121. Consider the following: Aarogya Setu CoWIN DigiLocker DIKSHA Whi

Consider the following:

  • Aarogya Setu
  • CoWIN
  • DigiLocker
  • DIKSHA

Which of the above are built on top of open-source digital platforms ?

[amp_mcq option1=”1 and 2 only” option2=”2, 3 and 4 only” option3=”1, 3 and 4 only” option4=”1, 2, 3 and 4″ correct=”option4″]

This question was previously asked in
UPSC IAS – 2022
All four platforms mentioned (Aarogya Setu, CoWIN, DigiLocker, DIKSHA) are built on or utilize open-source digital platforms/components to a significant extent.
– Aarogya Setu: While initially launched with proprietary code, the core code of Aarogya Setu was later open-sourced by the Indian government.
– CoWIN: The CoWIN platform’s architecture and several components leverage open-source technologies. The government has emphasized its development on open standards and open-source principles.
– DigiLocker: DigiLocker is built on open-source cloud infrastructure (like Apache CloudStack) and utilizes open standards and APIs (like Aadhaar API) for interoperability. Its platform components are also partly open-sourced or designed with open principles.
– DIKSHA: DIKSHA is built on the Sunbird platform, which is an open-source digital infrastructure specifically designed for learning and knowledge sharing, developed by EkStep Foundation.
The Indian government has promoted the adoption of open-source software in its e-governance initiatives to ensure transparency, cost-effectiveness, security, and interoperability. These platforms are examples of this policy in action, leveraging open-source foundations or open-sourcing their own code.

122. With reference to Non-Fungible Tokens (NFTs), consider the following s

With reference to Non-Fungible Tokens (NFTs), consider the following statements:

  • 1. They enable the digital representation of physical assets.
  • 2. They are unique cryptographic tokens that exist on a blockchain.
  • 3. They can be traded or exchanged at an equivalency and therefore can be used as a medium of commercial transactions.

Which of the statements given above are correct ?

[amp_mcq option1=”1 and 2 only” option2=”2 and 3 only” option3=”1 and 3 only” option4=”1, 2 and 3″ correct=”option1″]

This question was previously asked in
UPSC IAS – 2022
Statements 1 and 2 regarding Non-Fungible Tokens (NFTs) are correct, while statement 3 is incorrect.
– Statement 1: NFTs can represent ownership of both digital assets (like digital art, music, videos) and physical assets (like real estate, collectibles, event tickets) in the digital realm.
– Statement 2: An NFT is by definition a unique, non-interchangeable unit of data stored on a digital ledger (blockchain). Each NFT has a unique identifier and metadata.
– Statement 3: NFTs are non-fungible, meaning each token is unique and not interchangeable with another NFT on a one-to-one basis. This is in contrast to fungible tokens (like Bitcoin or standard currency), which can be exchanged at an equivalency and used as a medium of commercial transactions. While NFTs can be bought and sold, they are typically traded for fungible cryptocurrencies or fiat currency, and are not used *as* a medium of commercial exchange themselves due to their uniqueness.
NFTs derive their value from the uniqueness and verifiable ownership they represent, often for digital items. They have become prominent in the art world, gaming, and collectibles market.

123. With reference to “Blockchain Technology”, consider the following stat

With reference to “Blockchain Technology”, consider the following statements :

  • 1. It is a public ledger that everyone can inspect, but which no single user controls.
  • 2. The structure and design of blockchain is such that all the data in it are about cryptocurrency only.
  • 3. Applications that depend on basic features of blockchain can be developed without anybody’s permission.

Which of the statements given above is/are correct ?

[amp_mcq option1=”1 only” option2=”1 and 2 only” option3=”2 only” option4=”1 and 3 only” correct=”option4″]

This question was previously asked in
UPSC IAS – 2020
Statement 1 is correct. A public blockchain is a decentralized, distributed ledger technology where transaction data is typically transparent and accessible to all participants on the network. It is not controlled by any single entity. Statement 2 is incorrect. While blockchain technology underpins cryptocurrencies like Bitcoin, its applications extend far beyond cryptocurrency. It can be used to record and verify any type of data or transaction, including supply chain management, digital identity, voting systems, and more. Statement 3 is correct. On permissionless blockchains (like Bitcoin or Ethereum), anyone can develop and deploy applications (decentralized applications or DApps) that utilize the blockchain’s features without requiring permission from a central authority.
Blockchain is a decentralized, transparent ledger technology whose applications are not limited to cryptocurrency and on which permissionless innovation can occur.
Blockchain operates as a chain of blocks, where each block contains a batch of transactions, and these blocks are linked using cryptography. This structure makes the ledger highly secure and resistant to tampering.

124. With reference to Visible Light Communication (VLC) technology, which

With reference to Visible Light Communication (VLC) technology, which of the following statements are correct ?

  • 1. VLC uses electromagnetic spectrum wavelengths 375 to 780 nm.
  • 2. VLC is known as long-range optical wireless communication.
  • 3. VLC can transmit large amounts of data faster than Bluetooth.
  • 4. VLC has no electromagnetic interference.

Select the correct answer using the code given below :

[amp_mcq option1=”1, 2 and 3 only” option2=”1, 2 and 4 only” option3=”1, 3 and 4 only” option4=”2, 3 and 4 only” correct=”option3″]

This question was previously asked in
UPSC IAS – 2020
Statement 1 is correct as Visible Light Communication (VLC) utilizes the visible light portion of the electromagnetic spectrum, which ranges from approximately 380 to 780 nanometers. The range 375 to 780 nm falls within or very close to this standard definition. Statement 2 is incorrect; VLC is generally considered a short-range communication technology because visible light is easily blocked by walls and opaque objects and does not penetrate them like radio waves. Statement 3 is correct; VLC, also known as Li-Fi, has the potential for significantly higher data transmission speeds compared to Bluetooth due to the vast available bandwidth in the visible light spectrum. Statement 4 is correct; VLC operates in a different part of the electromagnetic spectrum than radio-frequency communication (like Wi-Fi or Bluetooth), meaning it does not cause electromagnetic interference with radio-based systems.
VLC uses visible light for data transmission, offering high speed and immunity to radio interference, but is limited in range.
VLC utilizes LEDs which can be switched on and off very rapidly, faster than the human eye can perceive, to transmit data signals. Potential applications include indoor navigation, high-speed internet access in confined spaces, and communication in electromagnetically sensitive environments.

125. With the present state of development, Artificial Intelligence can eff

With the present state of development, Artificial Intelligence can effectively do which of the following ?

  • 1. Bring down electricity consumption in industrial units
  • 2. Create meaningful short stories and songs
  • 3. Disease diagnosis
  • 4. Text-to-Speech Conversion
  • 5. Wireless transmission of electrical energy

Select the correct answer using the code given below :

[amp_mcq option1=”1, 2, 3 and 5 only” option2=”1, 3 and 4 only” option3=”2, 4 and 5 only” option4=”1, 2, 3, 4 and 5″ correct=”option2″]

This question was previously asked in
UPSC IAS – 2020
With the current state of development, Artificial Intelligence (AI) can effectively perform tasks listed in statements 1, 2, 3, and 4. AI algorithms are used for optimizing industrial processes to reduce energy consumption (1). Generative AI models can create coherent short stories and songs (2). Machine learning and deep learning are widely applied in analyzing medical images and data for disease diagnosis (3). Text-to-Speech (TTS) conversion is a mature AI application used in various tools (4). Wireless transmission of electrical energy (5) is primarily a domain of physics and electrical engineering, although AI could potentially be used for optimizing such systems, it is not a core capability or direct application of AI itself in the same way as the other listed items.
Modern AI is capable of complex tasks involving data analysis, pattern recognition, generation, and optimization across various domains.
AI’s capabilities are rapidly expanding, enabling applications in areas like natural language processing, computer vision, robotics, and decision-making systems. While wireless energy transmission exists (e.g., inductive charging), it doesn’t rely on AI as its fundamental principle of operation.

126. In India, the term “Public Key Infrastructure” is used in the context

In India, the term “Public Key Infrastructure” is used in the context of

[amp_mcq option1=”Digital security infrastructure” option2=”Food security infrastructure” option3=”Health care and education infrastructure” option4=”Telecommunication and transportation infrastructure” correct=”option1″]

This question was previously asked in
UPSC IAS – 2020
Public Key Infrastructure (PKI) is a system used to create, manage, distribute, use, store, and revoke digital certificates. Digital certificates bind public keys to identities, providing a way to verify the authenticity of parties involved in digital transactions.
PKI is a fundamental component of digital security infrastructure, enabling secure communication, electronic transactions, and digital signatures through cryptography. It ensures trust in the digital world by verifying identities and encrypting data.
Components of a typical PKI include Certificate Authorities (CAs), Registration Authorities (RAs), a central directory (like LDAP), a Certificate Management System, and potentially Certificate Revocation Lists (CRLs) or Online Certificate Status Protocol (OCSP) responders. PKI is essential for applications like secure web browsing (HTTPS), email encryption, and secure digital transactions. Options B, C, and D relate to physical infrastructure or specific societal sectors, which are not directly associated with the technical term “Public Key Infrastructure”.

127. Consider the following activities : Spraying pesticides on a crop fi

Consider the following activities :

  • Spraying pesticides on a crop field
  • Inspecting the craters of active volcanoes
  • Collecting breath samples from spouting whales for DNA analysis

At the present level of technology, which of the above activities can be successfully carried out by using drones ?

[amp_mcq option1=”1 and 2 only” option2=”2 and 3 only” option3=”1 and 3 only” option4=”1, 2 and 3″ correct=”option4″]

This question was previously asked in
UPSC IAS – 2020
All three listed activities can be successfully carried out using drones at the present level of technology.
Activity 1: Spraying pesticides on a crop field. Drones equipped with spray tanks and nozzles are increasingly used in agriculture for precision spraying of pesticides, fertilizers, and herbicides. They can cover fields quickly and accurately, often more efficiently and with less chemical waste than traditional methods. This is a well-established drone application. Correct.
Activity 2: Inspecting the craters of active volcanoes. Volcanoes are hazardous environments for humans due to heat, toxic gases, and unpredictable eruptions. Drones can be flown into volcanic craters to collect visual data, thermal imagery, and atmospheric gas samples, providing valuable information for monitoring and research without putting scientists at risk. This is a demonstrated application of drones. Correct.
Activity 3: Collecting breath samples from spouting whales for DNA analysis. Researchers use drones to fly over whales and collect samples of the “snot” (exhaled breath and mucus) from their blowholes using collection plates attached to the drone. These samples contain DNA, hormones, and microbiome data, which are crucial for studying whale health and populations. This is a less invasive method compared to traditional biopsy darts and is successfully being used in marine biology. Correct.
Drones, or Unmanned Aerial Vehicles (UAVs), have evolved significantly and are used across numerous sectors due to their versatility, ability to access difficult or dangerous areas, and capacity to carry various sensors and payloads.

128. In the context of wearable technology, which of the following tasks is

In the context of wearable technology, which of the following tasks is/are accomplished by wearable devices?

1. Location identification of a person
2. Sleep monitoring of a person
3. Assisting the hearing impaired person

Select the correct answer using the code given below.

[amp_mcq option1=”1 only” option2=”2 and 3 only” option3=”1 and 3 only” option4=”1, 2 and 3″ correct=”option4″]

This question was previously asked in
UPSC IAS – 2019
The correct option is D. Wearable technology devices are capable of performing all the mentioned tasks.
Wearable technology integrates electronics into everyday objects or accessories worn on the body. These devices typically include sensors, processing capabilities, and communication features, enabling them to perform various functions related to health, fitness, location tracking, and communication.
1. **Location identification:** Many wearable devices like smartwatches and fitness trackers have built-in GPS or use connected smartphone GPS to track the user’s location, route, and activity distances.
2. **Sleep monitoring:** Devices like smartwatches and fitness bands use accelerometers and heart rate sensors to track sleep patterns, duration, stages (light, deep, REM), and quality.
3. **Assisting the hearing impaired:** Some wearable devices can provide tactile vibrations or visual alerts for notifications (calls, messages), act as a remote microphone, or display real-time captions, aiding individuals with hearing impairments.
All three capabilities are common features or potential applications of modern wearable technology.

129. Consider the following statements: A digital signature is 1. an elect

Consider the following statements: A digital signature is

1. an electronic record that identifies the certifying authority issuing it
2. used to serve as a proof of identity of an individual to access information or server on Internet
3. an electronic method of signing an electronic document and ensuring that the original content is unchanged

Which of the statements given above is/are correct?

[amp_mcq option1=”1 only” option2=”2 and 3 only” option3=”3 only” option4=”1, 2 and 3″ correct=”option2″]

This question was previously asked in
UPSC IAS – 2019
The correct answer is B) 2 and 3 only.
A digital signature is primarily used to verify the authenticity and integrity of an electronic document or message, ensuring that it has not been altered since it was signed (Statement 3). Digital signatures rely on digital certificates, which are issued by Certifying Authorities (CAs) and contain the signer’s public key and identity information. Digital signatures, often in conjunction with certificates, can also be used as a form of strong authentication, serving as proof of identity for accessing secure systems or information (Statement 2).
Statement 1 is imprecise. The digital signature itself is a hash of the document encrypted with the signer’s private key; it is not an electronic record that identifies the CA. The digital *certificate* associated with the signature is the electronic record that identifies the signer and is issued by a CA, thereby identifying the CA. While the signature relies on the certificate, the signature itself doesn’t directly identify the CA in the way the certificate does. Statement 3 is the most accurate and fundamental definition of a digital signature’s purpose. Statement 2 describes a valid and common application of digital signatures in securing access.

130. In the context of digital technologies for entertainment, consider the

In the context of digital technologies for entertainment, consider the following statements:

1. In Augmented Reality (AR), a simulated environment is created and the physical world is completely shut out.
2. In Virtual Reality (VR), images generated from a computer are projected onto real-life objects or surroundings.
3. AR allows individuals to be present in the world and improves the experience using the camera of smart-phone or PC.
4. VR closes the world, and transposes an individual, providing complete immersion experience.

Which of the statements given above is/are correct?

[amp_mcq option1=”1 and 2 only” option2=”3 and 4″ option3=”1, 2 and 3″ option4=”4 only” correct=”option2″]

This question was previously asked in
UPSC IAS – 2019
The correct answer is B) 3 and 4.
Virtual Reality (VR) creates a completely simulated environment, shutting out the physical world to provide a full immersion experience. Augmented Reality (AR) overlays digital information (images, sounds, text) onto the real-world environment, enhancing or augmenting the user’s perception of reality, often using device cameras.
Statement 1 is incorrect as it describes VR, not AR. In AR, the physical world is *not* completely shut out; it is augmented.
Statement 2 is incorrect as it describes AR, not VR. VR creates a simulated environment from scratch, it doesn’t project images onto real-life objects.
Statement 3 is correct. AR allows the user to remain present in the real world while digital elements are added to the view, often facilitated by device cameras (like on smartphones or PCs).
Statement 4 is correct. VR aims to create a sense of complete immersion by replacing the real world with a simulated one, effectively “closing the world” to the user.