😍😍😍
😍😍 TOP -100 COMPUTER PDF 😍😍
😍CLICK TOP 100 MAINS MATH QUESTIONS:-
HERE
😍CLICK TOP 100 PROBABILITY QUESTIONS:-
HERE
😍SOLUTION:-
TOP 100 PROBABILITY QUESTIONS
CLICK HERE
😍HEREANALYSIS SHEET DOWNLOAD:- CLICK
😍HERESSC CGL 24 MAINS STRATEGY:- CLICK
😍HERESSC CGL 2025 BEST STRATEGY:- CLICK
😍JOIN CHANNEL:- CLICK HERE
🌻🌻🌻 SECTION -1 ,20 BEST PYQ
COMPUTER QUESTIONS 🌻🌻
🌻browser?
1). Which of the following is used for closing a tab on a
(a) Ctrl + T
(b) Ctrl + W
(c) Ctrl + A
(d) Ctrl + Y
🌻involving
2). Managers use sophisticated tool to combat cyberslacking, especially
the internet. Such
tools include ____
(a) Web filters
(b) Surveillance Software
(c) Proxy Server
(d) Packet sniffer
(e) All of the above
🌻3). A GUI is.?
a) hardware
b) language interpreter
c) software interface
d) an operating system
e) None of these
🌻4). Which one is true about generation of computers?
a) The first generation (1942-1954)
b) The second generation of computer (1954-1964)
c) Third generation of computer (1965-71)
d) Fourth generation of computer (1975-1984)
🌻a) Non
5). Which one is not a Necessary conditions for deadlock?
pre-emptive
b) Preemptive
c) Partial allocation
d) Circular wait
🌻is _____
6). A device needed to communicate with computers using telephone lines
a) Disk
b) CPU
c) VDU
d) Modem
🌻a) Alternate
7). Which key must be Unique?
b) Primary
c) Candidate
d) Foreign
🌻a) Operating
8). ‘Chrome’ is a ______ software
System
b) Application
c) System
d) Utility
🌻a) Ctrl
9). What is the short cut to justify the paragraph?
+R
b) Ctrl + J
c) Ctrl + U
d) Ctrl + E
🌻a) host
10). The main computer in a network is called
processor
b) front-end processor
c) commentator
d) KIPS
e) None of these
🌻an 11). This is a standard way for a Web server to pass a Web user’s request to
application program and to receive data back to forward to the user –
a) Interrupt request
b) Forward DNS lookup
c) Data-Link layer
d) File Transfer Protocol
e) Common gateway interface
🌻A. monitor
12). Which of the following is a main function of the ALU?
all computer activities .
B. perform arithmetic and logical operations.
C. control computer output, such as printing.
D. control all computer activities
🌻13). ‘SIM’ stands for _________ .
A. Subscriber Identity Module. B. Station Interactive Module.
C. Super Interactive Module .
D. Super Identity Module.
🌻isprocessed
14). The transaction processing system in which the transaction
immediately without accumulation of transaction is known as?
A) Batch processing
B) OLTP
C) Universal processing
D) Operational processing
🌻(i) Operating
15). Statements :
System is the main part of Application software.
(ii) Assembly language is made up of only 0s and 1s.
(iii) Software provides easy to use interface to work with the
hardwarecomponents.
A) Only (i) and (ii) are true
B) Only (ii) and (iii) are true
C) Only (iii) is true
D) Only (ii) is true
🌻16). (6702)8=(?)2
(A) (101011010111)2
(B) (101001010110)2
(C) (110111000010)2
(D) (110102101011)2
🌻A. =SUM(Sales)-A3
17). Which of the following formulas will Excel Not be able to calculate?
B. =SUM(A1:A5)*.5
C. =SUM(A1:A5)/(10-10)
D. =SUM(A1:A5)-10
🌻(A)18). What is the ultimate purpose of Defragmentation?
Make the PC faster
(B) Create More Free Space
(C) Delete temporary files
(D) Reduce Power consumption
🌻(A)19). Which of the following is not an example of OS?
Windows XP
(B) Mac OS
(C) DOS
(D) LYNX
🌻tobe20).usedWhich of the following is used to stores programs and files that are
later?
A) Mother Board
B) RAM
C) Hard Disk
D) Cache
🎯 SECTION -1 ANSKEY 🎯
1)-B. 2-)-E 3)-C 4)-C
5)-B. 6)-D. 7)-D. 8)-B
9)-B. 10)-A. 11)-E. 12)-B
13)-A. 14)-B. 15)-C. 16)-C
17)-A. 18)-B. 19)-B. 20)-C
JOIN CHANNEL:- CLICK HERE
🌻🌻🌻🌻
QUESTIONS CGL MAINS🌻🌻🌻🌻
SECTION -2 BEST COMPUTER
❤1) What is a cell in Microsoft Excel?
1. The intersection of a row and a column in a worksheet.
2. A single worksheet within a workbook.
3. A separate file used to store data.
4. A small diagram or chart.
❤(CPU)
2). A high speed memory is placed between the Central Processing Unit
and the primary memory known as memory.
1. Catch. 2. read only
3. virtual. 4. secondary
❤images
3). Which backup device provides a convenient way to create system
and complete backups, but may require a lengthy restoration process?
1. Network-attached storage (NAS)
2. Tape drive
3. DVD-RW disc
4. Solid-state drive (SSD)
❤computer?
4). What is the primary purpose of RAM (Random Access Memory) in a
1. Providing temporary storage for data that the CPU is currently processing.
2. Providing long-term storage for programs.
3. Storing permanent data and files.
4. Managing peripheral devices.
❤5). What is a 'Firewall' in the context of network security?
1. A type of malware that spreads through email attachments.
2. A hardware device used to boost network performance.
3. A software application for managing files and folders.
4. A security mechanism that filters and controls network traffic.
❤need6).only
When the sender and receiver of an email are on the same system, we
1. four . 2. six
3. two. 4. three
❤7). In computer registers, MAR stands for______
1. Main Access Register
2 Memory Access Register
3 Memory Address Register
4. Main Address Register
❤8). Which of the following is an example of GUI-based user agent in email?
1. Netscape. 2 Mail
3. Elm. 4. Pine
❤9). Which of the following is an example of the input device in a computer?
1. Speaker. 2 Touchscreen
3. Printer. 4 Monitor
❤modem
10). A/An is an organisation that connects its subscriber's computer using
to the Internet.
1. Uniform Resource Locator.
2 Web Server
3 Internet Service Provider
4. Web Browser
❤11). What is a Trojan' in the context of network security?
1. Malicious software disguised as legitimate software to gain unauthorised
access.
2. A type of firewall that protects against viruses and malware.
3. A program that monitors network traffic for security breaches.
4. A protocol used for secure communication between devices on a network.
❤12). Which of the following is NOT an example of web browser?
1. Apple Safari. 2. Opera
3.Facebook. 4. Google Chrome
❤of the
13). In MS Office 365, the Page Setup dialog box can be found under which
following tabs?
1. Layout. 2 Home. 3. Draw. 4. Insert
❤hierarchy?
14). What is the function of the cache memory in a computer's memory
1. To control the flow of data between the CPU and memory.
2. To provide permanent storage for data and files.
3. To manage the allocation of memory resources to different programs.
4. To store frequently used data for faster access by the CPU.
❤applications?
15). What is the keyboard shortcut for 'Copy' in most Windows
1 Ctrl+C. 2 Ctrl+X
3 Ctrl+Z. 4. Ctrl + V
❤16). In MS-Excel 2019, what does the SUM function do?
1. It adds up the values in a range.
2. It multiplies the values in a range.
3. It finds the average of values in a range.
4. It counts the number of cells in a range
❤Asterisk
17). In File Explorer of Windows 10, the keyboard shortcut "Num Lock +
sign (*) is used to
1. display all subfolders under the selected folder
2 .open the properties dialog box for the selected item.
3. display the contents of the selected folder.
4. collapse the selected folder
❤'hidden
18). In File Explorer of Windows 11, which of the following tabs includes the
items' option?
1. View. 2. Share
3. File. 4. Home
❤forwards
19). Which networking device operates at Layer 2 of the OSI model and
data based on MAC addresses?
1. Router. 2 Switch. 3. Hub. 4. Firewall
❤20). In Microsoft Word, what is the purpose of the Print Preview' feature?
1. To format the font and style of the document.
2. To insert images and graphics into the document.
3. To check the spelling and grammar of the document.
4. To view how the document will appear when printed.
🌻🌻 SECTION -2 ANSKEY 🌻🌻
1)-1. 2)-1. 3)-2. 4)-1. 5)-4
6)-3. 7)-3. 8)-1. 9)-2. 10)-3
11)-1. 12)-3. 13)-1. 14)-4. 15)-1
16)-1. 17)-1. 18)-1. 19)-2. 20)-4
JOIN CHANNEL:- CLICK HERE
🎯🎯
COMPUTER QUESTIONS 🎯🎯
SECTION -3 BEST CGL MAINS
🎯1). ____is a type of malware that is often disguised as legitimate software.
1.Trojan. 2. Ransomware
3. Roolkit. 4. Keylogger
🎯screen
2). In ms excel 365 which of the following appears scress the top of the
and below the title bar and contains all the commands, focidas and
featuem seded to create data utente podes
1. Scroll bars. 2. Status bar
3. Ruler 4. Ribbon
🎯3). ____is also known as electronic disk.
1. USB Sticks
2. Network Storage Servers
3. Solid-State Drive
4. USB Hard Drives
🎯temporarily
4). ___is a high-speed device used in CPU that is utilised to store data
during processing
1. Arithmetic and Logic Unit (ALU)
2. Auxiliary Memory
3. Control Unit
4. Registers
🎯5). Which among the following statements is incorrect?
1. Cache memory keeps the programs that can be run in a short amount of
time.
2. Cache memory stores data in permanent use.
3. Cache memory is faster than main memory.
4. The size of cache is usually small.
🎯specific
6). Which of the following option of print settings is used to choose only
pages in MS-Word 365
1. Print All Pages. 2. Print Current Page
3. Print Selection. 4. Custom Print
🎯software
7). ______displays a list of utility configure the computer system and install
and hardware.
1. Control Panel. 2 Help and Support
3 Taskbar. 4. Run
🎯8). Which among the following statements is incorrect?
1. Trojan looks like a legitimate software.
2. Some Trojans create backdoors to give malicious users access to the
system.
3.Trojan self-replicate and infects other files.
4. Trojan spreads through meer interaction such as opening an email
attachment ne downloading and executing a file from the Internet.
🎯memory.
9).The memory unit that communicates directly with the CPU is called
1. cache. 2.backup. 3. main. 4. auxiliary
🎯10). The instruction that is not to be executed immediately is placed in the
1. Current Instruction Register (CIR) .
2. Memory Address Register (MAR) .
3. Program Counter (PC) Instruction Buffer Register (IBR).
4. Instruction Buffer Register (IBR)
🎯in Google
11). Which of the following is keyboard shortcut to reload the current page
search engine?
1. F7. 2. F5. 3. FI. 4. F3
🎯networking
12). ____is a passage to connect two networks that may work on different
models.
1. Router. 2. Switch. 3. Gateway. 4. Hub
🎯13). ___Cookies track you and expose your privacy
1. President. 2. Third party
3. Zombi. 4. Session
🎯memory?
14). Which among the following statements is incorrect about secondary
1. It is known as the backup memory.
2. Data is permanently stored even if power is switched OFF.
3. Computer may run without the secondary memory.
4. It is a volatile memory.
🎯by 15). _____ memory is sometimes used to increase the speed of processing
making current programs and data available to the CPU at a rapid rate.
1. Backup. 2. Auxiliary
3. Main. 4. Cache
🎯MS-Word
16). Which of the following statement(s) about Quick Access Toolbar in
2010 is/are incorrect?
P: The Quick Access Toolbar has Save, Undo, and Redo buttons by default.
Q: The Quick Access Toolbar has Cut, Undo, and Redo buttons by default.
R: You can place more buttons on the Quick Access toolbar.
S: There is no option on Quick Access toolbar for "show below the Ribbon".
1. Only Q and R. 2. Only Q and S
3. only P, Q, R. 4. All P, Q, R, S
🎯17). ____. is the oldest type of Central Processing Unit (CPU).
1. Triple Core. 2. Single Core
3. Dual Core. 4. Quad Core
🎯MS-Excel
18). Which of the following is Math and trigonometric functions available in
365?
1. Text function. 2. ABS function
3. Logical function. 4. Financial function
🎯technology
19). Which among the following generations of computer used the
of transistors for the first time?
1. Third. 2. Second
3. First. 4. Fourth
🎯message
20). Which of the following option can be pressed to create a new email
in Gmail?
1. Settings. 2. Outbound
3. Compose. 4. Drafts
🎯 SECTION -3 ANSKEY 🎯
1)-1. 2)-4 3)-3 4)-4
5)-2. 6)-4. 7)-1. 8)-3
9)-3. 10)-4. 11)-2. 12)-3
13)-2. 14)-4 15)-4. 16)-2
17)-2. 18)-2. 19)-2. 20)-3
join channel:- click here
😍😍
QUESTIONS 😍😍
SECTION-4 BEST COMPUTER MAINS
😍1). In Windows 11, to open File Explorer you press the on the keyboard.
1. Windows logo key + E
2. Windows logo key + O
3. Windows logo key + F
4. Windows logo key + W
😍Office
2). In email, which of the following mode(s) is/are included in the Post
Protocol (POP)?
I. Delete Mode
II. Keep Mode
1. Neither I nor II
2. Only II
3. Only I
4. Both I and II
😍the3).network.
A ____ is a computer program that can self-replicate and propagate over
1. macro virus
2. worm
3. boot sector virus
4. trojan horse
😍examine
4). Which of the following types of firewall operates at the Network layer to
incoming and outgoing packets?
1. Circuit-level gateway
2. Application - level gateway
3. Packet filtering
4. Network filtering
😍View>_____view
5). File Explorer of Windows 11, to reduce the space between files, select
1. Stretch. 2. Compact.
3. Cloud. 4. Wide
😍6). What is the purpose of a search engine on the internet?
1. To create and edit documents online.
2. To search and retrieve relevant information from the web.
3. To provide free software downloads.
4. To network with people on social media platforms
😍Windows
7). Which keyboard shortcut opens File Explorer (previously known as
Explorer) in Windows 10?
1. Ctrl + P
2 Win+E
3. Ctrl + C
4. Alt+Tab
😍8). What is a 'DDoS attack' in the context of network security?
1. An attack that floods a network with excessive traffic to overwhelm and
disrupt its operation.
2. An attack that aims to exploit vulnerabilities in software.
3. A social engineering attack that targets specific individuals.
4. A type of malware that replicates itself and spreads through a network
😍9). What is the role of ROM (Read-Only Memory) in a computer system?
1. Providing temporary storage for running applications.
2. Managing network connections.
3. Storing user-generated files and documents.
4. Storing the computer's firmware and startup instructions.
😍to devices
10). Which networking protocol is used to assign IP addresses dynamically
on a network?
1. FTP (File Transfer Protocol)
2. DHCP (Dynamic Host Configuration Protocol)
3. SMTP (Simple Mail Transfer Protocol)
4. HTTP (Hypertext Transfer Protocol)
😍clipboard
11). What is the keyboard shortcut to 'Paste' copied content from the
in most Windows applic
1. Ctrl+V. 2. Ctrl+Z
3. Ctrl+X. 4. Ctrl+C
😍12). What is the main purpose of the 'BCC' field in email composition?
1. To include multiple main recipients in a single field.
2. To send copies of the email without revealing the other recipients'
addresses.
3. To indicate the importance of the email.
4. To attach files to the email.
😍13). How can you open an existing document in Microsoft Word 2016?
1. Press Ctrl+O. 2. Press Ctrl+P.
3. Press Ctrl + S. 4. Press Ctrl + N.
😍Processing
14). What is the purpose of the Arithmetic Logic Unit (ALU) in a Central
Unit (CPU)?
1. It controls the speed of the CPU fan.
2. It executes program instructions by performing calculations and logical
comparisons.
3. It manages the data flow between the CPU and memory.
4. It connects the CPU to peripheral devices.
😍15). What is the main purpose of the 'BCC' field in email composition?
1. To include multiple main recipients in a single field.
2. To send copies of the email without revealing the other recipients'
addresses.
3. To indicate the importance of the email.
4. To attach files to the email.
😍1. It16).canWhich of the following is the advantage of using an Electronic mail?
lead to decreased face-to-face communication and loss of personal
touch.
2. Vulnerability to spam and phishing threats.
3. An overwhelming number of emails can lead to information overload.
4. It is convenient and fast communication with individuals or groups globally.
😍an 17). Which of the following statements is FALSE regarding attaching a file in
email?
1. The size of the attachment is unlimited.
2. You can remove or change attachments before sending the email.
3. Attachments can be previewed within the email composition window.
4. Multiple files can be attached in an email message.
😍Word18).365?
Which of the following is the purpose of the "Zoom" icon in Microsoft
1. To delete the current page
2. To adjust the visual appearance of our document to suit our reading or
editing needs
3. To increase the font size
4. To change the document's page layout
😍Excel19).isINCORRECT?
Which of the following statements related to addressing of cells in MS
1. Rows in MS Excel are identified by numbers.
2. The cell in the first column and first row is A1.
3. The cell in the second column and third row is B3.
4. Columns in MS Excel are identified by numbers.
😍1. Volume
20). Which of the following is the correct full form of VOIP?
over internet protocol
2. Voice over internet protocol
3. Voice over intranet protocol
4. Voice of intranet protocol
😍 SECTION -4 ANSKEY 😍
1)-1. 2)-4 3)-2 4)-3
5)-2. 6)-2. 7)-2. 8)-1
9)-4. 10)-2. 11)-1. 12)-2
13)-1. 14)-2. 15)-2. 16)-4
17)-1. 18)-2. 19)-4. 20)-2
😎😎😎
QUESTIONS 😎😎😎
SECTION -5 BEST COMPUTER
😎receivingemails
1). Which of the following protocols is commonly used for sending and
between servers?
1. Simple Mail Transfer Protocol (SMTP)
2. Hyper Text Transfer Protocol (HTTP)
3. Transmission Control Protocol (TCP)
4. File Transfer Protocol (FTP)
😎Word2). 365?
Which of the following keyboard shortcuts is used to apply bullets in MS
1. Ctrl + Shift + I
2. Ctrl + Shift + B
3. Ctrl + Shift + C
4. Ctrl + Shift + L
😎Conditional
3). In Microsoft Excel 365, which of the following is NOT done by
Formatting?
1. We can delete condition if it is not required.
2. We can add more than one condition to format.
3. We can set condition to look for bold and apply italics on them.
4. We can apply font border and pattern formats that meet the specified
conditions.
😎a series
4). Which of the following charts is used in MS Excel 365 to display data as
of points connected by straight lines and is used for showing trends
over time?
1. Bar chart 2. Pie chart
3. Column chart. 4. Line chart
😎in the5). InFontMSstyle
Word 365, which of the following is the default font style and size
and size dropdown list when a new document is opened in
Windows 10?
1. Arial, 11
2. Times New Roman, 11
3. Calibri, 11
4. Aharoni, 11
😎separated
6). If an email is sent to more than one person, the email addresses are
bywhich of the following symbols?
1. Comma
2. At the rate of
3. Paper clip icon
4. Equal
😎media?
7). Which is the following methods is used in unguided transmission
1. Infrared
2. Twisted pair cable
3. Coaxial cable
4. Optical fibre cable
😎8). Which of the following is used to create a New Blank Document?
1. MS Outlook
2. MS-Excel
3. MS-PowerPoint
4. MS-Word
😎365?9). Which of the following is an example of a table style in Microsoft Word
1. APA (American Psychological Association)
2. Plain Grid
3. Chicago Manual of Style
4. MLA (Modern Language Association)
😎web,10).enabling
Which of the following is the foundation of data communication on the
the transfer of web page content?
1. Hypertext Transfer Protocol
2. Uniform Resource Locator
3. Domain Name Server
4. World Wide Web
😎MS11). Which of the following statements about autofitting the row height in
Excel
365 is correct?
1. Single-clicking on the boundary between row headers will automatically
adjust the
row height to fit the content.
2. Double-clicking on the boundary between column headers will automatically
adjustthe column height to fit the content.
3. Single-clicking on the boundary between column headers will automatically
adjust thecolumn height to fit the content.
4. Double-clicking on the boundary between row headers will automatically
adjustthe row height to fit the content.
😎12). Which of the following is an effective method to handle SPAM emails?
1. Reply to the sender asking them to stop
2. Forward the email to all your contacts
3. Unsubscribe from all mailing lists
4. Mark the email as SPAM or Junk
😎computer
13). Which of the following is an Internet accessing technique where
uses its
modem to dial a telephone number given to the user by an Internet Service
Provider?
1. Digital Subscriber Line
2. Broadband Connection
3. Integrated Services Digital Network (ISDN) Service
4. Dial up Connection
😎external
14). Which of the following is a private network that is typically open to
parties, such as business partners, suppliers, and key customers?
1. Telnet 2. Extranet
3. Internet 4. Intranet
😎ascending
15). Which of the following is the correct way to sort a range of cells in
order in MS Excel 365?
1. Click on the ‘OK’ button.
2. In the ‘Sort’ dialog box, select the ‘Ascending’ option in the ‘Order’ section.
3. Select the range of cells and press ‘Ctrl + Shift + S’.
4. Click on the ‘Review’ tab and select ‘Sort’
😎rows16).inInanMS Excel 365 which of the following statements related to deleting
excel sheet is correct?
1. If you want to delete multiple rows at once, simply select the rows by
clicking anddragging over the row numbers, and then press ‘Ctrl’ and ‘+’.
2. If you want to delete multiple rows at once, simply select the rows by
clicking anddragging over the row numbers, and then press ‘Ctrl’ and ‘Enter’.
3. If you want to delete multiple rows at once, simply select the rows by
clicking anddragging over the row numbers, and then press ‘Ctrl’ and ‘−‘.
4. If you want to delete multiple rows at once, simply select the rows by
clicking anddragging over the row numbers, and then press ‘Ctrl’ and ‘space’.
😎another
17). Which of the following is used to move text from one location to
in a
word document of MS-Word 365?
1. Copy the selected text
2. Copy and paste the text at desired location
3. Cut and paste the text at desired location
4. Select and cut the selected text
😎paragraph
18). Which of the following options will allow you to set text within a
at different margins in MS Word 365?
1. Page breaks
2. Indenting
3. Line spacing
4. Border
😎middle
19. Which of the following is the correct option to draw a line through the
of
text in MS Word 365?
1. Line
2. Underline
3. Dash
4. Strikethrough
😎emails
20). Which of the following statements is INCORRECT related to sorting
in Gmail?
1. We can sort emails by a variety of factors, like the topic, sender, size, or age
of themessage.
2. Sorting mail cannot help us remove unwanted emails from our inboxes and
more easily unsubscribe from mailings we don’t need.
3. Sorting mail can help us remove unwanted emails from your inbox and more
easily unsubscribe from mailings we don’t need.
4. Depending on what we use your email address for, sorting emails can also
help you keep track of trends and correspondence by looking at messages
sorted by specific criteria.
😎 SECTION -5 ANSKEY 😎
1)-1. 2)-4 3)-3 4)-4
5)-3. 6)-1. 7)-1. 8)-4
9)-2. 10)-1. 11)-4. 12)-4
13)-4. 14)-2. 15)-2. 16)-3
17)-3. 18)-2. 19)-4. 20)-2
join channel:- click here
SECTION -6 BEST COMPUTER PYQ
QUESTIONS
1). What database key uniquely identifies a record within a table?
(a) Primary key
(b) Foreign key
(c) Secondary key
(d) Relational key
2). Softcopy is the intangible output, so then what is hardcopy?
(a) The physical parts of the computer
(b) The printed parts of the computer
(c) The printed output
(d) The physical output devices
3). Small Scale Integration(SSI) is
related to which generation of
computer?
A) Second Generation
B) Third Generation
C) Fourth Generation
D) First Generation
4). The type of software that controls the internal operations in
thecomputer, and control how the computer works with all its parts, iswhich of
the following
(A) Shareware
(B) Operating System
(C) Application software
(D) Public domain software
5). Which of the following is the correct option for using 'justify' alignment
to a paragraph in a document?
(a) Aligns text only to the left (b) Aligns text only to
the right
(c) Aligns text to both left and right edges
(d) Align text in the center
6). Which of the following parts of an email is used to indicate the sender
and recipient details, as well as the date and time?
(a) Subject line
(b) Body
(c) Email header
(d) Attachment
7). What is the keyboard shortcut to edit the contents of a cell in Microsoft
Excel?
(a) F2 (b) Alt + E (c) Shift + Enter (d) Ctrl + S
8). Which symbol is used in Excel to
denote exponential numbers?
(A) *
(B) ^
(C) &
(D) $
9). Which of the following statements is wrong?
a) Windows XP is an operating system
b) Linux is owned and sold by
Microsoft
c) Photoshop is a graphical design tool by adobe
d) Linux is free and open source software
10). What does the CONCATENATE function do in Microsoft Excel?
(a) Combines text from multiple cells into one cell .
(b) Splits text into separate cells.
(c) Converts text to
uppercase.
(d) Finds the average of a range of cells.
11). The term ‘ENIAC’ stands for what?
A. Electron Nobility Integrator and Computer
B. Electronic Numerical Integration Analogue Computer
C. Electronic Numerical Integration Analogue Computer
D. Electronic Numerical Integrator and Computer
12). Softcopy is the intangible output, so then what is hardcopy?
A. The physical output devices B. The printed output
C. The physical input devices
D. The printed parts of the computer
13). A hacker that changes or forges information in an electronic resource,
is engaging in _________ .
A. Cyber Crime
B. simulation
C. Sniffing
D. data diddl
14). Which of the following term would best define an Operating System?
A) Utility
B) Motherboard
C) Platform
D) Play-and-Play
15). Which of the following options is used to check the spelling and
grammar in a Microsoft Word document?
(a) Review tab
(b) Home tab
(c) Insert tab
(d) Format tab
16). If we want to eliminate the duplicate values than _____ keyword is also
to be used
a) Values
b) Groups
c) Distinct values
d) Columns
17). A device needed to communicate with
computers using telephone lines is _____
a) Disk b) CPU
c) VDU d) Modem
18). -----system is a small, wireless handheld computer that scans an item’s
tag and
pulls up the current price (and any special offers) as you shop.
a) PSS
b) POS
c) Inventory
d) data mining
19). ………is an artificial language designed to communicate instructions to a
computer
a) Programming language
b) Machine Language
c) Software Language
d) Assembly Language
20). The speed of Which Generation C omputer
was in Pico Seconds?
a) First
b) Second
c) Fourth
d) Fifth
SECTION -6 ANSKEY
1)-A. 2)-C 3)-B 4)-B
5)-D. 6)-C. 7)-A. 8)-B
9)-B. 10)-B. 11)-D. 12)-B
13)-D. 14)-C. 15)-A. 16)-C
17)-D. 18)-A. 19)-A. 20)-C
JOIN CHANNEL AND SHARE:- CLICK HERE
Mains म यादा समय नही है इस लए पढ़ाई क जए और selection ली जए
There is not much time left in Mains so study and get selected