top of page

1

With reference to "Blockchain Technology" consider the following statements:
(1) It is a public ledger that everyone can inspect, but which no single user controls.
(2) The structure and design of blockchain is such that all the data in it are about
cryptocurrency only.
(3) Applications that depend on basic features of blockchain can be developed without
anybody's permission.
Which of the statements given above is/are correct?

2

Consider the following activities:
(1) Spraying pesticides on a crop field
(2) Inspecting the craters of active volcanoes
(3) Collecting breath samples from spouting whales for DNA analysis
At the present level of technology, which of the above activities can be successfully
carried out by using drones?

3

With reference to Non-Fungible Tokens (NFTs), consider the following statements:

1. They enable the digital representation of physical assets.
2. They are unique cryptographic tokens that exist on a blockchain.
3. They can be traded or exchanged at equivalency and therefore can be used as a medium of commercial transactions.

Which of the statements given above are correct?

4

In India, under cyber insurance for individuals, which of the following benefits are
generally covered, in addition to payment for the loss of funds and other benefits?
1. Cost of restoration of the computer system in case of malware disrupting access to
one�s computer
2. Cost of a new computer if some miscreant wilfully damages it, if proved so
3. Cost of hiring a specialized consultant to minimize the loss in case of cyber extortion
4. Cost of defence in the Court of Law if any third party files a suit
Select the correct answer using the code given below

5

With reference to Web 3-0, consider the following statements:

1. Web 3.0 technology enables people to control their own data.
2. In Web 3.0 world, there can be blockchain based social networks.
3. Web 3.0 is operated by users collectively rather than a corporation.

Which of the statements given above are correct?

6

In India, the term "Public Key Infrastructure" is used in the context of

7

With reference to "Software as a Service (SaaS)", consider the following statements:

1. SaaS buyers can customise the user interface and can change data fields.
2. SaaS users can access their data through their mobile devices.
3. Outlook, Hotmail and Yahoo! Mail are forms of SaaS.

Which of the statements given above are correct?

8

With the present state of development, Artificial Intelligence can effectively do which of
the following?
(1) Bring down electricity consumption in industrial units
(2) Create meaningful short stories and songs
(3) Disease diagnosis
(4) Text-to-Speech Conversion
(5) Wireless transmission of electrical energy
Select the correct answer using the code given below:

Responses has been submitted

An error occurred. Try again later

bottom of page