0% found this document useful (0 votes)
108 views186 pages

03-11-23 Computer Marathon NAB Edutap

Uploaded by

MridulBagri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views186 pages

03-11-23 Computer Marathon NAB Edutap

Uploaded by

MridulBagri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 186

Solve PYQs too.

Q.1

What term describes the physical and touchable components of a computer system?

A. Hardware
B. Software
C. User
D. Data
E. Mother Board
Answer: Option A
Computer:
A computer is an electronic machine or device that performs processes, calculations, and operations based on instructions provided by a
software or hardware program.

Explanation-
• Hardware: It refers to all the physical components of a computer system that you can touch and see. These components are essential for
the computer to function and execute tasks. Hence, option A is correct
• Software: It refers to the non-tangible programs and instructions that run on a computer. It includes applications, operating systems, and
any code that enables the computer to perform specific tasks. Hence, option B is incorrect
• User: The user is the individual or entity that interacts with the computer system. Hence, option C is incorrect
• Data: Data represents the information processed and stored by a computer system. It can be in various forms, such as text, numbers,
images, videos, or any other digital content. Hence, option D is incorrect
• Motherboard: The motherboard is a critical hardware component inside a computer that houses the CPU (Central Processing Unit),
memory modules, and various connectors for other hardware components. Hence, option E is incorrect

Therefore, Option A is the correct answer.


Q.2

Consider the following statements in the context of Abacus.

1. Abacus was the first counting device.


2. It was developed in Egypt
3. The wooden frame contains horizontal rods and beads which are passed through the rods

Which among the following statement/s is/are correct?


A - 1 only
B - 1 and 2
C - 2 only
D - 1 and 3
E - All statements are correct

Introduction to computer
Answer: Option D

Explanation-
• "Abacus was the first counting device.“- The abacus is one of the earliest known counting devices and has
a long history of use in various cultures. Hence, statement 1 is correct
• "It was developed in Egypt." - The origins of the abacus is from China. Hence, statement 2 is incorrect
• "The wooden frame contains horizontal rods and beads which are passed through the rods." - The
abacus typically consists of a wooden frame with rods or wires running horizontally, and beads or counters
that can be moved up and down on these rods to perform calculations. Hence, statement 3 is correct

Therefore, option D is the correct answer.


Q.3

Who among the following is known as the one of the inventors of microprocessors?

A. Keith Davis
B. Charles Babbage
C. Varun Sharma
D. Alan Turing
E. Tod Hoff

Introduction to computer
Answer: Option E
Q.4

Which option is incorrect in the context of second-generation computers?

A. The second-generation computers replaced Vacuum Tubes with Transistors


B. They were cheap, compact, had faster programming, and produced less heat than the first-generation
Computers
C. They used assembly languages operating systems.
D. Second Generation of computer started after 1959
E. None of the above statement is incorrect

Topic Name – Generation of Computers


Answer: Option E
Q.5

The_______________, computers replaced transistors with integrated circuits (ICs). They performed
computation in Nanoseconds.
A. First generation
B. Second generation
C. Third generation
D. Fourth generation
E. Fifth generation

Topic Name – Generation of Computers


Answer: Option C

Explanation-
• The third-generation computers replaced transistors with integrated circuits (ICs). They performed
computation in Nanoseconds.
• It used high-level languages like FORTRAN, COBOL, PASCAL, ALGO-68, and BASIC were used. In this
generation, remote processing, time-sharing, and multiprogramming operating system were used.

Therefore, option C is the correct answer.


Q.6

________________ was the first commercially available computer. It was made by the Eckert-Mauchly
Computer Company. It represents the birth of the modern computers.

A. ABC
B. EDISAC
C. ENIAC
D. UNIVAC
E. None of the above

Topic Name – Generation of Computers


Answer: Option D

Micro-Processor
Electronic
(Intel 4004)
Numerical
Atanasoff Berry Electronic Discrete Electronic Delay
Integrator and Universal Automatic
Computer (ABC) Variable Automatic Storage Automatic
Calculator (ENIAC) Computer (UNIVAC) First general-purpose
. Computer (EDVAC) Calculator (EDSAC)
programmable
processor

UNIVAC was the first commercially available computer. It was made by the Eckert-Mauchly
Computer Company. It represents the birth of the modern computers.
Q.7

Consider the following statements.

1. Analog computers store data continuously in the form of physical quantities and perform calculations
with the help of measures
2. A Hybrid computer is a combined feature of Analog and Digital Computers
3. Analog computers produce output in the form of a graph.
Which among the above statement/s is/are correct?

A. 1 only
B. 2 only
C. 1 and 2
D. 1 and 3
E. All statements are correct

Topic Name – Types of Computers


Answer: Option E

Explanation-
• Analog computers use physical quantities, such as electrical voltages or currents, to represent data and
perform calculations. They continuously vary these physical quantities to process information, making
them suitable for certain types of calculations. Hence, statement 1 is correct
• A hybrid computer combines the features of both analog and digital computers. It typically uses analog
components for specific tasks where continuous data is crucial (like simulations or scientific experiments)
and digital components for more general-purpose computing tasks. Hence, statement 2 is correct
• Analog computers produce output in the form of a graph. The output format depends on the specific
application and how the analog computer is programmed or configured. It can produce numerical results,
graphs, or other types of analog representations. Hence, statement 3 is correct

Hence, option E is the correct answer.


Q.8

Which among the below options is incorrect?


A. The Input Unit is used for giving instructions and data by using input devices
B. CPUs have been constructed on a single integrated circuit called a microprocessor.
C. The Control Unit (CU) is a component of a computer's Central Processing Unit (CPU) that directs the
operation of the processor.
D. The ALU can perform Arithmetic and Logical operations.
E. CPU consists of the Control Unit, the Arithmetic Logical Unit (ALU), and the Memory Unit, and Storage
Unit

Topic Name – Computer Organisation


Hence, C is the correct answer.

Answer: Option E
Explanation
• The Input Unit in a computer system is responsible for receiving instructions and data from input devices such as
keyboards, mice, scanners, and other peripherals. It is the gateway through which data and instructions enter the
computer for processing. Hence, option A is correct
• A microprocessor is a central processing unit (CPU) that is implemented as a single integrated circuit (IC) chip. It
contains the control unit (CU), arithmetic and logical unit (ALU), and other components necessary for executing
instructions and performing calculations. Microprocessors are the heart of most modern computers. Hence, option B
is correct
• The Control Unit (CU) is a vital component of the CPU responsible for controlling the execution of instructions. It
ac
manages the flow of data between the CPU's components, fetches instructions from memory, decodes them, and
directs the ALU to perform the necessary operations. It ensures that instructions are executed in the correct
sequence. Hence, option C is correct
• The Arithmetic and Logic Unit (ALU) is responsible for carrying out the actual computations and logical comparisons
that are the core of a computer's processing capabilities. Hence, option D is correct
• "CPU consists of the Control Unit, the Arithmetic Logical Unit (ALU), and the Memory Unit. Hence, option E is
incorrect
Therefore, option E is the correct answer.
Q.9

Consider the following statements in the context of the storage unit

A. Primary Memory is volatile (losses data on power dissipation)


B. Secondary Memory is non-volatile (retains data even without power).
C. Secondary memory is used to hold stored program instructions and a large volume of information.
D. Primary memory is used to hold running program instruction, data intermediate results, and results of
ongoing processing of jobs
E. All statements are correct

Which among the above statement/s is /are correct

Topic Name - COMPUTER ORGANIZATION


Hence, C is the correct answer.

Answer: Option E

Explanation
• Primary memory, often referred to as RAM (Random Access Memory), is volatile, which means it loses its
data when power is dissipated or turned off. Hence, option A is correct
• Secondary memory, which includes devices like hard drives, SSDs, and optical disks, is typically non-volatile
and retains data even when the power is turned off. Hence, option B is correct
• Secondary memory is primarily used for long-term storage of data, including program instructions and a
large volume of information such as files and databases. Hence, option C is correct
• Primary memory (RAM) is used for holding runningac program instructions, data intermediate results, and
the results of ongoing processing. It provides fast access to data that the CPU needs during its operation.
Hence, option D is correct

Therefore, option E is the correct answer.


Q.10
____X_______, accepts the results produced by the CPU, converts these coded results to human-acceptable
form, and supplies the converted results to the outside world. It presents a soft/ hard copy of the
information which can be readable by the users.

Identify X from the below-given options

A. Input unit
B. Output unit
C. Primary memory
D. Control Unit
E. None of the above

Topic Name - COMPUTER ORGANIZATION


Answer: Option B

Explanation-
• The component described in the statement, which accepts the results produced by the CPU, converts
them into human-acceptable form, and presents them as readable information to the outside world, is
typically known as the "Output unit.“
• So, X in this context is "Output unit.

"Hence, option B is the correct answer.


Q.11

Which computers are used for solving complex application such as Global Weather Forecasting?

A. Super Computers
B. Mainframe Computers
C. Embedded computers
D. Hybrid computers
E. None of the above
Answer: Option A

Super Computers are used with complex applications like Global Weather Forecasting, Creating Graphic Images,
Engineering Design and Testing, Space Exploration, etc
Q.12

Which of the following is not a basic function of a computer?

A. Copy text
B. Accept input
C. Process data
D. Store data.
E. None of the above

Topic Name - COMPUTER ORGANIZATION


Answer: Option A

All computer systems perform the following five basic operations for
converting raw input data into useful information-

1. Inputting: Process of entering data and instructions into a


computer system.
2. Storing: Saving data and instructions to make them readily
available for initial or additional processing as and when required.
3. Processing: Performing arithmetic operations (add, subtract,
multiply, divide, etc.) or logical operations (comparisons like equal
to, less than, greater than, etc.) on data to convert them into
useful information.
4. Outputting: Process of producing useful information or results for
a user, such as printed reports or visual displays.
5. Controlling: Directing the manner and sequence in which the
above operations are performed.
Q.13

Consider the following options

A. Information consists of the raw facts and figures


B. Information is the organized form of data
C. Data processing refers to the transformation of raw data into meaningful output
D. Data Collection – Gathering data from the environment and preparing it for input.
E. 5th Generation of Computer were using ULSI Technology

Which among the above option is incorrect

Topic Name – Data Processing Cycle


Answer: Option A

Explanation-
• Information is not the same as raw facts and figures. Information is derived from data when it is
processed and organized in a meaningful way. Raw data, on the other hand, consists of unprocessed and
unorganized facts and figures. So, information is the organized form of data, not the raw facts and figures
themselves.

Hence, option A is the correct answer.


Q.14

The correct abbreviation for GIGO is________.

A. Good Information, Good Output


B. Great Input, Great Output
C. General Information, General Output
D. Genuine Input, Genuine Output
E. Garbage In, Garbage Out

Topic Name - Stages of Data Processing


Answer: Option E

Explanation-
• Garbage In, Garbage Out. GIGO is a common acronym in the field of computing and data processing,
which emphasizes that the quality of output data is determined by the quality of the input data. If
incorrect or low-quality data is fed into a computer or information system, the results or output will also
be incorrect or of low quality.

Hence, option E is the correct answer.

FTP
CAD
WWW/PDF/LED/OLED
BIOS
CC/BCC
TFT
API
Q.15

Computer manipulate data in many ways, and this manipulation is called as _____________

A. Utilizing
B. batching
C. Upgrading
D. Processing
E. None of the above
Answer: Option D

Data processing refers to the transformation of raw data into meaningful output. Data can be done manually using a pen
and paper, mechanically using simple devices e.g. typewriter or electronically using modern data processing tools e.g.
computers
Q.16

In the field of computer which of the following controls the machine cycle?

A. Control Unit
B. Memory Unit
C. Logic Unit
D. Arithmetic Unit
E. None of the above
Answer: Option A

The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the
processor. It tells the computer's memory, arithmetic and logic unit and input and output devices how to respond to the
instructions that have been sent to the processor.
Q.17
What is the primary characteristic of Multi-Processing?

A. It relies on a single CPU for all operations.


B. It is rarely used in computing devices.
C. It divides tasks between multiple CPUs to increase efficiency.
D. It primarily focuses on reducing output.
E. None of the above
Hence, C is the correct answer.

Answer: Option C

Explanation-
• Multi-Processing is a data processing approach that makes use of multiple CPUs, dividing tasks or sets of
operations among them simultaneously to increase efficiency and throughput.

Therefore, option C is the correct answer.

ac
Q.18

_________________ makes use of CPUs (more than one CPU). The task or sets of operations are divided
between CPUs available simultaneously thus increasing efficiency and throughput.

A. Multi-processing
B. Manual Processing
C. Real Time Processing
D. Batch Processing
E. None of the above
Answer: Option A

Multi-Processing
This type of processing perhaps the most widely used types of data processing. It is used almost everywhere and forms
the basis of all computing devices relying on processors. Multi-processing makes use of CPUs (more than one CPU). The
task or sets of operations are divided between CPUs available simultaneously thus increasing efficiency and throughput.
The result and benefit of this type of processing is the reduction in time required and increasing the output.
Q.19

How many phases are there under CPU instruction Cycle ?

A. 5
B. 4
C. 3
D. 2
E. 8
Answer: Option B
Q.20

The circuit that includes the CPU and memory chips is located on the ___________

A. System unit
B. Operating system
C. Motherboard
D. Computer
E. None of the above
Answer: Option C

A motherboard, often referred to as the mainboard or system board, is a critical component in a computer
system. It is a large, flat circuit board that serves as the central hub for connecting and interconnecting
various hardware components and peripherals within the computer.

The motherboard is typically located inside the computer case, and it plays a fundamental role in facilitating
communication between different parts of the computer system.
Q.21

Which keyboard key is primarily used to change the input mode of a group of keys and capitalize all letters?

A) Shift key
B) Caps Lock key
C) Function key (Fn)
D) Escape key
E) Num Lock key

F11 key is used for full


screen
Hence, C is the correct answer.

Answer: Option B

Input devices
Input devices serve as a link between a user and the computer. It allows users to feed instructions and data
to computers for processing, display, storage, and/or transmission.

Explanation
• The key primarily used to change the input mode of a group of keys and capitalize all letters is the Caps
Lock key. When Caps Lock is activated, all letters typed on the keyboard will be in uppercase. Therefore,
the correct answer is option B, "Caps Lock key." ac
Therefore, option B is the correct answer.
Q.22
______X______, is used to change the input mode of a group of keys on a keyboard. Caps Lock, Num Lock,
and Scroll Lock are ______X______.
Identify X from the below-given options

A. Num Lock
B. Alt key
C. Control key
D. Toggle Keys
E. None of the above

Topic Name – Input devices


Hence, C is the correct answer.

Answer: Option D

Explanation-
• Toggle Keys, such as Caps Lock, Num Lock, and Scroll Lock, are used to change the input mode of a group of
keys on a keyboard. These keys toggle between different states when pressed, indicating whether certain
features like capitalization, numeric keypad, or scrolling are active or not.

Therefore, option D is the correct answer.

ac
Q.23
Consider the following table in the context of Mouse-
S. Number Functions
1 It is a pointing and cursor-control device
2 A mouse has two or three buttons called Left, Right, and Middle button.
3 It is an output device

Which of the following is incorrectly matched


A- 1 only
B- 2 only
C- 2 and 3
D- 3 only
E- All are correctly matched

Topic Name – Input devices


Hence, C is the correct answer.

Answer: Option D

Explanation-
• Mouse is a pointing and cursor-control device- The statement is correct
• A mouse has two or three buttons called Left, Right, and Middle button- The statement is correct
• It is an output device- The statement is incorrect. As the mouse is an input device.

Therefore, option D is the correct answer.

ac
Q.24

__________________ is a character recognition system that uses special ink and characters. It is used to
verify the legitimacy or originality of paper documents, especially cheques

A. OCR
B. MICR
C. OMR
D. CAD
E. None of the above
Hence, C is the correct answer.

Answer: Option B

ac
Q.25

Which of the following groups consists of only input devices?

A. Mouse, Keyboard, Monitor


B. Mouse, Keyboard, Printer
C. Mouse, Keyboard, Plotter
D. Mouse, Keyboard, Scanner
E. None of the above
Hence, C is the correct answer.

Answer: Option D

ac
Q.26

Which type of printer uses a non-impact photocopier technology, and its ink is dry, providing high-quality output?

A) Dot-Matrix Printer
B) Laser Printer
C) Inkjet Printer
D) Line Printer
E) LED Printer
Hence, C is the correct answer.

Answer: Option B

Explanation-
• Laser Printer: Laser printers use non-impact photocopier technology. They use dry ink (toner) and produce
high-quality output. Resolution in laser printers is measured in dots-per-inch (dpi).

Therefore, option B is the correct answer

ac
Q.27

The individual dots that form the image on a monitor are called

A. Particles
B. frames
C. Pixels
D. Picture Dots
E. None of the above
Hence, C is the correct answer.

Answer: Option C

The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a
computer image.

ac
Q.28
Which component of the motherboard is responsible for storing BIOS settings such as time, date, and
hardware configurations?

A) CPU Slot
B) RAM Slot
C) CMOS battery
D) Expansion Slot
E) None
Hence, C is the correct answer.

Answer: Option C

Explanation-
• CPU Slot: This slot is used to install the CPU (Central Processing Unit) onto the motherboard, facilitating its connection
and preventing damage during installation or removal. Hence, option A is incorrect
• RAM Slot: These slots are used for installing RAM (Random Access Memory) modules. Computers can have multiple RAM
slots, allowing for memory expansion. Hence, option B is incorrect
• CMOS battery: This battery, also known as a Complementary metal-oxide-semiconductor battery, stores essential BIOS
settings like time, date, and hardware configurations. It keeps these settings even when the computer is turned off.
Hence, option C is correct
• Expansion Slot: An expansion slot, also called a bus slot ac or expansion port, provides a connection point on the
motherboard for installing hardware expansion cards, such as graphics cards or network adapters. Hence, option D is
incorrect

Therefore, option C is the correct answer


Q.29
Which type of memory is closest to the CPU and considered the fastest?

A) Register
B) Cache memory
C) RAM
D) Hard disk
E) None of the above

Topic Name – Memory Hierarchy


Hence, C is the correct answer.

Answer: Option A

Explanation-
• Register: Registers are the fastest memory and are located very close to the CPU, making them ideal for
immediate data manipulation. Hence, option A is correct
• Cache memory: Cache memory is fast and small, but registers are even faster and typically closer to the CPU.
Hence, option B is incorrect
• RAM: RAM is relatively fast but not as fast as registers or cache memory. Hence, option C is incorrect
• Hard disk: Hard disks are much slower than registers, cache memory, and RAM. Hence, option D is incorrect
• Optical disk: Optical disks are also slower than registers,
ac cache memory, RAM, and hard disks. Hence, option
E is incorrect

Therefore, option A is the correct answer


Q.30

________ is a permanent memory, which halls data and instruction for start-up the computer and does not
erase data after power off.

A. Network interface card


B. CPU
C. RAM
D. ROM
E. None of the above
Hence, C is the correct answer.

Answer: Option D

Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM
cannot be electronically modified after the manufacture of the memory device.

ac
Q.31

Which type of RAM does not require constant refreshing to maintain its data and retains information as long
as it has power?

A) Dynamic RAM (DRAM)


B) Static RAM (SRAM)
C) Synchronous Dynamic RAM
D) Volatile RAM
E) Non-volatile RAM
Hence, C is the correct answer.

Answer: Option B

Explanation
• Dynamic RAM (DRAM): Requires constant refreshing to maintain data and is volatile. Hence, option A is
incorrect
• Static RAM (SRAM): Holds data in a static form, retaining it as long as there is power and is non-volatile.
Hence, option B is correct
• Synchronous Dynamic RAM: A type of DRAM with higher clock speeds but still requires refreshing and is
volatile. Hence, option C is incorrect
• Volatile RAM: RAM that loses its data when power isaclost. Hence, option D is incorrect
• Non-volatile RAM: RAM that retains data even when power is lost. Hence, option E is incorrect

Therefore, option B is the correct answer.


Q.32

Consider the following statements in the context of memory and select the correct option.

A. Secondary memory is also known as external memory or non-volatile.


B. Hard drive is a non-removable storage device containing magnetic disks or platters rotating at high
speeds.
C. A compact disc is a portable storage medium that can be used to record, and store data in digital form
D. A Winchester disk is an early term used to describe a type of hard disk drive (HDD) that used a sealed,
stacked disk design
E. All of the above

Topic Name – Memory Management


Hence, C is the correct answer.

Answer: Option E

Explanation
• Secondary memory refers to storage devices that are external to the computer's main memory (RAM) and
are typically non-volatile, meaning they retain data even when the power is turned off. Hence, option A is
correct
• A hard drive is a non-removable storage device that consists of magnetic disks or platters that rotate at high
speeds to store and retrieve data. Hence, option B is correct
• Compact discs (CDs) are portable optical storage media that can be used to record and store digital data,
including audio, video, and computer files. Hence, option
ac C is correct
• A Winchester disk is an early term used to describe a type of hard disk drive (HDD) that used a sealed,
stacked disk design. It was a precursor to modern HDDs. Hence, option D is correct

Therefore, option E is the correct answer.


Q.33
How many bits are there in a Byte?

A) 2 bits
B) 4 bits
C) 8 bits
D) 16 bits
E) 32 bits

Topic Name – Memory Management


Hence, C is the correct answer.

Answer: Option C

Explanation-
• 8 bits: Correct, a Byte is a group of 8 bits and is equal to one character.

Hence, option C is the correct answer

ac
Q.34

Which of the following is not a system software?

A. Device Drivers
B. Language Translator
C. Operating Software
D. Utility Software
E. None of the above
Hence, C is the correct answer.

Answer: Option E

ac
Q.35

What is the main function of an operating system in a computer?

A) Managing and coordinating hardware and software


B) Scanning for viruses and preventing file corruption
C) Compressing data on the hard disk to save space
D) Rearranging files and unused space on the hard disk
E) Facilitating the creation and correction of text

Topic name: Software


Hence, C is the correct answer.

Answer: Option A

Explanation-
A) An operating system manages and coordinates the functioning of hardware and software. Hence, option A
is correct
B) Scanning for viruses is typically the role of antivirus software. Hence, option B is incorrect
C) Data compression on the hard disk is not the primary function of an operating system. Hence, option C is
incorrect
D) Rearranging files and unused space on the hard disk is typically done by disk defragmentation utilities.
Hence, option D is incorrect ac
E) Facilitating the creation and correction of text is a function of text editors, not the operating system.
Hence, option E is incorrect

Therefore, option A is the correct answer


Q.36
Which type of software is primarily used for editing videos, audio, and text and allows users to combine these
elements to enhance a text document?

A) Word Processing Software


B) Spreadsheet Software
C) Presentation Software
D) Multimedia Software
E) Database Package Software

Topic name: Software


Hence, C is the correct answer.

Answer: Option D

Explanation-
• Word Processing Software: This type of software is used for creating, editing, formatting, and
manipulating text documents, but it doesn't typically handle videos or audio. Hence, option A is incorrect
• Spreadsheet Software: Spreadsheet software is primarily designed for performing calculations, data
storage, and creating charts. Hence, option B is incorrect
• Presentation Software: Presentation software is used to create slideshows with text and graphics, not for
video and audio editing. Hence, option C is incorrect
• Multimedia Software: Multimedia software is specifically
ac developed for editing videos, audio, and text
and allows users to combine these elements to enhance documents. Hence, option D is correct
• Database Package Software: Database software is used for creating and managing structured databases,
not for multimedia editing. Hence, option E is incorrect

Therefore, option D is the correct answer


Q.37

A byte can represent any number between 0 and _______

A. 312
B. 255
C. 1024
D. 1025
E. None of the above
Hence, C is the correct answer.

Answer: Option B
A bit is the most basic unit and can be either 1 or 0. A byte is not just 8 values between 0 and 1, but 256 (28) different
combinations (rather permutations) ranging from 00000000 via e.g. 01010101 to 11111111. Thus, one byte can represent
a decimal number between 0(00) and 255

ac
Q.38

Which type of programming language provides human-readable instructions for the CPU and is considered a
low-level language?

A) Machine language
B) Binary language
C) Assembly language
D) High-level language
E) All of the above

Topic Name – Computer Language


Hence, C is the correct answer.

Answer: Option C

Computer language:
A Computer Language is the means by which instructions and data are transmitted to computers

Explanation-
• Machine language: Machine language uses binary code (0s and 1s), making it not human-readable.
Hence, option A is incorrect
• Binary language: This term is often used interchangeably with machine language and is also not human-
readable. Hence, option B is incorrect ac
• Assembly language: Assembly language is a low-level language that offers human-readable instructions
for the CPU. Hence, option C is correct
• High-level language: High-level languages are more abstract and user-friendly than low-level languages,
making them less similar to CPU instructions. Hence, option D is incorrect

Therefore, option C is the correct answer


Q.39

The _______________ is a test the computer must complete to verify all hardware is working properly before
starting the remainder of the boot process.

A. BIOS
B. POST
C. OSPT
D. PPOS
E. None of the above
Hence, C is the correct answer.

Answer: Option B

POST

Short for power-on self-test, the POST is a test the computer must complete to verify all hardware is working
properly before starting the remainder of the boot process. The POST process checks computer hardware,
like RAM (random access memory), hard drive, CD-ROM drive, keyboard, etc., to ensure everything is working
correctly.
ac
Q.40

What is a cold boot in the context of computing?

A. Restarting a computer after it has been powered off


B. Restarting a computer without shutting it down first.
C. Rebooting a computer after installing new software.
D. Switching from a warm boot to a cold boot mode.
E. None of the above
Hence, C is the correct answer.

Answer: Option A

A cold boot involves turning on a computer that has been completely powered off, which initializes the
system from a "cold" state, and it typically involves clearing the contents of RAM (random access memory).
This is in contrast to a warm boot (option B), which is a restart of the computer without a complete power-
off. Options C and D do not accurately describe a cold boot.

ac
Q.41
Consider the following statements in the context of the operating system

1. An operating system is a type of software without which you cannot operate or run a computer
2. It acts as an intermediary or translation system between computer hardware and application programs
3. Examples of operating systems include – Linux (Ubuntu), DOS, Apple IOS (MacOS 10.15)

Which among the above statement/s is/are correct


A- 1 only
B- 2 only
C- 2 and 3
D- 3 only
E- All statements are correct
Hence, C is the correct answer.

Answer: Option E

Explanation-
• An operating system is a type of software without which you cannot operate or run a computer. Hence,
statement 1 is correct
• It acts as an intermediary or translation system between computer hardware and application programs.
Hence, statement 2 is correct
• Examples of operating systems include – Linux (Ubuntu), DOS, and Apple IOS (MacOS 10.15). Hence,
statement 3 is correct
ac
Therefore, option E is the correct answer
Q.42

A _____X______ is the central part of an operating system. It manages the operations of the computer and
the hardware, most notably memory and CPU time.
Identify X from the below-given options

Which term correctly fills in the blank (X)?

A) Device Driver
B) Processor
C) Kernel
D) Thread
E) Register
Hence, C is the correct answer.

Answer: Option C

Explanation-
• Processor: While the "processor" generally denotes the CPU, it is not the central operating system
component responsible for managing the computer and hardware.
• Kernel: "kernel" is the central part of an operating system that manages computer operations, hardware,
memory, and CPU resources.
• Thread: A "thread" is a unit of execution within a process but is not the central part of the operating
system responsible for overall management.
• Register: A "register" is a small, fast storage locationacwithin a CPU and is not the central component of the
operating system.

Therefore option C is the correct answer


Q.43

DTP is a tool for graphic designers and non-designers to create visual communications for professional. DTP
stands for ___________

A. Device Transfer Protocol


B. Desktop Publishing
C. Device Transfer Programs
D. Device Programs Tool
E. None of the above
Hence, C is the correct answer.

Answer: Option B

Desktop publishing (DTP) is the creation of documents using page layout software on a personal computer. It was first
used almost exclusively for print publications, but now it also assists in the creation of various forms of online content.

COBOL
CD – DVD
CRT
DBMS
ac
DOC
Dpi
DNS
Q.44

What was the first computer network developed by Robert Kahn and Vinton Cerf in 1969?

A) Local Area Network (LAN)


B) ARPANET
C) Wide Area Network (WAN)
D) Personal Area Network (PAN)
E) Metropolitan Area Network (MAN)

Topic Name – Internet


Hence, C is the correct answer.

Answer: Option B

Explanation-
• ARPANET, developed by Robert Kahn and Vinton Cerf in 1969, is considered the precursor to the modern
internet and was the first computer network of its kind.
• ARPANET (Advanced Research Projects Agency Network) was the first Wide Area Network (WAN) used by
them

Hence, the correct answer is option B


ac
Q.45

Which of the following is NOT one of the five components of a computer network?

A) Sender (Device)
B) Sender Equipment (Encoder)
C) Communication Channel (Cables, Wireless)
D) Receiver Equipment (Decoder)
E) Adjuster (Device)

Topic Name – Internet


Hence, C is the correct answer.

Answer: Option E

Explanation-
• The five components of a computer network are Sender (Device), Sender Equipment (Encoder),
Communication Channel (Cables, Wireless), Receiver Equipment (Decoder), and Receiver (Device).

Hence, option E is the correct answer

ac
Q.46
Which type of network interface card (NIC) uses radio wave technology for communication?

A) Wireless NIC
B) Wired NIC
C) Ethernet NIC
D) Bluetooth NIC
E) Optical NIC

Topic Name – Internet


Hence, C is the correct answer.

Answer: Option A

Explanation-
• Wireless NIC. A Wireless NIC enables communication through radio waves and is commonly used in
modern laptops for wireless networking.
• Wired NIC: A Wired NIC uses physical cables to transfer data over the network medium, typically Ethernet
cables.
• Ethernet NIC: This is another term for Wired NIC, which is used to connect devices through Ethernet
cables.
• Bluetooth NIC: Bluetooth NICs enable short-rangeac wireless communication primarily for connecting
peripherals and devices like headphones, keyboards, and mice.
• Optical NIC: Optical NICs use optical signals, such as light, for high-speed data transmission in optical
networks, like fiber optic connections.

Hence, option A is the correct answer


Q.47

Which of the following statements best describes the primary characteristic of a Metropolitan Area Network
(MAN)?

A. MANs are typically limited to a single building or office.


B. MANs use satellite communication for long-distance connectivity.
C. MANs cover a larger geographical area than LANs but are smaller than WANs.
D. MANs primarily use fiber optic cables for data transmission.
E. None of the above
Hence, C is the correct answer.

Answer: Option C

ac
Q.48
Which scientist is credited with the idea of the Personal Area Network (PAN)?

A) Thomas Edison
B) Thomas Jefferson
C) Thomas Zimmerman
D) Alexander Graham Bell
E) Benjamin Franklin
Hence, C is the correct answer.

Answer: Option C

Explanation-
• Thomas Zimmerman is credited with the idea of the Personal Area Network (PAN).

Hence, option C is the correct answer

ac
Q.49

Which network protocol is commonly used for sending and receiving email messages?

A. HTTP
B. FTP
C. SMTP
D. POP
E. URL
Hence, C is the correct answer.

Answer: Option C

ac
Q.50

What is Telnet primarily used for in computer networking?

A. Sending and receiving email messages.


B. Remote terminal access and command-line control of a remote computer.
C. Secure file transfer between two computers.
D. Transferring web pages and multimedia content between servers.
E. None of the above
Hence, C is the correct answer.

Answer: Option B

ac
Q.51
What is the primary purpose of a Unique Resource Locator (URL) on the Internet?

A) To identify the user's location


B) To access a website
C) To send emails
D) To store files
E) To make phone calls
Hence, C is the correct answer.

Answer: Option B

Explanation-
• URLs do not identify the user's location but rather a website's location.
• A URL is used to access a website on the Internet.
• Sending emails is not the primary purpose of a URL.
• Storing files is not the primary purpose of a URL.
• Making phone calls is not the primary purpose of a URL.

Hence option B is the correct answer ac


Q.52
The modem is connected to _______

A. Processor
B. Printer
C. Motherboard
D. Phone line
E. None of the above

Topic Name – Internet


Hence, C is the correct answer.

Answer: Option D

Explanation
• A modem is connected between a telephone line and a Serial port. A modem is a device or program that
enables a computer to transmit data over, for example, telephone or cable lines.

Therefore, option D is the correct answer.

ac
Q.53

In which channel the flow of data is always in one direction, with no capability to support response in other
direction?

A. Duplex Channel
B. Half Duplex Channel
C. Simplex Channel
D. Autocratic Channel
E. None of the above
Hence, C is the correct answer.

Answer: Option C

Simplex communication is a communication channel that sends information in one direction only. The International
Telecommunication Union definition is a communications channel that operates in one direction at a time, but that may
be reversible; this is termed half duplex in other contexts

ac
Q.54

Which is a network device that is used to regenerate or replicate signals that are weakened or distorted by
transmission over long distances?

A. Repeater
B. Hub
C. Switch
D. Bridge
E. None of the above
Hence, C is the correct answer.

Answer: Option A

In summary, these network devices serve different functions in computer networks:


1. Repeaters amplify or regenerate signals.
2. Hubs are simple devices that broadcast data to all connected devices.
3. Switches intelligently forward data based on MAC addresses to specific devices.
4. Bridges segment and filter traffic between network segments.

ac
Q.55

Which is a computer hardware component that connects a computer to a network?

A. Network Interface Card


B. Switch
C. Bridge
D. Router
E. None of the above
Hence, C is the correct answer.

Answer: Option A

A Network Interface Card (NIC) is a hardware component without which a computer cannot be connected over a
network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer.

It is also called network interface controller, network adapter or LAN adapter.

ac
Q.56

__________ is a network topology in which each node connects to exactly two other nodes, forming a single
continuous pathway for signals through each node.

A. Star topology
B. Bus topology
C. Mesh topology
D. Ring topology
E. None of the above
Hence, C is the correct answer.

Answer: Option D
– A ring topology is a network configuration in which device connections create a circular data path. Each networked
device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring
network

ac
Q.57

In the ________ topology, each workstation is connected directly to each of the others.

A. Star topology
B. Bus topology
C. Mesh topology
D. Ring topology
E. None of the above
Hence, C is the correct answer.

Answer: Option C

ac
Q.58

World Wide Web was proposed by:

A. Bill Gates
B. Bill Rogers
C. Tim Berners Lee
D. Vinton Gray Cerf
E. None of These
Hence, C is the correct answer.

Answer: Option C
In 1989, while working at CERN, Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW). It was
developed to meet the demand for automated information-sharing between scientists in universities and institutes
around the world.

ac
Q.59

What are hyperlinks used for?

A. To search for web pages


B. To attach a file to an email
C. To send an email message to more than one person
D. To move from one web page to another
E. None of the above
Hence, C is the correct answer.

Answer: Option D
A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the
current document. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.

ac
Q.60

In ____X______, the recipients of the message and other recipients cannot see the persons who all receive
the e-mail.
A. E-mail
B. Drafts
C. Carbon copy
D. Blind Carbon copy
E. None of the above

Topic Name – Internet


Hence, C is the correct answer.

Answer: Option D

Explanation
• E-mail: Refers to electronic mail in general, which includes sending messages to recipients who can usually
see each other's addresses.
• Drafts: Refers to emails that are saved as drafts and not yet sent to any recipients.
• Carbon copy (CC): Refers to a list of additional recipients in an email, and all recipients can see who else
received the email.
• "Blind Carbon Copy (BCC)," the recipients of the message and other recipients cannot see the persons who all
receive the e-mail. ac

Therefore, option D is the correct answer.


Q.61

What is the full form of ASCII?

A) American Standard Code for Information Interchange


B) All-System Code for Integrated Information
C) Advanced Standard Code for Internet Interaction
D) Alphabetical Standard Code for Internal Integration
E) Automated System for Computer Information

Topic Name – Number System


Hence, C is the correct answer.

Answer: Option A

Explanation
• The full form of ASCII is the American Standard Code for Information Interchange. ASCII is operated by
the IANA (Internet Assigned Numbers Authority) and was also established in the US. It is categorized under
ISO 646 series and is an old encoding method name.

Therefore, option A is the correct answer.

ac
Q. 62

Decimal number system is the group of ________

A. 0 or 1
B. 0 to 9
C. 0 to 7
D. 0 to 9 and A to F
E. None of the above
Hence, C is the correct answer.

Answer: Option B
– Decimal. Decimal, also called Hindu-Arabic, or Arabic, number system, in mathematics, positional numeral system
employing 10 as the base and requiring 10 different numerals, the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.

ac
Q. 63

The digits of the binary system are called as __________

A. bytes
B. bits
C. nibbles
D. Number
E. Data
Hence, C is the correct answer.

Answer: Option B
A binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two
symbols: typically "0" (zero) and "1" (one). Each digit is referred to as a bit.

ac
Q. 64

What is the primary function of Microsoft Office software?

A) Gaming and Entertainment


B) Graphic Design and Video Editing
C) Productivity and Office Work
D) Scientific Research and Data Analysis
E) Social Media Management
Hence, C is the correct answer.

Answer: Option C

Explanation-
• Microsoft Office is not primarily designed for gaming and entertainment.
• While Office may be used for document design and presentations, it's not primarily for graphic design and
video editing.
• Microsoft Office is a suite of software primarily designed for productivity and office work, including word
processing, spreadsheets, presentations, and more.
• While Office can be used for various tasks, its primary focus is not scientific research and data analysis.
• Microsoft Office is not primarily focused on social media
ac management.

Hence, Option C is the correct answer.


Q.65

What file extensions are associated with Microsoft Word's native file formats?

A) .txt and .pdf


B) .xls and .ppt
C) .doc and .docx
D) .jpg and .png
E) .html and .css
Hence, C is the correct answer.

Answer: Option C

Explanation-
• .txt and .pdf are not the file extensions for Microsoft Word's native file formats.
• .xls and .ppt are file extensions for Microsoft Excel and PowerPoint, respectively, not Word.
• Microsoft Word's native file formats are denoted by .doc and .docx filename extensions.
• .jpg and .png are image file formats, not associated with Microsoft Word.
• .html and .css are web-related file formats and not Word's native formats.

Therefore, option C is the right answer. ac


Q.66
In MS Word, _______X______ is a software tool for correcting spelling. It is not only capable of checking
Spelling mistakes but also can suggest possible alternatives for incorrectly spelled words. It is available in
word processing programs, e-mail programs, cell phones, and a variety of other applications.

A) Grammar checker
B) Spell Corrector
C) Spell checker
D) Plagiarism checker
E) Text-to-speech converter

Topic name: Microsoft Word


Hence, C is the correct answer.

Answer: Option C

Explanation-
• The Spell Checker in Microsoft Word is used for correcting spelling and suggesting alternatives for
incorrectly spelled words.

Therefore, option C is the correct answer.

ac
Q.67
Consider the following statements in the context of Microsoft Word
1- Mail merge is used to create form letters or address labels, certificates with unique names, and more.
2- Alignment option is used to align the text in a document to adhere to the right side, left, center, or
justified.
3- The shortcut key Ctrl + [ is used to Decrease font size by 1

Which among the above statement/s is/are correct


A. 1 only
B. 1 and 2
C. 2 only
D. 2 and 3
E. All statements are correct

Topic name: Microsoft Word


Hence, C is the correct answer.

Answer: Option E

Explanation-
• Mail merge is a feature in Microsoft Word that allows you to create personalized documents, such as form
letters or address labels, by merging a template document with a data source. Hence, statement 1 is
correct
• The alignment option in Microsoft Word is used to control the horizontal positioning of text, allowing you
to align it to the right, left, center, or justify it. Hence, statement 2 is correct
• The shortcut key Ctrl + [ is used to Decrease font size by 1. Hence, statement 3 is correct
ac
Hence, option E is the correct answer
Q. 68

Presentation designs that regulate the formatting and layout for the slide are commonly called as ______

A. Design plates
B. Templates
C. Place-holders
D. Blueprints
E. None of the above
Hence, C is the correct answer.

Answer: Option B
A PowerPoint template is a pattern or blueprint of a slide or group of slides that you save as a .potx file. Templates can
contain layouts, colors, fonts, effects, background styles, and even content. You can create your own custom templates
and store them, reuse them, and share them with others.

ac
Q. 69

Special effects used to introduce slides in a presentation are called as ____________

A. Effects
B. Custom animations
C. Transitions
D. Preset animations
E. None of the above
Hence, C is the correct answer.

Answer: Option C
In Microsoft PowerPoint, slide transitions are motion effects that occur in Slide Show view when you move from one slide
to the next during a presentation. You can control the speed, add sound, and even customize the properties of transition
effects.

ac
Q. 70

What is the minimum Zoom range in an Excel Sheet?

A. 8%
B. 10 %
C. 12 %
D. 20 %
E. None of the above
Hence, C is the correct answer.

Answer: Option B

ac
Q.71
In MS Excel, ____X______, displays the name of the application and the file currently in use. Identify X from
the below options-
A. Title Bar
B. Status Bar
C. Formula Bar
D. Menu Bar
E. Ribbon

Topic name: Microsoft Excel


Hence, C is the correct answer.

Answer: Option A

Explanation-
• Title Bar - The Title Bar in MS Excel displays the name of the application and the file currently in use.
• Status Bar - The Status Bar typically shows information about the current status of the workbook and does
not display the name of the application.
• Formula Bar - The Formula Bar displays the contents of the active cell and allows users to edit cell
formulas, but it doesn't show the name of the application and file in use.
• Menu Bar - The Menu Bar contains various menus and commands for Excel, but it doesn't display the
application and file name. ac
• Ribbon - The Ribbon is a tabbed toolbar that provides access to various Excel features and commands but
does not display the application and file name.

Therefore, option A is the correct answer.


Q.72

Text-styling feature of MS word is ____________

A. WordColor
B. WordFont
C. WordArt
D. WordFill
E. None of the above
Hence, C is the correct answer.

Answer: Option C

The text styling feature of MS Word is known as WordArt.

It allows users to make the text more noticeable and flashier

ac
Q.73
In MS Access, ________X______, answer a question by selecting and sorting and filtering data based on
search criteria.
Identify the X from the below options

A. Query
B. Form
C. Table
D. Report
E. Macro

Topic name: Microsoft Access


Hence, C is the correct answer.

Answer: Option A

Explanation-
• Query - Enables users to filter and sort data based on specific criteria to answer questions or extract
specific information from a database.
• Form - Provides a user-friendly interface for entering, viewing, and editing data in a database.
• Table - Stores data in a structured format with rows and columns, serving as the foundation of a database.
• Report - Allows users to present and format data in a structured and printable format for analysis or
sharing.
• Macro - Automates repetitive tasks in Access by recording
ac a series of actions and replaying them with a
single command.

Therefore, option A is the correct answer.


Q.74
What defines a database?

A) A random collection of data files.


B) A complex assortment of unrelated information.
C) Logically related information organized for easy access and management.
D) A single text file with a list of names.
E) A large bunch of text files with random data.

Topic name – DATABASE MANAGEMENT


SYSTEM
Hence, C is the correct answer.

Answer: Option C

Explanation-
• A database is defined as logically related information that is organized in a way that allows for easy
access, management, and updating.

Therefore, option C is the correct answer.

ac
Q.75

DBMS is comprised of tables that made up of rows called _______ and columns called ________

A. fields, records
B. records, fields
C. address, fields
D. ranges, sheet
E. None of the above
Hence, C is the correct answer.

Answer: Option B

Record – The data that is contained in rows inside a table is called a record. A record is a type of entry in which a person's
name, phone number etc. can be.

Field - Each column inside the table is called a field. In this, specific part of every data is stored like customer number,
customer name, street address, state etc

ac
Q.76

Rows of a relation are called as _________

A. Relation
B. Tuples
C. Data structure
D. An entity
E. None of the above
Hence, C is the correct answer.

Answer: Option B

The relational data model represents the database as collection of relations, which resembles a table of values (or data
table). The table name and column names are used to help in interpreting the meaning of values in each row. Each row of
a table is called a data record.

ac
Q.77

Under _____________ type of database, data is organized in the form of tree with nodes.

A. Relational Database
B. Network Database
C. Hierarchical Database
D. Plant Database
E. None of the above
Hence, C is the correct answer.

Answer: Option C

Databases are of three types, namely as follows:

Network Database
In this type of database, data is represented as collection of records and relationships among data
are represented as links.

Hierarchical Database
In this type of database, data is organised in the form of treeac
with nodes.

Relational Database
This database is also known as structured database in which data is stored in the form of tables.
Where, columns define the type of data stored in the table and rows define the information
about the data.
Q.78

Architecture of database can be viewed as __________

A. Two levels
B. Four levels
C. Three levels
D. One level
E. None of the above
Answer: Option C
Architecture of DBMS
Internal Level
• It is the lowest level of data abstraction that deals with the
physical representation of the database on the computer. It is
also known as physical level. It defines how the data are
actually stored and organised on the storage medium.
Conceptual Level
• It is the overall view of the database and includes all the
information that is going to be represented in the database.
It describes what type of data is stored in the database, the
relationship among the data without effecting to the physical
level. It is also known as logical level.
External Level
• This is the highest level of data abstraction which describes
the interaction between the user and the system. It permits the
users to access data in a way that is customised according to
their needs, so that the same data can be seen by different
users in different ways, at the same time. It is also known as view
level.
Q.79

VIRUS stands for _______X_______. It is a software program that affects the system to corrupt the files in the
form of executable files. The first computer virus is _____Y_____ creepers and was developed in ____Z____.
A. X: Vital Information Resource Under Siege; Y: Creepers; Z: 1986
B. X: Very Intrusive Rogue User Software; Y: Creeper; Z: 1971
C. X: Virtual Intrusion & Replication of User Systems; Y: Mydoom; Z: 2004
D. X: Visual Interface for Reliable User Security; Y: Brain; Z: 1986
E. X: Virtual Information Retrieval Using Software; Y: Sasser; Z: 2003
Hence, C is the correct answer.

Answer: Option A

Explanation-
• VIRUS stands for Vital Information Resource Under Siege.
• It is a software program that affects the system to corrupt the files in the form of executable files.
• The first computer virus was creepers and was developed in 1986.

Therefore, option A is the correct answer

ac
Q.80
Which software is designed to prevent, search for, detect, and remove software viruses, as well as other
malicious software like worms, trojans, and adware?

A) Firewall
B) Adware
C) Antivirus Program
D) Intrusion Detection System
E) VPN

Topic Name: VIRUS


Hence, C is the correct answer.

Answer: Option C

Explanation-
• Firewall - A firewall is a network security system that monitors and controls network traffic based on
security rules, but it doesn't focus on virus detection and removal.
• Adware - Adware is software that displays advertisements to generate revenue for its author and is not
primarily focused on virus protection.
• Antivirus Program - An antivirus program is specifically designed to prevent, search for, detect, and
remove software viruses and other malicious software.
• Intrusion Detection System - An Intrusion Detection ac System (IDS) is used to detect and alert on suspicious
network activities but is not designed for virus protection.
• VPN - A Virtual Private Network (VPN) is used for secure and private communication over the internet and
is not primarily designed for virus protection.

Therefore, option C is the correct answer.


Q.81

______X______ is an excessively large email (typically many thousands of messages) or one large message
sent to a user’s email account. This is done to crash the system and prevent genuine messages from being
received.
A. Rootkit
B. Sniffers
C. Scareware
D. Cookies
E. Mail Bomb
Hence, C is the correct answer.

Answer: Option E

Explanation-
• Rootkit- A program designed to hide objects such as processes, files or Windows registry entries (often
including its own).
• Sniffers - A software program used to monitor the traffic in a network. The hackers may use the sniffed
data to access important confidential data.
• Scareware - A common trick cybercriminal uses to make users think that their computer has become
infected with malware to get them to purchase a fake application.
• Cookies - These are program or information secretlyac
stored in a computer especially the internet browser,
which allows other users to monitor the internet activities of a person. These programs usually monitor
the browsing nature of person so that the companies can create better marketing strategies.
• Mail Bomb - An excessively large email (typically many thousands of messages) or one large message sent
to a user’s email account. This is done to crash the system and prevent genuine messages from being
received.

Therefore, option E is the correct answer.


Q.82

________________ type of virus is known as a space filler virus. As the name suggests, this virus tends to
install itself by occupying the empty sections of a file.

A. Rootkit
B. Phishing
C. Scareware
D. Cavity Virus
E. Mail Bomb
Hence, C is the correct answer.

Answer: Option D

ac
Q.83

Mechanism to protect network from outside attack is called as _____________

A. firewall
B. antivirus
C. digital signature
D. Formatting
E. None of the above
Hence, C is the correct answer.

Answer: Option A

A firewall is a network security device or software application that is designed to monitor, filter, and control
incoming and outgoing network traffic based on a set of predetermined security rules. The primary purpose of
a firewall is to establish a barrier between a trusted internal network (such as a company's private network or
home network) and untrusted external networks (such as the internet) to protect against unauthorized access,
cyberattacks, and the spread of malware

ac
Q.84

What is a Trojan horse in the context of computer security?

A. A type of malware that spreads rapidly across a network.


B. A security protocol used for secure data transmission.
C. A deceptive software program that appears legitimate but has malicious intent.
D. A type of firewall used to protect against phishing attacks.
E. None of the above
Hence, C is the correct answer.

Answer: Option C

Trojan horse is a type of malware that disguises itself as a legitimate or benign program but, once executed,
carries out malicious actions without the user's knowledge or consent.

Option A describes a worm, option B mentions a security protocol unrelated to Trojans, and option D
references a different security technology (firewall).

ac
Q.85

The _________ enables you to simultaneously keep multiple Web pagers open in one browser window.

A. Tab box
B. Pop-up Blocker
C. Tab row
D. Address Bar
E. Tab column
Hence, C is the correct answer.

Answer: Option C

The tab row or tab bar is the horizontal row of tabs at the top of a web browser that allows users to open and switch
between multiple web pages or tabs within a single browser window.

ac
Q.86

The capacity of a communication channel is measured in ______


A. Data flow
B. Bandwidth
C. Bit capacity
D. Band Rate
E. None of these
Hence, C is the correct answer.

Answer: Option B

The capacity of a communication channel is typically measured in bandwidth, which refers to the amount of data that can
be transmitted over the channel in a given amount of time.
It is commonly expressed in bits per second (bps) or its multiples (e.g., Mbps for megabits per second or Gbps for gigabits
per second).
Bandwidth represents how much data can flow through the channel per unit of time and is a crucial factor in
determining the speed and capacity of data transmission in networks and communication systems.

ac
Q.87

Which of the following shortcut key is used to duplicate the current slide in MS PowerPoint?

A. Ctrl + C
B. Ctrl + V
C. Ctrl + D
D. Ctrl + E
E. eCtrl + M
Hence, C is the correct answer.

Answer: Option C

Pressing Ctrl + D will create a duplicate of the currently selected slide or the slide that is currently active in the
PowerPoint presentation. This shortcut is handy when you want to quickly replicate a slide and make modifications to the
copy without starting from scratch.

ac
Hence, C is the correct answer.

Answer: Option C

ac
Q.88
What shortcut key is commonly used to paste content in various applications?

A) Ctrl + V
B) Ctrl + P
C) Ctrl + O
D) Ctrl + C
E) Ctrl + X

Topic name – Short Cut keys


Hence, C is the correct answer.

Answer: Option A

Explanation-
• Ctrl + V is the correct shortcut key to paste content in various applications. It is widely used for pasting
text or objects that have been copied or cut to the clipboard.
• Alt + P pressing Alt + P opens the Page Layout tab in the Ribbon
• Shift + P Shift + P lets you capitalize the letter "p"
• Ctrl + C is the shortcut key for copying content to the clipboard, not for pasting.
• Ctrl + X is the shortcut key for cutting content, which removes it from its current location and copies it to
the clipboard. It is not used for pasting. ac

Therefore, option A is the correct answer.


Hence, C is the correct answer.

Answer: Option A

ac
Hence, C is the correct answer.

Answer: Option A

ac
Q.89
Which shortcut key is commonly used to open a new document in most text editing software?

A) Ctrl + N
B) Ctrl + S
C) Ctrl + O
D) Ctrl + C
E) Ctrl + X

Topic name – Short Cut keys


Hence, C is the correct answer.

Answer: Option A
Explanation
The correct answer is A) Ctrl + N.
• Ctrl + N is commonly used to open a new document. When you press Ctrl + N, it typically creates a new,
blank document or file, allowing you to start fresh with a new project or document.
• Ctrl + S is used to save a document,
• Ctrl + O is used to open an existing document,
• Ctrl + C is used to copy selected text or objects, and
• Ctrl + X is used to cut selected text or objects.
ac
Therefore, option A is the correct answer.
Q.90

Which of the following shortcut key will be used to Bold the Text in MS Word?

A. Ctrl + O
B. Ctrl + B
C. Ctrl + V
D. Ctrl + C
E. Ctrl + A

Answer: Option B NABARD Grade A - 2022

You might also like