MCQ Based On Information and Communication Technology (ICT) Topic
This comprehensive MCQ ICT is specially developed for the candidates of the UGC NET Exam (For Compulsory Paper-I) Teaching and Research Aptitude for the purpose of the practice of questions based on the pattern of the examination.
Please feel free to reach us in case you need more info or comment to highlight any issues with the above question set.
For sake of relevance, they are given in reverse order starting from the latest exam until the year 2006 Exam. There are instance were question were repeated and by changing sentence formation so keep attention to details
(MCQ Based on Solved Paper UGC NET EXAM 2006-2021)
#1. RAM is placed on
- Hard Disk
- Extension board
- Motherboard
- USB
Answer: 3
#2. Given below are two statements
Statement I: Cache memory is faster than random access memory
Statement II: Random access memory is closer to the processor than cache memory
In light of the above statements, choose the most appropriate answer from the options given below
1. Both Statement I and Statement II are correct
2. Both Statement I and Statement II are incorrect
3. Statement I is correct but Statement II is incorrect
4. Statement I is incorrect but Statement II is correct
Answer: 3
#3. Which one of the following is NOT a web browser?
1. Firefox
2. Facebook
3. Chrome
4. Safari
Answer: 2
#4. URL stands for
1. Universal Resource Location
2. Universal Response Locator
3. Unified Response Location
4. Uniform Resource Locator
Answer: 4
#5. Given below are two statements
Statement I: The use of ICT in organizing teaching-learning programmes in the universities has the potential to optimise the learning outcomes
Statement II: Formative assessment provides support to enhancing the quality of teaching-learning sessions
In light of the above statements, choose the most appropriate answer from the options given below
1. Both Statement I and Statement II are correct
2. Both Statement I and Statement II are incorrect
3. Statement I is correct but Statement II is incorrect
4. Statement I is incorrect but Statement II is correct
Answer: 1
#6. Which of the following statements are correct?
A. N.K.N stands for New Knowledge Network
B. MOOCs are offline courses
C. National Supercomputing Mission is a Government of India initiative
D. Clock rate of CPU is measured in Gigabytes
E. Param Shivay is a super computer
Choose the correct answer from the options given below:
1. C and E only
2. B and C only
3. C and D only
4. A and E only
Answer: 1
#1. Which of the following is/are major issues arising out of the growing reliance on information technology?
- Profitability
- Security threats
- Privacy concerns
Choose the correct option:
- (a) and (b) only
- (a) and (c) only
- (b) and (c) only
- (a), (b) and (c)
Answer: 3
#2. Match List-I with List-II in the context of computer networking:
List-I | List-II |
a) VOIP | i. Makes use of light pulses to transmit data |
b) Fibre-optic cable | ii. Use of internet to make phone calls |
c) URL | iii. Most appropriate to connect computers in a small building |
d) UTP cable | iv. Text used by web browsers to locate a web address on the Internet. |
Choose the correct option:
- (a)-(iv), (b)-(i), (c)-(ii), (d)-(iii)
- (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii)
- (a)-(ii), (b)-(iii), (c)-(iv), (d)-(i)
- (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
Answer: 2
#3. Select the option that includes file formats suitable for distributing sound files across the internet.
- Wmv,mp4,wma,mp3
- Avi,midi,wav,mp3
- Avi,mov,wmv,mp3
- Midi,wav,wma,mp3
Answer: 4
#4. which of the following statements is/are correct?
- For the sequence of integers represented in binary as 00111, 01001, 01011, P…. the next integer P would be represented as 01101
- A byte is a binary number consisting of exactly 8 bits
Choose the correct option:
- (a) only
- (b) only
- Both (a) and (b)
- Neither (a) and (b)
Answer: 3
Select the true statement about an operating system (OS)?
(1) An OS controls peripheral, allocates memory and organises data into fields and records.
(2) An OS provides protection against viruses and controls peripherals.
(3) An OS controls peripheral, and allocates memory and processor time.
(4) An OS controls the processor and peripherals and allows the user to connect to the internet
Answer: Options look confusing however ans given was 3.
Which of the following is a type of malware intentionally inserted into a software system that
will set off a malicious function when specified conditions are met?
(1) Worm (2) Trojan
(3) Spyware (4) Logic bomb
Answer: A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should he or she ever be terminated from the company.
Which of the following statements(s) is/are true in respect of wireless technology?
P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile phone.
Q: Bluetooth is a long-range wireless technology and is a low cost means of data transfer.
(1) P only (2) Q only
(3) Both P and Q (4) Neither P nor Q
Answer: P only; As Bluetooth is a protocol for wireless communication over short distances. It was developed in the 1990s, to reduce the number of cables. Devices such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles can connect to each other, and exchange information. This is done using radio waves. It can be done securely. Bluetooth is only used for relatively short distances, like a few metres.
Which of the following file format is not a video file format?
(1) .AVI (2) .MOV
(3) .MP4 (4) .
Answer: JPEG (/ˈdʒeɪpɛɡ/ JAY-peg) is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography. Rest all others are Video file formate.
SMTP is an acronym for:
(1) Simple Mail Transport Protocol
(2) Simple Mail Terminal Protocol
(3) Simple Mail Transfer Protocol
(4) Simple Mail Transition Protocol
Answer: SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication guidelines that allow the software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol. It is a program used for sending messages to other computer users based on e-mail addresses.
A computer has a main memory of 960 Kbytes. What is the exact number of bytes contained in this
memory?
(1) 960 × 8
(2) 960 × 1000
(3) 960 × 1024
(4) 960 × 1024 × 1024
Answer: Kilobyte is the unit of digital information with prefix kilo (10 * 3). 1 Kilobyte is equal to 10 * 3 bytes = 1000 bytes in decimal (SI). 1 Kilobyte is equal to 2 * 10 bytes = 1024 bytes in the binary.
So this answer is also confusing; the However the best answer should be 960 × 1000.
The convenient place to store contact information for quick retrieval in e-mail is:
(1) Address box (2) Message box
(3) Address book (4) Message book
Answer: Address book
Why would BCC: be used in an e-mail?
(1) BCC: allows the recipient to identify all the other recipients in the list when a group email
address is used.
(2) BCC: allows the sender to indicate who the email is for if there is more than one recipient.
(3) BCC: allows the sender of a message to conceal the recipient entered in the BCC: field from
the other recipients.
(4) BCC: allows recipients to be visible to all other recipients of the message.
Answer: Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address.
Jatin’s laptop has an LCD screen. The acronym LCD stands for:
(1) Light Crystal Display
(2) Liquid Compact Display
(3) Light Compact Display
(4) Liquid Crystal Display
Answer: A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated optical devices that uses the light-modulating properties of liquid crystals. Liquid crystals do not emit light directly, instead of using a backlight or reflector to produce images in color or monochrome.
Which of the following is an example of proprietary system software?
(1) Linux
(2) Microsoft Internet explorer
(3) Microsoft office
(4) Microsoft windows
Answer: Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer. Proprietary software remains the property of its owner/creator and is used by end-users/organizations under predefined conditions.
With respect to computers, which one of the following best describes phishing?
(1) A malicious program installed on a system that stays concealed to avoid detection.
(2) A method of bypassing normal authentication procedures over a connection to a network.
(3) A type of unsolicited bulk email of identical messages sent to numerous recipients.
(4) An attempt to acquire sensitive information for malicious reasons, by masquerading as a
trustworthy entity.
Answer: Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
A computer network which is used within a building is called a:
(1) WAN (2) MAN
(3) LAN (4) SAN
Answer: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables.
A/An ________ is a computer program that spreads by inserting copies of itself into other
executable code or documents.
(1) Operating system
(2) Computer Virus
(3) Firewall
(4) Anti-virus
Answer: Viruses. A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data).
Which of the following is not a/an web browser?
(1) Internet Explorer
(2) Mozilla Firefox
(3) Google Chrome
(4) Yahoo
Answer: Yahoo
One Terabyte (TB) of memory is equal to:
(1) 1024 KB
(2) 1024 × 1024 KB
(3) 1024 × 1024 × 1024 KB
(4) 1024 × 1024 × 1024 Bytes
Answer :
The basic unit used in computer data storage is called a bit .
Bit : A Bit is a value of either a 0 or 1.
Byte : 1 Byte = 8 Bits
Kilobyte (KB) : 1 KB = 8,192 Bits ,
1 kB = 1,024 Bytes
Megabyte (MB) 1MB =1024 KB
Gigabyte (GB) 1GB = 1024 MB
Terabyte (TB) 1TB = 1024 GB
Petabyte (PB) 1PB = 1024 TB
Exabyte (EB) 1EB = 1024 PB
Zettabyte (ZB) 1ZB = 1024 EB
So from this 1 TB = 1024 GB
As you all know DEC 2018 exam was Online test and question papers were not released by NTA…so we have covered the memory-based question based on the feedback of students.
Which one of the following processes is the main task for the computer in mapping the geographical data?
- Data storage
- Data visualization
- Data retrieving and drawing
- Data Collection
Answer: Options look confusing however ans given was 3.
In computer terminology which of following describe device drivers
- Hardware that allows interaction between peripheral device and the operating system.
- Software that allow the user to control the operating system
- Software that allows interaction between peripheral device and the operating system.
- Software that allow the user to control the operating system
Answer: 3- Device drivers are software you install to work with hardware with OS
Which of the following is not true about RAM?
- RAM is a temporary storage area
- RAM is the same as hard disk storage
- RAM is volatile
- Information stored in RAM is gone when you turn the computer off
Answer: 2
Most World Wide Web pages contain commands in the language _______________
- NIH
- URL
- HTML
- IRC
Answer: 3
Which one of the following would not be considered as a form of secondary storage?
- Floppy Disk
- Optical Disk
- RAM
- Flash Drive
Answer: 3
What does the acronym WAN stand for?
- Widest Area Network
- Wild Area Network
- Wide Area Networking
- Wide Area Network
Answer: 4
FTP is an acronym for–
- File Transaction Protocol
- File Truncation Protocol
- File Translation Protocol
- File Transfer Protocol
Answer: 4
Bluetooth is a type of radio wave information transmission system that is good for about ____________
1) 30 feet
2) 30 yards
3) 30 miles
4) 300 miles
Answer: 1
Which of the following statements, regarding the term ICT is/are TRUE ?
P : ICT is an acronym that stands for Indian Classical Technology.
Q : Converging technologies that exemplify ICT include the merging of audio-visual,
telephone and computer networks through a common cabling system.
(1) P only
(2) Q only
(3) P and Q
(4) Neither P nor Q
Answer: (2)
A new Laptop has been produced that weighs less, is smaller and uses less power than
previous Laptop models. Which of the following technologies has been used to accomplish this ?
(1) Universal Serial Bus Mouse
(2) Faster Random Access Memory
(3) Blu Ray Drive
(4) Solid State Hard Drive
Answer: (4)
Given the following email fields, which of the email addresses will ‘swami’ be able to see
when he receives the message ?
To… ram@test.com
Cc… raj@test.com; ravi@test.com
Bcc… swami@test.com; rama@test.com
(1) ram@test.com
(2) ram@test.com; raj@test.com; ravi@test.com
(3) ram@test.com; rama@test.com
(4) ram@test.com; rama@test.com; raj@test.com; ravi@test.com
Answer: (2)
Put the following units of storage into the correct order, starting with the smallest unit first
and going down to the largest unit :
(a) Kilobyte (b) Byte (c) Megabyte
(d) Terabyte (e) Gigabyte (f) Bit
Give your answer from the following code :
(1) (f), (b), (a), (c), (d), (e)
(2) (f), (b), (a), (d), (e), (c)
(3) (f), (b), (a), (c), (e), (d)
(4) (f), (b), (a), (d), (c), (e)
Correct answer is (3) i.e. bit<Byte<KB<MB<GB<TB
With regard to computer memory, which of the following statement(s) is/are TRUE ?
P : Read Only Memory (ROM) is ‘volatile’ memory.
Q : Random Access Memory (RAM) is ‘volatile’ memory.
R : Secondary Memory is ‘volatile’ memory.
(1) P only
(2) Q only
(3) P and Q only
(4) P and R only
Correct answer should be (2) i.e. Random Access Memory (RAM) is ‘volatile’ memory.
Which of the following domains is used for – profit businesses?
(1) .net
(2) .edu
(3) .com
(4) .org
Answer: (3)
The data storage hierarchy consists of:
(1) Bits, bytes, fields, records, files and databases
(2) Bits, bytes, records, fields, files and databases
(3) Bits, bytes, fields, files, records and databases
(4) Bytes, bits, fields, records, files and databases
Answer: (1)
What is the full form of USB as used in computer-related activities?
(1) Universal Security Block
(2) Universal Serial Bus
(3) United Serial Bus
(4) Ultra Security Block
Answer: (2)
What is the name of a web page address?
(1) Directory
(2) Protocol
(3) URL
(4) Domain
Answer: (3)
Which of the following represents billion characters?
(1) Megabytes
(2) Kilobytes
(3) Gigabytes
Answer: (3)
Read the following two statements :
I : Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II : The ‘right to use’ a piece of software is termed as copyright. Which of the above statement(s) is/are CORRECT ?
(1) Both I and II
(2) Neither I nor II
(3) II only
(4) I only
Answer: (2)
Which of the following correctly lists computer memory types from highest to lowest speed ?
(1) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
(2) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
(3) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
(4) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Answer: (2)
Which of the following statement(s) is/are TRUE ?
S1 : The decimal number 11 is larger than the hexadecimal number 11.
S2 : In the binary number 1110.101, the fractional part has the decimal value as 0.625.
(1) S1 only
(2) S2 only
(3) Both S1 and S2
(4) Neither S1 nor S2
Answer: (2)
With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called
(1) Electronic mail
(2) Data sourcing
(3) Mail merge
(4) Spam mail
Answer: (3)
DVD technology uses an optical media to store the digital data. DVD is an acronym for
(1) Digital Vector Disc
(2) Digital Volume Disc
(3) Digital Versatile Disc
(4) Digital Visualization Disc
Answer: (3)
1. The statement “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware” refers to
(1) Information Technology (IT)
(2) Information and Collaborative Technology (ICT)
(3) Information and Data Technology (IDT)
(4) Artificial Intelligence (AI)
Answer: (1)
2. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
(1) 110011 (2) 110010 (3) 110001 (4) 110100
Answer: (1)
3. The process of copying files to a CD-ROM is known as
(1) Burning (2) Zipping (3) Digitizing (4) Ripping
Answer: (1)
4. An unsolicited e-mail message sent to many recipients at once is a
(1) Worm (2) Virus (3) Threat (4) Spam
Answer: (4)
5. ________ is a type of memory circuitry that holds the computer’s start-up routine.
(1) RIM (Read Initial Memory)
(2) RAM (Random Access Memory)
(3) ROM (Read Only Memory)
(4) Cache Memory
Answer: (3)
6. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys mat the computer user selects on the keyboard. ASCII is an acronym for
(1) American Standard Code for Information Interchange
(2) American Standard Code for Intelligent Information
(3) American Standard Code for Information Integrity
(4) American Standard Code for Isolated Information
Answer: (1)
7. NMEICT stands for :
(1) National Mission on Education through ICT
(2) National Mission on E-govemance through ICT
(3) National Mission on E-commerce through ICT
(4) National Mission on E-learning through ICT
Answer: (1)
8. Which of the following is an instant messaging application ?
(a) WhatsApp
(b) Google Talk
(c) Viber
Select the correct answer from the codes given below :
(1) (a) and (b) only (2) (b) and (c) only
(3) (a) only
(4) (a), (b) and (c)
Answer: (4)
9. In a Computer a byte generally consists of :
(1) 4 bits (2) 8 bits (3) 16 bits (4) 10 bits
Answer: (2)
10. Which of the following is not an input device ?
(1) Microphone (2) Keyboard (3) Joystick (4) Monitor
Answer: (4)
11. Which of the following is an open source software ?
(1) MS Word (2) Windows (3) Mozilla Firefox (4) Acrobat Reader
Answer: (3)
12. Which of the following enables us to send the same letter to different persons in MS Word
(1) Mail join (2) Mail copy
(3) Mail insert (4) Mail merge
Answer: (4)
13. Encoding or scrambling data for transmission across a network is known as :
(1) Protection (2) Detection (3) Encryption (4) Decryption
Answer: (3)
14. Which of the following is not an output device ?
(1) Printer (2) Speaker (3) Monitor (4) Keyboard
Answer: (4)
15. Which of the following represents one billion characters ?
(1) Kilobyte (2) Megabyte (3) Gigabyte (4) Terabyte
Answer: (3)
16. Which of the following is not open source software ?
(1) Internet explorer (2) Fedora Linux (3) Open office (4) Apache HTTP server
Answer: (3)
17. Which one of the following represents the binary equivalent of the decimal number 25 ?
(1) 10101 (2) 01101 (3) 11001 (4) 11011
Answer: (3)
18. Which is an instant messenger that is used for chatting ?
(1) Altavista (2) MAC (3) Microsoft Office (4) Google Talk
Answer: (4)
19. CSS stands for
(A) Cascading Style Sheets
(B) Collecting Style Sheets
(C) Comparative Style Sheets
(D) Comprehensive Style Sheets
Answer: (A)
20. MOOC stands for
(A) Media Online Open Course
(B) Massachusetts Open Online Course
(C) Massive Open Online Course
(D) Myrind Open Online Course
Answer: (C)
21. Binary equivalent of decimal number 35 is
(A) 100011 (B) 110001
(C) 110101 (D) 101011
Answer: (A)
22. gif. jpg, bmp, png are used as extensions for files which store
(A) audio data (B) image data (C) video data (D) text data
Answer: (B)
23. Symbols A-F are used in which one of the following ?
(A) Binary number system
(B) Decimal number system
(C) Hexadecimal number system
(D) Octal number system
Answer: (C)
24. Which one of the following is not a search engine ?
(A) Google (B) Chrome
(C) Yahoo (D) Bing
Answer: (B)
25. When a computer is booting, BIOS is loaded to the memory by
(A) RAM (B) ROM
(C) CD-ROM (D) TCP
Answer: (B)
26. Which one of the following is not. the same as the other three ?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address
Answer: (D)
27. Identify the IP address from the following:
(A) 300-215 -317-3
(B) 302-215@ 417 -5
(C) 202 . 50 . 20 . 148
(D) 202-50-20-148
Answer: (C)
28. The acronym FTP stands for
(A) File Transfer Protocol
(B) Fast Transfer Protocol
(C) File Tracking Protocol
(D) File Transfer Procedure
Answer: (A)
29. Which one of the following is not a/an image/graphic file format ?
(A) PNG (B) GIF
(C) BMP (D)GUI
Answer: (D)
30. The first web browser is
(A) Internet Explorer
(B) Netscape
(C) World Wide Web
(D) Firefox
Answer: (C)
31. Which of the following is a social network ?
(A) amazon.com
(B) eBay
(C) gmail.com
(D) Twitter
Answer: (D)
32. Internal communication within institutions is done through
(A) LAN
(B) WAN
(C) EBB
(D) MMS
Answer: (A)
33.’ ‘www’ stands for
(A) work with web
(B) word wide web
(C) world wide web
(D) worth while web
Answer: (C)
34. A hard disk is divided into tracks which is further subdivided into
(A) Clusters (B) Sectors (C) Vectors (D) Head
Answer: (B)
35. A computer program that translates a program statement by statement into machine language is called a / an
(A) Compiler (B) Simulator (C) Translator (D) Interpreter
Answer: (D)
36. A Gigabyte is equal to
(A) 1024 Megabytes
(B) 1024 Kilobytes
(C) 1024 Terabytes
(D) 1024 Bytes
Answer: (A)
37. A Compiler is software which converts
(A). Characters to bits.
(B) High level language to machine language.
(C) Machine language to high level language
(D) Words to bits
Answer: (B)
38. Virtual memory
(A) an extremely large main memory.
(B) an extremely large secondary memory.
(C) an illusion of extremely large main memory
(D) a type of memory used in super computers.
Answer: (C)
39. ALU stands for
(A) American Logic Unit
(B) Alternate Local Unit
(C) Alternating Logic Unit
(D) Arithmetic Logic Unit
Answer: (D)
40. A Personal Computer uses a number of chips mounted on a circuit board called
(A) Microprocessor
(B) System Board
(C) Daughter Board
(D) Mother Board
Answer: (D)
41. Computer Virus is a
(A) Hardware (B) Bacteria (C) Software (D) None of these
Answer: (C)
15. Which one of the following is correct ?
(A) (17)10 = (17)16
(B) (17)10 = (17)8
(C) (17)10 = (10111)2
(D) (17)10 = (10001)2
Answer: (D)
42. The file extension of MS-Word document in Office 2007 is_______.
(A) .pdf (B) .doc
(C) .docx (D) .txt
Answer: (C)
43. _______ is a protocol used by e-mail clients to download e-mails to your computer.
(A) TCP (B) FTP
(C) SMTP (D) POP
Answer: (D)
44. TCP/IP is necessary if one is to connect to the
(A) Phone lines
(B) LAN
(C) Internet
(D) a Server
Answer: (C)
45. Each character on the keyboard of computer has an ASCII value which stands for
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange
(C) African Standard Code for Information Interchange
(D) Adaptable Standard Code for Information Change
Answer: (B)
46. Which of the following is not a programming language ?
(A) Pascal
(B) Microsoft Office
(C) Java
(D) C++
Answer: (B)
47. Minimum number of bits required to store any 3 digit decimal number is equal to
(A) 3
(B) 5
(C) 8
(D) 10
Answer: (D)
48. Internet explorer is a type of
(A) Operating System
(B) Compiler
(C) Browser
(D) IP address
Answer: (C)
49. POP3 and IMAP are e-mail accounts in which
(A) One automatically gets one’s mail everyday
(B) One has to be connected to the server to read or write one’s mail
(C) One only has to be connected to the server to send and receive email
(D) One does not need any telephone lines
Answer: (C)
50. Which of the following operating system is used on mobile phones ?
(A) Windows Vista
(B) Android
(C) Windows XP
(D) All of the above
Answer: (B)
51. If (y)x represents a number y in base x, then which of the following numbers is smallest of all ?
(A) (1111)2 (B) (1111)8 (C) (1111)10 (D) (1111)16
Answer: (A)
52. High level programming language can be converted to machine language using which of the following ?
(A) Oracle (B) Compiler (C) Mat lab (D) Assembler
Answer: (B)
53. HTML is used to create
(A) machine language program
(B) high level program
(C) web page
(D) web server
Answer: (C)
54. The term DNS stands for
(A) Domain Name System
(B) Defense Nuclear System
(C) Downloadable New Software
(D) Dependent Name Server
Answer: (A)
55. IPv4 and IPv6 are addresses used to identify computers on the internet.
Find the correct statement out of the following :
(A) Number of bits required for IPv4 address is more than number of bits required for IPv6 address.
(B) Number of bits required for IPv4 address is same as number of bits required for IPv6 address.
(C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.
(D) Number of bits required for IPv4 address is 64.
Answer: (C)
56. The octal number system consists of the following symbols:
(A) 0 – 7 (B) 0 – 9 (C) 0 – 9, A – F (D) None of the above
Answer: (A)
57. The binary equivalent of (–19)10 in signed magnitude system is
(A) 11101100 (B) 11101101 (C) 10010011 (D) None of these
58. DNS in internet technology stands for
(A) Dynamic Name System (B) Domain Name System (C) Distributed Name System (D) None of these
Answer: (B)
59. HTML stands for
(A) Hyper Text Markup Language
(B) Hyper Text Manipulation Language
(C) Hyper Text Managing Links
(D) Hyper Text Manipulating Links
Answer: (A)
60. Which of the following is type of LAN ?
(A) Ethernet (B) Token Ring (C) FDDI (D) All of the above
Answer: (D)
61. Which of the following statements is true ?
(A) Smart cards do not require an operating system.
(B) Smart cards and PCs use some operating system.
(C) COS is smart card operating system.
(D) The communication between reader and card is in full duplex mode.
Answer: (C)
62. Which one of the following is not an Internet Service Provider (ISP) ?
(A) MTNL (B) BSNL (C) ERNET India (D) Infotech India Ltd.
Answer: (D)
63. The hexadecimal number system consists of the symbols
(A) 0 – 7 (B) 0 – 9 , A – F (C) 0 – 7, A – F (D) None of these
64. The binary equivalent of (–15)10 is (2’s complement system is used)
(A) 11110001 (B) 11110000 (C) 10001111 (D) None of these
65. 1 GB is equal to
(A) 2^30 bits (B) 2^30 bytes (C) 2^20 bits (D) 2^20 bytes
Answer: (B)
66. The set of computer programs that manage the hardware/software of a computer is called
(A) Compiler system (B) Operation system (C) Operating system (D) None of these
Answer: (C)
67. S/MIME in Internet technology stands for
(A) Secure Multipurpose Internet Mail Extension
(B) Secure Multimedia Internet Mail Extension
(C) Simple Multipurpose Internet Mail Extension
(D) Simple Multimedia Internet Mail Extension
Answer: (A)
68. Which number system is usually followed in a typical 32-bit computer ?
(A) 2 (B) 8 (C) 10 (D) 16
Answer: (A)
69. Which one of the following is an example of Operating System ?
(A) Microsoft Word
(B) Microsoft Excel
(C) Microsoft Access
(D) Microsoft Windows
Answer: (D)
70. Which one of the following represent the binary equivalent of the decimal number 23 ?
(A) 01011
(B) 10111
(C) 10011
(D) None of the above
Answer: (B)
71. Which one of the following is different from other members ?
(A) Google
(B) Windows
(C) Linux
(D) Mac
Answer: (A)
72. Where does a computer add and compare its data ?
(A) CPU
(B) Memory
(C) Hard disk
(D) Floppy disk
Answer: (A)
73. Computers on an internet are identified by
(A) e-mail address
(B) street address
(C) IP address
(D) None of the above
Answer: (C)
74. Which of the following is not related to information security on the Internet ?
(A) Data Encryption (B) Water marking
(C) Data Hiding (D) Information Retrieval
75. Which is the largest unit of storage among the following ?
(A) Terabyte (B) Megabyte
(C) Kilobyte (D) Gigabyte
Answer: (A)
76. bit stands for
(A) binary information term (B) binary digit
(C) binary tree (D) Bivariate Theory
Answer: (B)
77. Which one of the following is not a linear data structure ?
(A) Array (B) Binary Tree (C) Queue (D) Stack
Answer: (B)
78. Which one of the following is not a network device ?
(A) Router (B) Switch (C) Hub (D) CPU
Answer: (D)
79. A compiler is used to convert the following to object code which can be executed
(A) High-level language (B) Low-level language
(C) Assembly language (D) Natural language
Answer: (A)
80. What do you need to put your web pages on the www ?
(A) a connection to internet (B) a web browser (C) a web server (D) all of the above
Answer: (D)
81. Which was the first company to launch mobile phone services in India ?
(A) Essar (B) BPL (C) Hutchison (D) Airtel
Answer: (D)
82. Chandrayan I was launched on 22nd October, 2008 in India from :
(A) Bangalore (B) Sri Harikota (C) Chennai (D) Ahmedabad
Answer: (B)
83. What is blog?
(A) Online music
(B) Intranet
(C) A personal or corporate website in the form of an online journal
(D) A personal or corporate Google search
Answer: (C)
84. Which is not online Indian Matrimonial website ?
(A) www.jeevansathi.com (B) www.bharatmatrimony.com
(C) www.shaadi.com (D) www.u.k.singlemuslim.com
Answer: (D)
85. The accounting software ‘Tally’ was developed by :
(A) HCL (B) TCS (C) Infosys (D) Wipro
Answer: (B)
86. Errors in computer programmes are called :
(A) Follies (B) Mistakes (C) Bugs (D) Spam
Answer: (C)
87. HTML is basically used to design:
(A) Web-page (B) Web-site
(C) Graphics (D) Tables and Frames
Answer: (A)
88. ‘Micro Processing’is made for:
(A) Computer (B) Digital System
(C) Calculator (D) Electronic Goods
Answer: (B)
89. Information, a combination of graphics, text, sound, video and animation is called :
(A) Multiprogramme (B) Multifacet
(C) Multimedia (D) Multiprocess
Answer: (C)
90. WYSIWYG – describes the display of a document on screen as it will actually print:
(A) What you state is what you get
(B) What you see is what you get
(C) What you save is what you get
(D) What you suggest is what you get
Answer: (B)
91. Which of the following is not a Computer language ?
(A) PASCAL (B) UNIX
(C) FORTRAN (D) COBOL
Answer: (B)
92. A key-board has at least:
(A) 91 keys (B) 101 keys
(C) 111 keys (D) 121 keys
Answer: (B)
93. An E-mail address is composed of :
(A) two parts (B) three parts
(C) four parts (D) five parts
Answer: (A)
94. Corel Draw is a popular :
(A) Illustration programme (B) Programming language
(C) Text programme (D) None of the above
Answer: (A)
95. CD ROM stands for :
(A) Computer Disk Read Only Memory
(B) Compact Disk Read Over Memory
(C) Compact Disk Read Only Memory
(D) Computer Disk Read Over Memory
Answer: (C)
96. The ‘brain’ of a computer which keeps peripherals under its control is called :
(A) Common Power Unit (B) Common Processing Unit
(C) Central Power Unit (D) Central Processing Unit
Answer: (D)
97. Data can be saved on backing storage medium known as :
(A) Compact Disk Recordable (B) Computer Disk Rewritable
(C) Compact Disk Rewritable (D) Computer Data Rewritable
Answer: (C)
98. RAM means :
(A) Random Access Memory (B) Rigid Access Memory
(C) Rapid Access Memory (D) Revolving Access Memory
Answer: (A)
99. www represents :
(A) who what and where (B) weird wide web
(C) word wide web (D) world wide web
Answer: (D)
100. On the keyboard of computer each character has an “ASCII” value which stands for :
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange
(C) African Standard Code for Information Interchange
(D) Adaptable Standard Code for Information Change
Answer: (B)
101. Which part of the Central Processing Unit (CPU) performs calculation and makes decisions :
(A) Arithematic Logic Unit (B) Alternating Logic Unit
(C) Alternate Local Unit (D) American Logic Unit
Answer: (A)
102. “Dpi” stands for :
(A) Dots per inch (B) Digits per unit
(C) Dots pixel inch (D) Diagrams per inch
Answer: (A)
103. The process of laying out a document with text, graphics, headlines and photographs is involved in
(A) Deck Top Publishing (B) Desk Top Printing
(C) Desk Top Publishing (D) Deck Top Printing
Answer: (C)
104. Transfer of data from one application to another line is known as :
(A) Dynamic Disk Exchange (B) Dodgy Data Exchange
(C) Dogmatic Data Exchange (D) Dynamic Data Exchange
Answer: (D)
105. LAN stands for :
(A) Local And National (B) Local Area Network
(C) Large Area Network (D) Live Area Network
Answer: (B)
106. Which of the following statement is correct ?
(A) Modem is a software
(B) Modem helps in stabilizing the voltage
(C) Modem is the operating system
(D) Modem converts the analog signal into digital signal and vice-versa
Answer: (D)
107. Which of the following is the appropriate definition of a computer ?
(A) Computer is a machine that can process information.
(B) Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately.
(C) Computer is an electronic device that can store, retrieve and quickly process only quantitative data.
(D) Computer is a machine that can store, retrieve and process quickly and accurately only qualitative
Answer: (B)
information
108. Information and Communication Technology includes :
(A) On line learning (B) Learning through the use of EDUSAT
(C) Web Based Learning (D) All the above
Answer: (D)
109. Which of the following is the appropriate format of URL of e-mail ?
(A) www_mail.com (B) www@mail.com
(C) WWW@mail.com (D) www.mail.com
Answer: (B)
110. Using websites to pour out one’s grievances is called :
(A) cyber venting (B) cyber ranting
(C) web hate (D) web plea
Answer: (A)
111. In web search, finding a large number of documents with very little relevant information is termed:
(A) poor recall (B) web crawl
(C) poor precision rate (D) poor web response
Answer: (B)
112. The concept of connect intelligence is derived from :
(A) virtual reality (B) fuzzy logic
(C) Bluetooth technology (D) value added networks
Answer: (D)
113. Use of an ordinary telephone as an Internet appliance is called :
(A) voice net (B) voice telephone
(C) voice line (D) voice portal
Answer: (C)
114. Video transmission over the Internet that looks like delayed live casting is called :
(A) virtual video (B) direct broadcast
(C) video shift (D) real-time video
Answer: (D)
2 comments
Interesting, a helping hand
Very good site for revision of examination