MCQ for science-and-tech-5-6th-january-2023

by Vajiram & Ravi

29-08-2023

06:35 AM

1.

With reference to Encryption, consider the following statements:

1. It involves converting transmitted information into an unintelligible form.

2. It can be done for information in Text and Audio formats and not in Image files.

3. End-to-end encryption keeps messages private from everyone, except the messaging service.

Which of the statements given above are correct?

  • A

    1 only

  • B

    2 and 3 only

  • C

    1 and 3 only

  • D

    1, 2 and 3

2.

With reference to Internet Protocol (IP), consider the following statements:

1. An IP address is a unique address that identifies a device on the internet or a local network.

2. IP address is allocated by the International Telecommunication Union (ITU).

3. IPv4 is based on 32-bit addressing whereas IPv6 is based on 128-bit addressing.

4. IPv6 provides simpler and shorter IP addresses than IPv4.

Which of the statements given above are correct?

  • A

    1, 2 and 3 only

  • B

    1 and 3 only

  • C

    1, 2 and 4 only

  • D

    3 and 4 only

3.


With reference to Internet Cookies, consider the following statements:

1. They are text files with small pieces of data used to identify a computer on a network.

2. Organizations use them to facilitate more visits by users to their websites.

3. They can infect computers with malware or viruses.

Which of the statements given above is/are correct?

  • A

    1 only

  • B

    2 and 3 only

  • C

    1 and 2 only

  • D

    1, 2 and 3

4.

Consider the following statements with reference to Optical Fibres:

1. Refraction and dispersion of light is the principle behind the working of the Optical Fibres.

2. It can transmit high bandwidth data over long distances with negligible signal loss.

3. They are immune to electromagnetic interference from radio signals.

Which of the statements given above are correct?

  • A

    1 and 3 only

  • B

    2 and 3 only

  • C

    1 and 2 only

  • D

    1, 2 and 3

5.

Consider the following statements with reference to Near Field Communication (NFC):

1. It enables the communication between two electronic devices over a maximum distance of 10 meters.

2. It uses ZigBee Protocol with the help of internet connectivity to communicate with devices.

3. The operating speed of NFC is much slower than that of Bluetooth.

Which of the statements given above is/are correct?

  • A

    1 and 3 only

  • B

    2 only

  • C

    3 only

  • D

    1, 2 and 3

6.

Consider the following statements with reference to Wi-Fi 7:

1. Unlike the previous Wi-Fi standards, it utilises three frequency bands.

2. It involves an advanced modulation scheme that can boost the peak rates to increase throughput.

3. It can provide support for only up to seven data streams.

Which of the statements given above is/are correct?

  • A

    1 and 2 only

  • B

    2 only

  • C

    3 only

  • D

    1, 2 and 3

7.

The terms `ShadowPad, MoonBounce’, sometimes found in news, refers to:

  • A

    Private satellite launch vehicles

  • B

    Crypto-currencies

  • C

    Exo-planets

  • D

    Malwares

8.

The terms, ‘ModifiedElephant, Lapsus $’, recently mentioned in the news, refer to 

  • A

    Hacking groups

  • B

    Crossbreed of Asian and African elephant

  • C

    Crypto currencies

  • D

    FinTech companies

9.

With reference to the Doxxing, consider the following statements:

1. It is a cyber-attack that involves sending fraudulent communications that appear to come from a reputable source.

2. It involves publishing private information on the internet usually with malicious intent.

Which of the statements given above is/are correct?

  • A

    1 only

  • B

    2 only

  • C

    Both 1 and 2

  • D

    Neither 1 nor 2

10.

Consider the following statements with reference to Geofencing:

1. It only uses Radio Frequency Identification (RFID) to set up a geofence trigger based on physical location information.

2. Active geo-fences are always on and rely on mobile internet to work in the background.

3. Most common applications of geofencing are in automation, marketing and security.

Which of the statements given above is/are correct?

  • A

    1 and 2 only

  • B

    2 and 3 only

  • C

    3 only

  • D

    1, 2 and 3