ugcnetpaper1.com
Best Guide for NTA NET Exam Paper1

MCQ ICT | Information and Communication Technology(ICT) | UPDATED 2019

ICT MCQ Based on Solved Paper UGC NTA NET EXAM 2006-2019

7

MCQ Based On Information and Communication Technology (ICT) Topic

This comprehensive MCQ ICT  is specially developed for the candidates of the UGC NET Exam (For Compulsory Paper-I) Teaching and Research Aptitude for the purpose of the practice of questions based on the pattern of the examination.

Please feel free to reach us in case you need more info or comment to highlight any issues with the above question set.

For sake of relevance, they are given in reverse order starting from the latest exam until the year 2006 Exam. There are instance were question were repeated and by changing sentence formation so keep attention to details

(MCQ Based on Solved Paper UGC NET EXAM 2006-2019)

 Questions based on NTA UGC NET EXAM  JUNE 2019(Memory-Based)

Select the true statement about an operating system (OS)?
(1) An OS controls peripheral, allocates memory and organises data into fields and records.
(2) An OS provides protection against viruses and controls peripherals.
(3) An OS controls peripheral, and allocates memory and processor time.
(4) An OS controls the processor and peripherals and allows the user to connect to the internet

Answer:  Options look confusing however ans given was 3.

Which of the following is a type of malware intentionally inserted into a software system that
will set off a malicious function when specified conditions are met?
(1) Worm (2) Trojan
(3) Spyware (4) Logic bomb

Answer:  A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should he or she ever be terminated from the company.

Which of the following statements(s) is/are true in respect of wireless technology?
P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile phone.
Q: Bluetooth is a long-range wireless technology and is a low cost means of data transfer.
(1) P only (2) Q only
(3) Both P and Q (4) Neither P nor Q

Answer: P only; As Bluetooth is a protocol for wireless communication over short distances. It was developed in the 1990s, to reduce the number of cables. Devices such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles can connect to each other, and exchange information. This is done using radio waves. It can be done securely. Bluetooth is only used for relatively short distances, like a few metres.

Which of the following file format is not a video file format?
(1) .AVI (2) .MOV
(3) .MP4 (4) .

Answer: JPEG (/ˈdʒeɪpɛɡ/ JAY-peg) is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography. Rest all others are Video file formate.

SMTP is an acronym for:
(1) Simple Mail Transport Protocol
(2) Simple Mail Terminal Protocol
(3) Simple Mail Transfer Protocol
(4) Simple Mail Transition Protocol

Answer: SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication guidelines that allow the software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol. It is a program used for sending messages to other computer users based on e-mail addresses.

A computer has a main memory of 960 Kbytes. What is the exact number of bytes contained in this
memory?
(1) 960 × 8
(2) 960 × 1000
(3) 960 × 1024
(4) 960 × 1024 × 1024

Answer: Kilobyte is the unit of digital information with prefix kilo (10 * 3). 1 Kilobyte is equal to 10 * 3 bytes = 1000 bytes in decimal (SI). 1 Kilobyte is equal to 2 * 10 bytes = 1024 bytes in the binary.

So this answer is also confusing; the However the best answer should be 960 × 1000.

The convenient place to store contact information for quick retrieval in e-mail is:
(1) Address box (2) Message box
(3) Address book (4) Message book

Answer: Address book

Why would BCC: be used in an e-mail?
(1) BCC: allows the recipient to identify all the other recipients in the list when a group email
address is used.
(2) BCC: allows the sender to indicate who the email is for if there is more than one recipient.
(3) BCC: allows the sender of a message to conceal the recipient entered in the BCC: field from
the other recipients.
(4) BCC: allows recipients to be visible to all other recipients of the message.

Answer: Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address.

Jatin’s laptop has an LCD screen. The acronym LCD stands for:
(1) Light Crystal Display
(2) Liquid Compact Display
(3) Light Compact Display
(4) Liquid Crystal Display

Answer: A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated optical devices that uses the light-modulating properties of liquid crystals. Liquid crystals do not emit light directly, instead of using a backlight or reflector to produce images in color or monochrome.

Which of the following is an example of proprietary system software?
(1) Linux
(2) Microsoft Internet explorer
(3) Microsoft office
(4) Microsoft windows

Answer: Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer. Proprietary software remains the property of its owner/creator and is used by end-users/organizations under predefined conditions.

With respect to computers, which one of the following best describes phishing?
(1) A malicious program installed on a system that stays concealed to avoid detection.
(2) A method of bypassing normal authentication procedures over a connection to a network.
(3) A type of unsolicited bulk email of identical messages sent to numerous recipients.
(4) An attempt to acquire sensitive information for malicious reasons, by masquerading as a
trustworthy entity.

Answer: Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

A computer network which is used within a building is called a:
(1) WAN (2) MAN
(3) LAN (4) SAN

Answer: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables.

A/An ________ is a computer program that spreads by inserting copies of itself into other
executable code or documents.
(1) Operating system
(2) Computer Virus
(3) Firewall
(4) Anti-virus

Answer: Viruses. A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data).

Which of the following is not a/an web browser?
(1) Internet Explorer
(2) Mozilla Firefox
(3) Google Chrome
(4) Yahoo

Answer: Yahoo

One Terabyte (TB) of memory is equal to:
(1) 1024 KB
(2) 1024 × 1024 KB
(3) 1024 × 1024 × 1024 KB
(4) 1024 × 1024 × 1024 Bytes

Answer :
The basic unit used in computer data storage is called a bit .
Bit : A Bit is a value of either a 0 or 1.
Byte : 1 Byte = 8 Bits
Kilobyte (KB) : 1 KB = 8,192 Bits ,
1 kB = 1,024 Bytes
Megabyte (MB) 1MB =1024 KB
Gigabyte (GB) 1GB = 1024 MB
Terabyte (TB) 1TB = 1024 GB
Petabyte (PB) 1PB = 1024 TB
Exabyte (EB) 1EB = 1024 PB
Zettabyte (ZB) 1ZB = 1024 EB

So from this 1 TB = 1024 GB

 Questions based on NTA UGC NET EXAM  DEC 2018(Memory-Based)

As you all know DEC 2018  exam was Online test and question papers were not released by NTA…so we have covered the memory-based question based on the feedback of students.

Which one of the following processes is the main task for the computer in mapping the geographical data?

  1. Data storage
  2. Data visualization
  3. Data retrieving and drawing
  4. Data Collection

Answer:  Options look confusing however ans given was 3.

 In computer terminology which of following describe device drivers

  1. Hardware that allows interaction between peripheral device and the operating system.
  2. Software that allow the user to control the operating system
  3. Software that allows interaction between peripheral device and the operating system.
  4. Software that allow the user to control the operating system

Answer:  3- Device drivers are software you install to work with hardware with OS

Which of the following is not true about RAM?

  1. RAM is a temporary storage area
  2. RAM is the same as hard disk storage
  3. RAM is volatile
  4. Information stored in RAM is gone when you turn the computer off

Answer: 2

Most World Wide Web pages contain commands in the language _______________

  • NIH
  • URL
  • HTML
  • IRC

Answer: 3

Which one of the following would not be considered as a form of secondary storage?

  1. Floppy Disk
  2. Optical Disk
  3. RAM
  4. Flash Drive

Answer: 3

What does the acronym WAN stand for?

  1. Widest Area Network
  2. Wild Area Network
  3. Wide Area Networking
  4. Wide Area Network

Answer: 4

FTP is an acronym for–

  1. File Transaction Protocol
  2. File Truncation Protocol
  3. File Translation Protocol
  4. File Transfer Protocol

Answer: 4

Bluetooth is a type of radio wave information transmission system that is good for about ____________

1) 30 feet

2) 30 yards

3) 30 miles

4) 300 miles

Answer: 1

 Questions based on CBSE UGC NET EXAM  JULY 2018

Which of the following statements, regarding the term ICT is/are TRUE ?
P : ICT is an acronym that stands for Indian Classical Technology.
Q : Converging technologies that exemplify ICT include the merging of audio-visual,
telephone and computer networks through a common cabling system.
(1) P only
(2) Q only
(3) P and Q
(4) Neither P nor Q
Answer: (2)

A new Laptop has been produced that weighs less, is smaller and uses less power than
previous Laptop models. Which of the following technologies has been used to accomplish this ?
(1) Universal Serial Bus Mouse
(2) Faster Random Access Memory
(3) Blu Ray Drive
(4) Solid State Hard Drive
Answer: (4)

Given the following email fields, which of the email addresses will ‘swami’ be able to see
when he receives the message ?
To… ram@test.com
Cc… raj@test.com; ravi@test.com
Bcc… swami@test.com; rama@test.com
(1) ram@test.com
(2) ram@test.com; raj@test.com; ravi@test.com
(3) ram@test.com; rama@test.com
(4) ram@test.com; rama@test.com; raj@test.com; ravi@test.com
Answer: (2)

Put the following units of storage into the correct order, starting with the smallest unit first
and going down to the largest unit :
(a) Kilobyte (b) Byte (c) Megabyte
(d) Terabyte (e) Gigabyte (f) Bit
Give your answer from the following code :
(1) (f), (b), (a), (c), (d), (e)
(2) (f), (b), (a), (d), (e), (c)
(3) (f), (b), (a), (c), (e), (d)
(4) (f), (b), (a), (d), (c), (e)
Correct answer is (3) i.e. bit<Byte<KB<MB<GB<TB

With regard to computer memory, which of the following statement(s) is/are TRUE ?
P : Read Only Memory (ROM) is ‘volatile’ memory.
Q : Random Access Memory (RAM) is ‘volatile’ memory.
R : Secondary Memory is ‘volatile’ memory.
(1) P only
(2) Q only
(3) P and Q only
(4) P and R only
Correct answer should be (2) i.e. Random Access Memory (RAM) is ‘volatile’ memory.

Related Posts
1 of 4
 Questions based on CBSE UGC NET EXAM  NOV 2017

Which of the following domains is used for – profit businesses?
(1) .net
(2) .edu
(3) .com
(4) .org
Answer: (3)

The data storage hierarchy consists of:
(1) Bits, bytes, fields, records, files and databases
(2) Bits, bytes, records, fields, files and databases
(3) Bits, bytes, fields, files, records and databases
(4) Bytes, bits, fields, records, files and databases
Answer: (1)

What is the full form of USB as used in computer-related activities?
(1) Universal Security Block
(2) Universal Serial Bus
(3) United Serial Bus
(4) Ultra Security Block
Answer: (2)

What is the name of a web page address?
(1) Directory
(2) Protocol
(3) URL
(4) Domain
Answer: (3)

Which of the following represents billion characters?
(1) Megabytes
(2) Kilobytes
(3) Gigabytes

Answer: (3)

 Questions based on CBSE UGC NET EXAM  JAN 2017

Read the following two statements :
I : Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II : The ‘right to use’ a piece of software is termed as copyright. Which of the above statement(s) is/are CORRECT ?

(1) Both I and II

(2) Neither I nor II

(3) II only

(4) I only
Answer: (2)

Which of the following correctly lists computer memory types from highest to lowest speed ?
(1) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers

(2) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)

(3) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage

(4) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage

Answer: (2)

 Which of the following statement(s) is/are TRUE ?
S1 : The decimal number 11 is larger than the hexadecimal number 11.
S2 : In the binary number 1110.101, the fractional part has the decimal value as 0.625.
(1) S1 only
(2) S2 only
(3) Both S1 and S2

(4) Neither S1 nor S2
Answer: (2)

With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called

(1) Electronic mail

(2) Data sourcing
(3) Mail merge
(4) Spam mail

Answer: (3)
DVD technology uses an optical media to store the digital data. DVD is an acronym for

(1) Digital Vector Disc

(2) Digital Volume Disc
(3) Digital Versatile Disc
(4) Digital Visualization Disc

Answer: (3)

 Questions based on UGC NET Exam July 2016

1. The statement “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware” refers to
(1) Information Technology (IT)
(2) Information and Collaborative Technology (ICT)
(3) Information and Data Technology (IDT)
(4) Artificial Intelligence (AI)
Answer: (1)
2. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
(1) 110011 (2) 110010 (3) 110001 (4) 110100
Answer: (1)

3. The process of copying files to a CD-ROM is known as
(1) Burning (2) Zipping (3) Digitizing (4) Ripping
Answer: (1)
4. An unsolicited e-mail message sent to many recipients at once is a
(1) Worm (2) Virus (3) Threat (4) Spam
Answer: (4)
5. ________ is a type of memory circuitry that holds the computer’s start-up routine.
(1) RIM (Read Initial Memory)
(2) RAM (Random Access Memory)
(3) ROM (Read Only Memory)
(4) Cache Memory
Answer: (3)
6. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys mat the computer user selects on the keyboard. ASCII is an acronym for
(1) American Standard Code for Information Interchange
(2) American Standard Code for Intelligent Information
(3) American Standard Code for Information Integrity
(4) American Standard Code for Isolated Information
Answer: (1)

 Questions based on UGC NET Exam DECEMBER 2015

7. NMEICT stands for :
(1) National Mission on Education through ICT
(2) National Mission on E-govemance through ICT
(3) National Mission on E-commerce through ICT
(4) National Mission on E-learning through ICT
Answer: (1)
8. Which of the following is an instant messaging application ?
(a) WhatsApp
(b) Google Talk
(c) Viber
Select the correct answer from the codes given below :
(1) (a) and (b) only (2) (b) and (c) only
(3) (a) only
(4) (a), (b) and (c)
Answer: (4)
9. In a Computer a byte generally consists of :
(1) 4 bits (2) 8 bits (3) 16 bits (4) 10 bits
Answer: (2)
10. Which of the following is not an input device ?
(1) Microphone (2) Keyboard (3) Joystick (4) Monitor
Answer: (4)
11. Which of the following is an open source software ?
(1) MS Word (2) Windows (3) Mozilla Firefox (4) Acrobat Reader
Answer: (3)
12. Which of the following enables us to send the same letter to different persons in MS Word
(1) Mail join (2) Mail copy
(3) Mail insert (4) Mail merge
Answer: (4)

 Questions based on UGC NET Exam JUNE 2015

13. Encoding or scrambling data for transmission across a network is known as :
(1) Protection (2) Detection (3) Encryption (4) Decryption
Answer: (3)
14. Which of the following is not an output device ?
(1) Printer (2) Speaker (3) Monitor (4) Keyboard
Answer: (4)
15. Which of the following represents one billion characters ?
(1) Kilobyte (2) Megabyte (3) Gigabyte (4) Terabyte
Answer: (3)
16. Which of the following is not open source software ?
(1) Internet explorer (2) Fedora Linux (3) Open office (4) Apache HTTP server
Answer: (3)
17. Which one of the following represents the binary equivalent of the decimal number 25 ?
(1) 10101 (2) 01101 (3) 11001 (4) 11011
Answer: (3)
18. Which is an instant messenger that is used for chatting ?
(1) Altavista (2) MAC (3) Microsoft Office (4) Google Talk
Answer: (4)

 Questions based on UGC NET Exam DECEMBER 2014

19. CSS stands for
(A) Cascading Style Sheets
(B) Collecting Style Sheets
(C) Comparative Style Sheets
(D) Comprehensive Style Sheets
Answer: (A)
20. MOOC stands for
(A) Media Online Open Course
(B) Massachusetts Open Online Course
(C) Massive Open Online Course
(D) Myrind Open Online Course
Answer: (C)
21. Binary equivalent of decimal number 35 is
(A) 100011 (B) 110001
(C) 110101 (D) 101011
Answer: (A)
22. gif. jpg, bmp, png are used as extensions for files which store
(A) audio data (B) image data (C) video data (D) text data
Answer: (B)
23. Symbols A-F are used in which one of the following ?
(A) Binary number system
(B) Decimal number system
(C) Hexadecimal number system
(D) Octal number system
Answer: (C)
24. Which one of the following is not a search engine ?
(A) Google (B) Chrome
(C) Yahoo (D) Bing
Answer: (B)

 Questions based on UGC NET Exam JUNE 2014

25. When a computer is booting, BIOS is loaded to the memory by
(A) RAM (B) ROM
(C) CD-ROM (D) TCP
Answer: (B)
26. Which one of the following is not. the same as the other three ?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address
Answer: (D)
27. Identify the IP address from the following:
(A) 300-215 -317-3
(B) 302-215@ 417 -5
(C) 202 . 50 . 20 . 148
(D) 202-50-20-148
Answer: (C)
28. The acronym FTP stands for
(A) File Transfer Protocol
(B) Fast Transfer Protocol
(C) File Tracking Protocol
(D) File Transfer Procedure
Answer: (A)
29. Which one of the following is not a/an image/graphic file format ?
(A) PNG (B) GIF
(C) BMP (D)GUI
Answer: (D)
30. The first web browser is
(A) Internet Explorer
(B) Netscape
(C) World Wide Web
(D) Firefox
Answer: (C)

 Questions based on UGC NET Exam DECEMBER 2013

31. Which of the following is a social network ?
(A) amazon.com
(B) eBay
(C) gmail.com
(D) Twitter
Answer: (D)
32. Internal communication within institutions is done through
(A) LAN
(B) WAN
(C) EBB
(D) MMS
Answer: (A)

 Questions based on UGC NET Exam JUNE 2013

33.’ ‘www’ stands for
(A) work with web
(B) word wide web
(C) world wide web
(D) worth while web
Answer: (C)
34. A hard disk is divided into tracks which is further subdivided into
(A) Clusters (B) Sectors (C) Vectors (D) Head
Answer: (B)
35. A computer program that translates a program statement by statement into machine language is called a / an
(A) Compiler (B) Simulator (C) Translator (D) Interpreter
Answer: (D)
36. A Gigabyte is equal to
(A) 1024 Megabytes
(B) 1024 Kilobytes
(C) 1024 Terabytes
(D) 1024 Bytes
Answer: (A)
37. A Compiler is software which converts
(A). Characters to bits.
(B) High level language to machine language.
(C) Machine language to high level language
(D) Words to bits
Answer: (B)
38. Virtual memory
(A) an extremely large main memory.
(B) an extremely large secondary memory.
(C) an illusion of extremely large main memory
(D) a type of memory used in super computers.
Answer: (C)

 Questions based on UGC NET Exam DECEMBER 2012

39. ALU stands for
(A) American Logic Unit
(B) Alternate Local Unit
(C) Alternating Logic Unit
(D) Arithmetic Logic Unit
Answer: (D)
40. A Personal Computer uses a number of chips mounted on a circuit board called
(A) Microprocessor
(B) System Board
(C) Daughter Board
(D) Mother Board
Answer: (D)
41. Computer Virus is a
(A) Hardware (B) Bacteria (C) Software (D) None of these
Answer: (C)
15. Which one of the following is correct ?
(A) (17)10 = (17)16
(B) (17)10 = (17)8
(C) (17)10 = (10111)2
(D) (17)10 = (10001)2
Answer: (D)
42. The file extension of MS-Word document in Office 2007 is_______.
(A) .pdf (B) .doc
(C) .docx (D) .txt
Answer: (C)
43. _______ is a protocol used by e-mail clients to download e-mails to your computer.
(A) TCP (B) FTP
(C) SMTP (D) POP
Answer: (D)

 Questions based on UGC NET Exam JUNE 2012

44. TCP/IP is necessary if one is to connect to the
(A) Phone lines
(B) LAN
(C) Internet
(D) a Server
Answer: (C)
45. Each character on the keyboard of computer has an ASCII value which stands for
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange
(C) African Standard Code for Information Interchange
(D) Adaptable Standard Code for Information Change
Answer: (B)
46. Which of the following is not a programming language ?
(A) Pascal
(B) Microsoft Office
(C) Java
(D) C++
Answer: (B)
47. Minimum number of bits required to store any 3 digit decimal number is equal to
(A) 3
(B) 5
(C) 8
(D) 10
Answer: (D)
48. Internet explorer is a type of
(A) Operating System
(B) Compiler
(C) Browser
(D) IP address
Answer: (C)
49. POP3 and IMAP are e-mail accounts in which
(A) One automatically gets one’s mail everyday
(B) One has to be connected to the server to read or write one’s mail
(C) One only has to be connected to the server to send and receive email
(D) One does not need any telephone lines
Answer: (C)

 Questions based on UGC NET Exam DECEMBER 2011

50. Which of the following operating system is used on mobile phones ?
(A) Windows Vista
(B) Android
(C) Windows XP
(D) All of the above
Answer: (B)
51. If (y)x represents a number y in base x, then which of the following numbers is smallest of all ?
(A) (1111)2 (B) (1111)8 (C) (1111)10 (D) (1111)16
Answer: (A)
52. High level programming language can be converted to machine language using which of the following ?
(A) Oracle (B) Compiler (C) Mat lab (D) Assembler
Answer: (B)
53. HTML is used to create
(A) machine language program
(B) high level program
(C) web page
(D) web server
Answer: (C)
54. The term DNS stands for
(A) Domain Name System
(B) Defense Nuclear System
(C) Downloadable New Software
(D) Dependent Name Server
Answer: (A)
55. IPv4 and IPv6 are addresses used to identify computers on the internet.
Find the correct statement out of the following :
(A) Number of bits required for IPv4 address is more than number of bits required for IPv6 address.
(B) Number of bits required for IPv4 address is same as number of bits required for IPv6 address.
(C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.
(D) Number of bits required for IPv4 address is 64.
Answer: (C)

 Questions based on UGC NET Exam JUNE 2011

56. The octal number system consists of the following symbols:
(A) 0 – 7 (B) 0 – 9 (C) 0 – 9, A – F (D) None of the above
Answer: (A)
57. The binary equivalent of (–19)10 in signed magnitude system is
(A) 11101100 (B) 11101101 (C) 10010011 (D) None of these
58. DNS in internet technology stands for
(A) Dynamic Name System (B) Domain Name System (C) Distributed Name System (D) None of these
Answer: (B)
59. HTML stands for
(A) Hyper Text Markup Language
(B) Hyper Text Manipulation Language
(C) Hyper Text Managing Links
(D) Hyper Text Manipulating Links
Answer: (A)
60. Which of the following is type of LAN ?
(A) Ethernet (B) Token Ring (C) FDDI (D) All of the above
Answer: (D)
61. Which of the following statements is true ?
(A) Smart cards do not require an operating system.
(B) Smart cards and PCs use some operating system.
(C) COS is smart card operating system.
(D) The communication between reader and card is in full duplex mode.
Answer: (C)

 Questions based on UGC NET Exam DECEMBER 2010

62. Which one of the following is not an Internet Service Provider (ISP) ?
(A) MTNL (B) BSNL (C) ERNET India (D) Infotech India Ltd.
Answer: (D)
63. The hexadecimal number system consists of the symbols
(A) 0 – 7 (B) 0 – 9 , A – F (C) 0 – 7, A – F (D) None of these
64. The binary equivalent of (–15)10 is (2’s complement system is used)
(A) 11110001 (B) 11110000 (C) 10001111 (D) None of these
65. 1 GB is equal to
(A) 2^30 bits (B) 2^30 bytes (C) 2^20 bits (D) 2^20 bytes
Answer: (B)
66. The set of computer programs that manage the hardware/software of a computer is called
(A) Compiler system (B) Operation system (C) Operating system (D) None of these
Answer: (C)
67. S/MIME in Internet technology stands for
(A) Secure Multipurpose Internet Mail Extension
(B) Secure Multimedia Internet Mail Extension
(C) Simple Multipurpose Internet Mail Extension
(D) Simple Multimedia Internet Mail Extension
Answer: (A)

 Questions based on UGC NET Exam JUNE 2010

68. Which number system is usually followed in a typical 32-bit computer ?
(A) 2 (B) 8 (C) 10 (D) 16
Answer: (A)
69. Which one of the following is an example of Operating System ?
(A) Microsoft Word
(B) Microsoft Excel
(C) Microsoft Access
(D) Microsoft Windows
Answer: (D)
70. Which one of the following represent the binary equivalent of the decimal number 23 ?
(A) 01011
(B) 10111
(C) 10011
(D) None of the above
Answer: (B)
71. Which one of the following is different from other members ?
(A) Google
(B) Windows
(C) Linux
(D) Mac
Answer: (A)
72. Where does a computer add and compare its data ?
(A) CPU
(B) Memory
(C) Hard disk
(D) Floppy disk
Answer: (A)
73. Computers on an internet are identified by
(A) e-mail address
(B) street address
(C) IP address
(D) None of the above
Answer: (C)

 Questions based on UGC NET Exam DECEMBER 2009

74. Which of the following is not related to information security on the Internet ?
(A) Data Encryption (B) Water marking
(C) Data Hiding (D) Information Retrieval
75. Which is the largest unit of storage among the following ?
(A) Terabyte (B) Megabyte
(C) Kilobyte (D) Gigabyte
Answer: (A)
76. bit stands for
(A) binary information term (B) binary digit
(C) binary tree (D) Bivariate Theory
Answer: (B)
77. Which one of the following is not a linear data structure ?
(A) Array (B) Binary Tree (C) Queue (D) Stack
Answer: (B)
78. Which one of the following is not a network device ?
(A) Router (B) Switch (C) Hub (D) CPU
Answer: (D)
79. A compiler is used to convert the following to object code which can be executed
(A) High-level language (B) Low-level language
(C) Assembly language (D) Natural language
Answer: (A)

 Questions based on UGC NET Exam  JUNE 2009

80. What do you need to put your web pages on the www ?
(A) a connection to internet (B) a web browser (C) a web server (D) all of the above
Answer: (D)
81. Which was the first company to launch mobile phone services in India ?
(A) Essar (B) BPL (C) Hutchison (D) Airtel
Answer: (D)
82. Chandrayan I was launched on 22nd October, 2008 in India from :
(A) Bangalore (B) Sri Harikota (C) Chennai (D) Ahmedabad
Answer: (B)
83. What is blog?
(A) Online music
(B) Intranet
(C) A personal or corporate website in the form of an online journal
(D) A personal or corporate Google search
Answer: (C)
84. Which is not online Indian Matrimonial website ?
(A) www.jeevansathi.com (B) www.bharatmatrimony.com
(C) www.shaadi.com (D) www.u.k.singlemuslim.com
Answer: (D)

 Questions based on UGC NET Exam DECEMBER 2008

85. The accounting software ‘Tally’ was developed by :
(A) HCL (B) TCS (C) Infosys (D) Wipro
Answer: (B)
86. Errors in computer programmes are called :
(A) Follies (B) Mistakes (C) Bugs (D) Spam
Answer: (C)
87. HTML is basically used to design:
(A) Web-page (B) Web-site
(C) Graphics (D) Tables and Frames
Answer: (A)
88. ‘Micro Processing’is made for:
(A) Computer (B) Digital System
(C) Calculator (D) Electronic Goods
Answer: (B)
89. Information, a combination of graphics, text, sound, video and animation is called :
(A) Multiprogramme (B) Multifacet
(C) Multimedia (D) Multiprocess
Answer: (C)

Questions based on UGC NET Exam  JUNE 2008

90. WYSIWYG – describes the display of a document on screen as it will actually print:
(A) What you state is what you get
(B) What you see is what you get
(C) What you save is what you get
(D) What you suggest is what you get
Answer: (B)
91. Which of the following is not a Computer language ?
(A) PASCAL (B) UNIX
(C) FORTRAN (D) COBOL
Answer: (B)
92. A key-board has at least:
(A) 91 keys (B) 101 keys
(C) 111 keys (D) 121 keys
Answer: (B)
93. An E-mail address is composed of :
(A) two parts (B) three parts
(C) four parts (D) five parts
Answer: (A)
94. Corel Draw is a popular :
(A) Illustration programme (B) Programming language
(C) Text programme (D) None of the above
Answer: (A)

Questions based on UGC NET Exam DECEMBER 2007

95. CD ROM stands for :
(A) Computer Disk Read Only Memory
(B) Compact Disk Read Over Memory
(C) Compact Disk Read Only Memory
(D) Computer Disk Read Over Memory
Answer: (C)
96. The ‘brain’ of a computer which keeps peripherals under its control is called :
(A) Common Power Unit (B) Common Processing Unit
(C) Central Power Unit (D) Central Processing Unit
Answer: (D)
97. Data can be saved on backing storage medium known as :
(A) Compact Disk Recordable (B) Computer Disk Rewritable
(C) Compact Disk Rewritable (D) Computer Data Rewritable
Answer: (C)
98. RAM means :
(A) Random Access Memory (B) Rigid Access Memory
(C) Rapid Access Memory (D) Revolving Access Memory
Answer: (A)
99. www represents :
(A) who what and where (B) weird wide web
(C) word wide web (D) world wide web
Answer: (D)

Questions based on UGC NET Exam JUNE 2007

100. On the keyboard of computer each character has an “ASCII” value which stands for :
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange
(C) African Standard Code for Information Interchange
(D) Adaptable Standard Code for Information Change
Answer: (B)
101. Which part of the Central Processing Unit (CPU) performs calculation and makes decisions :
(A) Arithematic Logic Unit (B) Alternating Logic Unit
(C) Alternate Local Unit (D) American Logic Unit
Answer: (A)
102. “Dpi” stands for :
(A) Dots per inch (B) Digits per unit
(C) Dots pixel inch (D) Diagrams per inch
Answer: (A)
103. The process of laying out a document with text, graphics, headlines and photographs is involved in
(A) Deck Top Publishing (B) Desk Top Printing
(C) Desk Top Publishing (D) Deck Top Printing
Answer: (C)
104. Transfer of data from one application to another line is known as :
(A) Dynamic Disk Exchange (B) Dodgy Data Exchange
(C) Dogmatic Data Exchange (D) Dynamic Data Exchange
Answer: (D)

Questions based on UGC NET Exam DECEMBER 2006

105. LAN stands for :
(A) Local And National (B) Local Area Network
(C) Large Area Network (D) Live Area Network
Answer: (B)
106. Which of the following statement is correct ?
(A) Modem is a software
(B) Modem helps in stabilizing the voltage
(C) Modem is the operating system
(D) Modem converts the analog signal into digital signal and vice-versa
Answer: (D)
107. Which of the following is the appropriate definition of a computer ?
(A) Computer is a machine that can process information.
(B) Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately.
(C) Computer is an electronic device that can store, retrieve and quickly process only quantitative data.
(D) Computer is a machine that can store, retrieve and process quickly and accurately only qualitative
Answer: (B)
information
108. Information and Communication Technology includes :
(A) On line learning (B) Learning through the use of EDUSAT
(C) Web Based Learning (D) All the above
Answer: (D)
109. Which of the following is the appropriate format of URL of e-mail ?
(A) www_mail.com (B) www@mail.com
(C) WWW@mail.com (D) www.mail.com
Answer: (B)

Questions based on UGC NET Exam JUNE 2006

110. Using websites to pour out one’s grievances is called :
(A) cyber venting (B) cyber ranting
(C) web hate (D) web plea
Answer: (A)
111. In web search, finding a large number of documents with very little relevant information is termed:
(A) poor recall (B) web crawl
(C) poor precision rate (D) poor web response
Answer: (B)
112. The concept of connect intelligence is derived from :
(A) virtual reality (B) fuzzy logic
(C) Bluetooth technology (D) value added networks
Answer: (D)
113. Use of an ordinary telephone as an Internet appliance is called :
(A) voice net (B) voice telephone
(C) voice line (D) voice portal
Answer: (C)
114. Video transmission over the Internet that looks like delayed live casting is called :
(A) virtual video (B) direct broadcast
(C) video shift (D) real-time video
Answer: (D)

Leave A Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  1. Mohit Arora says

    Ans of 6th question is 960*1024. Pls verify..

  2. Danielaffic says

    This is a great article. This website is loaded with lots of useful things, it helped me in many ways.

  3. Ashhi Ag says

    P

  4. Amit kumar says

    Put the following units of storage into the correct order, starting with the smallest unit first
    and going down to the largest unit :
    (a) Kilobyte (b) Byte (c) Megabyte
    (d) Terabyte (e) Gigabyte (f) Bit
    Give your answer from the following code :
    (1) (f), (b), (a), (c), (d), (e)
    (2) (f), (b), (a), (d), (e), (c)
    (3) (f), (b), (a), (c), (e), (d)
    (4) (f), (b), (a), (d), (c), (e)
    Answer: (1)

    I think Ans will be (3)

  5. Sanjay Mishra says

    Thanks for reaching out … could you please highlight the wrong answer you see… we will be more than happy to correct it !….. Some time during data entry operations … Questions Answer gets wrong !

  6. Narayan Changder says

    Nailed it. Seriously, I’ve never seen this kind of detailed Article. Really Appreciating.

    1. चंदन कुमार says

      Yup sir…But you also one of the best teacher who taught student well…
      I’m chadan kumar your fb oldest student… Recalls once..

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More