Post on 23-Mar-2023
DIWAKAR EDUCATION HUB
PEOPLE ,ENVIRONMENT &DEVELOPMENT
May 10
2019 AS PER NEW UPDATED SYLLABUS OF PAPER-1 FOR UGC-NET EXAM PAPER-1
COPYRIGHTS - DIWAKAR EDUCATION HUB
Environment, Development and Sustainability We all have learnt about the ill effects of Environment degradation in our lives.
But have you ever considered the economic cost of environmental degradation? or
the economic benefits of Sustainable Development? Let us educate ourselves
about concepts.
This lesson breaks down the meaning and functions of the environment in the
context of economic growth. The idea of environmental degradation, its causes
and impacts are highlighted. The concluding section of the lesson introduces the
concept of sustainable development as introduced in the Brundtland Report of
1987 and explains the way forward to save the environment.
Economics and the Environment
Achieving economic development is vital to a country. But what if it comes at the
cost of environmental degradation? With globalization opening the doors of
economic development for so many countries, there is a serious concern regarding
how far we are being able to save the environment and not hamper its
constituents.
To understand the impact of economic growth and development on the
environment, we need to be aware of the concept of sustainable development as
an alternative solution.
Environment: Meaning and Functions
The ‘environment’ refers to the totality of resources and the total planetary
inheritance we have received. It includes biotic (animals, plants, birds, etc.)
and abiotic (sun, land, water, mountains, etc.) components. It explains the inter-
relationship that exists between the abiotic and biotic components.
The environment performs four crucial functions:
1. Supplying Resources: The environment contains both renewable (air, water, land) and non-renewable (fossil fuels) resources. While the former are re-usable and do not get depleted soon, non-renewable resources come with the fear of depletion.
COPYRIGHTS - DIWAKAR EDUCATION HUB
2. Assimilating Waste: Economic activities generate waste which the environment absorbs through natural processes.
3. Sustenance of Life: The environment comprises abiotic components that aid the living of biotic components. In the absence of elements such as air, water, land, etc. there would be no life on the planet.
4. Aesthetic Value: The environment adds aesthetic value to life. The mountains, oceans, seas, landmasses and other scenery of the environment enhance the quality of life.
Environmental Degradation
Economic activities such as production and consumption have led to
environmental degradation over the last few years. This is recognizable from the
fact that there is a certain carrying capacity of the environment. When the rate of
extraction of resources exceeds the rate of their regeneration, the environment
fails to perform its activities. The resulting phenomenon is called environmental
degradation.
Resources are limited and therefore, their overutilization is leading to their
extinction. The waste generated is also exceeding the absorptive capacity of the
environment.
Source: Hindustan Times
Rivers and other waterways are getting increasingly polluted due to the excessive
dumping of wastes into them. This has led to poor water quality for consumption.
The rate of use of non-renewable resources has not only depleted their limited
reserves but also led to pollution tendencies.
The increasing emphasis is therefore on renewable sources or on devising other
sources of generating energy. Different kinds of pollution have harmed the
environment as well as man’s well-being. Air and water pollution particularly
contribute to air and water-borne diseases and ill-health. Ozone layer depletion
and global warming are other severe problems resulting from such degradation.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Global Environmental Crisis
Environmental degradation can be broken down into particular problems that
plague the global community, as under:
Global Warming
It refers to the gradual increase in the lower atmosphere of the Earth. The main
cause of global warming is recognized to be the release of greenhouse gases like
carbon dioxide into the atmosphere. These gases can absorb heat and thus,
contribute to global warming. Other causes are deforestation and burning of fossil
fuels like coal and petroleum. Global warming has led to melting of polar ice caps
and an average increase in temperatures all over.
Source: Google images
Ozone Layer Depletion
It is the phenomenon of depletion in the amount of ozone in Earth’s stratosphere.
The main cause of ozone depletion is through the release of substances called
chlorofluorocarbons (CFCs) into the atmosphere. These are compounds include
chlorine, bromine compounds that are used as cooling substances in air
conditioners, refrigerators, etc.
Ozone layer depletion implies that the Earth gets more and more exposed to the
ultraviolet rays of the sun. These rays are excessively harmful to human health
and are known to cause skin cancer to human beings. They also affect the growth
of aquatic and terrestrial plants.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Measures to Save the Environment
Concerted efforts are required to deal with the global environmental crisis. The
concept of sustainable development, thereby, comes into play. Some of the
measures that can be undertaken to control the crisis that already underway
includes:
Pollution Control: Air, water, noise, soil are some of the major forms of pollution plaguing the environment today. Pollution control boards can be set up or regulatory standards must be enforced to keep pollution within lowest levels.
Forest Conservation: Increased industrialization has come at the cost of deforestation. The implication of forests being cut down is that the ecology is significantly affected. Afforestation measures need to be taken and forest conservation regulations must be seriously implemented.
Social Awareness: Until people are made aware of the graveness of the situation, the problem of environmental degradation cannot be dealt with. Creating awareness through campaigns and movements can help avert the problem of the ongoing environmental crisis.
Waste Management: Solid waste management must be carefully managed in urban areas. Rural waste has the potential of being used as natural manure by
converting it into compost.
Water Management: Rainwater harvesting and conservation of water can help with the long-term potent problem of scarcity of water.
Implementation of Policy Programmes: Enactment of environment-centric acts and policies is not enough. Their effective implementation and careful observation are what will actually make a difference to environmental conservation efforts.
Sustainable Development: Meaning and Features
The idea of environmental conservation gains real momentum if we are able to
conserve resources and use them in a manner that they are sufficiently available
for the coming generation as well. The United Nations Conference on
Environment and Development (UNCED) defines this using the concept
of sustainable development. It explains sustainable development as a process
that provides for the present generation without compromising on the needs of the
future generations.
Sustainable development has gained momentum as a larger movement over the
years. We now associate it with improving living standards, poverty alleviation,
COPYRIGHTS - DIWAKAR EDUCATION HUB
nutritional improvements, minimizing social and cultural instability and resource
depletion.
The Brundtland Commission lays emphasis on the idea of passing on an
environment with enough and good-quality resources to the future generation, just
as we have bequeathed from our previous generations.
The features of sustainable development include a sustained rise in per capita
income (PCI) worldwide, rational usage of resources, pollution checks, population
control and relative dependence on renewable sources of energy to meet future
generations’ needs.
The Way Forward with Sustainable Development
The planet must shift to renewable sources of energy as compared to the regular
thermal or hydropower plants that lead to climatic degradation. Solar energy is an
effective alternative that we can harness using photovoltaic cells. It is less costly
and environmentally friendly.
A shift to wind energy is also an option. Setting up windmills in areas with high-
speed wind can help convert the natural resource into electricity for commercial or
household usage. Another effective solution can come through the use of natural
manure or bio-compost as a substitute for chemical fertilizers. This helps avert soil
erosion and soil pollution. Subsidized LPG as a fuel in rural areas and CNG as a
fuel for vehicles in urban areas could lead the way forward.
The rest of the change can come majorly through increased awareness and
consciousness. Only when the gravity of the situation and a moral responsibility
towards forthcoming generations is realized can we pass on a healthy environment
to them.
Solved Example for You
Question: Classify the following as renewable or non-renewable resources: trees,
fish, petroleum, coal, water, and iron-ore.
Answer: Trees, fish, and water are reusable and come without any fear of
depletion. These are renewable resources. Petroleum, coal, and iron-ore are
limited and come with the fear of getting depleted. They are classified as non-
renewable resources.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Millennium Development Goals (MDGs) to Sustainable Development Goals (SDGs): Addressing Unfinished Agenda and Strengthening Sustainable Development and Partnership
Introduction
International development agenda has been actively led by the United Nations (UN) and its technical agencies
and funds from their inception in the late 1940s. Till 1990s, the approach was fragmented and disjointed
initiated by its specialized agencies or funds at various World Summits and Conferences to address three
dimensions of development — economic, social, and environmental. The Millennium Declaration and
Millennium Development Goals (MDGs) saw the convergence of development agenda of United Nations
Development Programme (UNDP); United Nations Environment Programme (UNEP); World health organization (WHO); United Nations Children's Fund (UNICEF); United Nations Educational, Scientific and
Cultural Organization (UNESCO); and other development agencies.(1) Recently adopted Sustainable
Development Goals (SDGs) reflect further strengthening convergence of the development agenda. The SDGs also strengthen equity, human rights, and non discrimination.
Go to:
Progress in MDGs and Build Up to SDGs
The MDGs generated new and innovative partnerships, galvanized public opinion, and showed the immense
value of setting ambitious goals. By putting people and their immediate needs at the forefront, the MDGs
reshaped decision-making in the developed and developing countries alike. It helped to lift more than one billion
people out of extreme poverty, to make inroads against hunger, to enable more girls than ever before to attend
school, and to protect our planet. Yet inequalities persist and the progress has been uneven. The world's poor
remain overwhelmingly concentrated in some parts of the world. Several women continue to die during
pregnancy or from childbirth-related complications. Progress tends to bypass women and those who are lowest
on the economic ladder or are disadvantaged because of their age, disability, or ethnicity. Disparities between rural and urban areas remain pronounced.(2)
India has made a substantial improvement in MDGs but the progress is mixed. The under-five mortality rate
(U5MR) has come down from 126 (1990) to estimated 48 not reaching the target of 42 by 2015. However, the
estimated child deaths have come down from 3.36 million (1990) to 1.2 million (2015) that translates to 3,300
child lives saved every day! U5MR in India is still above the world average (43), and is higher compared to Sri
Lanka (10), Nepal (36), and Bangladesh (38). Infant mortality and neonatal mortality rates have come down to
38 (target 27) and 28 from 88 and 57, respectively.(3) India achieved a maternal mortality rate (MMR) of 167
(2011-2013) and expected to reach 140 in 2015 down from 437 in 1990, which is well above the target of
109.(4) If we go by the latest UN estimates of MMR of 560 in 1990,(5) the target should be 140 and India is on track to achieve this target. The target of safe drinking water has been achieved in rural areas and is likely to be
achieved in the urban areas as well. The target of sanitation is likely to be achieved in urban areas and missed in rural areas.(5)
The SDGs and Targets
To create a new, people-centered, development agenda, a series of global consultations were conducted both
online and offline. Civil society organizations, citizens, scientists, academics, and the private sectors from
around the world were all actively engaged in the process. The SDGs include 17 goals and 169 targets.(6) Indicators are expected to come out in March 2016. The 17 goals in abridged form are as follows:
1. No poverty;
2. Zero hunger;
3. Good health and well-being;
4. Quality education;
COPYRIGHTS - DIWAKAR EDUCATION HUB
5. Gender equality;
6. Clean water and sanitation;
7. Affordable and clean energy;
8. Decent work and economic growth;
9. Industry, innovation, and infrastructure;
10. Reduce inequality;
11. Sustainable cities and communities;
12. Responsible consumption and production;
13. Climate action;
14. Life under water;
15. Life on land;
16. Peace, justice, and strong institutions; and
17. Partnership for the goals.
The targets are aspirational and global and that each government will set its own national targets taking into account the national circumstances.
The SDGs can be broadly divided into three categories: First, an extension of MDGs that includes the first seven
SDGs; second group is inclusiveness (jobs, infrastructure, industrialization, and distribution). It includes goals 8,
9, and 10; and the third group is on sustainability and urbanization that covers the last seven goals: sustainable
cities and communities, life below water “consumption and production; climate action; resources and environment; peace and justice; and the means of implementation and global partnership for it”.
Health goal
The third SDG — “ensure healthy lives and promote well-being for all at all ages” — is wider-ranging
compared to the health goals in MDGs that were limited to child and maternal mortality and communicable
diseases. The social determinants of health though not spelled as such but are addressed through Goals 1
(poverty), 2 (hunger), 4 (education), 5 (gender equality), 6 (clean water and sanitation), 7 (affordable and clean
energy), 8 (decent work and economic growth), 9 (industry innovation and infrastructure), 10 (reduced
inequalities), 11 (sustainable cities and communities), 12 (responsible consumption and production), 13 (climate action), and 16 (peace, justice and strong Institutions).
Health targets
The health goal has nine targets and four subpoints.(6) The first three targets are continuation of MDGs, the next
three are on no communicable disease (NCD), and the last three are mixed. Nine health targets and four sub-points are as follows:
1. Reduce the global maternal mortality ratio to below 70/100,000.
2. Reduce neonatal mortality to below 12/1,000 and U5MR to below 25/1,000.
3. End the epidemics of AIDS, tuberculosis, malaria, and neglected tropical diseases and combat hepatitis, water-borne diseases, and other communicable diseases.
4. Reduce by one-third premature mortality from noncommunicable diseases.
5. Strengthen the prevention and treatment of substance abuse.
6. Halve the number of global deaths and injuries from road traffic accidents (by 2020).
7. Ensure universal access to sexual and reproductive health-care services.
COPYRIGHTS - DIWAKAR EDUCATION HUB
8. Achieve universal health coverage.
9. Reduce the number of deaths and illnesses from hazardous chemicals and air, water, and soil pollution and contamination.
Four subpoints are:
a. Strengthen the implementation of the WHO Framework Convention on Tobacco Control.
b. Support the research and development of vaccines and medicines.
c. Substantially increase health financing and the recruitment, development, training, and retention of the health workforce.
d. Strengthen early warning, risk reduction, and management of health risks.
Difference Between SDGs and MDGs
SDGs benefit from the valuable lessons learned from MDGs. These also carry forward the unfinished agenda of
MDGs for continuity and sustain the momentum generated while addressing the additional challenges of
inclusiveness, equity, and urbanization and further strengthening global partnership by including CSOs and
private sector. They reflect continuity and consolidation of MDGs while making these more sustainable by strengthening environmental goals.
There are seven major differences in MDGs and SDGs;
1. MDGs were drawn up by a group of experts in the ‘basement of UN headquarters’ whereas SDGs have
evolved after a long and extensive consultative process including 70 Open Working Groups, Civil
Society Organizations, thematic consultations, country consultations, participation of general public through face-to-face meetings and online mechanisms and door to door survey;
2. While MDGs were focused with only 8 goals, 21 targets and 63 indicators, SDGs include 17 goals with
169 targets. An expert analyses by noble laureates at Copenhagen consensus, suggest that if the UN
concentrates on 19 top targets, it can get $20 to $40 in social benefits per dollar spent, while allocating
it evenly across all 169 targets would reduce the figure to less than $10. Being smart about spending could be better than doubling or quadrupling the aid budget;(7)
3. MDGs had a focus on developing countries with funding came from rich countries. All countries, developed or developing, are expected to work towards achieving SDGs;
4. The pillars of human development, human rights and equity are deeply rooted in SDGs and several
targets seven explicitly refer to people with disabilities, six to people in vulnerable situations, and two to non-discrimination. These were not even mentioned in the MDGs; (iv) MDGs had 3 direct health
goals, 4 targets and 15 indicators with emphasis on child, maternal mortality and communicable
diseases. SDGs have one comprehensive goal emphasizing well-being and healthy living including NCDs;
5. MDGs had a time span of 25 years though adopted in 2002 baseline data for the year 1990 was used
and some of the baselines were revised subsequently which shifted ‘the goal post’. For the SDGs, the baseline is from 2015 estimates. It may be revised as more recent data becomes available;
6. SDGs include a vision of building vibrant and systematic partnerships with private sector to achieve
sustainable development. It builds on, UN Compact which was launched in year 2000 and IMPACT 2030;
7. MDGs had no concrete role for the Civil Society Organizations (CSOs), whereas SDGs have paid attention to this right from the framing stage itself with significant engagement of civil society actors.
Human-Environmental Interactions
COPYRIGHTS - DIWAKAR EDUCATION HUB
Human Environmental Interactions can be defined as interactions between the human social system and (the “rest” of) the ecosystem. Human social systems and ecosystems are complex adaptive systems (Marten, 2001). Complex because ecosystems and human social systems have many parts and many connections between these parts. Adaptive because they have feedback structures that promote survival in a constantly changing environment.
Human social system
In order to analyse Human Environmental Interactions it is important to be aware of specific characteristics of the human social system. The type of society strongly influences peoples attitude towards nature, their behaviour and therefore their impact on ecosystems. Important characteristics of human social systems are population size, social organization, values, technology, wealth, education, knowledge and many more. Especially values and knowledge strongly influence peoples “view of life” and consequently define the way people act. The choice of possible actions is then limited by the available technology.
People modify the environment for their purposes and obtain benefits (Ecosystem Services) from it. These Ecosystem Services are essential for human well-being and include for example the provision of resources like water, timber, food, energy, information, land for farming and many more. Obviously by using these resources people affect the environment in a lot of ways. Furthermore people often reorganize existing ecosystems to achieve new ones that seem to be more effective in serving their needs.
COPYRIGHTS - DIWAKAR EDUCATION HUB
The Millenium Ecosystem Assessment (MA) analysed how Ecosystem Services and constituents of human well-being are interlinked. The MA research programme was launched with support from the United Nations in 2001.
Coevolution and Coadaptation
The terms coevolution and coadaptation describe the never-ending process of mutual adjustment and change between human social systems and the environment. Peoples actions have consequences on the environment. But also the environment influences human activities. Human social systems have to adapt to their specific environment. Natural phenomena like storms, earthquakes force people to react. These natural phenomena can either be directly or not primarily caused by human actions and again influence human behaviour as people have to respond to a new situation.
Drivers-Pressures-State-Impact-Response
The Drivers-Pressures-State-Impact-Response (DPSIR) model was originally developed by the European Environmental Agency (EEA) and is used to assess and manage environmental problems. Many national and European institutions adopted this conceptual framework. It identifies the various causal chains of links between human activities and environmental degradation. The model distinguishes several categories of
COPYRIGHTS - DIWAKAR EDUCATION HUB
indicators in order to explain how the state of the environment is changed due to human activities. Human activities increase or mitigate pressure on the environment. The driving forces which initiate human activities are mainly socio-economic and socio-cultural forces.
The following graphic explains the DPSIR process:
10 Ways Humans Impact the Environment
1. Overpopulation
Survival used to mean repopulating. That, however, is quickly becoming true for the opposite as we reach
the maximum carrying capacity that our planet can sustain.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Overpopulation has grown into an epidemic since mortality rates have decreased, medicine has improved,
and methods of industrial farming were introduced, thus keeping humans alive for much longer and
increasing the total population.
The effects of overpopulation are quite severe, with one of the most severe being the degradation of the
environment.
ARCHITECTURE
Using Smart Cities to Accommodate Overpopulation Effects
Humans require space, and lots of it whether it is for farmland, or industries which also takes up tons of
space. An increased population results in more clear-cutting, resulting in severely damaged ecosystems.
Without enough trees to filter the air, CO₂ levels increase which carries the potential to damage every
single organism on Earth.
Another issue is our dependency on coal and fossil fuels for energy, the larger the population, the more
fossil fuels will be used. The use of fossil fuels (such as oil and coal) results in copious amounts of carbon
dioxide into the air- threatening the extinction of thousands of species which adds to the effect that forest
depletion already has.
Humanity continuously requires more space, which devastates ecosystems and increases CO₂ levels,
further devastating the delicate environment. Although processed materials are necessary to power the
cities, the previous assessment tells us that the planet can only sustain so much damage until it will begin
to damage us.
COPYRIGHTS - DIWAKAR EDUCATION HUB
2. Pollution
Pollution is everywhere. From the trash thrown out on the freeway, to the millions of metric tons of
pollution pumped into the atmosphere every year- it's obvious, pollution and waste are inescapable.
Pollution is so bad that to date, 2.4 billion people do not have access to clean watersources. Humanity is
continuously polluting indispensable resources like air, water, and soil which requires millions of years to
replenish.
Air is arguably the most polluted with the US producing 147 million metric tons of air pollution each year
alone.
In 1950, smog was so bad in LA that the ground level ozone (atmospheric gas that is great in the
atmosphere, not so much on the ground) surpassed 500 parts per billion volume (ppbv)- well above the
National Ambient Air Quality Standard of 75 ppbv (6.6 times more to be precise).
People thought they were under foreign attack as the smog burned their eyes and left an odor of bleach in
the air. That is when the devastating effect of aerosols was discovered.
While air quality in the US has slightly improved, the quality in developing countries continues to
plummet as smog continuously blocks out the sun in a dense shroud of pollution. This is just one of the
issues we have to tackle in near future.
COPYRIGHTS - DIWAKAR EDUCATION HUB
3. Global Warming
Global warming is arguably the greatest cause of impact to the environment. The largest of causes
emanating through CO₂ levels from respiration to more detrimental causes like burning fossil fuels and
deforestation.
At any rate, humans are consistently increasing CO₂ levels globally- every year. The highest level of CO₂
in recorded history before 1950 was about 300 parts per million. However, current measurements of CO₂
levels have exceeded above 400 PPM, abolishing every record dating back 400,000 years.
The increase of CO₂ emissions has contributed to the planet's average temperature increasing almost a
whole degree.
As the Temperature increases, arctic land ice and glaciers melt which causes the ocean levels to rise at a
rate of 3.42mm per year, allowing more water to absorb more heat, which melts more ice, creating
a positive feedback loop which will cause the oceans to rise 1-4 feet by 2100.
So what's the big deal?
COPYRIGHTS - DIWAKAR EDUCATION HUB
4. Climate Change
Climate change is closely connected to historical developement of industry and technology. As global
temperatures increase, Earth's weather patterns will drastically change. While some areas will experience
longer growing seasons, others will become barren wastelands as water will deplete in vast areas, turning
once floral regions into deserts.
The increase will impact weather patterns, promising more intense hurricanes in both size and frequency,
as well as intensifying and prolonging droughts and heat waves. But air pollution does not just affect the
environment.
The evidence is mounting that poor air quality and rising temperatures are ruiningdelicate ecosystems,
even leading to increased asthma and cancer rates in humans.
COPYRIGHTS - DIWAKAR EDUCATION HUB
5. Genetic Modification
Genetically modified organisms (GMOs) have been a major contributor to the survival and prosperity of
humans. GMO's are selected bred crops or crops that have had DNA directly implanted into it in order to
give an advantage to the crop, whether that be to sustain colder temperatures, require less water, or yield
more product.
But GMO's are not always intentional. For years humans have used glyphosate, a herbicide designed to
eliminate weeds - the biggest threat to any plant. However, just as humans have a learning immune system,
certain weeds have developed a resistance to 22 of 25 known herbicides, with 249 species of weeds
completely immune according to the latest scientific report.
"Super weeds" threaten farming lands by chocking outcrops. One of the only solutions is to till the land,
turning over the soil to kill the weeds and give an early advantage to the planted crops.
The disadvantage of tilling, however, is that it causes the soil to dry faster and kills off good bacteria,
making its fertile lifespan significantly shorter. To replenish the depleted soil, fertilizer is used, which
introduces a whole new set of problems to the environment and can be disastrous for local agriculture in
the long run.
COPYRIGHTS - DIWAKAR EDUCATION HUB
6. Ocean Acidification
Ocean acidification is caused when CO₂ dissolves into the ocean bonding with sea water creating carbonic
acid. The acid reduces the pH levels in the water, essentially changing the Ocean acidity by 30% in the last
200 years according to analysis - a level that the ocean has not been at in over 20 million years.
The acidity depletes the calcium concentrations, making it difficult for crustaceans to build their shell,
leaving them vulnerable without their armor. Between the global temperature rise of one degree and the
ocean acidification, scientists say a quarter of all coral reefs are considered damaged beyond repair, with
two-thirds under serious threat.
Coral reefs are home to 25% of aquatic life, many of which are responsible for the natural filtration of the
ocean and production of necessary nutrients that are vital for life under the sea. However, acidification is
not the only watery threat as there are other human activities causing severe changes.
COPYRIGHTS - DIWAKAR EDUCATION HUB
7. Water Pollution
Every year over 8 millions tons of garbage dumped into the ocean. Not only is garbage introduced into the
oceans, but also the excessive amounts of fertilizer that finds its way into the ocean through rains, floods,
winds, or dumped in excess right into the largest producer of oxygen we have.
Fertilizer contains nitrogen, an element essential for the growth of plants- but that does not limit it to what
it was intended for.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Phytoplankton and algae thrive off of nitrogen, causing excessive growth in what is known as "red tides"
or "brown tides" in areas with high concentrations of nitrogen. The brown tide is caused by the rapid
growth of billions of algae, which deplete water bodies of oxygen and cause poison to accumulate in all
life that consumes it, including fish and birds. But water pollution does not end there.
Year after year, millions of tons of garbage is dumped into the ocean. Since the garbage mainly consists of
plastics, it is largely indissoluble. The garbage accumulates in large vortexes across the ocean.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Marine life, including the loggerhead sea turtles, are tricked into thinking they are eating food when really
it is only a floating plastic bag or other poisonous plastic that will cause starvation or suffocation to any
unfortunate animal that mistakenly ingests it.
Pollution is the number one threat to all aquatic life and is lead cause of reduced biodiversity. This is really
sad given that water and water life-forms are some of the most important natural resources at our disposal.
8. Deforestation
With an exponential expansion in human beings, more food, materials, and shelter are being manufactured
at stupendous rates, mostly stemming from forestry.
Forests are cleared to make way for new humans, which in turn, makes more humans, you can see the
problem. According to international data, an estimated 18 million acres of trees are clear-cut each year to
make way for new development and wood products- that is just under half of all the trees on the planet
since the industrial revolution began.
With trees being one of the largest producers of oxygen, clearly that is not a good thing for humans- and
especially not for the animals that call the forest home.
With millions of different species that live in forests, deforestation is a major threat to their survival and a
big conservation issue. It also increases the greenhouse gases within the atmosphere which leads to further
global warming. Such human activities need to stop if we wish to survive.
COPYRIGHTS - DIWAKAR EDUCATION HUB
9. Acid Rain
When humans burn coal, sulphur dioxide and nitrogen oxides are released into the atmosphere where they
rise up and accumulate in the clouds until the clouds become saturated and rain acid, causing havoc on the
ground beneath.
When the rain falls, it accumulates in water bodies which are especially harmful to lakes and small bodies
of water. The ground surrounding the water soaks up the acid, depleting the soil of essential nutrients.
Trees that absorb the acid accumulate toxins that damage leaves and slowly kills large areas of forest.
Acid rain has also been known to completely eliminate entire species of fish, causing a snowball effect of
damage to the ecosystem that relies on diverse organisms to sustain the environment.
COPYRIGHTS - DIWAKAR EDUCATION HUB
10. Ozone Depletion
The ozone layer is renowned for its ability to absorb harmful UV rays that would otherwise be detrimental
to the health of all walks of life. Without an ozone layer, walking outside would be unbearable.
Ozone is made up of three bonded oxygen's that float up to the stratosphere where they absorb a substantial
amount of UV radiation, protecting all life down below. However "ozone-depleting substances" (or ODS)
primarily made up of chlorine and bromine find their way up to the stratosphere where they strip the O3 of
an oxygen, destroying its capabilities of absorbing UV light.
The human impact is devastating for plants that are extremely sensitive to UV light including wheat and
barley, two indispensable crops to humans.
Although most chemicals that deplete the ozone layer have been banned, the chemicals that have already
been released can take upwards of 80 years to reach the upper atmosphere, so it will be some time before
our protective boundary will be fully functional again. Until then, slap on that sunscreen and be safe out
there.
Anthropogenic Anthropogenic means of, relating to, or resulting from the influence of human beings on
nature.[1] Prior to the Industrial Revolution, humanity's influence on nature had been comparatively
mild (although human have been influencing the environment for as long as humans have been
human). However with the introduction of motive power, the use of oil and gasoline to
COPYRIGHTS - DIWAKAR EDUCATION HUB
achieve energy needs, and the reliance on electricity, anthropogenic impacts on
the environment have increased exponentially. Energy is needed by society for energy services to
meet our needs, and because of this, energy is at the forefront of human impacts. All sources of
energy have some impact on the environment, but the easier forms of energy to use generally have a
harsher impact.
Anthropogenic emissions of pollutants have significantly and rapidly altered the function
of ecosystems] including our own, however these pollutants are being produced because of our need
for energy. Many impacts can be mitigated, however it is often inconvenient and costly for a power
plant to install air pollution control devices, and it often requires tremendous political will to enforce
such protocols.
Human impacts on the atmosphere, soil, bodies of water, animals and plant life have generally been
getting even worse, however there are many efforts aimed at reducing these effects. Many specific
pollutants have been addressed and the emission of them have decreased greatly.
Environmental Concerns
Our Mother Earth is currently facing lot of environmental concerns. The environmental problems like
global warming, acid rain, air pollution, urban sprawl, waste disposal, ozone layer depletion, water
pollution, climate change and many more affect every human, animal and nation on this planet. Over the
last few decades, the exploitation of our planet and degradation of our environment have gone up at an
alarming rate. As our actions have been not in favor of protecting this planet, we have seen natural
disasters striking us more often in the form of flash floods, tsunamis and cyclones.
Different environmental groups around the world play their role in educating people as to how their small
actions when combined together can play a big role in in protecting this planet. If you look at the
environment around us, you can see that there are a number of issues that come to our attention. Here are
25 of the most important environmental concerns to keep an eye on today.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Top 25 Environmental Concerns
1. Air Pollution: Pollution of air, water and soil take a huge number of years to recover. Industry and
engine vehicle fumes are the most obvious toxins. Substantial metals, nitrates and plastic are poisons in
charge of pollution. While water contamination is brought about by oil slicks, acid rain, and urban sprawl;
air contamination is created by different gasses and poisons discharged by businesses and manufacturing
plants and burning of fossil fills; soil contamination is majorly created by mechanical waste that takes
supplements out of the soil.
2. Water Pollution: Clean drinking water is turning into an uncommon thing. Water is turning into a
monetary and political concern as the human populace battles for this need. Waste from industrial and
agricultural activities pollute the water that is used by humans, animals and plants.
3: Soil and Land Pollution: Land pollution simply means degradation of earth’s surface as a result of
human activities like mining, littering, deforestation, industrial, construction and agricultural activities.
Land pollution can have huge environmental impact in the form of air pollution and soil pollution which in
turn can have adverse effect on human health.
4. Climate Change: Climate change is yet another environmental concern that has surfaced in last couple
of decades. Environmental change has different destructive impacts that include, but are not limited to, the
melting of polar ice, change in seasons, new sicknesses, and change in general climate situation.
COPYRIGHTS - DIWAKAR EDUCATION HUB
5. Global Warming: Environmental asset abuse is also an important environmental concern. Fossil fuel
utilization brings about discharge of greenhouse gasses, which causes environmental change. However,
individuals are taking endeavors to move to renewable energy sources.
6. Deforestation: Our woodlands create new oxygen and additionally help in managing temperature and
precipitation. At present, timberlands cover 30% of the area, but wooded areas are being lost on a regular
basis because people are looking for homes, food, and materials. Deforestation is a huge problem and will
just continue to get worse.
7. Increased Carbon Footprint: Temperature increases, like climate change, are the consequence of
human practices, including the use of greenhouse gasses. When the atmosphere changes and the heat
increases, it can cause a number of problems and start to destroy the world we live in.
8. Genetic Modification: Genetic modification utilizing biotechnology is called genetic engineering.
Genetic engineering of food brings about expanded poisons and sicknesses as qualities from a
hypersensitive plant can exchange to target plant. Some of these crops can even be a threat to the world
around us, as animals start to ingest the unnatural chemicals and such.
9. Effect on Marine Life: The amount of carbon in the water and the atmosphere is continuing to be a
problem in the world around us. The primary effect is on shellfish and microscopic fish, and it has similar
effects to osteoporosis in humans.
10. Public Health Issues: The current environmental concerns represent a considerable measure of danger
to well-being of people, and creatures. Dirty water is the greatest well-being danger of the world and poses
a risk to the health and lifespan of people and animals.
11. Overpopulation: The number of inhabitants in the planet is arriving at unsustainable levels as it
confronts deficiency of assets like water, fuel and food. Overpopulation is one of the most important
environmental concerns.
12: Loss of Biodiversity: Biodiversity is yet another casualty due to the impact of human beings on the
environment. It is the result of 3.5 billion years of evolution. Habitat destruction is a major cause for
biodiversity loss. Habitat loss is caused by deforestation, overpopulation, pollution and global warming.
COPYRIGHTS - DIWAKAR EDUCATION HUB
13. Household and Industrial Waste: The over utilization of assets and formation of plastics are making
a worldwide emergency of waste transfer. Developed nations are infamous for creating an unreasonable
measure of waste or junk and dumping their waste in the seas and, less created nations.
14. Ozone Layer Depletion: The ozone layer is an undetectable layer of protection around the planet that
secures us from the sun’s unsafe beams. Depletion of the critical Ozone layer of the air is credited to
contamination brought about by Bromide and Chlorine found in Chlorofloro carbons (CFC’s). When these
poisonous gasses each the upper parts of the atmosphere, they cause a gap in the ozone layer, the greatest
of which is over the Antarctic.
15. Mining: Mining results in extraction of minerals from earth’s core. These minerals also bring out
harmful chemicals from deep inside the earth to the earth’s surface. The toxic emissions from mining can
cause air, water and soil pollution.
16: Natural Resource Depletion: Non-renewable resources are limited and will get expired one day.
Consumption of fossil fuels at an alarming rate can lead to global warming which can further result in
melting of polar ice caps and increase in sea levels.
17: Natural Disasters: Natural disasters like earthquakes, floods, tsunamis, cyclones, volcanic eruption
can be unpredictable, devastating and can cause irreparable damage. They can cause huge loss of life and
property ……….
COPYRIGHTS - DIWAKAR EDUCATION HUB
18: Nuclear Issues: Radioactive waste is a nuclear fuel that contains radioactive substance and is a by-
product of nuclear power generation. The radioactive waste is an environmental concern that is extremely
toxic and can have devastating effect on the lives of the people living nearby, if not disposed properly.
Radioactive waste is considered to be harmful for humans, plants, animals and surrounding environment.
19. Loss of Endangered Species: Human overpopulation is prompting the elimination of species and
environmental surroundings and the loss of various biomes. Environmental frameworks, which took a huge
number of years to come into being, are in risk when any species populace is huge.
20. Acid Rain: Acid rain happens because of the vicinity of specific poisons in the climate. Corrosive
downpour might be brought about because of use of fossil fuels or volcanoes or spoiling vegetation which
discharge sulfur dioxide and nitrogen oxides into the air.
21: Agricultural Pollution: Modern day agriculture practices make use of chemical products like
pesticides and fertilizers to deal with local pests. Some of the chemicals when sprayed do not disappear
and infact seeps into the ground and thereby harms plants and crops. Also, contaminated water is used for
irrigation by farmers due to disposal of industrial and agricultural waste in local water bodies.
22: Light and Noise Pollution: Noise pollution is another common form of pollution that causes
temporary disruption when there is excessive amount of unpleasant noise. Construction activities,
industrialization, increase in vehicular traffic, lack of urban planning are few of the causes of noise
pollution.
23. Urban Sprawl: Urban sprawl alludes to relocation of populace from high thickness urban ranges to
low density provincial zones which bring about spreading of city over more rustic area. Urban sprawl
brings about expanded movement, environmental concerns and well-being concerns.
24: Medical Waste: Medical waste is any kind of waste that is produced in large quantity by healthcare
centers like hospitals, nursing homes, dental clinics and is considered to be of a bio-hazardous nature. The
waste can include needles, syringes, gloves, tubes, blades, blood, body parts and many more.
25: Littering and Landfills: Littering simply means disposal of piece of garbage or debris improperly or
at wrong location usually on the ground instead of disposing them at trash container or recycling bin.
Littering can cause huge environmental and economic impact in the form of spending millions of dollars to
clean the garbage of road that pollute the clean air.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Landfills on the other hand are nothing but huge garbage dumps that make the city look ugly and produce
toxic gases that could prove fatal for humans and animals. Landfills are generated due to large amount of
waste that is generated by households, industries and healthcare centers everyday.
Social and Political Dimensions of
Climate Change
Climate change creates injustices in who caused the problem, who is suffering worst
and first, and who is taking action. Power between nations and social groups drives
unequal disaster risks and the “compounded vulnerabilities” of poor peoples and
nations, and has led to gridlock in United Nations negotiations. The course reviews
social and political dimensions of local and national adaptation efforts, media
dynamics, collective and individual denial, and the rise of climate social movements.
The human emissions of billions of tons of gases known to trap heat in the
atmosphere is a massive experiment on the systems that support our species.
Human civilization has developed in a remarkably stable period of global
temperature and precipitation, but the climate impacts are rising and projected to get
much worse in the decades ahead. Are we helpless? Who is suffering first and
worst from climate change?
Field Class Country: Turkey
Day: 1 - Antalya - Wednesday, 3 July
July 3 (Antalya, Turkey) The lab will begin with a bus tour of two or three highly
vulnerable areas of the city, including coastal areas experiencing flooding, and
informal settlements in flood-prone areas around urban rivers. At each stop, we will
hear from local residents and community organizations about their experiences and
concerns. Lunch will take place at a good park or location with a vista of these
problems. Next we will travel to wealthier and higher neighborhoods for
comparison, and the final stop will be municipal and federal planning and/or
environmental agencies, to see mapping of flood-prone areas, hear about disaster
mitigation efforts, urban planning directions, and the role of climate change in their
formulation. Students will read Turkey’s national position papers on climate change,
which include descriptions of the nation’s vulnerability and adaptation efforts, and
COPYRIGHTS - DIWAKAR EDUCATION HUB
its position on its responsibility to reduce emissions and make binding commitments
in the UNFCCC negotiations. We will compare this with the piece by World Bank
urban specialist Anthony Bigio comparing Casablanca, Tunis and Alexandria’s
vulnerability and flooding preparations. Students will review Google Earth and
LIDAR flooding maps, review NGO and government websites on the issue. They
will collect notes and photos during the visit, and produce a 3 page review tying the
trip to the course’s larger themes of the social and political dimensions of climate
change. Academic Objectives:
1. To see vulnerable riverine and coastal areas and human habitation and
infrastructure, and consider other types of climate change-related risks such as
drought and heat waves,
2. To observe strategies for adaptation to rising sea levels and coastal defense being
adopted, as well as upland efforts,
3. To hear from local and national government officials, NGOs, and community
members about climate change and solutions being considered and adopted.
The 12 projects are:
1) Urban solidarity - Cooperative options for action in times of climate change;
2) The social dimension of the rebound effect (REBOUND);
3) SPREAD - Scenarios of Perception and Reaction to Adaptation;
4) Alpine natural hazards in climate change (ANIK) - Interpretation patters and practices from 18th to 21st century;
5) EMIGMA - Empowerment of migrants for climate protection;
6) Regional climate: Social transformation processes for climate protection and adaptation;
7) Climate change, environmental changes and migration: Social and ecological conditions for population movements (MICLE) based on examples from Sahel countries of Mali and Senegal;
8) Climate protection, development and equity: Decarbonisation in developing and emerging nations (EntDekEn);
9) Climate change and everyday action: Potential, strategies and instruments for low-CO2 lifestyles in a zero emission city (KlimaAlltag);
10) Climates of migration. A historical perspective of climate change and environmental migration;
11) Connecting emissions trading systems - The way to a socially and ecologically acceptable structure for the trade in emissions certificates in Europe, the USA and Japan;
12) Climate protection policy in aging societies: Complex climate systems, cognition and willingness to pay (CLIMAGE).
COPYRIGHTS - DIWAKAR EDUCATION HUB
How pollution impacts human health
When people think of air pollution, most immediately picture heavy smog drifting over cities and industrial plants.
This is the first and most evident form of air pollution, but it’s not the only one.
Let’s begin today’s discussion by defining the term air pollution at a broader level. Air pollution in its most basic definition is the introduction of harmful substances into the Earth’s atmosphere.
These substances linger and cause many adverse effects. As you know, humans and other living creatures rely on the atmosphere for respiration. When air quality is dampened by pollution, immediate and longer term consequences take place.
Pollution has been known to cause allergies, disease, damage to crops, and in extreme cases, even death.
In addition, air pollution creates an imbalance in the natural gases that make up our Earth’s atmosphere. These imbalances slowly aid in the depletion of the Ozone layer, an essential region of the stratosphere that soaks up most of the sun’s damaging ultraviolet (UV) rays.
As the Ozone depletes, the rate of global warming increases. If enough air pollution clutters our environment, it creates the danger of more rapid deterioration of the Ozone layer.
You can see the trouble this may cause.
It’s important that we, as citizens of the world, fully understand the causes, effects, and possible solutions of air pollution so that we can make an educated decision for Earth’s future.
Causes
There are many causes of air pollution. For sanity’s sake, we’ve done our best to categorize them at a more general level.
Before we get into the different causes, let’s take a quick step back and look at the different variations of air pollution.
First, there’s invisible and visible air pollution. The smog you see lingering over a city is a good example of visible pollution.
Invisible pollutants aren’t as noticeable, but they can be just as deadly, if not more so. Examples of invisible pollutants include nitrogen oxides, sulfur dioxide, and carbon monoxide, to name a few.
Carbon monoxide inhaled and introduced into the human blood stream spells trouble if the pollution is a high enough concentration.
Digging down even deeper, air pollution can be split into primary and secondary pollutants.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Primary pollutants, such as sulfur dioxide, are ones directly released into the atmosphere. Secondary pollutants, like smog for example, are the result of primary pollutants intermingling with the already existing particles in the atmosphere.
Without any further ado, let’s get into some specific causes of air pollution.
1. Vehicle Exhaust Fumes.
The number one source of air pollution in city environments is vehicle exhaust fumes, which happen to release high amounts of carbon monoxide. It’s no surprise then that carbon monoxide also happens to be the largest air pollutant in the United States.
Millions of vehicles are operated on a daily basis in the US alone, each one leaving its own carbon footprint on the environment. This is why hybrid and fully electric vehicles are making a splash in the automobile marketplace.
People are looking to rely less on fossil fuels to power their cars, leading to less toxic emissions into the environment.
2. Fossil Fuel-Based Power Plants.
In addition to vehicle exhaust pollution, fossil fuels also present a wider scale problem when they’re burned for energy in power plants.
Chemicals like sulfur dioxide are released during the burning process, which travel straight into the atmosphere. These types of pollutants react with water molecules to yield something known as acid rain.
This is one of the reasons that alternative energy sources, such as nuclear, solar, and wind are being explored in greater detail. They tend to release much less pollutants into the environment to produce equivalent amounts of energy.
3. Exhaust from Industrial Plants and Factories.
Similar to exhaust being released from vehicles, heavier machinery located inside big factories and industrial plants also emit pollutants into the air.
Industrial plants can be found pretty much everywhere in the world, so the spreading of air pollution is basically global.
COPYRIGHTS - DIWAKAR EDUCATION HUB
4. Construction and Agricultural Activities.
On a daily basis, dirt and dust is kicked up into the atmosphere from excavating and demolition type construction activities.
Switching the focus to agricultural activities, ammonia is a frequent byproduct that just so happens to be one of the most dangerous gases in our environment.
There are also plenty of nasty chemicals that get placed into the atmosphere from pesticides and fertilizers, which are being used at increasingly higher rates.
5. Natural Causes.
When people think pollution, they almost always blame other people. Let’s not forget that the Earth is one of the biggest polluters itself, though.
Volcanoes, forest fires, and dust storms are nature-born events that dump massive amounts of air
pollution into the environment.
It’s often debated that humans don’t come close to volcanoes when it comes to air pollutants, but we’ll leave that for the readers to decide.
6. Household Activities.
Forget about outdoor pollution. What about the pollution that takes place inside our own homes?
Common household chemicals, notably bleach, without proper ventilation is a primary source of indoor air pollution.
Smoking tobacco through the use of cigarettes and cigars also releases toxic pollutants into the air.
It’s often easier to think of outdoor pollution as the primary danger on a wide scale level, but don’t dismiss the little everyday activities that also impact our health.
Effects
Now that we know the culprits of air pollution, let’s start discussing the harmful effects.
There are many different types of effects that air pollutants can cause. For one, there’s the human health factor to consider.
If humans are at risk, then other forms of wildlife and organic creatures are in danger as well.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Then there are the effects on the planet and its atmosphere.
In the paragraphs to follow, we’ll take a closer look at all of air pollution’s effects.
1. Accelerated Global Warming.
This is a green energy discussion, so let’s tackle this one first.
Earlier on, you learned about the Ozone layer and its role in protecting our planet. Air pollution directly accelerates the rate at which global warming happens by depleting the Ozone layer.
Global warming refers to the increased temperatures Earth continues to experience. These higher temperatures lead to the melting of the polar ice caps and icebergs, which elevates sea levels and
creates concern for the human race.
2. Human Respiratory and Heart Concerns.
Air pollution is known to cause irritation in the eyes, lungs, nose, and throat. It creates respiratory problems and exacerbates existing conditions such as asthma and emphysema.
When continually exposed to air pollution, humans become at higher risk for cardiovascular disease. Air filled with toxins can have a number of adverse effects on the arteries, and have even been a contributor to heart attacks.
3. Wildlife Endangerment.
Most diseases and conditions that humans are susceptible to, animals are as well. Air pollution creates many of the same issues that humans face.
Heavily polluted areas force inhabitants to seek new homes, which can negatively impact the ecosystem.
Toxic chemicals, which we’ll discuss in the next bullet, also deposit over surfaces of water that can lead to the endangerment of marine life animals.
4. Acid Rain.
When air pollution, specifically sulfur oxides and nitrogen oxides, are released into sky through fossil fuel burning, it creates the phenomenon known as acid rain.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Water, high in the atmosphere, combines with these chemicals and becomes acidic in nature. It then scatters the ground, disguised as normal rainfall.
Acid rain has been known to cause harm to humans and animals alike, and even damage crops.
Solutions
Up until this point, we’ve covered all the bad of air pollution. Now let’s get onto the good.
Well, there’s actually not much good to say for air pollution, but there are a number of positive ways it can be dealt with.
Understanding the causes and effects proves to be important so that we can determine how best to combat it.
Reducing the use of fossil fuel powered automobiles is clearly something that can help. Same with finding unique ways to reduce energy consumption.
Let’s dig a little deeper into common solutions for preventing and minimizing air pollution.
1. Minimize the Use of Fossil Fuel Powered Automobiles.
As a leading contributor to air pollution, it only makes sense that a vehicle-based solution appears first on this list.
One way to do this is by switching to a hybrid vehicle, or better yet, one that runs on fully electric.
Other ways include taking public transportation, carpooling with friends and colleagues, or even riding a bike to your destination.
2. Be Mindful of Energy Consumption.
When you’re leaving home, be sure to turn off the lights, TV, and any other electronic appliances.
Fossil fuel plants are a major cause of air pollutants, and the less energy you need, the less we have to rely on those plants to generate electricity.
This also means turning to energy efficient devices when possible. Fluorescent lightbulbs over the course of their lifespan can reduce energy consumption while adding significant savings to your pocket.
COPYRIGHTS - DIWAKAR EDUCATION HUB
3. Become an Advocate for Clean Energy.
Every day, technology continues to advance that improves the efficiency and cost of clean energy such as solar, wind, and geothermal. These types of energy sources create much less air pollution.
Even nuclear is leaps and bounds better than traditional fossil fuel plants when it comes to air pollution.
Find ways to promote and educate the public on clean energy alternatives. A small contribution goes a long way in the grand scheme of things.
4. Recycle.
Ah, yes. Recycling. Another topic of heated debates. Wherever you stand on the matter, recycling can help reduce air pollution.
Instead of throwing away used containers and material, try reusing them or recycling them to be
used again by someone else.
One thing I personally love to do is reuse to-go containers from restaurants as plastic ware for work lunches. This obviously only works with plastic material, not Styrofoam.
Conclusion
We have now discussed the common causes, effects, and solutions for dealing with air pollution.
With air pollutants being such a widespread epidemic, it’s imperative that we come together as Earth’s inhabitants to become part of the solution, instead of continuing to be the problem.
We can make the choice to drive less toxic automobiles. We can choose how much energy we consume on a daily basis. We can also choose to reuse our old materials instead of dumping them into the environment.
Air pollution can have some devastating impacts on our bodies and the planet if left untouched.
What are your thoughts on the situation?
Natural Resources
mans, animals, and other living organisms have relied on natural resources for survival since the beginning of time. The conservation of natural resources is important as the world population continues to grow, with many of the most important natural resources being finite and non-renewable.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Natural resources are materials and substances that occur naturally and can be used for economic gain. They include minerals, forests, fertile land, and water. Some natural resources, such as soil and water, are essential for the existence of life.
A non-renewable natural resource is defined as a resource that cannot be replaced in our lifetime. They include metal ores, fossil fuels, earth minerals, and in some in certain situations groundwater.
Renewable natural resources are resources that can be replaced naturally in our lifetime, and used repeatedly. Examples include fresh water, timber, oxygen, and solar energy.
This article will discuss the top natural resources and what they are used for.
11. Copper
Copper has been in use for thousands of years and is one of the first metals ever used by man. It occurs naturally and is one of the few metallic elements that occur in native form.
The majority of copper is used in electrical wires, industrial machinery, and roofing and plumbing. Copper is also used in nutritional supplements and fungicides for agriculture.
The United States is the second largest producer of copper, which is mined from copper ores and recovered through recycling. Copper can be recycled without any loss in quality. As a result nearly just as much copper is recovered through recycling as is derived from newly mined ore.
10. Helium
The first thing most people think of when they hear the word helium is balloons, however balloons make up a tiny fraction of the total helium used in today’s society. According the Royal Society of Chemistry helium is necessary as a cooling medium for the Large Hadron Collider (LHC), superconducting magnets in MRI scanners and NMR spectrometers, and satellite instruments.
Because helium is non-reactive it is used to create a protective inert atmosphere in the processes of making fiber optics and semi-conductors. Helium is also used to detect for leaks in air-conditioning systems, and to inflate air-bags in vehicles because it is non-toxic and diffuses quickly.
Even though helium is the second most abundant element in the solar system, it is considered a non-renewable resource. Most helium is produced where coincidences of unlikely situations occur within the Earth’s crust, making the gas rare. Extracting helium from the air is uneconomical with there being less than 0.00052% in air.
9. Bauxite
Bauxite forms as rocks in soils with very little soluble materials that are located in wet tropical climates. This is one of the reasons why Australia is the top producer of bauxite.
Bauxite is the main ingredient in making aluminum metal, and nearly all aluminum produced has been extracted from bauxite. It is also used in hydraulic fracturing, a process in drilling for oil and gas.
COPYRIGHTS - DIWAKAR EDUCATION HUB
8. Iron
Iron is in everyday items all around us and is the world’s most commonly used metal. Iron is a good conductor, durable, and plentiful making up 5% of the Earth’s crust. This is why it is used to make steel, electrical wiring and conduct, pipes, tools, hinges, door handles, stoves, pots and pans, and even sofa frames.
Most of the world’s iron ore is mined from banded iron formations (BIFs) primarily located in Australia, Brazil, and South Africa.
7. Coal
People have been using coal as a heat source for centuries. In today’s society coal has become the primary source of fuel for electricity production because it is abundant, has high energy output, and is relatively inexpensive.
Coal is a fossil fuel created through a process known as coalification. Plants that formed millions of years ago in swamp forests died and formed layers of peat that were buried through geological processes, and then altered through heat and pressure in low oxygen environments.
There are many problems that accompany the mining and use of coal. According to the U.S. Geological Survey, one of the more serious environmental issues is the adverse effect on surface and ground water from the disposal of ash and sludge that results from the burning of coal and the cleaning of flue gases.
6. Natural Gas
Natural gas supplies about 22% of the nation’s energy needs and is used as an energy source for heating, cooking, and generation of electricity. It is also used in the process of making plastics and other commercially important organic compounds.
Natural gas is a fossil fuel created by the decomposition of organic material, usually from ancient marine organisms, in an anaerobic environment. There are two categories of natural gas deposits, conventional and unconventional. Conventional deposits are associated with oil reserves, and unconventional deposits include coal bed methane, shale gas, and tight-gas sandstone.
5. Oil
Like natural gas, oil is created through the decomposition of organic matter in an anaerobic environment over millions of years. Oil supplies 40% of the nation’s energy needs and is used for the production of gasoline, diesel fuel, jet fuel, propane, and asphalt. Oil is also used in the manufacturing of petrochemicals for production of plastics, synthetic rubber, and chemicals.
The location of oil and gas reserves is determined by plate tectonics. This is why most oil is found in deserts, artic regions, river deltas, and continental margins offshore. Plate tectonics create the locations for anoxic burial and the high pressure and heat required for organic matter to turn to oil.
4. Salt
Salt, also known as sodium chloride, is an essential mineral for the life of humans and animals.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Salt is mined through one of four methods: rock salt mining underground, solution mining by injecting a solvent that dissolves underground salt and then is recovered through solar evaporations, sea water evaporation in which sea water is collected in solar evaporation ponds, and inland solar evaporation which is similar to sea water evaporation but inland.
Over 40% of the salt mined is used in the chemical industry, with another 40% being used as deicer on roads in the winter. The remaining 20% is spread out over processing of table salt, and manufacturing of rubber and other goods.
3. Timber
Timber is an important renewable natural resource in many societies around the world. If production is approached in a responsible way it can be both sustainable and economical.
Timbers are mostly used to create lumber for use in construction. They can also be roughly shaped and used as heavy duty beams and columns.
Timber is also used to make paper products, fiber board, hard board, plywood, and particle board.
2. Soil
Soil is one of the most important natural resources on Earth, being required both directly and indirectly for food production, manufacturing of industrial raw materials, and for generation of energy sources. Soil is essential for the function of ecosystems providing nutrients, oxygen, water, and heat.
Soil resources are being degraded by poor agricultural practices and chemical contamination. One of the most significant challenges facing current and future generations is the preservation of this irreplaceable natural resource from pollution and physical destruction.
1. Water
Like soil, water is one of the most important natural resources for the existence of life. Fresh water is consider a renewable resource, but most of the water humans drink comes from ground water sources that are being depleted faster than they can be replenished.
Even though water is considered a renewable resource, water resources are facing serious threats by human activities. These activities include pollution, urban growth, deforestation, and climate change.
Conclusion
Natural resources are essential to civilization as we know it, and are the basis for economy and survival.
Resources such as bauxite, iron, and copper form the basis of everyday items, while water, soil, and salt are required for life.
It is humanity’s duty to protect and conserve natural resources. Some things you can do in your everyday life to conserve natural resources include recycling plastic, paper, and metal, and using energy more efficiently.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Renewable Energy
Renewable energy is used to describe energy sources that are replenished by natural processes on a sufficiently rapid time-
scale so that they can be used by humans more or less indefinitely, provided the quantity taken per unit of time is not too great. Renewable energy is derived from natural processes that are replenished constantly. In its various forms, it derives
directly from the sun, or from heat generated deep within the earth.
Included in the definition is electricity and heat generated from:
solar,
wind,
ocean,
hydropower,
biomass,
geothermal resources, and
biofuels and hydrogen derived from renewable resources. Although biomass is a renewable energy, this should not be mistaken for a clean energy source. Although biomass is significantly cleaner than most fossil fuels such as coal and oil, it still produces sulphur dioxide during electricity production.
Renewable energy replaces conventional fuels in four distinct areas:
Power Generation,
Hot Water/ Space Heating,
Transport Fuels, and
Rural (off-grid) Energy Services
Current Situation of Renewable Energy
Global Scenario:
In 2008, about 19% of global final energy consumption came from renewables, with 13% coming from traditional biomass, which is mainly used for heating, and 3.2% from hydroelectricity.
New renewables (small hydro, modern biomass, wind, solar, geothermal, and biofuels) accounted for another 2.7% and are growing very rapidly.
The share of renewables in electricity generation is around 18%, with 15% of global electricity coming from hydroelectricity and 3% from new renewables.
Wind power is growing at the rate of 30% annually, with a worldwide installed capacity of 158 gigawatts (GW) in 2009, and is widely used in Europe,Asia, and the United States.
At the end of 2009, cumulative global photovoltaic (PV) installations surpassed 21 GW and PV power stations are popular in Germany and Spain.
Solar thermal power stations operate in the USA and Spain, and the largest of these is the 354 megawatt (MW) SEGS power plant in the Mojave Desert.
The world’s largest geothermal power installation is The Geysers in California, with a rated capacity of 750 MW.
Brazil has one of the largest renewable energy programs in the world, involving production of ethanol fuel from sugar cane, and ethanol now provides 18% of the country’s automotive fuel. Ethanol fuel is also widely available in the USA.
Globally, an estimated 3 million households get power from small solar PV systems.
More than 30 million rural households get lighting and cooking from biogas made in household-scale digesters.
Biomass cookstoves are used by 160 million households.
Indian Scenario:
Current installed base of Renewable Energy Sources(RES) is 18454.52 MW which is10.63% of total installed base with the southern state of Tamil Nadu contributing nearly a third of it (5008.26 MW) largely through wind power (as on 31/03/2011 by
CEA)
R.E.S. INCLUDES :- SHP – 2900 MW , WIND – 12000 MW,B.P. & B.G. –2313.33 MW, U&I & SOLAR – 114.74 MW (SHP – SMALL HYDRO POWER, B.P. – BIOMASS POWER, B.G.- BIOMASS GASIFIER, U&I – URBAN & INDUSTRIAL WASTE)
India is the 4th largest country with regard to installed power generation capacity in the field of renewable energy source.
The country has an estimated renewable energy potential of around 85,000 MW from commercially
exploitable sources: Wind, 45,000 MW; small hydro, 15,000 MW and biomass/bioenergy, 25,000 MW. In addition, India has the potential to generate 35MW per square km using solar photovoltaic and solar
thermal energy.
In July 2009, India unveiled a $19 billion plan, Jawaharlal Nehru National Solar Mission, to produce 20,000 MW of solar power by 2020
Tamil Nadu accounts for one third of total RES installed capacity in India followed by Maharashtra, U.P and
Andhra Pradesh
The daily average solar energy incident over India varies from 4 to 7 kWh/m2
India has the fifth largest installed wind power capacity in the world.
The availability of biomass in India is estimated at about 540 million tones per year covering residues from
agriculture, forestry, and plantations. By using these surplus agriculture residues, more than 16,000 MW of grid quality power can be generated.
India has reasonably good potential for geothermal; the potential geothermal provinces can produce 10,600
MW of power.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Major Types of Power stations based on Renewable Energy Sources are:
1. Solar Energy 2. Wind Energy
3. Biomass Energy 4. Geothermal
5. Tidal Energy Solar Energy India is both densely populated and has high solar insolation, providing an ideal combination for solar power in India. India is
already a leader in wind power generation (Wind power in India) and, Suzlon Energy is one of the India-based pioneering industries in world to generate non-conventional energy. In solar energy sector, some large projects have been proposed, and
a 35,000 km² area of the Thar Desert has been set aside for solar power projects, sufficient to generate 700 to 2,100 gigawatts.
In July 2009, India unveiled a $19 billion plan, to produce 20 GW of solar power by 2020.Under the plan,….
Wind Energy The development of wind power in India began in the 1990s, and has significantly increased in the last few years. Although a relative newcomer to the wind industry compared with Denmark or the US, India has the fifth largest installed wind power
capacity in the world. As of 31 October 2009 the installed capacity of wind power in India was 11806.69 MW, mainly spread across Tamil Nadu
(4889.765 MW), Maharashtra (1942.25 MW), Gujarat (1565.61 MW), Karnataka (1340.23 MW), Rajasthan (738.5 MW), Madhya Pradesh (212.8 MW), Andhra Pradesh (122.45 MW), Kerala (26.5 MW), Odisha (2MW), West Bengal (1.1 MW) and
other states…
Biomass Energy Biomass (plant material) is a renewable energy source because the energy it contains comes from the sun. Through the process of photosynthesis, plants capture the sun’s energy. When the plants are burned, they release the sun’s energy they
contain. In this way, biomass functions as a sort of natural battery for storing solar energy. As long as biomass is produced sustainably, with only as much used as is grown, the battery will last indefinitely.
In general there are two main approaches to using plants for energy production: growing plants specifically for energy use, and using the residues from plants that are…
Geothermal
The word geothermal comes from the Greek words geo (earth) and therme (heat). So, geothermal energy is heat from within the Earth. We can recover this heat as steam or hot water and use it to heat buildings or generate electricity.It is a natural part of the energy flow within the Earth’s depths. Generally speaking, the further down one drills, the hotter the temperatures.
Most of the commercial-grade production geothermal energy is harvested along localized “geothermal systems”, where the heat flow is near enough to the surface that hot water or steam is able to rise either to the surface, or to depths that we can
reach by drilling. Many of these regions occur within the “ring of fire“, a ring of geothermal sites…
Tidal Power Tidal power is the only form of energy which derives directly from the relative motions of the Earth–Moon system, and
to a lesser extent from the Earth–Sun system. The tidal forces produced by the Moon and Sun, in combination with Earth’s rotation, are responsible for the generation of the tides. Tidal power is the only form of energy which derives
directly from the relative motions of the Earth–Moon system, and to a lesser extent from the Earth–Sun system. The tidal forces produced by the Moon and Sun, in combination with Earth’s rotation, are responsible for the generation of the tides
What is Hazard Mitigation? Hazard mitigation describes actions taken to help reduce or eliminate long-term risks caused
by hazards or disasters, such as flooding, earthquakes, wildfires, landslides, or dam
failure. As the costs of disasters continue to rise, governments and citizens must find ways to
reduce hazard risks to our communities. As communities plan for new development and
improvements to existing infrastructure, mitigation can and should be an important
component of the planning effort.
While mitigation activities can and should be taken before a disaster occurs, hazard
mitigation is essential after a disaster. Oftentimes after disasters, repairs and reconstruction
are completed in such a way as to simply restore damaged property to pre-disaster conditions.
These efforts may get the community back to normal, but the replication of pre-disaster
conditions may result in a repetitive cycle of damage, reconstruction, and repeated damage.
COPYRIGHTS - DIWAKAR EDUCATION HUB
This recurrent reconstruction becomes more expensive as the years go by. Hazard mitigation
breaks this repetitive cycle by taking a long-term view of rebuilding and recovering following
disasters. The implementation of such hazard mitigation actions leads to building stronger,
safer and smarter communities that are better able to reduce future injuries and future
damage.
Types of Mitigation Techniques
Prevention - Government, administrative, or regulatory actions that influence the way land
and buildings are developed to reduce hazard losses. Includes planning and zoning,
floodplain laws, capital improvement programs, open space preservation, and stormwater
management regulations.
Property Protection - Modification of buildings or structures to protect them from a hazard
or removal of structures from a hazard area. Includes acquisition, elevation, relocation,
structural retrofit, storm shutters, and shatter-resistant glass.
Public Education and Awareness - Actions to inform citizens and elected officials about
hazards and ways to mitigate them. Includes outreach projects, real estate disclosure, hazard
information centers, and school-age and adult education.
Natural Resource Protection - Actions that minimize hazard loss and preserve or restore the
functions of natural systems. Includes sediment and erosion control, stream corridor
restoration, watershed management, forest and vegetation management, and wetland
restoration and preservation.
Emergency Services - Actions that protect people and property during and immediately after
a hazard event. Includes warning systems, emergency response services, and the protection of
essential facilities.
Structural Projects - Actions that involve the construction of structures to reduce the impact
of a hazard. Includes dams, setback levees, floodwalls, retaining walls, and safe rooms.
Common Mitigation Actions Enforcement of building codes, floodplain management codes and environmental regulations. Public safety measures such as continual maintenance of roadways, culverts and dams. Acquisition of relocation of structures, such as purchasing buildings located in a floodplain. Acquisition of undeveloped hazard prone lands to ensure no future construction occurs there. Retrofitting of structures and design of new construction, such as elevating a home or building. Protecting critical facilities and infrastructure from future hazard events. Planning for hazard mitigation, emergency operations, disaster recovery, and continuity of
operations. Development and distribution of outreach materials related to hazard mitigation.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Deployment of warning systems to alert and notify the public.
During the planning process, the City of Los Angeles Steering Committee is actively
engaging community members and stakeholders in the planning process as part of a whole
community approach in hazard mitigation and disaster planning.
Hazard Mitigation Plan Revision Process
This hazard mitigation planning process has six steps:
STEP 1: Organize Resources & Build the Planning Team
Relevant studies, plans, and reports are collected along with communications resources that
allow the public to be involved throughout the planning process. A planning team is
assembled consisting of municipal representatives, and local and regional stakeholders.
STEP 2: Develop the Plan’s Risk Assessment
The risk assessment includes the identification of the location and geographic extent of
natural and human-caused hazards that can affect the City. The hazard impacts and future
probability of occurrence is also determined. Scientific and historical evidence of past events
is collected and evaluated. All of these factors, along with the information on damage and
losses sustained by the City, enables the hazards to be ranked from highest threat to lowest
threat.
STEP 3: Assess Capabilities
Local capabilities through emergency management, the National Flood Insurance Program,
planning and regulatory authorities, administrative, technical, financial, and political
capacities are assessed for the plan revision.
STEP 4: Develop the Mitigation Strategy
Goals, objectives, and past mitigation actions are evaluated and revised as needed by the
planning team. The planning team will also define appropriate new mitigation techniques,
and prioritize mitigation actions and projects in the revised mitigation strategy.
STEP 5: Determine Plan Maintenance Process
The HMP is a living document that must be regularly reviewed, updated, and maintained. A
schedule is prepared to include responsible departments involved with monitoring,
evaluating, and updating the plan during its five-year cycle. A process for integrating the
updated Mitigation Strategy into existing plans and reports should be outlined and a plan for
continued public outreach and participation must also be developed.
COPYRIGHTS - DIWAKAR EDUCATION HUB
STEP 6: Obtain Mitigation Plan Approval and Adoption
The draft plan is made available for public comment then submitted to the State of California
Office of Emergency Services (Cal OES) and FEMA for review and approval. Once a Plan
has been determined to meet all state and federal requirements and receives official approval
it
Environment Protection Act 1986- Protecting India’s Environment
On a cold wintery midnight in December 1984 when the city of Bhopal was sound asleep and the workers
at Union Carbide India Ltd. pesticide plant were completing their routinely task, no one was aware about
the tragedy that was about to strike the city. Suddenly, the families and workers living in the vicinity woke
up to sound of emergency alarm bell and repugnant smell that filled the air making it difficult for the local
population to breath. By the morning, more than thousand people had already died due to the gas leak that
took place inside UCIL plant and spread in the atmosphere. The Methyl isocyanate (MIC) gas in the
atmosphere exposed people to severe irritation in the eyes, coughing, blepharospasm, burning sensation
within the respiratory tracts. Till now, families are suffering because of the horrors committed by UCIL
with more than 500,000 people affected, while owners fled the scene due to weak environmental and civil
laws.
The watershed moment that led to the formulation of EPA
Bhopal Gas Tragedy considered to be the worst industrial disaster in the world was a watershed moment
for India and country’s Parliament, as the lawmakers gathered to formulate stronger norms, acts, policies,
and laws to ensure that such horrific incidents do not occur in India again. The Environment Protection Act
of 1986 (EPA) was enacted by the Government of India under Article 253 of the Indian Constitution. The
Act came in as a result of the Bhopal gas tragedy as well as India’s commitment to follow United Nations
Conference on the Human Environment that took place at Stockholm in June, 1972. The conference was
attended by 122 nations that passed the Stockholm Declaration, that contained 26 principles that focused
on development, environment, and the necessity of human interaction with the environment. The aim of
the Environment Protection Act of 1986 is to improve and protect the human environment, most
importantly to prevent hazards from happening and causing damage to the ecology.
Provisions of Environment Protection Act 1986
On November 19, 1986, the Environment Protection Act of 1986 came into force and was extended to the
whole country. The Act comprises of 4 chapter and 26 sections pertaining to the roles and responsibilities
of different government actors and agencies. Chapter 1 deals with the title of the Act, jurisdiction and
extend, when the act has been enacted, and most importantly the definition of terms that are involved in the
Act. Chapter 2 emphasises on the power that resides with the Central government pertaining to the Act,
while Chapter 3 talks about actions that Central government can take to protect the environment. The last
chapter outlines the power of the Central government to appoint officials to ensure that the objectives of
the Environment Protection Act of 1986.
The EPA of 1986 enables the Central government to act or give direction for process, closure of a
particular establishment violating the rules and guidelines of the Act, regulation and prohibition of an
industry, and many such things that protects and ensures that the EPA is followed. Central government can
formulate rules and regulations to administer environment pollution. Environment Protection Act of 1986
COPYRIGHTS - DIWAKAR EDUCATION HUB
includes penalties incase there is a violation of any aspect of the Act. In case there is any such violation,
the head of the department and office incharge are liable for the offense.
The Environment Protection Act has defined certain areas as restricted corridors due to the ecological
sensitivity such as Aravalli Regions in Alwar, Rajasthan, Coastal sensitive zones, and Doon Valley in
Uttarakhand.
A move to dilute the EPA
In 2015, the newly elected Central government wanted to bring in new amendments to the bill that instead
of strengthening it would have diluted the Environment Protection Act, that since 1986, has helped protect
the country’s environment from being exploited at the hands of private contractors and miners. One of the
proposed amendments included the constitution of an adjudicating body where grievances could be heard
before reaching the National Green Tribunal, while the second proposal to review three paramount points
of impact of evaluation before giving a go ahead to any project. However, after protest from several
environmentalists and civil society members who wrote to the Ministry of Environment and Forest to
rollback the proposed the amendments. The move by the government has been put on the back burner
since then and kept the EPA intact.
India's National Action Plan on Climate
Change needs desperate repair In the middle of an erratic monsoon, in June 2008, India announced its National Action Plan on
Climate Change (NAPCC). When it happened, we were just one of the 10-odd countries in the
world to have a consolidated policy instrument to tackle climate change.
Ten years later, and with the monsoon being even more erratic, there is no clarity on how
NAPCC has fared. Officials are unwilling to divulge information and the budget heads and
schemes through which the plan is being implemented have changed enough times to make
tracking its perfor mance difficult, if not impossible.
It is also equally true that India is now more vulnerable to climate change. According to the
Global Climate Risk Index of 2018, published by German Watch, a non-profit working on North-
South equity and preservation of livelihoods, India is the 12th most vulnerable country to climate
change impacts. Every year, it witnesses an average of 3,570 deaths attributable to climate-related
events, and the cost of climate change impact it will pay is proje cted to run into trillions of
dollars in the near future.
For a country that has already been suffering from climate change impacts, the formulation of a
policy to tackle the problem should have come in natural course. But NAPCC was more an
exercise to secure international standing than anything else. The first decade of the 21st century
was a period of great churning in terms of the political and economic discussions around climate
change. Though there was no institutional pressure, developed countries were badgering
COPYRIGHTS - DIWAKAR EDUCATION HUB
developing countries to reduce their emissions. In 2007, China released its national plan to
address climate change issues, leaving India as the only big developing country without such an
instrument. As a result, the government wanted a policy instrument before the G8 Summit at
Tokyo in 2008 and the Conference of Parties at Copenhagen in 2009.
To this end, the United Progressive Alliance (UPA) government constituted the Prime Minister’s
Council on Climate Cha-nge (PMCCC) in mid-2007. The 26-member council included ministers,
independent experts and retired government experts. Over three high-powered sessions, between
July 13, 2007 and June 2, 2008, the government managed to announce NAPCC a month before
the G8 summit to be held in July 2008. The plan, which has eight sectoral missions, was to be
overseen by six Union ministries. However, overall 10 ministries, including finance and external
affairs, too, were involved in its implementation.
The rushed manner in which NAPCC was formulated ensured that the document merely provided
broad objectives and did not address strategy. While PMCCC had representation of diverse
sectors on paper, the document’s content was primarily shaped by a three-member group from
within the council—the principal scientific advisor, former secretary to the then Union Ministry
of Environment and Forests, and the director general of Delhi-based non-profit The Energy and
Resources Institute (TERI). The final draft was prepared by the Prime Minister’s Office, further
limiting the significance of inputs from the council.
Following the hurried announcement of NAPCC in 2008, the ministries concerned took six more
years to approve the missions. By then, the new National Democratic Alliance (NDA)
government had formed in 2014. Under the new dispensation, PMCCC has met, reportedly, just
once in 2015. Though the government has announced new schemes to meet the climate change
objectives, it has not aligned or integrated them with NAPCC. Due to this, the missions have lost
homogeneity and functionality. There are several other challenges that the missions face. One, the
monitoring system is either absent or ineffective. Two, the budgetary support by the government
is very limited. Considering the scant domestic and international channels for finance, the
government needs to mobilise funds from different sources. Three, states have to frame their own
action plans, or State Action Plans on Climate Change (SAPCC), in line with NAPCC. But
SAPCCs framed by almost all the states are vague.
Politically, the most significant part of NAPCC is the introduction of co-benefits—“measures that
promote our development objectives while also yielding co-benefits for addressing climate
change effectively”, as per PMCCC. But 10 years after it was announced, are we closer to
realising the targets NAPCC sought to meet? A look at how the missions have performed:
COPYRIGHTS - DIWAKAR EDUCATION HUB
The Montreal Protocol on Substances That Deplete the Ozone Layer
BACKGROUND The Montreal Protocol, finalized in 1987, is a global agreement to protect the stratospheric ozone layer by phasing out the production and consumption of ozone-depleting substances (ODS). The stratospheric ozone layer filters out harmful ultraviolet radiation, which is associated with an increased prevalence of skin cancer and cataracts, reduced agricultural productivity, and disruption of marine ecosystems. The United States ratified the Montreal Protocol in 1988 and has joined four subsequent amendments. The United States has been a leader within the Protocol throughout its existence, and has taken strong domestic action to phase out the production and consumption of ODS such as chlorofluorocarbons (CFCs) and halons.
The Montreal Protocol has proven to be innovative and successful, and is the first treaty to achieve universal ratification by all countries in the world. Leveraging worldwide participation, the Montreal Protocol has sent clear signals to the global market and placed the ozone layer, which was in peril, on a path to repair. Full implementation of the Montreal Protocol is expected to result in avoidance of more than 280 million cases of skin cancer, approximately 1.6 million skin cancer deaths, and more than 45 million cases of cataracts in the United States alone by the end of the century, with even greater benefits worldwide. The Montreal Protocol’s Scientific Assessment Panel estimates that with implementation of the Montreal Protocol we can expect near complete recovery of the ozone layer by the middle of the 21st century. Further information on the science of the Stratospheric Ozone Layer can be found on the NASA and NOAA websites, and information on the U.S. domestic implementation of the Montreal Protocol can be found on the EPA website.
The full text of the Protocol, information on its institutions and past actions, and related publications are available through the UNEP Ozone Secretariat.
KIGALI AMENDMENT TO THE MONTREAL PROTOCOL On October 15, 2016, Parties to the Montreal Protocol adopted the Kigali amendment to phase down production and consumption of hydrofluorocarbons (HFCs) worldwide. HFCs are widely used alternatives to ozone depleting substances such as hydrochlorofluorocarbons (HCFCs) and chlorofluorocarbons (CFCs), already controlled under the Protocol.
This amendment creates market certainty and opens international markets to new technology that is better for the environment, without compromising performance. It calls on all countries to gradually phase down their production and consumption of HFCs in the coming decades using the flexible, innovative, and effective approaches the Montreal Protocol has used for three decades. Global stakeholders endorsed adoption of the Kigali amendment, including most of the major U.S. companies working in related sectors.
Earth Summit (1992)
(RIO SUMMIT)
Introduction
In June 1992 representatives from 172 nations convened in Rio
de Janeiro, Brazil, for the United Nations Conference on
Environment and Development (UNCED), commonly called
the Earth Summit. The Earth Summit was an unprecedented
COPYRIGHTS - DIWAKAR EDUCATION HUB
meeting of representatives, including 108 heads of state, 2,400
representatives from various non-governmental organizations
(NGOs), and nearly 10,000 journalists. An additional 17,000 NGO
representatives attended a parallel NGO forum that provided
recommendations to the Earth Summit.
The massive interest and participation of nations and NGOs in
the Earth Summit indicated a shift in global attitudes toward the
environment. Scientific evidence gathered in the second half of
the twentieth century indicated that human activity was taking a
toll on the environment. The scientific evidence also indicated
that pollution and depletion of natural resources that occurred in
one country could have a profound effect on the environment of
other nations or the entire planet. At the Earth Summit, world
leaders devised plans and policies to protect the environment by
involving national and local governments and NGOs.
Historical Background and Scientific Foundations
The Earth Summit was not the first international conference to
address environmental issues. In 1972 the United
Nations convened the United Nations Conference on the Human
Environment in Stockholm, Sweden. This conference, often
called the Stockholm Conference, was the first international
conference to address environmental problems directly.
Representatives from 113 nations and over 400 NGOs attended
the Stockholm Conference. The conference produced the
Declaration of the Conference on the Human Environment, which
stated that every person deserved a clean, healthy environment.
The conference also produced an Action Plan, which contained
109 specific recommendations for improving the environment,
including limiting the use of ozone-depleting chlorofluorocarbons
(CFCs).
COPYRIGHTS - DIWAKAR EDUCATION HUB
In 1983 the United Nations convened the World Commission on
Environment and Development (WCED), also known as the
Brundtland Commission. The commission addressed the ongoing
deterioration of the environment and depletion of natural
resources and the effect that these conditions had on human
social and economic activities. The most notable result of the
Brundtland Commission was the publication of its report, Our
Common Future, in 1987.
Our Common Future stressed the need for sustainable
development that would promote economic growth while
protecting the environment for future generations. The report laid
the international political groundwork for the Earth Summit by
establishing the environment and sustainable development
among the most pressing international issues.
Impacts and Issues
Earth Summit 1992 produced several long-range reports and
implementation plans that continue to serve as blueprints for
international action on environmental issues, including the World
Summit on Sustainable Development (Earth Summit 2002) and
the Kyoto Protocol. Earth Summit 1992 produced the Rio
Declaration on Environment and Development, the Statement of
Forest Principles, and Agenda 21. The Earth Summit also led to
the establishment of the Convention on Biological Diversity, and
the United Nations Framework Convention on Climate Change
(UNFCCC).
The Rio Declaration on Environment and Development is a set of
principles that defines the rights and responsibilities of nations in
the areas of environmental protection and sustainable
development. The Rio Declaration states that nations have the
right to exploit natural resources within their borders if their
actions do not affect the environment in other nations. It also calls
on all national and local governments to develop and implement
COPYRIGHTS - DIWAKAR EDUCATION HUB
plans that preserve the environment and natural resources for
future generations.
The Statement of Forest Principles called for sustainable
management of forests worldwide. It is a nonbinding document
produced through compromise after developed nations refused to
pay for the setting aside of national forests by developing nations.
Agenda 21 is a comprehensive plan for intergovernmental
agencies, national governments, local governments, and NGOs
to work together to protect the environment through sustainable
development. It contains four categories: Social and Economic
Dimensions, Conservation and Management of Resources for
Development, Strengthening the Role of Major Groups, and
Means of Implementation. The United Nations Commission on
Sustainable Development is primarily responsible for the
implementation of Agenda 21.
Agenda 21 recognized that developing nations and developed
nations both contribute to environmental degradation. Poorer
nations often have less restrictive environmental regulations and
focus on economic development. Despite stronger environmental
regulations, developed nations have patterns of production and
consumption that pollute the environment.
Agenda 21, therefore, addressed environmental issues through
detailed social and economic proposals. Agenda 21 proposed
addressing environmental issues through combating poverty,
conserving and managing natural resources, preventing
deforestation, promoting sustainable agriculture, addressing
production and consumption patterns, and protecting the
atmospheres and oceans.
The Rio Earth Summit also produced two international
environmental treaties, Convention on Biological Diversity and
COPYRIGHTS - DIWAKAR EDUCATION HUB
the United Nations Framework Convention on Climate Change.
The Convention on Biological Diversity was the first international
treaty to address preservation of biological diversity. Over 180
countries have signed the Convention on Biological Diversity.
The Convention on Biological Diversity has three primary goals:
conservation of biodiversity; sustainable use of the components
of biodiversity; and a fair and equitable sharing of the benefits
that arise from using biological resources. In order to achieve
these goals, the
WORDS TO KNOW
BIODIVERSITY: Literally, “life diversity”: the wide range of plants
and animals that exist within any given geographical region.
CHLOROFLUOROCARBONS: Chemical compounds containing
chlorine, fluorine, carbon, and oxygen. They are widely used in
refrigeration and air-conditioning systems and are destructive of
the ozone layer in Earth’s stratosphere.
GREENHOUSE GAS: A gas whose accumulation in the
atmosphere increases heat retention.
NON-GOVERNMENTAL ORGANIZATION (NGO): A voluntary
organization that is not part of any government; often organized
to address a specific issue or perform a humanitarian function.
Convention on Biological Diversity balances traditional
conservation efforts with the economic reality of sustainable use
of natural resources.
The United Nations Framework Convention on Climate Change is
an international treaty proposed at the Rio Earth Summit. The
UNFCCC seeks to combat global climate change by reducing
greenhouse-gas emissions. Over 190 nations have ratified the
UNFCCC.
COPYRIGHTS - DIWAKAR EDUCATION HUB
The stated purpose of the UNFCCC is to allow governments to
perform the following acts: gather and share information on
greenhouse-gas emissions, national policies, and effective
practices; launch national strategies for addressing greenhouse-
gas emissions; and cooperate in preparing for adaptation to the
impacts of global climate change. The UNFCCC includes a
provision whereby developed countries provide financial and
technological support for developing nations to address global
climate change.
The Kyoto Protocol is the most well-known and far-reaching
action taken under the UNFCCC. The Kyoto Protocol is an
international treaty that seeks to stabilize greenhouse-gas
emissions by committing countries to specific greenhouse-gas
emissions goals. The Kyoto Protocol was adopted at the Third
Conference of the Parties (COP) to the UNFCCC in 1997, and
the treaty went into effect in February 2005.
The Kyoto Protocol requires developed countries to reduce their
greenhouse-gas emissions to 5% below 1990 levels by 2012.
The Kyoto Protocol places a heavier burden on developed
nations for two reasons. First, these nations have the economic
resources to pay for a reduction in greenhouse-gas emissions
through technological advancements. Second, developed nations
have historically produced more greenhouse-gas emissions per
Capita. As of mid-2008, the United States had not signed the
Kyoto Protocol.
The effects of the Rio Earth Summit are still shaping international
efforts to improve the environment through ongoing actions under
Agenda 21, the Convention on Biodiversity, and the UNFCCC.
The Kyoto Protocol will require developed nations to reduce
greenhouse-gas emissions through 2012, at which point the
UNFCCC hopes to have ratified a new framework for reducing
greenhouse-gas emissions.
COPYRIGHTS - DIWAKAR EDUCATION HUB
International Day for Biological Diversity 22 May
Convention on Biodiversity
The Convention on Biological Diversity (CBD) is an international legally-binding treaty with three main goals: conservation of biodiversity; sustainable use of biodiversity; fair and equitable sharing of the benefits arising from the use of genetic resources. Its overall objective is to encourage actions, which will lead to a sustainable future.
The conservation of biodiversity is a common concern of humankind. The Convention on Biological Diversity covers biodiversity at all levels: ecosystems, species and genetic resources. It also covers biotechnology, including through the Cartagena Protocol on Biosafety. In fact, it covers all possible domains that are directly or indirectly related to biodiversity and its role in development, ranging from science, politics and education to agriculture, business, culture and much more.
The CBD’s governing body is the Conference of the Parties (COP). This ultimate authority of all governments (or Parties) that have ratified the treaty meets every two years to review progress, set priorities and commit to work plans.
The Secretariat of the Convention on Biological Diversity (SCBD) is based in Montreal, Canada. Its main function is to assist governments in the implementation of the CBD and its programmes of work, to organize meetings, draft documents, and coordinate with other international organizations and collect and spread information. The Executive Secretary is the head of the Secretariat.
Facts and Figures
The Convention on Biological Diversity (CBD) was opened for signature at the Earth Summit in Rio de Janeiro on 5 June 1992 and entered into force on 29 December 1993.
To date, there are 193 Parties.
Components of biodiversity are all the various forms of life on Earth including ecosystems, animals, plants, fungi, microorganisms, and genetic diversity.
With its three objectives, the CBD is often seen as the key international instrument for sustainable development.
Ecosystems, species and genetic resources should be used for the benefit of humans, but in a way that does not lead to the decline of biodiversity.
Substantial investments are required to conserve biodiversity, but it will bring significant environmental, economic and social benefits in return.
The Ecosystem Approach, an integrated strategy for the management of resources, is the framework for action under the Convention.
The precautionary principle states that where there is a threat of significant reduction or loss of biological diversity, lack of full scientific certainty should not be used as a reason for postponing measures to avoid or minimize such a threat
Kyoto Protocol INTERNATIONAL TREATY, 1997
Kyoto Protocol, in full Kyoto Protocol to the United Nations Framework Convention
on Climate Change, international treaty, named for the Japanese city in which it was
adopted in December 1997, that aimed to reduce the emission of gases that contribute
to global warming. In force since 2005, the protocol called for reducing the emission of
six greenhouse gases in 41 countries plus the European Union to 5.2 percent below 1990
levels during the “commitment period” 2008–12. It was widely hailed as the most
significant environmental treaty ever negotiated, though some critics questioned its
effectiveness.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Background And Provisions
The Kyoto Protocol was adopted as the first addition to the United Nations Framework
Convention on Climate Change (UNFCCC), an international treaty that committed its
signatories to develop national programs to reduce their emissions of greenhouse gases.
Greenhouse gases, such as carbon dioxide (CO2), methane (CH4), nitrous oxide (N2O),
perfluorocarbons (PFCs), hydrofluorocarbons (HFCs), and sulfur hexafluoride (SF6),
affect the energy balance of the global atmosphere in ways expected to lead to an overall
increase in global average temperature, known as global warming (see also greenhouse
effect). According to the Intergovernmental Panel on Climate Change, established by
the United Nations Environment Programme and the World Meteorological
Organization in 1988, the long-term effects of global warming would include a general
rise in sea level around the world, resulting in the inundation of low-lying coastal areas
and the possible disappearance of some island states; the melting of glaciers, sea ice, and
Arctic permafrost; an increase in the number of extreme climate-related events, such
as floods and droughts, and changes in their distribution; and an increased risk
of extinction for 20 to 30 percent of all plant and animal species. The Kyoto Protocol
committed most of the Annex I signatories to the UNFCCC (consisting of members of
the Organisation for Economic Co-operation and Development and several countries with
“economies in transition”) to mandatory emission-reduction targets, which varied
depending on the unique circumstances of each country. Other signatories to the
UNFCCC and the protocol, consisting mostly of developing countries, were not required
to restrict their emissions. The protocol entered into force in February 2005, 90 days after
being ratified by at least 55 Annex I signatories that together accounted for at least 55
percent of total carbon dioxide emissions in 1990.
The protocol provided several means for countries to reach their targets. One approach
was to make use of natural processes, called “sinks,” that remove greenhouse gases from
the atmosphere. The planting of trees, which take up carbon dioxide from the air, would
be an example. Another approach was the international program called the Clean
Development Mechanism (CDM), which encouraged developed countries to invest in
technology and infrastructure in less-developed countries, where there were often
significant opportunities to reduce emissions. Under the CDM, the investing country
could claim the effective reduction in emissions as a credit toward meeting its obligations
under the protocol. An example would be an investment in a clean-burning natural
gas power plant to replace a proposed coal-fired plant. A third approach was emissions
trading, which allowed participating countries to buy and sell emissions rights and
thereby placed an economic value on greenhouse gas emissions. European countries
initiated an emissions-trading market as a mechanism to work toward meeting their
commitments under the Kyoto Protocol. Countries that failed to meet their emissions
targets would be required to make up the difference between their targeted and actual
emissions, plus a penalty amount of 30 percent, in the subsequent commitment period,
beginning in 2012; they would also be prevented from engaging in emissions trading until
they were judged to be in compliance with the protocol. The emission targets for
commitment periods after 2012 were to be established in future protocols.
COPYRIGHTS - DIWAKAR EDUCATION HUB
carbon dioxide emissionsMap of annual carbon dioxide emissions by country in 2014.Encyclopædia Britannica, Inc.
Challenges
Although the Kyoto Protocol represented a landmark diplomatic accomplishment, its
success was far from assured. Indeed, reports issued in the first two years after the treaty
took effect indicated that most participants would fail to meet their emission targets. Even
if the targets were met, however, the ultimate benefit to the environmentwould not be
significant, according to some critics, since China, the world’s leading emitter of
greenhouse gases, and the United States, the world’s second largest emitter, were not
bound by the protocol (China because of its status as a developing country and the United
States because it had not ratified the protocol). Other critics claimed that the emission
reductions called for in the protocol were too modest to make a detectable difference in
global temperatures in the subsequent several decades, even if fully achieved with U.S.
participation. Meanwhile, some developing countries argued that
improving adaptation to climate variability and change was just as important as reducing
greenhouse gas emissions.
Treaty Extension And Replacement
At the 18th Conference of the Parties (COP18), held in Doha, Qatar, in 2012, delegates
agreed to extend the Kyoto Protocol until 2020. They also reaffirmed their pledge from
COP17, which had been held in Durban, South Africa, in 2011, to create a
new, comprehensive, legally binding climate treaty by 2015 that would require
greenhouse-gas-producing countries—including major carbon emitters not abiding by the
Kyoto Protocol (such as China, India, and the United States)—to limit and reduce their
emissions of carbon dioxide and other greenhouse gases. The new treaty, planned for
implementation in 2020, would fully replace the Kyoto Protocol.
COPYRIGHTS - DIWAKAR EDUCATION HUB
After a series of conferences mired in disagreements, delegates at the COP21, held in
Paris, France, in 2015, signed a global but nonbinding agreement to limit the increase of
the world’s average temperature to no more than 2 °C (3.6 °F) above preindustrial levels
while at the same time striving to keep this increase to 1.5 °C (2.7 °F) above preindustrial
levels. The landmark accord, signed by all 196 signatories of the UNFCCC, effectively
replaced the Kyoto Protocol. It also mandated a progress review every five years and the
development of a fund containing $100 billion by 2020—which would be replenished
annually—to help developing countries adopt non-greenhouse-gas-producing
technologies.
The Paris Agreement
Paris Agreement: essential elements
The Paris Agreement builds upon the Convention and for the first time brings all nations into a common cause
to undertake ambitious efforts to combat climate change and adapt to its effects, with enhanced support to assist
developing countries to do so. As such, it charts a new course in the global climate effort.
The Paris Agreement central aim is to strengthen the global response to the threat of climate change by keeping
a global temperature rise this century well below 2 degrees Celsius above pre-industrial levels and to pursue
efforts to limit the temperature increase even further to 1.5 degrees Celsius. Additionally, the agreement aims to
strengthen the ability of countries to deal with the impacts of climate change. To reach these ambitious goals,
appropriate financial flows, a new technology framework and an enhanced capacity building framework will be
put in place, thus supporting action by developing countries and the most vulnerable countries, in line with their
own national objectives. The Agreement also provides for enhanced transparency of action and support through
a more robust transparency framework. Further information on key aspects of the Agreement can be found here.
Nationally determined contributions
The Paris Agreement requires all Parties to put forward their best efforts through nationally determined
contributions (NDCs) and to strengthen these efforts in the years ahead. This includes requirements that all
Parties report regularly on their emissions and on their implementation efforts.
Further information on NDCs can be found here.
In 2018, Parties will take stock of the collective efforts in relation to progress towards the goal set in the Paris
Agreement and to inform the preparation of NDCs.
There will also be a global stocktake every 5 years to assess the collective progress towards achieving the
purpose of the Agreement and to inform further individual actions by Parties.
Status of ratification
COPYRIGHTS - DIWAKAR EDUCATION HUB
The Paris Agreement entered into force on 4 November 2016, thirty days after the date on which at least 55
Parties to the Convention accounting in total for at least an estimated 55 % of the total global greenhouse gas
emissions have deposited their instruments of ratification, acceptance, approval or accession with the
Depositary.
The Paris Agreement entered into force on 4 November 2016, thirty days after the date on which at least 55
Parties to the Convention accounting in total for at least an estimated 55 % of the total global greenhouse gas
emissions have deposited their instruments of ratification, acceptance, approval or accession with the
Depositary.
Authoritative information on the status of the Paris Agreement, including information on signatories to the
Agreement, ratification and entry into force, is provided by the Depositary, through the United Nations Treaty
Collection website, which can be accessed here, and the Depositary Notifications which are available here.
The first part of session of the Conference of the Parties serving as the Meeting of the Parties to the Paris
Agreement (CMA 1.1) took place in Marrakech, Morocco from 15-18 November 2016. The second part of the
first session (CMA 1.2) took place under the Presidency of Fiji, in Bonn, Germany, from 6-18 November 2017.
The third part of the first session (CMA 1.3) will be held in conjunction with the 24th session of the Conference
of the Parties (COP 24) in Katowice, Poland, in December 2018.
International Solar Alliance
The International Solar Alliance is a common platform for cooperation among sun-rich countries lying fully or
partially between the Tropics of Cancer and Capricorn who are seeking to massively ramp up solar energy,
thereby helping to bend the global greenhouse emissions curve whilst providing clean and cheap energy.
Countries, bilateral and multilateral organisations, companies, industries, and stakeholders aim to reduce the
cost of finance and cost of technology for the immediate deployment of competitive solar generation, storage
and technologies adapted to countries' individual needs and to mobilize billions of dollars for solar.
The initiative was launched at the UN Climate Change Conference in Paris at the end of 2015 by the President
of France and the Prime Minister of India.
French President Hollande acknowledged that developing countries need technology and capacity building to
quickly take solar energy to scale, and that initial public financing and initiatives to unlock private finance is
important for solar energy to take hold in developing countries.
COPYRIGHTS - DIWAKAR EDUCATION HUB
Indian Prime Minister Modi said that he was encouraged by the industry support show so far for solar energy.
He said: “the sun is the source of all energy. The world must turn to solar, the power of our future.”
The alliance includes around 80 countries that support a common declaration.
Joint efforts include innovative policies, projects, programmes, capacity building measures and financial
instruments to mobilise more than USD 1 trillion dollars of investments that are needed by 2030. The reduced
cost of finance would enable the undertaking of more ambitious solar energy programmes.
The aim is for countries to work together towards the deployment of appropriate benchmarks, facilitating
resource assessments, supporting research and development and demonstration facilities, with a view to
encourage innovative and affordable applications of solar technologies.
Five Key Focus Areas
Key focus areas to achieve these objectives are to:
promote solar technologies, new business models and investment in the solar sector to enhance prosperity
formulate projects and programmes to promote solar applications
develop innovative financial mechanisms to reduce cost of capital
build a common knowledge e-Portal
facilitate capacity building for promotion and absorption of solar technologies and R&D among member
countries
[Type the document title]
DIWAKAR EDUCATION HUB (COMBO)
1. Which one of the following pairs is correctly
matched?
(a) Biosphere — Eduard Suess
(b) Ecosystem — A.P. de Candolle
(c) Ecology — A.G. Tansley
(d) Biodiversity — Reiter
2. Which of the following groups of gases contribute
to the ‘Green House Effect’?
(a) Ammonia and Ozone
(b) Carbon mono-oxide and Sulphur di-oxide
(c) Carbon tetrafluoride and Nitrous oxide
(d) Carbon dioxide and Methane
3. Which one of the following is the correct
definition of “ Agenda 21” ?
(a) It is an action plan of U.N.O for protecting
human rights.
(b) It is a book of 21 chapters on nuclear
disarmament.
(c) It is an action plan for the sustainable
development.
(d) It is an agenda for the election of the
president in the next meeting of SAARC.
4. Environmental degradation means
(a) Overall lowering of environmental qualities.
(b) Adverse change brought in by human
activities.
(c) Ecological imbalance
(d) All the above
5. Which of the following countries suffer from the
acid rains?
1. Canada 2. France
3. Norway 4. Germany
Select the correct answers from the codes given
below:
Codes:
(a) 1 and 2 (b) 1 and 3
(c) 2 and 3 (d) 3 and 4
6. Which of the following statements about
Radioactive pollution are correct?
1. It causes genetic changes in the animals.
2. It causes disbalance among different
minerals in the soil.
3. It hinders blood circulation.
4. It causes cancers.
Select the correct answer from the codes given
below:
Codes:
(a) 1 and 2 (b) 1 and 4
(c) 1, 3 and 4 (d) 2, 3 and 4
7. Given below are two statements:
Assertion (A): Natural vegetation is the true
index of climate.
Reason (R): Water loving plants are found in
moist climate
In the context of the above statements, which one
of the following is correct?
(a) Both A and R are true and R is the correct
explanation of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
8. Which of the following conditions indicate the
impact of global warming?
1. Melting of glaciers
2. Lowering down of sea level
3. Changes in weather conditions
4. Rise in global temperature
Downloaded DIWAKAR EDUCATION
HU
General Science || E-75
Select the correct answer from the codes given
below:
Codes:
(a) 1 and 2 (b) 1, 2 and 3
(c) 1, 3 and 4 (d) 1, 2, 3 and 4
9. Consider the following statements:
Assertion (A): Forests are a renewable resource.
Reason (R): They enhance the quality of
environment.
Select the correct answer from the codes given
below:
Codes:
(a) Both A and R are true and R is the correct
explanation of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false. (d) A is false but R is true.
10. As an ecosystem, wetlands are useful for which
of the following?
(a) For nutrient recovery and cycling
(b) For releasing heavy metals through
absorption by plants.
(c) They maintain the rivers and control floods.
(d) All the above
11. Which one of the following pairs is not correctly
matched?
(a) Kyoto Protocol — Carbon Trading
(b) Environmental — Leopold Matrix
impact assessment
(c) The year without — 1816
summer
(d) Milankovich — On the origin of
Theory Species
12. Which of the following statements are true about
ecosystem? Select the correct answer from the
codes:
1. Ecosystem comprises both biotic and abiotic
components.
2. Solar radiation is the main driving force of
the ecosystem.
3. Ecosystem is a closed system. 4. Ecosystem does not have its own
productivity
Codes:
(a) 1 and 2 (b) 2 and 3
(c) 1 and 3 (d) 3 and 4
13. Consider the following statements:
Assertion (A): Plants are called primary
producers.
Reason (R): Plants produce their food themselves
through the process of photosynthesis.
Select the correct answer from the codes given
below:
(a) Both A and R are true and R is the correct
explanation of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
14. Which one of the following statements is not
correct?
(a) Ecosystem’s structure, species composition
and functioning change seasonally between
years.
(b) Nature has spent millions of years to refine a
stable ecosystem.
(c) Ecosystem functions mainly through the
input of solar energy
(d) The relative loss of energy due to respiration
decreases with higher trophic levels.
15. Consider the following statements:
Assertion (A): Conservation is a basic element
of environmental planning.
Reason (R): Conservation and development are
complementary to each other.
Select the correct answer from the codes given
below
Codes:
(a) Both A and R are ture and R is the correct
explanation of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
16. Which one of the following does not promote
stability of the ecosystem?
(a) Balancing between production and
consumption of each element in the
ecosystem.
(b) Balance between input and output of energy.
Downloaded DIWAKAR EDUCATION
HU
E-76 || Environment and Ecology
(c) Normal functioning of different biochemical
cycles.
(d) Increase of human population.
17. Consider the following statements:
Assertion (A): Ecological productivity decreases
from the equator towards the poles.
Reason (R): Insolation rapidly decreases from
the equator towards the poles.
Select the correct answer from the codes given
below:
Codes:
(a) Both A and R are true and R is the correct
explanation of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
18. Which one of the following statements is correct?
(a) The relative loss of energy due to respiration
is lower from higher trophic levels.
(b) Species at higher trophic levels appear to be
less efficient in using their available food
supply.
(c) Higher trophic levels tend to be less discrete
than the lower ones.
(d) Food chains tend to be reasonably long.
19. Consider the following statements:
Assertion (A): Organic farming reduces the
emission of greenhouse gases.
Reason (R): Organic forming utilise alternate
practices.
Select the correct answer from the codes given
below:
Codes:
(a) Both A and R are true and R is the correct
explanation of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
20. How does National Biodiversity Authority
(NBA) help in protecting the Indian agriculture?
1. NBA checks the biopiracy and protects the
indigenous and traditional genetic resources.
2. National Biodiversity Authority (NBA)
directly monitors and supervises the
scientific research on genetic modification
of crop plants.
3. Application for Intellectual Property Rights
related to genetic/biological resources can
not be made without the approval of NBA.
Which of the statements given above is/are
correct?
(a) 1 only (b) 1 and 2 only
(c) 1 and 3 only (d) 1, 2 and 3
21. Consider the following protected areas: 1. Bandipur 2. Bhitarkanika
3. Manas 4. Sunderbans
Which of the above are declared Tiger Reserves?
(a) 1 and 2 only (b) 1, 3 and 4 only
(c) 2, 3 and 4 only (d) 1, 2, 3 and 4
22. With reference to the wetland of India, consider
the following statements:
1. The country’s total geographical area under
the category of wetlands is recorded more in
Gujarat as compared to other states.
2. In India, the total geographical area of
coastal wetlands is larger than that of inland
wetlands.
Which of the statements given above is/are
correct?
(a) 1 only (b) 2 only
(c) Both 1 and 2 (d) Neither 1 nor 2
23. Which of the following can be threats to the
biodiversity of a geographical area?
1. Global warming
2. Fragmentation of habitat
3. Invasion of alien species
4. Promotion of vegetarianism
Select the correct answer using the codes given
below:
(a) 1 and 2 only (b) 2 and 3 only
(c) 1, 2 and 3 only (d) 1, 2, 3 and 4 only
24. Consider the following statements:
1. Biodiversity is normally greater in the lower
latitudes as compared to the higher latitudes.
2. Along the mountain gradients, biodiversity
is normally greater in the lower altitudes as
compared to the higher altitudes.
Which of the statements given above is/are
correct?
Downloaded DIWAKAR EDUCATION
HU
General Science || E-77
(a) 1 only (b) 2 only Codes:
(c) Both 1 and 2 (d) Neither 1 nor 2 A B C D
25. The Red Data Books published by the (a) 1 2 3 4
International Union for Conservation of Nature (b) 4 3 2 1
and Natural Resources (IUCN) contains lists of (c) 3 4 1 2
1. Endemic plant and animal species present in (d) 2 3 1 4
the bio-diversity hotspots. 2. Threatened plant and animal species.
3. Protected sites for conservation of nature
and natural resources in various countries.
Select the correct answer using the codes given
below:
(a) 1 and 3 (b) 2 only (c) 3 only (d) 2 and 3
26. Biodiversity forms the basis for human existence
in the following ways:
1. Soil formation
2. Prevention of soil erosion
3. Recycling of waste
4. Pollination of crops
Select the correct answer using the codes given
below:
(a) 1, 2 and 3 only (b) 2, 3 and 4 only (c) 1 and 4 only (d) 1, 2, 3 and 4
27. Match List-I with List-II and select the correct
answer from the codes given below:
List-I List-II
(National Park) (Location)
A. Gir 1. Assam
B. Sundarban 2. Gujarat
C. Betla 3. West Bengal
D. Kaziranga 4. Jharkhand
Codes:
(a) A 1
B 3
C 4
D 2
(b) 2 3 1 4
(c) 2 3 4 1
(d) 4 2 3 1
28. Match List-I with List-II and select the correct
answer from the codes given below the lists:
List-I List-II
(Biosphere sites) (Year of setting-up)
29. Which of the following regions of India have
been designated as biodiversity hotspots?
Select the correct answer from the codes given
below:
1. Eastern Himalaya 2. Eastern Ghat
3. Western Ghat 4. Western Himalaya
Codes:
(a) 1 and 2 only (b) 1 and 3 only
(c) 2 and 4 only (d) 3 and 4 only
30. Match List-I with List-II and select the correct
answer from the code given below:
List-I List-II
(Biosphere Reserve) (State)
A. Dehang-Debang 1. Odisha
B. Manas 2. Meghalaya
C. Nokrek 3. Assam
D. Similipal 4. Arunachal Pradesh
Codes:
A B C D
(a) 1 2 3 4
(b) 2 1 3 4
(c) 4 3 2 1
(d) 3 4 1 2
31. Arrange the following states of India indescending
order of their mangrove cover and select the correct
answers from the codes given below:
1. Andhra Pradesh 2. Gujarat
3. Odisha 4. West Bengal
Codes:
(a) 3, 2, 1, 4 (b) 1, 2, 4, 3
(c) 4, 3, 2, 1 (d) 4, 2, 1, 3
32. Match List-I with List-II and select the correct
answer from the codes given below:
List-I List-II
A. Biodiversity 1. G. Tansley
B. Wildlife 2. E.O. Wilson
C. Ecosystem 3. E. Haeckel
D. Ecology 4. W.T. Hornaday
A. Nilgiri 1. 2000
B. Nanda Devi 2. 1989
C. Sundarban 3. 1988
D. Kanchanjunga 4. 1986
Downloaded DIWAKAR EDUCATION
HU
E-78 || Environment and Ecology
Codes: (a) Only 1 (b) Only 2
A B C D (c) Both 1 and 2 (d) Neither 1 nor 2
(a) 2 4 3 1 37. Which of the following are the incorrect
(b) 2 4 1 3 statements about 'Keystone species'.
(c) 4 2 3 1 1. Keystone species are the small-sized plants
(d) 4 2 1
33. Consider the following statements:
3 and organisms which have large effect on
the environment.
1. Dachigam National Park is in Jammu and
Kashmir.
2. Loktak lake is known as floating national
park.
3. Loktak lake is located in Assam.
Which of the above statements is/are correct?
(a) 1 only
(b) 2 only
(c) 1 and 2
(d) 1, 2 and 3
34. Match List-I with List-II and select the correct
answer from the codes given below:
List-I List-II
(Sanctuaries) (State)
A. Namdapha 1. Karnataka
B. Periyar 2. Arunachal Pradesh
C. Bandipur 3. Manipur
D. Lamjao 4. Kerala
Codes: A B C D
(a) 2 4 1 3
(b) 4 2 1 3
(c) 4 2 3 1
(d) 2 4 3 1
35. Consider the following kinds of organisms and
identify the pollinating agent/agents.
(a) Bat and Bee but not bird
(c) Bee, bat and birds
(c) Hummingbird but not bee
(d) Wind, bee, bat, birds.
36. Consider the following statements regarding the
Millennium Assessment (MA) report 2005 and
choose the correct ones:
1. MA defines Ecosystem services as benefits people obtain from ecosystems.
2. It includes supporting services and
provisioning services only.
2. Keystone species play critical role in
maintaining the structure of an ecological
community.
3. Keystone species do not generally affect
other organisms.
(a) 1 and 2 (b) 2 and 3
(c) 1 and 3 (d) All are correct
38. Consider the following statements:
Assertion (A): Many mangrove plants possess
high levels of organic solutes.
Reason (R): This is an adaptation to survive and
grow in salty waters. Select the correct answer
from the codes given below:
Codes:
(a) Both Aand R are true R is correct explanation
of A.
(b) Both A and R are true but R is not the correct
explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
39. Consider the following statements:
Assertion (A): Amensalism is a negative
interaction between two living individuals.
Reason (R): In amensalism, allochemicals are
secreted by one individual.
Select the correct code:
Codes:
(a) Both A and R are true, R is correct
explanation of A.
(b) Both A and R are true, but R is not the
correct explanation of A.
(c) A is true, R is false.
(d) A is false, R is true.
40. Consider the following statements:
Assertion (A): Use of weedicides affect photo-
synthetic ability of plants.
Reason (R): Weedicides are metabolic inhibitors.
Downloaded DIWAKAR EDUCATION
HU
General Science || E-79
Codes:
(a) Both A and R are true, R is correct
explanation of A.
(b) Both A and R are true, but R is not the
correct explanation of A.
(c) A is true, R is false.
(d) A is false, R is true.
41. Consider the following statements and choose the
correct ones:
1. A new online Atlas of freshwater biodiversity
has been launched on 29 January, 2014
which is an output of Biofresh.
2. This will help in managing and protecting
the freshwater in future.
(a) 1 only (b) 2 only
(c) Both 1 and 2 (d) Neither 1 nor 2
42. Consider the following statements and choose the
correct ones.
1. The prestigious Gold Standard Foundation
(GSF) certification has been awarded to the
Kolkata Metro, on 2 February, 2014.
2. This certification is given for using the
energy efficiently.
3. Kolkata Metro has become the first ever
railway system in the world with GSF
certification standard.
(a) 1 and 2 only (b) 2 and 3 only
(c) 1 only (d) 2 only
43. Consider the following statements and choose the
correct ones.
1. The International Union for Conservation
of Nature (IUCN) is the world's oldest and
largest global environmental organization.
2. IUCN was founded in 1948, its Green
data book does conservation planning,
monitoring to protect endangered species.
3. On 30 January, 2014, IUCN announced that
it is celebrating 50 years of the IUCN Red
List of threatened species.
(a) 1 and 2 only (b) 1 and 3 only (c) 2 and 3 only (d) All are correct
44. Consider the following statements and choose the
wrong ones.
1. The World's largest archipelago, Indonesia
is prone to seismic activities and dangers
associated with it.
2. Indonesia is located on the so-called Pacific
"Ring of Fire", which is an arc of volcanoes
and fault lines.
3. An earthquake of magnitude 7.1 rocked
parts of Indonesia's main Java Island on 25
January, 2014.
(a) 1 and 2 only (b) 1 and 3 only
(c) 2 only (d) 3 only
45. As per National Aeronautics and Space Adminis-
tration (NASA) research scientists found that
concentrations of mercury near the ground level
had increased in the Arctic Sea by mercury-
pumping reaction which takes place because -
1. of open water in a lead is much warmer than
the air above it.
2. of the temperature difference, the air above
the lead churns like the air above a boiling
pot.
3. the mixing is so strong that it actually pulls
down mercury from a higher layer of the
atmosphere to near the surface.
Select the answer from the codes given below-
(a) 1 only (b) 1 and 2 only
(c) 2 and 3 only (d) All of the above
46. Biodiesel researchers have produced hydrocarbons
in bacterium—
(a) Escherichia coli
(b) Streptococcus pyogenes
(c) Vibrio cholerae
(d) Enteritis salmonella
47. A new nuclear waste disposal strategy announced
by United States include-
1. a “pilot interim store” will become
operational in 2021
2. a larger “full-scale interim store” will open
be open by 2025
3. an underground disposal facility to be
established by 2048 to permanently dispose
of the material.
4. a new organisation will be established
to manage the siting, development and
operation of the future waste stores.
Select the answer from the codes given below-
(a) 1, 2 and 3 (b) 2, 3 and 4
(c) 1, 3 and 4 (d) All of the above
Downloaded DIWAKAR EDUCATION
HU
E-80 || Environment and Ecology
48. Consider the following statements
1. The Pacific salmon fish uses the Earth's
magnetic field to find their way
2. Machli, Queen Mother of tiger dynasty was
found in the Ranthambhore National Park,
India.
Which of the above statements is/are correct?
(a) 1 only (b) 2 only
(c) both 1 and 2 (d) None of these
49. Which of the following statements are correct ?
1. A new study has found that changes in solar
activity contributed no more than 10 per
cent to global warming in the 20th century
published in the journal Environmental
Research Letters.
2. It has been proposed that cosmic rays may
have a role incoolingtheearth by encouraging
clouds to form, which subsequently reflect
the sun’s rays back into space.
3. Researchers found high correlation between
cosmic rays and global temperatures
occurring every 22 years.
Select the answer from the codes given below-
(a) 1 only (b) 1 and 2 only
(c) 2 and 3 only (d) All of the above
50. The International Union for Conservation of
Nature (IUCN) red list version 2013 of the
birds indicates 15 species of birds from India as
critically endangered. The reason for the decline
in the number of these birds are:
1. Loss, modification, fragmentation and degradation of habitat
2. Environmental contaminants
3. Poaching
4. Use changes mainly conversion of large
areas to intensive crop cultivation
Select the answer from the codes given below-
(a) 1, 2, and 3 (b) 2, 3, and 4
(c) 1, 3, and 4 (d) All of the above
51. The International Union for Conservation of
Nature (IUCN) on 30 January 2014 completed
its 50 years of the IUCN Red List of Threatened
Species in guiding conservation action and policy
decisions. The IUCN:
1. acts as a powerful tool to inform and catalyse
action for biodiversity conservation and
policy change for things that are critical to
protect the natural resources that are needed
by us to survive.
2. provides the information on population size
as well as trends depending upon the range
and habitat needs of species.
Which of the above statements is/are correct?
(a) 1 only (b) 2 only
(c) both 1 and 2 (d) None of these
52. The steps taken by the Government of India for
conversion of endangered species are
1. The Central Government has enacted
the Wild Life (Protection) Act, 1972 for
protection of wildlife including birds.
2. Wetland (Conservation and Management)
Rules 2010 have been framed for protection
of wetlands, in the States, which are habitats
of birds.
3. Wildlife Crime Control Bureau has been
established for control of illegal trade in
wildlife, including endangered species of
birds and their parts and products.
4. The Centrally Sponsored Scheme of
National Plan for Conservation of Aquatic
Eco-System also provides assistance to the
States for management of wetlands including
Ramsar sites in the country.
Select the answer from the codes given below-
(a) 1, 2, and 3 (b) 2, 3, and 4
(c) 1, 3, and 4 (d) All of the above 53. The Delhi Metro is the first ever railway system
in the world to be awarded with the prestigious
Gold Standard Foundation (GSF) certification
standard for
(a) providing security to the people
(b) using the energy efficiently
(c) carrying largest number of passengers
(d) All of the above
54. The three species of vultures that are critically
endangered that have declined by more than 97
percent since 1990s are:
1. Egyptian vulture (Neophron percnopterus)
2. Oriental white-backed (Gyps bengalensis)
3. Long-billed (Gyps indicus) 4. Slender-billed vulture (Gyps tenuirostris) Select the answer from the codes given below- (a) 1, 2 and 3 (b) 2, 3 and 4
(c) 1, 3 and 4 (d) None of the above
Downloaded DIWAKAR EDUCATION
HU
General Science || E-81
55. Consider the following statements 1. Tree Foundation, an NGO engaged in
conservation of the sea turtle found more than 1000 dead Olive Ridley Turtles in the shores of Nagapattinam.
2. The Olive Ridley turtles find the coastline of Nagapattinam as a favourable nesting habitat and that’s why they reach to the shore from December to March every year.
3. The Olive Ridley looks very similar to the Kemp's Riddle, but has a deeper body and slightly up-turned edges to its carapace (shell).
4. Olive Ridley weighs around 45 kilograms and are 70cm in size and this makes them the smallest of the sea turtles along with Kemp riddles.
Which of the following statements are correct? (a) 1, 2 and 3 (b) 2, 3 and 4 (c) 1, 3 and 4 (d) All of the above
56. Which of the following lake has been named Destination Flyways by the United Nations World Tourism Organization (UNWTO) on 21 January 2014?
(a) Chilika lagoon in Odisha (b) Dal Lake in Kashmir valley (c) Loktak Lake in Manipur (d) Kolleru Lake in Andhra Pradesh
57. Which of the following statements is/are correct? 1. First Climate Change theatre in India
(second theatre in the world) was opened at Pusa, New Delhi in January 2014.
2. The Inter-governmental Panel on Climate Change (IPCC) UN report on 17 January 2014 reported that during 2000 to 2010, the CO2 has grown by 2.2 percent per year
and this rise is almost twice higher from the growth of the period of 1970 to 2000.
Answer from the codes given below:
(a) 1 only (b) 2 only
(c) 1 and 2 only (d) None of these
58. G.B. Pant Institute of Himalayan Environment
and Development (GBPIHED) released the
Report titled Estimation of retreat of Gangotri
glacier on 7 January 2014. The Report includes-
1. Gangotri glacier is retreating in the
Himalayas and its volume and size are
shrinking between Gaumukh and Bhojbasa.
2. There is some disintegration in the upper
regions of the Gangotri glaciers due to
tectonic activities.
3. Retreat of Gangotri glaciers in this decade
was higher than in the previous decade due
to global warming.
Select the answer from the codes given below-
(a) 1 only (b) 1 and 2 only
(c) 2 and 3 only (d) All of the above
59. In December 2013, China built a new research
station in Antarctica called
(a) Taishan (b) Great Wall
(c) Zhongshan (d) Kunlun
60. Which of the following are the new species
of freshwater catfish discovered in Idukki and
Pathanamthitta districts of Kerala in November
2013?
1. Horabagrus melanosoma
2. Mystus heoki
3. Mystus indicus
4. Mystus miami
Select the answers from the codes given below:
(a) 1 only (b) 1 and 2 only
(c) 1, 2 and 3 only (d) All of the above
61. The Ministry of Environment and Forest declared
India's first marine eco-sensitive zone in –
(a) Gulf of Kutch (b) Palk Strait
(c) Gulf of Khambat (d) Gulf of Mannar
62. Which of the following has been cited as a cause
for the deaths of the Penguin chicks from the
world’s largest colony of Magellanic Penguins
(a) Lack of food (b) Warm Ocean Currents
(c) Climate Change (d) All of the above
63. Scientists from the University of Technology,
Sydney (UTS) explained that seagrass can play
a crucial role in fighting against the climate
change.Which of the following is/ are correct
about seagrass?
1. Seagrass helps by capturing and storing the
carbon by the process of photosynthesis.
2. Seagrass also traps the particles in the water
column.
3. The seagrass plant is 35 times better in
locking the carbon than the rainforests.
Downloaded DIWAKAR EDUCATION
HU
E-82 || Environment and Ecology
(a) 1 only (b) 2 only
(c) 1 and 2 (d) 1, 2 and 3
64. Dung beetles live in regions where cattle graze,
quickly burying and recycling cattle droppings.
Because of the dung beetles activities, breeding
habitats for disease-carrying flies are reduced and
the plants upon which cattle feed are nourished.
The relationship between the dung beetles and
the disease-carrying flies is a type of :
(a) mutualism
(b) commensalism
(c) intraspecific competition
(d) interspecific competition
65. Discussing the consequences of global climate
change at a conference, representatives of a
developing nation suggest that those nations that
contribute the most greenhouse gases (GHGs)
to the atmosphere should contribute the most
to paying for adaptive responses worldwide.
Further, this representative pointed out that her
poor country contributes less than 1% of the
annual GHGs and has less than 0.1% of the
world’s wealth. This representative’s appeal
represents:
(a) the precautionary principle
(b) the polluter pays and equity principles
(c) an argument for mitigation instead of
adaptation.
(d) stages 2 and 3 of the climate change skeptics
responses
66. Flea beetles alone are unlikely to eliminate all of
the leafy spurge in a region. Instead, the number
of leafy spurge plants and the number of flea
beetles in a particular community may stabilize.
At this point, the leafy spurge and flea beetle
populations:
(a) have exhibited exponential growth followed
by a crash
(b) have experienced constant growth
(c) are still experiencing exponential growth
(d) are experiencing environmental resistance
67. Eutrophication in the Chesapeake Bay along the
eastern edge of Maryland has resulted in low
oxygen levels in the water and alternation of food
webs. The cause of this eutrophication appears to
be pollution that contains high levels of :
(a) nitrogen and carbon
(b) nitrogen and phosphorus
(c) carbon and phosphorus
(d) carbon, nitrogen and phosphorus
68. In case of a parasitic food chain, the shape of the
pyramid of number is always:
(a) Upright (b) Linear
(c) Inverted (d) Not certain
69. In a forest, deer, raccoons, squirrels, and other
animals eat and find shelter. A detritus food web
occurs as their wastes accumulate on the forest
floor. In this detritus web:
(a) deer and raccoons function as the producers
(b) fungi and earthworms function as producers
(c) decomposers function as consumers
(d) the deer and raccoons represent decomposers
70. In a rural hilly district in Himachal Pradesh, a
land developer uses bulldozers to clear all but the
largest trees and cleans up a nearby stream, lining
the bottom of the stream with pretty rocks and
steeping-stones. Planting lawn grasses around
the base of the trees, the owner wants to create
a pretty park-like setting around his home. We
expect that in this cleared yard, there will be:
(a) more species of invertebrates in the stream
and on the land but fewer species of
vertebrates and plants everywhere
(b) more mammal and plant species, but fewer
birds and invertebrates on the land and in the
stream
(c) fewer species of vertebrates and plants
everywhere but more invertebrates in the
steam
(d) fewer species of plants, invertebrates, and
vertebrates everywhere
71. In the communities found deep in the ocean off
the shore of Japan, bacteria have special enzymes
that allow them to form organic matter by
chemosynthesis. These communities frequently
have worms, clams, shrimp and many other
organisms clustered together. These communities
nestle around hydrothermal vents where super
heated water, springs from the bottom of the
ocean. In hydrothermal vent communities, we
would not expect to find :
Downloaded DIWAKAR EDUCATION
HU
General Science || E-83
(a) carbon compounds
(b) chemosynthesis
(c) chlorophyll
(d) producers
72. Iron ore mining companies are expanding
into the deep forest of Orissa where native
populations of indigenous people have lived off
the land for many centuries. In order to resolve
the growing conflicts between the natives and
the mining companies. They have been urged
by the Government officials to bring together all
of the interested parties. The mining company
operations in the forest will likely lead to the loss
of ecosystem services, such as:
(a) the depletion of iron ore from the ground
(b) the shift from logging to mining
(c) sources of freshwater
(d) the construction of new roads
73. Neena gets a new baby turtle from a friend, and
is told to feed it worms. For the first few months,
the turtle seemed to grow fine. But as time
passed, the turtle’s shell appeared soft and fragile.
Someone suggested that the turtle might not be
getting enough calcium in its diet. If this is true
for this turtle, dietary calcium is :
(a) a limiting factor
(b) an environmental condition
(c) a habitat condition
(d) a natural environmental stressor
74. On a winter day, most automobiles keep the
passengers warm by using heat generated by the
engine. This use of the heat by-product from a
gas engine is an example of :
(a) non-fossil-fuel energy
(b) cogeneration
(c) nuclear power
(d) a sustainable source of energy
75 Some farmers rotate their crops from year to year,
switching from soyabeans to corn on the same
fields. What is one of the advantages of doing
this?
(a) Soyabeans add large amounts of carbon
dioxide to the soil, which helps the corn
crop.
(b) Both crops require the same fertilizing
supplies, so farmers save by buying fertilizer
in bulk.
(c) Corn adds large amounts of phosphorus to
the soil, which helps the soyabean crop
(d) The corn crop benefits from reactive nitrogen
added to the soil by the soyabean crop
76. The concept of biodiversity hotspots is given by :
(a) F.P. Odum (b) Norman Myers
(c) James Lovelock (d) Rachel Carson
77. The concern about human-to-human transmission
of bird flu is most closely monitored by :
(a) the national governments of the countries of
the world
(b) the World Health Organization and the
Centers for Disease Control
(c) World Wide Institute for Infectious Disease
(d) International Centers for Health and Human
Disease
78. Walking along a large city park on a hot summer
day, you look for a cool resting place and sit down
on a large rock under a tree, at the quiet edge of
a stream. You have searched for and found an
example of a :
(a) microclimate (b) biome
(c) landscape (d) population
79. Which of the following is regarded as the main
cause of groundwater contamination?
(a) agricultural products
(b) landfills
(c) septic tanks
(d) All of the above main sources of ground water
contamination.
80. Chipko Movement occurred in which of following
region?
(a) Tribal areas of MP
(b) Rural area of Rajasthan
(c) Tehri Garhwal
(d) Darjeeling region
81. Which of following is One of the best solutions
to get rid of non-biodegradable wastes is :
(a) Recycling waste
(b) Burying waste
(c) Burning waste
(d) All of the above
Downloaded DIWAKAR EDUCATION
HU
E-84 || Environment and Ecology
82. Which of following is correct statement about the
Ozone?
(a) Ozone in troposphere is good for breathing
(b) Ozone in Troposphere is not good for
breathing
(c) Ozone is present only in Troposphere.
(d) All of the above
83. Consider following statements about the Ozone
Hole
(I) Ozone formation and destruction keep on
happening
(II) Ozone destruction rate is higher than its
formation rate
(III) Ozone destruction rate is equal to the its
formation rate
Which of above statement is/ are true?
(a) (I) only
(b) (I) and (II) Only
(c) (I) and (III)
(d) (III) Only
84. Earlier there was balance between the formation
and destruction of Ozone layer but after the release
of varieties of harmful substances into atmosphere,
this balance has been disturbed. Now rate of
destruction is higher than the rate of formation of
Ozone layer which is causing widening of Ozone
hole. CFC (Chlorofluorocarbons) is one of the
sources responsible for causing hole in Ozone
layer, which of following statement is correct about
the CFC:
1. CFC is made of Chlorine, fluorine, and carbon
2. CFC is released from Refrigerant, foams in
plastic manufacturing, etc
3. Refrigerant is the major source of CFC
(a) 1 only (b) 2 only
(c) 1 and 2 only (d) 1, 2 and 3
85. Nitrogen Oxide is also held responsible for the
depletion of Ozone layer, which of the following
is source of Nitrogen Oxide?
(a) Industrial emission
(b) Fertilizers which are used in agricultural
activities
(c) Thermonuclear weapons
(d) All of the above
86. Which of the following statement is correct about
the intergovernmental Panel on Climate Change
(IPCC)?
(a) IPCC was established in 1988
(b) IPCC does not evaluate the risk of climate
change on human
(c) IPCC published its first report in 1989
(d) All of the above
87. Which of following statement is true about the
Ecotone?
(a) It is meeting place of two different eco
systems
(b) It is meeting place of two same eco systems
(c) Density of species is very low here
(d) All of the above.
88. Consider following statement about the estuary
(I) Estuary is a place where the river fresh water
meets with ocean water
(II) This area is highly productive
(III) This area is highly unproductive
(IV) All of the above
Which of above the statements is/are true?
(a) (I) only (b) (II) only
(c) (I) and II) (d) (III)
89. Which of the following statement is incorrect about
the Biosphere?
(a) Biosphere is a combination of lithosphere,
hydrosphere and atmosphere
(b) Biosphere is missing at extreme of north and
south pole
(c) Organisms are uniformly present in Biosphere
(d) All of the above
90. What is the carbon credit?
(a) It is the difference between the carbon
emission allowed and actually emitted carbon
(b) It is the loan amount by IMF for reducing
pollution
(c) It is loan given to poor people for buying
Modern Stoves
(d) All of the above
91. What is the meaning of coral bleaching?
(a) Paling of coral color or decline inzooxanthellae
due to climate change
(b) Impacts of excessive sea trade on fishing
industry
Downloaded DIWAKAR EDUCATION
HU
General Science || E-85
92.
(c) Both (a) and (b)
(d) None of the above
Relative contributions of CO2, CH4, CFCs and
97.
(c) Species of flowering plants
(d) None of above
Upper part of sea/aquatic ecosystem contains
N2O towards global warming are:
(a) 50 %, 30 %, 10 % , and 10 % respectively (a) plankton
(b) nekton (b) 60%, 20%, 14%, and 6% respectively (c) plankton and nekton (c) 40 %, 30%, 20% and 10% respectively (d) benthos. (d) None of the above 98. Competition for light, nutrients and space is most
93. Which of the following can be used for controlling severe between Gaseous Pollutant? (a) closely related organism growing in different (a) Arrestor (b) Incineration niches (c) Absorption (d) None of above (b) closely related organisms growing in the same
94. What does the high Biological Oxygen Demand area/niche (BOD) indicates? (c) distantly related organisms growing in the (a) High level of Microbial Pollution same habitat (b) Low level of Microbial Pollution (d) distantly related organisms growing in (c) Absence of Microbial Pollution different niches. (d) Water is fully pure 99. Deep black soil is productive due to high proportion
95. What percent of area in the plain should be under of forest? (a) sand and zinc (a) 21 % (b) 25% (b) gravel and calcium (c) 17% (d) 33% (c) clay and humus
96. Biodiversity Hotspot are characterized on the basis (d) silt and earthworm.
of:
(a) Endemic flowering plants and threat
perception
(b) Endemic flowering plants
100. Pick up the correct food chain
(a) grass chamelion insect bird
(b) grass fox rabbit bird
(c) phytoplankton zooplankton fish (d) fallen leaves bacteria insect larvae.
Downloaded DIWAKAR EDUCATION
HU
E-86 || Environment and Ecology
ANSWER KEY
1. (a) 14. (d) 27. (c) 40. (a) 53. (b) 66. (d) 79. (d) 92. (b)
2. (d) 15. (b) 28. (b) 41. (c) 54. (d) 67. (b) 80. (c) 93. (c)
3. (c) 16. (d) 29. (b) 42. (d) 55. (b) 68. (c) 81. (a) 94. (a)
4. (d) 17. (a) 30. (c) 43. (b) 56. (a) 69. (a) 82. (b) 95. (d)
5. (b) 18. (c) 31. (d) 44. (d) 57. (b) 70. (d) 83. (b) 96. (a)
6. (b) 19. (a) 32. (b) 45. (d) 58. (d) 71. (c) 84. (d) 97. (a)
7. (a) 20. (c) 33. (c) 46. (a) 59. (a) 72. (c) 85. (d) 98. (b)
8. (c) 21. (b) 34. (a) 47. (d) 60. (c) 73. (a) 86. (a) 99. (c)
9. (b) 22. (c) 35. (d) 48. (c) 61. (a) 74. (b) 87. (a) 100. (c)
10. (d) 23. (c) 36. (a) 49. (b) 62. (c) 75. (d) 88. (c)
11. (d) 24. (c) 37. (c) 50. (d) 63. (d) 76. (b) 89. (c)
12. (a) 25. (b) 38. (a) 51. (c) 64. (d) 77. (b) 90. (a)
13. (a) 26. (d) 39. (b) 52. (d) 65. (b) 78. (a) 91. (a)
1. (a) Eduard Suess was an Austrian, responsible
for hypothesising two major former geographical
features, the supercontinent Gondwana and the
Tethys Ocean.The term "biosphere" was coined by
geologist Eduard Suess in 1875, which he defined as
"The place on Earth's surface where life dwells."
2. (d) The most abundant greenhouse gases in Earth's
atmosphere are:
Water vapor (H2O), Carbon dioxide (CO2), Methane
(CH4), Nitrous oxide (N2O), Ozone (O3) and CFCs.
3. (c) Agenda 21 is a non-binding, voluntarily
implemented action plan of the United Nations
with regard to sustainable development. It is a
product of the UN Conference on Environment and
Development (UNCED) held in Rio de Janeiro,
Brazil, in 1992. The "21" in Agenda 21 refers to the
21st Century.
4. (d) Environmental degradation means lowering of
environmental qualities, adverse changes by human
activities and ecological imbalance.
5. (b) United States and Canada are the countries
which are mostly affected by acid rain because of
high number of factories, power plants and large
number of automotive plants. Europe, Poland,
Germany, Czech Republic, Sweden, Norway
and Finland are affected because of British and
European factories. In Asia, India and China are
mostly affected mainly because of the large number
of factories.
6. (b) Radioactive contamination or pollution causes
severe life- threatening consequences in organisms.
Because of the radioactive decay of thecontaminants,
which emit harmful ionising radiation such as alpha
or beta particles, gamma rays or neutrons, genetic
mutations occur which are hereditary. Carcinogenic
contaminants cause cancer.
7. (a) Natural vegetation is the true index of climate
because water loving plants are found in moist
climate.
8. (c) Global warming is the increase in the global
temperature. It has put many negative impacts on
glaciers causing them to start melting, so, rise of sea
level. Unpredictable weather conditions prevailing
in some geographical areas are some of the other
effects of global warming.
Hints & Solutions
Downloaded DIWAKAR EDUCATION
HU
General Science || E-87
9. (b) Forests are renewable natural resources and
enhance the quality of environment by providing
the Oxygen needed to sustain life on the earth.
Although both assertion and reason are correct
statements but reason is not the correct explanation
of the assertion.
10. (d) As an ecosystem, wetlands are useful for
nutrient recovery and cycling, releasing heavy
metals through absorption by plants. They also
control floods and maintain floods.
11. (d) The Milankovitch theory is an explanation
of long term climate change. The book ‘On the
Origin of Species’ was written by Charles Darwin,
published on 24 November 1859.
12. (a) Ecosystem is the dynamic community of
living organism with physical environment. Thus,
it comprises of both biotic and abiotic components.
Solar energy is the ultimate source of energy in it, so
is the main driving force. Dynamic energy transfers
occur making it an open system. The autotrophs
make the ecosystem’s biotic components self-
sufficient.
13. (a) Plants are called primary producers because
plants produce their food themselves through the
process of photosynthesis.
14. (d) As we go higher in the trophic levels through
the food chain, the loss of energy due to respiration
as well as metabolic activities successively increase.
So, there occurs the transference of only 10% of the
preceding trophic level to the next higher trophic
level.
15. (b) Both the assertion and reason are correct
statements but the later is not the correct explanation
of the former. The basic planning for environment
includes ‘conservation of organisms and resources’
as the most valuable component. Development can
be complementary to conservation, only when it is
sustainable.
16. (d) The ever-increasing human population creates
a loss of natural habitat of organisms and have other
impacts such as various kinds of pollution. Thus,
the ecosystem gets imbalanced in many ecological
terms.
17. (a) Both the statements are true and R is the
correct explanation of A.
18. (c) The relative loss of energy increases in
successive trophic levels. Primary consumers use
10% of the energy stored in plants. Secondary and
tertiary consumers transfer 20% of the energy from
their own bodies so they are more efficient. In going
from lower to higher trophic levels energy transfers
are insufficient so making the food chains limited
to only 4-5 trophic levels. Higher trophic levels are
less discrete due to their less specialised food habits.
19. (a) Both A and R are correct and R is the correct
explanation of A. Organic farming depends on on-
farm resources, using alternative sources like usage
of no chemical pesticides and fertilizers, on- farm
practices which do not depend on fossil fuels
consumption.
20. (c) The National Biodiversity Authority (NBA)
an autonomous body was established in 2003 to
implement India’s Biological Diversity Act (2002).
21. (b) Bandipur National Park, a tiger reserve is
located in the south Indian state of Karnataka.
Manas National Park or Manas Wildlife Sanctuary
is a National Park, UNESCO Natural World
Heritage site, a Project Tiger Reserve, an Elephant
Reserve and a Biosphere Reserve in Assam. The
Sundarban National Park is a National Park, Tiger
Reserve, and a Biosphere Reserve in India. It is a
part of the Sundarbans on the Ganges Delta of India
and Bangladesh.
Bhitarkanika National Park is a national park
located in the Kendrapara District Odisha, which is
not specifically for Tiger reserve.
22. (c) Wetlands cover around 3% of the total land
area of India. Gujarat occupies around 3 million
hectares of wetlands out of India’s total 10 million
hectares of wetland area. India has total 27,403
wetands, of which 23,444 are inland wetlands and
3,959 are coastal wetlands but the coastal wetlands
occupy an estimated 6,750 sq km, which is more
than the inland wetlands.
23. (c) Global Warming, fragmentation of habitat and
invasion of alien species can be threats to the bio-
diversity of a geographical area.
24. (c) There is an increase in biodiversity from the
poles to the tropics. Thus localities at lower latitudes
have more species than localities at higher latitudes.
Downloaded DIWAKAR EDUCATION
HU
E-88 || Environment and Ecology
25. (b) The ICUN Red list of threatened species or the
Red Data Book is the state document established
for documenting rare and endangered species
of animals, plants and fungi existing within the
territory of the state or country.
26. (d) Biological diversity helps in the formation
and maintenance of soil structure and the retention
of moisture and nutrient levels. Trees on the other
hand, lower the water table and remove deposited
salt from the upper soil horizons.
27. (c) The Gir Forest National Park and Wildlife
Sanctuary is a forest and wildlife sanctuary in
Gujarat. It is the sole home of the Asiatic Lions
(Panthera leopersica). Sundarbans National Park
in West Bengal is the home of Bengal tigers. Betla
National Park is located in the Chota Nagpur Plateau
of the Latehar district of Jharkhand. Kaziranga
National Park is located in Golaghat and Nagaon
districts of Assam, a World Heritage Site, the park
hosts two-thirds of the world's Great One-horned
Rhinoceroses.
28. (b) Nilgiri biosphere site was set up in 1986.
Nanda Devi biosphere site was set up in 1988.
Sundarban biosphere site was set up in 1989.
Kanchanjunga biosphere site was set up in 2000.
29. (b) A biodiversity hotspot is a biogeographic
region with a significant reservoir of biodiversity
that is under threat from humans. Around the world,
as many as 25 areas qualify to be the hotspots. Out
of which India has 2 hotspots: Eastern Himalayas
and Western Ghats.
30. (c) Dihang-Dibang or Dehang-Debang is a
biosphere reserve constituted under the Man &
Biosphere Programme. It is in the Arunachal
Pradesh. Manas National Park is in Assam. Nokrek
National Park is located in West Garo Hills district
of Meghalaya. Simlipal National Park is an elephant
reserve situated in the Mayurbhanj district in
Odisha.
31. (d) The correct descending order of mangrove
cover in the states are West Bengal, Gujarat, Andhra
Pradesh, Orissa.
32. (b) The concept of biodiversity was propounded
by E.O. Wilson. The concept of wildlife was
propounded by W. Hornaday. The concept of
Ecosystem propounded by G. Tansley. The concept
of Ecology was propounded by E. Haeckel.
33. (c) Dachigam National Park is located 22
kilometers from Srinagar, Jammu and Kashmir. It
covers an area of 141 square kilometres. Loktak
Lake, the largest freshwater lake in India, also
called the only Floating lake in the world due
to the floating phumdis (heterogeneous mass of
vegetation, soil, and organic matters at various
stages of decomposition) on it, is located near
Moirang in Manipur.
34. (a) Namdapha National Park is the largest
protected area in the Eastern Himalaya biodiversity
hotspot and is located in Arunachal Pradesh. Periyar
National Park and Wildlife Sanctuary is a protected
area in the districts of Idukki and Pathanamthitta in
Kerala. Bandipur National Park, established in 1974
as a tiger reserve under Project Tiger, is a national
park located in the south Indian state of Karnataka.
The Keibul Lamjao National Park is a national park
in the Bishnupur district of Manipur.
35. (d) Bees, bats and birds are the biotic pollinating
agents. Wind is also an agent of pollination but is an
abiotic agent.
36. (a) The Millennium Ecosystem Assessment (MA)
report 2005 defines Ecosystem services as benefits
people obtain from ecosystems and distinguishes
four categories of ecosystem services: 1. Supporting
services, 2. Provisioning services, 3. Regulating
services, 4. Cultural services.
37. (c) Keystone species are not necessarily small
sized though they put great effect on the environment.
They play very critical role in maintaining the
structure of an ecological community by affecting
many other organisms. An ecosystem may
experience a dramatic shift if a keystone species
is removed, even though that species may be small
part of the ecosystem by measures of biomass or
productivity.
38. (a) Mangrove- plants have higher concentration
of salts and minerals (solutes, such as proline and
sorbitol) in the cells making their osmotic potential
higher than the surrounding water in which they
grow. This is a type of adaptation that allows water
uptake by the plants in spite of growing in salty
waters. Some mangroves also pump out excess salt
by specialised roots.
Downloaded DIWAKAR EDUCATION
HU
General Science || E-89
39. (b) The term ‘ammensalism’ generally refers to
the complete or partial inhibition or death of one
organism by another through production of some
chemicals (allochemicals) as a result of metabolic
pathways. In it, none of the organisms gets any
benefit. It is more common in microbial world.
40. (a) Both A and R are true and R is correct
explanation of A. The weedicides and herbicides
are metabolic inhibitors, inhibiting the metabolic
pathways as well as photosynthesis. Some
weedicides also cause phloem cells’ proliferation so
as to block the transport of plants’ food materials.
41. (c) A new online Atlas of freshwater biodiversity
has been launched on 29 January, 2014. It will
present spatial information and species distribution
patterns. The Atlas is an output of BioFresh – an EU-
funded project in which the IUCN Global Species
Programme is a key partner. It is working to better
understand, manage and protect our freshwaters, for
generations to come.
42. (d) The prestigious Gold Standard Foundation
(GSF) certification has been awarded to the Delhi
Metro Rail Corporation (DMRC), for efficient
usage of energy, on 2 February, 2014. DMRC has
become the first ever Railway system in the world
with GSF certification standard. In 2008, DMRC
had also become the first Railway project in the
world to be registered by the UN under the Clean
Development Mechanism (CDM).
43. (b) IUCN, the world’s oldest and largest global
environmental organization, is celebrating its
completion of 50 years. It was founded in 1948. It
lists out all types of organisms vulnerable to any
kind of loss, in its Red data book.
44. (d) The earthquake felt in Java, Indonesia, had
been measured to be 6.1 on Richter’s scale. It is
prone to such tremors due to its location in Pacific
Ring of fire. One of the incidents occurred in here
in 2004 when a monster temblor off Aceh shores
triggered a tsunami that killed 230,000 people in a
dozen countries.
45. (d) Almost all of the mercury in the Arctic
atmosphere is transported there in gaseous form
from sources in areas farther south, from sources
such as wildfires, coal burning and gold mining.
Scientists have long known that mercury in the air
near ground level undergoes complex chemical
reactions that deposit the element on the surface.
Once the mercury is completely removed from
the air, these reactions stop. However, this newly
discovered mixing ice forces down additional
mercury to restart and sustains the reactions.
46. (a) The researchers isolated metabolic genes from
multiple species of bacteria and pieced them together
in Escherichia coli (E.coli) to create artificial
biochemical pathways that convert free fatty acids to
hydrocarbons. One such pathway, named CEDDEC,
contained metabolic genes from the bioluminescent
bacterium Photorhabdus luminescens and the
cyanobacterium Nostoc punctiforme. When grown
in broth containing various combinations of fatty
acids, or when modified to express additional
genes, the engineered E. coli produced molecules
that are structurally and chemically identical to 10
retail diesel fuel hydrocarbons commonly used in
temperate climates.
47. (d) The schedule is meant to reduce the growth
of the US government’s liabilities under the 1982
Nuclear Waste Policy Act, under which it was
to begin taking spent reactor fuel from power
companies in 1998. About 68,000 tonnes of used
reactor fuel remains at 72 different power plant sites
across the country, with the Department of Energy
(DoE) reimbursing power companies the cost. The
current production rate of spent fuel is 2,000 tonnes
a year. The two interim facilities will accept used
reactor fuel at a rate faster than this in order to
reduce gradually the inventory at power companies.
48. (c) It is believed that other sea creatures such
as turtles, sharks and whales may also use Earth's
magnetic field to roam the oceans.
The 17-year-old Machli is the longest living
wild tigress in the world, besides being the most
photographed big cat. The tigress was identified as
T-16. Machli had survived in the dense forest by
hunting her own prey despite her advanced age.
49. (b) The Researchers found a small correlation
between cosmic rays and global temperatures
occurring every 22 years; however, the changing
cosmic ray rate lagged behind the change in
temperatures by between one and two years,
suggesting that the cause might not be down to
cosmic rays and cloud formation but might be due
to the direct effects of the sun. By comparing the
small oscillations in the cosmic ray rate, which were
taken from data from two neutron monitors, and
Downloaded DIWAKAR EDUCATION
HU
E-90 || Environment and Ecology
temperature with the overall trends in both since
1955, the research team found that less than 14 per
cent of the global warming seen during this period
could be attributable to solar activity.
50. (d) Other reasons for the decline in the number
of these birds are changes in cropping pattern due
to various reasons including implementation of
irrigation schemes; increased pesticide usage and
livestock-grazing; high levels of disturbance; and
developmental activities like mining and hydel
projects. This also includes collision of the birds
with vehicles, wind turbines and power lines
51. (c) The IUCN also provides the information that
is related to species-based conservation actions.
It also helps in identifying globally important
sites for conservation including important plant
areas, important bird areas, key biodiversity
areas and alliance for zero extinction sites. It
helps in influencing the decisions of conservation
at multiple scales that include environmental
impact assessments to international multilateral
environments agreements. It indicates the current
status of species and revealing trends in their
extinction risk over time, to track progress towards
biodiversity targets.
52. (d) For conservation of endangered species
Wildlife Crime Control Bureau has been established
for control of illegal trade in wildlife, including
endangered species of birds and their parts and
products. Research and monitoring activities on
birds are promoted by the Government through
reputed research organizations. Wildlife Institute
of India, Bombay Natural History society and
Salim Ali Centre for Ornithology and Natural
History are some of the research organizations
undertaking research on conservation of birds. The
Indian government has banned the veterinary use
of diclofenac drug that has caused rapid decline in
vulture population across the Indian Subcontinent.
Conservation Breeding Programmes to conserve
these vulture species have been initiated at Pinjore
(Haryana), Buxa (West Bengal) and Rani, Guwahati
(Assam) by the Bombay Natural History Society.
53. (b) GSF standard certification is a globally
accepted certification standard for carbon mitigation
projects. The Delhi Metro Rail Corporation
(DMRC) registered for the certification standard
for its energy efficiency measures undertaken in 51
stations in Phase II of the DMRC Project. The energy
efficiency measures were primarily undertaken in
the heating, venting and air conditioning (HVAC)
systems, lighting system and other energy efficient
measures of station buildings; the measures adopted
in the HVAC system resulted in reduction in
electrical energy consumption.
54. (b) The veterinary drug Diclofenac that is used
in vetting the cattle has been identified as a reason
that is causing the sharp deep in the number of
vultures. Use of this drug has been banned in India.
Diclofenac is toxic for any and all vultures that feed
on the carcass of recently treated cattle. Saving
Asia’s Vultures from Extinction (SAVE) in its study
says that the version for human use is being illegally
given to the cattle. A programme named SAVE in
its plan will release up to 25 birds into the 30000
kilometer square safe zone. The captive-bred birds
will be released into the wild by 2016 under the
project.
55. (b) Tree foundation, an NGO engaged in
conservation of the sea turtle, found more than
100 dead Olive Ridley turtles in the shores of
Nagapattinam. The Olive Ridley turtles are rusty
coloured carapace and have slightly smaller head
and shell than the Kemp turtles. These Olive Ridley
turtles generally occur through the Antilles, around
the north coast of South America, in West Africa,
the Indian Ocean, Australia and Southeast Asia.
As per the reports the populations of Olive Riddles
have declined in Pakistan, Myanmar, Malaysia and
Thailand, and possibly on the east coast of India,
south of Orissa and in the Andaman and Nicobar
islands.
56. (a) Chilika is the only site to be selected from Asia
by the UNWTO and was included in a list of eight
such sites. The Destination Flyways initiative of
UNWTO aims at promotion of sustainable tourism.
The lagoon was named so for its sustainable and
resilient destination for migratory birds. The status
will help Chilika Development Authority (CDA)
to develop strategies for protection of migratory
birds through creation of innovative tourism and
livelihood products. Chilika Lake is the largest
Downloaded DIWAKAR EDUCATION
HU
General Science || E-91
brackish water lake in Asia with estuarine character
that sprawls along the east coast. It is the largest
wintering ground for migratory waterfowl found
anywhere in the Indian sub-continent. It is one of
the hotspot of biodiversity in the country, and some
rare, vulnerable and endangered species listed in the
IUCN Red List of threatened Animals inhabit the
lagoon for at least part of their life cycle.
57. (b) First Climate Change theatre was opened at
Pushpa Gujral Science City in Kapurthala, Punjab
on 16 January 2014. The theatre will educate people
on climate change. This is the second theatre in the
world to be opened after Canada. The theatre is 18
metre in diameter and it is set up in a dome-shaped
building with a seating capacity of 125 persons.
The 25-minute film shows what worst can happen if
humans do not take action on current or impending
problems which could threaten civilization. The
film starts by giving a glimpse of future - floods,
droughts, earthquakes and other natural disasters.
58. (d) The estimation of retreat of Gangotri
glacier has been measured using rapid static and
kinematic GPS survey. The Gangotri is one of the
largest Himalayan glaciers in Uttarkashi district,
Uttarakand.The glaciers originate at about 7100
meter above the sea level and are 30.2 km long and
width that varies between 0.5 and 2.5 km. The River
Bhagirathi, one of the main tributaries of the Ganga,
originates from Gangotri glacier.
59. (a) The aim of the Taishan research base station
is to provide a base for research on bio-ecology
and remote satellite sensing. The camp will be used
from December to March every year and is located
near the United States' McMurdo Station, Italy's
Zucchelli Station and a recently built South Korean
station. Base Stations of India at Antarctica are
Dakshin Gangotri, Maitri, and Bharathi.
60. (c) Along with the first 3 species Mystus menoni
species of Catfish were discovered from the
Manimala river. Catfish are freshwater, bottom-
dwelling fish. Unlike other fish, they have no
scales and are smooth-skinned. They are known for
growing whiskers, called "barbels," at some point
during their lifespan. Catfish use their barbels as
feelers as they swim along the bottom of the various
bodies of water in which they live. There are 2,900
species of catfish worldwide. They range in size
from 1.5 to 2 in chesto more than 8 feet in length.
61. (a) The ministry declared 313 sq km around the
Marine National Park in Gulf of Kutch, Gujarat
as an eco-sensitive zone through a notification. Of
this, 208 sq km is land while the remaining is on
the seaside. Land use for recreational, commercial
or industrial development will not be permitted in
the area except for residential purpose. Mining,
including fresh water mining, and release of
polluted water and waste will also be prohibited.
The ministry even disallowed fishing by trawlers.
The government will prepare a zonal ecology
conservation master plan. The plan will restore
denuded areas as well as existing water bodies. The
plan should also have provision for management
of catchment areas, watershed management,
groundwater and soil conservation.
62. (c) Magellanics are medium-sized penguins
standing about 15 inches tall and weighing about
10 pounds. Males of the species sound like braying
donkeys when they vocalize. Among 17 species
of penguins, 10 including Magellancis breeds are
found in the region, where there is no snow, it is
relatively dry and temperatures can be temperate.
To protect the chicks, parents are too big to sit
over and those are still too young to have grown
waterproof feathers. Downy penguin chicks
exposed to drenching rain can struggle and die in
absence of the attention of their concerned parents.
During extreme heat chicks without waterproofing
can’t take a dip in cooling waters as adults.
64. (d) Dung beetles and disease carrying flies
both compete for the same food, that is cattle
droppings. Since both of these organisms belong
to different species, this competition is called
interspecific competition.
65. (b) In environmental law, the polluter pays
principle is enacted to make the party responsible
for producing pollution, to be held responsible
for paying the damage done to the natural
environment.
66. (d) The flea beetles have proved to be an
effective means of controlling leafy spurge. The
flea beetles typically take 3-5 years to establish
and impact leafy spurge infestations.
Downloaded DIWAKAR EDUCATION
HU
E-92 || Environment and Ecology
67. (b) Scientists have recognized that nutrient
enrichment was a threat to the bay. In 1987
formal goals were established to reduce nitrogen
and phosphorous inputs to the bay from both
point and non point sources.
68. (c) In parasitic food chains, the pyramid of
number is always inverted as a single plant may
support many herbivores and birds and each one
of these in turn, may provide nutrition to several
hyperparasites.
71. (c) In hydrothermal vent communities,
we should not expect to find chlorophyll as
photosynthesis cannot take place due to absence
of light.
74. (b) Cogeneration or combined heat and power
(CHP) is the use of a heat engine or power station
to simultaneously generate electricity and useful
heat.
75. (d) In addition to increasing corn yields and
cutting nitrogen expense, keeping soyabeans in
the rotation lowers next years corn rootworm
management costs.
76. (b) The concept of biodiversity hotspot was
given by Norman Myers. In 1988 he first identified
10 tropical forest “hotspots” characterised
by both exceptional level of plant endemism
and by serious levels of habitat loss. Later on,
Conservation International (CI) adopted Myers’
hotspots. They gave a broad definition criteria of
the Biodiversity hotspot.
77. (b) The concern about human-to-human
transmission of bird flu virus H5N1 is closely
monitored by government agencies in order to
determine whether human-to-human transmission
is occurring.
The CDC (Centre for Disease Control) and
WHO recommend the prescription antiviral drug
Tamiflu (oseltamivir) for treating and preventing
human infections with the bird flue virus.
78. (a) Microclimate is defined as the climate of a
very small or restricted area, especially when this
differs from the climate of the surrounding area.
Here, while the climate of the surrounding area
is very hot the place at the edge of the stream,
under the tree, on a rock will have a cooler
microcleinate.
79. (d) Materials from land’s surface can travel
through the soil ultimately reaching the
groundwater. For example pesticide and fertilizers
can enter into the ground water supplies. Untreated
waste from septic tanks and toxic chemicals from
underground storage tanks and leaky landfills can
also contaminate groundwater.
81. (a) Recycling is the best way to get rid of non-
biodegradable waste. Burying will not have any
effect on the non-biodegradable wastes. Burning
causes pollution.
82. (b) Ozone present in the stratosphere, acts as a
protection from U.V. light. Without this protective
shield, all life would be more susceptible to
cancer, impaired immunity and other health issues.
Whereas the ozone present in the troposphere,
which is close to earth surface, can damage our
lungs. Hence it is not good for breathing.
83. (b) In an pollution free stratosphere, the
production and destruction of ozone are in balance
and hence the concentration of O3 remains constant
with time. When CFC’s are released into the lower
troposphere, they diffuse up into the stratosphere
since their lifetime is 50-100 years when CFCs
reach the middle stratosphere, UV radiation
liberates the chlorine atom.
CFC + UV Cl
Cl is then able to destroy as man as 100,000 O3 molecules.
84. (d) It has been proved that CFCs are a major cause
of depletion of the earth’s stratospheric ozone layer
and contribute to the green house effect.
Large quantities of CFCs are used as refrigerants
in a number of refrigerating and air conditioning
systems. Though the refrigerant moves in a closed
cycle, there are lots of leakages that escape to the
atmosphere and cause destruction of the ozone
layer. CFCs have exceptionally long atmospheric
life, which can extend upto 100 years.
86. (a) IPCC is the leading international body
for the assessment of climate change. It was
established by the United Nations Environment
Programme (UNEP) and the World Meteorological
Organisation (WMO) in 1988 to provide the world
with a clear scientific view on the current state
of knowledge in climate change and its potential
Downloaded DIWAKAR EDUCATION
HU
General Science || E-93
environmental and socio-economic impacts.
87. (a) Ecotone is a place where two different eco
systems meet each other. Mangrove and terrestrial
eco system is an example of Ecotone. This area is
very rich in species. The ecotone has species of
both ecosystems as well as some species which
are charecterstic and restricted to the ecotone.
88. (c) Estuary is a place where the fresh water of
river or stream meets with ocean water. This place
provides the conducive conditions for development
of different species.
89. (c) Biosphere is a combination of lithosphere,
hydrosphere and atmosphere. Biosphere is
not found everywhere, some areas do not
support the conditions required for Biosphere.
Hence Organisms are not uniformly distributed
throughout the world.
90. (a) Carbon credit shows that a country or any
entity emits the carbon below the limit prescribed
by the government, hence the country or entity can
sell it in exchange where carbon credits are traded.
91. (a) Coral Bleaching is being caused by the
climate change. Increase in surface temperature
of ocean due to climate change is increasing
the decline of zooxanthellae. Zooxanthellae is
responsible for the process of photosynthesis.
92. (b) CO2 is the largest contributor towards global warming, followed by methane, CFCs and N2O.
93. (c) Absorption technique is used for controlling
Gaseous pollutant. These pollutants are brought
into contact with a liquid such as water. The liquid
absorbs the gas.
94. (a) Oxygen is required for decomposition of
microorganism under the water. Increase in
waste and pollution enhances the decomposition
activities and thereby reduces the availability of
oxygen for other organic activities under the water
SECTION-B
Q1 FUNDAMENTALS OF COMPUTERS
1. The term ‘Computer’ is derived from..........
a. Latin b. German c. French d. Arabic 2. Who is the inventor of “Difference Engine”?
a. Allen Turing b. Charles Babbage c. Simur Cray d. Augusta
Adaming 3. Who is the father of Computer?
a. Allen Turing b. Charles Babbage c. Simur Cray d. Augusta
Adaming 4. Who is the father of Computer science?
a. Allen Turing b. Charles Babbage c. Simur Cray d. Augusta
Adaming 5. Who is the father of personal computer?
a. Edward Robert b. Allen Turing c. Charles Babbage d. None of
these
6. A CPU contains a. a card reader and a printing device b. an analytical engine and a
control unit
c. a control unit and an arithmetic logic unit d. an arithmetic logic unit and a card reader
7. Which of the following controls the process of interaction between
the user and the operating
system? a. User interface b. Language translator
c. Platform d. Screen saver
8. The first computers were programmed using a. assembly language b. machine language
c. source code d. object code
School of Distance Education Fundamentals of Computers Page 2
9. ..........is a combination of hardware and software that facilitates the
sharing of information
between computing devices. a. network b. peripheral c. expansion board d. digital device
10. Coded entries which are used to gain access to a computer system
are called a. Entry codes b. Passwords c. Security commands d. Code words
11. Which of the following statements is true ?
a. Minicomputer works faster than Microcomputer b. Microcomputer works faster than Minicomputer
c. Speed of both the computers is the same
d. The speeds of both these computers cannot be compared with the
speed of advanced 12. You organize files by storing them in
a. archives b. folders c. indexes d. lists
13. What type of resource is most likely to be a shared common resource in a computer
Network?
a. Printers b. Speakers c. Floppy disk drives d. Keyboards
14. Which device is required for the Internet connection? a. Joystick b. Modem c. CD Drive d. NIC Card
15. What is a light pen?
a. A Mechanical Input device b. Optical input device c. Electronic input device d. Optical output device
16. UNIVAC is
a. Universal Automatic Computer b. Universal Array Computer c. Unique Automatic Computer d. Unvalued Automatic Computer
17. CD-ROM stands for
Downloaded DIWAKAR EDUCATION
HU a. Compactable Read Only Memory b. Compact Data Read Only
Memory
c. Compactable Disk Read Only Memory d. Compact Disk Read
Only Memory 18. ALU is
a. Arithmetic Logic Unit b. Array Logic Unit
c. Application Logic Unit d. None of above 19. VGA is
a. Video Graphics Array b. Visual Graphics Array
c. Volatile Graphics Array d. Video Graphics Adapter
20. IBM 1401 is a. First Generation Computer b. Second Generation Computer
c. Third Generation Computer d . Fourth Generation Computer
School of Distance Education Fundamentals of Computers Page 3
21. MSI stands for
a. Medium Scale Integrated Circuits b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit d. Medium System Intelligent
Circuit
22. The capacity of 3.5 inch floppy disk is a. 1.40 MB b. 1.44 GB c. 1.40 GB d. 1.44 MB
23. WAN stands for
a. Wap Area Network b. Wide Area Network c. Wide Array Net d. Wireless Area Network
24. MICR stands for
a. Magnetic Ink Character Reader b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader d. None 25. EBCDIC stands for
a. Extended Binary Coded Decimal Interchange Code
b. Extended Bit Code Decimal Interchange Code c. Extended Bit Case Decimal Interchange Code
d. Extended Binary Case Decimal Interchange Code
26. Which of the following is a part of the Central Processing Unit? a. Printer b. Key board
c. Mouse d. Arithmetic & Logic unit
27. CAD stands for
a. Computer aided design b. Computer algorithm for design c. Computer application in design d. Computer analogue design
28. Junk e-mail is also called
a. spam b. spoof c. sniffer script d. spool
29. Hackers
a. all have the same motive b. break into other people's computers
c. may legally break into computers as long as they do not do any
damage
d. are people who are allergic to computers 30. What type of computers are client computers (most of the time)
in a client-server system?
a. Mainframe b. Mini-computer c. Microcomputer d. PDA
31. A computer cannot 'boot' if it does not have the
a. Compiler b. Loader
c. Operating System d. Assembler School of Distance Education
Fundamentals of Computers Page 4
32. The amount of vertical space between lines of text in a
document is called
a. double-space b. line spacing c. single space d. vertical spacing
33. Example of non-numeric data is
a. Employee address b. Examination score c. Bank balance d. All of these
34. What is embedded system?
a. The programme which arrives by being wrapped in box. b. The programme which is the permanent part of the computer
c. The computer which is the part of a big computer
d. The computer and software system that control the machine
35. First page of Website is termed as- a. Homepage b. Index c. JAVA script d. Bookmark
36. . ..................... Is the appearance of typed characters?
a. Size b. Format c. Point d. Colour 37. When a file is saved for the first time
a. a copy is automatically printed
b. it must be given a name to identify it c. it does not need a name
d. it only needs a name if it is not going to be printed
38. Office LANS, which are scattered geographically on large scale,
can be connected by the use of corporate
a. CAN b. LAN c. DAN d. WAN
39. Where are data and programme stored when the processor uses them?
a. Main memory b. Secondary memory
c. Disk memory d. Programme memory
40. . ............... represents raw facts, where-as................. is data made meaningful.
a. Information, reporting b. Data, information
c. Information, bits d. Records, bytes 41. What characteristic of read-only memory (ROM) makes it useful?
a. ROM information can be easily updated.
b. Data in ROM is non-volatile, that is, it remains there even without electrical power.
c. ROM provides very large amounts of inexpensive data storage.
d. ROM chips are easily swapped between different brands of
computers. 42. What do you call the programs that are used to find out possible
faults and their causes?
a. operating system extensions b. cookies c. diagnostic software d. boot diskettes
School of Distance Education
Fundamentals of Computers Page 5 43. Which programming languages are classified as low level
languages?
a. BASIC, COBOL, Fortran b. Prolog
c. C, C++ d. Assembly languages 44. Which of the following is not anti- viruses’ software?
a. NAV b. F-Prot
c. Oracle d. McAfee 45. Which device is required for the Internet connection?
a. Joystick b. Modem
c. CD Drive d. NIC Card
46. What does DMA stand for? a. A. Distinct Memory Access b. Direct Memory Access
c. Direct Module Access d. Direct Memory Allocation
47. Which of the following is a storage device?
Downloaded DIWAKAR EDUCATION
HU a. Tape b. Hard Disk
c. Floppy Disk d. All of the above
48. When did John Napier develop logarithm?
a. 1416 b. 1614 c. 1641 d. 1804
49. A normal CD- ROM usually can store up to _________ _data?
a. 680 KB b. 680 Bytes c. 680 MB d. 680 GB
50. MIS is designed to provide information needed for effective
decision making by?
a. Consumers b. Workers c. Foremen d. Managers
51. What is a light pen?
a. Mechanical Input device b. Optical input device c. Electronic input device d. Optical output device
52. BCD is
a. Binary Coded Decimal b. Bit Coded Decimal c. Binary Coded Digit d. Bit Coded Digit
53. ASCII stands for
a. American Stable Code for International Interchange
b. American Standard Case for Institutional Interchange c. American Standard Code for Information Interchange
d. American Standard Code for Interchange Information
School of Distance Education Fundamentals of Computers Page 6
54. Which of the following is first generation of computer?
a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900
55. Chief component of first generation computer was a. Transistors b. Vacuum Tubes and Valves
c. Integrated Circuits d. None of above
56. FORTRAN is a. File Translation b. Format Translation
c. Formula Translation d. Floppy Translation
57. EEPROM stands for a. Electrically Erasable Programmable Read Only Memory
b. Easily Erasable Programmable Read Only Memory
c. Electronic Erasable Programmable Read Only Memory
d. None of the above 58. Second Generation computers were developed during
a. 1949 to 1955 b. 1956 to 1965
c. 1965 to 1970 d. 1970 to 1990 59. The computer size was very large in
a. First Generation b. Second Generation
c. Third Generation d. Fourth Generation 60. Microprocessors as switching devices are for which generation
computers
a. First Generation b. Second Generation
c. Third Generation d. Fourth Generation 61. Which of the following devices can be sued to directly image
printed text?
a. OCR b. OMR c. MICR d. All of above
62. The output quality of a printer is measured by
a. Dot per inch b. Dot per sq. inch
c. Dots printed per unit time d. All of above 63. In analogue computer
a. Input is first converted to digital form b. Input is never converted
to digital form
c. Output is displayed in digital form d. All of above
64. In latest generation computers, the instructions are executed
a. Parallel only b. Sequentially only
c. Both sequentially and parallel d. All of above 65. Who designed the first electronics computer – ENIAC?
a. Van-Neumann b. Joseph M. Jacquard
School of Distance Education Fundamentals of Computers Page 7
c. J. Presper Eckert and John W Mauchly d. All of above
66. Who invented the high level language “C”?
a. Dennis M. Ritchie b. Niklaus Writh c. Seymour Papert d. Donald Kunth
67. Personnel who design, program, operate and maintain computer
equipment refers to a. Console-operator b. Programmer
c. Peopleware d. System Analyst
68. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a. 1978 b. 1984
c. 1990 d. 1991
69. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
a. Monitor b. Hardware
c. Robot d. Computer 70. An error in software or hardware is called a bug. What is the
alternative computer jargon for it?
a. Leech b. Squid
c. Slug d. Glitch 71. Modern Computer are very reliable but they are not
a. Fast b. Powerful
c. Infallible d. Cheap 72. What is the name of the display feature that highlights are of the
screen which requires
operator attention? a. Pixel b. Reverse video
c. Touch screen d. Cursor
73. Personal computers use a number of chips mounted on a main
circuit board. What is the common name for such boards?
a. Daughter board b. Motherboard
c. Father board d.Breadboard 74. In most IBM PCs, the CPU, the device drives, memory expansion
slots and active components
are mounted on a single board. What is the name of this board? a. Motherboard b. Breadboard
c. Daughter board d. Grandmother board
75. What is meant by a dedicated computer?
a. Which is used by one person only b. Which is assigned one and only one task
c. Which uses one kind of software d. Which is meant for application
software School of Distance Education
Fundamentals of Computers Page 8
76. The system unit of a personal computer typically contains all of
the following except: a. Microprocessor b. Disk controller c. Serial interface d. Modem
77. A computer program that converts an entire program into machine
language is called a/an
Downloaded DIWAKAR EDUCATION
HU a. Interpreter b. Simulator c. Compiler d. Commander
78. A computer program that translates one program instructions at
a time into machine language
is called a/an a. Interpreter b. CPU c. Compiler d. Simulator
79. A small or intelligent device is so called because it contains
within it a a. Computer b. Microcomputer c. Programmable d. Sensor
80. A fault in a computer program which prevents it from working
correctly is known as
a. Boot b. Bug c. Biff d. Strap 81. A self replicating program, similar to a virus which was taken
from a 1970s science fiction
novel by John Bruner entitled the Shockwave Rider is a. Bug b. Vice c. Lice d. Worm
82. A state. is a bi-stable electronic circuit that has
a. Multivibrator b. Flip-flop c. Logic gates d. laten 83. Unwanted repetitious messages, such as unsolicited bulk e-mail
is known as
a. Spam b. Trash c. Calibri d. Courier
84. DOS stands for a. Disk Operating System b. Disk operating session
c. Digital Operating System d. Digital Open system
85. Who is the chief of Microsoft a. Babbage b. Bill Gates c. Bill Clinton d. none of these
86. Which of the following are input devices?
a. Keyboard b. Mouse c. Card reader d. Any of these
87. Examples of output devices are a. Screen b. Printer c. Speaker d. All of these
88. Which of the following is also known as brain of computer
a. Control unit b. Central Processing unit c. Arithmetic and language unit d. Monitor
89. IBM stands for
a. Internal Business Management b. International Business Management
c. International Business Machines d. Internal Business Machines
90. ............ translates and executes program at run time line by line
a. Compiler b. Interpreter c. Linker d. Loader
School of Distance Education
Fundamentals of Computers Page 9 91. is an OOP principle
a. Structured programming b. Procedural programming
c. Inheritance d. Linking 92. COBOL is widely used in application s
a. Commercial b. Scientific c. Space d. Mathematical
93. RAM stands for
a. Random origin money b. Random only memory c. Read only memory d. Random access memory
94. 1 Byte =?
a. 8 bits b. 4 bits c. 2 bits d. 9 bits 95. SMPS stands for
a. Switched mode Power Supply b. Start mode power supply
c. Store mode power supply d. Single mode power supply
96. The device used to carry digital data on analogue lines is called as
a. Modem b. Multiplexer
c. Modulator d. Demodulator
97. VDU is also called
a. Screen b. Monitor c. Both 1 & 2 d. printer
98. BIOS stands for
a. Basic Input Output system b. Binary Input output system c. Basic Input Off system d. all the above
99. Father of “C‘ programming language
a. Dennis Ritchie b. Prof John Keenly c. Thomas Kurtz d. Bill Gates
100. The instructions that tell a computer how to carry out the
processing tasks are referred
to as computer......... a. programs b. processors c. input devices d. memory modules
101. An area of a computer that temporarily holds data waiting to be
processed is.......... a. CPU b. Memory c. Storage d. File
102. ........... is the key to close a selected drop -down list; cancel a
command and close a dialog box.
a. TAB b. SHIFT c. ESC d. F10
103. .......... is the key we use to run the selected command.
a. SHIFT b. TAB c. ENTER d. CTRL 104. ............. Is the functional key to display save-as box.
a. F5 b. F6 c. F9 d. F12
School of Distance Education Fundamentals of Computers Page 10
105. Data becomes ................ when it is presented in a format that
people can understand
and use a. processed b. graphs c. information d. presentation
106. The term ............. designates equipment that might be added to a
computer system to enhance its functionality.
a. digital device b. system add-on c. disk pack d. peripheral device
107. A ............ is a microprocessor -based computing device. a. personal computer b. mainframe c. workstation d. server
108. RAM can be treated as the ......... for the computer's processor
a. factory b. operating room c. waiting room d. planning room
109. Which of the following are the functions of a operating system a. Allocates resources b. Monitors Activities
c. Manages disks and files d. All of the above
110. To move a copy of file from one computer to another over a communication channel is
called?
a. File transfer b. File encryption c. File modification d. File copying
111. The primary function of the ............ is to set up the hardware and
load and start an
operating system a. System Programs b. BIOS
c. CP d. Memory
112. What kind of memory is both static and non -volatile? a. RAM b. ROM c. BIOS d. CACHE
113. .......... is computer software designed to operate the computer
hardware and to provide
platform for running application software a. Application software b. System software
c. Software d. Operating system
114. The ......... is the amount of data that a storage device can move
Downloaded DIWAKAR EDUCATION
HU from the storage
medium to the Computer per second
a. data migration rate b. data digitizing rate
c. data transfer rate d. data access rate 115. A device, which is not connected to CPU, is called as .......
a. land-line device b. On-line device
c. Off-line device d. Device 116. What is the other name for programmed chip?
a. RAM b. ROM c. LSIC d. PROM
School of Distance Education
Fundamentals of Computers Page 11 117. On-line real time systems become popular in ...........
generation
a. First Generation b. Second Generation c. Third Generation d. Fourth Generation
118. You use a(n) ....., such as a keyboard or mouse, to input
information a. output device b. input device
c. storage device d. processing device
119. ............. is the ability of a device to "jump" directly to the
requested data a. Sequential access b. Random access
c. Quick access d. All of the above
120. ............. provides process and memory management services that allow two or more
tasks, jobs, or programs to run simultaneously
a. Multitasking b. Multithreading
c. Multiprocessing d. Multicomputing 121. The task of performing operations like arithmetic and logical
operations is called......
a. Processing b. Storing c. Editing d. Sorting
122. ALU and Control Unit jointly known as
a. RAM b. ROM c. CPU d. PC 123. RAM is an example of
a. Secondary memory b. Primary memory
c. Main memory d. Both (1) and (2)
124. Magnetic disk is an example of a. Secondary memory b. Primary memory
c. Main memory d. Both (1) and (2)
125. Which one of the following is NOT a computer language a. MS-Excel b. BASIC
c. COBOL d. C++
126. RAM is also called as a. Read / Write Memory b. Long Memory
c. Permanent Memory d. Primary Memory
127. ............ Store data or information temporarily and pass it on as
directed by the control unit
a. Address b. Register
c. Number d. Memory School of Distance Education
Fundamentals of Computers Page 12
128. Select the Odd one
a. Operating system b. Interpreter c. Compiler d. Assembler
129. A ............ is an additional set of commands that the computer
displays after you make a
selection from the main menu
a. dialog box b. submenu
c. menu selection d. All of the above
130. COBOL is an acronym for............. a. Common Business Oriented Language b. Computer Business
Oriented Language
c. Common Business Operated Language d. Common Business Organized Language
131. All of the following are examples of real security and privacy
risks EXCEPT
a. hackers b. Spam c. Viruses d. identity theft
132. Which of the following is NOT one of the four major data
processing functions of a computer?
a. gathering data b. processing data into information
c. analyzing the data or information d. storing the data or information 133. All of the following are examples of storage devices EXCEPT :
a. hard disk drives b. printers
c . floppy disk drives d. CD drives
134. The CPU and memory are located on the : a. expansion board b. motherboard
c. storage device d. output device
135. ............... is the science that attempts to produce machines that display the same type of
intelligence that humans do
a. Nanoscience b. Nanotechnology
c. Simulation d. Artificial intelligence (Al) 136. Servers are computers that provide resources to other computers
connected to a :
a. networked b. mainframe c. supercomputer d. client
137. When creating a computer program, the ......... designs the
structure of the program a. End user b. System Analyst
c. Programmer d. All of the above
138. A computer program that converts an entire program into
machine language at one time is called a/ an
a. Interpreter b. simulator c. characters d. compiler
School of Distance Education Fundamentals of Computers Page 13
139. Computers process data into information by working exclusively
with : a. multimedia b. word c. numbers d. characters
140. The difference between people with access to computers and the
Internet and those
without this access is known as the : a. digital divide b. Internet divide c. Web divide d. E-illiteracy
141. Computers manipulate data in many ways, and this manipulation
is called...... a. upgrading b. processing c. batching d. utilizing
142. The ability to recover and read deleted or damaged files from a
criminal's computer is
an example of a law enforcement speciality called: a. robotics b. simulation c. computer forensics d. animation
143. Where does most data go first with in a computer memory
hierarchy ?
Downloaded DIWAKAR EDUCATION
HU a. RAM b. ROM c. BIOS d. CACHE
144. The………….data mining technique derives rules from real-
world case examples.
a. Rule discover b. Signal processing c. Neural nets d. Case-based reasoning
145. …………….are used to identify a user who returns to a
Website a. Cookies b. Plug-ins
c. Scripts d. ASPs
146. Codes consisting of lines of varying widths or lengths that are
computer-readable are known as- a. an ASCII code b. a magnetic tape
c. an OCR scanner d. a bar code
147. Why is it unethical to share copyrighted files with your friends?
a. It is not unethical, because it is legal.
b. It is unethical because the files are being given for free. c. Sharing copyrighted files without permission breaks copyright
laws.
d. It is not unethical because the files are being given for free.
148. Reusable optical storage will typically have the acronym- a. CD b. DVD c. ROM d. RW
149. The most common type of storage devices are- a. Steel b.
optical c. magnetic d. flash 150. A device that connects to a network without the use of cables
is said to be- a. Distributed b. free c. centralized d. none of these
151. A person who used his or her expertise to gain access to other
people's computers to get information illegally or do damage is a- a. Hacker b. spammer c.
instant messenger d. programmer
School of Distance Education Fundamentals of Computers Page 14
152. To access properties of an object, the mouse technique to use
is- a. Dragging b. dropping c. right-clicking d. shift-clicking 153. A DVD is an example of a (n)- a. hard disk b. optical disc
c. output device d. solid-state storage device
154. . The process of transferring files from a computer on the
Internet to your computer is called
a. Downloading b. uploading
c. FTP d. JPEG 155. . .......... is the process of dividing the disk into tracks and
sectors.
a. Tracking b. Formatting c. Crashing d. Allotting
156. . Help Menu is available at which button?
a. End b. Start
c. Turnoff d. Restart 157. The technology that stores only the essential instructions on a
microprocessor chip and
thus enhances its speed is referred to as a. CISC b. RISC
c. CD-ROM d. Wi-Fi
158. Which is not a basic function of a computer?
a. Store data b. Accept input c. Process data d. Copy text
159. ASCII is a coding system that provides
a. 256 different characters b. 512 different characters
c. 1024 different characters d. 128 different characters
160. Which part of the computer is directly involved in executing the
instructions of the
computer program? a. The scanner b. The main storage
c. The secondary storage d. The processor
161. When a computer is switched on, the booting process performs a. Integrity Test b. Power-On Self-Test
c. Correct Functioning Test d. Reliability Test
162. A computer system that is old and perhaps not satisfactory is
referred to as a(n) a. Ancient system b. Historical system
c. Age old system d. Legacy system
School of Distance Education Fundamentals of Computers Page 15
163. Which of the following is not a binary number?
a. 001 b. 101 c. 202 d. 110 164. Which of the following does not store data permanently?
a. ROM b. RAM c. Floppy Disk d. Hard Disk
165. Which of the following is the smallest storage?
a. Megabyte b. Gigabyte c. Terabyte d. None of these 166. Which of the following contains permanent data and gets
updated during the
processing of transactions? a. Operating System File b. Transaction file
c. Software File d. Master file
167. Which of the following helps to protect floppy disks from data
getting accidentally erased?
a. Access notch b. Write-protect notch
c. Entry notch d. Input notch 168. A modem is connected to
a. a telephone line b. a keyboard
c. a printer d. a monitor 169. Large transaction processing systems in automated organisations
use
a. Online processing b. Batch Processing
c. Once-a-day Processing d. End-of-day processing 170. In a computer, most processing takes place in
a. Memory b. RAM
c. motherboard d. CPU 171. . Which of the following is not a storage medium?
a. Hard disk b. Flash drive c. DVD d. scanner
172. The computer abbreviation KB usually means a. Key Block b. Kernel Boot c. Kilo Byte d. Kit Bit
173. The typical computer criminal is a(n):
a. Young hacker.
b. Trusted employee with no criminal record. c. Trusted employee with a long, but unknown criminal record.
d. Overseas young cracker.
174. The common name for the crime of stealing passwords is: a. Jacking. b. Identity theft.
c. Spoofing. d. Hacking.
School of Distance Education
Fundamentals of Computers Page 16 175. Collecting personal information and effectively posing as
another individual is known
as the crime of:
Downloaded DIWAKAR EDUCATION
HU a. Spooling. b. Identity theft.
c. Spoofing. d. Hacking. 176. Malicious software is known as:
a. Badware. b. Malware. c. Maliciousware. d. Illegalware. 177. A
program that performs a useful task while simultaneously allowing destructive acts is
a:
a. Worm. b. Trojan horse. c. Virus. d. Macro virus.
178. An intentionally disruptive program that spreads from program
to program or from disk
to disk is known as a: a. Trojan horse. b. Virus. c. Time bomb. d. Time-related bomb
sequence.
179. In 1999, the Melissa virus was a widely publicised: a. E-mail virus. b. Macro virus.
c. Trojan horse. d. Time bomb.
180. What type of virus uses computer hosts to reproduce itself? a. Time bomb b. Worm
c. Melissa virus d. Macro virus
181. The thing that eventually terminates a worm virus is a lack of:
a. Memory or disk space. b. Time. c. CD drives space. d. CD-RW. 182. When a logic bomb is activated by a time-related event, it is
known as a:
a. Time-related bomb sequence. b. Virus. c. Time bomb. d. Trojan horse.
183. A logic bomb that was created to erupt on Michelangelo‘s
birthday is an example of a:
a. Time-related bomb sequence. b. Virus. c. Time bomb. d. Trojan horse.
184. What is the name of an application program that gathers user
information and sends it to someone through the Internet?
a. A virus b. Spybot
c. Logic bomb d. Security patch School of Distance Education
Fundamentals of Computers Page 17
185. ------ is the measurement of things such as fingerprints and
retinal scans used for security access.
a. Biometrics b. Bio measurement
c. Computer security d. Smart weapon machinery 186. What is the most common tool used to restrict access to a
computer system?
a. User logins b. Passwords b. Computer keys d. Access-control software
187. Hardware or software designed to guard against unauthorized
access to a computer
network is known as a(n): a. Hacker-proof program. b. Firewall. c. Hacker-resistant server. d.
Encryption safe wall.
188. The scrambling of code is known as: a. Encryption. b. a firewall.
c. Scrambling. d. Password proofing.
189. To prevent the loss of data during power failures, use a(n):
a. Encryption program. b. Surge protector. c. Firewall. d. UPS.
190. ------Is defined as any crime completed through the use of
computer technology.
a. Computer forensics b. Computer crime
c. Hacking d. Cracking
191. ------ refers to electronic trespassing or criminal hacking.
a. Cracking b. Jacking c. Spoofing d. Smarming
192. The first electronic computer was developed by
a. J.V. Attansoff b. Bill Gates c. Simur Cray d. Winton Serf
193. Snowbol is an/a--------- a. Operating system b. HLL
c. Software d. Search engine
194. Switching device of fifth generation computer is-------- a. Vacuum tubes b. Transistors
c. IC d. VLSI
195. ---------- computers operates essentially by counting a. Portable computer b. Hybrid computer
c. Analog computer d. Digital computer
School of Distance Education Fundamentals of Computers Page 18
196. ---------- computer is small general purpose micro computer, but
larger than portable
computer a. Hybrid b. Digital c. Desktop d. Laptop
197. Cathode Ray Tube is a form of.......
a. Keyboard b. Mouse c. Monitor d. Mother board 198. Trackball is a...........
a. Input device b. Output device
c. Programming language d. Software
199. ............. computer is a medium sized computer a. Micro b. Mainframe c. Super d. Mini
200. ........... computer are of large size
a. Micro b. Mainframe c. Super d. Mini 201. Note book, laptop,palm,hand-held computers are coming under
the category of.........
computer a. Digital computer b. Mainframe computer
c. Portable computer d. Hybrid computer
202. Light pen and joystick are............
a. Algorithm b. Input devices c. Output devices d. Portals
203. Touch Screen is............
a. Input device b. Output device c. Both a & b above d. None of these
204. .............printer is the cheapest in terms of price and operating
cost a. Inkjet b. Laser
c. Thermal d. Dot matrix
205. .......... printer is a non-impact printer and is quite in working
a. Inkjet b. Laser c. Thermal d. Dot matrix
206. .......... are high-end printers
a. Inkjet b. Laser c. Thermal d. Dot matrix
207. ......... are used for plotting graphs and design on papers
a. Trackball b. Joystick
c. Light pen d. Plotters 208. Daisy wheel, Drum, chain etc are the ............. a. Flow chart b.
Mouse
School of Distance Education
Downloaded DIWAKAR EDUCATION
HU Fundamentals of Computers Page 19
c. Key board d. Printers
209. ....are specific to users’ needs
a. System software b. Application software c. Assemblers d. Compilers
210. Joshy, Perfumes are examples of.............
a. Operating system b. Computer languages c. Computer viruses d. Web portals
211. Which of the following is/ are operating systems
a. Windows b. Unix
c. OS/2 d. All of these 212. “MAN” stands for
a. Maximum Area Network b. Minimum Area Network
c. Main Area Network d. Metropolitan Area Network 213. Which of the following is a network topology
a. LAN b. WAN
c. MAN d. BUS 214. Which of the following is a type of network
a. Ring b. Bus c. Star d. PAN
215. VOIP stands for..........
a. Voice over IP b. Video over IP c. Viruses over IP d. Virtual over IP
216. The first web browser is
a. Mosaic b. Netscape c. Internet explorer d. Collabra
217. LAN stands for...............
a. Limited Area Network b. Logical Area Network
c. Local Area Network d. Large Area Network 218. .......... are set of rules and procedures to control the data
transmission over the internet
a. IP address b. Domains c. Protocol d. Gateway
219. NOS stands for
a. Node operating system b. Non-open software c. Network Operating system d. Non-operating software
220. ............... are system software to facilitate editing of text and
data
a. MS Word b. Editors c. PowerPoint d. MS publisher
School of Distance Education
Fundamentals of Computers Page 20 221. Computers, combine both measuring and counting, are called :
a. Analog b. Digital c. Hybrid d. All of these
222. In world today, most of the computers are : a. Digital b. Hybrid c. Analog d. Complex
223. Physical structure of computer is called :
a. Software b. Hardware c. Human ware d. All of these
224. In which type of computer, data are represented as discrete signals.
a. Analog computer b. Digital computer
c. both d. Hybrid Computer 225. Which of the following is available in the form of a PC now?
a. Mainframe b. Microcomputer
c. Minicomputer d. Both (B) & (C)
226. PARAM is an example of: a. Super computer b. PC
c. Laptop d. PDA
School of Distance Education
Fundamentals of Computers Page 21
ANSWER KEY
1 a 55 b 109 d 163 c 217 c 2 b 56 c 110 a 164 b 218 c
3 b 57 c 111 b 165 d 219 c
4 a 58 b 112 b 166 d 220 b 5 a 59 a 113 b 167 b 221 c
6 c 60 d 114 c 168 a 222 a
7 a 61 a 115 c 169 b 223 b
8 b 62 b 116 c 170 d 224 b 9 a 63 b 117 c 171 d 225 b
10 b 64 c 118 b 172 c 226 a
11 a 65 c 119 b 173 b 12 b 66 a 120 a 174 c
13 a 67 c 121 a 175 b
14 b 68 d 122 c 176 b 15 b 69 d 123 b 177 b
16 a 70 d 124 a 178 b
17 a 71 c 125 a 179 a
18 a 72 b 126 a 180 b 19 a 73 b 127 b 181 a
20 b 74 a 128 a 182 c
21 a 75 b 129 a 183 c 22 d 76 d 130 a 184 b
23 b 77 c 131 b 185 a
24 a 78 a 132 c 186 b
25 a 79 d 133 b 187 b 26 d 80 b 134 b 188 a
27 a 81 d 135 d 189 d
28 a 82 b 136 b 190 b 29 b 83 a 137 b 191 a
30 c 84 a 138 c 192 a
31 c 85 b 139 c 193 b 32 b 86 d 140 a 194 d
33 a 87 d 141 b 195 d
34 d 88 b 142 c 196 c
35 a 89 c 143 a 197 c 36 b 90 b 144 c 198 a
37 b 91 c 145 a 199 d
38 d 92 a 146 d 200 b 39 a 93 d 147 c 201 c
40 b 94 a 148 d 202 b
41 b 95 a 149 b 203 c 42 c 96 a 150 d 204 d
43 d 97 c 151 a 205 a
44 c 98 a 152 c 206 b
45 b 99 a 153 b 207 d 46 b 100 a 154 a 208 d
47 d 101 b 155 b 209 b
48 b 102 c 156 b 210 c 49 c 103 c 157 b 211 d
50 d 104 d 158 d 212 d
51 b 105 c 159 c 213 d
52 a 106 d 160 d 214 d 53 c 107 a 161 b 215 a
54 a 108 c 162 d 216 a
Downloaded DIWAKAR EDUCATION
HU 1. Which function calculates the largest value in a set of numbers?
(1) Average
(2)Count
(3)Minimum (4)Maximum
(5)None of these
Ans: (4) 2. What do you use to create a chart?
(1)Pie Wizard
(2)Excel Wizard
(3)Data Wizard (4)Chart Wizard
(5)None of these
Ans: (4) 3. What displays the content of the active cell?
(1)Name box
(2)Row Headings (3)Formula bar
(4)Task pane
(5)None of these
Ans: (3) 4. By default, your documents print in _mode.
(1)Landscape
(2)Portrait (3)Page Setup
(4)Print View
(5)None of these
Ans: (2) 5. What is the best way to have a data and the slide number appear
on every slide ?
(1) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(2) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(3) chouse View, Header and Footer, click Slide tab, select the
desired options, click Apply to All
(4) choose File, Header and Footer, click Slide tab, select the
desired options, click Apply to All
(5) None of these
Ans: (2) MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 3
6.To move to the bottom of a document, press _.
(1) Insert key (2) Home key
(3) Ctrl key + End key
(4) End key (5) None of these
Ans: (3)
7.Which one of the following four words is odd?
(1)Application (2)Peripheral
(3)Programme
(4)Software
(5)None of these
Ans: (2)
8. If formation of computer, the hardwares..........are used.
(1) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Software and Network
(2) Monitor, Central Processing Unit (CPU), Keyboard, Mouse
Programme and Network (3) Monitor, Central Processing Unit (CPU), Keyboard, Mouse,
Printer and Modem
(4) Monitor, Central Processing Unit (CPU), Keyboard, Mouse,
Application and Network (5) None of these
Ans: (3)
9.In page preview mode- (1) You can see all pages of your document
(2)You can only see the page you are currently working
(3)You can only see pages that do not contain graphics (4)You can only see the title page of your document
(5)None of these
Ans: (1)
10.A CPU contains- (1) a card reader and a printing device
(2) an analytical engine and a control unit
(3) a control unit and an arithmetic logic unit (4) an arithmetic logic unit and a card reader
(5) None of these
Ans: (3)
11. Which of the following controls the process of interaction between the user and the
operating system?
(1) User interface (2) Language translator
(3) Platform
(4) Screen saver (5) None of these
Ans: (1)
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 4 12.You will work on which groupings, while formatting the text in
word?
(1) Table, paragraph and index (2) Paragraph, index and section
(3) Character, paragraph and section
(4) Index, character and table (5) None of these
Ans: (2)
13.When you want to move some text from one page to a different
page, the best method is- (1) drag and drop (2) cut and paste (3) delete and retype (4) find and
replace (5) None of
these Ans: (2)
14.The first computers were programmed using-
(1) assembly language
(2) machine language (3) source code
(4) object code
(5) spaghetti code
Downloaded DIWAKAR EDUCATION
HU Ans: (2)
15.How many are the margins on page?
(1) Two (header and footer)
(2) Four (Upper, lower, right, left) (3) Two (Landscape, portrait)
(4) Two (Upper and lower)
(5) None of these Ans: (2)
16. An is a combination of hardware and software that facilitates
the sharing of information
between computing devices. (1) network
(2) peripheral
(3) expansion board (4) digital device
(5) None of these
Ans: (1) 17. The settings are automatic and standard.
(1) icon
(2) default
(3) CPU (4) peripheral
(5) None of these
Ans: (2) MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 5
18. Coded entries which are used to gain access to a computer
system are called- (1) Entry codes
(2) Passwords
(3) Security commands (4) Code words
(5) None of these
Ans: (2) 19.To view information on the web you must have a-
(1) cable modem
(2) web browser
(3) Domain Name Server (4) hypertext viewer
(5) None of these
Ans: (2) 20.Which of the following commands is given to reboot the
computer?
1) Ctrl + Alt + Del 2) Ctrl + Shift + ?
3) Ctrl + Shift + Del
4) Ctrl +Alt + shift
5) Ctrl + Alt + Tab Ans: (1)
21. By default, your documents print in _ mode.
1) Landscape 2) Portrait
3) Page Setup
4) Print View
5) None of these Ans: (2)
22. To find and load a file that has been saved _.
1) select the Close command
2) select the New command
3) select the Save command
4) select the Open command
5) None of these Ans: (4)
23.Which function calculates the largest value in a set of numbers?
1) Average 2) Count
3) Minimum
4) Maximum
5) None of these Ans: (4)
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 6 24. Which of the following statements is true ?
1) Minicomputer works faster than Microcomputer
2) Microcomputer works faster than Minicomputer 3) Speed of both the computers is the same
4) The speeds of both these computers cannot be compared with the
speed of advanced
computer 5) None of these
Ans: (1)
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 7
UNIT 2
1. Selection of command-
(A) Opens the copy of the document in preview (B) Prints the copy of displayed document
(C) Brings change in expansion of displayed document
(D) Saves the copy of displayed document (E) None of these
Ans: (C)
2. You organize files by storing them in- (A) archives
(B) folders
(C) indexes
(D) lists (E) None of these
Ans: (B)
3. How many different documents can you have open at any one time ?
(A) No more than three
(B) Only one (C) As many as your computer memory will hold
(D) No more than you taskbar can display
(E) None of these
Ans: (C) 4. What type of resource is most likely to be a shared common
resource in a computer
network? (A) Printers
(B) Speakers
(C) Floppy disk drives
(D) Keyboards (E) None of these
Ans: (A)
5. Directory in directory is called-
Downloaded DIWAKAR EDUCATION
HU (A) Mini directory
(B) Junior directory
(C) Part directory
(D) Sub-directory (E) None of these
Ans: (D)
6. Such a pre-made document, which has coordinating font, layout and background, is-
(A) Guide
(B) Model
(C) Ruler (D) Template
(E) None of these Ans: (D)
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 8
7. In order to create columnar data in Word you need to-
(A) Tab consecutively until your cursor reaches the desired place (B) Set tabs or use the Table menu
(C) You need to use Excel
(D) Press the space bar until your cursor reaches the desired place
(E) None of these Ans: (E)
8. Saving is a process-
(A) To copy the document from memory to storage medium (B) To bring change in present status of the document
(C) To change the face or entire form
(D) To develop the document by recording the text with the use of
keyboard (E) None of these
Ans: (A)
9. To insert a word into the middle of a sentence- (A) move the cursor to the desired location in the sentence and type
the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type the new
word
(C) move the cursor to the beginning of the sentence and start
typing (D) retype the whole sentence
(E) None of these
Ans: (A) 10. A(n) .............. is a combination of hardware and software that
facilitates the sharing of
information between computing devices. (A) network
(B) peripheral
(C) expansion board
(D) digital device (E) None of these
Ans: (A)
11. In word you can force a page break- (A) By positioning your cursor at the appropriate place and pressing
the F1 key
(B) By using the Insert/Section Break
(C) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
(D) By changing the font size of your document
(E) None of these
Ans: (C)
12. Junk e-mail is also called-
(A) spam
(B) spoof (C) sniffer script
(D) spool
(E) None of these Ans: (A)
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 9
13. Hackers- (A) all have the same motive
(B) break into other people's computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers
(E) None of these Ans: (B)
14. What type of computers are client computers (most of the time) in
a client-server system?
(A) Mainframe (B) Mini-computer
(C) Microcomputer
(D) PDA (E) None of these
Ans: (C)
15. A computer cannot 'boot' if it does not have the-
(A) Compiler (B) Loader
(C) Operating System
(D) Assembler (E) None of these
Ans (C)
16. The amount of vertical space between lines of text in a document is called-
(A) double-space
(B) line spacing
(C) single space (D) vertical spacing
(E) None of these
Ans: (B) 17. Example of non-numeric data is-
(A) Employee address
(B) Examination score (C) Bank balance
(D) All of these
(E) None of these
Ans: (A) 18. What is embedded system?
(A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer (C) The computer which is the part of a big computer
(D) The computer and software system that control the machine
(E) None of these
Ans: (D) MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 10
19. First page of Website is termed as- (A) Homepage
Downloaded DIWAKAR EDUCATION
HU (B) Index
(C) JAVA script
(D) Bookmark
(E) None of these Ans: (A)
20. ..................... is the appearance of typed characters.
(A) Size (B) Format
(C) Point
(D) Colour
(E) None of these Ans: (B)
21. When a file is saved for the first time-
(A) a copy is automatically printed (B) it must be given a name to identify it
(C) it does not need a name
(D) it only needs a name if it is not going to be printed (E) None of these
Ans: (B)
22. Office LANS, which are scattered geographically on large
scale, can be connected by the use of corporate- (A) CAN
(B) LAN
(C) DAN (D)WAN
(E) TAN
Ans: (D)
23. Where are data and programme stored when the processor uses them?
(A) Main memory
(B) Secondary memory (C) Disk memory
(D) Programme memory
(E) None of these Ans: (A)
24. ............... represents raw facts, where- as ................. is data
made meaningful.
(A) Information, reporting (B) Data, information
(C) Information, bits
(D) Records, bytes (E) Bits, bytes
Ans: (B)
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 11
25. Which keystroke will take you at the beginning or the end of a
long document?
(A) Ctrl + PageUp and Ctrl + PageDown (B) Shift + Home and Shift + End
(C) Ctrl + Home and Ctrl + End
(D) The only way is by using the right scroll bar (E) None of these
Ans: (C)
26. What characteristic of read-only memory (ROM) makes it
useful? (A) ROM information can be easily updated.
(B) Data in ROM is nonvolatile, that is, it remains there even
without electrical power.
(C) ROM provides very large amounts of inexpensive data storage.
(D) ROM chips are easily swapped between different brands of
computers.
(E) None of these Ans:(B)
27. In page preview mode-
(A) You c a n s e e a l l p a g e s o f your document (B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
(E) None of these Ans: (A)
28. If the file saved earlier is edited, then-
(A) It is essential to save the file again to store the change (B) The change will automatically be saved in the file
(C) If the length is more than a page, the file will be needed to be
saved (D) The name will be needed to be changed
(E) None of these
Ans: (A)
29. When creating a word-processed document, this step involves the user changing how words on the page
appear, both on the screen and in printed form-
(A) Editing text (B) Inserting tables and indexes
(C) Formatting text
(D) Proofing documents
(E) None of these Ans: (C)
30. Aligning of text in column is-
(A) Justified (B) Right
(C) Centre
(D) Left (E) None of these
Ans: (A)
1. Which of the following is a part of the Central Processing Unit? a. Printer
b. Key board c. Mouse
d. Arithmetic & Logic unit e. None of these
2. CAD stands for
a. Computer aided design
b. Computer algorithm for design c. Computer application in design d. All of the above
e. None of these
3. Which of the following printer cannot print graphics? a. Ink-jet
b. Daisy Wheel c. Laser
d. Dot-matrix
e. None of these 4. A program written in machine language is called?
a. Assembler
b. Object
Downloaded DIWAKAR EDUCATION
HU c. Computer
d. Machine
e. None of these
5. The father of Modern Computer is a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel d. Blaise Pascal
e. None of these
6. The Word FTP stands for
a. File Translate Protocol b. File Transit Protocol
c. File Transfer protocol
d. file typing protocol e. None of these
7. The lowest form of Computer language is called
a. BASIC b. FORTRAN
c. Machine Language
d. COBOL
e. None of these MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 22
8. Best Quality graphics is produced by a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter e. None of these
9. Memory which forgets everything when you switch off the
power is known as a. Corrupted
b. Volatile
c. Non-Volatile d. Non-Corrupted
e.None of these
10.The linking of computers with a communication system is called
a. Networking b. Pairing
c. Interlocking
d. Assembling e. Sharing
11.The 16 bit Microprocessor means that it has
a. 16 address lines b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these 12. Data going into the computer is called
a. Output
b. algorithm c. Input
d. Calculations
e. flow chart
13. Which of the following refers to a small, single-site network? a. LAN
b. DSL
c. RAM
d. USB
e. CPU
14. Microsoft Office is
a. Shareware b.Public domain software
c. Open-sourse software
d. A vertical market application e. An application suite
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 23
15. How many options does a BINARY choice offer a. None of these
b. One
c. Two d. it depends on the amount of memory on the computer
e. It depends on the speed of the computer‘s processor
16. A collection of program that controls how your computer system runs and
processes information is called
a. Operating System
b. Computer c. Office
d. Compiler
e. Interpreter 17. Computer connected to a LAN (Local Area Network) can
a. run faster
b. go on line
c. share information and /or share peripheral equipment d. E-mail
e. None of these
18. Information travels between components on the mother board through
a. Flash memory
b. CMOS c. Bays
d. Buses
e. Peripherals
19. How are data organized in a spreadsheet? a. Lines & spaces
b. Layers & Planes
c. Height & Width d. Rows & Columns
e. None
20. The blinking symbol on the computer screen is called the a. mouse
b. logo
c. hand
d. palm e. cursor
21. A fault in a computer program which prevents it from working
correctly is known as
a.B oot
b Bug
c Biff d. Strap e. None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 24
Downloaded DIWAKAR EDUCATION
HU 22. A self replicating program, similar to a virus which was taken
from a 1970s
science fiction novel by John Bruner entitled the Shockwave Rider
is a. Bug
b. Vice
c. Lice d. Worm
e. None of these
23. A states. is a bi-stable electronic circuit that has
a. Multivibrator b. Flip-flop
c. Logic gates
d. laten e. None of these
24. Unwanted repetitious messages, such as unsolicited bulk e-mail
is known as
a. Spam
b. Trash
c. Calibri d. Courier
e. None of these
25.DOS stands for a. Disk Operating System
b. Disk operating session
c. Digital Operating System
d. Digital Open system e. None of these
26. Who is the chief of Miocrosoft
a. Babbage b. Bill Gates
c. Bill Clinton d. Bush
e. None of these 27. Which of the following are input devices.
a. Keyboard b. Mouse
c. Card reader d. Scanner
e. All of these 28. Examples of output devices are
a. Screen
b. Printer c. Speaker
d. All of these
e. None of these MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 25
29. Which of the following is also known as brain of computer
a. Control unit b. Central Processing unit
c. Arithmetic and language unit
d. Monitor e. None of these
30. IBM stands for
a. Internal Business Management
b. International Business Management c. International Business Machines
d. Internal Business Machines e. None of these
31. translates and executes program at run time line by line
a. Compiler
b. Interpreter c. Linker
d. Loader
e. None of these 32. is an OOP principle
a. Structured programming
b. Procedural programming c. Inheritance
d. Linking
e. None of these
33.COBOL is widely used in application s a. Commercial
b. Scientific
c. Space d. Mathematical
e. None of these
34. RAM stands for a. Random origin money
b. Random only memory
c. Read only memory
d. Random access memory e. None of these
35. 1 Byte = ?
a. 8 bits b. 4 bits
c. 2 bits
d. 9 bits
e. None of the above MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 26
36. SMPS stands for a. Switched mode Power Supply
b. Start mode power supply
c. Store mode power supply d. Single mode power supply
e. None of these
37. The device used to carry digital data on analog lines is called as
a. Modem b. Multiplexer
c. Modulator
d. Demodulator e. None of these
38. VDU is also called
a. Screen b. Monitor
c. Both 1 & 2
d. printer
e. None of these 39. BIOS stands for
a. Basic Input Output system
b. Binary Input output system c. Basic Input Off system
d. all the above
e. None of these
40. Father of ‗C‘ programming language a. Dennis Ritchie
b. Prof Jhon Kemeny c. Thomas Kurtz
d. Bill Gates
Downloaded DIWAKAR EDUCATION
HU e. None of these
ANSWERS
---------------------------------------------------------------------------------
--------------------------- 1. (d) 2. (a) 3. (b) 4. (a) 5. (a) 6. (c) 7. (c) 8. (d)
9. (b) 10. (a)11. (c) 12. (c) 13. (a) 14. (e) 15. (c)
16. (a) 17. (c) 18. (c) 19. (d) 20. (e)21. (b) 22. (d) 23. (b) 24. (a) 25. (a) 26. (b) 27. (e) 28. (d) 29. (b)
30. (c) 31. (b) 32. (c) 33. (a) 34. (d) 35. (a)
36. (a) 37. (a) 38. (c) 39. (a) 40. (a)
1. Which command divides the surface of the blank disk into
sectors and assign a unique address to each one
1) Ver
2) Format
3) Fat 4) Check disk
5) None of these
2. If you need to duplicate the entire disk, which command will you use?
1) Copy
2) Disk copy
3) Chkdsk 4) Format
5) None of these
3. A............. sometimes called a boot sector virus, executes when a computer boots up
because it resides in the boot sector of a floppy disk or the master
boot record of a hard disk 1) System virus
2) Trojan horse virus
3) File virus
4) Macro virus 5) None of these
4. A result of a computer virus cannot lead to...
1) Disk Crash 2) Mother Board Crash
3) Corruption o f program
4) Deletion of files 5) None of these
5. Every computer connected to an intranet or extranet must have a
distinct...
1) Firewall 2) Proxy server
3) IP address
4) Domain name 5) None of these
6. Programming language built into user programs such as Word
and Excel are known as...
1) 4GLs 2) Macro languages
3) object-oriented languages
4) Visual programming languages
5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 36
7. Firewalls are used to protect against... 1) Unauthorized Attacks
2) Virus Attacks
3) Data Driven Attacks 4) Fire Attacks
5) None of these
8. Which of the following extensions suggest that the file is a backup
copy? 1) Bak
2) Bas
3) Com 4) Txt
5) None of these
9. Computer programs are written in a high - level programming language; however, the
human readable version of a program is called...
1) Cache
2) Instruction set 3) Source code
4) Word size
5) None of these 10. The software tools that enable a user to interact with a computer
for specific purposes are
known as...
1) Hardware 2) Networked Software
3) Shareware
4) Applications 5) None of these
11...............processing is used when a large mail-order company
accumulates orders and processes them together in one large set
1) Batch
2) Online
3) Real-time 4) Group
5) None of these
12. When a file contains instructions that can be carried out by the computer, it is often
called a (n) ... file
1) Data 2) Information
3) Executable
4) Application
5) None of these 13. A complier translates a program written in a high - level language
into...
1) Machine language 2) An algorithm 3) A debugged program 4) Java 5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 37
14. A set of step - by - step procedures for accomplishing a task is known as a (n)...
1) Algorithm
2) Hardware program
Downloaded DIWAKAR EDUCATION
HU 3) Software bug
4) Firmware program
5) None of these
15. A complete electronic circuit with transistors and other electronic components on a small
silicon chip is called a (n)...
1) Workstation 2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these 16. A saved document is referred to as a...
1) File
2) Word 3) Folder
4) Project
5) None of these 17. What is output?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user 4) What the processor gives to the user
5) None of these
18. When you turn on the computer, the boot routine will perform this test...
1) RAM test
2) Disk drive test
3) Memory test 4) Power - on self-test
5) None of these
19. Which of the following storage media provides sequential access only?
1) Floppy disk
2) Magnetic disk 3) Magnetic tape
4) Optical disk
5) None of these
20. In word processing, an efficient way to move the 3rd paragraph to place it after
the 5th paragraph is...
1) Copy and paste 2) Copy, cut and paste 3) Cut, copy and paste 4) Cut and paste
5) None of these
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 38
21. Hardware includes..........
1) All devices used to input data into a computer
2) Sets of instructions that a computer runs or executes 3) The computer and all the devices connected to it that are used to
input and output data
4) All devices involved in processing information including the central processing unit, memory
and storage
5) None of these
22. The quickest and easiest way in Word, to locate a particular word or phrase in a document
is to use the ... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these 23. The term 'user interface' refers to............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands 3) The means by which the user interacts with the peripheral devices
on the computer
4) The monitor that is available for the computer
5) None of these 24. For creating a document, you use... command at File Menu.
1) Open
2) Close 3) New
4) Save
5) None of these 25. The.............. Becomes different shapes depending on the task you
are performing
1) Active tab
2) Insertion point 3) Mouse pointer
4) Ribbon
5) None of these 26. Specilizd programs that assist users in locating information on the
Web are called....
1) Information engines
2) Search engines 3) Web browsers
4) Resource locators
5) None of these 27. The background of any Word document...
1) Is always white colour
2) Is the colour you presect under the Options menu 3) Is always the same for the entire document
4) Can have any colour you choose 5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 39 28.Correcting errors in a program is referred to as ...
1) Debugging
2) Bugging 3) Rectifying
4) Modifying
5) None of these 29.Any letter, number, or symbol found on the keyboard that you
could type into the computer
..........
1) Output 2) Character
3) Type
4) Print 5) Font
30.A symbol or question on the screen that prompts you to take action
and tell the computer
what to do next ... 1) Scanner
2) Questionnaire
3) Prompt and dialog box
Downloaded DIWAKAR EDUCATION
HU 4) Information seeker
5) None of these
31.Commands at the top of a screen such as FILE-EDIT-FONT-
TOOLS to operate and change things within programs ...
1) Menu bar
2) Tool bar 3) User friendly
4) Word processor
5) None of these
32.The primary device that a computer uses to store information ... 1) Monitor
2) Memory
3) Disk 4) Hard drive
5) None of these
33.A file extension is separated from the main file name with a(n)..., but no spaces
1) Question nark
2) Exclamation mark
3) Underscore 4) Period
5) None of these
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 40
34.Application software is designed to accomplish ...
1) Real -world tasks
2) computer-centric tasks 3) Gaming tasks
4) Operating system tasks
5) None of these 35.A ... is a device that not only provides surge protection, but also
furnishes your computer
with battery backup power during a power outage 1) Surge strip
2) USB
3) UPS
4) Battery strip 5) None of these
36.The term ............. designates equipment that might be added to a
computer system to enhance, its functionality
1) Digital device
2) System add-on 3) Disk pack
4) Peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making
multiple copies of it.
1) Network piracy 2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these 38.When installing ..., the user must copy and usually decompress
program files from a CDROM
or other medium to the hard disk
1) Programming software
2) System hardware
3) Applications hardware
4) Applications software 5) None of these
39.Which one of the following would be considered as a way that a
computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transactions 4) Running antivirus programs
5) None of these
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 41
40.Programs such as Mozilla Firefox that serve as navigable windows
into the Web are called ..........
1) Hypertext
2) Networks
3) Internet 4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible while mainframe
uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible while mainframe uses
its power to execute few programs as fast as possible
5) None of these 42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file 4) Store Document file
5) None of these
43.Which is the latest version of MS Office ? 1) Office XP
2) Windows XP
3) Office 2007 4) Office 2010
5) None of these
44.Which device cannot be shared in network ?
1) Floppy 2) Keyword
3) Computer
4) Printer 5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data 3) Sort & filter
4) All of above
5) None of these
Downloaded DIWAKAR EDUCATION
HU 46.Which port doesn't exist in computer ?
1) USB 2) Parallel
3) Com1 / Com2 4) RAW 5) None of these
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 42
47.What is the name of excel files ?
1) Workbook 2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these 48.Workgroup means
1) Computers in network
2) Individual user 3) Individual computer
4) All of the above
5) None of these 49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both 4) Synonym viewer
5) None of these
50. Which command allows you to reduce fragments of file and optimize the performance of
disk ?
1) Scandisk
2) Diskcomp 3) Chkdsak
4) Defrag
5) None of these Answers
No Ans No Ans No Ans No Ans No Ans
1 2 11 1 21 4 31 1 41 3 2 2 12 3 22 2 32 4 42 1
3 5 13 1 23 1 33 5 43 4
4 2 14 1 24 3 34 4 44 2
5 2 15 4 25 3 35 3 45 4 6 4 16 1 26 2 36 4 46 4
7 1 17 4 27 4 37 3 47 1
8 1 18 2 28 1 38 1 48 1 9 3 19 2 29 2 39 2 49 2
10 4 20 4 30 3 40 4 50 4
1. Who is called as ‗‗Father of Computers‘‘? (A) Charles Babage
(B) Blaise Pascal
(C) Hollirth (D) All of these
(E) None of these
2. The first Digital Computer introduced, was named as :
(A) Univac (B) Mark-I
(C) Eniac
(D) All of these
(E) None of these
3. How many generations, computer can be classified?
(A) 4
(B) 5 (C) 3
(D) 6
(E) None of these 4. First Generation Computers contain :
(A) Transistors
(B) Vacuum Tubes
(C) LSI (D) VLSI
(E) None of these
5. II Generation Computers are made of : (A) Vacuum Tubes
(B) Transistors
(C) LSI (D) VLSI
(E) None of these
6. IV Generation Computers contain :
(A) LSI (B) Vacuum Tubes
(C) All Technology
(D) Transistors (E) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 44
7. Vth Generation Computers are based on: (A) Artificial Intelligence
(B) Programming Intelligence
(C) System Knowledge (D) All of these
(E) None of these
8. Computers, combine both measuring and counting, are called : (A) Analog
(B) Digital
(C) Hybrid
(D) All of these (E) None of these
9. In world today, most of the computers are :
(A) Digital (B) Hybrid
(C) Analog
(D) Complex (E) None of these
10. In any computer installation, how many elements consists.
(A) 2
(B) 4 (C) 3
(D) 1
(E) None of these 11. Physical structure of computer is called :
(A) Software
(B) Hardware
(C) Human ware (D) All of these
(E) None of these
12. A computer can perform, which of the following tasks?
Downloaded DIWAKAR EDUCATION
HU (A) Computation
(B) Communication
(C) Processing
(D) All of these (E) None of these
13. CPU stands for :
(A) Computer Processing Unit (B) Central Processing Unit
(C) Both (A) & (B)
(D) Communication Processing Unit
(E) None of these MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 45
14. In which type of computer, data are represented as discrete signals.
(A) Analog computer
(B) Digital computer (C) both
(D) Digilog Computer
(E) None of these
15. Which of the following is available in the form of a PC now? (A) Mainframe
(B) Microcomputer
(C) Minicomputer (D) Both (B) & (C)
(E) None of these
16. PARAM is an example of: (A) Super computer
(B) PC (C) Laptop
(D) PDA
(E) None of these 17. Who developed the ‗analytical engine‘?
(A) Jacquard loom
(B) Charles Babbage (C) Shannon
(D) IBM
(E) None of these
18. ENIAC stands for : (A) Electrical Numerical Integrator and Calculator
(B) Electronic Numerical Integrator and Computer
(C) Electronic Numerical Integrator and Calculator (D) Electronic Number Integrator and Calculator
(E) None of these
19. First Generation of computer was based on which technology? (A) Transistor
(B) Vacuum Tube
(C) LSI
(D) VLSI (E) None of these
20. Microprocessor was introduced in which generation of
computer? (A) Second Generation
(B) Fourth Generation
(C) Both (A) & (B)
(D) Third Generation (E) All of the above
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 46
21. GUI stands for :
(A) Graphical User Interface
(B) Graph Use Interface
(C) Graphical Universal Interface (D) None of these 22. The time taken by CPU to retrieve and interpret the instruction to
be executed is called
as: (A) Instruction cycle
(B) Fetch cycle
(C) Both (A) & (B)
(D) All of these (E) None of these
23. Which of the following is responsible for all types of
calculations? (A) ALU
(B) Control Unit
(C) Registers (D) BUS
(E) None of these
24. Internal memory in a CPU is nothing but :
(A) A set of registers (B) A set of ALU
(C) Microprocessor
(D) BUS (E) None of these
25. Which of the following is permanent memory?
(A) SRAM
(B) DRAM (C) ROM (D) All of these
(E) None of these
Answers No Ans No Ans No Ans
1 A 11 B 21 A
2 B 12 D 22 A 3 B 13 B 23 A
4 B 14 B 24 A
5 B 15 B 25 C
6 A 16 A 7 A 17 B
8 C 18 B
9 A 19 B 10 C 20 B
1. In a survey of more than 500 companies and government agencies,
percent detected
computer security breaches. A. 20
B. 75
C. 85 D. 99
Answer: C
2. The survey showed that these businesses lost more than due to
security breaches. A. $100,000 each
B. $377 million
C. five employees each
Downloaded DIWAKAR EDUCATION
HU D. $1 million
Answer: B
3. The typical computer criminal is a(n):
A. young hacker. B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker. Answer: B
4. The majority of computer crimes are committed by:
A. hackers.
B. insiders. C. overseas criminals.
D. young teenage computer geniuses.
Answer: B 5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft. C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer
6. Collecting personal information and effectively posing as another individual is known as the crime
of:
A. spooling. B. identity theft.
C. spoofing.
D. hacking.
Answer: B MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 48
7. Malicious software is known as: A. badware.
B. malware.
C. maliciousware. D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously
allowing destructive acts is a: A. worm.
B. Trojan horse.
C. virus. D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to disk is
known as a:
A. Trojan horse.
B. virus. C. time bomb.
D. time-related bomb sequence.
Answer: B 10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse. D. Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space. B. time.
C. CD drive space.
D. CD-RW.
Answer: A 13. When a logic bomb is activated by a time-related event, it is
known as a:
A. time-related bomb sequence. B. virus.
C. time bomb.
D. Trojan horse. Answer: C
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 49
14. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
A. time-related bomb sequence.
B. virus. C. time bomb.
D. Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to
someone through the Internet?
A. A virus B. Spybot
C. Logic bomb
D. Security patch Answer: B
16. Standardization of Microsoft programs and the Windows
operating system has made the spread of
viruses: A. more complicated.
B. more difficult.
C. easier. D. slower.
Answer: C
17. HTML viruses infect: A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No Answer: B
18. Software programs that close potential security breaches in an
operating system are known as: A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches. Answer: D
19. When customers of a Web site are unable to access it due to a
bombardment of fake traffic, it is
Downloaded DIWAKAR EDUCATION
HU known as:
A. a virus.
B. a Trojan horse.
C. cracking. D. a denial of service attack.
Answer: D
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 50
20. is the measurement of things such as fingerprints and retinal
scans used for security
access. A. Biometrics B. Biomeasurement
C. Computer security D. Smart weapon machinery
Answer: A 21. What is the most common tool used to restrict access to a
computer system?
A. User logins B. Passwords
C. Computer keys
D. Access-control software
Answer: B 22. The most common passwords in the U.S. or Britain include all
EXCEPT:
A. love. B. Fred.
C. God.
D. 123.
Answer: D 23. Hardware or software designed to guard against unauthorized
access to a computer network is
known as a(n): A. hacker-proof program.
B. firewall.
C. hacker-resistant server. D. encryption safe wall.
Answer: B
24. The scrambling of code is known as:
A. encryption. B. a firewall.
C. scrambling.
D. password proofing. Answer: A
25. If you want to secure a message, use a(n):
A. cryptology source. B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2 Cryptography 26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector. C. firewall.
D. UPS.
Answer: D
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 51
27. A(n) can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B 28. All of these are suggestions for safe computing EXCEPT:
A. don‘t borrow disks from other people.
B. open all e-mail messages but open them slowly. C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B
29. Freeware encrypts data. A. encryption
B. firewall software
C. PGP D. private and public keys
Answer: C
30. is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking D. Cracking
Answer: B
31. Most computer systems rely solely on for authentication. A. logins
B. passwords
C. encryption
D. lock and key Answer: B
32. Creating strong computer security to prevent computer crime
usually simultaneously helps protect :
A. privacy rights.
B. personal ethics. C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A
33. Over was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars C. 1 billion dollars
D. 100 billion dollars
Answer: D MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 52
34. What is a complex system that takes on nearly complete
responsibility for a task eliminating the need for people, verification, or decision-making?
A. Autonomous system
B. Missile defense auto-system C. Smart weapon
D. Independent system
Answer: D
35. Security procedures can: A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
Downloaded DIWAKAR EDUCATION
HU D. are inaccessible for the average home user.
Answer: B
Fill in the Blank:
36. The field of computer uses special software to scan hard drives of potential criminal
suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
37. Computer often goes unreported because businesses fear
negative publicity.
Answer: crime 38. connections are the most frequent point of attack for Internet
commerce.
Answer: Internet 39. is the most common form of computer crime.
Answer: Theft
40. A survey by eMarketer.com found that are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft
41. Theft of computers is most common for PDAs and computers.
Answer: notebook 42. When you use a disk in several different computers within the
same day, you are taking the
chance of contracting a(n) . Answer: virus Reference: Viruses Difficulty: Easy
43. A(n) attaches itself to documents that contain embedded
programs that automate
tasks. Answer: macro virus
44. Both viruses and use computer hosts to replicate.
Answer: worms 45. programs search for and eliminate viruses.Answer: Antivirus
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 53 46. A security patch is a software program that closes possible
security breaches in the operating
system. The cost to the consumer is .
Answer: nothing or free 47. was once the word used for malicious computer wizardry.
Answer: Hackers or hacking
48. refers to electronic trespassing or criminal hacking. Answer: Cracking
49. DoS stands for .
Answer: denial of service 50. DDoS stands for .
Answer: distributed denial of service
51. hijack Web pages and redirect users to other sites.
Answer: Webjackers 52. software monitors and records computer transactions.
Answer: Audit-control
53. Each individual who uses a public key cryptosystem has keys. Answer: two Reference: How It Works: 10.2 Cryptography
54. PGP stands for .
Answer: Pretty Good Privacy
55. Mostoperating systems, including Windows XP, assign each user a unique .
Answer: user identifier or user ID
56. It should now be common knowledge that users should not open
from e-mail recipients that
the user does notknow.
Answer: attachments
1. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by
line 1) Compiler
2) Interpreter
3) Linker 4) Loader
5) None
2. _ _ _ _ _ _ _ _ is an OOP principle 1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking 5) None
3. COBOL is widely used in _ _ _ _ _ _ _ applications
1) Commercial 2) Scientific
3) Space
4) Mathematical
5) None 4. RAM stands for
1) Random origin money
2) Random only memory 3) Read only memory
4) Random access memory
5) None 5. 1 Byte = ?
1) 8 bits
2) 4 bits
3) 2 bits 4) 9 bits
5) None
6. SMPS stands for 1) Switched mode power supply
2) Start mode power supply
3) Store mode power supply 4) Single mode power supply
5) None
7. The device used to carry digital data on analog lines is called as
1) Modem 2) Multiplexer
3) Modulator
4) Demodulator 5) None MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 55
8. VDU is also called
1) Screen 2) Monitor
3) Both 1 & 2
4) printer
Downloaded DIWAKAR EDUCATION
HU 5) None
9. BIOS stands for
1) Basic Input Output system
2) Binary Input output system 3) Basic Input Off system
4) all the above
5) None 10. Father of ‘C’ programming language
1) Dennis Ritchie
2) Prof Jhon Kemeny
3) Thomas Kurtz 4) Bill Gates 5) None
11. The 16 bit Microprocessor means that it has
1) 16 address lines 2) 16 Buses
3) 16 Data lines
4) 16 routes 5) None
12. Data going into the computer is called
1) Output
2) algorithm 3) Input
4) Calculations
5) flow chart 13. Which of the following refers to a small, single-site network?
1) LAN
2) DSL
3) RAM 4) USB
5) CPU
14. Microsoft Office is 1) Shareware
2)Public domain software
3) Open-source software 4) A vertical market application
5) An application suite
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 56 15. How many options does a BINARY choice offer
1) None
2) One 3) Two
4) it depends on the amount of memory on the computer
5) It depends on the speed of the computer‘s processor 16. A collection of program that controls how your computer
system runs and processes
information is called
1) Operating System 2) Computer 3) Office 4) Compiler 5) Interpreter
17. Computer connected to a LAN (Local Area Network) can
1) run faster 2) go on line 3) share information and /or share peripheral equipment
4) E-mail 5) None
18. Information travels between components on the mother board
through 1) Flash memory 2) CMOS 3) Bays 4) Buses 5) Peripherals
19. How are data organized in a spreadsheet?
1) Lines & spaces 2) Layers & Planes 3) Height & Width
4) Rows & Columns 5) None
20. The blinking symbol on the computer screen is called the
1) mouse 2) logo 3) hand 4) palm 5) cursor
Ans:- 01.2 06.1 11.3 16.1
02.3 07.1 12.3 17.3
03.1 08.3 13.1 18.3 04.4 09.1 14.5 19.4
05.1 10.1 15.3 20.5
1. When you are selecting a mouse for a particular computer system,
what is the most important
consideration? (1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with (4) The number of buttons the mouse has
(5) None of these
Ans: (3)
2. How is power supplied to a low-power USB device? (1) Through a power cable
(2) From an external power supply
(3) Directly from the computers power supply (4) Through the USB cable
(5) None of these
Ans: (4)
3. All of the following are basic principles of net works, except — (1) each computer must have a network card
(2) there must be communications media connecting the network
hardware devices (3) there must be at least one connecting device
(4) each computer must have software that supports the movement of
information (5) None of these
Ans: (2)
4. The………….data mining technique derives rules from real-world
case examples. (1) Rule discover
(2) Signal processing
(3) Neural nets (4) Case-based reasoning
(5) None of these
Ans: (3) 5. …………….are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts (4) ASPs
(5) None of these
Ans: (1) MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 58
UNIT 11
1. Computer uses the .......... number system to store data and perform calculations.
(1) binary
(2) octal
Downloaded DIWAKAR EDUCATION
HU (3) decimal
(4) hexadecimal
(5) None of these
ANSWER: 1 2. A disk's content that is recorded at the time of manufacture and
that cannot be changed or erased
by the user is- (1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only (5) Read-only
ANSWER: 5
3. Which of the following can be used to select the entire document?
(1) CTRL + A
(2) ALT + F5 (3) SHIFT + A
(4) CTRL + K
(5) CTRL + H
ANSWER: 1 4. .......... are attempts by individuals to obtain confidential
information from you by falsifying their
identity. (1) Phishing
(2) Computer viruses
(3) Spyware scams
(4) Viruses (5) None of the above
ANSWER: 1
5. Port number, port description, and number of ports ordered are examples of
(1) control
(2) output (3) processing
(4) feedback
(5) input
ANSWER: 5 MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 59
6. A Web site's main page is called its- (1) Home Page
(2) Browser Page
(3) Search Page (4) Bookmark
(5) None of these
ANSWER: 1
7. The simultaneous processing of two or more programs by multiple processors is-
(1) multiprogramming
(2) multitasking (3) time-sharing
(4) multiprocessing (5) None of these
ANSWER: 1
8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
ANSWER: 4 9. To instruct Word to fit the width of a column to the contents of a
table automatically, click the
..... button and then point to AutoFit Contents. (1) Fit to Form
(2) Format
(3) Autosize
(4) Contents (5) AutoFit
ANSWER: 5
10. Why is it unethical to share copyrighted files with your friends? (1) It is not unethical, because it is legal.
(2) It is unethical because the files are being given for free.
(3) Sharing copyrighted files without permission breaks copyright laws.
(4) It is not unethical because the files are being given for free.
(5) It is not unethical-anyone can access a computer
ANSWER: 3 11. Reusable optical storage will typically have the acronym-
(1) CD
(2) DVD (3) ROM
(4) RW
(5) ROS
ANSWER: 4 MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 60
12. The most common type of storage devices are- (1) persistent
(2) optical
(3) magnetic (4) flash
(5) steel
ANSWER: 2
13. A device that connects to a network without the use of cables is said to be-
(1) distributed
(2) free (3) centralized
(4) open source
(5) None of these ANSWER:5
14. A person who used his or her expertise to gain access to other
people's computers to get
information illegally or do damage is a- (1) hacker
(2) analyst
(3) instant messenger (4) programmer
(5) spammer
ANSWER: 1
15. To access properties of an object, the mouse technique to use is- (1) dragging
(2) dropping
(3) right-clicking
Downloaded DIWAKAR EDUCATION
HU (4) shift-clicking
(5) None of these
ANSWER:3
16. To change selected text to all capital letters, click the change case button, then click- (1)
UPPERCASE
(2) UPPER ALL (3) CAPS LOCK
(4) Lock Upper
(5) Large Size
ANSWER: 1 17. The basic unit of a worksheet into which you enter data in Excel
is called a-
(1) tab (2) cell
(3) box
(4) range (5) None of these
ANSWER: 2
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 61 18. You can keep your personal files / folders in-
(1) My folder
(2) My Documents (3) My Files
(4) My Text
(5) None of these
ANSWER: 2 19. In Word you can force a page break-
(1) By positioning your cursor at the appropriate place and pressing
the F1 key (2) By positioning your cursor at the appropriate place and pressing
Ctrl + Enter
(3) By using the Insert/Section Break (4) By changing the font size of your document
(5) None of these
ANSWER: 2
20. A DVD is an example of a(n)- (1) hard disk
(2) optical disc
(3) output device (4) solid-state storage device
(5) None of these
ANSWER:2 21. The default view in Excel is ......... view.
(1) Work
(2) Auto
(3) Normal (4) Roman
(5) None of these
ANSWER:3 22. The process of transferring files from a computer on the Internet
to your computer is called
(1) downloading
(2) uploading (3) FTP
(4) JPEG
(5) downsizing
ANSWER: 1
23. .......... is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting (3) Crashing
(4) Allotting
(5) None of these ANSWER:2
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 62
24. Help Menu is available at which button? (1) End
(2) Start
(3) Turnoff (4) Restart
(5) Reboot
ANSWER:2 25. The contents of .......... are lost when the computer turns off.
(1) storage
(2) input
(3) output (4) memory
(5) None of these
ANSWER: 5 26. When you enter text in a cell in Excel, it also appears in which of
the following?
(1) Status bar
(2) Formula bar (3) Row heading
(4) Name box
(5) None of these ANSWER:2
27. Which elements of a Word document can be displayed in colour?
(1) Only graphics (2) Only text
(3) Only the first word of each line
(4) All elements, but only if you have a colour printer
(5) All elements 28. A workbook is a collection of
(1) Page Setup
(2) Buttons (3) Diagrams
(4) Charts
(5) Worksheets ANSWER:5
29. appear at the bottom of the Excel Window.
(1) Sheet tabs
(2) Name Box (3) Formula bar
(4) Title bar
(5) None of these MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 63
30. EPROM stands for
(1) Erasable Programmable Read-Only Memory (2) Electronic Programmable Read-Only Memory
(3) Enterprise Programmable Read-Only Memory
(4) Extended Programmable Read-Only Memory
Downloaded DIWAKAR EDUCATION
HU (5) Electrical Programmable Read-Only Memory
ANSWER: 1
31. The technology that stores only the essential instructions on a
microprocessor chip and thus enhances its speed is referred to as
(1) CISC
(2) RISC 3) CD-ROM
(4) Wi-Fi
(5) MISC
ANSWER: 2 32. Which is not a basic function of a computer?
(1) Store data
(2)Accept input (3)Process data
(4) Copy text
(5) Accept and process data ANSWER: 4
33. ASCII is a coding system that provides
(1) 256 different characters
(2) 512 different characters (3) 1024 different characters
(4) 128 different characters
(5) 1000 different characters ANSWER: 4
34. Which part of the computer is directly invoked in executing the
instructions of the computer
program? (1) The scanner
(2) The main storage
(3) The secondary storage (4) The printer
(5) The processor
ANSWER: 5 35. In order to create column data in Word, you need to
(1) tab consecutively until your cursor reaches the desired place
(2) set tabs or use the Table menu
(3) use Excel (4) press the space bar until your cursor reaches the desired place
(5) None of these
ANSWER: 5 MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 64
36. Files are organised by storing them in (1) tables
(2) databases
(3) folders
(4) graphs (5) diagrams
ANSWER:3
37. When a computer is switched on, the booting process performs (1) Integrity Test
(2) Power-On Self-Test
(3) Correct Functioning Test
(4) Reliability Test (5) Shut-down
ANSWER: 2
38. In Word, the feature that automatically detects common errors
is called
(1) Autocorrect
(2) Autograph
(3) Spelling and Grammar (4) Go to
(5) Thesaurus
ANSWER:1 39. A computer system that is old and perhaps not satisfactory is
referred to as a(n)
(1) Ancient system
(2) Historical system (3) Age old system
(4) Legacy system
(5) Legal System ANSWER: 4
40. Which of the following is not a binary number?
(1) 001 (2) 101
(3) 202
(4) 110
(5) 011 ANSWER:3
41. Which of the following does not store data permanently?
(1) ROM (2) RAM
(3) Floppy Disk
(4) Hard Disk
(5) None of these ANSWER:2
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 65 42. Which of the following is the smallest storage?
(1) Megabyte
(2) Gigabyte (3) Kilobyte
(4) Terabyte
(5) None of these
ANSWER:5 43. Which menu enables the user to choose toolbars?
(1) View
(2) Format (3) Insert
(4) Edit
(5) Help ANSWER: 1
44. By viewing the properties of the local hard disk of a computer, the
user can find out
(1) the amount of space that has been used up and the remaining free space on the disk.
(2) the name of the user viewing the properties of the disk.
(3) nothing useful to the user. (4) the number of programs available in the computer,
(5) None of these
ANSWER: 1
45. Pre-defined and built-in formulas in Excel are known as (1) Autosheets
(2) Diagrams
(3) Charts
Downloaded DIWAKAR EDUCATION
HU (4) Tables
(5) Functions
ANSWER:5
46. Which of the following contains permanent data and gets updated during the processing of
transactions?
(1) Operating System File (2) Transaction file
(3) Software File
(4) Master file
(5) Any File ANSWER:4
47. The keyboard shortcut to centralise the selected text in Word is
(1) Ctrl + Esc (2) Ctrl + C
(3) Alt + C
(4) There is no keyboard shortcut for this operation (5) Ctrl + E
ANSWER: 5
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 66 48. Which of the following helps to protect floppy disks from data
getting accidentally erased?
(1) Access notch (2) Write-protect notch
(3) Entry notch
(4) Input notch
(5) None of these ANSWER:2
49. A modem is connected to
(1) a telephone line (2) a keyboard
(3) a printer
(4) a monitor (5) a scanner
ANSWER:1
50. Large transaction processing systems in automated
organisations use (1) Online processing
(2) Batch Processing
(3) Once-a-day Processing (4) End-of-day processing
(5) Once-a-week processing
ANSWER:2 51. The operation of combining two cells into a single cell in Excel
is referred to as
(1) join cells
(2) merge cells (3) merge table
(4) join table
(5) None of these ANSWER:2
52. Which of the following can be used to store a large number of
files in a small amount of storage
space? (1) File adjustment
(2) File copying
(3) File reading
(4) File compatibility
(5) File compression
ANSWER:5
53. In a computer, most processing takes place in (1) memory
(2) RAM
(3) motherboard (4) CPU
(5) None of these
ANSWER:4
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 67
54. Data is organized in a worksheet as
(1) charts and diagrams (2) rows and columns
(3) tables and boxes
(4) graphs (5) None of the above
ANSWER:2
55. Which of the following is an example of a binary number?
(1) 6AH1 (2) 100101
(3) 005
(4) ABCD (5) 23456
ANSWER:2
56. Spell Check will find errors in which of the following?
(1) Today is a rainy day (2) Today is a rainy a day
(3) Is a rainy
(4) Rainy today a day (5) None of the above
ANSWER:5
57. Which of the following is not a storage medium? (1) Hard disk
(2) Flash drive
(3) DVD
(4) CD (5) Keyboard
ANSWER:5
58. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the
menu, the user must
(1) select the Cells. choose Edit. and select Clear, then All (2) select the Cells. and click Delete on the keyboard
(3) select the Cells. choose Tools. and select Clear. then Formats
(4) select the Cells. choose Tools. and select Formula Audit. then
Delete (5) None of the above
ANSWER:1
59. The computer abbreviation KB usually means (1) Key Block
(2) Kernel Boot
(3) Kilo Byte
(4) Kit Bit (5) None of these
ANSWER: 3
MCQs on Computers Part II
Downloaded DIWAKAR EDUCATION
HU [Compiled by RSTC Gurgaon Canara Bank] Page 68
60. If an Excel Worksheet is to be linked for use in a PowerPoint
presentation, the following should
be clicked (1) Edit, Paste Special
(2) Edit, Paste
(3) Edit, Copy (4) File, Copy
(5) None of the above
ANSWER: 2
61. RAM stands for (1) Random Access Memory
(2) Ready Application Module
(3) Read Access Memory (4) Remote Access Machine
(5) None of the above
ANSWER: 1 62. Which of the following is the hardware and not the software? .
(1) Excel
(2) Printer driver
(3) Operating system (4) Powerpoint
(5) Control Unit
ANSWER:5 63. In Word, which menu would the user select to print a
document?
(1) Tools
(2) File (3) View
(4) Wind0Vob
(5) None of these ANSWER: 2
64. Which of the following is not true about computer files?
(1) They are collections of data saved to a Storage medium (2) Every file has a filename
(3) A file extension is established by the user to indicate the date it
was created
(4) Usually files contain data (5) None of the above
ANSWER:5
65. The common name for a modulator-demodulator is (1) modem
(2) joiner
(3) networker (4) connector
(5) demod
ANSWER: 1
MCQs on Computers Part II [Compiled by RSTC Gurgaon Canara Bank] Page 69
66. What do you see when you click the right mouse button?
(1) The same effect as the left click (2) A special menu
(3) No effect
(4) A mouse cannot be right clicked
(5) Computer goes to sleep mode ANSWER:2
67. In order to choose the font for a sentence in a Word document,
(1) select Font in the Format menu
(2) select Font in the Edit menu
(3) select Font in the Tools menu
(4) select Font in the Insert menu
(5) None of the above ANSWER:1
68. The ALU performs .......... operations.
(1) logarithm-based (2) ASCII
(3) algorithm-based
(4) arithmetic
(5) None of the above ANSWER:4
69. Excel is a program that is used to prepare a
(1) Database (2) Text Document
(3) Spreadsheet
(4) Slide Presentation (5) None of the above
ANSWER:3
70. .......... consists of volatile chips that temporarily store data or
instructions. (1) CPU
(2) ROM
(3)RMA (4) RAM
(5) None of these
Q.1 Which of the following is not an scripting language ?
(A) HTML (B) XML
(C) Postscript (D) Javascript Ans: C Postscript
Q.2 Which of the following is a platform free language
(A) Fortran (B) Assembly (C) C (D) Java
Ans: D Java
Q.3 A digital signature is (A) scanned signature (B) signature in binary form
(C) encrypting information (D) handwritten signature
Ans: C encrypting information Q.4 Mechanism to protect private networks from outside attack is
(A) Firewall (B) Antivirus
(C) Digital signature (D) Formatting Ans: A Firewall
Q.5 A computer system that permits multiple users to run programs at
same time
(A) Real time system (B) Multi programming system (C) Time sharing system (D) Multi tasking system
Ans: D Multi tasking system
Code: T-16 Subject: E-COMMERCE 2
Q.6 A computer communication technology that provides a way to
interconnect
multiple computer across short distance is (A) LAN (B) MAN
(C) WAN (D) Wireless network
Downloaded DIWAKAR EDUCATION
HU Ans: A LAN
Q.7 Telnet is a service that runs
(A) Television on net (B) Remote program
(C) Cable TV network (D) Telenext Ans: B Remote program
Q.8. A device that forwards data packet from one network to
another is called a (A) Bridge (B) Switch
(C) Hub (D) Gateway
Ans: B Switch
Q.9 Which of the following is the fastest media of data transfer (A) Co-axial Cable (B) Untwisted Wire
(C) Telephone Lines (D) Fibre Optic
Ans: D Fiber Optic. Q.10 Tool that is used to transfer data/files among computers on the
Internet
(A) FTP (B) Archie (C) TCP (D) Gopher
Ans: C TCP
Q.11 HTML is a
(A) Programming Language (B) Scripting Language (C) Web Browser (D) Network Protocol
Ans: B Scripting Language
Code: T-16 Subject: E-COMMERCE 3
Q.12 Secret-key encryption is also known as
(A) Asymmetric encryption (B) Symmetric encryption
(C) Secret-encryption (D) Private encryption Ans: D Private encryption
Q.13 The concept of electronic cash is to execute payment by
(A) Credit Card (B) ATM Card (C) Using computers over network (D) Cheque
Ans: C Using computers over network.
Q.14 SMTP is a (A) Networking Protocol
(B) Protocol used for transferring message between end user &
Mail Server
(C) Protocol used for smart card message interchange (D) Encryption Standard
Ans: B Protocol used for transferring message between end user &
Mail Server. Q.15 Digital Signature is
(A)Scanned Signature on Computer
(B) Code number of the sender. (C)Public Key Encryption.
(D)Software to recognize signature.
Ans: D Software to recognize signature
Q.16 Telnet is a (A) Network of Telephones (B) Television Network
(C) Remote Login (D) Remote Login.
Ans: C Remote Login. Q.17 The internet is
(A) Network of networks (B) Web site.
(C) Host (D) Server
Ans: A Network of networks Code: T-16 Subject: E-COMMERCE
4
Q.18 An e-business that allows consumer to name their own price
for products
and services is following which e-business model?
(A) B2B (B) B2G
(C) C2C (D) C2B Ans: D C2B
Q.19 Kerberos is an encryption-based system that uses
(A) Secret key encryption (B) Public key encryption (C) Private key encryption (D) Data key encryption
Ans: A Secret key encryption.
Q.19 The method(s) of payment for online consumers are
(A) Electronic cash (B) Credit/debit (C) Electronic checks (D) All of the above
Ans: D All of the Above.
Q.20 DNS is (A) The distributed hierarchical naming system
(B) The vertical naming system
(C) The horizontal naming system (D) The client server system
Ans: C The horizontal naming system.
Q.21 A firewall is
(A) An established network performance reference point. (B) Software or hardware used to isolate a private network from a
public network.
(C) A virus that infects macros. (D) A predefined encryption key used to encrypt and decrypt data
transmissions.
Ans: B Software or hardware used to isolate a private network from a
public network. Q.22 A router
(A) Screens incoming information. (B) Distributes information between networks
(C) Clears all viruses from a computer system
(D) Is a work virus. Ans: B Distributes information between networks
Code: T-16 Subject: E-COMMERCE
5
Q.23 LDAP stands for (A) Light weight Data Access Protocol.
(B) Light weight Directory Access Protocol.
(C) Large Data Access Protocol. (D) Large Directory Access Protocol.
Ans: B -> Light weight Directory Access Protocol.
Q.24 E-Commerce is not suitable for (A) Sale/Purchase of expensive jewellery and antiques.
(B) Sale/Purchase of mobile phones.
(C) Sale/Purchase of branded clothes.
(D) Online job searching. Ans: D Online job searching
Q.25 Amazon.com comes under the following model
(A) B2B (B) B2C (C) C2C (D) C2B
Ans: B B2C
Q.26 Hubs are present in the network
(A) to diagnose line failures, measure and manage traffic flow and simplify re
configuring of LANs.
(B) to interconnect the LAN with WANs.
Downloaded DIWAKAR EDUCATION
HU (C) to interconnect the WANs with WANs.
(D) to interconnect the WANs with LANs.
Ans: B to interconnect the LAN with WANs.
Q.27 Firewalls operate by (A)The pre-purchase phase.
(B) isolating Intranet from Extranet.
(C)Screening packets to/from the Network and provide controllable filtering of network
traffic.
(D)None of the above.
Ans: C Screening packets to/from the Network and provide controllable filtering of
network traffic.
Code: T-16 Subject: E-COMMERCE 6
Q.28 The mercantile process model consists of the following
pahase(s): (A) The pre-purchase phase.
(B) Purchase consummation phase.
(C) Post-purchase Interaction phase.
(D) All of the above. Ans: D All of the Above.
CAN FELLOW US ON THESE LINK-
YOUTUBE-https://www.youtube.com/channel/UCHhO400Tm_HjRulzcbYJN6Q FACEBOOK- https://www.facebook.com/diwakareducationhub/ BLOGGER-https://diwakareducationhub.blogspot.in/ TELEGRAM-https://t.me/joinchat/HPW4qRKXu8mgKiP52SHQsw