Skip to content
Home » UPSC PYQ on Emerging Technology

UPSC PYQ on Emerging Technology

Emerging Technologies are important part of science and its syllabus. Previous Year Question (PYQ) papers are invaluable resources for aspirants preparing for competitive exams like the Union Public Service Commission (UPSC) examinations. In this article we present important PYQ on Emerging Technology.

PYQ on Emerging Technology

Q- Consider the following: (2022)

  1. Aarogya Setu
  2. COWIN
  3. DigiLocker
  4. DIKSHA

Which of the above are built on top of open-source digital platforms?

(a) 1 and 2 only

(b) 2, 3 and 4 only

(c) 1, 3 and 4 only

(d) 1, 2, 3 and 4

Answer- Option D

EXPLANATION

Open-source software refers to software whose source code is accessible for inspection, modification, and enhancement by anyone. The source code is the part of software that regular users typically don’t see, but it’s crucial for programmers who want to alter how a program operates. Having access to a program’s source code allows programmers to enhance its functionality and rectify any issues. Arogya Setu, COWIN, Digilocker, and DIKSHA are all developed using open-source digital platforms. Therefore, statements 1, 2, 3, and 4 are correct.

Q- With reference to Web 3.0, consider the following statements: (2022)

  1. Web 3.0 technology enables people to control their own data.
  2. In Web 3.0 world, there can be blockchain based social networks.
  3. Web 3.0 is operated by users collectively rather than a corporation

Which of the following given above are correct?

(a) 1 and 2 only

(b) 2 and 3 only

(c) 1 and 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

Statement 1: Currently, centralized repositories exclusively own and benefit from user data. However, in Web 3.0, individuals will have ownership of their data and receive fair compensation for its usage. In this new paradigm, people will have control over their own data.

Statement 2: Web 3.0 will embody a permissionless and democratic structure. For instance, platforms like Twitter won’t have the authority to censor content, and Facebook won’t maintain vast databases that could potentially influence elections. Consequently, individuals will be able to establish blockchain-based social networks, ensuring decentralized control.

Statement 3: In Web3, activities such as sharing photos, interacting with friends, and making online purchases will no longer be monopolized by Big Tech firms. Instead, they will be facilitated through numerous small-scale competitive services operating on the blockchain. This shift enables the creation of shared value among a broader community, rather than being concentrated solely among corporate stakeholders. Thus, Web3 operates through collective user participation rather than corporate control.

Q- With reference to “Software as a Service (SaaS)”, consider the following statements: (2022)

  1. SaaS buyers can customise the user interface and can change data fields.
  2. SaaS users can access their data through their mobile devices.
  3. Outlook, Hotmail and Yahoo! Mail are forms of SaaS.

Which of the statements given above are correct?

(a) 1 and 2 only

(b) 2 and 3 only

(c) 1 and 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

Statement 1: Contemporary web-based software offers adaptability for both business-specific requirements and individual users. Purchasers have the flexibility to customize the user interface (UI), altering the program’s appearance and functionality by modifying data fields and activating or deactivating various business process features.

Statement 2: Software as a Service (SaaS) enables users to access programs via the Internet without the need for local installation on their devices. This accessibility extends to mobile devices, allowing users to retrieve data and utilize software features through web browsers from any location. SaaS facilitates remote work scenarios with options for remote desktop software, enabling productivity from home.

Statement 3: Examples like Outlook, Hotmail, or Yahoo! Mail exemplify Software as a Service (SaaS). Users log into their accounts over the Internet, accessing email services and stored messages hosted on the provider’s network. This arrangement permits access to emails and stored data from any internet-connected device via a web browser, ensuring flexibility and convenience in email management.

Q- Which one of the following is the context in which the term “qubit” is mentioned? (2022)

(a) Cloud Services

(b) Quantum Computing

(c) Visible Light Communication Technologies

(d) Wireless Communication Technologies

Answer- Option B

EXPLANATION

Quantum computers represent a significant leap beyond traditional computing capabilities by harnessing the unique characteristics of particles at the subatomic level. Utilizing principles such as superposition and entanglement, these computers can tackle complex calculations and problems with unprecedented speed and efficiency.

Superposition refers to the ability of small particles, like atoms or their components, to simultaneously exist in multiple states or locations, defying conventional understanding.

Entanglement, on the other hand, describes the phenomenon where particles become interconnected, influencing each other’s behavior instantaneously regardless of distance, based on prior interaction.

Q- Consider the following communication technologies: (2022)

  1. Closed-circuit Television
  2. Radio Frequency Identification
  3. Wireless Local Area Network

Which of the above are considered of the Short-Range devices/technologies?

(a) 1 and 2 only.

(b) 2 and 3 only

(c) 1 and 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

Short Range Devices (SRDs) are radio devices characterized by low transmitted power, resulting in minimal risk of interference with other radio services. They encompass a diverse range of wireless equipment, including but not limited to:

  • Access control systems (e.g., door and gate openers)
  • Alarms and motion detectors
  • Closed-circuit television (CCTV)
  • Wireless audio devices, such as microphones
  • Industrial control systems
  • Local Area Networks (LANs)
  • Medical implants
  • Metering devices
  • Remote control devices
  • Radio frequency identification (RFID) technology
  • Road Transport Telematics applications.

Q- If a major solar storm (solar flare) reaches the Earth, which of the following are the possible effects on the Earth? (2022)

  1. GPS and navigation systems could fail.
  2. Tsunamis could occur at equatorial regions.
  3. Power grids could be damaged.
  4. Intense auroras could occur over much of the Earth.
  5. Forest fires could take place over much of the planet.
  6. Orbits of the satellites could be disturbed.
  7. Shortwave radio communication of the aircraft flying over polar regions could be interrupted.

Select the correct answer using the code given below:

(a) 1, 2, 4 and 5 only

(b) 2, 3, 5, 6 and 7 only

(c) 1, 3, 4, 6 and 7 only

(d) 1, 2, 3, 4, 5, 6 and 7

Answer- Option C

EXPLANATION

Solar flares are intense bursts of radiation emitted by the sun, often accompanied by coronal mass ejections (CMEs), which are massive clouds of gas erupting from the sun’s interior into its atmosphere.

Statement 1 and 3: A significant solar flare is expected to impact satellites in Earth’s upper atmosphere, affecting GPS navigation, mobile phone transmissions, and satellite TV. It could potentially disrupt power grids and electrical networks in various regions.

Statement 2: Solar flares can temporarily alter the upper atmosphere, causing disruptions, but they do not cause tsunamis. Their effects are limited to the upper atmosphere.

Statement 4: High-energy particles emitted by solar flares can cause certain atoms in Earth’s atmosphere to glow, resulting in auroras visible in Central Europe and North America under clear weather conditions.

Statement 5: There is no direct link between coronal mass ejections (CMEs) and forest fires. Solar storms do not physically ignite landscapes. This is a misconception, as solar activity primarily affects the upper atmosphere and electronics.

Statement 6: Scientists have observed that solar flares and storms heat and expand the atmosphere, affecting satellites’ orbits. This results in increased atmospheric density, slowing satellites and causing them to gradually lose altitude.

Q- With reference to street lighting, how do sodium lamps differ from LED lamps? (2021)
1. Sodium lamps produce light at 360 degrees but it is not so in the case of LED lamps.
2. As street lights, sodium lamps have a longer life span than LED lamps.
3. The spectrum of visible light from sodium lamps is almost monochromatic while LED lamps offer significant colour advantages in street lighting.
Select the correct answer using the code given below.
(a) 3 only
(b) 2 only
(c) 1 and 3 only
(d) 1, 2 and 3

Answer- Option C

EXPLANATION

Statement 1: Sodium lamps emit light in a 360-degree pattern, whereas LED lamps are designed with a 180-degree bulb angle to optimize light efficiency and provide targeted lighting over specific areas.

Statement 2: In terms of lifespan, LED lamps outperform sodium lamps typically used as street lights. High Pressure Sodium lamps have an average lifespan of around 24,000 hours, while LED lamps boast a significantly longer lifespan ranging from 25,000 to 200,000 hours.

Statement 3: Sodium lamps produce nearly monochromatic light, characterized by a warm yellow glow. Conversely, LED lamps offer a broader spectrum of visible light and various color options, providing more versatile and efficient street lighting solutions compared to High Pressure Sodium lamps.

Q-  Bisphenol A (BPA), a cause of concern, is a structural/key component in the manufacture of which of the following kinds of plastics? (2021)
(a) Low-density polyethylene
(b) Polycarbonate
(c) Polyethylene terephthalate
(d) Polyvinyl Chloride

Answer- Option B

EXPLANATION

Bisphenol A (BPA) is a chemical compound utilized in the production of polycarbonate plastic, which is commonly employed to manufacture durable items such as baby bottles, reusable water bottles, food containers, pitchers, tableware, and various storage containers.

Furthermore, BPA is utilized in the production of epoxy resins, which are applied as linings within metal products like food cans, bottle caps, and water supply pipes. These epoxy linings serve to prevent corrosion or reactions between the metal and the contents.

Although polycarbonate products and epoxy linings are cured, trace amounts of BPA may persist and leach into food and beverages. Canned foods and liquids stored or heated in polycarbonate containers and epoxy-lined cans are identified as the primary sources of BPA exposure.

There exist differing opinions among scientists and government agencies regarding the potential health risks posed by the levels of BPA detected in contents from polycarbonate containers or epoxy-lined cans. Recent scientific research has investigated potential associations between BPA exposure and various health effects in the general population. While some studies have indicated links between increased BPA exposure and health issues such as diabetes or heart disease, others have not found such associations.

Q- Which one of the following is used in preparing a natural mosquito repellent? (2021)

a) Congress grass
b) Elephant grass
c) Lemon grass
d) Nut grass

Answer- Option C

EXPLANATION

Option c is correct. Lemongrass, a tall herb, is commonly found in tropical and sub-tropical regions across Asia, Africa, and Australia, with China and India being the leading producers.

Lemongrass is renowned for its effectiveness as a mosquito repellent. It contains citronella, a compound that helps mask the scents mosquitoes use to locate hosts. A study conducted in 2011 demonstrated that the strong odor of lemongrass oil resulted in the death or complete repulsion of approximately 95% of mosquitoes belonging to specific species.

Q- With the present state of development, Artificial Intelligence can effectively do which of the following? (2020)

(1) Bring down electricity consumption in industrial units

(2) Create meaningful short stories and songs

(3) Disease diagnosis

(4) Text-to-speech conversion

(5) Wireless transmission of electrical energy

Select the correct answer using the code given below:

(a) 1, 2, 3 and 5 only

(b) 1, 3, and 4 only {?}

(c) 2, 4, and 5 only

(d) 1, 2, 3, 4 and 5

Answer- Option D

EXPLANATION

Artificial Intelligence (AI) involves the replication of human intelligence in machines, enabling them to perform tasks and make decisions similar to humans. It finds application across various sectors, including healthcare, entertainment, finance, and education.

In healthcare, AI aids in disease diagnosis, while in entertainment, it contributes to the creation of music and literature and the development of short stories and fictions.

Moreover, AI plays a significant role in the power industry, particularly in machine-learning assisted power transfer using magnetic resonance and enhancing energy efficiency. Therefore, all options pertaining to the applications of AI are accurate.

Q- With reference to visible light communication (VLC) technology, which of the following statements are correct? (2020)

(1) VLC uses electromagnetic spectrum wavelengths 375 to 780nm

(2) VLC is known as long-range optical wireless communication

(3) VLC can transmit large amounts of data faster than Bluetooth

(4) VLC has no electromagnetic interference

Select the correct answer using the code given below

(a) 1, 2 and 3 only

(b) 1, 2 and 4 only

(c) 1, 3 and 4 only

(d) 2, 3 and 4 only

Answer- Option C

EXPLANATION

Visible Light Communication (VLC) is a wireless technology facilitating rapid data transmission using visible light, covering the spectrum from 380 nm to 750 nm. It primarily offers high-speed internet connectivity indoors, leveraging intensity modulation of LED lighting infrastructure. Data transmission involves modulating light intensity, with reception accomplished by photodiode devices. Notably, VLC systems operate at optical frequencies, emitting no electromagnetic interference, rendering them suitable for applications in healthcare services. Thus, statements 1 and 4 are accurate.

Q- In India, the term “Public Key Infrastructure” is used in the context of (2020)

(a) Digital security infrastructure

(b) Food security infrastructure

(c) Health care and education infrastructure

(d) Telecommunication and transportation infrastructure

Answer- Option A

EXPLANATION

Public Key Infrastructure (PKI) is a digital authentication technology utilized to verify users and devices in the digital realm. It establishes a framework for encryption and cybersecurity to safeguard communication between servers and clients. PKI relies on digital certificates to authenticate the identity of machines and users, thereby ensuring the integrity of transactions via encryption and decryption.

Q- With reference to solar water pumps, consider the following statements: (2020)

(1) Solar power can be used for running surface pumps and not for submersible pumps,

(2) Solar power can be used for running centrifugal pumps and not the ones with piston.

Which of the statements given above is/are correct?

(a) 1 only

(b) 2 only

(c) Both 1 and 2

(d) Neither 1 nor 2

Answer- Option D

EXPLANATION

Pumps are categorized as either submersible or surface pumps depending on their placement, whether they are submerged underwater or positioned above the waterline. Solar energy can be harnessed to operate both types of pumps. Therefore, statement 1 is incorrect.
Solar power can also be utilized to operate various types of pumps, including centrifugal pumps and those with pistons. The pumping mechanism can be cyclic and driven by various components such as pistons, screws, gears, rollers, diaphragms, or vanes. Therefore, statement 2 is also incorrect.

Q- Consider the following statements: (2020)

  1. Aadhaar metadata cannot be stored for more than three months.
  2. State cannot enter into any contract with private corporations for sharing of Aadhaar data.
  3. Aadhaar is mandatory for obtaining insurance products.
  4. Aadhaar is mandatory for getting benefits funded out of the Consolidated Fund of India.
    Which of the statements given above is/are correct?
    (a) 1 and 4 only
    (b) 2 and 4 only
    (c) 3 only
    (d) 1, 2 and 3 only

Answer- Option B

EXPLANATION

The Supreme Court ruling mandates that Aadhaar authentication data cannot be kept beyond a span of 6 months, rendering Statement 1 incorrect. The judgment also declared unconstitutional the provision allowing body corporates and individuals to seek authentication based on contractual agreements, thus affirming Statement 2. The IRDAI has clarified that Aadhaar is not necessary for purchasing insurance policies, consistent with the 2018 Supreme Court ruling, making Statement 3 incorrect. Moreover, the Supreme Court ruled that any welfare scheme funded by the Consolidated Fund of India necessitates Aadhaar for disbursing benefits to the rightful recipients, supporting Statement 4.

Q- With reference to communication technologies, what is/are the difference/differences between LTE (Long-Term Evolution) and VoLTE (Voice over Long-Term Evolution)? (2019)

(1) LTE is commonly marketed as 3G and VoLTE is commonly marketed as advanced 3G.

(2) LTE is data-only technology and VoLTE is voice-only technology.

Select the correct answer using the code given below

(a) 1 only

(b) 2 only

(c) Both 1 and 2

(d) Neither 1 nor 2

Answer- Option D

EXPLANATION

LTE, short for Long Term Evolution, comprises a set of 4G network standards established in 2008. LTE represents an advancement over the radio technology utilized in 3G’s WCDMA and introduces OFDM, also known as Orthogonal Frequency-Division Multiplexing.
The International Telecommunication Union (ITU) has acknowledged the ambiguity surrounding the term “4G” and has identified LTE-Advanced and WirelessMAN-Advanced (WiMax 2) as the true 4G standards. VoLTE, or Voice over LTE, represents a technology enhancement for the LTE protocol commonly used in mobile phone networks. Unlike traditional LTE networks, which solely support data transmission, VoLTE integrates both data and voice capabilities. Essentially, VoLTE systems convert voice signals into data streams, facilitating their transmission over data connections.

Q- In The context of digital technologies for entertainment, consider the following statements : (2019)

(1) In Augmented Reality (AR), a simulated environment is created and the physical world is completely shut out.

(2) In Virtual Reality (VR), images generated from the computer are projected onto real life objects or surroundings.

(3) AR allows individuals to be present in the world and improves the experience using the camera of a smart-phone or PC.

(4) VR closes the world, and transposes an individual, providing a complete immersion experience.

Which of the statements given above is/are correct?

(a) 1 and 2 only

(b) 3 and 4

(c) 1, 2 and 3

(d) 4 only

Answer- Option B

EXPLANATION

Virtual reality (VR) entails the creation of computer-generated simulations that immerse users in alternate worlds or realities, completely shutting out the physical environment. Thus, statement 2 is inaccurate. Within VR environments, users interact with simulated 3D worlds, making it a valuable tool for training, education, and scientific exploration.
Therefore, statement 4 is correct. On the other hand, augmented reality (AR) involves the projection of computer-generated images onto real-life objects or surroundings, enhancing the user’s experience of the physical world. Consequently, statement 1 is incorrect. AR utilizes the camera of smartphones or PCs to merge virtual elements with the real world, allowing users to engage with their surroundings. Thus, statement 3 is accurate. In AR, users actively participate in the physical environment.

Q- Consider the following statements about a digital signature: (2019)

(1) An electronic record that identifies the certifying authority issuing it.

(2) Used to serve as a proof of identity of an individual to access information of server on the Internet.

(3) an electronic method of signing an electronic document and ensuring that the original content is unchanged.

Which of the statements given above is/are correct?

(a) 1 only

(b) 2 and 3 only

(c) 3 only 

(d) 1,2 and 3 

Answer- Option C

EXPLANATION

A digital signature is an electronic authentication method used to verify the authenticity of an electronic document, rather than serving as a record itself. Therefore, statement 1 is inaccurate.
Digital certificates, on the other hand, are electronic records issued by certifying authorities to identify individuals for specific purposes, rather than merely serving as proof of identity. Thus, statement 2 is incorrect.
Through digital signatures, electronic documents are electronically signed to ensure that their original content remains unchanged. Consequently, statement 3 is accurate. Additionally, digital signatures are easily transferable and cannot be replicated by unauthorized individuals.

Q- In the context of wearable technology, which of the following tasks is/are accomplished by wearable devices? (2019)

(1) Location identification of a person

(2) Sleep monitoring of a person

(3) Assisting the hearing impaired person

Select the correct answer using the code given below.

(a) 1 only

(b) 2 and 3 only

(c) 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

Wearable technology encompasses electronic devices like smartwatches and fitness trackers. It enables users to monitor their fitness, track their location using GPS, and access text messages more conveniently. This technology includes devices such as fitness trackers for monitoring fitness levels, smartwatches, heart rate monitors, sleep trackers, and GPS trackers for location identification. Additionally, wearable technology aids individuals with hearing impairments.

Q- Consider the following pairs of Terms sometimes seen in news (2018)

(1) Belle II experiment: Artificial Intelligence

(2) Blockchain technology: Digital/ Cryptocurrency

(3) CRISPR — Cas9: Particle Physics

Which of the pairs given above is/are correctly matched ?

(a) 1 and 3 only

(b) 2 only

(c) 2 and 3 only

(d) 1, 2 and 3

Answer- Option B

EXPLANATION

The Belle II experiment aims to collect data at Super KEKB, an asymmetric electron-positron collider, with performance comparable to or better than the B factory detectors such as Belle or BaBar, despite facing more challenging beam background conditions.
Blockchain technology refers to a decentralized, digital ledger system that records all transactions of cryptocurrencies. It serves as a transparent and secure method for tracking the origin of digital assets.
CRISPR-Cas9 technology enables precise gene editing by scanning the genome for target locations and utilizing the Cas9 protein as molecular scissors to make targeted DNA cuts. This enzyme cuts both strands of the double helix DNA at specific locations, facilitating genetic modifications.

Q- When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart min-or in your bathroom shows the day’s weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognises the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers and AC machines get switched off automatically. On your way to office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a- message to your office accordingly.  (2018)

In the context of emerging communication technologies, which one of the following terms best applies to the above scenario? 

(a) Border Gateway Protocol

(b) Internet of Things

(c) Internet Protocol

(d) Virtual Private Network

Answer- Option B

EXPLANATION

The Internet of Things (IoT) encompasses the vast network of interconnected physical devices worldwide that gather and exchange data via the internet. Examples of IoT devices include a smartphone-app-controlled lightbulb, a motion sensor, a smart thermostat in an office, or a networked streetlight. Security emerges as a significant concern within the realm of IoT due to the collection of sensitive data by these sensors, such as personal activities within one’s home. Vulnerabilities in software have exposed smart home appliances like refrigerators, ovens, and dishwashers to potential hacking threats.

Q- In which of the following areas can GPS technology be used?  (2018)

(1) Mobile phone operations

(2) Banking operations

(3) Controlling the power grids

Select the correct answer using the code given below:

(a) 1 only

(b) 2 and 3 only

(c) 1 and 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

GPS, a satellite navigation system, is employed for pinpointing the location of objects on the ground. Its applications range from routing phone calls via cell towers to facilitating transactions at ATMs and cash registers. Moreover, GPS aids in transmitting power to households through electrical grids and regulates trades in stock portfolios or investment funds on stock exchanges. Owned by the United States, GPS functions as a utility furnishing users with positioning, navigation, and timing (PNT) services through a network of 24 satellites catering to both civilian and military users.

Q- The terms ‘Wanna Cry, Petya and Eternal Blue’ sometimes mentioned in the news recently are related to (2018) 

(a) Exo-planets

(b) Crypto-currency

(c) Cyber attacks

(d) Mini satellites

Answer- Option C

EXPLANATION

The phrases ‘WannaCry, Petya, and EternalBlue‘ all pertain to cyber assaults. WannaCry ransomware encrypts users’ devices, restricting access to data and software until a specified ransom is remitted to the perpetrator. Petya swiftly propagates across networks utilizing Microsoft Windows. EternalBlue denotes a software flaw found in Microsoft’s Windows operating system.

Q- “3D printing” has applications in which of the following? (2018) 

(1) Preparation of confectionery items

(2) Manufacture of bionic ears

(3) Automotive industry

(4) Reconstructive surgeries

(5) Data processing technologies

Select the correct answer using the code given below :

(a) 1, 3 and 4 only

(b) 2, 3 and 5 only

(c) 1 and 4 only

(d) 1, 2, 3, 4 and 5

Answer- Option D

EXPLANATION

3D printing finds applications across various sectors, ranging from construction to medical advancements. Its diverse uses include the creation of prototype designs based on architectural plans and the fabrication of mechanical components. Moreover, it has been employed in confectionery, initially for chocolate and hard sugar candy and more recently for gummy candy production.
Remarkable innovations include the development of a 3D-printed bionic ear capable of detecting radio waves. Additionally, it has revolutionized facial reconstructive surgery, with individuals now able to receive personalized 3D-printed facial implants to aid in recovery from illnesses or injuries.
A multimaterial voxel-printing technique has been introduced, facilitating the physical representation of scientific imaging datasets. Its influence extends to various other sectors such as the maritime industry, electronics, and entertainment and broadcasting.

Q- The identity platform ‘Aadhaar’ provides open “Application Programming Interfaces (APIs)”. What does it imply? (2018)

(1) It can be integrated into any electronic device.

(2) Online authentication using iris is possible.

Which of the statements given above is/are correct ?

(a) 1 only

(b) 2 only

(c) Both 1 and 2

(d) Neither 1 nor 2

Answer- Option C

EXPLANATION

Aadhaar Authentication involves submitting Aadhaar number and other attributes, such as biometrics, online to the Central Identities Data Repository for verification. The repository then verifies the information based on its records. Only electronic requests sent by a requesting entity in compliance with UIDAI regulations are entertained for authentication. Authentication methods include Demographic Authentication, one-time pin-based authentication, Biometric-based authentication, and Multi-factor authentication. As per Nandan Nilekani’s 2016 blog in the Times of India, Aadhaar offers open Application Programming Interfaces (APIs) that can be seamlessly integrated into any electronic device, facilitating online authentication using fingerprint or iris scans. Thus, both statements are accurate.

Q- Organic Light Emitting Diodes (OLEDs) are used to create digital displays in many devices. What are the advantages of OLED displays over Liquid Crystal displays? (2017)

(1) OLED displays can be fabricated on flexible plastic substrates.

(2) Roll-up displays embedded in clothing can be made using OLEDs.

(3) Transparent displays are possible using OLEDs.

Select the correct answer using the code given below

(a) 1 and 3 only

(b) 2 only

(c) 1, 2 and 3

(d) None of the above statements is correct

Answer- Option C

EXPLANATION

Organic light emitting diodes (OLEDs) displays utilizing plastic substrates possess appealing characteristics. They are extremely thin and lightweight, and they can be manufactured on flexible plastic substrates, leveraging the substrate’s flexibility. Additionally, OLEDs can be integrated into roll-up displays embedded in clothing, and they offer the potential for transparent displays as well. Therefore, statements 1, 2, and 3 are accurate.

Q- In India, it is legally mandatory for which of the following to report on cyber security incidents? (2017)

(1) Service providers

(2) Data centres

(3) Body corporate

Select the correct answer using the code given below:

(a) 1 only

(b) 1 and 2 only

(c) 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

Cybersecurity incidents refer to any actual or suspected adverse event related to cybersecurity that breaches a security policy, leading to unauthorized access, denial of services, unauthorized usage of computer resources, or unauthorized changes in data.
In India, according to Section 70-B of the Information Technology Act, 2000, the Central Government has the authority to designate a government agency known as the Indian Computer Emergency Response Team (CERT) to handle such incidents. Rule 12 of the CERT Rules provides individuals, companies, or organizations with the option to report cybersecurity incidents to CERT-In. Therefore, all the statements are accurate.

Q- What is the purpose of the ‘evolved Laser Interferometer Space Antenna (eLISA)’ project? (2017)

(a) To detect neutrinos

(b) To detect gravitational waves

(c) To detect the effectiveness of missile defence system

(d) To study the effect of solar flares on our communication systems

Answer- Option B

EXPLANATION

The evolved Laser Interferometer Space Antenna (eLISA) initiative is spearheaded by the European Space Agency (ESA). Its primary objective is to identify and precisely gauge gravitational waves. Therefore, statement 2 is accurate. LISA is slated to become the inaugural space-based instrument dedicated to detecting gravitational waves. These waves emanate from supermassive black holes located at the cores of numerous galaxies. Moreover, eLISA aims to capture the signals emitted by thousands of compact binary star systems within the Milky Way.

Q- The term ‘Domestic Content Requirement’ is sometimes seen in the news with reference to (2017)

(a) Developing solar power production in our country

(b) Granting licences to foreign T.V. channels in our country

(c) Exporting our food products to other countries

(d) Permitting foreign educational institutions to set up their campuses in our country

Answer- Option A

EXPLANATION

The concept of ‘Domestic Content Requirement’ is frequently mentioned in discussions regarding the promotion of solar power production within our nation. This requirement was introduced as part of the Jawaharlal Nehru National Solar Mission.
Also referred to as the National Solar Mission, this initiative was launched by India in 2010 with the objective of achieving a grid-connected solar power capacity of 100,000 MW by 2022. As part of phases I and II, solar power developers were obligated to adhere to a mandatory domestic content requirement.

Q- Which of the following statements is/are correct regarding Smart India Hackathon 2017? (2017)

(1) It is a centrally sponsored scheme for developing every city of our country into Smart Cities in a decade.

(2) It is an initiative to identify new digital technology innovations for solving the many problems faced by our country.

(3) It is a programme aimed at making all the financial transactions in our country completely digital in a decade.

Select the correct answer using the code given below :

(a) 1 and 3 only

(b) 2 only

(c) 3 only

(d) 2 and 3 only

Answer- Option B

EXPLANATION

The Smart India Hackathon was initiated as a platform for a competition aimed at devising inventive digital solutions to address the challenges faced by the central government and its ministries. Therefore, statement 2 is accurate. Since 2017, it has been organized under the auspices of the Ministry of Human Resource Development. This event actively involves the youth of the nation in contributing to the process of nation-building. The overarching theme of the Smart India Hackathon is encapsulated in the phrase, “No problem is insurmountable, and no idea is insignificant.”

Q- Project Loon’, sometimes seen in the news, is related to (2016)

(a) waste management technology

(b) wireless communication technology

(c) solar power production technology

(d) water conservation technology

Answer- Option B

EXPLANATION

Project Loon is an initiative involving a network of high-altitude balloons positioned in the stratosphere, serving to provide internet access to rural and isolated areas across the globe through wireless communication technology. Spearheaded by Google, Project Loon represents a research and development endeavor aimed at enhancing connectivity, particularly in remote regions. Additionally, it plays a crucial role in bolstering communication capabilities during times of natural disasters in affected areas.

Q- With reference to ‘Li-Fi’, recently in the news, which of the following statements is/are correct? (2016)

(1) It uses light as the medium for high-speed data transmission.

(2) It is a wireless technology and is several times faster than ‘WiFi’.

Select the correct answer using the code given below.

(a) 1 only

(b) 2 only

(c) Both 1 and 2

(d) Neither 1 nor 2

Answer- Option C

EXPLANATION

LiFi, short for Light-Fidelity, is an innovative wireless technology that utilizes visible light communication (VLC) for high-speed data transmission, affirming the accuracy of statement 1. Through the precise modulation of light, LiFi enables data transmission using conventional visible light sources, thereby statement 2 is correct.
This technology extends connectivity to environments where Wi-Fi is currently not feasible, such as aircraft cabins, hospitals, and hazardous settings. Notably, LiFi boasts speeds approximately 100 times faster than typical Wi-Fi, as stated in statement 2. Furthermore, LiFi has the capacity to achieve data transmission rates of up to 100 Gbps, as highlighted in the final statement.

Q- India is an important member of the  ‘International Thermonuclear Experimental Reactor’. If this experiment succeeds, what is the immediate advantage for India? (2016)

(a) It can use thorium in place of uranium for power generation

(b) It can attain a global role in satellite navigation

(c) It can drastically improve the efficiency of its fission reactors in power generation

(d) It can build fusion reactors for power generation

Answer- Option D

EXPLANATION

The International Thermonuclear Experimental Reactor (ITER) is a collaborative effort involving China, the European Union, India, Japan, Korea, Russia, and the United States. Together, these nations have embarked on a 35-year endeavor to construct and operate the ITER experimental device with the goal of advancing fusion technology to a point where a demonstration fusion reactor can be designed.
ITER represents a crucial milestone in testing the integrated technologies, materials, and physics regimes essential for the eventual commercialization of fusion-based electricity production. Should this experiment prove successful, India stands to benefit significantly by gaining the capability to develop fusion reactors for power generation.

Q- The term ‘IndARC’ sometimes seen in the news, is the name of? (2015)

a) an indigenously developed radar system inducted into Indian Defence

b) India’s satellite to provide services to the countries of Indian Ocean Rim

c) a scientific establishment set up by India in Antarctic region

d) India’s underwater observatory to scientifically study the Arctic region

Answer- Option D

EXPLANATION

IndARC, India’s inaugural underwater observatory situated within the Kongsfjorden fjord, positioned midway between Norway and the North Pole, operates at a depth of 192 meters. Its primary objective is to gather data concerning Arctic processes and their impact on the Indian monsoon system. By delving into these dynamics, IndARC contributes significantly to climate modeling endeavors and elucidates the responses of Arctic processes to climate fluctuations. Serving as a natural laboratory, it harnesses climate cues from both the Arctic and Atlantic realms to decode the intricacies of the annual seasonal cycle.

Q- With reference to ‘fuel cells’ in which hydrogen-rich fuel and oxygen are used to generate electricity, consider the following statements : (2015)

(1) If pure hydrogen is used as a fuel, the fuel cell emits heat and water as by-products.

(2) Fuel cells can be used for powering buildings and not for small devices like laptop computers.

(3) Fuel cells produce electricity in the form of Alternating Current (AC).

Which of the statements given above is / are correct?

(a) 1 only

(b) 2 and 3 only

(c) 1 and 3 only

(d) 1, 2 and 3

Answer- Option A

EXPLANATION

Statement 1 is accurate: When pure hydrogen is utilized as a fuel, fuel cells only produce heat and water as byproducts.

However, statement 2 is inaccurate: While fuel cells have the potential to power various portable devices and machines, such as laptops, cellular phones, and hearing aids, they are not limited to these applications. They could also power cars and other larger-scale equipment.

Similarly, statement 3 is also incorrect: Hydrogen-powered fuel cells are indeed more energy-efficient compared to traditional combustion technologies. Additionally, fuel cells generate electricity in the form of direct current (DC).

Q- With reference to ‘Near Field Communication (NFC) Technology’, which of the following statements is/are correct? (2015)

(1) It is a contactless communication technology that uses electromagnetic radio fields

(2) NFC is designed for use by devices which can be at a distance of even a metre from each other

(3) NFC can use encryption when sending sensitive information.

Select the correct answer using the code given below.

a) 1 and 2 only

b) 3 only

c) 1 and 3 only

d) 1, 2 and 3

Answer- Option C

EXPLANATION

Near Field Communication (NFC) represents a wireless communication technology that operates through electromagnetic radio frequency (RF), affirming Statement 1. Its fundamental frequency is set at 13.56 MHz. The essence of NFC lies in its capacity to facilitate data exchange between two devices via a simple touch gesture, contradicting Statement 2, which is incorrect.
Unlike other wireless technologies with longer operational ranges spanning several meters, NFC operates within a limited distance of a few centimeters, thus enhancing security by impeding potential attackers from intercepting communication. This aligns with Statement 3, which is accurate. Moreover, NFC can incorporate encryption mechanisms when transmitting sensitive data, bolstering its security features.

Q- In addition to fingerprint scanning, which of the following can be used in the biometric identification of a person? (2014)

(1) Iris scanning

(2) Retinal scanning

(3) Voice recognition

Select the correct answer using the code given below.

(a) 1 only

(b) 2 and 3 only

(c) 1 and 3 only

(d) 1, 2 and 3

Answer- Option D

EXPLANATION

Fingerprint scanning is one of the methods used in biometric identification to authenticate individuals. Another method is iris scanning, which involves capturing high-contrast photographs of a person’s iris using visible and near-infrared light.
Retinal scanning, on the other hand, maps the unique patterns of a person’s retina by analyzing the absorption of light by blood vessels. This method is highly accurate and challenging to deceive.
Voice recognition, meanwhile, is a software program capable of interpreting human speech to operate devices or execute commands.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.