On account of the disruption in education due to the corona pandemic, we're are providing a 7-day Free trial of our platform to teachers. Know More →

UPSC

Explore popular questions from Science and Technology (General Science) for UPSC. This collection covers Science and Technology (General Science) previous year UPSC questions hand picked by experienced teachers.

Select Subject

Geography

Indian Polity and Governance

Economic and Social Development

Ecology, Biodiversity and Climate Change

Mental Ability and Management Ability

General Knowledge

General Science

Current Affairs

History

Science and Technology (General Science)

Correct Marks 2

Incorrectly Marks -0.67

Q 1. Computer virus is a

A

fungus

B

bacgterium

C

IC 7344

software program

Explanation

A computer virus is a software program and it’s objective is to destroy data or other programs by entering into to computer system. The viruses are built by man and they enter into the computer system by making their duplicates. Now the antivirus programs have been made to prevent the entrance of viruses in the computer system.

Correct Marks 2

Incorrectly Marks -0.67

Q 2. What is the portion of RAM that a computer microprocessor can access more quickly than it can access regular RAM?

Cache

B

Processor

C

Memory Pool

D

Data Pool

Explanation

Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM.

Correct Marks 2

Incorrectly Marks -0.67

Q 3. The ability to perform ‘what if?’ analysis is key feature of which type of software?

A

Desktop publishing program

Spreadsheet

C

Presentation

D

Word processor

Explanation

A spreadsheet is an interactive computer application for organization, analysis, and storage of data in tabular form. Spreadsheets are developed as computerized simulations of paper accounting worksheets. The program operates on data entered in cells of a table.

Correct Marks 2

Incorrectly Marks -0.67

Q 4. To move to the bottom of a document, press ..........

A

Home key

End key

C

Ctrl + End

D

Insert key

Correct Marks 2

Incorrectly Marks -0.67

Q 5. The process of writing computer instructions in a programming language is known as—

A

File

B

Processing

Coding

D

Folder

Correct Marks 2

Incorrectly Marks -0.67

Q 6. If you copy and paste a file—

The original file remains unchanged and a new file is created

B

The file gets scanned

C

The original file is removed and a new file is not created

D

The original file remains unchanged and a new file is not created

Correct Marks 2

Incorrectly Marks -0.67

Q 7. A function inside another function in excel is called—

A

Round function

B

Sum function

Nested function

D

Double function

Explanation

In computer programming, a nested function is a function that is defined within another function, the enclosing function. Due to simple recursive scope rules, a nested function is itself invisible outside of its immediately enclosing function but can see (access) all local objects (data, functions, types, etc) of its immediately enclosing function as well as of any function(s) which, in turn, encloses that function.

Correct Marks 2

Incorrectly Marks -0.67

Q 8. Which of the following best describes a private, company wide network, closed to public access?

A

Intranet

B

Internet

Virtual Private Network

D

Cloud Computing

Explanation

A virtual private network extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Correct Marks 2

Incorrectly Marks -0.67

Q 9. Which one of the following would not be considered as a form of secondary storage?

A

hard disk

RAM

C

optical disk

D

floppy disk

Correct Marks 2

Incorrectly Marks -0.67

Q 10. Which of the following space agencies has launched the LISA Pathfinder?

A

Japan Aerospace Exploration Agency

B

NASA

European Space Agency

D

China National Space Administration

Explanation

The European Space Agency is an intergovernmental organisation of 22 member states dedicated to the exploration of space.

Correct Marks 2

Incorrectly Marks -0.67

Q 11. The first commercial product produced through genetic engineering is—

A

Paracetamol

B

Aspirin

insulin

D

None of these

Correct Marks 2

Incorrectly Marks -0.67

Q 12. With reference to IT Jargon ‘Daemon’, which of the following statements is/are correct?
1. In multitasking computer operating systems.
2. A daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
3. The term was coined by the programmers of MIT's Project MAC.
Which of the above sentence (s) is/are true?

A

1 and 2

B

3 Only

C

2 and 3

1, 2 and 3

Correct Marks 2

Incorrectly Marks -0.67

Q 13. Which of the following is not a means of communication?

A

Darknet

B

Internet

C

Bluetooth

Snapdeal

Correct Marks 2

Incorrectly Marks -0.67

Q 14. Which of the following statements is correct about ‘shanghai technique’?
I. Shanghai Technique is to shape lesson so that it concentrates on a single concept.
II. UK has experimentally adopted this system.
III. It involves interactive teaching to an all-ability group in classroom.
IV. Subject covered in depth. Class docs not move on till every student has performed well with the lesson.

A

II and IV are correct

B

Only 1V is correct

C

Only I is correct

All are correct

Correct Marks 2

Incorrectly Marks -0.67

Q 15. The service of the Internet that provides ‘audio’ and ‘video’ conversation, is called—

A

chat

B

e-mail

video conferencing

D

video chat

Explanation

Video conferencing is the conduct of a video conference by a set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called ‘visual collaboration' and is a type of groupware.

Correct Marks 2

Incorrectly Marks -0.67

Q 16. Which of the following is not a Web browser?

A

Opera

Google Apps

C

Vivaldi

D

Mozilla Firefox

Correct Marks 2

Incorrectly Marks -0.67

Q 17. In the context of computer security, crackers are also known as—

black hat hackers

B

white hat hackers

C

elite hackers

D

script kiddie

Explanation

A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers.

Correct Marks 2

Incorrectly Marks -0.67

Q 18. Ethernet is an example of—

A

MAN

LAN

C

WAN

D

Wi-Fi

Explanation

Ethernet is a network protocol that controls how data is transmitted over a LAN (Local Area Network). Technically it is referred to as the IEEE 802-3 protocol. The protocol has evolved and improved over time and can now deliver at the speed of a gigabit per second.

Correct Marks 2

Incorrectly Marks -0.67

Q 19. The set of protocols, which defines all transmission exchanges across the internet is called—

A

CSMA/CD

TCP/IP

C

FDDI

D

None of the above

Explanation

TCP/IP are the set of protocols, which defines all transmission exchanges across the internet.

Correct Marks 2

Incorrectly Marks -0.67

Q 20. Put the following units of storage into the correct order, starting with the smallest unit first and going down to the largest unit:
(A) Kilobyte
(B) Byte
(C) Megabyte
(D) Terabyte
(E) Gigabyte
(F) Bit
Give your answer from the following code :

A

(F), (B), (A), (C), (D), (E)

B

(F), (B), (A), (D), (E), (C)

(F), (B), (A), (C), (E), (D)

D

(F), (B), (A), (D), (C), (E)

Explanation

Data Measurement Size
Bit Single Binary Digit (I or 0)
Byte 8 bits
Kilobyte (KB) 1, 024 Bytes
Megabyte (MB) 1,024 Kilobytes
Gigabyte (GB) 1, 024 Megabytes
Terabyte ( TB) 1,024 Gigabytes
Petabyte (PB) 1,024 Terabytes
Exabyte (EB) 1, 024 Petabytes

Correct Marks 2

Incorrectly Marks -0.67

Q 21. Indian government’s target for power production from small hydro projects by the year 2022 is

A

1 Giga-Watt

5 Giga-Watt

C

10 Giga-Watt

D

15 Giga-Watt

Explanation

Indian government’s target for power production from small hydro projects by the year 2022 is 5 Giga-Watt. On the other hand, from solar power, it is 100 GW. 60 GW from wind. 10 GW from biomass, according to the ministry of new and renewable energy.

Correct Marks 2

Incorrectly Marks -0.67

Q 22. Which of the following is not an output device?

A

Printer

B

Speaker

C

Monitor

Keyboard

Explanation

The Keyboard is an input device. Modem is both input as well as output while keyboard is exclusively input device. An output device is any peripheral that receives data from a computer, usually for display, projection, or physical reproduction.

Correct Marks 2

Incorrectly Marks -0.67

Q 23. Which of the following represents one billion characters?

A

Kilobyte

B

Megabyte

Gigabyte

D

Terabyte

Explanation

A gigabyte is a unit of data storage capacity that is roughly equivalent to I billion bytes. A gigabyte, which uses the abbreviation GB. has been a common unit of capacity measurement for data storage products since the mid-1980s.

Correct Marks 2

Incorrectly Marks -0.67

Q 24. Which one of the following is not a seareh engine?

A

Google

Chrome

C

Yahoo

D

Bing

Explanation

Top 10 most popular seareh engines in the world -Google, Bing, Yahoo, Ask.com, AOL.com. Baidu. Wolframalpha, DuckDuckGo while Chrome is a free Internet browser.

Correct Marks 2

Incorrectly Marks -0.67

Q 25. gif, jpg, bmp, png are used as extensions for files which store

A

Audio data

Image data

C

Video data

D

Text data

Explanation

The most common image file formats, the most important for cameras, printing, scanning, and internet use. are JPG, TIP. PNG, and GIF. JPG is the most used image file format. JPG is the file extension for JPEG files (Joint Photographic Experts Group, the committee of ISO and ITU).