11. Which of the following is/are pointing device/devices? 1. Trackball

Which of the following is/are pointing device/devices?

  • 1. Trackball
  • 2. Touchscreen

Select the correct answer using the code given below.

1 only
2 only
Both 1 and 2
Neither 1 nor 2
This question was previously asked in
UPSC CISF-AC-EXE – 2024
Both Trackball and Touchscreen are types of pointing devices. A pointing device allows a user to interact with a computer interface by controlling a cursor or pointing to objects on the screen.
– A trackball is an input device used to enter motion data into computers or other electronic devices. It functions like an upside-down mouse; the user rolls a ball to move the cursor.
– A touchscreen is a display screen that can detect the presence and location of a touch within the display area, typically by a finger or stylus.
– Other common pointing devices include the mouse, touchpad, pointing stick, joystick, and graphics tablet.
– Pointing devices are essential for graphical user interfaces (GUIs) as they provide an intuitive way for users to interact with elements displayed on the screen.

12. In the context of universal character encoding standard, UTF stands

In the context of universal character encoding standard, UTF stands for

Unicode Transformation Format
Unicode Transformation Form
Unique Transformation Format
Unique Transformation Form
This question was previously asked in
UPSC CISF-AC-EXE – 2024
In the context of universal character encoding standard, UTF stands for Unicode Transformation Format. UTF is a mapping between the Unicode code points (numerical representations of characters) and sequences of bytes.
– Unicode is a standard for encoding, representing, and handling text expressed in most of the world’s writing systems.
– UTF encodings like UTF-8, UTF-16, and UTF-32 are variable-length encoding schemes for Unicode.
– UTF-8 is the most common encoding used on the web and for general-purpose text files because it is backward-compatible with ASCII and efficient for commonly used characters.
– UTF-16 uses 16-bit code units and is used by systems like Windows and Java.
– UTF-32 uses a fixed 32-bit code unit for every character.

13. In HTML, which one of the following is used to open the linked documen

In HTML, which one of the following is used to open the linked document in a new browser window?

_self
_link
_blank
_open
This question was previously asked in
UPSC CISF-AC-EXE – 2024
In HTML, the `target` attribute of the `` (anchor) tag specifies where to open the linked document. The value `_blank` is used to open the linked document in a new browser window or tab.
– The `target` attribute determines the browsing context (window, tab, or frame) in which the linked document will be displayed.
– Common values for the `target` attribute include `_self` (default), `_blank`, `_parent`, and `_top`.
– `_self` opens the document in the same window/tab the link was clicked.
– `_parent` opens the document in the parent frame.
– `_top` opens the document in the full body of the window.
– Using `target=”_blank”` should be done judiciously as it can impact user experience, although it is very commonly used for external links.

14. Which one of the following protocols is used for determining the MAC a

Which one of the following protocols is used for determining the MAC address corresponding to an IP address ?

ARP
IP
ICMP
FTP
This question was previously asked in
UPSC CISF-AC-EXE – 2023
The Address Resolution Protocol (ARP) is a network layer protocol used to find the hardware address (MAC address) associated with a given Internet Protocol (IP) address on a local network. When a device wants to send an IP packet to another device on the same network and only knows its IP address, it uses ARP to discover the corresponding MAC address.
– ARP maps Layer 3 (IP) addresses to Layer 2 (MAC) addresses.
– IP is for logical addressing and routing.
– ICMP is for network diagnostics and control messages.
– FTP is for file transfer.
RARP (Reverse ARP) performs the opposite function, mapping a MAC address to an IP address, though it is less commonly used now, largely superseded by protocols like BOOTP and DHCP.

15. Which one among the following is the fastest mode of transmission medi

Which one among the following is the fastest mode of transmission media ?

Coaxial cables
Twisted-pair cables
Infrared rays
Optical fibers
This question was previously asked in
UPSC CISF-AC-EXE – 2023
Optical fibers transmit data using light signals, offering significantly higher bandwidth and speed compared to traditional copper cables like coaxial and twisted-pair cables, or wireless methods like infrared rays which are typically limited to short distances and lower speeds for general networking.
– Transmission media speed varies greatly depending on technology.
– Optical fiber is the fastest among the options listed for data communication over distance.
Typical speeds range from Mbps for older twisted pair/coaxial to Gbps and even Tbps for optical fiber. Infrared is primarily used for very short-range communication like remote controls or device-to-device data transfer over a few meters.

16. Which one of the following is not a multi-user operating system ?

Which one of the following is not a multi-user operating system ?

UNIX
Windows XP
MS-DOS
Windows 2000
This question was previously asked in
UPSC CISF-AC-EXE – 2023
MS-DOS (Microsoft Disk Operating System) is a single-user, single-tasking operating system. This means it was designed to be used by one person at a time and could run only one program at a time.
– Multi-user operating systems allow multiple users to access and use the system concurrently.
– UNIX, Windows 2000, and even later versions like Windows XP (though primarily desktop OS, they have features like Fast User Switching and support for services running under different users, and Windows 2000 was a significant multi-user capable OS designed for servers/workstations) are capable of multi-user operation to varying extents.
– MS-DOS strictly lacks multi-user capabilities.
Modern operating systems like Windows (NT-based versions onwards), macOS, and Linux/UNIX are inherently multi-user, although their implementation and typical usage scenarios differ (e.g., desktop vs. server).

17. Program in execution is called a :

Program in execution is called a :

Process
Product
Code
Page
This question was previously asked in
UPSC CISF-AC-EXE – 2023
A program in execution is defined as a process. A process is an instance of a program running. It includes the program code, its current activity, its memory space, and resources allocated to it by the operating system.
– A process is a dynamic entity representing a program in action.
– A program is a static set of instructions.
Operating systems manage processes, allocating system resources such as CPU time, memory, and I/O devices to them. Different processes can run concurrently, giving the illusion of parallel execution even on a single-processor system through techniques like time-sharing.

18. What is a system of a secure key pair consisting of a private key for

What is a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature, known as:

Asymmetric crypto system
Secure system
Symmetric crypto system
Digital signature certificate
This question was previously asked in
UPSC CISF-AC-EXE – 2023
The correct answer is A) Asymmetric crypto system.
A system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.
In asymmetric cryptography, the public key can be freely distributed, while the private key must be kept secret by its owner. For digital signatures, the sender uses their private key to sign data. The recipient uses the sender’s public key to verify that the signature is valid and was created by the owner of the corresponding private key. Symmetric crypto systems use the same key for both encryption/decryption or signing/verification, which is not the case described here. A digital signature certificate is a digital document that uses asymmetric cryptography to link a public key to an identity, but it is not the crypto system itself.

19. ACID properties in transaction management in DBMS stands for :

ACID properties in transaction management in DBMS stands for :

Atomicity, Concurrency, Isolation, Durability
Autonomy, Consistency, Isolation, Durability
Atomicity, Consistency, Isolation, Durability
Atomicity, Consistency, Infidelity, Durability
This question was previously asked in
UPSC CISF-AC-EXE – 2023
In the context of database transaction management, ACID is an acronym that stands for Atomicity, Consistency, Isolation, and Durability. These are a set of properties that guarantee reliable processing of database transactions. All four properties are essential to ensure data integrity and reliability.
– ACID is a core concept in DBMS transaction management.
– It stands for Atomicity, Consistency, Isolation, and Durability.
– Atomicity: A transaction is treated as a single, indivisible unit. Either all its operations are completed successfully, or none of them are (it’s rolled back).
– Consistency: A transaction must bring the database from one valid state to another, maintaining all defined rules and constraints.
– Isolation: Multiple transactions occurring concurrently must not interfere with each other. The result should be the same as if they were executed sequentially.
– Durability: Once a transaction is committed, its changes are permanent and will survive system failures (like power loss or crashes).

20. Which type of flip flops are used in registers ?

Which type of flip flops are used in registers ?

D type
SR
T type
JK
This question was previously asked in
UPSC CISF-AC-EXE – 2023
Registers in digital circuits are primarily used for storing binary data. Each bit of data in a register is typically stored in a single flip-flop. The D-type flip-flop (Data flip-flop) is the most suitable and commonly used type for constructing registers because its output (Q) takes on the value of the data input (D) at the clock edge, effectively storing the input data for one clock cycle. This makes it ideal for parallel data transfer and storage applications like registers.
– Registers store binary data.
– D-type flip-flops store the input data (D) when clocked.
– This direct data storage capability makes D-type flip-flops ideal for register implementation.
Other types of flip-flops have different primary uses: SR flip-flops can suffer from an indeterminate state (when S=R=1), T flip-flops are mainly used for toggling (useful in counters), and JK flip-flops are versatile but more complex, often used in counters and control circuits. While JK flip-flops can be configured as D-types, the basic D-type is the direct choice for simple data storage registers.