Explanation:
Cache is faster than RAM, Virtual memory extends RAM. SSDs are faster than HDDs and DRAM is volatile, not non-volatile.
Correct Answered:
Wrong Answered:
1. Which of the following statements about computer memory are correct?
I. Cache memory is faster than RAM.
II. SSDs are slower than HDDs.
III. Virtual memory extends RAM using storage space.
IV. DRAM is a type of non-volatile memory.
A
I and III only
B
II and IV only
C
I, II and III only
D
I, III, and IV only
Cache is faster than RAM, Virtual memory extends RAM. SSDs are faster than HDDs and DRAM is volatile, not non-volatile.
Correct Answered:
Wrong Answered:
2.
A
i-3, ii-1, iii-4, iv-2
B
i-2, ii-1, iii-4, iv-3
C
i-3, ii-2, iii-4, iv-1
D
i-1, ii-2, iii-4, iv-3
Trackball controls cursor, Graphics tablet for drawing, Printer converts digital to physical form, Joystick controls objects in games.
Correct Answered:
Wrong Answered:
3. Match the following operating systems with their examples.
A
i-3, ii-4, iii-1, iv-2
B
i-3, ii-1, iii-4, iv-2
C
i-4, ii-2, iii-3, iv-1
D
i-2, ii-4, iii-3, iv-1
Batch OS ? IBM, Time Sharing OS ? Google Android, Distributed OS ? UNIX, Network OS ? Windows Server.
Correct Answered:
Wrong Answered:
4. Assertion (A): The BIOS is responsible for initializing hardware components during the computer?s boot process.
Reason (R): The BIOS loads the operating system into memory to start the computer.
A
Both Assertion and Reason are true, and Reason is the correct explanation of Assertion.
B
Both Assertion and Reason are true, but Reason is not the correct explanation of Assertion.
C
Assertion is true, but Reason is false.
D
Assertion is false, but Reason is true.
BIOS initializes hardware and starts boot process, but it does not load OS itself, rather it hands over to bootloader.
Correct Answered:
Wrong Answered:
5. Which protocol is used to send emails?
A
HTTP
B
SMTP
C
FTP
D
HTTPS
SMTP (Simple Mail Transfer Protocol) is used for sending emails.
Correct Answered:
Wrong Answered:
6. Which search engine is owned by Microsoft?
A
B
Yahoo
C
Bing
D
DuckDuckGo
Bing is owned by Microsoft.
Correct Answered:
Wrong Answered:
7. Microsoft Windows is an example of which type of operating system?
A
Multitasking Operating System
B
Realtime Operating System
C
Embedded Operating System
D
Multiuser Operating System
Windows supports multitasking, handling multiple processes simultaneously.
Correct Answered:
Wrong Answered:
8. Each character on the keyboard of computer has an ASCII value which stands for:
A
American Stock Code for Information Interchange
B
American Standard Code for Information Interchange
C
African Standard Code for Information Interchange
D
Adaptable Standard Code for Information Change
ASCII = American Standard Code for Information Interchange.
Correct Answered:
Wrong Answered:
9. HTML is used to create:
A
machine language program
B
high level program
C
web page
D
web server
HTML (Hypertext Markup Language) is used to create web pages.
Correct Answered:
Wrong Answered:
10. Read the following two statements:
I. ICT is considered a subset of Information Technology (IT).
II. The `right to use` a piece of software is termed as copyright.
A
Both I and II
B
Neither I nor II
C
II Only
D
I Only
ICT is a subset of IT, correct. Right to use software is license, not copyright.
Correct Answered:
Wrong Answered:
11. Consider the following statement:
Statement I: The decimal number 11 is larger than the hexadecimal number 11.
Statement II: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
A
S I Only
B
S II Only
C
Both S I and S II
D
Neither S I nor S II
Hexadecimal 11 = decimal 17, which is larger than 11, so Statement I is false. Binary 0.101 = 0.625 decimal, so Statement II is correct.
Correct Answered:
Wrong Answered:
12. Match email protocols with descriptions:
A
1-III, 2-II, 3-I
B
1-I, 2-II, 3-III
C
1-II, 2-I, 3-III
D
1-I, 2-III, 3-II
Correct mapping 1-III, 2-II, 3-I.
Correct Answered:
Wrong Answered:
13. Which statement is correct regarding e-mail?
A
Invented by Ray Tomlinson (1971)
B
Required sender & recipient online
C
?e-Mail? = Electronic Messaging
D
Exclusively between same computer users
Correct: invented by Ray Tomlinson.
Correct Answered:
Wrong Answered:
14. Match browser features with descriptions:
A
1-I, 2-II, 3-III, 4-IV
B
1-II, 2-III, 3-I, 4-IV
C
1-IV, 2-I, 3-II, 4-III
D
1-II, 2-IV, 3-III, 4-I
Correct mapping is 1-II, 2-III, 3-I, 4-IV.
Correct Answered:
Wrong Answered:
15. Process of monitoring & capturing data packets across network is called?
A
Sniffing
B
Spoofing
C
Back doors
D
Interference
Correct answer: Sniffing.
Correct Answered:
Wrong Answered:
16. Shortcut key to start PowerPoint slideshow from beginning?
A
Ctrl+F5
B
Shift+F5
C
Alt+F5
D
F5
Shortcut is F5.
Correct Answered:
Wrong Answered:
17. Main function of a compiler?
A
Execute code
B
Convert high-level code into machine code
C
Debug programs
D
All of the above
Compiler translates high-level to machine code.
Correct Answered:
Wrong Answered:
18. Statements about Firewall:
I. Monitors traffic,
II. Secures network,
III. Implemented in software/hardware.
Which are correct?
A
I only
B
II and III
C
I and II
D
I, II, III
All statements correct.
Correct Answered:
Wrong Answered:
19. The port connecting flat panel LCD monitors to computer?s video card?
A
Game port
B
Modem port
C
DVI port
D
PS/2 port
Correct answer: DVI port.
Correct Answered:
Wrong Answered:
20. Which type of software can be easily modified by editing source code?
A
Shareware, Freeware, Open source
B
Shareware, Freeware, Utility
C
Open source only
D
Freeware & Open source
Only open source software allows modification.
Correct Answered:
Wrong Answered:
21. PSTN is a part of
A
Datagram Switching
B
Circuit Switching
C
None
D
Both
Public Switched Telephone Network (PSTN) uses circuit switching.
Correct Answered:
Wrong Answered:
22. What is the shortcut for Slideshow in PowerPoint?
A
Press F1
B
Press F5
C
Press F4
D
None
Pressing F5 starts slideshow from the beginning.
Correct Answered:
Wrong Answered:
23. Following is not an architecture based on input to ALU
A
Logic based architecture
B
Control Processing Unit
C
Both a and b
D
None
Control Processing Unit is not an architecture input type for ALU.
Correct Answered:
Wrong Answered:
24. Which of the following can be seen as an evidence for the role of IT in e-Governance?
A
Smart City projects
B
Digilocker
C
UPI payment system
D
All of the above
All of these are evidence of IT in e-Governance.
Correct Answered:
Wrong Answered:
25. If a computer system is malfunctioned, which of the following can be used to detect it?
A
System software
B
System analysis
C
System diagnostics
D
Control Panel
System diagnostics help detect malfunction in a computer system.
Correct Answered:
Wrong Answered:
26. Who was the founder of the Free Software Foundation?
A
Richard Stallman
B
Dan Murdock
C
Miguel de caza
D
Linus Torvalds
Free Software Foundation was founded by Richard Stallman.
Correct Answered:
Wrong Answered:
27. What action is performed by pressing Ctrl+E in MS Word?
A
Exit Application
B
Select All
C
Clear All
D
Align Center
Ctrl+E aligns the text to the center.
Correct Answered:
Wrong Answered:
28. Which of the following statements is correct regarding the `Number` type formatting of cells in MS-Excel 2007?
A
30 is the maximum value for decimal places.
B
4 is the default value for decimal places.
C
The 1000 separator is a feature that places a comma after each digit.
D
1 is the minimum value for decimal places.
Default decimal places in Excel=2 (check mismatch).
Correct Answered:
Wrong Answered:
29. A program that converts assembly language to machine language is called _____.
A
Assembler
B
Interpreter
C
Compiler
D
Comparator
Assembler translates assembly language to machine language.
Correct Answered:
Wrong Answered:
30. Which of these computer languages do we use in artificial intelligence?
A
PROLOG
B
FORTRAN
C
COBOL
D
C
PROLOG is widely used in Artificial Intelligence.
Correct Answered:
Wrong Answered:
31. What is the full form of HTTPS?
A
HyperText Transfer Protocol Secure
B
HyperText Transfer Procedure Secure
C
HyperText Transfer Process Secure
D
HyperText Transfer Policy Secure
HTTPS stands for HyperText Transfer Protocol Secure.
Correct Answered:
Wrong Answered:
32. A ____ is a pre-designed document that already had coordinating fonts, a layout and a background.
A
Model
B
Prototype
C
Format
D
Template
A Template is a pre-designed document with formatting and layout.
Correct Answered:
Wrong Answered:
33. What is computer firewall?
A
It is software or hardware - based program to enhance the speed of the personal computer.
B
It is software or hardware - based program to protect the personal computer from crash due to bugs.
C
It is software or hardware - based program to protect against threats and make the internet network secure.
D
All the statements given above about the firewall are correct.
Firewall protects a system from unauthorized access and threats.
Correct Answered:
Wrong Answered:
34. What is the function of =COUNTIF( ) in Excel?
A
Counts cells as specified
B
Counts blank cells in a range
C
Returns values based on a TRUE or FALSE condition
D
Counts cells with numbers in a range
COUNTIF counts cells meeting a specific condition.
Correct Answered:
Wrong Answered:
35. _____ is the programming language used to write a Macro in MS Excel.
A
VB Script
B
Python
C
C++
D
Java
Macros in Excel are written in VBA (VB Script).
Correct Answered:
Wrong Answered: