Set No -61: COMPUTER GENERAL KNOWLEDGE QUIZ

Q1. UPI stands for:

A) Universal Payment Interface

B) Unified Payment Interface

C) Unified Process Integration

D) Universal Process Interface

✅ Answer: B) Unified Payment Interface

💡 Explanation: UPI (Unified Payments Interface) is a real-time payment system developed by NPCI enabling instant bank transfers.

──────────────────────────────────────────────────────────────────────────────────────────

Q2. The IT Act of India was enacted in which year?

A) 1995

B) 2000

C) 2005

D) 2008

✅ Answer: B) 2000

💡 Explanation: The Information Technology (IT) Act was enacted in India in the year 2000 to govern cyber activities and e-commerce.

──────────────────────────────────────────────────────────────────────────────────────────

Q3. Which payment system allows offline UPI transactions?

A) NEFT

B) UPI Lite

C) RTGS

D) IMPS

✅ Answer: B) UPI Lite

💡 Explanation: UPI Lite enables small-value offline UPI payments without internet connectivity using on-device wallet.

──────────────────────────────────────────────────────────────────────────────────────────

Q4. IMPS in banking stands for:

A) Immediate Money Payment System

B) Instant Money Processing Service

C) Immediate Payment Service

D) Integrated Money Processing System

✅ Answer: C) Immediate Payment Service

💡 Explanation: IMPS (Immediate Payment Service) is a 24/7 real-time interbank fund transfer service in India by NPCI.

──────────────────────────────────────────────────────────────────────────────────────────

Q5. Two-factor authentication for online banking typically involves:

A) Two passwords

B) Password + OTP (One-Time Password)

C) Two PINs

D) Username + Username

✅ Answer: B) Password + OTP (One-Time Password)

💡 Explanation: 2FA for banking combines something you know (password) with something you have (OTP on your registered mobile).

──────────────────────────────────────────────────────────────────────────────────────────

Q6. Which section of IT Act 2000 deals with cyber terrorism?

A) Section 43

B) Section 66

C) Section 66F

D) Section 72

✅ Answer: C) Section 66F

💡 Explanation: Section 66F of IT Act 2000 (amended 2008) deals with cyber terrorism, punishable with imprisonment for life.

──────────────────────────────────────────────────────────────────────────────────────────

Q7. SSL certificate on a website is indicated by:

A) http:// prefix

B) https:// prefix and padlock icon

C) www prefix

D) .com domain

✅ Answer: B) https:// prefix and padlock icon

💡 Explanation: HTTPS and padlock icon indicate the website has a valid SSL/TLS certificate ensuring encrypted connection.

──────────────────────────────────────────────────────────────────────────────────────────

Q8. NPCI stands for:

A) National Payment Corporation of India

B) National Payments Corporation of India

C) National Process Control Integration

D) Network Payment Control Interface

✅ Answer: B) National Payments Corporation of India

💡 Explanation: NPCI (National Payments Corporation of India) operates retail payment systems including UPI, IMPS, RuPay, and NACH.

──────────────────────────────────────────────────────────────────────────────────────────

Q9. ‘Phishing’ is classified as which type of cybercrime?

A) Hacking

B) Social engineering attack

C) Denial of Service

D) Malware infection

✅ Answer: B) Social engineering attack

💡 Explanation: Phishing is a social engineering attack that tricks users into revealing sensitive information through deceptive emails/sites.

──────────────────────────────────────────────────────────────────────────────────────────

Q10. The RuPay card is developed by:

A) Visa International

B) Mastercard

C) NPCI (National Payments Corporation of India)

D) Reserve Bank of India

✅ Answer: C) NPCI (National Payments Corporation of India)

💡 Explanation: RuPay is India’s domestic card payment network developed by NPCI, competing with Visa and Mastercard.

──────────────────────────────────────────────────────────────────────────────────────────

Q11. ‘Digital signature’ in cybersecurity provides:

A) Encryption of all data

B) Authentication and integrity verification of digital documents

C) Backup of digital files

D) Compression of files

✅ Answer: B) Authentication and integrity verification of digital documents

💡 Explanation: Digital signatures use public-key cryptography to verify the sender’s identity and ensure document integrity.

──────────────────────────────────────────────────────────────────────────────────────────

Q12. CERT-In stands for:

A) Computer Emergency Response Team – India

B) Cyber Encryption and Response Technology – India

C) Central Electronic Registry Team – India

D) Computer Error Reporting Tool – India

✅ Answer: A) Computer Emergency Response Team – India

💡 Explanation: CERT-In is India’s national nodal agency for responding to cybersecurity incidents under the Ministry of Electronics and IT.

──────────────────────────────────────────────────────────────────────────────────────────

Q13. What is ‘e-governance’?

A) Electronic voting only

B) Use of IT to deliver government services and improve public administration

C) Government’s control of the internet

D) Online government employee management

✅ Answer: B) Use of IT to deliver government services and improve public administration

💡 Explanation: E-governance uses ICT to deliver services, improve transparency, and enhance interaction between government and citizens.

──────────────────────────────────────────────────────────────────────────────────────────

Q14. The full form of RTGS is:

A) Real Time Gross Settlement

B) Real Transfer Gross Service

C) Rapid Transaction Gross Settlement

D) Real Time Government Settlement

✅ Answer: A) Real Time Gross Settlement

💡 Explanation: RTGS is a continuous real-time fund transfer system for high-value transactions (minimum ₹2 lakhs) in India.

──────────────────────────────────────────────────────────────────────────────────────────

Q15. Which Section of IT Act covers unauthorized access to computer systems (hacking)?

A) Section 43 and Section 66

B) Section 72

C) Section 67

D) Section 79

✅ Answer: A) Section 43 and Section 66

💡 Explanation: Section 43 covers civil liability for unauthorized access; Section 66 covers criminal hacking under IT Act 2000.

──────────────────────────────────────────────────────────────────────────────────────────

Q16. What is ‘net banking’ also called?

A) Mobile banking

B) Internet banking / online banking

C) ATM banking

D) SMS banking

✅ Answer: B) Internet banking / online banking

💡 Explanation: Net banking (internet/online banking) allows users to perform financial transactions through a bank’s website.

──────────────────────────────────────────────────────────────────────────────────────────

Q17. The maximum transaction limit for NEFT is:

A) ₹1 lakh

B) ₹2 lakhs

C) No upper limit

D) ₹10 lakhs

✅ Answer: C) No upper limit

💡 Explanation: NEFT has no maximum transaction limit for individual senders, though banks may impose their own limits.

──────────────────────────────────────────────────────────────────────────────────────────

Q18. ‘Dark web’ refers to:

A) Websites with black background

B) Encrypted portion of internet accessible only through special browsers like Tor

C) Websites that are temporarily offline

D) Government-restricted websites

✅ Answer: B) Encrypted portion of internet accessible only through special browsers like Tor

💡 Explanation: Dark web is a hidden part of the internet accessible via Tor browser, used for anonymous (often illegal) activity.

──────────────────────────────────────────────────────────────────────────────────────────

Q19. Aadhaar-enabled Payment System (AePS) allows transactions using:

A) Password and PIN

B) Aadhaar number and biometric authentication

C) Only mobile OTP

D) Bank account number only

✅ Answer: B) Aadhaar number and biometric authentication

💡 Explanation: AePS enables banking transactions at micro-ATMs using Aadhaar number + fingerprint/iris biometric authentication.

──────────────────────────────────────────────────────────────────────────────────────────

Q20. Section 67 of the IT Act 2000 deals with:

A) Hacking

B) Publishing obscene material electronically

C) Identity theft

D) Denial of service attacks

✅ Answer: B) Publishing obscene material electronically💡 Explanation: Section 67 of IT Act 2000 punishes publishing or transmitting obscene material in electronic form

Leave a Reply

Your email address will not be published. Required fields are marked *