Sie sind auf Seite 1von 28

CCC sample Question

Sr No. Question A B C D Ans

A …………… bar that informs you


about the available options in computer,
1 open applications background running Status bar Taskbar Toolbar Menu bar B
applications and can be used to switch
between applications
Conventional rules for correct behavior Native
2 Rules Good behavior Protocols C
on the internet are known as? quotes
A program embedded in a
3 semiconductor chip during their Firmware Liveware Humanware Hardware D
manufacturer is called……….
4 What is the size of an ipv4 address? 32 Bits 64 Bit 16 Bit 128 Bit A
International International
International Internal
5 IMF stands for…………….. monetary monetary D
money fund monetary fund
Foundation fund

Which tab is available on left panel


6 Notes Handout Outline Slide A
when you open a presentation?
Print icon from
You can print the documents enter a All of the
7 standard File menu Ctrl + p A
print command from………… above
toolbar

Overwrite mode and insert mode


Formatting
8 options are shown on which of the Status bar Menu bar Toolbar C
bar
following bars in the
Which part of the CPU is used for
9 ALU Control unit Modem Disc unit A
calculating and comparing?
In Calc which of these is not available Delete entire Shift cells
10 Shift cell up Shift cell down A
while deleting any Cell…………….. row left
Print icon
Print
You can print the All of the from
11 Ctrl + P command B
documents……………………… above standard
from file menu
toolbar
What would I choose to create a pre- Slide sorter
12 Format Review tab Slide layout D
formatted style? view
Which is a feature included in Libre
office impress software that allows the Handout
13 Slide master Slide sorter Reading view C
user to see all the slides in a single master
window
To create a message on mail we click
14 Compose CC BCC Create A
on...............?
15 What was Twitter’s original name? Tweet Twttr Twtr Twitr B
How to run a process in the
16 & ? * | A
background?
Which symbol is used at command to
17 < % >> > D
redirect power output to a specified file?
How many worksheets are available by
18 1 Page 1 2 4 3 A
default in a Libre Spreadsheet?
Is locked Provide Is locked
Indicated the
under the features for under the
location
The insertion standard changing standard
19 where text C
point....................................... toolbar and margins, tab, toolbar and
line when
shortcut and has shortcut
necessary
button indentation button
chmod u = Chmod 4=7,
The command chmod 761 letter is Chmod chmod a
20 tax, g= rw, o= g= rw, o = 1 A
equivalent to…………. 167letter 761letter
X letter letter
Process of copying files from remote
21 server to local drive is called as Browsing Downloading Refreshing Uploading B
…………..
Device which is used for making
22 drawings graphics and for menu Mouse Keyboard Touch screen Light pen A
selection……….
Artificial intelligence is associated with th 5th
23 6 generation 2nd generation 1st generation D
which generation? generation

The second generation computers were High level Machine Assembly


24 Source code D
programmed using which language language language language

Which of the following shortcut key is


25 used to open submenu of file Ctrl + N Alt +N Ctrl +N Alt + F D
menu……..
Which device is used to back up the System
26 Keyboard Printer Network drive D
data? software
Which social media site is employment
27 LinkedIn Facebook Telegram Instagram A
oriented a ………………..
You are writing a message on Twitter
28 what is the maximum number of 140 120 160 135 A
characters you can use
Real Time
Real Type Real Time
Real Time Gross
29 RTGS stands for............ General Gross D
Gross System Settlement
Scheme Settlement
System
Storage
Input,
Which of the following is the correct Process, Input,
Process, Process,
30 order of the four major functions of a Storage, Input, Output, C
Output, Input, Output, and
computer Output Process,
Storage
Storage

Table> Table >Text To Table


Which of the option is used to convert Table> Text
31 Change> Text Table > >Convert > D
text to a table? To Table
To Table Change Text To Table

Mark Charge
32 Father of email is…………………….. Ray Tomlison Paul Bukete B
Zuckerberg Babbage
What is extension is given to Libre
33 .doc .ext .odp .com C
Office impress document by default
What is the best statement for taking
Vulnerabilitie
34 advantage of a weakness in security of Threat Exploit Attack D
s
an IT system?
Page 2
When earthquake, server’s fiber optic
35 Security Performers Capacity Reliability D
cable this is a type of network issue?
Negotiated National National
Negotiated
Electronic Electronic Efficient
36 NEFT means.................. Efficient Funds B
Funds Funds Funds
Transfer
Transfer Transfer Transfer
Semi closed
37 Types of e wallets? All of these Open wallet Closed wallet A
wallet
Which of the following is the largest
38 MB GB TB ZB D
unit of storage
Which of the following storage devices
Magnetic Optic
39 can store maximum amount of data Hard Disc Compact Disc Floppy Disc A
Disc
………………..
Which program is used to create a Libre
40 Libre Impress Libre Writer Libre Calc B
presentation? Presentation
The primary purpose of software is to
41 Information Programs Websites Object A
turn data into
Giving a brief writing the
Homework
42 The subject line is used for: description of emotions email B
assignments
the email message
Set of
Computer virus is simply computer Hardware Type of
43 Diseases A
a…………………………….. instruction or component bacteria
code
How can you create a uniform Format> Slide > set
Slide master View> slide
44 appearance by adding a background background > background A
background master
image to all slide? apply to all image
Which is processed in information by
45 Data Number Input Processor A
computer processor………….
What is maximum size of single Libre
46 1kb 1GB No limit 256 MB D
office impress slides?
Which of the following is an
47 independent malicious program that Worm Trojan horse Trap doors Virus B
need not any host program?
Maximum number of columns in a
48 AGM MMA AMJ ASP C
spreadsheet is
Merge directly Merge to new All of the Preview a
49 In the mail merge process, you can....... C
to a printer document above merge

The server on the internet is also known


50 Repeater Hub Gateway Host D
as a....................
51 An email id have............ part 3 2 4 1 A
Show a blue faster
Which of the following is not symptoms Run slower sudden freezes
52 screen with internet D
of an infected computer? than normal and crashes
error code processing
For which of the following tasks, Comparing Calculating arranging
53 Gathering data D
computers can't be used? data data data
Shortcut key for full screen browsing in
54 F11 Shift + F F5 F12 A
Google Chrome
Page 3
Which option is used to see only
55 specific data and hide unwanted data in Sort Filter Find Search B
calc?
QR code is
56 basically……………………………… 3D All of these 2D 1D B
….
Secure Site Secure Silver Secure Socket Secure
57 SSL stand for........................... D
Layer Layer Length Socket Layer

Which shortcut is used to insert a new


58 CTRL +# CTRL+- CTRL + + CTRL + / C
row or column?
59 Linux file system contains mainly........... Device files Process kernel Commands C

NABARD has been established on the Talwar Shivaraman Narasimhan Tandon


60 B
recommendation of.......... committee committee committee committee
Which of the following memory is non None of the
61 DRAM SRAM ROM D
volatile above
The graphics used as desktop
62 Background Picture Icon Wallpaper D
background is..........
What is the difficult width of Calc
63 2.25 inch 2.5 CM 2.26 cm 2.5 inch C
columns........?
The requested The server
The path to
Requested HTML file could not
What does error 404 or not found error the interpreter
64 HTML file is does not have find the D
while accessing a URL mean? of the script
not available sufficient requested
is not valid
permissions URL
Digital wallets Digital wallets Digital Digital
are cloud are cloud wallets are wallets are
based based cloud based cloud based
65 What are digital wallet? application application application application A
that enable that enable that enable that enable
digital transaction analog analogue
transactions transformation transactions translation
Synergized Synchronized Synergized Synergized
and advanced advance and advance
application application application application
66 SAARTHI stands for? B
railway travel rail travel help rail travel rail travel
help and and help and health and
information information informative information
Private To Private Key to Product To
67 What does P2P stand for? Peer To Peer D
Private Public Key Product

68 Supercomputers use parallel processors. False TRUE B

Messages saved in draught can be edited Only Yes, every


69 Never only 2 time C
before sending? sometimes time
Body and Inbox and
70 Mailbox is made up of? CC and BCC Head and body D
subject outbox
Operating system software runs
71 False TRUE B
continuously whenever a PC is on. Page 4
Filters packets
Ensures
travelling Filters only
Filters only rapid traffic
Firewall as part of a router from and to packets
72 packets going of packets A
program…………………. the internet coming from
to internet for speedy e-
from the internet
commerce
internet
How many digits code are there in
73 6 digit code 8 digit code 7 digit code 9 digit code C
mobile money identifier (MMID)?
Block of text appended at the end of an
74 email message the user sends is known Reply to all Email signature Sign Reply B
as......
What will be the result of
75 37 341 34 33 A
=sum(2,product(5, 7))
What is it called when I need to move an
76 Move Grab Translate Push D
object in 3D?
Ctrl + Shift +
77 What is the shortcut key for subscript? Ctrl + P Ctrl + Shift + K Shift + P A
B
Radio
78 USSD works on …………………. TDM GSM Microwave C
frequency
Magnetic Semiconductor None of the Memory
79 CD ROM is a....... C
Memory Memory Above Register
The command will bring the background
80 jobs to the foreground kill FG ctrl + z Bg D
…………………….
A company requires each employee to
power off his computer at the end of day More error- Perform
81 more secure more reliable A
this rule was implemented to make the free better
network?
What is the minimum age to create a
82 12 14 15 13 B
Facebook account?
What is the default alignment of
83 Justified Center Left Right C
numeric cell data?
How do you to get help about the
84 About CP CD? Help CP Man CP C
command "CP"?
Which symbol specifies the fixed
85 # $ ^ ( B
columns or rows?
Which file format can be added to a
86 .jpg .wav All options .midi C
Libre office Impress Show?
What is the shortcut key for open a new
87 Ctrl + T Shift + N Ctrl + W Shift + T C
tab in web browser?
Material consisting of text and numbers
88 is best presented as A title slide A table slide A bullet slide A layout slide C
………………………
Which of the following command will
89 allow the user to search content of a file Is Touch Find Grep D
for a particular pattern
How you can create a new style in Libre Ctrl + shift +
90 Ctrl + F11 Alt + F11 Shift + F11 C
office writer? F11
Page 5
Which operators are not found in
91 formulas that use if the function and Text Comparative Reference Arithmetic C
return either a true or false answer?
It is a mediated environment which
92 creates the sensation in a user of being GUI www cmd Virtual reality D
present in a (physical) surrounding.
Who is the invented the telegram app in Mark Nikolai and
93 Satya nadella Indra Nooyi C
mobile? Zuckerberg Povel Durov
94 Comparative operator for equality is? == =# = += A
Which of the following is not one of the
95 Virtuality volume variety velocity A
dimensions of big data?
Unique Uniform Uniform Unique
96 URL mean..................... Reference Reference Resource Resource C
Label Label Locator Locator
In Libre office calc the formula that
Sum(B8,Sum( Add(B8,Sum(
97 calculates the sum of cells B10 to B14 =SUM(B8,SUM =Add(B8,SU C
B10:B14)) B10:B14))
and add the value to B8" is...... (B10:B14)) M(B10:B14))
In spreadsheet, the insertion of a row
98 Cubicle Cell Worksheet Square B
and column is called ……………..
99 BADA is a mobile operating system. True False A
CVV and expiry
100 POS needed for payment...... Biometric Card and pin Password C
date
What is the shortcut key for making
Ctrl + Shift + Ctrl + Shift +
101 Libre office writer in full screen Ctrl + Shift + J Ctrl + Shift + D B
F F3
mode.........?
E-wallet stands Engineer Electronic
102 Electric wallet Election wallet D
for…………………………….. wallet wallet
103 What will be the result of=power(5, 2) 25 125 2 4 A
To hide To create a To obtain a To create a
malicious stronger network ghost server
104 Why would hacker use a proxy server? A
activity on the connection access on the
network with the target connection network

Email are arranged in inbox with respect Client and


105 Subject Names Date and time B
to........... server
This device
This card This card This can be
used for
Which statement is true about memory contains contents non- used for
106 reading C
card? volatile volatile video
printed
memory memory conferencing
barcodes
Which of the following are single user None of
107 UNIX Xenix MS-DOS C
operating system? these
Which command is used to identify file
108 File Type finfo Info A
type?
Automated Automatic
The term ATM stand for which of the Atomic Tailor None Of
109 Teller Tailor B
following. Machine These
Machine Mechanism
Which command is used to make a new
110 RD None of these MKDIR cd C
directory?
Page 6
Where saved files are stored in
111 Hard disk Cache RAM ROM A
computer
.odp is file extension of Libre office
112 True FALSE A
impress.
Which shortcut key is used for print CTRL + CTRL + SHIFT +
113 CTRL +) ALT + P A
preview? SHIFT + P O
Which features of cloud computing
Virtualization
114 allows to service to change in size or Scalability Security Cost saving D
s
volume in order to meet a user’s need
none of the
115 Bullets and numbering is in ............. tab Data type Home type Insert tab D
above
Portable Permanent Personal
116 PIN stand for................. Identification identification None of these Identification D
Number number Number
Performing
housekeeping Controlling Provides an
task like file the access that Managing interface for
All of the following are tasks performed
117 compression application hardware on user to A
by the operating system expect:
and program has to the computer interact with
defragmentati the CPU computer
on
Which of the following is used for
118 NEFT RTGS None of these Swift B
international money transfer?
The operating system provide an
interface that a software application
119 True FALSE A
program needs to communicate with the
PC.
What is the name for information sent
120 Signal Output Feedback Pressure A
from robot sensors to robot controllers?
To add to sale (A1 and A2) together in
=Add (A1+
121 Libre office calc one should use the =A1+A2 A1 plus A2 =Together(A1 D
A2)
following formula. :A2)
Which device is required for the internet
122 Modem CD drive Joystick Hard disc A
connection?
This is the box at the top of your
123 browser window that display the entire Title bar Scroll bar Status bar Address bar D
URL or web site address……….
Want your logo at the same position on
Reading Handout
124 every slide automatically? Insert it on Notes master Slide master D
master master
the……………….
The.............. Of a computer includes the
125 Information Hardware Software Icon C
programs or instructions.
Which of the following OS is not based
126 Ubuntu SentOS BSD Red hat C
on Linux?
Prevention,
Goals of information security
127 Response Detection detection and Prevention C
are.....................
response

Page 7
Full form of DVD is Digital virtual Digital Vector Digital visual Digital
128 D
…………………….. disc l Disc Disc Versatile Disc

129 To print presentation…………………. Press Ctrl + P Ctrl + A Ctrl + S Ctrl + shift + p A

Who maintains the RTGS payment


130 NPCI SEBI RBI IRDA C
network?
When reload option is disabled in Libre Always
131 Saved files Web View unsaved file D
office writer? disabled
The actual execution of instructions
132 CU Memory Manual printer ALU B
happens in …………………
Multipurpose Multi Internet Multipurpose Multipurpose
133 MIME stands for? Internet Mail Mail Internet Mail Intranet Mail C
Extend Extension Extensions Extension

Which of the following can you use to Slide


Slide show Animation Rehearse
134 add times to the slide in a Libre office transitions D
menu button timing button
impress? button
International
Indian International
IFSC code stand Financial Indian Finance
135 Financial Financial C
for…………………………… System System Code
System Code System Code
Character
Which of the following can be termed as
Random Crypto
136 private communication through cryptocurrency Cryptography D
messaging messaging
encryption?
What will be the result of
137 72 77 75 70 A
=quotient(509.8,7)
Touch the
Point the
To display a shortcut main no for an object on the Right click the Click the
138 object and D
object you can use: screen with object object
press ctrl + p
your finger
When a server goes down, this is which
139 Reliability Performance Security Capacity B
type of network issue?
Insert> text Tools >import Insert> input
140 How to import text from external file? Tools >get text D
from file text from file

Which of the following is not a


141 Blinds vertical Fade to black Blinks diagonal Dissolve B
transition effect?
142 Sending money on UPI is called Send drop pop push A

What is the working of clone Duplicate the Copy the style Delete the
143 Copy the text C
formatting? text applied on text formatting

Intelligence
Making a
Programming putting your
144 What is artificial intelligence? machine playing a game D
with your own intelligence in
intelligent
to computer

What is the shortcut key of save as CTRL + CTRL + SHIFT


145 SHIFT + S CTRL + S A
option SHIFT + S +N
Page 8
Watch with
146 An example of a digital device can be Automobile All of the above two hands speed meter B
Digital clock
Which of the following should be used
Insert, new File add a new
147 when you want to add a slide to an File, new File, open A
slide slide
existing presentation
The latest Google Chrome is capable of
148 PDF RTF Doc Docx A
printing web page in which format?
A folder cannot contain files as well as
149 False TRUE A
subfolder.
On cell format can be copied to another Clone Format
150 Format setting Cloning A
cell by using? formatting checking
In India the commercial bank are given Ministry of Companies The
Reserve Bank
151 license of operation finance regulation act government A
of India
by………………….. banking 1949 of India
What does docking means in Libre
152 Auto run Auto delete Auto hide Auto show D
writer?
Apple Company used chips from............ Both Intel and None of the
153 Intel Motorola B
for its company Motorola above

Libre office writer is not an application


154 FALSE TRUE A
software
What is the limit of fund transfer using
155 Rs. 10,000 Rs 20,000 Rs 1,00,000 Rs 50,000 C
UPI?
The basic goal of computer process is to
156 Table Files Graphs Information D
convert data into..............
The components that process data are Storage Output
157 System unit Input devices B
located in the …………………… component devices
When a person is harassed repeatedly by
158 being followed, called or be written to Identity theft Stalking Bullying Phishing B
he/ she is a target of?
Shortcut key for operating download list
159 CTRL + D SHIFT + J CTRL + J SHIFT + D C
in web browser
Linux address space defines virtual Virtual
160 Main memory Process Processor A
address space that is assigned to memory
If you don't know the current time which
161 Time Copy Ver Format A
command will you see to use display
162 Start /restart the Computer is called Boot exit Run Option A
Command used to determine the path of
163 What Wexec Which Where C
an executable file is
Internet Internet Internet Internet
164 In internet terminology IP means A
protocol processor procedure provider

Page 9
Security
Security device
device deployed
Wall built to Device to
deployed at and the
prevent fires prevent all
the boundary boundary of
from exercise from
165 What is firewall? of a company corporate C
damaging a the internet to
to prevent intranet to
corporate the corporate
unauthorized protect it
intranet intranet
of physical from
access unauthorize
d access
Advance the Aadhaar Advertiseme
Auto Enabled
Enabled Enabled nt Enabled
166 AEPS stands for....................... Payment C
Payment Payment Payment
System
System System System
How many selection modes are
167 1 2 3 4 C
available in Libre office writer?
Internet Mobile
168 M-banking is stand for........................ Faro banking Tele banking C
banking banking
What is the shortcut key for open a new
169 CTRL + T CTRL + W SHIFT + T SHIFT + N A
tab in web browser?
Two
Exploit a To shut down
overloaded To execute a
What is the purpose of Denial of service weakness in services by
170 system so it is Trojan on a A
attack? the TCP IP turning them
no longer system
stack of
operational
Which of the following is the code that
recognizes some special sequence of
171 input or is triggered by being run from a Trojan horse Trapdoor Virus Worm C
certain user ID of by unlikely a sequence
of events.
Which of these is not an example of
172 Amazon Twitter LinkedIn We Chat A
social networking
173 Which of these is not a chart type Graph Bar Radar Line A
To forward a message we use.............
174 Body Reply Send Forward B
Options?
175 Maximum handouts in any slides 6 20 9 12 C
What type of device is computer
176 Memory Input Storage Output B
keyboard?
In Google drive the users can send
177 25 MB 50 MB 35 MB 30 MB A
attachments all over
Which command will you choose to Paste
178 None of these Cut and paste Paste special A
convert a column of data into row? transpose
Design Animation
179 Circle motion is a predefined Insert scheme Color scheme C
template scheme
Which view in Libre office impress can Note page
180 Slideshow Normal Slide sorter B
be used to enter speaker comment? view
An electronic page in a Libre office
181 Slide Page E-page E-slide A
impress is called ……………
Page 10
A file which contains readymade styles
Pre
182 that can be used for Libre office impress Auto style Wizard Template C
formatting
is called……………
What is the shortcut key for heading 3 in
183 Ctrl + 1 Shift + 1 Shift + 3 Ctrl + 3 D
Libre office writer?
......................Means to close an email
184 Sign up Sign out Sign in Delete B
account
Which of the following is not the
185 Gateways Firewalls Linux Routers C
networking device ……………
Which feature of cloud computing
allows the service to change in size or Virtualization
186 Security Scalability Cost saving D
volume in order to meet a user’s s
need…………………….
Hypertext
Which of the following protocol is Transfer Travel File Telecommuni
Secure
recommended to be turned off because it Protocol over Transfer cation
187 Socket A
transmit username and passwords in Secure Socket Protocol Network
Layer (SSL)
plain text? Layer (TFTP) (Telnet)
(HTTPS)
number of
Screen resolution Number of Shape off
188 Size of screen colors in B
measures…………........... pixel screen
support

Which option is used to show the colour Conditional Text


189 Data bar Bar chart B
bar within cell according to data? formatting formatting

Which command in command mode of


190 :wq :w :x :q! A
vi saves the file without quitting?
When was commercial paper (CP)
191 1992 1991 1989 1990 D
introduced in India?
Ruler’s option is available in which
192 View File Insert Table A
menu …………
Which option is used to change Shadow,
Colour Background
193 text colour and the colour of the box in Text tools drawing tools D
schemes colour
Libre office impress?
A/An __________ is a piece of software
or a segment of command that usually
194 Malware Trojan worms exploit D
take advantage of a bug to cause
unintended actions and behaviors.
Security bugs are also known as security software
195 security defect system defect A
_______ problems error
What command is used to copy
196 copy cp rn cpy B
files and directories?
Universal Unique Universal Unvalued
UNIVAC
197 Automatic Automatic Array Automatic A
is………………………. Computer Computer
Computer Computer
A hardware that contains multiple hubs is most likely
198 configured in a ________ topology
Star Tree Bus Mesh B

Page 11
An index of Required for
Where all internet The first page of
199 A homepage is ________
data is stored
encyclopedia access to the
the website
D
articles internet
A host that needs to map and addresses to a name to
200 an addresses call a DNS client called a converter
True FALSE A

word used to get Style of the search Main search


201 A keyword in a search is
rid of results
A search engine
word word
B

network adapter
202 A MAC address is unique to a ______ network network protocol
card
machine D

A markup language such as HTML allows us to embed


203 formatting instruction in the file stuff.
True FALSE A

204 A modern can't do modulation and demodulation True FALSE A

205 A mouse has exactly three buttons. True FALSE A

206 A Mouse is one of the common input devices. True FALSE A

207 A pen drive works on input device only. FALSE TRUE B


A person can send mail from his/her email- id to
208 his/her same e-mail- id
True FALSE A
A piece of hardware that looks like a TV is known of
209 the_________
Monitor Icon Screen Hardware A
A piece of icon on a wen page associated with
210 another web page is called
Web Page url plugin hyperlink D

A powerful search technique used by name meta successive query


211 search engine is called
clustering Boolean logic Filtering
refinement
A

212 A protocol defines a set of rules or conventions. True FALSE A

213 A set of instruction is called software FALSE TRUE B


A simple protocol used for fetching email a remote
214 mailbox is
DMSP RFC 1225 IMAP POP3 D

portable
215 A smaller version of an image is called _______ bitmap thumbnail clipart
network graphic
B

A software sites in as collection of separate


216 applications bundled together and sold as a group
True FALSE A

A tool for locating information on the Internet by


217 matching search terms
Search Engine URL Database Deep Wet A

A type of connector for connecting cables with the


218 computers on the Ethernet is often called?
RJ11 RJK45 RJ45 RJ54 C

219 A web browser is also referred to as web server FALSE TRUE B


A well - written subject line helps recipient prioritize
220 there email responses
True FALSE A
A word that is understand on a web page is usually
221 recently added to that page.
FALSE TRUE B

Both 12 digit
12 digit number identity proof number card and
222 Aadhar is ____
card
none of the option
issued by UIDAI identity proof
D
issued by UIDAI

By Deposit in Bank At cash counter


223 Account payone cheques can be paid At ATM none of the option
Account of Bank
D

Additional worksheet can be inserted into an excel


224 workbook it more sheets are needed
True FALSE A

225 All web addresses start with http True FALSE A

Page 12
An application of this distributing news feeds from a really simple Voice Over IP IM (Instant
226 website syndication (RSS)
iPTV
(VOIP) Messaging)
D

An embedded chart cannot be moved or realized a


227 worksheet.
True FALSE B

228 An empty file does not occupy any disk space True FALSE A
Pre Office Post Office
229 an example of a polling email delivery protocol is Pre Office Process Post Office Process
Protocol Protocol
D
An example of an email address is :
230 johndoe@some.computer.edu
FALSE TRUE B
An FQDN is a domain name that contains the full
231 name of a host
True FALSE A
An internet is a network owned privately and uses
232 TCP/IP molded
FALSE TRUE B

233 Analog information is discrete True FALSE A

234 Another application layer function file transfer True FALSE A


Any message you send through an anonymous Anonymous
235 remailer will have identity
Old identity Real identity New identity A

Application software is designed to help the user to


236 perform single or multiple related tasks
True FALSE A

Appropriate netiquette depends on all of the option Type of


237 except?
people Addressed Topic of discussion Setting of site
Computer used.
C

a high level
a protocol to a protocol that
protocol for
dynamically bind IP a protocol used to handles error
238 ARP (Address Resolution Protocol ) is
address to physical monitor computers
transferring files
and control
A
from one machine
address messages
to another
As per email netiquettes one should used good
239 judgment
True FALSE A
As you scroll in document, the insertion point also
240 moves.
True FALSE A

American Stable American Standard American American


Code for Case for Standard code for Standard code
241 ASCII stands for
International Institutional Information for interchange
D
Interchange Interchange Interchange information

Asynchronous transmission does not use start and


242 stop bits while sending data to receiver
True FALSE A

Obedient
243 ATM password to be shared only with Spouse none of the option
daughter
Obedient son B
Back button in a Browser is used to visit the preview
244 page that referred you to the page you are currently True FALSE A
used it
Backspace key denotes the text to the right of the
245 insertion point
True FALSE B
Drinking &
246 Bank does not provide loans for Home loans Crop loan Education loans
Gambling
D

BCC and CC are additional fields used to send multiple


247 copies of an email message.
True FALSE A

beware carbon behind carbon blind carbon


248 bcc is
copy
brief carbon copy
copy copy
D
that computers
there are two
really need to have there are three the same as a
249 Binary means ____________
three or more options : 0, 1, and 2 byte: B bits.
possibilities : on D
and off.
options
250 BISNYC stands for Binary synchronous protocol True FALSE A
Block size in _______ is 256 ; NO of block is 2097152,
251 Application Unicast.
PageA 13
Class Class C Class B Class D B
Bluetooth works with a distance of unto _____
252 meters
200 100 10 150 C

253 Capitalization is not necessary when writing email. True FALSE A


Category is a device that connects one network to
254 another network
True FALSE A
CD-ROM stands for Compact Disk Random Optimal
255 Memory
FALSE TRUE A
Centralized software in networked computers is
256 much cheaper than buying licenses for every True FALSE A
machine.
257 Civilization is not at all necessary when writing email False TRUE B

Classifying content in social media happens through


258 an activity such as tagging
True FALSE A

259 Clear command cleans the screen True FALSE B


Common use of internet service is using a software
260 on remote computer
True FALSE A

261 Computer is used for data processing. True FALSE A


Computer process data into information by working
262 exclusively with _____
Characters Multimedia Numbers Words A

263 Controlling authority of ASCII is Link Control. FALSE TRUE B

264 Created icon are generally kept at desktop in bin dir in program dir in temp dir A
Ctrl + G is a keyboard short cut to open Go to dialog
265 box in Excel
True FALSE A
CTRL + U key combination is used to Upgrade the font
266 size of selected potions
True FALSE B
Ctrl+ Shift+ , return that above cell's value of the
267 selected cell.
FALSE TRUE B
Data is generally coded in bit units, such a unit is also
268 called _______
Word byte field K A
Data processing is to produce useful information
269 from the raw data.
FALSE TRUE B

270 Data transfer speed is measured in megabits True FALSE B


Default marks for glassful addressing for class it
271 is______
255.0.0.0 255.255.255.255 255.255.255.0 255.255.0.0 C
Del key deletes the text to the left of the insertion
272 point
False TRUE B
Disabling an add-on might prevent some web pages
273 from working.
True FALSE A

Disk defragmenter is a program that locates and


274 eliminates unnecessary fragments, rearranges files True FALSE A
and unused disk space to optimize operation
DNS defines two types of servers: primary and
275 secondary
True FALSE A

276 Dot matrix printer needs no electricity to print True FALSE A


Downloaded information saved as a postscript file
277 can be later printed on a postscript Compatible TRUE FALSE A
printer
Double Volume Digital and Video
278 DVD stands for ________
Density
Disk Virtual Drive Digital Video Disc
Drive
C

East or south
279 E or S means Easy and Swift none of the option Either or Survivor
Zone
A
Each email program is different in the way it handles
280 file attachments.
True FALSE A

Each physical network has a ________ frame size this Maximum, minimum, minimum, maximum,
281 is called the ____ frame size. maximum maximum minimum minimum
A

282 e-Governance is efficient governance Page


True 14 FALSE A
Domain address
283 Email address consist of User identification Home addresses ISP Name
of Mail Server
D

284 Email Bankruptcy also known as email fatigue email failure email hiding email flooded A
Email message header does not show who has sent
285 the email message.
True FALSE A
E-mail services has many similarities with postal mad
286 service
True FALSE A

287 Email stands for Easy mail Elegant mail electric mail Electronic mail D

288 Email systems are based on store and ___ model backward straight reverse forward D

one call to the one call shown


289 Enter key is used to move to _________ one call up one call to the left direction of the or to the next D
arrow call in sequence
Cyclic
290 Error Detection at the data link layer is achieved by Bit Stuffing Equalization Hammering code Reboundancy D
Check
291 Esc key is used to end the slide show. True FALSE A

292 Ethernet architecture uses CSMA/CD Across method FALSE TRUE B


unique 15-digit Common name and similar ip
293 Every computer on internet has
number number
unique IP address
address
C

Every device on the Internet has a unique _______


294 address ( also called 'Internet Address' )
DTH IPVPP IP DH C

Every host and router on the Internet has an IP


295 address
True FALSE A
Every host and router on the Internet has an IP
296 address which encodes its network number and host True FALSE A
number
Every web document has a unique address, What is it Universal Resource
297 called? Locator
Hyperlink Domain IP Address A

298 Everything is file in Linux. True FALSE A


File security in computer network in more important
299 especially if connected to WAN's e. g. protections True FALSE A
from viruses
Files should be compressed before you send them to
300 someone else over the Internet
True FALSE A

301 Floppy drive is one type of storage device. True FALSE B

For closing an email message, Double-click the


302 control icon in the top left corner of the window.
True FALSE B

Formula bar is the area to view different areas of the


303 worksheet
FALSE TRUE A

304 Formula Bar is used to edit the content of cell. True FALSE A

305 Forward command of mail program is used to send unread mail any mail arrived mail composed mail C

306 General Insurance relates to insurance against All of the option Theft Burglary Fire A
Google. Com, Yahoo. Com and Ask.com are all
307 examples of
Links Search Engines Visits Browser B

308 GUI is not operated by Command Line Mouse Arrow Keyboard A

Graphics Utility Gateway User Graphic User Graphics User


309 GUI stands for
Information Interchange Interface Interchange
C

High speed memories are needed to bridge the gap of


310 speed between L/O device and memory.
True FALSE A

311 Host name are case sensitive Page


True 15 FALSE A
Hosts with identical IP-network numbers should be
312 found in the same network
True FALSE B

Select Data > Form


From the menu to
Select Data > Click the Delete Delete the
open the Data form
313 How can you delete a record? Delete Record
dialog box, find the
button on the column from the A
from the menu Standard toolbar worksheet
record and Click
the Delete button

314 How long do massages stay in trash 30 days 100 days 10 days 500 days A
As per active
315 How many lines a mouse can scroll at a time?
setting
One screen One line S lines A
Html Commands surrounded by <And > are called
316 ____________
constant value attribute tags D

317 HTTP is a non persistent, stateless protocol. True FALSE A


HTTP is the name of the language you use to write a
318 web pages
FALSE TRUE B
HTTPS sends HTTP traffic over the Secure Sockets
319 Layer (SSL) protocol
True FALSE A

IF a client is unable to access the instant messaging


server via a common destination port due to protocol
320 analysis, instant messaging traffic can instead to
IGMP TGTP FTP HTTP(8080) A
tunneled via

You will be A letter will be It will be waiting


321 If you do not pick up your email for a week? informed It will be deleted sent to you in the for you to collect D
personally post it

Internet Mail Internet Message Inter Mail Access Inter Message


322 IMAP stands for
Access Protocol Access protocol Protocol Access protocol
B

In email client, formulas are available to help


323 compose and format message
FALSE TRUE B

In general, the data size for multimedia information is


324 much smaller than textual information
True FALSE B

Identifies new,
In inbox view of email client program, message Message with Identifies Message to be
325 Heading having examination (!) mark attachment important message diet later
read or replied B
to messages.

In internet, computers are connected to smaller


326 networks, which in turn are connected through True FALSE A
gateways to the Internet backbone

In many search engines, the plus and minus symbols


327 can be used as alternatives to full Box loan OR and OR True FALSE A
NOT.
In MS PowerPoint slide show , Press ____ key to end
328 the slide show
Backspace Esc break Shift B

IN the binary language each letter of the alphabet,


329 each number and each special character is made up eight kilobytes eight bits eight bytes eight characters C
of a unique combination of ________

330 In the e-mail address info@nielit.in, "info" is the client computer password server name user name D
In the internet's standard e-mail protocol SMTP,FOR Non-Delivery New-Delivery Not-Delivery Not-Delivery
331 means Report/Receipt Report Report Receipt
A
Video Graphics Very Good Video Games
332 In VGA monitor, VGA is the abbreviation Virtual game array
Array Adapter Array
B

In which transmission, the channel capacity is shared


333 Half- simplex Half- Duplex Full- Duplex Simplex C
by both communicating devices at all times Page 16
334 Inkjet printer is a type of Impact printer True FALSE A

Both operation of
account through Opening of
Opening account
335 Internet banking refers to internet & opening none of the option
through ATM
account through A
of account through internet
ATM

Internet Explorer stores a copy Wish page it displays


Temporary
336 on your computer's hard slide in a(n) ____ folder URL Repository URL Cache
Internet Files
Internet Explorer A
under the window
Internet has not grown rapidly to become the world's
337 largest network.
True FALSE B

338 Internet is a private company True FALSE B

339 Internet is a valuable tool for accessing information True FALSE A


Is it possible to automatically forward incoming mail
340 to another email address
True FALSE B

341 ISDN is an example of circuit switched network False TRUE B

342 ISP does not stand for Internet Service Provider. True FALSE B

It is possible to give delegate access of one's email


343 account to another person so that they can read, True FALSE A
send and delete messages on

344 Italic characters are slanted than regular characters True FALSE A

Insurance of Insurance of Life of Insurance of life of


345 Life insurance means
human Machines human and cattle
All of the options C

Loading of operating system into computer memory


346 is called Booting
True FALSE A

strong original
backup and high strong original but backup and low
347 Magnetic tapes are good storage media for________
volume data low volume data volume data
but high volume D
data

Mail Sublimation Agent receives message from Mail


348 user Agent for further processing.
True FALSE A

Mail user agent (MUA) it is a computer program that


349 is used to manage Email
True FALSE A
non-public
350 Mailing list is a way of having a no discussion public discussion private discussion
discussion
C

Mbps is an acronym of Megabits per second that is


351 used to measurement of transmission speed.
True FALSE A

Medium speed, or the number of transition per


352 second, is referred to as ____
RAM Bits Baud Rate ROM D

353 Memory is an example of primary storage True FALSE A

Mahatma
Mahatma Gandhi
Mahatma Gandhi Gandhi National
National Rural
nutrition & Rural Rural
354 MGNREGS stands for None of the option
Employment
Employment
Employment
C
Guarantee
Generation Scheme Generation
Scheme
Scheme

Modem circuit board or card that is installed in a


355 computer so that it can be connected to a network
FALSE TRUE B

Modern LANs may operate at higher speeds, up to


356 hundred of megabytes per second.
True FALSE A

Page 17
Moving a file from a remote computer to ones own
357 computer is known as uploading the file
True FALSE A

MUA using _______ displays messages directly from


358 the server.
IMAP HTTP DNS POP3 D
MUA using ________ downloads messages from the
359 server mailbox onto the local computer for display in HTTP SNMP POP3 IMAP D
the MUA
360 Multimedia includes text, image, sound, video etc. FALSE TRUE B

Multiple Choice examination answer sheets can be Optical Mark Magnetic ink: Optical Character Magnetic tape
361 evaluated automatically by ________ Reader character Reader reader reader
A

allows the same


is completely allows multiple makes the
computer to
362 Multiprocessing understood by all processing to run operating system
have multiple
B
computer venders simultaneously simpler
processor

are used only


are easier to Executes more jobs
executive each job one large
363 Multiprogramming systems refers to develop than single in the same time
faster mainframe
A
user system period
computer
Netiquette is a term coined by combining the words enterprise
364 _____ into a single name.
Network etiquette intranet etiquette internet etiquette
etiquette
C
electronic off - topic
365 Netiquette often users
signature
Mulitiposting Cross posting
posting
A
Floppy disk
366 Network disc driver are really ________ Hard disk driver Network file server Logical disk driver
driver
B
No change can be made to page layout in print
367 preview
True FALSE B

368 Noise is an unwanted signal in data communication True FALSE A

369 Not a wild card character? * @ ? [ 1-9 ] D


Non Rural Non Resident Non Rural
370 NRI means
Immigrants
none of the option
Indian Individuals
C

Number system using strings of 0's and 1's is termed Octal number Binary number Hexadecimal Decimal number
371 as _____ system system number system system
B

Numerals have the same widths in a proportionality


372 spaced font.
True FALSE A
On- line processing transactions are collected in a
373 group
FALSE TRUE A
Once you create a table in your PowerPoint slide,
374 you cannot modify that table .
True FALSE B
One can block email from particular email address in
375 yahoo email server
FALSE TRUE B
One can not sent his status to invisible mode in
376 instant messaging server
True FALSE A

Open detection of counterfeit note at the counter, Returns the note Impound the Note Deposit in Exchange with a
377 Bank to the customer and issue receipt Account genuine Note
D

378 Optical mouse can not have scrolling facility True FALSE B
Optical storage devices use magnetic technology to
379 access data.
FALSE TRUE B
Parallel data transmission is much faster than serial
380 transmission
True FALSE B
Parallel interfaces are commonly used for connecting
381 printers to a computer.
True FALSE A

Part of the internet where you put your information


382 from your computer out on a web page for others to Table Backward Upload WWW C
view in referred as _____

Page 18
Privacy Enhanced Private Encrypted Private Enhanced Privacy
383 PEM stands for
mail mail Mail Encrypted Mail
A

pretty good
384 PGP stands for Pretty gain private pretty good private pretty gain privacy
privacy
D
Pointer is a symbol that is moved around on the
385 screen.
True FALSE A

386 Port number is used by _____ performed HTTP POP3 FTP SMTP D

387 Primary name of a file can be of 10 characters True FALSE A


Printer cannot be connected to the computer using
388 ____
PS/2 Serial port Parallel port USB port A

389 Printers and scanners are peripherals True FALSE A

390 Procedures and software mean the same thing. True FALSE B

391 Programs cannot have shortcuts FALSE TRUE A


392 Protection of workbook is possible FALSE TRUE A
software that
A list of rules A gateway calling software that
facilitates
393 Protocol is _______ transferring data program for
connection to the
allows file A
over a network internet bridging copying
internet
RAM can be compared to a personal's short-term
394 memory and hard disk to the long-term memory.
True FALSE A

Refresh rate of a monitor is the number of times in a


395 second that a display is illuminated
FALSE TRUE B

Users to work with Users to access


Hackers to easily
files located Store files in a the network
396 Remote access capabilities allow ________
anywhere on their
infiltrate important
central server from remote
D
files
networks locations
Resolution means number of individual color dots,
397 also known as ______
LCD Dot per inch VGA Pixel D

398 ROM is a volatile memory True FALSE B

Scanner is used to copy pictures or other things and


399 save them as files on the computer
True FALSE A

400 Search result pages are retrieved by a web Crawler? True FALSE A
Shimmer, Sparkle text , Blinking Background etc. are
401 known as
text effects font styles font effects word art A

402 Smileys are also known as emoticons True FALSE A

403 SMTP is a simple TCP protocol IP protocol ASCII protocol TCP/IP protocol D

404 SMTP uses 25 port number. True FALSE A

Some email lists are moderated which means that a


405 human being scans every submission and decides If it FALSE TRUE B
is pertinent to the list.
Site-Server Service-Sign
406 SSO Server -sign On Single- Sign On
Operation Object
B

407 Standard protocol to receive and send email is MIME IMAP POP SMTP D
Telnet is the basic Internet service that was designed
408 to transfer files from one computer system to True FALSE A
another.
Ten out of fourteen statins on a LAN accept the same
409 transmission. The destination address is probably an True FALSE A
unicast address.
The agent which allow people to read and send email
410 is called .
Agent Admin Agent User Agent Mail Agent D

411 The Basic Unit Of Bluetooth is piconet TRUE FALSE A


412 The brain of any computer system is______ Page
ALU 19 Control unit Memory CPU D
The browser's ______ keeps a list of web pages you
413 have visited during the current session
Trail Cache History Favorites C

The concept that allow different parts of a software


414 program to run concurrently
Multi-tasking Multi-parting Multi-media Multi-processor A

Email can be
email can contain Only large Voice Message is
The difference between Email and voice message forwarded, voice
415 is____
text, graphics and corporation use only used by large
messages cannot
D
image email organization
be forwarded

416 The digital computer works on binary language True FALSE A


The Domain Name System (DNS) is a supporting
417 program that is used by other programs such as a True FALSE A
email
The domain names are always read from the root to
418 the mode up.
True FALSE A
The firewall can be either Software or Hardware or
419 Both
True FALSE A

420 The first and large net is Under Net Internet Telnet Ethernet B
421 The first e-mail was sent by Vent Cerf Ray Tomlinson Al Gore Robert Kahn B
422 The following is not a domain name MIL ORG GOV CDM D
The full form of ISO is International Standards
423 Organization
True FALSE A
The geometric arrangement of devices on the n/w is
424 called
protocol media topology link C
The human readable version of a program is called
425 _______
System code source code program code human code C

Providing notes,
Accessing complex Giving traveling
426 The internet can be used for
database
All of the option
information
lectures and B
course materials

427 The internet uses ________ to find the shortest path Hub Router Bridge Switch C

428 The last prototype was operational 10 months Later. True FALSE A

The linking together of several web pages by clicking


429 on understanding words is called __________
HTML Hypertext: Hyper box: the Internet D

The METHOD used to send the data in stored in an REQUEST- CONTENT-


430 environment variable on the web server
POST GET
METHOD LENGTH
A

The method which records are physically stored in a


431 specified order according to a key field in each record Direct Sequential All of the option Hash B
is __________
432 The most basic element of any HTML page is EBCIDIC text ASCII text BCD text text D
The most common transfer protocol used on the
433 Internet is HTTP
FALSE TRUE B

The most commonly used online service in most


434 countries is accessing publisher websites.
FALSE TRUE B

435 The most widely used web protocol is ISP HTML http:// URL C
The network layer is responsible for the source of the
436 destination delivery to the packets across multiple True FALSE A
networks
The NOW function Inserts the current date and time
437 into the cell
True FALSE A

The office Clipboard stores one item can item at a


438 time, and each time you store a new item it replaced
True FALSE A

The Operating System in responsible for Detecting


439 errors in users programs.
True 20
Page FALSE A
The Process of retaining data for future use is
440 called______
coding storing reading writing B
The program used to view pages on the World Wide
441 Web are called
World wide web Browsers Dowsers Screensavers B
The rules with regards to conduct for internet users is
442 known as
Protocol Netiquette Internet protocol Mosaic C

The 'search' function allows you to find files and


443 folder located anywhere on your computer
True FALSE A

The search results presented in a line of results are Search engine Search engine
444 called as pages
Tag Lists Category List
result pages
D

445 The server used for instant messaging is called email server ftp server chat server database server C

The signal which is continuous with respect to time


446 and may take on value within a given range of value
Computerized Analog Digital Direct C

The sizes of graphics files for use on the web are


447 reduced using _____
Computation Compression Impression Depression B
The smallest item of useful information a computer
448 can handle
Bite Bay Bit Byte D
The software which contains rows and columns is
449 called word-prospecting
True FALSE B

450 The special formatting tag is <DD> <TT> <PRE> <P> C


The standard form of internet email address is
451 domain@user
False TRUE A
The subnet mask can help us to find the noted and
452 the hosted.
True FALSE A
The three parts of the email message are sender,
453 receiver and devices
True FALSE B

454 The top level of file system is known as root directory main directory folder tree level B

The transmission medium that carries the message is Communication Send and receive
455 referred to as the _________
Protocol
channel
Gateways
device
A

456 The word "modem" stands for modulate-demodulate FALSE TRUE A


Millions of web Hundred of web
457 The World Wide Web is composed of S web page 1 web page
pages pages
C

458 There are 3 octet in an IP address. True FALSE A


459 There are five classes in IPv4 addresses. five classes three classes two classes four classes B
There are several domains, one being .org, what does Commissioner of Complicated
460 this represent? the web
Comedy Central Organization
web sites
C

There are variations to this simplest form with several


461 pairs of wires enclosed in single predicted cable called True FALSE A
a Multicore slide

There is enough freedom in HTML and the Web


462 standards n general, through that each Web browser True FALSE A
ends up being slightly unique

Easily availability
463 Timely repayment of loans results All of the option No tension Good reputation
of loan In future
A

464
To prohibit a keyword in a search ( in most search
465 engines) you would use the ________ sign
# minus ^ plus B

466 To quite from pine press (X) (Q) (S) (O) B


To send email to a large group at one time,
467 _________ can be use.
Alias mail server list serve group C

468 To send message press ^X ^I ^Y ^E C

Page 21
After 6 months oaf Customers in age
To whom Overdraft facility of Rs. Its. 5000/- in PMJDY One account per
469 Account is available
satisfactory group of 18-60
household
All of the options A
conduct of account years
Today's email systems are based on a store and
470 forward model.
True FALSE A

Two or more file by the same name can not exist in


471 the same directory in a GUI based OS.
False TRUE B

472 Two persons have the same email addresses True FALSE B

473 UDP is connection less protocol True FALSE A


474 UDP is unreliable protocol True FALSE A

475 UDP protocol is also known as ______ protocol Network Layer Reliable Unreliable Data Link Layer C
Uniform Resource Locater (URL) points to one web
476 page only.
FALSE TRUE B

User programmable terminals that combine VDT Intelligent


477 hardware with built in microprocessor is _______
PC
terminals
Mainframe Tips B

478 Using internet user can download a file from any host True FALSE A

479 UTP stands for Unshielded twisted pair cable True FALSE A
Input/output
480 VDU is a/an output device Input device
device
Storage device B

481 Virus needs human action to execute True FALSE B


482 WAN is used for country or continent. FALSE TRUE B
We can delete the maximum number of e-mail at a
483 time is
multiple only-one only-three only-two A

Can be withdrawn
484 We should keep our savings with banks because All of the option Earns interest
anytime
It is safe A

485 Wen client services the internet requests. True FALSE A

create the an address that the namespaces


partition, enlist can communicate must be
a refutable internal DNS servers into only with other segregated, and
486 What is a link - local address?
address the partition, and devices on the using different
B
assign zones to the same network names does this
partition. segment automatically

Mega bits per


487 What is a typical data transfer rate in LAN? Bits per Sec Bytes per Sec Kilo Bits per Sec
Sec
D

A cartoon smiley
Shapes line square
488 What is an emoticon Signature
etc.
face inserted in Expression. C
emails

Transfer of social/
subsidies directly in Remittance Cash Discount on None of the
489 What is direct Benefit Transfer?
Bank accounts of through Bank goods options
A
beneficiaries

Sound player on Graphics


New multimedia Format for
490 What is MP-3? windows 9x
content on the web
presentation
compressed file
D
platform software

491 What is the command for web printing Shift + P ctrl + p alt + w ctrl + v B

Hyper Text
492 What is the full form of Http
Transfer Protocol
A

Page 22
Search Engine Search Entry Search Effect Search Engine
493 What is the full form of SEO?
Operation Optimization Optimization Optimization
D

It is a network of It is network of
It is a telephone It is network of
494 What is the internet? made up of CAT S
network
High speed optical
networks
D
cable. fiber cable
Ten
What is the lengthy series of specific behavior
Commandments Acceptable use
495 guidelines developed for computer and Internet Code of conduct Internet Etiquettes
for Computer policy
B
users?
Ethics
What is the maximum number of people an e-mail
496 can be send to with Gmail
500 100 250 1000 A

497 What is the maximum speed of modem? 64 kpbs 56 kpbs 32 kpbs 128 kpbs D

What is the minimum deposit required while opening No minimum


498 a BSBD Account?
Rs. 100/-
deposit required
Rs. 500/- Rs. 1000/- B

What is the name usually to describe the folder


499 structure
Trunk Loop Logarithmic Tree D

Both covers life


insurance up to Covers life
What is the Pradhan Mantri Jivan Jyoti Bima Yojana Accident insurance
500 (PMJJBY)? cover
none of the option Rs. 2 lac & insurance up to D
Accident Rs. 2 lac
insurance cover

It changes the first It changes all It adds captions


It shows all image
501 What is the use of "All caps" feature ?
captions
letter of every selected text into for selected C
word to capital capital letters image
When a signal travels in straight from one antenna to
502 another, this phenomenon is known as straight line True FALSE A
propagation
When posting messages, it is okay to speak your
503 mind, regardless of other group members feelings.
FALSE TRUE B

504 Where selected files are stored System folder recycle bin user folder temp folder A
Which among the following is a Win Server
505 application?
Samba Claris Opera Pegasus D
Which character separates the main part of a
506 filename from the extension?
period ampersand underscore comma A
Which chart element details the data values and
507 categories below the chart
Data labels Data table Data marker Data point A

508 Which company developed quick time movie format Apple Sun Oracle Microsoft D

Which computer system that allows people from Voice Email


509 Mumbai and Nagpur to have international meeting
Fax Machine Video Conferencing
Messages
Email B

510 Which currency note has security threat Rs. 50 Rs. 100 All of the option Rs.500 C

Which features in Internet Explorer remembers the


information you have typed into the Address bar,
511 web forms, or password fields which automatically Fillip AutoCompletes Remembrance Autocorrect B
that information if you scars to type the same thing
again later?
Special purpose Touch screen
512 which is not part of keyboard ? Numeric keys Functions keys
keys keys
D

513 Which is not the search engine : Altavista.com Yahoo.com Facebook.com Google.com C
514 Which is the most popular search engine ? Ask.com Yahoo.com Bing.com Google.com D
Which key displays the boot menu when windows in
515 booting?
F10 F2 F8 F4 C

516 Which of the below is not tool for instant messaging? Yahoo messenger ZapTXT Wikipedia Zombie A

Page 23
Which of the following communications lines is best narrow band mixed band
517 suited to interactive processing application?
full duplex lines
channel
simplex lines
channels
D

518 Which of the following creates a push buttons? RESET CHECK BOX RADIO INPUT A

519 Which of the following is a binary file format ? _bat _in _doc _corn A

Only check to see if


Check to see if the Make sure the Only accept sites
the author exists,
Which of the following is a common criteria for identify of the page is located on that have an
520 accessing Web page credibility. page's author is
background
a popular web .edu at the end
C
information is not
clearly stated. server. of their address.
important
Which of the following is not a common type of
521 connector
USB System Bus Parallel Connector Serial Connector B
Which of the following is not a component of a Web File transfer
522 Browser protocol
Status BAR Address BAR Workspace D
Which of the following is not a feature of a desktop
523 manager?
advisor contacts tasks calendar B

524 Which of the following is not a protocol for email SMTP IMAP POP UDP D

525 Which of the following is not a transmission medium? modem microwave system coaxial cables telephone lines A

Starting with your Identifying the


Which of the following is not an effective method of Narrowing your top Using Boolean
526 smart searching
favorites search
C Technique
correct search B
engine engine

527 Which of the following is not an option of file menu? Page setup open publish Delete D

Not used in text used to determine


528 Which of the following is not true about a pixel?
size screen resolution
picture element pixel A

529 Which of the following is the largest unit of storage GB KB MB TB D


Which of the following operating system does not
530 implement multitasking truly?
Windows XP Windows 98 Windows NT MS DOS D
Which of the following terms applies to all the web Top-level
531 pages for Amazon.com?
Web site Wen domain Web site address
domain
A
Which of the following Windows utilities will erase Backup or Restore
532 unneeded files?
Disk Defragmenter
Wizard
Data Cleanup Disk Cleanup D

in cc the addresses in bcc, the


of mail can't come addresses if mail
533 Which one is true related to CC and BCC bcc in blank copy to know to when cc is client copy don't know D
the same mail is about to whom
send the mail is send
Which one of the following activates menu bar of
534 operating system?
F12 F10 F9 F13 B
Which one of the following in synonym for Mail
535 Transfer Agent?
Mail Agent Mail Transfer Mail Relay Mail Transcoder B
Which one of the following is compulsory for
536 accessing Internet?
E-mail World Wide Web Web browser Real Player C
Which one of the following is used to delete file from Right click on file- Right click on file- Left click on file-
537 given location? Move Cut
Right click- delete
Delete
C

538 Which protocol is used for receiving EMAR POP3 HTTP FTP TCP A
it enables user to
a program used to A program that
across the designing of
539 Which task can't be done by web browser view html
resources of website
can display a D
documents web page
internet
While making nomination, signature of nominee is Account Opening Nomination
540 required on
None of the option Affidavit
Form form
D

Only lady of the Only head of the Minor above the


541 Who can open an account under PMJOY?
house family age of 10 years
All of the options D

Page 24
Non resident
542 Who can open bank account All of the option Illiterate
Indian
Indian citizen A
With regard in WWW favorite is a link to a particular
543 web site, stored by web user for future use and easy True FALSE A
access
they must not they must
they cannot case they can contain
544 With regards to Email address always contrarian
sensitive space
always contain D
@ symbol an @ symbol

With regards to WWW hint is a word used by a


545 search engine to search for relevant with information
True FALSE A

546 x.25 is an example of packet switched network. True FALSE A


Yahoo and some of Magellan are two of the few
547 examples of full text indexing
True FALSE A
Yahoo email server does not provide event reminder
548 facility.
True FALSE B

549 Yahoo, infuses And Lyous are Web pages Search engines Browsers News Group B
You call the CGI-BIN script in the FORM tag using
550 attribute
Language CTE CALL ACTION D

You can change the page orientation of a section


551 without affecting the rest of the document
True FALSE A

clicking on the
item in "My
dragging the item
you can display the hidden means of an item by right clicking on double clicking on Computer" and
552 ______ the item the item
to the "recycle
selecting
D
bin"
"opens" from
the file means

553 You can open an item using its shortcut True FALSE A
You can use email to send messages but not file
554 across the internet
True FALSE B

You would use "Start at box" to begin a set of


numbered bullets at the next consecutive number
555 from a previous slide if you need to breakup the
True FALSE A
bullet other elements to the slide.

HTML tags can only define a formatting option, but


556 they can also define attributions to those options.
True FALSE A

The personnel who desalts with the computer and its


557 management put together are called _______
Hardware Firmware Software Human ware C

Which one of the following edition is available for


558 Windows XP?
Professional Extended Developer Business A
The term ______ is used when referring to systems
559 having variety of node types like text, graphics, sound Verticality Graphics Multi-media Hypermedia C
etc.
The copy button copies the contents and format of
560 the source area to the destination area.
True FALSE A

A smiley is an expression representing facial


561 expression of writer.
True FALSE A

an account which allows Internet users to provide a


562 temporary e-mail address without showing their true push email` Anonymous Email` disposable e-mail pop email D
e-mail addresses is

563 Following is a web browser Internet Surf Web access Internet Explorer Proxy C
Status bar tells you, the program and the names of
564 the files you are working on.
True FALSE B

Page 25
Block size in _______ is 16777216; No of block is 128,
565 application unicast.
Class A Class B Class C Class D A
Window OS creates some default folders
566 automatically in /Documents and settings whenever True FALSE A
a user is created.
Signature will be automatically appended to all
messages user sends, however, while entering the
567 text of message a window will be available of the top True FALSE B
of the message where user can choose to send the
signature or to not send it.
Verification of login name and password is known as
568 _________
logging in. accessibility authentication configuration A

569 Which of the prohibited for writing o currency notes? Political message Personal message Religious message All of the options D

When you started a Web browser, the first web page


570 that gets loaded in the browser is called
First Web page Home page Beginning page User Web page B

An agent who
An agent of type of money None of the
571 Business Correspondent means provides banking
business house lender options
A
services

572 In Calc, Header and footer facility is available in Format Menu Style menu File menu Insert menu D
The data between the computer and peripherals
573 always passes via an input/output which is known as A/D converter buffer memory Port D/A converter C
_________
_______ is used as the standard pointing device in a
574 Graphical User Interface Environment
Joystick Mouse Keyboard Track ball B

An FTP user needs ______ for a remote computer to


575 transfer files to/from it.
listing access rights username password B
What is the Default File Extension after .(Dot) in Web
576 files.
.xtml .com .gtml .htm or .html D
Network etiquette can be abbreviated as
577 "netiquette"
True FALSE A

The documents in the WWW can be grouped in three


578 categories: static ,dynamic and active
True FALSE A

The routing table allows multiple routes per


579 destination.
True FALSE A

Data once stored in floppy disk can be removed but


580 can not be erased from CD-ROM disk.
True FALSE A

You can right click the mouse in a slide show to


581 display a shortcut menu
True FALSE A

582 Bullets are used to identify items in a list. True FALSE A


Frowning smiley is used to represent that user is
583 making a sarcastic statement
True FALSE B

584 In Linux, root login is administrator login True FALSE A


The MLM reads your e-mail address from the headers
585 of you message.
True FALSE A

Primary Account Permanent


586 PAN means None of the option
Number
A kind of utensil
Account Number
D

587 The WAN links at higher costs and lower speeds True FALSE A

An e-mail letter is a letter which sent as an e-mail


588 using a computer then printed out and delivered as a True FALSE A
traditional (physical) letter.

Page 26
control unit, control unit,
control unit,
arithmetic- logic primary storage, input, output and
589 The central processing unit (CPU) consists of
unit and primary and secondary processing
processing , and A
primary storage
storage storage

590 Ethernet is not a LAN architecture True FALSE B

In web browsers, plug in consist of a computer


591 program that interacts with a host application to True FALSE A
provide a certain, utility very specific, functions on

operating system
592 Netscape Navigator is a type of
browser
web authoring utility program program B

An optical input device that interprets pencil marks


593 on paper media is __________
Magnetic Tape Optical Scanners Punch card Reader O.M.R D

594 _______ is a programming language. MS-Excel Netscape Pascal Lotus C

595 Usenet News service is not an internet service. True FALSE B


Information retrieval is faster in CD-R than that from
596 USB pen drive.
True FALSE B

597 CSMA/CD is a data access method in LAN True FALSE A


Enabling real-time collaboration in a workgroup is an
598 example of iPTV.
FALSE TRUE B

599 E-mail Communication is ________ Private Hybrid Public and Private Public A
always start the
install an an check all
All of the following are tips for preventing computer computer with a write- protect
600 virus infections except ________
tedious program downloaded files
floppy disc in drive the rescue disk
A
on all computers for viruses
A
601 Who is Founder of Unix Operating System? Microsoft AT & T Linus Torvalds Einstein B
Host numbers with octets all 0 or all 255 are reserved
602 for special purposes
True FALSE A

603 Which of the following cannot be sent via email ? Parcels Text documents Sound files Image files A
A modern concerts the digital signal of a computer
604 output to analog signal.
True FALSE A
Automated teiler Auto Truck of
605 ATM means
Machine Mahindra
none of the option Any Time Money A
MEMORY LIMITATION ON FILE ATTACHMENT in
606 email
26 mb 25 mb 400 mb 24.5 mb B

Whether an Internet site is a commercial (.Com) or


607 governmental (.gov) site helps determine
Accuracy Expertise Purpose Objectivity D

Hard bounce is , when an e-mail is returned to the


608 sender after it has already been accepted by the True FALSE A
recipient's mail server.

609 The ________ protocol is used to transfer files Telnet URL FTP Gopher C
Order of
610 Full form of "OS" is ? Optical Sensor Open software Operating system
significance
C

The header information of an email is altered so it


611 appear to come from a trusted source is known as
Email spoofing Email bombarding Email retention Email hacking A

612 The current date cannot be inserted in the header. True FALSE B

613 Compiler converts high level language True FALSE A

is it possible to give delegate access of one's email


614 account to another person so that they can read, True FALSE A
send and delete messages on administrator behalf.
Among ring, mesh, tree and hybrid is an odd because
615 is not a topology
True FALSE B
Page 27
TDS means Time Deposit Total Deposit Tax Deducted at
616 Scheme Scheme Source
None of above C

Banking
Valuable customer Security guard in a d) None of
617 Who is Bank Mitra? Correspondents
of Bank branch above
A
engaged by Banks

618 Maximum tenure of Fixed Deposit is 5 years 7 years 8 years 10 years D

619 Bank does not give loan against Gold Ornaments LIC policy Lottery ticket NSC C
Minimum age required to open SB account in the
620 bank
8 years 10 years 12 years None of above B

621 100/- Rupee note is signed by Prime Minister Finance Minister RBI Governor None of above C
Know your Know your
622 KYC means
customer character
Both of above None of above A
Permanent
Pension Planning Person having Public Provident
623 PPF means
Funds Pension Facilities Fund
Practitioner’s C
Forum
624 Maximum amount of Cheque Rs.100 crore No limit Rs.1 crore None of above B
Employees of
Central / State
Aam Aadmi Bima
_______ are not covered under PMJDY Life Insurance Govt. / Public
625 Scheme of Rs.30,000/- Sector
Income Tax Payee Yojana All of above D
beneficiaries
Undertakings /
Banks
4 months from 3 months from 1 month from
626 What is validity period of cheque?
date of issue date of issue date of issue
Unlimited B

627 Under PMSBY, accidental death claim is available for: Rs.1 lac Rs.2 lac Rs.3 lac None of above B

What is Pradhan Mantri Suraksha Bima Yojana Accidental Life insurance Overdraft up to
628 (PMSBY)? insurance cover cover Rs.5,000/-
None of above A

Reserve Bank of Punjab National


629 Bank having maximum number of branches in India
India
State Bank of India
Bank
Bank of Baroda B

Page 28

Das könnte Ihnen auch gefallen