1. Which one of the following memories is used to store data permanently

Which one of the following memories is used to store data permanently ?

Primary Memory
Secondary Memory
Cache Memory
Random Access Memory
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Secondary memory is used to store data permanently. Unlike primary memory (like RAM), which is volatile and loses data when the power is off, secondary memory is non-volatile and retains data for long periods.
– Primary memory (RAM, Cache) is primarily for active processing and temporary storage.
– Secondary memory provides persistent storage for operating systems, applications, and user data.
Examples of secondary memory include Hard Disk Drives (HDD), Solid State Drives (SSD), optical drives (CDs, DVDs), and flash memory devices (USB drives, SD cards).

2. Which one of the following is not a system software ?

Which one of the following is not a system software ?

UNIX
LINUX
WINDOWS 10
AUTOCAD
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Software can be broadly classified into system software and application software.
– System software includes operating systems, device drivers, compilers, assemblers, etc., which manage and control the computer hardware and provide a platform for running application software. UNIX, LINUX, and WINDOWS 10 are all operating systems, which are core examples of system software.
– Application software consists of programs designed for end-users to perform specific tasks, such as word processing, browsing the web, playing games, or creating designs. AUTOCAD is a Computer-Aided Design (CAD) application used for drafting and design, making it a type of application software.
– System software manages computer resources and provides a platform for applications.
– Application software performs specific tasks for the end-user.
– UNIX, LINUX, and WINDOWS 10 are operating systems (system software).
– AUTOCAD is a user-oriented design program (application software).
The distinction isn’t always rigid, as some software has characteristics of both (e.g., utilities included with an OS), but the primary function usually places it in one category.

3. Which one of the following is not a public-key cryptographic algorit

Which one of the following is not a public-key cryptographic algorithm ?

RSA
Diffie-Hellman
DES
DSS
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Public-key cryptography uses a pair of mathematically related keys: a public key for encryption (or verification) and a private key for decryption (or signing).
– RSA (Rivest–Shamir–Adleman) is a widely used public-key encryption and digital signature algorithm.
– Diffie-Hellman is a key exchange algorithm that allows two parties to establish a shared secret key over an insecure channel, foundational to many public-key systems.
– DES (Data Encryption Standard) is a symmetric-key block cipher. It uses the *same* secret key for both encryption and decryption. It is not a public-key algorithm.
– DSS (Digital Signature Standard) uses a public-key algorithm (DSA) to generate and verify digital signatures.
Therefore, DES is the one that is not a public-key cryptographic algorithm.
– Public-key cryptography uses separate keys for encryption/decryption or signing/verification.
– Symmetric-key cryptography uses the same key for encryption and decryption.
– DES is a symmetric-key algorithm.
Symmetric-key algorithms are generally much faster than public-key algorithms for bulk data encryption, while public-key algorithms are essential for secure key exchange, digital signatures, and non-repudiation.

4. Which one of the following protocols is used for secure communication

Which one of the following protocols is used for secure communication over computer network ?

HTTP
DHCP
SMTP
HTTPS
This question was previously asked in
UPSC CISF-AC-EXE – 2021
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over computer networks, particularly for accessing websites. It combines the standard HTTP protocol with an encryption layer, typically Transport Layer Security (TLS) or its predecessor Secure Sockets Layer (SSL). This encryption ensures that data transmitted between the user’s browser and the server is protected from eavesdropping and tampering.
– HTTP is the standard, non-secure web protocol.
– DHCP is used for assigning IP addresses.
– SMTP is used for sending email.
– HTTPS adds a security layer (TLS/SSL) to HTTP.
– It encrypts data exchanged between client and server, ensuring confidentiality and integrity.
While SMTP can be secured using extensions like STARTTLS or SMTPS, the base SMTP protocol itself is not secure. Similarly, other protocols have secure variants (e.g., SFTP for FTP, SSH for Telnet). HTTPS is the standard secure version for web communication.

5. Which one of the following is an Information Security Management Stand

Which one of the following is an Information Security Management Standard ?

ISO 9001
ISO 14001
ISO 27001
ISO 17025
This question was previously asked in
UPSC CISF-AC-EXE – 2021
ISO 27001 is an international standard for information security management systems (ISMS). It provides a framework for organizations to establish, implement, operate, monitor, review, maintain, and improve their information security. The other standards listed pertain to different management areas: ISO 9001 is for quality management, ISO 14001 is for environmental management, and ISO 17025 is for testing and calibration laboratories.
– ISO 27001 specifically addresses Information Security Management Systems (ISMS).
– Other ISO standards cover different management disciplines.
ISO 27001 is part of the ISO/IEC 27000 family of standards, which focuses on information security. Compliance with ISO 27001 demonstrates an organization’s commitment to managing information security risks effectively.

6. Which one of the following digital circuits is used as the basic compo

Which one of the following digital circuits is used as the basic component for storing data ?

Register
Counter
Flip-flop
Derived logic gates
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The basic component used for storing a single bit of data (a 0 or a 1) in sequential digital circuits is the flip-flop. A flip-flop is a bistable multivibrator, meaning it can exist in one of two stable states, which represent the two binary values. Registers and counters are built using multiple flip-flops connected in specific configurations to store multiple bits or count events, respectively. Derived logic gates (like NAND, NOR) are fundamental building blocks for constructing sequential circuits, including flip-flops, but they themselves do not inherently store data in a stable state over time without feedback loops forming a flip-flop.
– A flip-flop is a sequential circuit that can store one bit of data.
– Registers and counters are higher-level components built from flip-flops.
– Logic gates are combinatorial and do not store data unless configured in a sequential manner (e.g., within a flip-flop).
Common types of flip-flops include SR (Set-Reset), D (Data), JK, and T (Toggle) flip-flops. They are the fundamental memory elements in synchronous and asynchronous sequential circuits.

7. Which one of the following bits is reserved for the sign bit in signed

Which one of the following bits is reserved for the sign bit in signed-magnitude representation ?

LSB
MSB
Exactly the middle of the bits
Second bit from left side
This question was previously asked in
UPSC CISF-AC-EXE – 2021
In signed-magnitude representation, the most significant bit (MSB), which is the leftmost bit, is reserved to indicate the sign of the number. By convention, a 0 in the MSB indicates a positive number, and a 1 in the MSB indicates a negative number. The remaining bits represent the absolute magnitude of the number.
– Signed-magnitude representation uses one bit for the sign and the rest for magnitude.
– The MSB is the standard bit used for the sign.
– MSB = 0 for positive, MSB = 1 for negative.
Other signed number representations include one’s complement and two’s complement. While they also use the MSB as the sign bit, the way the magnitude of negative numbers is represented differs from signed-magnitude. Two’s complement is the most common method used in computers today because it simplifies arithmetic operations.

8. Which one of the following is the equivalent decimal value of Hexadeci

Which one of the following is the equivalent decimal value of Hexadecimal number 4A9.2 ?

1192.125
1193.125
1192.0125
1193.0125
This question was previously asked in
UPSC CISF-AC-EXE – 2021
To convert a hexadecimal number to a decimal number, we multiply each digit by the corresponding power of the base (16) and sum the results. The weights for positions to the left of the decimal point are increasing positive powers of 16 (16^0, 16^1, 16^2, etc., from right to left). The weights for positions to the right of the decimal point are increasing negative powers of 16 (16^-1, 16^-2, etc., from left to right).
The hexadecimal number is 4A9.2. The digits are 4, A, 9, and 2. The hexadecimal digit β€˜A’ corresponds to decimal 10.
Conversion:
4 * 16^2 + A * 16^1 + 9 * 16^0 + 2 * 16^-1
= 4 * 256 + 10 * 16 + 9 * 1 + 2 * (1/16)
= 1024 + 160 + 9 + 0.125
= 1193 + 0.125
= 1193.125
– Hexadecimal numbers are converted to decimal by summing the product of each digit and the corresponding power of 16.
– Hexadecimal digits A-F represent decimal values 10-15.
The decimal point in hexadecimal acts as the separator between positive and negative powers of the base, similar to the decimal point in the decimal system.

9. Which one of the following is the equivalent 8421BCD code of the decim

Which one of the following is the equivalent 8421BCD code of the decimal number 87.34 ?

10000111.00110100
10100111.00110100
10001110.11000010
10101110.11000010
This question was previously asked in
UPSC CISF-AC-EXE – 2021
8421 BCD (Binary Coded Decimal) represents each decimal digit by its 4-bit binary equivalent using the weights 8, 4, 2, and 1. To convert the decimal number 87.34 to 8421 BCD, we convert each digit individually:
– Decimal 8: 1000 (8*1 + 4*0 + 2*0 + 1*0 = 8)
– Decimal 7: 0111 (8*0 + 4*1 + 2*1 + 1*1 = 7)
– Decimal point remains the same.
– Decimal 3: 0011 (8*0 + 4*0 + 2*1 + 1*1 = 3)
– Decimal 4: 0100 (8*0 + 4*1 + 2*0 + 1*0 = 4)
Combining these, we get 1000 0111 . 0011 0100. Option A matches this code.
– 8421 BCD represents each decimal digit with its 4-bit binary value.
– The decimal point position is preserved in BCD representation.
BCD is a non-positional system for digits but positional for the number as a whole (e.g., the position of the decimal point matters). While simple for conversion, it is less efficient in terms of storage compared to pure binary representation.

10. Which one of the following technologies is not a touch-screen technolo

Which one of the following technologies is not a touch-screen technology ?

Resistive technology
Surface technology
Inductive technology
Capacitive technology
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Among the given options, Inductive technology is typically used for stylus input rather than general finger touch-screen operation. Resistive, Surface (e.g., Surface Acoustic Wave – SAW, Surface Capacitive), and Capacitive (e.g., Projective Capacitive) technologies are widely recognized and used as touch-screen methods that respond directly to finger contact (or a conductive object in the case of capacitive). Inductive technology works by sensing an electromagnetic field generated by a specialized stylus interacting with a grid underneath the screen, making it less suitable for passive finger touch.
– Resistive, Surface (SAW, Capacitive), and Capacitive are common touch-screen technologies for finger input.
– Inductive technology primarily relies on electromagnetic resonance with a powered stylus and is not a standard finger-touch technology.
Resistive touch screens work by pressing two layers together. Capacitive touch screens work by sensing the change in capacitance when a conductive object (like a finger) touches the screen. SAW touch screens use ultrasonic waves on the screen surface. Infrared touch screens use infrared beams or imaging.

Exit mobile version