Nothing Special   »   [go: up one dir, main page]

Telegram Group: Answer Key Available at

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Telegram Group: Q4.

http://t.me/UPSCEPFO2020AOEO Using which one of the following,


statistical analysis of data can be done?
Answer key available at: http://inspire-
1034284054.ap-south-1.elb.amazonaws.com/
A. Spreadsheet
UPSC EPFO Enforcement B. Word processor
Officer/Accounts Officer Exam C. Text editor
D. Browser
Individual Mock Test – Fundamentals of
Computer Answer: A
Total Questions: 120
Total Marks: 300 Q5.
The unit of data transfer rate is:
Each question carries 2.5 Marks.
Negative Marking: 1/3rd
A. Bits per second
B. Hertz
Q1. C. Kilohertz
Which one of the following is not an D. Bytes per second
output device?
Answer: A
A. Printer
B. Monitor Q6.
C. Scanner Web pages are written in:
D. Plotter
A. HTML
Answer: C B. Visual Basic
C. Binary coded form
Q2. D. None of the above
A computer cannot start without:
Answer: A
A. A word processor
B. A text editor Q7.
C. A paint program In the address http://www.google.co.in/,
D. An operating system http is:
Answer: D A. A Protocol
B. World Wide Web
Q3. C. Home Page
Which one of the following is not a D. A Domain Name
removable storage media?
Answer: A
A. Floppy disk
B. CD-ROM
C. Hard disk
D. USB pen drive

Answer: C
Q8. Q12.
The difference between one megabyte and Memory storage is called volatile, if data
one kilobyte is approximately: stored are lost when power is turned off.
Such a memory is:
A. 1000 kilobyte
B. 1 gigabyte A. ROM
C. 100 kilobyte. B. RAM
D. 1 Million bits C. Both A and B
D. EAPROM
Answer: A
Answer: B
Q9.
"An operating system" in a computer Q13.
indicates: You can connect your computer to the
Internet by connecting it to a:
A. A software which operates the computer
B. A hardware which joins the various A. Telephone line
parts of a computer B. Modem
C. A set of trained operators to work on the C. Telephone line via modem
computers D. None of the above
D. A permission given by the computer
manufacturer to start the computers Answer: C

Answer: A Q14.
Which one of the following memories is
Q10. known as permanent stores?
Microsoft Office is a:
A. RAM
A. Computer software B. ROM
B. Computer hardware C. Cache Memory
C. Headquarters of Microsoft Company D. Character Addressable Memory
D. None of the above
Answer: B
Answer: A
Q15.
Q11. Which one of the following is not a
The arithmetic and logic operations are characteristic of a computer?
performed in:
A. Accuracy
A. Hard disk B. Speed
B. Memory C. Storage
C. CD-ROM D. Rigidity
D. CPU
Answer: D
Answer: D
Q16. Q20.
UNIVAC is: ASCII and EBCDIC are the popular
character coding systems.
A. Universal Automatic Computer What does EBCDIC stand for?
B. Universal Array Computer
C. Unique Automatic Computer A. Extended Binary Coded Decimal
D. Unvalued Automatic Computer Interchange Code
B. Extended Bit Code Decimal Interchange
Answer: A Code
C. Extended Bit Case Decimal Interchange
Q17. Code
A storage area used to store data to D. Extended Binary Case Decimal
compensate for the difference in speed at Interchange Code
which the different units can handle data
is: Answer: A

A. Memory Q21.
B. Buffer A modem is a device which converts:
C. Accumulator
D. Address A. Analog signal to digital signal only
B. Digital signal to analog signal and vice
Answer: B versa
C. Digital signal to analog signal only
Q18. D. None of the above
The ALU of a computer responds to the
commands coming from: Answer: B

A. Primary memory Q22.


B. Control section A web page is a:
C. External memory
D. Cache memory A. Word document
B. HTML document
Answer: B C. File made in text editor
D. Wordpad document
Q19.
Which of the following is not an input Answer: B
device?

A. OCR
B. Optical scanners
C. Voice recognition device
D. None of the above

Answer: D
Q23. Q26.
Retrieval of data from Internet and 'What is "Virtual Private Network"?
communication through e-mail follow
certain rules called: A. It is a private computer network of an
organization where the remote users can
A. Hyperlinks transmit encrypted information through the
B. Hypertext server of the organization.
C. Mail attachments B. It is a computer network across a public
D. Protocols internet that provides users access to their
organization's network while maintaining
Answer: D the security of the information transmitted.
C. It is a computer network in which users
Q24. can access a shared pool of computing
In e-mail communication, you can save resources through a service provider.
frequently used e-mail IDs using: D. None of the statements (a), (b) and (c)
given above is a correct description of
A. History of a web page you visited Virtual Private Network.
B. Favourites
C. Address book Answer: B
D. File save
Q27.
Answer: C Connection or link to other documents or
Web Pages that contain related information
Q25. is called:
Simple Mail Transfer Protocol (SMTP) is
used in: A. Domain name
B. Hyperlink
A. File transfer through internet C. Dial-up
B. Browsing internet D. E-cash
C. Using search engines
D. E-mail communication Answer: B

Answer: D Q28.
The computer needs additional
components called _______ to accomplish
its input, output and storage functions:

A. Mice
B. Specifications
C. Architecture
D. Peripheral

Answer: D
Q29. Q32.
In context of Web Technology, the What characteristic of read-only memory
program ‘SPIDER’ refers to: (ROM) makes it useful?

A. Search Engine A. ROM information can be easily


B. An application for viewing web sites updated.
C. A program that catalogues web sites B. ROM provides very large amounts of
D. None of These inexpensive data storage.
C. Data in ROM is non-volatile, that is, it
Answer: C remains there even without electrical
power.
Q30. D. ROM chips are easily swapped between
Which of the following controls the different brands of computers.
manner of interaction between the user and
the operating system? Answer: C

A. User interface Q33.


B. Language translator What do you call the programs that are
C. Platform used to find out possible faults and their
D. Screen saver causes?

Answer: A A. Operating system extensions


B. Cookies
Q31. C. Diagnostic software
A compiler translates higher level D. Boot diskettes
programs into a machine language
program. The high level programs are Answer: C
called:
Q34.
A. Source Code A Pixel is _________
B. Object Code
C. Beta Code A. A computer program that draws picture
D. Compiled Code B. A picture stored in secondary memory
C. The smallest resolvable part of a picture
Answer: A D. None of these

Answer: C
Q35. Q39.
The system unit of a personal computer RDBMS stands for:
typically contains all of the following
except: A. Repairable Database Management
System
A. Microprocessor B. Relational Database Management
B. Disk controller System
C. Serial interface C. Relational Database Memory System
D. Modem D. Recurring Database Memory System

Answer: D Answer: B

Q36. Q40.
A technique for producing animation in Which one of the following is not among
which one image changes into another is the three logical operators in Java Script?
called:
A. ADD
A. Embedding B. AND
B. Linking C. OR
C. Morphing D. NOT
D. Scanning
Answer: A
Answer: C
Q41.
Q37. Daisy wheel printer is a type of
To read a CD-ROM Disc, you need a:
A. Matrix printer
A. Laser Beam B. Impact printer
B. Magnetic Needle C. Laser printer
C. Sound Card D. Manual printer
D. Graphics Card
Answer: B
Answer: A
Q42.
Q38. A Compact disk is a data storage system of
Both the ALU and Control Section have the type:
special purpose storage locations called:
A. Magnetic
A. Registers B. Optical
B. Accumulators C. Electric
C. Bus D. Electro-Mechanical
D. Address
Answer: B
Answer: A
Q43. Q47.
Who developed the concept of e-mail? _________ is a network topology where
each individual piece of a network is
A. Bill Gates attached to a central node (often called a
B. Arthur C. Clark hub or switch).
C. Ray Tomlinson
D. Sabir Bhatia A. Star topology
B. Bus topology
Answer: C C. Mesh topology
D. Ring topology
Q44.
Which of the following circuit is used as Answer: A
‘Memory Device’ in computers?
Q48.
A. Rectifier USB stands for:
B. Flip-Flop
C. Comparator A. Universal Serial Bus
D. Attenuator B. Universal Sequential Bus
C. Unidentified Serial Bus
Answer: B D. Unique Sequential Bus

Q45. Answer: A
WLL in computer terminology stands for:
Q49.
A. Walking Land Line Which protocol provides e-mail facility
B. Walking Loop Line among different hosts?
C. Wireless Land Line
D. Wireless Local Loop A. FTP
B. SMTP
Answer: D C. TELNET
D. SNMP
Q46.
What is clickjacking? Answer: B

A. A device that sends and receives data at SMTP: Simple Mail Transfer Protocol
every click in a bit second
B. A device which does/counts clicks on Q50.
internet Encryption and Decryption is the
C. A malicious technique of tricking Web responsibility of ___ Layer.
users into revealing confidential
information A. Physical Layer
D. A digital process that is used to display B. Network Layer
an image on mobiles C. Application Layer
D. Datalink Layer
Answer: C
Answer: C
Q51. Q54.
In context of mobile technology, the term In relation to Unique Identification
'jail breaking' implies a process: Authority of India (UIDAI), ‘QSAM’
stands for:
A. of running away from most secured jails
of USA by hard-core criminals A. Quality Service on Aadhaar Mapper
B. that gives users the ability to install B. Query Sending on Aadhaar Mobile
unauthorized software on certain types of C. Query Service on Aadhaar Mapper
phones D. Quality Service on Aadhaar Mapping
C. of breaking security system by hackers
using WiMAX technology Answer: C
D. of hacking authorized software from
computers, laptop and mobiles Q55.
A special software that is used to create a
Answer: B job queue is called:

Q52. A. Driver
Which of the following is application B. Spooler
software? C. Compiler
D. Linkage editor
A. Windows-10
B. Mac OS X Answer: B
C. Control panel
D. Microsoft Excel Q56.
UNIVAC stands for:
Answer: D
A. Unique Analog Computing
Q53. B. Universal Array Computer
Which Open Systems Interconnections C. Unique Automatic Computer
(OSI) layer does IP belong to? D. Universal Automatic Computer

A. Session layer Answer: D


B. Data link layer
C. Transport layer Q57.
D. Network layer Which of the following printers generates
character from a grid?
Answer: D
A. Inkjet
B. Laser
C. Daisy wheel
D. Dot matrix

Answer: D
Q58. Q62.
The software designed to perform a Which one of the following is an
specific task: executable file?

A. Synchronous Software A. Salim.exe


B. System Software B. Executable.doc
C. Application Software C. Subhash100.txt
D. None of the above D. Execute.html

Answer: C Answer: A

Q59. Q63.
In OSI model, _________ layer supports Data in multimedia contains:
the electrical or mechanical interface to the
physical medium. A. Text, number, picture, animated
graphics, video, sound etc. in combination.
A. Physical B. Video and audio.
B. Network C. Text only.
C. Data link D. Light and sound shows only.
D. Transport
Answer: A
Answer: A
Q64.
Q60. If you have to prepare several letters
Junk e-mail is also called ______ having same content but different address
to be sent to many candidates for
A. Spam interview, which one of the following
B. Spoof facilities of a word processing programme
C. Sniffer script will you use?
D. Spool
A. Copy and paste
Answer: A B. Mail merge
C. Find and replace
Q61. D. Format
Which one of the following is the smallest
unit of computer memory? Answer: B

A. RAM
B. Byte
C. Nibble
D. Bit

Answer: D
Q65. Q68.
Which one of the following programmes ‘Wanna Cry’ is a Ransomeware
can read an html language and convert it cryptoworm, which targeted mostly the
into a page which is in readable form? computers running with:

A. Word Processor A. Linux Operating System


B. Text Editor B. MAC Operating System
C. Spreadsheets C. Unix Operating System
D. Web Browser D. Windows Operating System

Answer: D Answer: D

Q66. Q69.
Which one of the following is Which one of the following generally
INCORRECT with reference to advantages stores in Read Only Memory (ROM) of a
of magnetic storage? computer?

A. It possesses high data density A. System Software


B. Its rate of data transfer is low B. Firmware
C. Its storage capacity is unlimited C. Open Source Software
D. It is very easy to transfer information D. Application Software
from one place to another
Answer: B
Answer: B
Q70.
Q67. SCSI is a port meant for transmitting fast
Which one of the following is NOT an data, which stands for:
example of Operating System?
A. Small Computer System Interface
A. Windows 98 B. Small Computer Software Interface
B. Microsoft Office XP C. Small Computer System Integration
C. Red Hat Linux D. Small Computer Software Integration
D. BSD Unix
Answer: A
Answer: B
Explanation Q71.
A set of rules for creating mark-up
languages that enables programming to
capture specific types of data by creating
their own elements is called______

A. XML
B. HTML
C. Ada
D. XHTML

Answer: A
Q72. Q76.
FTP stands for: What is a serial port that adds a direct
connection to a network?
A. File Translate Protocol
B. File Transit Protocol A. FireWire
C. File Typing Protocol B. NIC (network interface controller)
D. File Transfer Protocol C. USB
D. Internal modem
Answer: D
Answer: B
Q73.
‘WORM’ in context of optical storage Q77.
technology stands for? Linux is a_____

A. Write Once Read Many A. Network operating system


B. Wanted Once Read Memory B. Utility program for peer-to-peer file
C. Wanted Original Read Memory sharing
D. Write Original Read Memory C. Real-time operating system
D. PDA platform
Answer: A
Answer: C
Q74.
Which one of the following is not an input Q78.
device? Which one of the following is not an input
device?
A. Printer
B. VDU A. Joystick
C. Projector B. Mouse
D. All of the above C. Keyboard
D. Printer
Answer: D
Answer: D
Q75.
A computer that combines the Q79.
characteristic of analog and digital What are the units used to count the speed
computers_________ of a printer?

A. Hybrid Computer A. CPM


B. Digital Computer B. DPI
C. Analog Computer C. PPM
D. Super Computer D. BIT

Answer: A Answer: C
Q80. Q84.
‘128 – Bit Era’ is generally referred to: The presentation quality and the size of
image storage depend on:
A. 6th Generation in history of Video Game
Consoles A. Resolution and color depth
B. 9th Generation in history of Video Game B. Color pallets
Consoles C. Color models
C. 7th Generation in history of Video Game D. Color combinations
Consoles
D. 10th Generation in history of Video Answer: A
Game Consoles
Q85.
Answer: A The server Replication is a technique for
improving the performance of server side
Q81. is called:
The art of breaking of ciphers is called:
A. Caching
A. Cryptanalysis B. Mirroring
B. Cryptography C. Flash crowds
C. Cryptology D. Proxy
D. Cipherology
Answer: B
Answer: A
Q86.
Q82. Which is the most important/powerful
A digital signature is a mathematical computer in a typical network?
technique used to check:
A. Network Client
A. The authenticity, integrity and B. Network Station
nonrepudiation of a message C. Network Server
B. The clarity of the messages D. None of the above
C. The attacks from the viruses
D. The handwritten signatures Answer: C

Answer: A Q87.
Which of the following is used by
Q83. browsers to connect to locate the Internet
A technology which uses the hiding of the resources?
information in a picture is called:
A. Linkers
A. Steganography B. Protocol
B. Image Rendering C. Cable
C. Bitmapping D. URL
D. Root kits
Answer: D
Answer: A
Q88. Q91.
WiMAX stands for: Which of the following describes programs
that can run independently travels from
A. Worldwide Interoperability for system to system and disrupt computer
Microwave Access communication?
B. Wireless Interoperability for
Metropolitan Access A. Viruses
C. Worldwide Interoperability for Manual B. Worm
Access C. Trojans
D. Wired Interoperability for Manual D. Droppers
Access
Answer: B
Answer: A
Q92.
Q89. A program that converts high level
A pen shaped device which can sense light, language to machine Language is _______
and is used to point at spots on a video
screen: A. Linker
B. Assembler
A. Mouse C. Compiler
B. Light pen D. None of the above
C. Joystick
D. Plotter Answer: C

Answer: B Q93.
The Mobile Application Protocol (MAP)
Q90. typically runs on top of which protocol?
The term SSD in data storage media stands
for: A. SNMP (Simple Network Management
Protocol)
A. Server static drives B. SMTP (Simple Mail Transfer Protocol)
B. Solid static drives C. HTTP (Hyper Text Transfer Protocol)
C. Solid state drives D. SS7 (Signalling System 7)
D. Static state drives
Answer: D
Answer: C
Q94.
What type of software must to be used to
translate scanned text into a format that can
be manipulated?

A. MIDI
B. CRT
C. RGB
D. OCR

Answer: D
Q95. Q99.
Word processing, spreadsheet, and photo- What is the process of dividing the disk
editing are examples of________ into tracks and sectors?

A. Platform software A. Tracking


B. System software B. Formatting
C. Operating system software C. Crashing
D. Application software D. Allotting

Answer: D Answer: B

Q96. Q100.
‘Key-loggers’ are a form of: What is the permanent memory built into
your computer called?
A. Firmware
B. Spyware A. RAM
C. Anti-virus B. CPU
D. Operating System C. CD-ROM
D. ROM
Answer: B
Answer: D
Q97.
ASCII represents: Q101.
Which of the following is an example of
A. information system where documents telecommunications device?
and other web resources are identified by
Uniform Resource Locators A. Scanner
B. access to a command-line interface on a B. Joystick
remote host C. Windows 10
C. a malicious software program loaded D. Modem
onto a user's computer
D. a character encoding standard for Answer: D
electronic communication
Q102.
Answer: D A list of protocols used by a system, one
protocol per layer is called:
Q98.
Internet commenced with the development A. Protocol Traffic
of: B. Protocol Key
C. Protocol Stack
A. ARPANET D. Protocol Architecture
B. OECD
C. ICANN Answer: C
D. WebiMax

Answer: A
Q103. Q107.
A computer cannot "boot" if it does not __________ is a server that acts as an
have the _____ intermediary for requests from clients
seeking resources from other servers.
A. Compiler
B. Loader A. Proxy Server
C. Operating system B. FTP Server
D. Assembler C. Telnet server
D. Open Source Server
Answer: C
Answer: A
Q104.
In relation to Stamp duty collection, e- Q108.
SBTR stands for: _________ is a network topology where
each individual piece of a network is
A. Electronic Secure Basic Transaction attached to a central node (often called a
Receipt hub or switch).
B. Electronic Stamp Bank and Treasury
Receipt A. Star topology
C. Electronic Stamp Bank Transaction B. Bus topology
Receipt C. Mesh topology
D. Electronic Secure Bank and Treasury D. Ring topology
Receipt
Answer: A
Answer: D
Q109.
Q105. Register is a ____________
Which of the following is the extension of
graphics files? A. Set of capacitors used to register input
instructions in a digital computer
A. .doc B. Set of paper tapes and cards put in a file
B. .mdb C. Temporary storage unit within the CPU
C. .gif having dedicated or general purpose use
D. .tmp D. Part of the auxiliary memory

Answer: C Answer: C

Q106.
.......... is the process finding errors in
software code.

A. Compiling
B. Assembling
C. Interpreting
D. Debugging

Answer: D
Q110. Q113.
The character coding system The Hexadecimal equivalent of the Binary
‘EBCDIC’ stands for: number 1111100101000111111 is:

A. Extended Bit Coding Designed for A. 7CA3F


Information Casing B. F9477
B. Electronic Bit Code and Device C. F3AC7
Independent Computing D. 7749F
C. Extended Binary Computing and
Deciphering Information Code Answer: A
D. Extended Binary Coded Decimal
Interchange Code. Q114.
The motherboard of a computer contains a
Answer: D special chip known as BIOS. Which one of
the following is NOT a function of BIOS?
Q111.
A computer performs its operation in A. It tests computer’s processor memory
fraction of a second. What is the equivalent B. It searches for operating system and
of a Picosecond? load into the system
C. It provides a basic interface between
A. 10-9 second operating system and hardware
B. 10-12 second D. It accomplishes the execution of a
C. 109 second program
D. 1012 second
Answer: D
Answer: B
Q115.
Q112. Which one of the following techniques
Computer memory generally measures in divides the physical memory space into
Bytes. One Petabyte of computer memory multiple blocks and each block has a
is equivalent to: specific length?

A. 1024 Gigabytes A. Segmentation


B. 1024 Megabytes B. Paging
C. 1024 Terabytes C. Swapping
D. 1024 Zetabytes D. Fragmentation

Answer: C Answer: A
Q116. Q120.
In software context, SQLite is a: All of the following are examples of input
devices EXCEPT a:
A. Relational Database engine
B. Real-time Operating System A. Scanner
C. Anti-virus Software B. Mouse
D. Network Operating System C. Keyboard
D. Printer
Answer: A
Answer: D
Q117.
ISO 9001 is a Standard for:
Telegram Group:
A. Information Security Management http://t.me/UPSCEPFO2020AOEO
B. Risk Management Answer key available at: http://inspire-
C. Quality Management 1034284054.ap-south-
D. Food Safety Management 1.elb.amazonaws.com/
Answer: C

Q118.
One nibble is equivalent to how many bits?

A. 2
B. 4
C. 8
D. 1

Answer: B

Q119.
Which of the following is not a function of
the Input Unit?

A. It reads instructions and data from the


outside world.
B. It converts the data into computer
acceptable format.
C. It makes the data into user
understandable format.
D. It supplies the data and instructions to
the computer for further processing.

Answer: C

You might also like