Highlight on Computers and Information Technology- Expected Questions 2017Part-2 (Download PDF)

()

Download PDF of This Page (Size: 162.59 K)

We will be covering the important questions and topics for competitive examinations for 2017 related to Computer and IT policies. As per video tutorials and lectures at YouTube@Examrace

Loading video

Expected Questions on Computers and IT: IAS/NET 2017

Dr. Manishika Jain in this video covers a variety of topics which are important for 2017. These include the expected questions on computers and IT.

Cognitive Radio

  • Form of wireless communication
  • Transceiver detects which communication channels are in use and which are not, and move into vacant channels
  • Optimize use of available radio-frequency (RF) spectrum
  • Terror outfits have modified & created application “Calculator”, can be attached to the off -air network created specifically for them
  • Network generates its own signal by proprietary ad hoc networking protocols and automatically coordinates with other units
  • Enables users to send and get text messages
  • Share their GPS locations on offline maps
Image of Cognitive Radio

Image of Cognitive Radio

Image of Cognitive Radio

Image of Cognitive Radio Network

Image of Cognitive Radio Network

Image of Cognitive Radio Network

Computer vision syndrome or Digital Vision Syndrome

  • Temporary condition
  • Focusing the eyes on a computer display for protracted, uninterrupted periods of time
  • Headaches, blurred vision, and neck pain, redness in the eyes, fatigue, eye strain, dry eyes, irritated eyes, double vision, vertigo/dizziness, polyopia, and difficulty refocusing the eyes
  • “20 20 20 rule”: every 20 mins focus the eyes on an object 20 feet (6 meters) away for 20 seconds.
  • Or close eyes for 20 seconds, at least every half hour.

Hashtag Activism

  • Act of fighting for or supporting a cause that people are advocating through social media like Facebook, Twitter, Google + etc.
  • It does not require any action from the person other than sharing or ”liking” a post or ”retweeting” tweets on Twitter.
  • Use of hashtags (#) that are often used to spread the word about a cause over Twitter.
  • Hashtag activism is also known as social activism

Project Shield

  • Technology by Google to protect news sites and portals
  • Protection of news sites and portals related to human rights from attacks that threaten free expression and access to information

Digital Radio Mondiale (DRM)

  • Use for cross-border broadcasting initiative
  • Twin capabilities of analog and digital transmission
  • Perfect for broadcast modes
  • Longer range than FM
  • Much costlier than FM
Some Imopratnt locatipon of Digital Technologies

Some Imopratnt Locatipon of Digital Technologies

Some Imopratnt locatipon of Digital Technologies

Google Glass

  • Developed by Google Inc.
  • Physical device resembling spectacles mounted with touchpad, camera and display
  • Has built in memory, sensors, wi-fi and Bluetooth.
  • Mapping, recording photos and videos with ability to stream live video.
  • Blamed for its unethical use, breeching of privacy and intrusion of others personal business without their knowledge.
Image of How Google Glass Works

Image of How Google Glass Works

Image of How Google Glass Works

IPTV

  • New generation TV that communicates over Internet protocol in the form of packets rather than signals in normal TV’s.
  • It has 3 components: Where content is encoded, decoded; Delivery Network; Setup BoxTwo-way interactivity - viewers have more options to personalize, interact and control their viewing experience.
  • Based on internet protocol, it is sensitive to packet loss and delays if the IPTV connection is not fast enough.
Image of IPTV Connection

Image of IPTV Connection

Image of IPTV Connection

Location of IPTV Countries of the World

Location of IPTV Countries of the World

Location of IPTV Countries of the World

Param Yuva II

  • Indian Super computer developed by C-DAC in 2013.
  • It is an improved version of Other Param Series supercomputers.
  • All-round advancement
  • Capacity-building and advanced research and development.
  • Research in space, bioinformatics, weather forecasting, seismic data analysis, aeronautical engineering, scientific data processing and pharmaceutical development.

Ambience Intelligence (AmI)

  • Setup of electronic devices that observes, records, analyze and respond to the human environment.
  • Ability to model user behavior, activity prediction and recognition, decision making and controlling.
  • Broaden interaction between human beings and digital information technology by use of ubiquitous computing devices.
  • 3 main components: ubiquitous computing, ubiquitous communication, and user adaptive interfaces.
  • Used in Smart homes which smartly interact with residents; Health related Application where patients’ activity can be monitored; Public transportation System where traffic can be managed efficiently.
  • It possess security issue and Privacy challenges.

Virtual Reality

  • Artificial environment created with computer hardware and software
  • Presented to the user such that it appears and feels like a real environment.
  • Hardware devices like goggles, gloves, and earphones etc. inbuilt with sensors.
  • Enables people to deal with information more easily
  • Virtual reality exposure therapy (3-dimensional computer simulation) - to treat panic and anxiety disorders.
  • Education - enables large groups of students to interact with each other as well as with in a three dimensional environment.

Digital Snooping

  • Spying on personal information or data
  • Monitor private and public network for password and data
  • Interception of data is done at network layer and can bypass security protocols
  • Attacker use software programs to read the data passed over network. It searches for the password fields and intercepts it.
  • If the password is encrypted, it uses various algorithms and brute force techniques to decrypt them.
  • After password is obtained, the attacker can obtain computer access to steal and manipulate data.
  • India has launched its National Snooping Program named Central Monitoring System (CMS)

- Published/Last Modified on: June 11, 2017

Sci-Tech

Monthy-updated, fully-solved, large current affairs-2018 question bank(more than 2000 problems): Quickly cover most-important current-affairs questions with pointwise explanations especially designed for IAS, CBSE-NET, Bank-PO and other competetive exams.