Rebellion
3. Which ancient Greek engineer is known for creating early automata such as
mechanical temples and puppets?
A) Pythagoras
© Civil Services Club Bhopal-7747068666 Page 28
B) Aristotle
C) Heron of Alexandria
D) Plato
4. When was the first robot-assisted surgery performed?
A) 1985
B) 1995
C) 2000
D) 2010
5. Which country developed the first robot astronaut, Robonaut?
A) Russia
B) USA
C) Japan
D) Germany
6. Which component is essential for a robot's autonomous decision-making?
A) End-effector
B) Controller
C) Actuator
D) Frame
7. Which type of motion is unique to a Cartesian robot?
A) Circular motion
B) Linear motion along X, Y, and Z axes
C) Rotational motion
D) Random motion
8. In robotics, "gripper" typically refers to which component?
A) Sensor
B) Actuator
C) End-effector
D) Frame
9. Which Indian institution established the first robotics laboratory in the country?
A) IIT Kanpur
B) IISc Bangalore
C) DRDO
D) ISRO
10. In which year was the Indian Society for Robotics and Automation (ISRA) founded?
A) 1986
B) 1992
C) 2000
D) 1984
11. Which Indian organization developed Daksh, an indigenous robot?
A) ISRO
B) DRDO
C) BARC
D) CSIR
© Civil Services Club Bhopal-7747068666 Page 29
12. Which Indian university initiated the Centre for Robotics and Intelligent Systems
(CRIS)?
A) IIT Delhi
B) IIT Kanpur
C) IIT Bombay
D) Amrita Vishwa Vidyapeetham
13. What was India's first humanoid robot developed for public interaction?
A) Mitra
B) Manav
C) Sophia
D) Chitti
14. Which organization created India's first indigenous robotic surgical system, SSI
Mantra?
A) All India Institute of Medical Sciences
B) Indian Institute of Science
C) Skanray Technologies
D) SS Innovations
15. What is the primary purpose of the “e-Vahan” robot developed in India?
A) Autonomous farming
B) Traffic management
C) Law enforcement
D) Disaster recovery
16. Which Indian startup is known for developing the advanced robotic arm Grasp?
A) GreyOrange
B) Asimov Robotics
C) Hi-Tech Robotics Systemz
D) Sastra Robotics
17. In which year did the Government of India launch the SAMARTH Udyog initiative,
focusing on robotics in manufacturing?
A) 2016
B) 2017
C) 2018
D) 2019
18. Which Indian robotic platform specializes in warehouse automation?
A) Milagrow
B) GreyOrange
C) ASIMOV
D) DRONA
19.What was significant about the robot "BigDog," developed by Boston Dynamics?
A) It mimicked a horse’s movements
B) It was the first quadruped robot capable of navigating rough terrain
C) It could fly autonomously
D) It was powered entirely by solar energy
© Civil Services Club Bhopal-7747068666 Page 30
20. Who developed the first robot capable of playing chess?
A) Charles Babbage
B) Alan Turing
C) MIT AI Lab
D) IBM
21.Which robot became the first to achieve citizenship in a country?
A) Sophia
B) Asimo
C) Pepper
D) Kismet
22. Which programming language is most associated with early robotics research?
A) Python
B) LISP
C) C++
D) COBOL
23. Who is often referred to as the "Father of AI"?
A) John McCarthy
B) Alan Turing
C) Marvin Minsky
D) Herbert Simon
24. Which subfield of AI includes the development of chatbots like ChatGPT?
A) Natural Language Processing
B) Robotics
C) Machine Learning
D) Expert Systems
25. Which AI subfield studies strategies for decision-making in competitive
environments?
A) Game Theory
B) Reinforcement Learning
C) Deep Learning
D) Computer Vision
26. Which country leads the world in AI regulations through its proposed AI Act?
A) United States
B) European Union
C) India
D) China
.
27. India recently collaborated with which global tech giant to establish AI models for
healthcare?
A) Google
B) Microsoft
C) OpenAI
© Civil Services Club Bhopal-7747068666 Page 31
D) IBM
28. The first generative AI system in India for public administration is called?
A) Bhashini AI
B) GPT India
C) Samarth AI
D) Sagar AI
29. Which Indian company launched the ‘Sankalp’ AI platform to combat cyber threats?
A) Infosys
B) TCS
C) HCL
D) Wipro
.
30.Which technology is utilized in India’s new flood prediction AI model?
A) Natural Language Processing
B) Machine Learning
C) Blockchain
D) Internet of Things (IoT)
31. India is collaborating with which nation for AI-based agricultural technologies?
A) Israel
B) Germany
C) Japan
D) France
.
32. Which Indian state recently announced a large-scale AI initiative for smart cities?
A) Karnataka
B) Maharashtra
C) Tamil Nadu
D) Gujarat
33. Which global summit discussed AI's role in climate change mitigation in 2024?
A) COP29
B) G20 Summit
C) UNGA AI Summit
D) AI for Climate Forum
34. What is the name of the initiative focusing on AI in governance by NITI Aayog?
A) Digital India AI
B) Responsible AI for All
C) AI Governance Hub
D) Bharat AI Ecosystem
35. India's AI-based judicial case management system is known as?
A) eCourts 2.0
© Civil Services Club Bhopal-7747068666 Page 32
B) SUPACE
C) AI Justice
D) Nyaya Tech
36. Which industry in India has benefited the most from AI-driven chatbots in 2024?
A) Banking
B) Retail
C) Education
D) Tourism
37. What is the global AI-powered humanitarian prediction tool used in India for natural
disasters?
A) Gaia AI
B) Artemis AI
C) AI4Relief
D) CEPI-AI
38. Which AI-powered tool was recently adopted in India for mapping biodiversity?
A) EcoAI
B) iNaturalist AI
C) AI-WildLife Mapper
D) eBiodiversityAI
39. Which AI system has been implemented by the Indian Railways for safety
monitoring?
A) Kavach AI
B) AI-SafeGuard
C) RailNet AI
D) LokSuraksha AI
40. Which Indian city implemented AI-based traffic management in 2024?
A) Bengaluru
B) Pune
C) Chennai
D) Hyderabad
41. Which organization launched the "AI for All" initiative in India?
A) NITI Aayog
B) Microsoft India
C) CBSE
D) Intel India
42. Which global AI summit in 2024 emphasized ethical AI development?
A) G20 AI Summit
B) Global Partnership on AI (GPAI)
© Civil Services Club Bhopal-7747068666 Page 33
C) AI Ethics Summit
D) COP29 Tech Forum
43. Which AI initiative is being used by the Indian agricultural sector for soil health
analysis?
A) Bhoomi AI
B) KrishiYantrAI
C) DigiKisan AI
D) AgriTechAI
44. What is India's AI-powered health initiative to predict disease outbreaks?
A) Suraksha AI
B) Ayushman Bharat Digital Mission
C) HealthNet AI
D) Integrated Health Prediction AI
45. The AI chatbot “Saksham” was introduced in India for which sector?
A) Banking
B) Railways
C) Education
D) Healthcare
46. Which test was proposed by Alan Turing in 1950 to determine machine intelligence?
A) Intelligence Quotient Test
B) Turing Test
C) Imitation Game
D) Neural Network Test
47. Which event in 1956 is widely considered the starting point of AI as a research field?
A) The invention of the transistor
B) Dartmouth Conference
C) Launch of Sputnik
D) Publication of "Perceptrons" by Minsky and Papert
48. Which AI system defeated Garry Kasparov in chess in 1997?
A) AlphaZero
B) DeepMind
C) Deep Blue
D) Watson
49. Which programming language, introduced in 1972, became a standard for AI
research?
A) Python
B) Lisp
C) Prolog
D) Java
© Civil Services Club Bhopal-7747068666 Page 34
50. What is the primary function of actuators in a robot?
A) Processing sensory inputs
B) Converting energy into mechanical motion
C) Storing and supplying energy
D) Communicating with external systems
51. Degrees of Freedom (DOF) in a robot primarily affect its:
A) Power consumption
B) Flexibility and range of motion
C) Communication abilities
D) End-effector attachment types
52. Which type of robot is specifically designed for space exploration?
A) Mobile robots
B) Humanoid robots
C) Articulated robots
D) Rover robots
53. In robotics, what is the primary role of the end-effector?
A) Generating energy
B) Sensing environmental conditions
C) Interacting with the environment
D) Processing commands
54. Which sensor is most commonly used for object detection in robots?
A) Gyroscope
B) Proximity sensor
C) Thermometer
D) Humidity sensor
55. Which material is commonly used for building lightweight robotic frames?
A) Stainless steel
B) Aluminum
C) Lead
D) Titanium
56. What does the term "robotic manipulator" refer to?
A) The sensor used for navigation
B) The arm of the robot used for handling objects
C) The software controlling robot movements
D) The power source of the robot
57. Which of the following is NOT a type of actuator?
A) Electric motor
B) Hydraulic cylinder
C) Pneumatic valve
D) Light-emitting diode
58. Which Indian state is home to the largest robotics park inaugurated in 2022?
A) Karnataka
B) Tamil Nadu
C) Gujarat
D) Maharashtra
© Civil Services Club Bhopal-7747068666 Page 35
59. Which Indian company collaborated with the Ministry of Defense to develop the
Tactical Robotic System (TRoS)?
A) Tata Advanced Systems
B) Larsen & Toubro
C) Bharat Electronics Limited
D) Hindustan Aeronautics Limited
60.Which component of AI focuses on machines simulating human decision-making
processes?
A) Machine Learning
B) Natural Language Processing
C) Expert Systems
D) Vision Systems
61. Which of the following is NOT a core component of AI?
A) Robotics
B) Machine Learning
C) Knowledge Representation
D) Cryptography
62.Which subfield of AI focuses on enabling machines to learn from data?
A) Neural Networks
B) Machine Learning
C) Robotics
D) Natural Language Processing
63.What is the purpose of a neural network in AI?
A) Encrypting data
B) Simulating the human brain
C) Processing natural language
D) Managing hardware components
64. Which AI component is most involved in planning and decision-making?
A) Heuristics
B) Robotics
C) Expert Systems
D) Knowledge Representation
65. Which type of AI is primarily focused on enhancing human-machine interaction?
A) Machine Learning
B) Natural Language Processing
C) Robotics
D) Reinforcement Learning
66. What does "Deep Learning" primarily use for its operations?
A) Simple algorithms
B) Large datasets and multi-layered neural networks
C) Knowledge bases
D) Statistical models
67. Which of the following is an example of robotics in AI?
A) Speech recognition
B) Self-driving cars
© Civil Services Club Bhopal-7747068666 Page 36
C) Data mining
D) Sentiment analysis
68. What is a chatbot an example of in AI?
A) Expert System
B) Natural Language Processing
C) Machine Learning
D) Computer Vision
69. Which type of AI can only perform tasks it was specifically programmed for?
A) Narrow AI
B) General AI
C) Super AI
D) Reactive AI
70. What is the primary focus of Super AI?
A) Beating humans in chess
B) Surpassing human intelligence and capabilities
C) Replacing human labor
D) Functioning without human intervention
71. Limited Memory AI is best exemplified by which application?
A) Chatbots
B) Self-driving cars
C) Smart thermostats
D) Reactive game-playing AI
72. Which AI type is not yet realized but represents the ultimate goal of AI development?
A) Narrow AI
B) General AI
C) Super AI
D) Reactive Machines
73. What is a characteristic feature of General AI?
A) Specific task optimization
B) Human-level reasoning and learning abilities
C) Inability to adapt to new situations
D) Lack of creativity
74. Which type of AI uses historical data to predict outcomes?
A) Reactive Machines
B) Limited Memory AI
C) General AI
D) Super AI
75. Which type of AI is also referred to as weak AI?
A) Narrow AI
B) General AI
C) Super AI
D) Reinforcement AI
76. AI chatbots like Siri and Alexa are examples of which type of AI?
A) General AI
© Civil Services Club Bhopal-7747068666 Page 37
B) Super AI
C) Narrow AI
D) Reactive Machines
77. What makes Limited Memory AI different from Reactive AI?
A) Use of neural networks
B) Ability to store and learn from past data
C) Faster processing speeds
D) Better user interface
78. Which type of AI could potentially develop self-awareness?
A) Super AI
B) Narrow AI
C) Reactive Machines
D) General AI
79. Deep Blue, the chess-playing computer, is an example of what type of AI?
A) General AI
B) Reactive AI
C) Limited Memory AI
D) Super AI
80. What is the defining characteristic of Narrow AI systems?
A) Problem-solving across all domains
B) Lack of memory
C) Performing a single task very effectively
D) Operating without human intervention
81. What is the primary focus of Machine Learning?
A) Building hardware for AI
B) Learning from data and improving over time
C) Designing robots
D) Simulating human emotions
.
82. Which AI subfield employs neural networks to solve complex problems?
A) Robotics
B) Expert Systems
C) Deep Learning
D) Natural Language Processing
83. What subfield of AI involves planning and problem-solving using stored knowledge?
A) Machine Learning
B) Expert Systems
C) Robotics
D) NLP
84. Which AI model was launched to assist Indian farmers with weather predictions?
A) Meghdoot AI
B) MonsoonAI
C) Krishi AI
D) ClimateAI
© Civil Services Club Bhopal-7747068666 Page 38
85. Which AI-powered platform is used for crop insurance claims in India?
A) CropGuard AI
B) Pradhan Mantri AI-Bima
C) Krishi Insurance AI
D) DigiClaim
86. Which AI tool is helping Indian police with facial recognition for missing persons?
A) Trinetra AI
B) Darpan AI
C) Aadhaar Face AI
D) Jyoti AI
87. Which ministry released the Draft National Strategy on Robotics in October 2023?
A) Ministry of Science and Technology
B) Ministry of Electronics and Information Technology
C) Ministry of Defence
D) Ministry of Skill Development
88. The National Robotics Mission proposes establishing which of the following?
A) Space robotics labs
B) Robotics Innovation Units (RIU)
C) AI-only research centers
D) Drone-specific R&D zones
89. Which country is leading in humanoid robot deployment for public services?
A) USA
B) Japan
C) Germany
D) South Korea
90. What is the significance of "Cyber Physical Systems" in India's robotics mission?
A) Advanced military weaponry
B) Integration of physical and digital technologies
C) Replacement of human workers in agriculture
D) Robotics for social media monitoring
91. Which Indian initiative aims to promote robotics and AI at school levels?
A) Skill India
B) Atal Tinkering Labs
C) Digital India
D) National AI Mission
92. Which of the following is a major application of robotics in healthcare in India?
A) Robotic surgery
B) Pharmacy automation
C) Remote patient monitoring
D) All of the above
© Civil Services Club Bhopal-7747068666 Page 39
93. The National Strategy on Robotics identifies how many core sectors for automation?
A) Two
B) Three
C) Four
D) Five
94. India's "Make in India 2.0" includes robotics under how many identified sub-sectors?
A) 10
B) 15
C) 27
D) 30
95. Which humanoid robot made by Kerala engineering students was recently in the
news?
a) Sophia
b) ASIMO
c) Vihaan
d) Aadya
96. Which Indian university’s aeromodelling club is developing smart drones?
a) IIT Delhi
b) IIT Guwahati
c) NIT Trichy
d) Anna University
97. Which Indian startup launched the “Elevate V1” series drone?
a) InsideFPV
b) DRDO
c) Skyroot
d) AeronX
98. The “Coro-bot” was developed during the COVID-19 pandemic for what purpose?
a) Delivering food in isolation wards
b) Disinfecting large areas
c) Diagnosing diseases
d) Robotic surgeries
99. Which government initiative supports deep-tech startups, including robotics?
a) Atal Tinkering Labs
b) Digital India Innovation Fund
c) Make in India 2.0
d) Startup India Robotics
100. What is the purpose of Captain Arjun, a robot launched by the Indian Railways?
a) Surveillance at railway stations
b) Ticket vending
© Civil Services Club Bhopal-7747068666 Page 40
c) Luggage handling
d) Cleaning railway tracks
Test-4
E-Commerce and E Governance
Name……………………………… ID………………… Marks………./100
1. What is the primary objective of e-Governance?
a) Increased taxation
b) Transparent and efficient public service delivery
c) Improved entertainment options
d) Privatization of government agencies
2. Which is the first country to implement a fully digital voting system under e-
Governance?
a) Estonia
b) Finland
c) Japan
d) USA
3. In India, which policy laid the foundation for e-Governance?
a) Digital India Campaign
b) National e-Governance Plan (NeGP), 2006
c) Make in India
d) BharatNet Project
4. Which of the following is NOT a component of e-Governance?
a) e-Administration
b) e-Services
c) e-Commerce
d) e-Governance policies
5. What is the name of India’s largest rural broadband connectivity initiative?
a) Digital Villages Program
b) BharatNet
c) National Fibre Mission
d) eGramSwaraj
6. Which state in India was the first to adopt e-Governance extensively?
a) Kerala
b) Karnataka
c) Andhra Pradesh
d) Gujarat
© Civil Services Club Bhopal-7747068666 Page 41
7. What does "m-Governance" refer to?
a) Governance through manual records
b) Governance using mobile devices
c) Micro-level governance policies
d) Migration governance
8. What is the role of the e-Sign service in e-Governance?
a) Securing internet connections
b) Providing digital authentication for documents
c) Managing government portals
d) Tracking cybercrimes
9. Which e-Governance initiative focuses on digitizing education in India?
a) Diksha
b) SWAYAM
c) e-Paathshala
d) All of the above
10. Which technology is key to securing e-Governance platforms?
a) Cloud computing
b) Blockchain
c) Big Data
d) Virtual Reality
11. What is the main purpose of UMANG (Unified Mobile Application for New-age
Governance)?
a) Single-point access to multiple government services
b) Mobile gaming
c) Weather updates
d) Virtual reality experiences
12. Which of the following represents Government-to-Citizen (G2C) e-Governance?
a) Tax filings by businesses
b) Online grievance redressal portals for citizens
c) Coordination between government departments
d) Sharing data among government agencies
13. Which type of e-Governance is primarily used for internal government operations?
a) G2B
b) G2G
c) G2E
d) G2C
14. Which type of e-Governance improves trade and commerce?
a) G2E
b) G2G
c) G2B
© Civil Services Club Bhopal-7747068666 Page 42
d) G2C
15. What type of e-Governance is a government-to-government taxation data-sharing
initiative?
a) G2C
b) G2B
c) G2G
d) G2E
16. Which type of e-Governance does the online filing of income tax fall under?
a) G2C
b) G2B
c) G2G
d) G2E
17. What type of e-Governance enables citizens to register complaints online?
a) G2B
b) G2C
c) G2G
d) G2E
18. Which Indian program exemplifies G2B e-Governance?
a) GST Portal
b) Digital Locker
c) Swachh Bharat Mission
d) UMANG App
19. What is a distinguishing feature of G2B e-Governance?
a) Transparency in trade procedures
b) Direct public access to government
c) Employee attendance management
d) Intergovernmental collaboration
20. Which type of e-Governance ensures better service delivery through mobile
platforms?
a) m-Governance
b) G2C
c) G2E
d) G2G
21. Which component of e-Governance focuses on delivering services through integrated
platforms?
a) Connectivity
b) Process re-engineering
c) Transparency
© Civil Services Club Bhopal-7747068666 Page 43
d) IT infrastructure
22. Which component is associated with the seamless interaction between various
government entities?
a) G2C
b) Interoperability
c) Transparency
d) Citizen feedback
23. What is a "payment aggregator"?
a) A bank
b) A service bundling multiple payment options
c) A customer support platform
d) A financial regulator
24. Which Indian payment gateway offers BharatQR as a service?
a) Instamojo
b) Razorpay
c) Paytm
d) NPCI
25. Which law regulates online payment systems in India?
a) IT Act, 2000
b) Consumer Protection Act, 2019
c) Payment and Settlement Systems Act, 2007
d) Digital Payments Act, 2015
26. What does "two-factor authentication" in online payments involve?
a) Card and PIN entry
b) OTP and password
c) Both a and b
d) Fingerprint only
27. Which payment gateway first introduced the "Buy Now, Pay Later" feature in India?
a) PayU
b) Razorpay
c) Simpl
d) Paytm
28. Which of the following is an example of digital wallets?
a) Paytm
b) Apple Pay
c) Google Wallet
d) All of the above
29. Which is a peer-to-peer payment system?
© Civil Services Club Bhopal-7747068666 Page 44
a) Paytm Wallet
b) PhonePe
c) UPI
d) All of the above
30. Which method facilitates transactions through QR codes?
a) Credit card
b) UPI
c) Cryptocurrency
d) Net banking
31. What is BNPL in e-commerce payments?
a) Buy Now, Pay Later
b) Blockchain Network Payment Link
c) Banking Network Payment Line
d) Balance Now, Pay Later
32. Which payment method uses NFC technology?
a) Digital wallet
b) Cryptocurrency
c) Contactless credit cards
d) Both a and c
33. Which NeGP initiative aims to provide education, healthcare, and employment-
related services through a digital platform?
a) e-District
b) State e-Governance Service Delivery Gateway
c) National Knowledge Network
d) National e-Governance Infrastructure
34. Which technology platform is designed under NeGP to improve government
efficiency by enabling data sharing and integration?
a) e-Governance Infrastructure
b) National Knowledge Network
c) Digital Locker
d) Digital India Platform
35. Which of the following is an example of a service offered through the e-District
project under NeGP?
a) Online land records
b) Job training programs
c) Digital payments for government services
d) E-filing of taxes
36. Which of the following apps is designed to help citizens in India to find and track the
status of their driving license, vehicle registration, and other transport-related services?
© Civil Services Club Bhopal-7747068666 Page 45
a) DigiLocker
b) m-Parivahan
c) e-Sign
d) MyGov
37.. Which mobile app launched by the Ministry of Health and Family Welfare helps
users in India book appointments with doctors and access health services online?
a) Aarogya Setu
b) Swasthya Kendra
c) e-Swasthya
d) Health India
38. Which portal was launched to streamline the online application and delivery of
public services to citizens in India?
a) e-District Portal
b) ServicePlus
c) National Knowledge Network
d) Digital India Portal
39. Which government app was launched to enhance financial inclusion in India by
providing financial services to underserved sections of society?
a) DigiLocker
b) PMGDISHA
c) e-RUPI
d) Jan Dhan
40. Which mobile application launched by the Ministry of Agriculture and Farmers'
Welfare aims to provide farmers with information on weather conditions, crop
protection, and market prices?
a) Kisan RATH
b) Kisan App
c) mKisan
d) PM Kisan
41. Which initiative was launched to facilitate the digital registration of laborers and
workers in India’s unorganized sector?
a) PMGDISHA
b) e-Shram Portal
c) National Skill Development Portal
d) Skill India
.
42. What is the purpose of the 'SWECHHA' portal launched by the Government of India?
a) To track the online education status
b) To support the Clean India Mission
c) To offer citizen grievances resolution
d) To enable environmental monitoring
© Civil Services Club Bhopal-7747068666 Page 46
43. Which of the following portals was designed to enable digital tracking of criminal
activities and provide access to police records in India?
a) CCTNS Portal
b) e-Courts
c) Crime Tracker
d) National Judicial Portal
44. Which app launched by the Ministry of Women and Child Development helps women
in distress by connecting them with services such as legal help and counseling?
a) Beti Bachao Beti Padhao
b) Mahila Shakti Kendra
c) One Stop Center
d) Nirbhaya Fund
45. Which mobile application was launched by the Ministry of Tourism to promote
tourism in India by providing detailed information about tourist destinations, events,
and services?
a) Incredible India
b) Visit India
c) Explore India
d) India Tourism App
46.. Which of the following initiatives launched by the Government of India is designed
to offer a unified platform for submitting and tracking grievances?
a) MyGov
b) e-District
c) CPGRAMS
d) e-Kranti
47. What is the full form of RTGS, commonly used in business payments?
a) Real-Time Gross Settlement
b) Rapid Transaction Gateway System
c) Real-Time General Settlement
d) Regular Transaction Gateway Service
48. Which component ensures ease of access to services for citizens in remote areas?
a) IT infrastructure
b) Connectivity
c) Service delivery channels
d) Cybersecurity
49. What does 'Capacity building' in e-Governance focus on?
a) Training and skill development for stakeholders
b) Constructing physical government offices
c) Increasing taxation rates
d) Providing online entertainment
© Civil Services Club Bhopal-7747068666 Page 47
50. Which Indian state was the first to implement e-Governance initiatives at a statewide
level?
a) Kerala
b) Andhra Pradesh
c) Karnataka
d) Maharashtra
51. Which of the following is NOT a component of the National e-Governance Plan
(NeGP)?
a) e-District
b) e-Courts
c) e-Panchayat
d) Smart Cities Mission
52. Which year was the National e-Governance Plan (NeGP) launched?
a) 2005
b) 2007
c) 2010
d) 2012
53. What is the main purpose of the Common Services Centers (CSCs) under NeGP?
a) To provide free Wi-Fi in rural areas
b) To provide government services in electronic form at the village level
c) To train government officials in IT skills
d) To facilitate e-commerce transactions
54. Under NeGP, which department is responsible for ensuring the delivery of
government services electronically?
a) Ministry of Finance
b) Ministry of Rural Development
c) Department of Electronics and Information Technology (DeitY)
d) Ministry of Home Affairs
55. Which Indian government e-commerce initiative promotes the sale of products made
by artisans and craftsmen?
a) Flipkart
b) GeM (Government e-Marketplace)
c) Amazon Karigar
d) Snapdeal
56. What is the cap on Foreign Direct Investment (FDI) in inventory-based e-commerce
in India?
a) 0%
b) 26%
c) 49%
d) 100%
© Civil Services Club Bhopal-7747068666 Page 48
57. Which Indian ministry oversees e-commerce regulations?
a) Ministry of Corporate Affairs
b) Ministry of Electronics and Information Technology (MeitY)
c) Ministry of Commerce and Industry
d) Ministry of Finance
58. What is the maximum penalty for violation of the Consumer Protection (E-
Commerce) Rules, 2020?
a) ₹1 lakh
b) ₹5 lakh
c) ₹10 lakh
d) ₹50 lakh
59. Which initiative supports e-commerce for MSMEs in India?
a) BharatNet
b) Udyam Registration
c) Trade Receivables Discounting System (TReDS)
d) GeM (Government e-Marketplace)
60. What does the Press Note 2 (2018) address in the context of e-commerce?
a) Guidelines for offline retailers
b) Rules for FDI in e-commerce
c) Consumer complaint resolution timelines
d) Data protection in e-commerce
61. Which platform was launched to empower Indian artisans through e-commerce?
a) Flipkart Samarth
b) Amazon Karigar
c) GeM
d) Startup India Hub
62. Which Indian law protects intellectual property rights in the digital domain for e-
commerce?
a) Copyright Act, 1957
b) Trademarks Act, 1999
c) Patent Act, 1970
d) All of the above
63. What is the purpose of the "ONDC" project launched by the Indian government?
a) To regulate e-commerce prices
b) To create a unified e-commerce platform
c) To ensure fair competition in e-commerce
d) To boost offline retail
64. Which Indian government policy encourages cashless transactions for e-commerce?
© Civil Services Club Bhopal-7747068666 Page 49
a) Pradhan Mantri Jan Dhan Yojana
b) Digital India
c) UPI Guidelines
d) AatmaNirbhar Bharat
65.. Which of the following is a popular payment gateway in India?
a) Razorpay
b) Stripe
c) PayPal
d) All of the above
66. Which protocol ensures secure online payment transactions?
a) FTP
b) HTTPS
c) HTTP
d) SMTP
67. Which initiative, launched by the Ministry of Electronics and Information
Technology, is aimed at providing digital literacy to rural citizens in India?
a) e-District
b) Digital India
c) PMGDISHA
d) SWAYAM
68. Which one of the following is not a type of e-commerce?
a) Business-to-Business (B2B)
b) Consumer-to-Business (C2B)
c) Government-to-Citizen (G2C)
d) Mobile-to-Mobile (M2M)
69. Which type of e-commerce involves individuals selling goods or services to other
individuals?
a) B2B
b) B2C
c) C2C
d) C2B
70. Which of the following best defines the term 'digital marketplace'?
a) A place where businesses and consumers meet to trade goods and services
b) A physical market where products are sold online
c) A government-regulated platform for electronic payments
d) A place for conducting online meetings
71. What is the purpose of an e-commerce shopping cart?
© Civil Services Club Bhopal-7747068666 Page 50
a) To manage inventory for businesses
b) To store items a customer intends to purchase
c) To display advertisements to consumers
d) To calculate shipping charges
72. Which of the following is a popular example of a Business-to-Consumer (B2C) e-
commerce platform?
a) Alibaba
b) LinkedIn
c) Flipkart
d) Etsy
73. Which of the following is an essential element of an effective e-commerce website?
a) Large physical storefronts
b) Secure payment processing
c) Limited product variety
d) High-volume customer support
74. Which business model refers to e-commerce activities where a consumer sells
products to a business?
a) B2C
b) C2B
c) B2B
d) C2C
75. Which model does platforms like Kickstarter represent?
a) B2C
b) G2C
c) C2C
d) C2B
76. In which type of e-commerce does Alibaba primarily operate?
a) C2C
b) B2C
c) B2B
d) G2C
77. Which e-commerce platform is often referred to as "India’s Alibaba"?
a) Flipkart
b) IndiaMART
c) Snapdeal
d) ShopClues
78. Which e-commerce giant acquired Flipkart in 2018?
a) Amazon
b) Walmart
© Civil Services Club Bhopal-7747068666 Page 51
c) Alibaba
d) eBay
79. Which e-commerce platform was started by IIT graduates Sachin Bansal and Binny
Bansal?
a) Snapdeal
b) Flipkart
c) Paytm Mall
d) Amazon India
80. Which platform focuses on consumer-to-consumer (C2C) sales, primarily for used
goods?
a) OLX
b) Snapdeal
c) Flipkart
d) Paytm Mall
81. Which Indian e-commerce platform primarily targets small and medium-sized
businesses (SMBs)?
a) IndiaMART
b) Flipkart
c) Paytm Mall
d) Snapdeal
82. What is a key benefit of 'Process re-engineering' in e-Governance?
a) Simplifies citizen engagement
b) Maintains outdated workflows
c) Promotes manual record-keeping
d) Reduces service delivery speed
83. What is the primary goal of 'Service delivery channels' in e-Governance?
a) Increase manual application processes
b) Provide services through multiple platforms (e.g., mobile, web)
c) Eliminate digital systems
d) Restrict service access to urban areas
84. Which was the first initiative of e-Governance in India?
a) National e-Governance Plan (NeGP)
b) NICNET
c) Aadhaar
d) Digital India Mission
85. What is the significance of the MCA21 initiative?
a) Financial inclusion
b) E-filing of corporate records
c) Rural education
© Civil Services Club Bhopal-7747068666 Page 52
d) Health service digitization
86. When was the Digital India campaign launched?
a) 2006
b) 2015
c) 2020
d) 1999
87. What is the objective of the UMANG app?
a) To promote e-commerce
b) To provide unified access to government services
c) To connect rural businesses
d) To facilitate GST compliance
88. Which mission integrates e-Governance with municipal services?
a) Smart Cities Mission
b) e-Municipality
c) NeGP
d) Digital Villages Mission
89. Which of the following is NOT a core component of the Digital India Mission?
a) Digital Infrastructure as a Utility to Every Citizen
b) Digital Literacy
c) E-Governance for Tax Collection
d) Secure Cyber Ecosystem
90. Which initiative was launched to enhance digital payment systems across India?
a) PMGDISHA
b) Digital India
c) JAM Trinity
d) Bharat Interface for Money (BHIM)
91. Which service under e-Governance helps citizens avail government services like
birth certificates, land records, and ration cards online?
a) e-District
b) e-Courts
c) BharatNet
d) National Knowledge Network (NKN)
92. Which project was initiated to make all public sector services available
electronically in India?
a) NICNET
b) NeGP
c) e-District
d) BharatNet
© Civil Services Club Bhopal-7747068666 Page 53
93. Which government initiative seeks to deliver government services to rural areas
through an online platform?
a) Digital India
b) e-Panchayat
c) Smart Cities Mission
d) Swachh Bharat Mission
94. What is the purpose of the PMGDISHA scheme?
a) To digitize government offices
b) To provide digital literacy to rural populations
c) To promote digital wallets
d) To train professionals in IT sector jobs
95 Which project is aimed at ensuring that broadband internet reaches every village in
India?
a) BharatNet
b) e-Kranti
c) Digital India
d) National Optical Fiber Network
96. Which e-Governance project connects various government departments, enhancing
transparency in the delivery of public services?
a) PRAGATI
b) NeGP
c) NICNET
d) e-District
97. Which initiative allows citizens to track the status of their grievance with
government departments?
a) e-District
b) e-Panchayat
c) CPGRAMS
d) DigiLocker
98. Which e-commerce platform recently launched a "Local Sellers Program" to promote
small-scale entrepreneurs?
a) Amazon India
b) Flipkart
c) Meesho
d) Snapdeal
99. Which platform introduced "Shopsy," a low-cost social commerce initiative in India?
a) Myntra
b) Flipkart
c) Nykaa
d) Amazon
© Civil Services Club Bhopal-7747068666 Page 54
100. Which technology trend is shaping e-commerce in 2024 with personalized
customer experiences?
a) Blockchain
b) Headless Commerce
c) 5G Integration
d) IoT
Test-5
Internet and Social media
1. In which year was the first website launched?
A) 1989
B) 1990
C) 1991
D) 1992
2. Which search engine was launched in 1998 and revolutionized Internet search?
A) Yahoo
B) AltaVista
C) Google
D) Bing
3. Which major Internet milestone occurred in 1995?
A) Launch of YouTube
B) Public commercialization of the Internet
C) Development of IPv6
D) Creation of ICANN
4. Which type of Internet allows limited access to selected users, usually from outside an
organization?
A) Internet
B) Extranet
C) Intranet
D) World Wide Web
5.Which Internet term refers to the amount of data that can be transmitted in a given
time?
A) Bandwidth
B) Latency
C) Ping
D) Throughput
6. What does "VPN" stand for?
A) Virtual Private Network
B) Virtual Proxy Node
C) Verified Proxy Network
D) Virtual Public Node
© Civil Services Club Bhopal-7747068666 Page 55
7. Which protocol is used to transfer files over the Internet?
A) FTP
B) HTTP
C) IMAP
D) SMTP
8. What does "ISP" refer to in Internet terminology?
A) Internet Speed Provider
B) Internet Service Provider
C) Internal Signal Processor
D) International Service Protocol
9. What is "cache" in the context of web browsing?
A) A method of encrypting data
B) A temporary storage for frequently accessed data
C) A measure of network performance
D) A protocol for data transfer
10. What is the role of "cookies" in web browsing?
A) Encrypt user data
B) Track user activity and preferences
C) Improve bandwidth
D) Resolve domain names
11. What does "VoIP" stand for?
A) Voice over Internet Protocol
B) Virtual Online Interaction Protocol
C) Voice over Instant Packet
D) Verified Online IP
12. Which term refers to unsolicited email messages?
A) Spam
B) Malware
C) Phishing
D) Worm
13. What does "ICANN" stand for?
A) Internet Corporation for Assignment of Network Nodes
B) Internet Corporation for Assigned Names and Numbers
C) International Council for Assigned Network Names
D) Internet Control Authority for Names and Numbers
14. What is the full form of "IPSec"?
A) Internet Protocol Secure
B) Internet Privacy Security
C) Internet Protocol Security
D) International Privacy Security
© Civil Services Club Bhopal-7747068666 Page 56
15. What does "ARPANET" stand for?
A) Advanced Research Projects Agency Network
B) Advanced Routing and Protocols Agency Network
C) American Research and Protocol Association Network
D) Automated Routing and Project Assignment Network
16. Expand "TLS" in Internet security.
A) Transport Layer Security
B) Transmission Line System
C) Transfer Level System
D) Traffic Layer Security
17. What is the full form of "DHCP"?
A) Data Handling Communication Protocol
B) Dynamic Host Configuration Protocol
C) Domain Host Configuration Protocol
D) Direct Host Communication Protocol
18. What does "POP" stand for in email communication?
A) Protocol for Online Processing
B) Post Office Protocol
C) Packet Optimization Protocol
D) Port Oriented Processing
19. What does "TLD" stand for in the context of domain names?
A) Top-Level Domain
B) Translated Layer Domain
C) Tree Level Directory
D) Terminal Level Domain
20. What does "Wi-Fi" stand for?
A) Wireless Fidelity
B) Wide Frequency
C) Wired Fidelity
D) Wireless Frequency
21. Which type of Internet refers to websites and content that is hidden and not
accessible through traditional browsers?
A) Surface Web
B) Deep Web
C) Dark Web
D) Extranet
22. The term "Internet of Things" (IoT) refers to:
A) A system where devices communicate with each other over the Internet
B) A web-based e-commerce platform
© Civil Services Club Bhopal-7747068666 Page 57
C) The set of technologies that power the Deep Web
D) A type of public network for educational purposes
23. Which of the following is NOT considered part of the Deep Web?
A) Password-protected websites
B) Subscription-based academic databases
C) Websites indexed by search engines
D) Online banking sites
24. Which of these best describes "Web 3.0"?
A) A decentralized, AI-driven internet focused on privacy
B) A traditional, static webpage system
C) The first generation of Internet technology
D) A peer-to-peer network for file sharing
25. A key difference between the Surface Web and the Deep Web is:
A) The Surface Web is encrypted, while the Deep Web is not
B) The Surface Web is indexed by search engines, while the Deep Web is not
C) The Deep Web is faster and more accessible
D) The Surface Web contains more secure data than the Deep Web
26. The use of Tor (The Onion Router) is associated with which type of Internet?
A) Dark Web
B) Surface Web
C) Extranet
D) Intranet
27. Who is credited with conceptualizing the idea of the World Wide Web?
A) Tim Berners-Lee
B) Vint Cerf
C) Robert Kahn
D) Larry Roberts
28. ARPANET, the precursor to the modern Internet, was established in which year?
A) 1965
B) 1969
C) 1971
D) 1973
29. Which organization governs the allocation of domain names?
A) ARPA
B) ICANN
C) IETF
D) W3C
30. Which technology led to the widespread use of e-commerce?
© Civil Services Club Bhopal-7747068666 Page 58
A) HTTP
B) SSL/TLS encryption
C) HTML
D) TCP/IP
31. Which event marked the transition to "Web 2.0"?
A) Launch of Google
B) Introduction of social networking sites
C) Development of HTML
D) Adoption of cloud computing
32. Which government initiative funded the creation of ARPANET?
A) NASA
B) DARPA
C) NSF
D) NIST
33. Which protocol is designed for remote login to a server over a network?
A) Telnet
B) HTTP
C) SMTP
D) FTP
34. Which protocol is used for encrypting and securing communication over a network?
A) FTP
B) HTTPS
C) HTTP
D) SMTP
35. Which system translates a domain name into an IP address?
A) HTTP
B) DNS
C) FTP
D) SMTP
36. Which protocol is used for sending email from an email client to an email server?
A) IMAP
B) POP3
C) SMTP
D) FTP
37. Which system is used to assign unique identifiers to devices in a network and allows
them to communicate?
A) MAC
B) IP address
© Civil Services Club Bhopal-7747068666 Page 59
C) DNS
D) FTP
38. Which system uses public and private key encryption to secure data on the internet?
A) SSL/TLS
B) DNS
C) FTP
D) HTTP
39. Which system is responsible for managing the allocation of IP addresses in a
network?
A) DHCP
B) DNS
C) SMTP
D) FTP
40. Which protocol is used for secure communication between a user’s browser and a
website?
A) HTTP
B) HTTPS
C) FTP
D) SMTP
41. Which protocol is used to check if a host is reachable on a network?
A) TCP
B) UDP
C) ICMP
D) SMTP
42. What does the DNS protocol translate?
A) IP addresses to MAC addresses
B) Website names to IP addresses
C) Email addresses to server locations
D) Server URLs to HTML pages
43. Which of the following systems is responsible for the secure transfer of files between
two computers over a network?
A) HTTP
B) FTP
C) SMTP
D) Telnet
44. Which was the first search engine ever created?
A) Yahoo
B) Google
C) Archie
© Civil Services Club Bhopal-7747068666 Page 60
D) AltaVista
45.Which algorithm was a key innovation in Google's success?
A) Hummingbird
B) PageRank
C) Penguin
D)BackRub
46. Which search engine is known for prioritizing user privacy by not tracking searches?
A) Google
B) Yahoo
C) DuckDuckGo
D) Baidu
47. What is the main source of revenue for search engines?
A) Subscription fees
B) Sponsored content
C) Search Engine Marketing (SEM)
D) Selling user data
48. What does SEO stand for in relation to search engines?
A) Search Engine Optimization
B) Secure Engine Operation
C) Systematic Engine Output
D) Search Engine Order
49.What innovation allows search engines to understand user intent beyond keywords?
A) Semantic Search
B) Keyword Density
C) Backlink Analysis
D) AdWords Integration
50. Which of these is NOT a function of search engine crawlers?
A) Indexing pages
B) Ranking websites
C) Collecting metadata
D) Identifying broken links
51. What is the maximum file size limit for email attachments in most email services?
A) 5 MB
B) 25 MB
C) 50 MB
D) 100 MB
52. Which email component allows grouping multiple related emails together?
A) Folder
© Civil Services Club Bhopal-7747068666 Page 61
B) Thread
C) Archive
D) CC
53. What does the acronym SaaS stand for in cloud computing?
A) System as a Service
B) Software as a Service
C) Storage as a Service
D) Solution as a Service
54. Which cloud model combines private and public cloud services?
A) Public cloud
B) Private cloud
C) Hybrid cloud
D) Community cloud
55. What type of cloud service is Google Drive categorized under?
A) IaaS
B) PaaS
C) SaaS
D) DaaS
56. Which service model is suitable for developers who need tools and platforms to
build applications?
A) SaaS
B) IaaS
C) PaaS
D) DaaS
57. What is the main function of Infrastructure as a Service (IaaS)?
A) Application hosting
B) Providing virtualized computing resources
C) Delivering software applications
D) Data analytics
58. Which of the following is an example of a private cloud?
A) AWS (Amazon Web Services)
B) Azure Government Cloud
C) Google Drive
D) Dropbox
59. What is the process of moving data from one cloud service to another called?
A) Cloud migration
B) Cloud replication
C) Cloud transfer
D) Cloud cloning
© Civil Services Club Bhopal-7747068666 Page 62
60. Which of these is an open-source cloud computing platform?
A) Microsoft Azure
B) OpenStack
C) Oracle Cloud
D) AWS
61. What is "Cloud Bursting" in cloud computing?
A) Scaling to a public cloud during peak demand
B) A cloud failure scenario
C) Shutting down unused cloud resources
D) Rapid data transfer between clouds
62. What technology does edge computing commonly integrate with?
A) Quantum computing
B) Internet of Things (IoT)
C) Mainframe computers
D) Supercomputers
63. What is a "grid" in grid computing?
A) A single powerful computer
B) A network of geographically distributed resources
C) A specific type of cloud service
D) A centralized database
64. What is a common application of edge computing in smart cities?
A) Centralized weather prediction
B) Real-time traffic management
C) Batch processing of historical data
D) Remote education services
65. What type of networks does grid computing often rely on?
A) Peer-to-peer networks
B) Local Area Networks (LAN)
C) Wide Area Networks (WAN)
D) Satellite networks
66. Which of these is NOT an edge computing device?
A) IoT-enabled smart thermostat
B) Centralized cloud server
C) Autonomous vehicle sensor
D) Network gateway
67. What is a packet in the context of the internet?
A) A type of encryption
B) A unit of data transmitted across a network
C) A DNS query
© Civil Services Club Bhopal-7747068666 Page 63
D) A virus signature
68. What does the term "latency" refer to in internet performance?
A) Speed of data download
B) Delay in data transmission
C) Bandwidth capacity
D) Network encryption strength
69. Which layer of the OSI model is responsible for ensuring end-to-end delivery of data?
A) Physical layer
B) Transport layer
C) Application layer
D) Data link layer
70. What does "bandwidth" measure in internet services?
A) Data encryption level
B) Data transfer rate over a network
C) Number of devices on a network
D) Network latency
71. Which platform is primarily used for professional networking and career
development?
A) Reddit
B) LinkedIn
C) Snapchat
D) TikTok
72. Which platform introduced the "Hashtag" feature first?
A) Facebook
B) Twitter
C) Instagram
D) LinkedIn
73.Which platform's logo is a ghost?
A) Snapchat
B) Instagram
C) Facebook
D) Reddit
74. Which platform was acquired by Facebook in 2012 for $1 billion?
A) WhatsApp
B) Instagram
C) Oculus
D) Messenger
75.Which platform is popular for creating and sharing memes and animated GIFs?
A)Giphy
© Civil Services Club Bhopal-7747068666 Page 64
B) Reddit
C) Facebook
D) YouTube
76. Which app is focused on real-time voice and text chat for gamers?
A) Discord
B) Twitch
C) WhatsApp
D) Instagram
77. Which Indian government portal serves as a one-stop platform for citizen-centric
services?
A) MyGov
B) UMANG
C) e-SamikSha
D)DigiLocker
78. Which government portal is primarily aimed at enhancing transparency in the
allocation of coal blocks?
A) CoalNet
B) e-Auctions
C) MSTC
D) e-Khanij
79. What is the primary function of the "SWAYAM" platform?
A) Online shopping
B) Digital education
C) Agricultural assistance
D) Citizen grievances
80. Which was the first widely used web browser?
A) Internet Explorer
B) Mosaic
C) Netscape Navigator
D) Opera
81. Which of the following is NOT a web browser?
A) Firefox
B) Safari
C) Outlook
D) Edge
82. What is the default web browser on macOS devices?
A) Chrome
B) Safari
C) Edge
© Civil Services Club Bhopal-7747068666 Page 65
D) Firefox
83. Which of the following is an open-source web browser?
A) Internet Explorer
B) Safari
C) Firefox
D) Edge
84. Which browser uses the Blink rendering engine?
A) Firefox
B) Chrome
C) Safari
D) Internet Explorer
85. Which browser was discontinued by Microsoft in 2022?
A) Edge
B) Internet Explorer
C) Chrome
D) Netscape
86. Which feature in web browsers helps in syncing bookmarks, history, and passwords
across devices?
A) Extensions
B) Cloud Storage
C) Browser Sync
D) Cookies
87. What does the “BCC” field in an email stand for?
A) Blind Courtesy Copy
B) Blind Carbon Copy
C) Backup Courtesy Copy
D) Blind Copy Communication
88. Which protocol is responsible for sending emails from a client to a server?
A) SMTP
B) POP3
C) IMAP
D) DNS
89. Which part of an email ensures the sender’s identity is authentic?
A) Subject
B) Signature
C) Digital Certificate
D) Body
90. Which portal is used for online registration of intellectual property rights in India?
© Civil Services Club Bhopal-7747068666 Page 66
A) IP India
B)PatentNet
C) TM India
D) Copyright Portal
91. Which portal was launched to enhance the skill development ecosystem in India?
A) Skill India
B) e-Kaushal
C) ASEEM
D) Bharat Skills
92. Which portal is dedicated to India's digital land records modernization?
A) e-Bhoomi
B)Bhulekh
C) Digital Land Records India
D) Land Record e-Seva
93. Which Indian government portal provides access to agriculture-related services and
schemes?
A) e-Krishi
B) Kisan Rath
C) PM Kisan Portal
D) e-NAM
94. Which device acts as a gateway between a local network and the Internet?
A) Router
B) Switch
C) Hub
D) Repeater
95. Which type of network card is commonly used to connect a computer to a wired
Internet network?
A) Wireless NIC
B) Ethernet NIC
C) Fiber NIC
D) Token Ring NIC
96. Which of the following is NOT a type of modem?
A) DSL Modem
B) Cable Modem
C) Satellite Modem
D) Switch Modem
97. Which hardware helps to amplify and retransmit network signals in long-distance
Internet connections?
A) Router
B) Repeater
C) Hub
© Civil Services Club Bhopal-7747068666 Page 67
D) Gateway
98. Which hardware device converts fiber optic signals to Ethernet for Internet
connectivity?
A) Media Converter
B) Ethernet Bridge
C) Fiber Repeater
D) Access Point
99. Which Internet hardware device is essential for connecting multiple networks?
A) Switch
B) Hub
C) Gateway
D) Bridge
100. What is the primary medium for data transmission in Li-Fi technology?
A) Radio waves
B) Visible light
C) Infrared waves
D) Microwave signals
Test-6 ELECTRONICS
1. Who is considered the father of modern electronics?
a. Thomas Edison
b. Nikola Tesla
c. John Bardeen
d. Michael Faraday
2. What was the first widely used vacuum tube in electronics?
a. Cathode-ray tube
b. Diode tube
c. Triode tube
d. Magnetron.
3. When was the first transistor invented?
a. 1937
b. 1947
c. 1957
d. 1967
4. Which invention marked the transition from vacuum tubes to solid-state
electronics?
a. Microprocessor
b. Semiconductor diode
c. Transistor
d. Integrated Circuit
5. The first integrated circuit (IC) was developed in which year?
a. 1958
b. 1962
c. 1965
© Civil Services Club Bhopal-7747068666 Page 68
d. 1970
6. What was the primary application of the first electronic computers?
a. Military calculations
b. Data processing for businesses
c. Weather prediction
d. Image processing
7. Which company introduced the first commercially available microprocessor?
a. IBM
b. Intel
c. Texas Instruments
d. Motorola
8. The photoelectric effect, which is fundamental to semiconductors, was explained
by whom?
a. Albert Einstein
b. Max Planck
c. Heinrich Hertz
d. Erwin Schrödinger
9. Which process is crucial for creating semiconductor components?
a. Electrolysis
b. Doping
c. Catalysis
d. Smelting
10. What was the purpose of the first semiconductor diode?
a. Amplification
b. Switching
c. Rectification
d. Signal processing
11. What are intrinsic semiconductors made of?
a. Pure silicon or germanium without any impurities
b. Compounds like gallium arsenide
c. Heavily doped materials
d. Insulators
12. Which of the following is an example of a compound semiconductor?
a. Silicon
b. Germanium
c. Gallium arsenide
d. Aluminum
13. What type of impurity is added to create an N-type semiconductor?
a. Trivalent
b. Pentavalent
c. Tetravalent
d. None of the above
14. Which charge carriers dominate in N-type semiconductors?
a. Electrons
b. Holes
© Civil Services Club Bhopal-7747068666 Page 69
c. Neutrons
d. Ions
15. What happens when phosphorus is added to silicon?
a. Holes increase
b. Electrons increase
c. Conductivity decreases
d. Material becomes P-type
16. Which element is commonly used as a dopant for creating N-type silicon?
a. Boron
b. Gallium
c. Phosphorus
d. Aluminum
17. In an N-type semiconductor, majority carriers move towards the:
a. Positive terminal
b. Negative terminal
c. Neutral point
d. None of the above
18. Which diode is specifically designed to allow current to flow in reverse under a
certain voltage?
a. LED
b. Zener Diode
c. Schottky Diode
d. Tunnel Diode
19. What type of diode emits light when a current passes through it?
a. Schottky Diode
b. Photodiode
c. Light Emitting Diode (LED)
d. Zener Diode
20. What is the primary use of a photodiode?
a. Voltage regulation
b. Detecting light
c. Generating light
d. Amplifying signals
21. What type of diode combines a semiconductor and a metal junction?
a. Zener Diode
b. Tunnel Diode
c. Schottky Diode
d. Photodiode
22. What is the function of a rectifier diode?
a. Emit light
b. Regulate voltage
c. Convert AC to DC
d. Detect light
23. Which diode has the ability to handle large current surges?
a. Schottky Diode
© Civil Services Club Bhopal-7747068666 Page 70
b. Avalanche Diode
c. Zener Diode
d. Rectifier Diode
24. Which diode is commonly used in infrared remote controls?
a. LED
b. Infrared Emitting Diode (IRED)
c. Zener Diode
d. Tunnel Diode
25. Which diode is used as a high-speed switch in digital circuits?
a. Tunnel Diode
b. Schottky Diode
c. Varactor Diode
d. Zener Diode
26. Which phenomenon explains the expulsion of magnetic fields from a
superconductor?
a. Hall Effect
b. Meissner Effect
c. Josephson Effect
d. Quantum Tunneling
27. Who discovered superconductivity and in which year?
a. Heike Kamerlingh Onnes, 1911
b. James Clerk Maxwell, 1873
c. Michael Faraday, 1831
d. Albert Einstein, 1920
28. What is the primary challenge of using superconductors in everyday technology?
a. High resistance at room temperature
b. Requirement for extremely low temperatures
c. Incompatibility with electric circuits
d. Difficulty in producing magnetic fields
29. Which superconducting property is utilized in Magnetic Resonance Imaging
(MRI)?
a. Zero resistance
b. Meissner Effect
c. High current-carrying capacity
d. Magnetic field stability
30. Which type of extrinsic semiconductor is created by adding pentavalent
impurities?
a. P-type
b. N-type
c. Compound
d. Intrinsic
31. What does a P-type semiconductor primarily use as charge carriers?
a. Electrons
b. Holes
c. Neutrons
© Civil Services Club Bhopal-7747068666 Page 71
d. Ions
32. What type of semiconductor is primarily used in solar cells?
a. Amorphous silicon
b. Germanium
c. Compound semiconductors
d. P-type only
33. What type of impurity is added to create a P-type semiconductor?
a. Pentavalent
b. Trivalent
c. Tetravalent
d. None of the above.
34. Which of the following materials can act as a dopant for creating a P-type
semiconductor?
a. Phosphorus
b. Boron
c. Antimony
d. Arsenic
35. What is the role of a P-type semiconductor in a PN junction diode?
a. Acts as the source of electrons
b. Acts as the source of holes
c. Provides insulation
d. Reduces current flow
36. What happens to the conductivity of a P-type semiconductor at high
temperatures?
a. Increases
b. Decreases
c. Remains constant
d. Becomes zero
37. Why are P-type semiconductors called "acceptor" materials?
a. They donate electrons
b. They accept electrons into their valence band
c. They neutralize charges
d. They block current
38. Which of these devices primarily uses P-type semiconductors?
a. LED
b. Photodiode
c. Solar cell
d. All of the above
39. What kind of bonding occurs between the trivalent impurity and the host atoms
in P-type semiconductors?
a. Covalent bonding with one electron missing
b. Ionic bonding
c. Metallic bonding
d. Van der Waals forces
40. What happens to a P-type semiconductor when reverse-biased in a PN junction?
© Civil Services Club Bhopal-7747068666 Page 72
a. Conductivity increases
b. The depletion region widens
c. Current flows freely
d. Holes move towards the N-side
41. What is the role of Cooper pairs in superconductivity?
a. Cause magnetic repulsion
b. Facilitate zero resistance
c. Block electron movement
d. Generate thermal resistance
42. Which of these is used in particle accelerators for guiding particles?
a. Superconducting magnets
b. Type I superconductors
c. High-resistance conductors
d. Ceramic insulators
43. What property of superconductors makes them ideal for quantum computing?
a. High critical field
b. Zero resistance
c. Magnetic flux quantization
d. High thermal conductivity
44. What is the output of an AND gate when all inputs are HIGH?
a. LOW
b. HIGH
c. Undefined
d. Depends on the number of inputs
45. Which of the following gates has an output that is LOW only when all inputs are
HIGH?
a. AND
b. NOR
c. XOR
d. NAND
46. Which of the following is India's public service broadcaster?
a. Akashvani
b. AIR
c. Prasar Bharati
d. DD National
47. Which department under the Ministry of Electronics and Information Technology
(MeitY) is responsible for promoting electronic governance?
a. Department of Telecommunications
b. National Informatics Centre (NIC)
c. Department of Electronics Development
d. Digital India Division
48. What is the main focus of the Standardization Testing and Quality Certification
(STQC) Directorate?
a. Export promotion
b. Software testing
© Civil Services Club Bhopal-7747068666 Page 73
c. IT product quality certification
d. Cybersecurity services
49. Which organization develops policies for electronics manufacturing in India?
a. C-DAC
b. NITI Aayog
c. MeitY
d. BEE
50. Which department governs the BharatNet project to provide broadband
connectivity to rural areas?
a. MeitY
b. Department of Telecommunications (DoT)
c. BSNL
d. C-DOT
51. Which government initiative promotes electronics design and manufacturing in
India?
a. Make in India
b. National Policy on Electronics
c. Start-up India
d. Skill India
52. The Semiconductor Laboratory (SCL) is managed by which Indian department?
a. Department of Science and Technology (DST)
b. MeitY
c. Ministry of Defense
d. Indian Space Research Organization (ISRO)
53. Which agency leads the Digital India program?
a. C-DAC
b. NIC
c. MeitY
d. ESC
54. Which department regulates the policies for internet usage in India?
a. TRAI
b. NIC
c. DoT
d. MeitY
55. What does the Cyber Swachhta Kendra focus on?
a. Cyber hygiene awareness
b. Internet speed testing
c. Malware cleaning tools
d. Both A and C
56. Which organization manages the Unique Identification Authority of India
(UIDAI)?
a. Ministry of Home Affairs
b. NITI Aayog
c. MeitY
d. TRAI
© Civil Services Club Bhopal-7747068666 Page 74
57. Which gate's output is the inverse of an OR gate?
a. NOR
b. NAND
c. XOR
d. XNOR
58. Which gate is used to build a flip-flop?
a. AND
b. OR
c. NOR
d. XOR
59. Which type of television uses organic compounds to produce light?
a. LED
b. LCD
c. OLED
d. CRT.
60. Which of the following types of TVs was the first widely available color television?
a. LCD
b. CRT
c. Plasma
d. OLED
61. What feature is a significant advantage of QLED TVs over OLED TVs?
a. Better contrast
b. Higher brightness levels
c. Deeper blacks
d. Organic materials
62. Which television technology is based on liquid crystals?
a. CRT
b. OLED
c. LCD
d. Plasma
63. Which of these TV types is becoming obsolete due to advancements in
technology?
a. QLED
b. OLED
c. Plasma
d. MicroLED
64. Which government initiative aims to promote electronics manufacturing in India?
a. Make in India
b. Start-Up India
c. Digital India
d. Production Linked Incentive (PLI) Scheme
65. Which Indian city is known as the "Electronics City of India"?
a. Pune
b. Bengaluru
c. Hyderabad
© Civil Services Club Bhopal-7747068666 Page 75
d. Chennai
66. Which Indian institute focuses on research and development in microelectronics?
a. IIT Madras
b. Centre for Development of Advanced Computing (C-DAC)
c. Semiconductor Laboratory (SCL)
d. Bhabha Atomic Research Centre (BARC)
67. Which scheme supports the development of semiconductor design startups in
India?
a. Start-Up India
b. Semicon India Program
c. Atmanirbhar Bharat
d. Make in India
68. The National Institute of Electronics and Information Technology (NIELIT)
operates under which ministry?
a. Ministry of Electronics and Information Technology
b. Ministry of Education
c. Ministry of Science and Technology
d. Ministry of Communications
69. Which Indian mission supports the development of supercomputers?
a. Digital India
b. National Supercomputing Mission
c. Atal Innovation Mission
d. BharatNet
70. The "Modified Electronics Manufacturing Clusters (EMC 2.0)" scheme primarily
focuses on:
a. Building electronic retail stores
b. Setting up infrastructure for electronics clusters
c. Exporting consumer electronics
d. Manufacturing wearable devices
71. Which ministry launched the "National Policy on Software Products 2019"?
a. Ministry of Electronics and Information Technology
b. Ministry of Commerce
c. Ministry of Finance
d. Ministry of Education
72. The Centre for Development of Telematics (C-DOT) specializes in:
a. Space research
b. Telecom and internet technology
c. Software development
d. Consumer electronics manufacturing
73. What is the main objective of the National Knowledge Network (NKN)?
a. Establish a nationwide telecom grid
b. Provide high-speed internet to research institutions
c. Develop consumer electronics hubs
d. Manufacture semiconductors
© Civil Services Club Bhopal-7747068666 Page 76
74. Which program focuses on making India a global hub for Electronic System
Design and Manufacturing (ESDM)?
a. Make in India
b. India Semiconductor Mission
c. Atmanirbhar Bharat
d. National Policy on Electronics 2019
75. Which material is most commonly used to manufacture transistors?
a. Copper
b. Silicon
c. Aluminum
d. Iron
76. In a BJT, what are the three terminals called?
a. Source, Drain, Gate
b. Emitter, Base, Collector
c. Anode, Cathode, Gate
d. Positive, Negative, Neutral
77. What determines the conductivity of a transistor?
a. Temperature
b. Magnetic field
c. Doping concentration
d. Physical size
78. What is the main advantage of transistors over vacuum tubes?
a. Higher power consumption
b. Smaller size and greater efficiency
c. Lower reliability
d. More expensive
79. What is the difference between an NPN and a PNP transistor?
a. Material conductivity
b. Polarity of operation
c. Number of terminals
d. Doping process
80. When was All India Radio (AIR) officially established?
a. 1927
b. 1936
c. 1947
d. 1950
81. Which city hosted the first-ever radio broadcast in India?
a. Mumbai
b. Delhi
c. Chennai
d. Kolkata
82. When did television broadcasting start in India?
a. 1947
b. 1959
c. 1965
© Civil Services Club Bhopal-7747068666 Page 77
d. 1975
83. What was the name of India’s first television channel?
a. DD National
b. Doordarshan
c. AIR-TV
d. Akashvani
84. Which year marked the beginning of color television broadcasting in India?
a. 1980
b. 1982
c. 1985
d. 1990
85. What was the primary purpose of SITE (Satellite Instructional Television
Experiment) in 1975-1976?
a. Entertainment
b. Education and development
c. News dissemination
d. Sports broadcasting
86. When was Prasar Bharati established as a statutory autonomous body?
a. 1976
b. 1982
c. 1997
d. 2000
87. When did private FM channels become operational in India?
a. 1995
b. 2001
c. 2005
d. 2010
88. Which year saw the launch of the first private satellite channel in India?
a. 1991
b. 1993
c. 1995
d. 1999
89. What is the name of the community radio initiative started by the Indian
government?
a. AIR Community FM
b. CRS Scheme
c. Akashvani Local
d. Lok Sewa Radio
90. Which Indian city witnessed the first television broadcast?
a. Mumbai
b. Delhi
c. Kolkata
d. Chennai
91. When was Doordarshan separated from All India Radio?
a. 1970
© Civil Services Club Bhopal-7747068666 Page 78
b. 1976
c. 1980
d. 1985
92. What was the first radio program to focus on farmers and rural issues in India?
a. Gram Sabha Radio
b. Krishi Darshan
c. Kisan Vani
d. Gram Shakti
93. Which Indian Prime Minister was responsible for introducing the Prasar Bharati
Act?
a. Indira Gandhi
b. Rajiv Gandhi
c. P. V. Narasimha Rao
d. Atal Bihari Vajpayee
94. Which program popularized educational content on radio in the 1960s?
a. Akashvani Schools
b. University Radio
c. Schools on AIR
d. Educational Voice
95. What electronic device is associated with the invention of the cathode-ray tube?
a. Radio
b. Television
c. Radar
d. Oscilloscope
96. Who coined the term "electronics"?
a. Guglielmo Marconi
b. Edwin Armstrong
c. John Ambrose Fleming
d. Alan Turing
97. The invention of the MOSFET (Metal-Oxide-Semiconductor Field-Effect
Transistor) occurred in which decade?
a. 1940s
b. 1950s
c. 1960s
d. 1970s
98. What was the ENIAC primarily composed of?
a. Transistors
b. Integrated circuits
c. Vacuum tubes
d. Relays
99. Which material is most commonly used as a semiconductor in electronics?
a. Copper
b. Silicon
c. Gold
d. Aluminum
© Civil Services Club Bhopal-7747068666 Page 79
100. Who is credited with inventing the first transistor?
a. John Bardeen, Walter Brattain, and William Shockley
b. Jack Kilby
c. Thomas Edison
d. Nikola Tesla
Unit Test-7 Complete Test
1. A(n) __________ is composed of several computers connected together to share resources and
data.
(a) Internet
(b) network
(c) backbone
(d) hyperlink
2. If you wish to extend the length of the network without having the signal degrade, you
would use a
(a) resonance
(b) router
(c) gateway
(d) repeater
3. A __________ is the term used when a search engine returns a Web page that matches the
search criteria.
(a) blog
(b) hit
(c) link
(d) view
4. What are the four things required to connect to the Internet?
(a) Telephone line, Modem, Computer and an ISP
(b) Modem, Computer, PDA and ISP
(c) Telephone line, PDA, Modem and Computer
(d) Computer, ISP, Modem and Communication software
5. A ____ is a small program embeded inside of a GIF image.
(a) web bug
(b) cookie
(c) spyware applications
(d) spam
6. A hacker contacts your phone or E-mails and attempts to acquire your password is called
(a) spoofing
(b) phishing
(c) spamming
(d) buging
7. The phrase ____ describes viruses, worms, trojan horse attack applets and attack scripts.
(a) malware
(b) spam
© Civil Services Club Bhopal-7747068666 Page 80
(c) phishing
(d) virus
8. What is the name of Artificial Intelligence which allows machines to handle vague
information with a deftness that mimics human intuition?
(a) Human intelligence
(b) Boolean logic
(c) Functional logic
(d) Fuzzy logic
9. Strong Artificial Intelligence is __________
(a) the embodiment of human intellectual capabilities within a computer
(b) a set of computer programs that produce output that would be
considered to reflect intelligence if it were generated by humans
(c) the study of mental faculties through the use of mental models
implemented on a computer
(d) all of the mentioned
10. Which term is used for describing the judgmental or commonsense part of problem
solving?
(a) Heuristic
(b) Critical
(c) Value based
(d) Analytical
11. What was originally called the “imitation game” by its creator?
(a) The Turing Test
(b) LISP
(c) The Logic Theorist
(d) Cybernetics
12. Which particular generation of computers is associated with artificial intelligence?
(a) Second
(b) Fourth
(c) Fifth
(d) Third
13. What kind of signal is used in speech recognition?
(a) Electromagnetic signal
(b) Electric signal
(c) Acoustic signal
(d) Radar
14. Most of the commonly available personal computers/laptops have a keyboard popularly
known as __________.
(a) QWERTY
(b) QOLTY
(c) ALTER
(d) UCLIF
15. A set of step-by-step procedures for accomplishing a task is known as a(n) __
(a) algorithm
© Civil Services Club Bhopal-7747068666 Page 81
(b) hardware program
(c) software bug
(d) firmware program
16. Collecting personal information and effectively posing as another individual is known as
the crime of __________.
(a) spooling
(b) identity theft
(c) spoofing
(d) hacking
17. A prescribed set of well-defined instructions for solving mathematical problems is called
__________.
(a) a compiler
(b) a code
(c) a description
(d) an algorithm
18. A collection of computers and devices connected together via communication devices and
transmission media is called a __________.
(a) workgroup
(b) server
(c) mainframe
(d) network
19. What device separates a single network into two segments but lets the two segments
appear as one to higher protocols?
(a) Switch
(b) Bridge
(c) Gateway
(d) Router
20. In a synchronous modem, the digital-to-analog converter transmits signal to the
(a) equalizer
(b) modulator
(c) demodulator
(d) terminal
21. Which of the following communications modes support two-way traffic but in only one
direction of a time?
(a) simplex
(b) half-duplex
(c) three-quarters duplex
(d) All of the above
22. Programs such as Internet Explorer that serve as navigable windows into the Web are
called
(a) Hypertext
(b) Networks
(c) Internet
(d) Web browsers
23. __________ is the act of copying or downloading a program from a network and making
multiple copies of it.
© Civil Services Club Bhopal-7747068666 Page 82
(a) Network piracy
(b) Plagiarism
(c) Software piracy
(d) Site-license piracy
24. Unauthorised copying of software to be used for personal gain instead of personal backups
is called
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
25. The first PC virus was developed in
(a) 1980
(b) 1984
(c) 1986
(d) 1988
26. The first computer virus is
(a) creeper
(b) PARAM
(c) the famous
(d) HARLIE
27. What is the full form of USB as used in computer related activities?
(a) Universal Security Block
(b) Ultra Serial Block
(c) United Service Block
(d) Universal Serial Bus
28. ALGOL means –
(a) Advance logarithmic language
(b) Algorithmic language
(c) Algorithmic output language
(d) Algorithmic operation language
29. PDA–
(a) People’s Data Assistant
(b) Personal Data Assistant
(c) People’s Digital Assistant
(d) Personal Digital Assistant
30. In which year John McCarthy coined the term Artificial Intelligence?
(a) . 1950
(b) . 1953
(c) . 1956
(d) . 1959
31. Which of the following is a component of Artificial Intelligence?
(a) Learning
(b) Training
(c) Designing
© Civil Services Club Bhopal-7747068666 Page 83
(d) Puzzling
32. Which of the following is not the commonly used programming language for Artificial
Intelligence?
(a) Perl
(b) Java
(c) PROLOG
(d) LISP
33. Which of the following is not an application of artificial intelligence?
(a) Face recognition system
(b) Chatbots
(c) LIDAR
(d) DBMS
34. What is the purpose of the "SWAYAM" platform in India?
(a) Online shopping
(b) Providing free public Wi-Fi
(c) Online education and courses
(d) Managing traffic signals
35. Which government platform facilitates the issuance of digital driving licenses and vehicle
registration certificates?
(a) RTO India
(b) Digital Motor Authority
(c) e-Vehicle Services
(d) Vahan Sarathi
36. The "UMMID" initiative in India is related to:
(a) Disaster management
(b) Maternal and child health
(c) Youth development
(d) Agricultural research
37. Which of the following basic parts of a robot unit would comprise the computer circuitry
that could be programmed to determine which of the following the robot would do?
(a) sensor
(b) end effector
(c) . arm
(d) controller
38. Which of the following is not among the 5 basic parts of a robot?
(a) controller
(b) end effectors
(c) peripheral tools
(d) drive
39. Which of the following “laws” is Asimov’s first and most significant robotics law?
(a) . robot events must never result in damage to the robot
(b) . robots must make a business a more profitable business
(c) robots must obey the directions given by humans
(d) . robots must never take actions harmful to persons
© Civil Services Club Bhopal-7747068666 Page 84
40. Which of the following is wrong about solar cell electronic devices?
(a) Solar cell responsivity is directly proportional to the wavelength of
light
(b) It produces dark current
(c) It is a photovoltaic cell
(d) No external voltage is applied
41. In a semiconductor which of the following carries can contribute to the current?
(a) Electrons
(b) Holes
(c) Both
(d) None
42. In which of the following semiconductor, the concentration of the holes and electrons is
equal?
(a) Intrinsic
(b) Extrinsic
(c) Compound
(d) Elemental
43. Efficiency of a half wave rectifier is
(a) 50%
(b) 60%
(c) 40.6%
(d) 46%
44. What is a dropshipping business model?
(a) A model where the retailer does not keep inventory in stock, but
instead transfers the order and shipment details to a manufacturer or
supplier who then ships the products directly to the customer.
(b) A model where the retailer keeps large amounts of inventory in stock.
(c) A model where the retailer sells products only to a specific target
audience.
(d) A model where the retailer sells products through a physical store
only.
45. What is a SSL certificate?
(a) A digital certificate that authenticates the identity of a website and
encrypts data transmitted between the website and its visitors
(b) A type of payment processor
(c) A type of advertising campaign
(d) A type of customer service technique
46. What is an affiliate program?
(a) A program where third-party websites or individuals promote a
company’s products or services in exchange for a commission on
sales
(b) A program where customers receive a commission on their own
purchases
(c) A type of payment processor
(d) A type of customer service technique
© Civil Services Club Bhopal-7747068666 Page 85
47. What is A/B testing?
(a) A method of testing two different versions of a website or marketing
campaign to see which performs better
(b) A type of payment processor
(c) A type of customer service technique
(d) A type of advertising campaign
48. The first computer which provides storage is
(a) EDSAC
(b) EDBAC
(c) MARK-I
(d) ACE
49. The zener diode is heavily doped because______
(a) to have low breakdown voltage
(b) to have high breakdown voltage
(c) to have high current variations
(d) to maintain perfect quiescent point
50. .What is a chargeback?
(a) A refund issued by the seller
(b) A dispute initiated by the buyer with their bank
(c) A fee charged by the payment processor
(d) A discount offered by the seller
51. Which media has the ability to have data/information stored (written) on them by users
more than once?
(a) CD-R disks
(b) CD-RW disks
(c) Zip disks
(d) Opti-Disks
52. The microprocessor of a computer
(a) does not understand machine language.
(b) understands machine language and highlevel languages.
(c) understands only machine language.
(d) understands only high-level languages.
53. Computer programs are written in a high-level programming language; however, the
humanreadable version of a program is called -
(a) cache
(b) instruction set
(c) source code
(d) word size
54. An assembler is used to translate a program written in __________.
(a) a low level language
(b) machine language
(c) a high level language
(d) assembly language
55. Oracle is an example of __________ application software.
(a) database
(b) word processing
© Civil Services Club Bhopal-7747068666 Page 86
(c) project management
(d) presentation graphics
56. . Hardware devices that are not part of the main computer system and are often added later
to the system are
(a) clip art
(b) highlight
(c) execute
(d) peripheral
57. The "e-NAM" platform in India is related to:
(a) Online booking of cinema tickets
(b) Agricultural marketing
(c) Online fashion retail
(d) International trade
58. Which of the following refers to the usage of compressed gasses to drive the robot device?
(a) . photosensitive
(b) . hydraulic
(c) piezoelectric
(d) . pneumatic
59. Which of the following is correct about photo diode electronic devices?
(a) P-N junction is connected in reverse bias.
(b) Electron-hole pairs are generated by impurity injection in depletion
layer
(c) It is a photovoltaic cell
(d) No external voltage is applied
60. Which of the following diode is used in ultra-high speed switching electronic circuits?
a) Zener diode
b) Varactor diode
c) Tunnel diode
d) Schottky diode
61. In which year was the first version of Microsoft Office released?
A) 1987
B) 1989
C) 1990
D) 1995
62. . Which Microsoft Office application is used primarily for database management?
A) Excel
B) Access
C) OneNote
D) Visio
63. When was Microsoft Excel first released?
A) 1982
B) 1985
C) 1987
© Civil Services Club Bhopal-7747068666 Page 87
D) 1990
64. . Which Windows operating system was the first to support touchscreen functionality?
A) Windows XP
B) Windows Vista
C) Windows 7
D) Windows 8
65. Which feature was first introduced in Windows Vista?
A) Windows Defender
B) Task Manager
C) Cortana
D) Microsoft Edge
66. Which company introduced the first commercially successful microprocessor?
a) IBM
b) Intel
c) HP
d) Microsoft
67. What distinguishes third-generation computers from their predecessors in terms of user
interface?
a) Graphical User Interface
b) Use of Monitors
c) Keyboards and Operating Systems
d) Virtual Reality
68. . Which language became prominent with fourth-generation computers?
a) BASIC
b) COBOL
c) Assembly
d) Pascal
69. Which of the following computers is an example of the first generation?
a) UNIVAC
b) IBM 1401
c) IBM 360
d) DEC PDP-11
70. Which Indian law was first amended to accommodate digital evidence?
A. Indian Penal Code, 1860
B. Indian Evidence Act, 1872
C. Consumer Protection Act, 1986
D. Indian Telegraph Act, 1885
71. Which body regulates the use of encryption in India?
A. TRAI
B. CERT-In
C. Ministry of Electronics and IT (MeitY)
© Civil Services Club Bhopal-7747068666 Page 88
D. Reserve Bank of India
72. Under the IT Act, what is the term for a person who assists in committing a cybercrime?
A. Perpetrator
B. Abettor
C. Hacker
D. Accomplice
73. What is the primary objective of the Digital India program in terms of cybersecurity?
A. Setting up more IT colleges
B. Creating a secure cyberspace
C. Developing mobile apps
D. Promoting e-commerce
74. Which law governs data breaches and imposes responsibilities on companies for user data
protection?
A. IT Act, 2000
B. Data Protection Bill, 2019
C. Copyright Act, 1957
D. Indian Penal Code, 1860
75. Which section of the IT Act penalizes hacking?
A. Section 43
B. Section 66
C. Section 67
D. Section 70
76. .Under which section can websites be blocked in India?
A. Section 66
B. Section 69A
C. Section 72
D. Section 77
77. Which section addresses cyber terrorism?
A. Section 66C
B. Section 66F
C. Section 70
D. Section 73
78. What does "ARPANET" stand for?
a) Advanced Research Projects Agency Network
b) Advanced Routing and Protocols Agency Network
c) American Research and Protocol Association Network
d) Automated Routing and Project Assignment Network
79. . Expand "TLS" in Internet security.
a) Transport Layer Security
b) Transmission Line System
c) Transfer Level System
d) Traffic Layer Security
80. . What is the full form of "DHCP"?
(a) Data Handling Communication Protocol
© Civil Services Club Bhopal-7747068666 Page 89
(b) Dynamic Host Configuration Protocol
(c) Domain Host Configuration Protocol
(d) Direct Host Communication Protocol
81. . What does "POP" stand for in email communication?
(a) Protocol for Online Processing
(b) Post Office Protocol
(c) Packet Optimization Protocol
(d) Port Oriented Processing.
82. . What does "TLD" stand for in the context of domain names?
(a) Top-Level Domain
(b) Translated Layer Domain
(c) Tree Level Directory
(d) Terminal Level Domain
83. . What does "Wi-Fi" stand for?
(a) Wireless Fidelity
(b) Wide Frequency
(c) Wired Fidelity
(d) Wireless Frequency
84. . Which type of Internet refers to websites and content that is hidden and not accessible
through traditional browsers?
A) Surface Web
B) Deep Web
C) Dark Web
D) Extranet
85. Which Indian program exemplifies G2B e-Governance?
a) GST Portal
b) Digital Locker
c) Swachh Bharat Mission
d) UMANG App
86. . Which component of e-Governance focuses on delivering services through integrated
platforms?
a) Connectivity
b) Process re-engineering
c) Transparency
d) IT infrastructure
87. . What is a "payment aggregator"?
a) A bank
b) A service bundling multiple payment options
c) A customer support platform
d) A financial regulato
88. Which Indian payment gateway offers BharatQR as a service?
a) Instamojo
b) Razorpay
c) Paytm
d) NPCI
89. In an N-type semiconductor, majority carriers move towards the:
© Civil Services Club Bhopal-7747068666 Page 90
a) Positive terminal
b) Negative terminal
c) Neutral point
d) None of the above
90. Which diode is specifically designed to allow current to flow in reverse under a certain
voltage?
a) LED
b) Zener Diode
c) Schottky Diode
d) Tunnel Diode
91. What type of diode emits light when a current passes through it?
a) Schottky Diode
b) Photodiode
c) Light Emitting Diode (LED)
d) Zener Diode
92. What is the primary use of a photodiode?
a) Voltage regulation
b) Detecting light
c) Generating light
d) Amplifying signals
93. What type of diode combines a semiconductor and a metal junction?
a) Zener Diode
b) Tunnel Diode
c) Schottky Diode
d) Photodiode
94. Which diode is commonly used in infrared remote controls?
a) LED
b) Infrared Emitting Diode (IRED)
c) Zener Diode
d) Tunnel Diode
95. Which phenomenon explains the expulsion of magnetic fields from a superconductor?
a) Hall Effect
b) Meissner Effect
c) Josephson Effect
d) Quantum Tunneling
96. Who discovered superconductivity and in which year?
a) Heike Kamerlingh Onnes, 1911
b) James Clerk Maxwell, 1873
c) Michael Faraday, 1831
d) Albert Einstein, 1920
97. Which subfield of AI includes the development of chatbots like ChatGPT?
A) Natural Language Processing
B) Robotics
C) Machine Learning
D) Expert Systems
98. Which AI subfield studies strategies for decision-making in competitive environments?
A) Game Theory
B) Reinforcement Learning
© Civil Services Club Bhopal-7747068666 Page 91
C) Deep Learning
D) Computer Vision
99. Which country leads the world in AI regulations through its proposed AI Act?
A) United States
B) European Union
C) India
D) China
100. India recently collaborated with which global tech giant to establish AI models for
healthcare?
(a) Google
(b) Microsoft
(c) OpenAI
(d) IBM