Highlight on Computers and Information Technology- Expected Questions 2017Part-3 (Download PDF)


Download PDF of This Page (Size: 185.71 K)

We will be covering the important questions and topics for competitive examinations for 2017 related to Computer and IT policies. As per video tutorials and lectures at YouTube@Examrace

Loading video

Expected Questions on Computers and IT: IAS/NET 2017

Dr. Manishika Jain in this video covers a variety of topics which are important for 2017. These include the expected questions on computers and IT.


  • Communication over internet can be secure or insecure based on technique used to transmit digital information over the network.
  • Technique of communication where the actual message is encrypted into mumble jumbled texts by algorithms. This text is called cipher text.
  • Its then send over the network. Even if someone sniffs and intercepts the message, the exact information he won’t be able to know.
  • Receiver receives the message and decrypts the information into plain text.
  • 2 technique to implement cryptography: Symmetric key technique and Public key technique.
  • Used in Internet banking, ATM transaction, Online Shopping.
  • What is encrypted? Email, WhatsApp, FB messaging etc.


  • World Wide Web for robots: An open source database that allows robots to share knowledge, and a cloud computing platform that gives robots access to powerful robotic cloud services
  • RoboEarth databases and RoboEarth Cloud Engine (Rapyuta).
  • RoboEarth Cloud Engine is an open source Platform-as-a-Service (Paas) framework designed for robotics applications. Helps robots to offload heavy computation by giving secure customizable computing environments in the cloud.
  • RoboEarth DB: Database that allows to participate in a community of users who share data about environments, actions, and object.


  • Presentation technique where audio and video files are transmitted over internet.
  • Synonymous with broadcast but webcast is basically on internet communication in digital formant unlike analog communication in broadcast.
  • Webcast streaming there is a source and there are many listeners and viewers.
  • Popular for e-learning, webinars, conferences, media etc.
  • 2014: Election commission used webcast to monitor the proceedings of sensitive polling booths in far flung and disturbed areas & can notice unauthorized movement. It was available to general public on ECI website.

Semantic Web

  • Web of data
  • According to the W3C, “It provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries”
  • About common formats for integration and combination of data.
  • Also about language for recording how the data relates to real world objects.
  • Provide foundation to enable exchange of knowledge and information to coordinate business processes


  • Local-area network (LAN) architecture developed by Xerox Corporation
  • Uses bus or star topology
  • Supports data transfer rates of 10 Mbps
  • Performs ’switching′ of data traffic traversing through the networks.


  • Every company wish to have an internet address or domain name related to its trademark.
  • Technique used by fraudulent persons to acquire a domain name that is of popular trademark. For example. Whatsapp. com
  • Person who bought this domain name will negotiate with the owner of Whatapp with higher price for profitability at the cost of highly valued trademark.
  • On Facebook having a profile of celebrity or important personality with his name and using offensive data to attract his attention.
  • Facebook and Twitter has made regulations to handle certain kind of Fraudulent.
  • Few countries like USA have laws to regulate Cybersquatting.

Cyber Swachhta Kendra

  • For Botnet cleaning and Malware analysis
  • Launched by Union Minister of Electronics
  • Operated by Indian Computer Emergency Response Team (CERT-In) under provisions of Section 70B of the Information Technology (IT) Act, 2000
  • Complies with objectives of National Cyber Security Policy, 2013 – create secure cyber eco-system in India
  • Botnet: Network of private computers infected with malicious software without the owners’ knowledge.
  • Malware: Malicious software designed to disrupt, damage, or gain authorized access to a computer system.
  • USB Pratirodh: Desktop security solution to protect from USB storage device threats.
  • AppSamvid: Desktop solution to protect systems by allowing installation of genuine applications through white listing.
  • M-Kavach: Indigenously developed mobile application to address the security threats in mobiles.

Tetrahertz Transmission Technology

  • Developed by Japan
  • Next generation system which can transmit digital data over 10 times faster than 5G mobile networks
  • Achieves communication speed of 105 gigabits per second using the frequency range from 290 GHz to 315 GHz
  • High-data-rate minimum-latency communications

- Published/Last Modified on: June 11, 2017


Monthy-updated, fully-solved, large current affairs-2019 question bank(more than 2000 problems): Quickly cover most-important current-affairs questions with pointwise explanations especially designed for IAS, NTA-NET, Bank-PO and other competetive exams.