41. In an artificial language, some words are translated as given below (n

In an artificial language, some words are translated as given below (not in order):
bie cie fie (good persons sing)
cie fie gie (sing good lyrics)
hie gie fie (love good lyrics)
What is the translation for ‘persons love lyrics’?

cie hie gie
hie gie fie
bie hie gie
fie bie cie
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct answer is (C) bie hie gie. By analyzing the provided translations and finding common words, we can decode the meaning of each artificial word.
– Given:
1. bie cie fie (good persons sing)
2. cie fie gie (sing good lyrics)
3. hie gie fie (love good lyrics)
– Comparing 1 and 2: Common words are “cie” and “fie” corresponding to “sing” and “good”.
– Comparing 2 and 3: Common words are “gie” and “fie” corresponding to “lyrics” and “good”.
– From the comparisons, “fie” is common to both sets and corresponds to the common English word “good”. So, fie = good.
– Using fie = good:
– From 2: cie fie gie becomes cie good gie (sing good lyrics). This means {cie, gie} corresponds to {sing, lyrics}.
– From 3: hie gie fie becomes hie gie good (love good lyrics). This means {hie, gie} corresponds to {love, lyrics}.
– Combining {cie, gie} = {sing, lyrics} and {hie, gie} = {love, lyrics}, the common word “gie” corresponds to “lyrics”. So, gie = lyrics.
– Using fie = good and gie = lyrics:
– From 2: cie good lyrics (sing good lyrics). This means cie = sing.
– From 3: hie lyrics good (love good lyrics). This means hie = love.
– Using fie = good, cie = sing:
– From 1: bie sing good (good persons sing). This means bie = persons.
– Final mappings: bie = persons, cie = sing, fie = good, gie = lyrics, hie = love.
– The translation for ‘persons love lyrics’ is ‘bie hie gie’.
This method of solving, known as cryptarithmetic or symbol decoding, involves identifying patterns and common elements across different statements to deduce the meaning of individual components. The order of words in the target phrase ‘persons love lyrics’ corresponds to the order of the translated words in the option ‘bie hie gie’.

42. Suppose P and Q are distinct two-digit numbers consisting of the same

Suppose P and Q are distinct two-digit numbers consisting of the same digits. Then P-Q is

a prime number
an even number
an odd number
divisible by 9
This question was previously asked in
UPSC CISF-AC-EXE – 2019
The correct answer is (D) divisible by 9. Let the two distinct two-digit numbers be P and Q, formed by the digits ‘a’ and ‘b’. Since they are distinct two-digit numbers consisting of the same digits, the digits must be distinct (a ≠ b) and non-zero (otherwise one number would be a single digit). Let P = 10a + b and Q = 10b + a (where a and b are single digits from 1-9, a ≠ b).
– The difference P – Q = (10a + b) – (10b + a) = 9a – 9b = 9(a – b).
– Since ‘a’ and ‘b’ are distinct digits, (a – b) is a non-zero integer.
– Therefore, the difference P – Q is always a multiple of 9.
– Any multiple of 9 is divisible by 9.
Let’s test the other options with an example: P=72, Q=27. P-Q = 72-27 = 45.
– Is 45 a prime number? No.
– Is 45 an even number? No.
– Is 45 an odd number? Yes. But consider P=31, Q=13. P-Q = 31-13 = 18, which is even. So it’s not always odd.
– Is 45 divisible by 9? Yes (45 / 9 = 5).
The property P-Q = 9(a-b) guarantees divisibility by 9 for any pair of distinct two-digit numbers formed by swapping two distinct digits (assuming both digits are non-zero to ensure two distinct two-digit numbers, or carefully considering the case with digit 0, which would mean numbers like 20 and 02, but 02 is not a two-digit number, confirming our assumption that both digits must be non-zero).

43. Consider the following statements about the cache memory: It is a no

Consider the following statements about the cache memory:

  • It is a non-volatile memory.
  • It is a slow-read and inexpensive memory.
  • It is a fast-read and expensive memory.
  • It is a small-sized memory.

Which of the above statements are correct?
Select the correct answer using the codes given below:

1 and 2 only
3 and 4 only
1 and 3 only
1, 3 and 4 only
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (B) 3 and 4 only. Cache memory is known for being very fast, expensive per unit of storage, and small in size compared to main memory (RAM). It is typically implemented using SRAM (Static Random-Access Memory), which is volatile.
– Statement 1: It is a non-volatile memory. This is incorrect. Cache memory is usually made of SRAM, which is volatile; it loses its contents when power is removed. Non-volatile memory includes ROM, Flash, SSDs, etc.
– Statement 2: It is a slow-read and inexpensive memory. This is incorrect. Cache is designed for fast access (fast-read) and is more expensive than main memory or secondary storage.
– Statement 3: It is a fast-read and expensive memory. This is correct. Cache memory is located closer to the CPU and is significantly faster than main RAM. This speed comes at a higher cost per bit.
– Statement 4: It is a small-sized memory. This is correct. Cache memory is much smaller than main memory due to its high cost and the need for speed (smaller size allows faster access).
Cache memory acts as a high-speed buffer between the CPU and main memory (RAM) to reduce memory access time. It stores frequently used data and instructions so that the CPU can retrieve them much faster than fetching them from RAM. There are typically multiple levels of cache (L1, L2, L3), with L1 being the smallest and fastest, and L3 being the largest and slowest among the cache levels, but still faster than RAM.

44. Compiler, Interpreter and Assembler are

Compiler, Interpreter and Assembler are

System software
Hardware
Application software
None of the above
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (A) System software. Compilers, Interpreters, and Assemblers are programs that are part of the system software stack. They are essential tools used to translate programming code into machine-readable instructions, which are required for the computer hardware to execute programs.
– System software is software that manages and controls computer hardware and provides a platform for running application software. Examples include operating systems, device drivers, utilities, and language processors like compilers and interpreters.
– Compilers translate source code written in a high-level programming language into machine code or an intermediate code all at once before execution.
– Interpreters translate and execute source code line by line.
– Assemblers translate assembly language code into machine code.
– (B) Hardware refers to the physical components of a computer system.
– (C) Application software consists of programs designed for end-users to perform specific tasks, such as word processing (MS-Word), browsing the web (Chrome), or playing games.

45. In computer security, which one of the following means that the inform

In computer security, which one of the following means that the information in a computer system can only be accessed by authenticated parties ?

Confidentiality
Integrity
Availability
Reliability
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms.
– Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security.
– Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do.
– Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.
– (B) Integrity ensures that data is accurate, complete, and has not been tampered with or modified in an unauthorized way.
– (C) Availability ensures that systems, services, and data are accessible to authorized users when needed.
– (D) Reliability refers to the ability of a system to perform its intended function correctly and consistently over time. While related to availability and integrity, it is not the primary term for restricting access to authenticated parties.

46. Which one of the following is *not* a database management software ?

Which one of the following is *not* a database management software ?

Oracle
MySQL
MS-Access
MS-Word
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (D) MS-Word. MS-Word is a word processing software used for creating and editing text documents. It is not designed for managing structured databases.
– A Database Management System (DBMS) is a software system used for creating, managing, and interacting with databases.
– DBMS software allows users to store, organize, retrieve, and manipulate large amounts of data efficiently.
– (A) Oracle is a powerful, widely used commercial relational database management system.
– (B) MySQL is a popular open-source relational database management system.
– (C) MS-Access is a database management system included in the Microsoft Office suite, suitable for smaller databases.
– These three options are indeed examples of database management software.

47. Which one of the following is a pointing device ?

Which one of the following is a pointing device ?

Scanner
Optical Mouse
Printer
Keyboard
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (B) Optical Mouse. An optical mouse is a standard input device used to move a cursor or pointer on a computer screen, allowing users to interact with graphical user interfaces.
– Pointing devices are hardware input devices that allow a user to control a cursor in a GUI (Graphical User Interface) and select objects.
– Examples of pointing devices include mouse (mechanical, optical, laser), trackball, touchpad, pointing stick, joystick, light pen, and touchscreen.
– (A) Scanner is an input device that captures images or documents but is not used for controlling a pointer.
– (C) Printer is an output device that produces hard copies of digital documents.
– (D) Keyboard is an input device primarily used for entering text and commands, not for pointing.

48. Eavesdropping is a computer fraud technique to

Eavesdropping is a computer fraud technique to

listen to private voice or data transmission.
prevent the system from processing or responding to the legitimate users.
disable the network connectivity.
delete data.
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network.
– Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow.
– It is a breach of confidentiality, one of the key principles in computer security.
– Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.
Options (B), (C), and (D) describe other types of malicious activities:
– (B) preventing the system from processing or responding to legitimate users is characteristic of a Denial-of-Service (DoS) attack.
– (C) disabling network connectivity can be a form of DoS attack or physical sabotage.
– (D) deleting data is a form of data tampering or destruction, related to breaches of integrity and availability.

49. Which one of the following is a computer security device ?

Which one of the following is a computer security device ?

Modem
Compiler
Firewall
Interpreter
This question was previously asked in
UPSC CISF-AC-EXE – 2018
A Firewall is a computer security device.
– A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
– It acts as a barrier between a trusted internal network and untrusted external networks (like the internet).
– Modems are networking devices for internet access. Compilers and Interpreters are software tools for programming languages.
Firewalls can be implemented in hardware, software, or both, and are essential for protecting networks and individual computers from unauthorized access and various forms of cyber threats.

50. Which one of the following is the correct sequence of the different st

Which one of the following is the correct sequence of the different states of a process in process management function of an operating system ?

New, Ready, Waiting, Executing, Terminating
New, Waiting, Ready, Executing, Terminating
New, Waiting, Ready, Terminating, Executing
Ready, New, Waiting, Executing, Terminating
This question was previously asked in
UPSC CISF-AC-EXE – 2018
Option A lists the common process states in an order that represents a possible, although simplified, transition sequence in process management: New, Ready, Waiting, Executing, Terminating.
– Standard process states include: New (process being created), Ready (waiting to be assigned to a processor), Running/Executing (instructions are being executed), Waiting/Blocked (waiting for some event to occur, e.g., I/O completion), and Terminated (process has finished execution).
– A typical transition sequence is: New -> Ready -> Running -> Terminated.
– From Running, a process can go to Waiting (e.g., for I/O) or Terminated.
– From Waiting, a process goes back to Ready when the event occurs.
– While the transition Ready -> Waiting is not standard in basic models, Option A includes the key states in an order that, compared to the clearly incorrect sequences in B, C, and D, is the most plausible interpretation of a simplified or specific state model used by the question setter, where perhaps ‘Waiting’ represents a state a process enters after being Ready but before getting the CPU if certain resources are needed immediately. However, the standard transition from Waiting is back to Ready, not directly to Executing. Despite this, A lists the common states in an order that is less incorrect than the others.
The most standard simplified diagram shows transitions: New -> Ready -> Running -> Terminated, and Running <-> Waiting. A process moves from Ready to Running when scheduled, from Running to Waiting on I/O request, and from Waiting back to Ready on I/O completion. From Running, it moves to Terminated upon completion.