Академический Документы
Профессиональный Документы
Культура Документы
Eduncle.com
Mpa 44, 2nd Floor, Above Bank Of India, Rangbari Main Road,
Toll Free: 1800-120-1021
Mahaveer Nagar 2nd, Near Amber Dairy, Kota, Rajasthan, 324005
Website: www.eduncle.com | Email: Info@Eduncle.com
General Paper-I (Sample Theory)
Information and communication Technology (ICT) is the infrastructure of modern computing. ICT
is synonym of Information Technology (IT). ICT is sometimes used synonymously with IT (for information
technology); however, ICT is generally used to represent a broader, more comprehensive list of all
components related to computer and digital technologies than IT.
Although there is no single, universal definition of ICT, the term is generally accepted to mean
all devices, networking components, applications and systems that combined allow people and
organizations (i.e., businesses, nonprofit agencies, governments and criminal enterprises) to interact in
the digital world.
According to UNESCO (2002), "ICT refers to forms of technologies that are used to create,
store, share or transmit, exchange information. ICT includes radio, television, video, DVD, telephone
(fixed line & mobile), satellite systems, computer and network hardware and software; (equipment &
services associated with these technologies, such as video conference electronic mail)".
The National curriculum framework 2005 (NCF 2005) has also highlighted the importance of
ICT in school education. Keeping in mind the importance of ICT, a major paradigm shift is imperative
in education characterized by imparting instructions collaborative learning, multi-disciplinary problem-
solving and promoting critical and creative thinking skills
The World Bank, numerous governmental authorities and non-government organizations (NGOs)
advocate policies and programs that aim to bridge the digital divide by providing greater access to ICT
among those individuals and populations struggling to afford it.
These various institutions assert that those without ICT capabilities are left out of the multiple
opportunities and benefits that ICT creates and will therefore fall further behind in socio economic terms.
The United Nations considers one of its Sustainable Development Goals (SDG) to
"significantly increase access to information and communications technology and strive to provide
universal and affordable access to the internet in least developed countries by 2020."
Components if ICT
These will not only include hardware devices connected to computers, and software applications,
but also interactive digital content, internet and other satellite communication devices, radio and television
services, web based content repositories, interactive forums, learning management systems, and
management information systems.
Advantages of ICT
Speed : The innovations in internet and broadband have made the communication
instantaneous. Modern mobile applications have allowed people to communicate with
each other in real time. There is no time lag between two places which are thousands
of kilometers apart.
Precision : The information that is communicated through ICT is very precise. Since
there is no time lag in the communication, there is less chances of miscommunications.
Versatile : ICT can help in doing multiple tasks. Data can be gathered, verified, processed,
and managed. Information can be communicated. ICT provides a multi-media platform for
such communication.
Digital Divide : Digital divide refers to a large difference between two or more groups
in a population in the distribution and effective use of ICT resources. For example, the
internet penetration in urban and rural India is quite different. From one perspective, ICTs
are considered to bridge the gap between subgroups of a population. But off late, it has
been said that ICT is contributing towards widening the gaps.
Health : Internet and social networking addiction is a popular and identified side effect
of emergence of ICT. Excessive internet usage is also associated with low attention
problems.
Disadvantage of ICT
Cost : ICT tools seem very expensive. But when we account for their reach, they come
out to be very cheap. For example, the cost involved in printing text books is very high
economically as well as environmentally. On the other hand preparing and using digital
form of the book need high one time investment in creating. But once created, it can be
used by any number of users without incurring additional cost.
Hacking : The access to our various accounts is through user ids, and these services
are provided through internet. Through internet people steal and gather security passwords
of others, get access to others' accounts. This is termed as hacking. Hackers also get
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 2
General Paper-I (Sample Theory)
into users' banking accounts and inflict financial losses. Not sharing password with others
and frequent change of password has become a necessity for safe internet usage.
Unauthorized Content Use : Internet and digital form of the data has allowed easy
duplication of the content without attributing/acknowledging the source of the content.
High speed internet and high capacity storage devices have made it easy. Appropriate
attribution needs to be done as an ethical ICT use.
Trolls and Abuses : Internet is also a platform to express personal enmity in the form
of trolling and abusing people online. Since it is easy to conceal identity in internet,
people resort to this practice more frequently.
Pornography : A lot of adult content is accessible through the Internet. This is in digital
form in various media that can be easily stored in storage devices. Child pornography is
a criminal activity mainly happening through the internet medium. There is a pressure on
government from religious and parent groups to ban all pornographic material available
in the internet. Alternatively, there are also many who claim that banning such materials
is against the spirit of internet freedom and democracy.
Viruses : Viruses are relatively simple program written by people and designed to cause
nuisance or damage to computers or their files. They are also responsible for corrupting
data and data loss.
Privacy concerns : Internet is also a hub of lot of personal data. It is possible to track
individual activities in the internet. Such data on user behavior can be misused for the
marketing purposes. Many civil rights activists fear the danger of authoritarian governments
to monitor and manipulate freedom of movement, speech, political activism and social
and personal behaviors.
Importance in Education
Use of ICT for quality improvement also figures in Government of India's flagship
programme on education, Sarva Shiksha Abhiyan (SSA). Again, ICT has figured
comprehensively in the norm of schooling recommended by the Central Advisory Board
of Education (CABE), in its report on Universal Secondary Education, in 2005.
ICT is useful of Distance Education Programme with learning become web-based.
Provide training for Teacher with using ICT's in the classroom to be supported by well-
trained teacher.
National Mission on Education through Information and Communication and
Technology (NMEICT) is an ambitious project undertaken by the Ministry of Human
Resource Development (MHRD), Government of India with a view to seamlessly providing
quality educational content to all the eligible and willing learners in India. It has envisaged
content and connectivity as the twin pedals for initiating and accelerating ICT-enabled
Higher Education.
It seeks to bridge the digital divide, i.e. the gap in the skills to use computing devices for
the purpose of teaching and learning among urban and rural teachers/learners in Higher
Education domain and empower those, who have hitherto remained untouched by the
digital revolution and have not been able to joint the mainstream of the knowledge
economy.
It plans to focus on appropriate pedagogy for e-learning, providing facility of performing
experiments through virtual laboratories, on-line testing and certification, on-line availability
of teachers to guide and mentor learners, utilization of available Education Satellite
(EduSAT) and Direct to Home (DTH) platform, training and empowerment of teachers to
effectively use the new method of teaching learning etc.
Q. Which of the following statements regarding the features of Information and communication
Technology (ICT) is/are true ?
I. ICT are the main instruments for the creation of computer networks and the applications
based on them.
II. ICT support the spread of information and knowledge, separating the content from the
place where it belongs physically.
III. The digital and virtual nature of most of ICT products allow the expenditure for them to
be maximized.
Codes :
(1) I and II only (2) I and III only
(3) II and III only (4) I, II and III (Aug. 2016)
Ans. (1)
Computer
Computers were used to perform arithmetic calculation at fast speed which is used in nearly
every field. The term computer has been borrowed form Compute that means - to calculate. Where
initially A computer is a programmable machine. The two principal characteristics of a computer are: It
responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list
of instructions (a Program).
Characteristics of Computer
Speed : A computer can perform several million instructions (Calculation) in one second.
The speed of computers in specified in MIP (Million Instructions per Second) or MFLOPS
(Million Floating - Point Operations per Second).
Accuracy : Computer technology is well stabilized and the chances of computer giving
inaccurate results are very rare. It is performed with a very high degree of consistent
accuracy.
Diligence : A computer can continue to work for hours (or Even days) at a same speed
and accuracy.
Versatility : The same computer can be used for various application.
Storage : A computer can storage a huge amount of data in its memory. Such as letter,
picture, sound etc.
No Emotions : Computer are not living being and do not have any emotions, taste,
feeling, etc.
Computer Architecture
Computer Organization
Computer Organization The computer performs basically five major operations of functions
irrespective of their size and make.
Accepts data or instruction by way of input
Stores data
process data as required by the user
Gives results in the form of output
Controls all operations inside a computer
Input : this is the process of entering data and programs into the computer system.
Control Unit (CU) : The process of input, output, processing and storage is performed under
the supervision of a unit called 'Control Unit'. It decides when to start receiving data, when to stop it,
where to store data, etc. It takes care of step-by-step processing of all operations in side the computer.
Memory Unit : Computer is used to store data and instructions.
Arithmetic Logic Unit (ALU) : The major operations performed by the ALU are addition,
subtraction, multiplication, division, logic and comparison.
Output : This is the process of producing results from the data for getting useful information.
The ALU and the CU of a computer system are jointly known as the central processing unit
(CPU). CPU as the brain of any computer system.
Classification of Computer
Computers are generally classified by size and power as follows, although there is considerable
overlap. The differences between computer classifications generally get smaller as technology advances,
creating smaller and more powerful and cost-friendly components.
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 6
General Paper-I (Sample Theory)
The second generation was introduced around 1959. These made of transistors a smaller
and more reliable these second generation computers are faster, smaller, and reliable.
Third generation computer were based on IC technology. The system 3/60 introduced by
IBM in 1964 was third generation computer which were smaller, faster and more reliable
than second generation.
The fourth generation computers were introduced around 1975 were based on LSI chips
(large Scale Integrated Circuit) which are very small, very powerful, fast and cheap.
Scientists are working on the development of fifth generation computer which intelligence
ability to reason of real world and which can understand in natural language.
Operating System
The Operating System (O/s) is a collection of programs that control all hardware and other
resources in computer system. Without operating system is useless. Operating system operates and
controls the CPU, memories, and Input and output devices.
Some popular Operating Systems include Linux Operating System, Windows Operating
System, VMS, OS/400, AIX, etc.
Following are some of important functions of an operating system :
Memory Management
Processor Management
Device Management
File Management
Security
Control over system performance
Job accounting
Error detecting aids
Coordination between other software and users
Types of Operating System
Batch Operating System : The users of a batch operating system do not interact with
the computer directly. Each user prepares his job on an off-line device like punch cards
and submits it to the computer operator. To speed up processing, jobs with similar needs
are batched together and run as a group. The programmers leave their programs with
the operator and the operator then sorts the programs with similar requirements into
batches.
Time Sharing Operating System : Time-sharing is a technique which enables many
people, located at various terminals, to use a particular computer system at the same
time. Time-sharing or multitasking is a logical extension of multiprogramming. Processor's
time which is shared among multiple users simultaneously is termed as time-sharing
Disturbed Operating System : Distributed systems use multiple central processors to
serve multiple real-time applications and multiple users. Data processing jobs are distributed
among the processors accordingly.
Network Operating System : A Network Operating System runs on a server and provides
the server the capability to manage data, users, groups, security, applications, and other
networking functions. The primary purpose of the network operating system is to allow
shared file and printer access among multiple computers in a network, typically a local
area network (LAN), a private network or to other networks.
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 8
General Paper-I (Sample Theory)
The motherboard is mounted inside the case and is securely attached via small screws through
pre-drilled holes. Motherboard contains ports to connect all of the internal components. It provides a
single socket for CPU whereas for memory, normally one or more slots are available. Motherboards
provide ports to attach floppy drive, hard drive, and optical drives via ribbon cables. Motherboard carries
fans and a special port designed for power supply.
There is a peripheral card slot in front of the motherboard using which video cards, sound cards
and other expansion cards can be connected to motherboard. On the left side, motherboards carry a
number of ports connect monitor, printer, mouse, key board, speaker and network cables. Motherboards
also provide USB ports which allow compatible devices to be connected in plug-in/plug-out fashion for
example, pen drive, digital cameras etc.
Q. A Personal Computer uses a number of chips mounted on a circuit board called
(Dec. 2012)
(A) Microprocessor (B) System Board
(C) Daughter Board (D) Mother Board
Ans. (D)
Real Time Operating System : A real-time operating system (RTOS) is an operating system
that guarantees a certain capability within a specified time constraint. For example, an operating system
might be designed to ensure that a certain object was available for a robot on an assembly line. The
Operating system must guarantee response to events within fixed periods of time to ensure correct
performance.
To specify the timing constraints of real-time systems - Hard temporal constraints - Soft
temporal constraints
Soft Real-Time System : To achieve predictability on satisfying their timing constraints, possibly,
with the existence of other real-time systems
A soft real-time system is one where the response time is normally specified as an
average value. This time is normally dictated by the business or market.
A single computation arriving late is not significant to the operation of the system, though
many late arrivals might be.
Ex: Airline reservation system - If a single computation is late, the system's response time
may lag. However, the only consequence would be a frustrated potential passenger.
Hard Real Time System : A hard real-time system is one where the response time is specified
as an absolute value. This time is normally dictated by the environment.
A system is called a hard real-time if tasks always must finish execution before their deadlines
or if message always can be delivered within a specified time interval.
Hard real-time is often associated with safety critical applications. A failure (e.g. missing
a deadline) in a safety-critical application can lead to loss of human life or severe economic
damage.
Spooling : Spooling refers to putting data of various I/O jobs in a buffer. This buffer is a special
area in memory or hard
Disk which is accessible to I/O devices.
An operating system does the following activities related to distributed environment:
Handles I/O device data spooling as devices have different data access rates.
Maintains the spooling buffer which provides a waiting station where data can rest while
the slower device catches up.
A GUI uses windows, icons, and menus to carry out commands, such as opening, deleting, and
moving files. Although many GUI operating systems are navigated through the use of a mouse, the
keyboard can also be utilized by using keyboard shortcuts or arrow keys.
Unlike a command line operating system or CUI, like Unix or MS-DOS, GUI operating systems
are much easier to learn and use because commands do not need to be memorized. Additionally, users
do not need to know any programming languages. Because of their ease of use, GUI operating systems
have become the dominant operating system used by today's end-users.
The GUI was first developed at Xerox PARC by Alan Kay, Douglas Engel bart, and a group of
other researchers in 1981. Later, Apple introduced the Lisa computer, the first commercially available
computer, on January 19, 1983.
What are examples of a GUI operating system :
Microsoft Windows
Apple System 7 and mac OS
Chrome OS
Linux variants like Ubuntu
Q. Which one of the following is not a/an image/graphic file format ? (June 2014)
(A) PNG (B) GIF
(C) BMP (D) GUI
Ans. (D)
Picture Format
JPEG (or JPG, for the File Extension; Joint Photographic Experts Group) : Most
digital cameras store photos in JPEG format, because then you can take more photos
on one camera card than you can with other formats.
PNG (Portable Network Graphics) : It's used almost exclusively for web images, never
for print images. For photographs, PNG is not as good as JPEG, because it creates a
larger file. But for images with some text, or line art, it's better, because the images look
less "bit mappy."
BMP (Bitmap) : A bit map (often spelled "bitmap") defines a display space and the color
for each pixel or "bit" in the display space. A Graphics Interchange Format and a JPEG
are examples of graphic image file types that contain bit maps.
GIF (Graphics Interchange Format) : GIFs also have an extremely limited color range
suitable for the web but not for printing. This format is never used for photography,
because of the limited number of colors. GIFs can also be used for animations.
TIFF (Tagged Image File Format) : TIFF images create very large file sizes. TIFF
images are uncompressed and thus contain a lot of detailed image data (which is why
the files are so big) TIFFs are also extremely flexible in terms of color (they can be gray
scale, or CMYK for print, or RGB for web) and content (layers, image tags).
Q. gif, jpg, bmp, png are used as extensions for files which store (Dec. 2014)
(A) audio data (B) image data
(C) video data (D) text data
Ans. (B)
Output Device : An output device is used to send data out of the system. The user sees the
result after processing of data by the computer through output devices.
Examples of some output devices are:
Monitor
Printer
Plotter
Speaker
Monitor
Cathode Ray Tube Monitors (CRT) The main components of a CRT monitors are the electron
gun, the electron beam controlled by an electromagnetic field and phosphor coated display screen.
These older monitors are bulky and require a lot of space for installation. A Graphic display is made up
of a series of dots called 'pixels' (picture In CRT monitors, the image is projected on the screen by
directing the electron beam onto the computer screen.
Liquid Crystal Displays (LCD) First introduced in watches and clocks in the 1970's, LCDs are
now used to display images in monitors. A newer technology in computer screens is TFT LCD monitors.
These are light weight monitors and are used in laptop computers.
Thin Film Transistor Liquid Crystal Display (TFT LCD) It is type of monitor which used thin
film transistor technology to enhance the image quality of LCD Monitors. These are used as monitor in
television set, desktop computer, laptop computer and mobile phones etc.
Light Emitting Diodes Monitors (LED) LED is light weight monitors and is used in laptop
computers and in TV. The Life of LED monitors is three times than that of LCD monitors and they have
less warm up time than that of CRT or LCD monitors. These monitors require less space on the desk,
less power consumption and have flicker free screen.
Projection Displays These are normally used for large group presentations. These systems can
be connected to a computer and whatever appears on the computer terminal gets enlarged and projected
on a large screen. Video projector receives video signals and projects the corresponding image on a
projection screen. It uses a lens system for this projection.
Printers are used for producing output on paper. Printing devices which can be classified
according to the print quality and printing speed. These varieties of printers are :
Plotters
Plotters produce high quality diagrams on the paper and their output quality is good. Engineers,
architects and planners use plotters to generate high quality, high-precision graphic output of different
sizes. For several design applications such as (CAD) design of layout of an aircraft, car, and architectural
design of a building and in other computer-aided design applications plotter are very useful.
(CAM)-Engineers, architects and planners use plotters to generate high quality, high-precision
graphic output of different sizes
Plotter is of two types :
Drum Plotter
Flat-Bed Plotter
Computer Aided Design (CAD)
Computer Aided Design (CAD) software are used to create two and three-dimensional architectural
design. Architects and designers usually make use of it in drafting and designing bridges, buildings, etc.
and have been found to be very useful as instead of redrawing the whole plan one can modify or redraw
with just a few clicks of mouse. Autodesk Streamline, AutoCAD, DW Gcolumn are a few such software.
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 15
General Paper-I (Sample Theory)
Use of CAD
Saves time in making and editing the drawings
Enables the designers to lay out and develop work on the screen
Provides print out of the designs reduces the design cycle and over all product development
costs Stores the designs for future purposes in digital form thus occupying practically no
space.
Computer Aided Manufacturing (CAM)
Computer-aided manufacturing (CAM) is an application technology that uses computer software
and machinery to facilitate and automate manufacturing processes. CAM is the successor of computer-
aided engineering (CAE) and is often used in tandem with computer-aided design (CAD). CAM may also
refer to the use of a computer to assist in all operations of a manufacturing plant, including planning,
management, transportation and storage.
In addition to materials requirements, modern CAM systems include real-time controls and
robotics.
Use of CAM
CAM is faster because machining speeds are higher
Every finished product is the same time and accurate.
Production can run 24 hours a day, 7 days a week
CAM is able to machine difficult shapes, eg tracks on a circuit boards
Port
Port is a connecting socket, outside the system into which different types of cables are plugged.
I/O ports are the interfaces through which computers communicate with external devices such as
printers, modems, joysticks and terminals. There are many types of ports used in computer system.
Parallel Port
Various peripherals can be connected through parallel port, which is a parallel communication
physical interface. A parallel port transmits 8 bits of a byte of data in parallel. It is used for transmitting
fast data over short distances. It is used to connect a printer to a computer.
Serial Port
Serial port transmits one bit of a byte, one at a time as a single stream of bits. It is meant for
transmitting slow data over long distances. Communication over a phone is an example of serial
communication. Dial-up modems and serial mice use serial ports.
Virtual Memory : A computer can address more memory than the amount physically installed
on the system. This extra memory is actually called virtual memory and it is a section of a hard disk
that's set up to emulate the computer's RAM.
Virtual memory is a memory management capability of an OS that uses hardware and software
to allow a computer to compensate for physical memory shortages by temporarily transferring data from
random access memory (RAM) to dusk storage. Virtual address space is increased using active memory
in RAM and inactive memory in hard disk drives (HDDs) to form contiguous addresses that hold both
the application and its data.
Q. Virtual memory is (June 2013)
(A) an extremely large main memory
(B) an extremely large secondary memory
(C) an illusion of extremely large main memory
(D) a type of memory used in super computers
Ans. (C)
Q. _________ is a type of memory circuitry that holds the computer's start-up routine.
(July 2016)
(1) RIM (Read Initial Memory) (2) RAM (Random Access Memory)
(3) ROM (Read Only Memory) (4) Cache Memory
Ans. (3)
Q. Which of the following correctly lists computer memory types from highest to lowest speed ?
(Jan. 2017)
(1) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
(2) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
(3) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
(4) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Ans. (3)
Secondary Memory : Secondary is a memory that keeps its contents even if the power is lost.
This is external and permanent memory that is useful to store the external storage media such as floppy
disk, magnetic disks, magnetic tapes and etc. cache devices.
Main secondary memory are :
1. Magnetic Disk
2. Magnetic Drum
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 18
General Paper-I (Sample Theory)
3. C-D Rom
4. Hard Disk
5. Floppy Disk
Magnetic Disk
Magnetic Disk is a circular metal plate coated on both side by ferrous oxide material. The surface
of the magnetic disk is divided into number of invisible concentric circles called "tracks" and these tracks
are further subdivided into "sectors", "blocks" etc. each its own unique addresses to facilitate the location
of data and the Disk moves on a vertical rotating spindle. Data is recorded in the form of magnetized
spots on the tracks of the disk, a spot representing the presence by "1" and its absence by "0" enabling
representing of data in binary form.
Magnetic Drum
It is a metallic cylinder coated with a special magnetic alloy. Data is stored in this surface as
minute magnetized spoke arranged in binary form in a series of parallel circular tracks. The magnetic
drum provides random access storage.
CD-Rom (Compact Disk Read Only Memory)
CD-ROM (Compact Disc Read Only Memory) is a Compact Disc contains data accessible by a
computer. While the Compact Disc format was originally designed for music storage and play back, the
format was later adapted to hold any form of binary data. The CR-ROM is also known as a laser disc,
which is shiny metal like disk. The diameter of the disk is 5.25 inches or 12 cm disk. Information of 650
MB can be stored which is equal to nearly 2, 50,000 pages of printed text.
Q. The process of copying files to a CD-ROM is known as (Aug. 2016)
(1) Burning (2) Zipping
(3) Digitizing (4) Ripping
Ans. (1)
Hard Disk
A hard disk consists of one or more rigid metal plates coated with a metal oxide material that
allows data to be magnetically recorded on the surface of the platters. It is a non-volatile secondary
storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaced.
The hard disk is an electro mechanical device. The hard disk is also known as Winchester disk.
Floppy Disk
These are also called as flexible disks. These are used in the smallest microcomputer systems
as well as mini computers. Floppy disks have higher storage capacity and offer direct access capability.
The floppy disk is permanently sealed in a plastic coated jacket and the whole package is inserted the
floppy drive for data recording and retrieval.
Q. A hard disk is divided into tracks which is further subdivided into (June. 2013)
(A) Clusters (B) Sectors
(C) Vectors (D) Heads
Ans. (B)
Q. DVD technology uses an optical media to store the digital data. DVD is an acronym for
(Jan. 2017)
(1) Digital Vector Disc (2) Digital Volume Disc
(3) Digital Versatile Disc (4) Digital Visualization Disc
Ans. (3)
Volatile Memory : Volatile memory is a Primary memory because memory loses its contents
when the computer or hardware device loses power. Computer RAM is an example of a volatile memory
and is why if your computer switch off when working on a program and lose anything that hasn't been
saved.
Non-Volatile Memory : Non-volatile memory is a memory that keeps its contents even if the
power is lost. This is external and permanent memory that is useful to store the external storage media
such as floppy disk, magnetic disks, magnetic tapes and etc. cache devices.
Q. Random Access Memory (RAM), a form of computer storage, is a ______ memory.
(July 2016)
(1) Non-Volatile (2) Volatile
(3) Permanent (4) Secondary
Ans. (2)
Memory Unit
1 Bit Binary Digit
4 Bit 1 Nibble
8 Bits 1 Byte
1024 Bytes 1 KB (Kilo Byte) = 210
1024 KB 1 MB (Mega Byte) = 220
1024 MB 1 GB(Giga Byte) = 230
1024 GB 1 TB(Terra Byte) = 240
1024 TB 1 PB(Peta Byte) = 250
1024 PB 1 EB(Exa Byte) = 260
1024 EB 1 ZB(Zetta Byte) = 270
1024 ZB 1 YB (Yotta Byte) = 280
1024 YB 1 (Bronto Byte)
1024 Bronto byte 1 (Geop Byte)
Q. If one Giga Byte is equal to 230 Bytes of data storage, then 1024 Tera Bytes is equal to _____
bits of data storage. (Aug., 2016)
50 53
(1) 2 (2) 2
(3) 240 (4) 256
Ans. (1)
Contact Us : Website : www.eduncle.com | Email : support@eduncle.com | Call Toll Free : 1800-120-1021 20
General Paper-I (Sample Questions)
1. ICT represents
(A) International Communication Technology
(B) Intra Common technology
(C) Inter Connected Terminals
(D) Information and Communication Technology
5. What does acronym for NIC body for E-Governance expand to?
(A) Novel Industrial Center (B) National Industrial Center
(C) Nodal Industrial Center (D) National Informatics Center
7. WWW means
(A) World Wide Web (B) World Wide Work
(C) World Website Work (D) Work World Wide
ANSWER KEY
1 2 3 4 5 6 7 8 9 10
D A C A D C A B A A
SOLUTIONS