1. Which one of the following protocols is used for secure communication

Which one of the following protocols is used for secure communication over a computer network ?

HTTPS
HTTP
FTP
DHCP
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet.
– HTTPS is the secure version of HTTP, where ‘S’ stands for Secure.
– It uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption to secure the connection between a user’s browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.
– HTTP (Hypertext Transfer Protocol) is the standard protocol for transmitting web pages but does not provide encryption, making it insecure for sensitive data like passwords or credit card information.
– FTP (File Transfer Protocol) is used for transferring files between computers. While secure versions exist (like SFTP or FTPS), the standard FTP is not secure.
– DHCP (Dynamic Host Configuration Protocol) is a network management protocol used for dynamically assigning IP addresses and other network configuration parameters to devices on a network. It is not a communication protocol for data transfer in the same sense as HTTP or HTTPS.

2. The ISO/IEC 27001 Standard is for :

The ISO/IEC 27001 Standard is for :

Information Security Management.
Quality Management.
Risk Management.
Environmental Management.
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The ISO/IEC 27001 standard is the international standard for Information Security Management Systems (ISMS). It provides a framework for organizations to establish, implement, operate, monitor, review, maintain, and improve their information security practices.
ISO/IEC 27001 is the leading international standard specifically focused on Information Security Management.
Other ISO standards cover different management areas: ISO 9001 is for Quality Management Systems, ISO 31000 provides guidelines for Risk Management, and the ISO 14000 family of standards deals with Environmental Management Systems. ISO/IEC 27001 is jointly published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

3. Which one of the following is not a raster image format ?

Which one of the following is not a raster image format ?

JPEG
GIF
PNG
SVG
This question was previously asked in
UPSC CISF-AC-EXE – 2022
A raster image format stores images as a grid of pixels, where each pixel contains colour information. JPEG, GIF, and PNG are all popular file formats that store images using this pixel-based approach. SVG (Scalable Vector Graphics), on the other hand, is a vector image format. Vector images are composed of mathematical descriptions of geometric shapes, lines, and curves, making them scalable without loss of quality.
Raster images are pixel-based, while vector images are based on mathematical descriptions. SVG is a vector format.
Common raster formats include BMP, TIFF, and WebP in addition to JPEG, GIF, and PNG. Vector formats are often used for logos, illustrations, and graphics that need to be resized frequently because they scale smoothly without pixelation.

4. Which one of the following is a technique of dividing the physical mem

Which one of the following is a technique of dividing the physical memory space into multiple blocks ?

Fragmentation
Paging
Segmentation
Swapping
This question was previously asked in
UPSC CISF-AC-EXE – 2022
Paging is a memory management technique that divides the physical memory (RAM) into fixed-size units called frames and the logical address space of a process into equally sized units called pages. It is a method of dividing physical memory into blocks (frames) to facilitate non-contiguous memory allocation and virtual memory implementation.
Paging divides physical memory into fixed-size frames and logical memory into same-size pages, enabling processes to be loaded into non-contiguous physical memory locations.
Fragmentation refers to wasted space in memory. Segmentation divides logical memory into variable-size segments based on the program’s structure. Swapping is a technique to move processes between memory and disk to manage limited physical memory resources, not a method of dividing physical memory into blocks for allocation.

5. The result of binary subtraction between 1001 and 101 is :

The result of binary subtraction between 1001 and 101 is :

1011
1001
001
100
This question was previously asked in
UPSC CISF-AC-EXE – 2022
To subtract 101 (binary) from 1001 (binary), we perform binary subtraction:
1001 (which is 9 in decimal)
– 0101 (which is 5 in decimal, added a leading zero for alignment)
——-
Starting from the rightmost bit:
1 – 1 = 0
0 – 0 = 0
0 – 1: Cannot subtract. Borrow from the leftmost digit (1). The leftmost 1 becomes 0. The borrowed 1 moves to the left, making the next position 2 (in base 2). So, we have 2 – 1 = 1.
The leftmost digit is now 0.
Result: 0100 (binary), which is 100 (binary) when the leading zero is dropped.
100 (binary) is 1*2^2 + 0*2^1 + 0*2^0 = 4 (decimal). 9 – 5 = 4.
Binary subtraction follows similar principles to decimal subtraction, using borrowing when a smaller digit is being subtracted from a larger one.
Binary arithmetic is fundamental in digital electronics and computer science. Subtraction can also be performed using two’s complement representation and binary addition. In this case, direct subtraction is straightforward.

6. Debugger is a :

Debugger is a :

Software.
Hardware.
Combination of software and hardware.
None of the above
This question was previously asked in
UPSC CISF-AC-EXE – 2022
A debugger is a software tool used by programmers to test and find errors (bugs) in other software programs. It allows developers to step through code execution, inspect variables, and analyze program behaviour to identify the root cause of issues.
Debuggers are software applications used to aid in the process of software development by helping to locate and fix errors in code.
While debugging hardware systems (like embedded systems) may involve hardware interfaces (like JTAG adapters), the debugger application running on a host computer is fundamentally a piece of software. The question asks what the debugger *is*, referring to the tool itself.

7. How many input lines are there in the NOT gate ?

How many input lines are there in the NOT gate ?

2
1
3
4
This question was previously asked in
UPSC CISF-AC-EXE – 2022
A NOT gate, also known as an inverter, is a basic digital logic gate that performs logical negation. It takes a single binary input and produces an output that is the opposite logic level (0 becomes 1, and 1 becomes 0). Therefore, it has exactly one input line.
The NOT gate is a unary operation, meaning it operates on a single input.
Other basic logic gates like AND, OR, XOR, NAND, and NOR typically have two or more input lines. The output of a NOT gate is always the complement of its input.

8. How many bits combination is present in a Byte?

How many bits combination is present in a Byte?

2
4
8
16
This question was previously asked in
UPSC CISF-AC-EXE – 2022
A byte is the fundamental unit of data storage in computer systems, typically defined as a sequence of 8 bits.
A byte consists of 8 bits, which is the smallest addressable unit of memory for most modern computer architectures.
A bit is the smallest unit of data, representing a binary value (0 or 1). A group of 4 bits is called a nibble. Larger units include words, which consist of varying numbers of bytes depending on the computer architecture (e.g., 2 bytes for a 16-bit word, 4 bytes for a 32-bit word, 8 bytes for a 64-bit word).

9. 1 KB is equivalent to :

1 KB is equivalent to :

1042 bytes.
1023 bytes.
1021 bytes.
1024 bytes.
This question was previously asked in
UPSC CISF-AC-EXE – 2022
In the context of computer memory and storage, 1 KB (Kilobyte) is conventionally understood as 210 bytes.
The standard definition of a Kilobyte in computing is 1024 bytes, based on powers of 2 (210).
While the SI definition of kilo (k) is 103 (1000), computer science traditionally uses powers of 2. This led to ambiguity, and standards bodies like IEC introduced prefixes like kibi (Ki) for 210 (1024) and kilo (k) for 103 (1000). However, in common usage for memory sizes, KB still widely refers to 1024 bytes. For storage devices like hard drives and network speeds, kilo often means 1000. Given the options, 1024 is the expected answer for a computer science context.

10. Which one of the following is a sequential electronic circuit that is

Which one of the following is a sequential electronic circuit that is used to store 1-bit information?

Register
Flip-flop
Counter
Accumulator
This question was previously asked in
UPSC CISF-AC-EXE – 2022
A flip-flop is a basic sequential logic circuit that has two stable states and can store one bit of binary information (0 or 1). It is the fundamental building block for memory elements in digital electronics.
Flip-flops are the elementary memory units in sequential circuits, capable of storing a single bit of data and changing state based on input signals and clock pulses.
A register is a collection of multiple flip-flops used to store a group of bits (e.g., a byte or a word). A counter is a sequential circuit that cycles through a sequence of states, often counting pulses, and is typically constructed using flip-flops. An accumulator is a type of register used in central processing units (CPUs) for performing arithmetic and logic operations.